text
stringlengths 7.33k
37.9k
| id
stringlengths 36
47
| dump
stringclasses 75
values | url
stringlengths 26
341
| date
stringdate 2013-12-12 20:36:36
2025-02-18 09:06:41
| file_path
stringlengths 125
142
| offset
int64 1.55M
1.3B
| token_count
int64 3k
6.97k
| language
stringclasses 1
value | page_average_lid
stringclasses 2
values | page_average_lid_score
float64 0.41
1
| full_doc_lid
stringclasses 5
values | full_doc_lid_score
float64 0.22
1
| per_page_languages
listlengths 1
123
| is_truncated
bool 2
classes | extractor
stringclasses 2
values | page_ends
listlengths 1
123
| text_before
stringlengths 15
32.5k
| completion
stringlengths 1
6.25k
| text_after
stringlengths 0
31k
| cursor_pos
int64 15
32.5k
| pos_type
stringclasses 3
values | word
stringlengths 1
60
| remove_mode
stringclasses 2
values | user_message
stringlengths 148
37.9k
| messages
listlengths 2
2
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Zoning Resolution
THE CITY OF NEW YORK
CITY PLANNING COMMISSION
Eric Adams, Mayor
Daniel R. Garodnick, Chair
62-341 - Developments on land and platforms
File generated by https://zr.planning.nyc.gov on 4/14/2024
62-341 - Developments on land and platforms
†
LAST AMENDED 12/6/2023
All #developments# on portions of a #zoning lot# landward of the #shoreline# or on #platforms# shall be subject to the height and setback provisions of this Section. However, when the seaward view from all points along the #shoreline# of a #zoning lot# is entirely obstructed by existing elevated roads, bridges or similar structures which are less than 50 feet above mean high water and within 200 feet of the #shoreline#, #developments# shall be exempt from the requirements of this Section. Height and setback regulations for #developments# on #piers# and #floating structures# are set forth in Sections 62-342 and 62-343.
(a) For the purposes of applying the height and setback regulations of this Section, the following provisions shall apply:
(1) #Street lines#
For the purposes of paragraphs (c) and (d) of this Section and of paragraph (h) of Section 62-354, a #shore public walkway#, #visual corridor#, #upland connection# or #supplemental public access area# shall be considered a #street# and its boundary shall be treated as a #street line#. Any #visual corridor# or #upland connection# that measures at least 75 feet in width, or any #shore public walkway# or #supplemental public access area#, shall be considered a #wide street#. Any other #visual corridor# or #upland connection# shall be considered a #narrow street#.
(2) #Initial setback distance#
For the purposes of paragraph (c) of this Section, an #initial setback distance# shall be a horizontal distance measured for a depth of 15 feet from a #narrow# #street line# and 10 feet from a #wide# #street line#. However, an #initial setback distance# shall have a depth of 30 feet from the boundary of a #shore public walkway#. Wherever a #supplemental public access area# is provided as a widened #shore public walkway#, such widened area shall be included in the #initial setback distance#.
(3) Measurement of height
The height of all #buildings or other structures# on #waterfront blocks# shall be measured from the #base plane#, except where modified by the provisions of Article VI, Chapter 4. For #buildings# with pitched roofs, maximum #building# height shall be measured to the midpoint of such pitched roof, except for #buildings# subject to Section 23-631 (General provisions).
(4) Permitted obstructions
The obstructions permitted pursuant to Sections 23-62, inclusive, 24-51, 33-42 or 43-42 and, where applicable, Sections 64-331, 64-332 or 64-432, shall apply. In addition, the following regulations regarding permitted obstructions shall apply:
(i) Within an #initial setback distance#, a dormer may exceed a maximum base height specified in Table A of this Section or penetrate a required setback area above a maximum base height specified in paragraph (d) of this Section, provided that such dormer complies with the provisions of paragraph (c)(1) of Section 23-623.
(ii) A penthouse portion of a #building# shall be permitted to exceed the applicable maximum #building# height, specified in Table A, by not more than 40 feet, only if the gross area of any #story# within such portion has a #lot coverage# of at least 50 percent and not more than 85 percent of the highest #story# that is located entirely below the maximum #building# height. Such reduced #lot coverage# shall be achieved by one or more setbacks on each face of the penthouse portion, where at least one setback on each face has a depth of at least four feet and a width that, individually or in the aggregate, is equal to at least 10 percent of the width of such respective face. For the purposes of this paragraph, (a)(4)(ii), the penthouse portion shall have four faces, with each face being the side of the rectangle within which the outermost walls of the highest #story# located entirely below the maximum #building# height have been inscribed. The required setbacks shall be measured from the outermost walls of the #building# facing each penthouse portion face. Required setback areas may overlap.
(iii) Wind energy systems
Regulations governing wind energy systems are modified pursuant to this paragraph, (a)(4)(iii).
In R6 through R10 Districts, #Commercial Districts#, other than C1 or C2 Districts mapped within R1 through R5 Districts and C4-1, C7 and C8-1 Districts, and #Manufacturing Districts#, other than M1-1 Districts, wind energy systems located on a roof of a #building# shall not exceed a height equivalent to 50 percent of the height of such portion of the #building# or 55 feet, whichever is less, as measured from the roof to the highest point of the wind turbine assembly.
In C4-1, C7, C8-1 and M1-1 Districts, for #buildings# containing #commercial# or #community facility# #uses#, wind energy systems shall not exceed a height of 55 feet when located above a roof of the #building# as measured to the highest point of the wind turbine assembly.
In all districts, no portion of a wind energy system may be closer than 10 feet to a #waterfront public access area# boundary or a #zoning# #lot line#.
(b) Lower density districts
R1 R2 R3 R4 R5 C3 C4-1 C7 C8-1 M1-1
In the districts indicated, and in C1 and C2 Districts mapped within such #Residence Districts#, the underlying district height and setback regulations are applicable or modified as follows:
(1) #Buildings# containing #residences#
(i) In R1 and R2 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations shall not apply. In lieu thereof, no #building# containing #residences#, except for a #predominantly# #community facility building#, shall exceed a height of 35 feet.
(ii) In R3, R4 and R5 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations for #buildings# containing #residences# shall apply, except for #predominantly# #community facility buildings#.
(2) #Predominantly# #community facility buildings#
The underlying height and setback regulations shall not apply. In lieu thereof, any portion of a #predominantly#
#community facility building# that exceeds a height of 35 feet shall be set back at least 25 feet from a #front yard line# or #street line#, where applicable, and no portion of such #building# shall exceed a height of 60 feet. However, within a #large-scale community facility development#, for portions of a #building# that are located at least 100 feet from a #street line# and, on a #waterfront zoning lot#, 100 feet from a #waterfront yard#, the maximum height shall not exceed 100 feet.
(3) #Buildings# containing #commercial# #uses#
The underlying height and setback regulations for #commercial# #uses# are modified as follows: no #building# containing #commercial# #uses# shall exceed a height of 30 feet, except for #mixed buildings# as set forth in paragraph (b)(1) of this Section or #predominantly# #community facility buildings# as set forth in paragraph (b) (2) of this Section.
(4) Other structures
All structures other than #buildings# shall be limited to a height of 35 feet, except that in C4-1, C7, C8-1 and M1-1 Districts, freestanding wind energy systems shall be permitted to a height of 85 feet, as measured from the base plane to the highest point of the wind turbine assembly.
(c) Medium and high density non-contextual districts
R6 R7 R8 R9 R10
C1-6 C1-7 C1-8 C1-9 C2-6 C2-7 C2-8 C4-2 C4-3 C4-4 C4-5 C4-6 C4-7 C5 C6 C7 C8-2 C8-3 C8-4
M1-2 M1-3 M1-4 M1-5 M1-6 M2 M3
Except for medium and high density contextual districts listed in paragraph (d) of this Section, in the districts indicated, and in C1 and C2 Districts mapped within such #Residence Districts#, the underlying height and setback regulations shall not apply. In lieu thereof, the height and setback regulations set forth in this Section shall apply.
(1) Maximum base height
Except for dormers permitted in accordance with paragraph (a)(4)(i) of this Section, the height of a #building or other structure# or portion thereof located within an #initial setback distance# may not exceed the maximum base height specified in Table A of this Section.
(2) Maximum #building# height
Except for penthouses permitted in accordance with paragraph (a)(4)(ii) of this Section, the height of a #building or other structure# or portion thereof may not exceed the maximum #building# height specified in Table A.
(3) #Floor area# distribution
#Zoning lots# with #buildings# that exceed the maximum base height listed in Table A shall have a minimum #floor area# coverage comprising at least 30 percent of the #lot area# at a height of 20 feet. For the purposes of determining this requirement, the #lot area# of #waterfront zoning lots# shall be deemed to be the area of the #zoning lot# landward of the #shoreline#. In the event the site plan involves construction on only a portion of the #zoning lot#, sufficient calculations shall be provided to show that such partial construction does not preclude compliance with the minimum #floor area# coverage requirements of this Section at the time the site is fully developed.
(4) Maximum #residential# tower size
Each #residential# #story# of a #building# located entirely above the maximum base height specified in Table A shall not exceed a gross area of 7,000 square feet on #zoning lots# less than 1.5 acres, and 8,100 square feet on larger #zoning lots#. On all #zoning lots#, dormers permitted within an #initial setback distance# in accordance with the provisions of paragraph (a)(4)(i) of this Section shall not be included in such gross area.
(5) Maximum width of walls facing #shoreline#
The maximum width of any #story# of a #building# that faces a #shoreline# and is entirely above the maximum base height specified in Table A shall not exceed 100 feet. Such width shall be measured by inscribing within a rectangle the outermost walls at the level of each #story# entirely above the maximum base height. Any side of such rectangle from which perpendicular lines may be drawn to a #shoreline#, regardless of any intervening structures, properties or #streets#, shall not exceed 100 feet. (See illustration).
(6) Ground floor streetscape provisions
For the purposes of this Section, "ground floor level" shall mean the floor of a #building#, the level of which is located within five feet of the finished level of the adjacent sidewalk.
For #street walls# that are more than 50 feet in width and within 50 feet of a #waterfront public access area# or #street#, the following rules shall apply:
(i) at least 50 percent of the width of such #street walls# shall be occupied by #floor area# at the ground floor level; and
(ii) where such #street walls# do not contain windows with sill levels lower than four feet above the adjacent sidewalk for a continuous distance of at least 30 feet, such #street walls# shall be articulated with rustication or decorative grills, or screened with plant material, to a minimum height of four feet.
Parking garages that occupy the ground floor frontage along any #street# or private drive which is also an #upland connection# shall be screened in accordance with the planting requirements of paragraph (a)(7)(iii) of Section 62-655.
TABLE A
HEIGHT AND SETBACK FOR ALL BUILDINGS AND OTHER STRUCTURES IN MEDIUM AND HIGH DENSITY NON-CONTEXTUAL DISTRICTS*
Maximum Height (in feet)
------
* For #predominantly# #community facility buildings#, the applicable regulations shall be determined from Table B of this Section
APPLICABLE HEIGHT AND SETBACK REGULATIONS FOR PREDOMINANTLY COMMUNITY FACILITY BUILDINGS
(d) Medium and high density contextual districts
R6A R6B R7A R7B R7D R7X R8A R8B R8X R9A R9X R10A
C1-6A C1-7A C1-8A C1-8X C1-9A C2-6A C2-7A C2-7X C2-8A C4-2A C4-3A C4-4A C4-4L C4-5A C4-5D C4-5X C4-6A C4-7A C5-1A C5-2A C6-2A C6-3A C6-4A
In the districts indicated, and in C1 and C2 Districts mapped within such #Residence Districts#, the height and setback regulations of Section 23-662 shall apply. For #Commercial Districts#, the applicable #Residence District# within which such #Commercial District# is mapped, or the applicable residential equivalent set forth in the tables in Section 35-23 (Residential Bulk Regulations in Other C1 or C2 Districts or in C3, C4, C5 or C6 Districts) shall be used in applying such provisions. In addition, in all applicable districts, for #buildings# meeting the criteria set forth in paragraph (a) of Section 23-664 (Modified height and setback regulations for certain Inclusionary Housing buildings or affordable independent residences for seniors), the height and setback provisions of paragraph (b) of Section 23-664 shall apply. Separate maximum #building# heights are set forth in Sections 23-662 and 23-664 for #Quality Housing buildings# with #qualifying ground floors# and for those with #non-qualifying ground floors#.
MAXIMUM WIDTH OF BUILDING WALL FACING SHORELINE (62-341d.1)
DORMER (62-341d.2)
|
<urn:uuid:3291b662-d41b-420b-8170-b033e3b6fb34>
|
CC-MAIN-2024-18
|
https://zr.planning.nyc.gov/print/pdf/node/18958
|
2024-04-14T23:32:00+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-18/subset=warc/part-00295-29538f81-5664-4df2-acb6-7d8ba3d2a1aa.c000.gz.parquet
| 1,010,261,765
| 3,273
|
eng_Latn
|
eng_Latn
| 0.832144
|
eng_Latn
| 0.970916
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown"
] | false
|
rolmOCR
|
[
217,
4257,
6401,
9455,
11721,
11860,
13228,
13289,
13309
] |
Zoning Resolution
THE CITY OF NEW YORK
CITY PLANNING COMMISSION
Eric Adams, Mayor
Daniel R. Garodnick, Chair
62-341 - Developments on land and platforms
File generated by https://zr.planning.nyc.gov on 4/14/2024
62-341 - Developments on land and platforms
†
LAST AMENDED 12/6/2023
All #developments# on portions of a #zoning lot# landward of the #shoreline# or on #platforms# shall be subject to the height and setback provisions of this Section. However, when the seaward view from all points along the #shoreline# of a #zoning lot# is entirely obstructed by existing elevated roads, bridges or similar structures which are less than 50 feet above mean high water and within 200 feet of the #shoreline#, #developments# shall be exempt from the requirements of this Section. Height and setback regulations for #developments# on #piers# and #floating structures# are set forth in Sections 62-342 and 62-343.
(a) For the purposes of applying the height and setback regulations of this Section, the following provisions shall apply:
(1) #Street lines#
For the purposes of paragraphs (c) and (d) of this Section and of paragraph (h) of Section 62-354, a #shore public walkway#, #visual corridor#, #upland connection# or #supplemental public access area# shall be considered a #street# and its boundary shall be treated as a #street line#. Any #visual corridor# or #upland connection# that measures at least 75 feet in width, or any #shore public walkway# or #supplemental public access area#, shall be considered a #wide street#. Any other #visual corridor# or #upland connection# shall be considered a #narrow street#.
(2) #Initial setback distance#
For the purposes of paragraph (c) of this Section, an #initial setback distance# shall be a horizontal distance measured for a depth of 15 feet from a #narrow# #street line# and 10 feet from a #wide# #street line#. However, an #initial setback distance# shall have a depth of 30 feet from the boundary of a #shore public walkway#. Wherever a #supplemental public access area# is provided as a widened #shore public walkway#, such widened area shall be included in the #initial setback distance#.
(3) Measurement of height
The height of all #buildings or other structures# on #waterfront blocks# shall be measured from the #base plane#, except where modified by the provisions of Article VI, Chapter 4. For #buildings# with pitched roofs, maximum #building# height shall be measured to the midpoint of such pitched roof, except for #buildings# subject to Section 23-631 (General provisions).
(4) Permitted obstructions
The obstructions permitted pursuant to Sections 23-62, inclusive, 24-51, 33-42 or 43-42 and, where applicable, Sections 64-331, 64-332 or 64-432, shall apply. In addition, the following regulations regarding permitted obstructions shall apply:
(i) Within an #initial setback distance#, a dormer may exceed a maximum base height specified in Table A of this Section or penetrate a required setback area above a maximum base height specified in paragraph (d) of this Section, provided that such dormer complies with the provisions of paragraph (c)(1) of Section 23-623.
(ii) A penthouse portion of a #building# shall be permitted to exceed the applicable maximum #building# height, specified in Table A, by not more than 40 feet, only if the gross area of any #story# within such portion has a #lot coverage# of at least 50 percent and not more than 85 percent of the highest #story# that is located entirely below the maximum #building# height. Such reduced #lot coverage# shall be achieved by one or more setbacks on each face of the penthouse portion, where at least one setback on each face has a depth of at least four feet and a width that, individually or in the aggregate, is equal to at least 10 percent of the width of such respective face. For the purposes of this paragraph, (a)(4)(ii), the penthouse portion shall have four faces, with each face being the side of the rectangle within which the outermost walls of the highest #story# located entirely below the maximum #building# height have been inscribed. The required setbacks shall be measured from the outermost walls of the #building# facing each penthouse portion face. Required setback areas may overlap.
(iii) Wind energy systems
Regulations governing wind energy systems are modified pursuant to this paragraph, (a)(4)(iii).
In R6 through R10 Districts, #Commercial Districts#, other than C1 or C2 Districts mapped within R1 through R5 Districts and C4-1, C7 and C8-1 Districts, and #Manufacturing Districts#, other than M1-1 Districts, wind energy systems located on a roof of a #building# shall not exceed a height equivalent to 50 percent of the height of such portion of the #building# or 55 feet, whichever is less, as measured from the roof to the highest point of the wind turbine assembly.
In C4-1, C7, C8-1 and M1-1 Districts, for #buildings# containing #commercial# or #community facility# #uses#, wind energy systems shall not exceed a height of 55 feet when located above a roof of the #building# as measured to the highest point of the wind turbine assembly.
In all districts, no portion of a wind energy system may be closer than 10 feet to a #waterfront public access area# boundary or a #zoning# #lot line#.
(b) Lower density districts
R1 R2 R3 R4 R5 C3 C4-1 C7 C8-1 M1-1
In the districts indicated, and in C1 and C2 Districts mapped within such #Residence Districts#, the underlying district height and setback regulations are applicable or modified as follows:
(1) #Buildings# containing #residences#
(i) In R1 and R2 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations shall not apply. In lieu thereof, no #building# containing #residences#, except for a #predominantly# #community facility building#, shall exceed a height of 35 feet.
(ii) In R3, R4 and R5 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations for #buildings# containing #residences# shall apply, except for #predominantly# #community facility buildings#.
(2) #Predominantly# #community facility buildings#
The underlying height and setback regulations shall not apply. In lieu thereof, any portion of a #predominantly#
#community facility building# that exceeds a height of 35 feet shall be set back at least 25 feet from a #front yard line# or #street line#, where applicable, and no portion of such #building# shall exceed a height of 60 feet. However, within a #large-scale community facility development#, for portions of a #building# that are located at least 100 feet from a #street line# and, on a #waterfront zoning lot#, 100 feet from a #waterfront yard#, the maximum height shall not exceed 100 feet.
(3) #Buildings# containing #commercial# #uses#
The underlying height and setback regulations for #commercial# #uses# are modified as follows: no #building# containing #commercial# #uses# shall exceed a height of 30 feet, except for #mixed buildings# as set forth in paragraph (b)(1) of this Section or #predominantly# #community facility buildings# as set forth in paragraph (b) (2) of this Section.
(4) Other structures
All structures other than #buildings# s
|
hall be limited to a height of 35 feet, except that in C4-1, C7, C8-1 and M1-1 Districts, freestanding wind energy systems shall be permitted to a height of 85 feet, as measured from the base plane to the highest point of the wind turbine assembly.
| 7,373
|
inside_word
|
shall
|
remove_all
|
<url>
https://zr.planning.nyc.gov/print/pdf/node/18958
</url>
<text>
Zoning Resolution
THE CITY OF NEW YORK
CITY PLANNING COMMISSION
Eric Adams, Mayor
Daniel R. Garodnick, Chair
62-341 - Developments on land and platforms
File generated by https://zr.planning.nyc.gov on 4/14/2024
62-341 - Developments on land and platforms
†
LAST AMENDED 12/6/2023
All #developments# on portions of a #zoning lot# landward of the #shoreline# or on #platforms# shall be subject to the height and setback provisions of this Section. However, when the seaward view from all points along the #shoreline# of a #zoning lot# is entirely obstructed by existing elevated roads, bridges or similar structures which are less than 50 feet above mean high water and within 200 feet of the #shoreline#, #developments# shall be exempt from the requirements of this Section. Height and setback regulations for #developments# on #piers# and #floating structures# are set forth in Sections 62-342 and 62-343.
(a) For the purposes of applying the height and setback regulations of this Section, the following provisions shall apply:
(1) #Street lines#
For the purposes of paragraphs (c) and (d) of this Section and of paragraph (h) of Section 62-354, a #shore public walkway#, #visual corridor#, #upland connection# or #supplemental public access area# shall be considered a #street# and its boundary shall be treated as a #street line#. Any #visual corridor# or #upland connection# that measures at least 75 feet in width, or any #shore public walkway# or #supplemental public access area#, shall be considered a #wide street#. Any other #visual corridor# or #upland connection# shall be considered a #narrow street#.
(2) #Initial setback distance#
For the purposes of paragraph (c) of this Section, an #initial setback distance# shall be a horizontal distance measured for a depth of 15 feet from a #narrow# #street line# and 10 feet from a #wide# #street line#. However, an #initial setback distance# shall have a depth of 30 feet from the boundary of a #shore public walkway#. Wherever a #supplemental public access area# is provided as a widened #shore public walkway#, such widened area shall be included in the #initial setback distance#.
(3) Measurement of height
The height of all #buildings or other structures# on #waterfront blocks# shall be measured from the #base plane#, except where modified by the provisions of Article VI, Chapter 4. For #buildings# with pitched roofs, maximum #building# height shall be measured to the midpoint of such pitched roof, except for #buildings# subject to Section 23-631 (General provisions).
(4) Permitted obstructions
The obstructions permitted pursuant to Sections 23-62, inclusive, 24-51, 33-42 or 43-42 and, where applicable, Sections 64-331, 64-332 or 64-432, shall apply. In addition, the following regulations regarding permitted obstructions shall apply:
(i) Within an #initial setback distance#, a dormer may exceed a maximum base height specified in Table A of this Section or penetrate a required setback area above a maximum base height specified in paragraph (d) of this Section, provided that such dormer complies with the provisions of paragraph (c)(1) of Section 23-623.
(ii) A penthouse portion of a #building# shall be permitted to exceed the applicable maximum #building# height, specified in Table A, by not more than 40 feet, only if the gross area of any #story# within such portion has a #lot coverage# of at least 50 percent and not more than 85 percent of the highest #story# that is located entirely below the maximum #building# height. Such reduced #lot coverage# shall be achieved by one or more setbacks on each face of the penthouse portion, where at least one setback on each face has a depth of at least four feet and a width that, individually or in the aggregate, is equal to at least 10 percent of the width of such respective face. For the purposes of this paragraph, (a)(4)(ii), the penthouse portion shall have four faces, with each face being the side of the rectangle within which the outermost walls of the highest #story# located entirely below the maximum #building# height have been inscribed. The required setbacks shall be measured from the outermost walls of the #building# facing each penthouse portion face. Required setback areas may overlap.
(iii) Wind energy systems
Regulations governing wind energy systems are modified pursuant to this paragraph, (a)(4)(iii).
In R6 through R10 Districts, #Commercial Districts#, other than C1 or C2 Districts mapped within R1 through R5 Districts and C4-1, C7 and C8-1 Districts, and #Manufacturing Districts#, other than M1-1 Districts, wind energy systems located on a roof of a #building# shall not exceed a height equivalent to 50 percent of the height of such portion of the #building# or 55 feet, whichever is less, as measured from the roof to the highest point of the wind turbine assembly.
In C4-1, C7, C8-1 and M1-1 Districts, for #buildings# containing #commercial# or #community facility# #uses#, wind energy systems shall not exceed a height of 55 feet when located above a roof of the #building# as measured to the highest point of the wind turbine assembly.
In all districts, no portion of a wind energy system may be closer than 10 feet to a #waterfront public access area# boundary or a #zoning# #lot line#.
(b) Lower density districts
R1 R2 R3 R4 R5 C3 C4-1 C7 C8-1 M1-1
In the districts indicated, and in C1 and C2 Districts mapped within such #Residence Districts#, the underlying district height and setback regulations are applicable or modified as follows:
(1) #Buildings# containing #residences#
(i) In R1 and R2 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations shall not apply. In lieu thereof, no #building# containing #residences#, except for a #predominantly# #community facility building#, shall exceed a height of 35 feet.
(ii) In R3, R4 and R5 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations for #buildings# containing #residences# shall apply, except for #predominantly# #community facility buildings#.
(2) #Predominantly# #community facility buildings#
The underlying height and setback regulations shall not apply. In lieu thereof, any portion of a #predominantly#
#community facility building# that exceeds a height of 35 feet shall be set back at least 25 feet from a #front yard line# or #street line#, where applicable, and no portion of such #building# shall exceed a height of 60 feet. However, within a #large-scale community facility development#, for portions of a #building# that are located at least 100 feet from a #street line# and, on a #waterfront zoning lot#, 100 feet from a #waterfront yard#, the maximum height shall not exceed 100 feet.
(3) #Buildings# containing #commercial# #uses#
The underlying height and setback regulations for #commercial# #uses# are modified as follows: no #building# containing #commercial# #uses# shall exceed a height of 30 feet, except for #mixed buildings# as set forth in paragraph (b)(1) of this Section or #predominantly# #community facility buildings# as set forth in paragraph (b) (2) of this Section.
(4) Other structures
All structures other than #buildings# s<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://zr.planning.nyc.gov/print/pdf/node/18958\n</url>\n<text>\nZoning Resolution\n\nTHE CITY OF NEW YORK\n\nCITY PLANNING COMMISSION\n\nEric Adams, Mayor\n\nDaniel R. Garodnick, Chair\n\n62-341 - Developments on land and platforms\n\nFile generated by https://zr.planning.nyc.gov on 4/14/2024\n\n62-341 - Developments on land and platforms\n\n†\n\nLAST AMENDED 12/6/2023\n\nAll #developments# on portions of a #zoning lot# landward of the #shoreline# or on #platforms# shall be subject to the height and setback provisions of this Section. However, when the seaward view from all points along the #shoreline# of a #zoning lot# is entirely obstructed by existing elevated roads, bridges or similar structures which are less than 50 feet above mean high water and within 200 feet of the #shoreline#, #developments# shall be exempt from the requirements of this Section. Height and setback regulations for #developments# on #piers# and #floating structures# are set forth in Sections 62-342 and 62-343.\n\n(a) For the purposes of applying the height and setback regulations of this Section, the following provisions shall apply:\n(1) #Street lines#\n\nFor the purposes of paragraphs (c) and (d) of this Section and of paragraph (h) of Section 62-354, a #shore public walkway#, #visual corridor#, #upland connection# or #supplemental public access area# shall be considered a #street# and its boundary shall be treated as a #street line#. Any #visual corridor# or #upland connection# that measures at least 75 feet in width, or any #shore public walkway# or #supplemental public access area#, shall be considered a #wide street#. Any other #visual corridor# or #upland connection# shall be considered a #narrow street#.\n\n(2) #Initial setback distance#\n\nFor the purposes of paragraph (c) of this Section, an #initial setback distance# shall be a horizontal distance measured for a depth of 15 feet from a #narrow# #street line# and 10 feet from a #wide# #street line#. However, an #initial setback distance# shall have a depth of 30 feet from the boundary of a #shore public walkway#. Wherever a #supplemental public access area# is provided as a widened #shore public walkway#, such widened area shall be included in the #initial setback distance#.\n\n(3) Measurement of height\n\nThe height of all #buildings or other structures# on #waterfront blocks# shall be measured from the #base plane#, except where modified by the provisions of Article VI, Chapter 4. For #buildings# with pitched roofs, maximum #building# height shall be measured to the midpoint of such pitched roof, except for #buildings# subject to Section 23-631 (General provisions).\n\n(4) Permitted obstructions\n\nThe obstructions permitted pursuant to Sections 23-62, inclusive, 24-51, 33-42 or 43-42 and, where applicable, Sections 64-331, 64-332 or 64-432, shall apply. In addition, the following regulations regarding permitted obstructions shall apply:\n\n(i) Within an #initial setback distance#, a dormer may exceed a maximum base height specified in Table A of this Section or penetrate a required setback area above a maximum base height specified in paragraph (d) of this Section, provided that such dormer complies with the provisions of paragraph (c)(1) of Section 23-623.\n(ii) A penthouse portion of a #building# shall be permitted to exceed the applicable maximum #building# height, specified in Table A, by not more than 40 feet, only if the gross area of any #story# within such portion has a #lot coverage# of at least 50 percent and not more than 85 percent of the highest #story# that is located entirely below the maximum #building# height. Such reduced #lot coverage# shall be achieved by one or more setbacks on each face of the penthouse portion, where at least one setback on each face has a depth of at least four feet and a width that, individually or in the aggregate, is equal to at least 10 percent of the width of such respective face. For the purposes of this paragraph, (a)(4)(ii), the penthouse portion shall have four faces, with each face being the side of the rectangle within which the outermost walls of the highest #story# located entirely below the maximum #building# height have been inscribed. The required setbacks shall be measured from the outermost walls of the #building# facing each penthouse portion face. Required setback areas may overlap.\n\n(iii) Wind energy systems\n\nRegulations governing wind energy systems are modified pursuant to this paragraph, (a)(4)(iii).\n\nIn R6 through R10 Districts, #Commercial Districts#, other than C1 or C2 Districts mapped within R1 through R5 Districts and C4-1, C7 and C8-1 Districts, and #Manufacturing Districts#, other than M1-1 Districts, wind energy systems located on a roof of a #building# shall not exceed a height equivalent to 50 percent of the height of such portion of the #building# or 55 feet, whichever is less, as measured from the roof to the highest point of the wind turbine assembly.\n\nIn C4-1, C7, C8-1 and M1-1 Districts, for #buildings# containing #commercial# or #community facility# #uses#, wind energy systems shall not exceed a height of 55 feet when located above a roof of the #building# as measured to the highest point of the wind turbine assembly.\n\nIn all districts, no portion of a wind energy system may be closer than 10 feet to a #waterfront public access area# boundary or a #zoning# #lot line#.\n\n(b) Lower density districts\n\nR1 R2 R3 R4 R5 C3 C4-1 C7 C8-1 M1-1\n\nIn the districts indicated, and in C1 and C2 Districts mapped within such #Residence Districts#, the underlying district height and setback regulations are applicable or modified as follows:\n\n(1) #Buildings# containing #residences#\n\n(i) In R1 and R2 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations shall not apply. In lieu thereof, no #building# containing #residences#, except for a #predominantly# #community facility building#, shall exceed a height of 35 feet.\n(ii) In R3, R4 and R5 Districts, and in #Commercial Districts# governed by the #bulk# regulations of such #Residence Districts#, the underlying height and setback regulations for #buildings# containing #residences# shall apply, except for #predominantly# #community facility buildings#.\n\n(2) #Predominantly# #community facility buildings#\n\nThe underlying height and setback regulations shall not apply. In lieu thereof, any portion of a #predominantly#\n\n#community facility building# that exceeds a height of 35 feet shall be set back at least 25 feet from a #front yard line# or #street line#, where applicable, and no portion of such #building# shall exceed a height of 60 feet. However, within a #large-scale community facility development#, for portions of a #building# that are located at least 100 feet from a #street line# and, on a #waterfront zoning lot#, 100 feet from a #waterfront yard#, the maximum height shall not exceed 100 feet.\n\n(3) #Buildings# containing #commercial# #uses#\n\nThe underlying height and setback regulations for #commercial# #uses# are modified as follows: no #building# containing #commercial# #uses# shall exceed a height of 30 feet, except for #mixed buildings# as set forth in paragraph (b)(1) of this Section or #predominantly# #community facility buildings# as set forth in paragraph (b) (2) of this Section.\n\n(4) Other structures\n\nAll structures other than #buildings# s<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "hall be limited to a height of 35 feet, except that in C4-1, C7, C8-1 and M1-1 Districts, freestanding wind energy systems shall be permitted to a height of 85 feet, as measured from the base plane to the highest point of the wind turbine assembly.",
"role": "assistant"
}
] |
|
Identification of the Types of Pre-analytical Errors in the Clinical Chemistry Laboratory from Jan-2012 to Dec-2012 at Jinnah Hospital, Pathology Department
Jahangir Sultan, Tariq Afzal, Kokab Jabeen
ABSTRACT
Objective: To evaluate the leading causes of preanalytical errors in a clinical chemistry laboratory. Methods: A retrospective analysis of the results obtained from the clinical chemistry laboratory for errors in the pre-analytical phase has been carried out to summarize data regarding the frequency of the main factors affecting the pre-analytical quality of results. Laboratory personnel were asked to register rejections, and causes for rejection of ward as well as out-patient samples collected in
INTRODUCTION
Modern day diagnosis is heavily dependent upon reliable laboratory data. It is therefore pertinent to ensure credibility of the results emanating from the clinical laboratories. Remarkable advances in automation, sample collection, transport, and dispatch of reports have led to a drastic improvement in the performance of these laboratories. But there is long path to tread before we achieve 100% accuracy and precision. Errors arising during sample processing are classified into pre-analytical, analytical, and postanalytical, depending upon their source and time of presentation respectively. The pre-and post-analytical phases of the process account for 93% of errors. 1 The pre-analytical phase comprises all of the processes
Corresponding Author
Dr. Jahangir Sultan
Assistant Professor Pathology
Chemical Section
Continental Medical
College,
Pakistan
E-mail: [email protected]
A.P.M.C Vol: 7 No. 1 January-June 2013
Lahore, the laboratory. Results: Of the 1,54,554 tubes received during the data collection period, 2505 samples were found unsuitable for further processing. This accounted for 1.52% of all samples collected in the laboratory. Rejections arose as a result of the following reasons: 0.48 % were rejected due to hemolysis; 0.92 % were specimens without proper requisition slips; and 0.14 % had insufficient sample quantity. Conclusion: Of all the samples received in the lab, the overall percentage of rejection is 1.62%.
occurring before the sample is processed in the auto analyzer. 2 These include inappropriate tests that have been ordered, improper sample collection, transport delays, and illegible handwriting on requisition slips. 3,4 Although these areas are beyond the jurisdiction of the clinical laboratory per se, the credibility of 5,6,7 The labs have to bear the burden of the inconsistencies or the labs is at stake due to these errors. incorrect reporting that can ensue because of these preanalytical errors. 8,9
The goal of the present paper is to enumerate and analyze the prevalence of different pre-analytical errors that surfaced during sample processing in the clinical biochemistry department during a 1-year period.
Jinnah Hospital is a tertiary care super specialty center in Lahore specializing in cardiology, cardiothoracic surgery, neurology, neurosurgery, gastroenterology, gastro surgery, and psychiatry. Jinnah Hospital is a teaching hospital as well. With 1416 students studying to be doctors at Allama Iqbal Medical College and learning practical procedures at Jinnah Hospital, over 7,000 doctors have graduated from here over the last ten years.
It is a 1250-bed hospital offering specialized medical and surgical treatment to about an average of patients 700,000 visit the Out-Patient and Emergency Department every year, where 70% of the treatment is given completely free. Every year more than 1,500,000 tests are carried out in Pathology Laboratory
The clinical biochemistry department is equipped with a state-of-the-art autoanalyzer with ISE– Beckman Coulter CX9PRO Clinical System (Hamburg, Germany), electrolyte Plus analyzer–
Na/K/Cl,ABG Nova biochemical Analyser, and other ancillaries for sample processing. Inpatient phlebotomies are performed by clinical department staff, whereas blood specimens from outpatients are collected on site at a centralized collection center by laboratory personnel. The samples are delivered to the lab by the paramedical staff from the wards and laboratory support staff from the OPD respectively.
REVIEW OF THE LITERATURE ON LABORATORY ERRORS
| Sector of the laboratory | Lapworth and Teal.12 | Goldschmidt and Lent. 11 | M.Pleban.15 | Plebani and Carro.16 | Stahl M et al.14 | Jahangir Kokab and Tariq | Ranjan and Binita.17 |
|---|---|---|---|---|---|---|---|
| Sector of the laboratory | Clinical chemistry | Whole laboratory | Primary care. | Stat laboratory | Whole laboratory | Clinical chemistry | Clinical chemistry |
| Data collection period | 1 year | 6 year | 6 month | 6 month | 3 year | 1 year | 1 year |
| No of Patients | 997000 | ND | 160714 | ND | ND | 154554 | 96328 |
| No of errors | 120 | 123 | 180 | 189 | 4135 | 2505 | 736 |
| Frequency | | | | 0.47 % of patients | 0.61% of patients | 1. 6% of patients | 1.5 %.of patients |
| Pre-analytical phase | 31.6% | 53% | 55% | 55.65 | 68.2% | 0.05% | |
MATERIALS AND METHODS
A total of 1,54554 samples from the outpatient department and in-house patients were received by our clinical chemistry laboratory during the period from January 2012 to December 2012. Out of these, 97,185 samples were collected from the patients admitted in the wards and 57,369 samples were collected in the outpatient department. The samples are collected using evacuated tubes (vacutainers evacuated tubes from BD (Franklin Lakes, NJ). The lab provides routine and reference testing in biochemistry. Upon receiving the samples, the lab supervisor visually detects any problems. When an error occurs, entries are made in the problem notification log book. The data generated is reviewed on a weekly basis. The data collection procedure involved review of blood samples received from the inpatient as well as outpatient departments. Venous blood samples are considered unsuitable according to the following accepted criteria: inappropriate volume, wrong or missing patient identification, inappropriate container, visible hemolysis after centrifugation, and lipemic samples. The pre-analytical variables evaluated included all the criteria mentioned above for sample rejection as well as incomplete/incorrect patient details and illegible handwriting.
RESULTS
We will first discuss the findings of the routine samples obtained from the inpatients in our hospital. Out of the 97,185 blood collection tubes screened over a period of 1 year, pre-analytical errors were observed in 1626 samples, which is approximately 1.6 % of the total number of samples received. The distribution of the different types of errors was then calculated (Table
1). The majority of the rejected samples were hemolyzed. Hemolysis was responsible for rejection of 692 samples, which accounts for 0.71% of the total number of samples received during this period. The amount of blood was insufficient for complete analysis in 0.15 % (i.e., 144out of the 97,185samples).
A total of 687 samples were accompanied by inappropriate slips (i.e., wrong requisition slip, without requisition slip, central registration number ward not mentioned). This comprised approximately 0.70 % of all the samples received by the laboratory. Out of these 203 samples, laboratory personnel managed to ascertain correct patient data in 153 cases, and hence reporting was completed successfully for these patients. Fifty samples could not be processed even after elaborate and painstaking efforts by the laboratory staff. Gross lipemia led to rejection of 103samples (0.10 %).
Similarly, we evaluated the slips obtained from the outpatient department. A total of 57,369 samples were received for processing from our OPD. Out of these, the number of pre-analytical errors documented was 879. This constitutes an error rate of 1.5 %. The distribution of the various pre-analytical variables is depicted in (Table 2). The most frequent error encountered during processing was sample with insufficient information (wrong vial/wrong slip). This constitutes an error rate of 1.28% this led to rejection of 738 samples out 57369 samples. The insufficient volume with an incidence of 0.13 %. Hemolysis, which constituted the most frequent pre-analytical error observed during sample processing of admitted patients, contributed to the rejection of 0.09 % of the samples in OPD as compared to 0.71% in the previous case.
Table-1 Frequency of the Different Preanalytical Errors Observed in a Total of 97,185 Routine Inpatient Samples
| 01 | Insufficient volume |
|---|---|
| 02 | Hemolysis |
| 03 | Sample with insufficient information (wrong vial/wrong slip) |
| 04 | Lipemic samples |
Table-2 Preanalytical Errors Observed in a Total of 57,369 Outpatient Samples
| 01 | Insufficient volume | 75(0.13 %) |
|---|---|---|
| 02 | Hemolysis | 55(0.09 %) |
| 03 | Sample with insufficient information (wrong vial/wrong slip) | 738(1.28 %) |
| 04 | Lipemic samples | 11(0.019%) |
DISCUSSION
Advances in science and technology have led to many path-breaking innovations that have transformed laboratory diagnostics from manual, cumbersome testing methods to fully automated science, ensuring accuracy and speed. 1, 2 However, the laboratory cannot function in isolation. It is dependent upon other departments; mainly the clinical division for properly filled requisition slips and samples for analysis. 1, 2Mounting evidence indicates that reliability cannot be achieved in a clinical laboratory through the mere promotion of accuracy in the analytical phase of the testing process. 3
It is evident that the majority of all errors in the total testing processing are of pre-analytical origin, i.e. they occur before the sample arrives in the laboratory and the phase after the sample is analyzed (post-analytical) are equally important. 4 The pre-analytical phase is riddled with many shortcomings ranging from lax attitude about filling the requisition slips to the staff's lack of education about ideal phlebotomy procedures. The health care system must be more diligent in applying scientific knowledge to reduce the errors in this phase. This is imperative to curtail the dent on laboratory services that arise due to human errors.
There has been varied information on the error rate within the whole lab testing procedure (0.1% to 9.3%). Plebani and Carraro observed in their paper that the great majority of errors result from problems in the pre-analytical or post-analytical phases. 5
Pre-analytical errors are largely attributable to human mistakes and the majority of these errors are preventable. 15 This is understandable, since the preanalytical phase involves much more human handling, compared to the analytical and post-analytical phases. 6 Hemolysis accounted for the majority of rejections in our study. The introduction of vacuum tubes along
with the closed system of blood collection has made blood collection efficient and easy. But lack of staff training engaged in phlebotomy is an impediment for expediting sample collection and transport. Hemolysis of samples occurs when blood is forced through a fine needle, shaking the tubes vigorously, and centrifuging the sample specimens before clotting is complete. 7 Red top vacutainers without any anticoagulant should not be shaken after the sample has been collected, and vacutainers for plasma should be gently inverted a few times so the anticoagulant mixes with the blood.
Freezing and thawing of blood specimens may cause massive hemolysis. In a study by Jay and colleagues, the majority of hemolyzed samples (>95%) could be attributed to in vitro processes resulting from incorrect sampling procedure or transportation. 8 Hemolysis leads to the extravasation of intracellular contents into the plasma, leading to false high values of potassium and intracellular enzymes such as SGOT and LDH. It also leads to a prolongated turn around time (TAT) due to the need for fresh samples for processing the request. 9 The frequency of hemolysis was more in the samples that were collected from the admitted patients as compared to the patients attending the OPDs (0.71% as compared to 0.09 %). One plausible explanation for this phenomenon could be the systematic blood collection technique followed by the laboratory staff in the OPD. 10 As a part of our endeavor to achieve accreditation for our laboratory services; we carry out regular in-house training sessions for our technicians to familiarize them with the standard protocols for sample processing. For this purpose, we have developed standard operating procedures (SOPs) for the different steps involved in ideal laboratory operations and ethics. Such training has facilitated in the adoption of ideal phlebotomy practices by our laboratory personnel. The samples are thereby transported to our laboratory from the collection center by our staff following the basic precautions that must be adhered to during transportation. There is an urgent need to instill awareness about the intricacies of a seemingly "easy and basic" activity that forms the mainstay of laboratory services - phlebotomy among the staff engaged in sample collection in our hospitals to reduce inadvertent hemolysis. 11
Another factor leading to rejection of blood samples in Our study was insufficient blood volume. Every analytical process requires a fixed volume of serum/plasma for analysis. The main reasons behind this anomaly are ignorance of the phlebotomists, difficult sampling as in pediatric patients, patients with chronic, debilitating diseases, and patients on chemotherapy whose thin veins are difficult to localize. Insufficient sample volume constituted the most frequent cause of test rejection in the samples collected in the OPD (1.28%). 12
Inpatient sampling with a frequency of 0.15 % for inadequate volume only. The difference is striking. This may be attributed to a number of factors. We have a centralized collection center where samples for clinical biochemistry, hematology, microbiology, and gastroenterology are collected simultaneously. 13 Due to the paucity of man power; the ratio of patients to phlebotomists is disproportionate, making sample collection difficult. This may hamper proper sample collection, leading to inadequate collection. The collection is carried out during fixed hours. Hence, this patient load combined with shortage of time may adversely affect proper sample collection in the OPD setting. Difficult sampling and patient non-compliance further aggravates this problem. Nevertheless, it is mandatory for the laboratory staff to practice a certain basic level of workmanship and skillful phlebotomy techniques to reduce such errors to a minimum. 14
A total of 0.70 % samples in the wards were accompanied by inappropriate requisition slips. The same figure for OPD samples was1.28 %. It has been observed that the clinicians often send incomplete slips with the samples. This could be due to excessive patient load or lack of awareness regarding patient information. Modern day diagnostics is not merely sample processing and preparation of reports. The laboratories are actively involved in disseminating information about critical results to clinicians so corrective measures can be initiated at the earliest. Incomplete/wrong patient information makes the practice redundant. Our laboratory staff could arrange the correct information about some of the patients admitted in the wards through their painstaking efforts. This leads to loss of precious time and is a laborintensive activity. The same protocol could not be followed for the OPD patients as it was virtually impossible to ascertain the patient/test information from either the clinicians or the patients. We followed a different protocol for these patients. The requisition slips, with an appropriate note citing reasons for
sample rejection, were dispatched to the OPD for the clinicians' knowledge. Those tests were repeated with fresh samples and new requisition slips as and when the patients revisited the hospital for checkup. This is definitely inconvenient for patients, who have to undergo the same process of registration and consequent sampling. Such errors can be completely wiped out by persistence by the laboratories for complete information and sincere efforts by the clinicians to provide the same. This will facilitate speedy sample processing and report dispatch to the patients to initiate therapeutic interventions at the earliest. 15, 16
Lipemia accounted for rejection of 0.10 % and 0.019 % of the samples in the inpatient and outpatient departments respectively. Lipemic samples can arise due to collection after heavy meals or the presence of some metabolic disorder (hyperlipoproteinemias). This can be avoided by sample collection, preferably after an overnight fast. If the patient has a metabolic disorder, the same must be mentioned in the requisition slip. Lipemia interferes with optical reading by the instrument and can affect interpretation of electrolyte values. A higher incidence of lipemia in OPD patients may be due to non-dissemination of information regarding prior preparation to the patients by the clinicians as well as non-compliance and/or miscomprehension of preparation rules by the patients. Hence, many patients give samples in non-fasting states leading to erroneous reporting. It is the responsibility of the clinicians and the phlebotomists to ensure that proper patient preparation is instituted before sample collection. 17
These data are comparable to those provided by other investigators, which confirm that problems directly related to specimen collection are the main cause of pre-analytic errors, especially hemolyzed, clotted, insufficient, and incorrect samples. 16, 17
With the exclusive use of vacutainers, the frequency of errors found in our study is 1.62 %. It is clear from the above discussion that incorrect phlebotomy practices are the main reason behind pre-analytical errors. The reason for incorrect phlebotomy practice includes lack of awareness or possibly a heavy workload. This is the reason phlebotomy has been considered a separate area of improvement for medical technicians in developed Countries. Those of us in developing nations must adopt a similar approach toward phlebotomy and initiate steps for the inculcation of ideal phlebotomy practices among health care workers. 17, 18
CONCLUSIONS
The concept of total quality management encompasses all the steps involved in sample processing, beginning from test ordering to the final interpretation of results by the clinicians to reduce or eliminate the errors that may arise during the various steps. The promotion of ideal phlebotomy practices and sample transport procedures is a pre-requisite for the efficacy of
Laboratory functioning. The dependence on accurate laboratory results for diagnostics makes it mandatory for labs to ensure accountability and accuracy of results to negate incorrect diagnosis as a consequence of faulty reporting. A practice of keeping a record of the errors at all stages of analysis and then devising corrective strategies for their prevention can gradually free a laboratory from such errors.
Errors in the laboratory can lead to inaccurate reports dispatched to clinicians, affecting health care services greatly. Ensuring the credibility of results is of utmost importance. While many clinicians probably believe that most errors in the laboratory are analytical, there are data showing that the pre-analytical and postanalytical phases are the greatest contributors to laboratory mistakes.
Though it is impossible to completely eliminate errors, it is possible to reduce them. We conclude that training of phlebotomists and technicians, bar coding of samples, implementation of a LIS, adoption of standardized procedures along with participation in external quality assessment programs and accreditation schemes can help to reduce laboratory errors to a minimum.
To attain this goal, we first implemented a continued education program, financed by our Regional Health Service and focused in Primary Care Nurses.
REFERENCES
1. Ranjna Chawla, PhD, Binita Goswami, MD, DNB, Devika Tayal, MD, V Mallika, MD.Identification of the Types of Preanalytical Errors in the Clinical Chemistry Laboratory: 1Year Study at G.B. Pant Hospital. LAB MED. 2010; 41: 89-92.
2. Plebani M, Carraro P. The detection and prevention of errors in laboratory medicine Ann Clin Biochem. 2010; 47: 101-110.
3. Robert Hawkins Managing the Pre- and Postanalytical Phases of the Total Testing Process. Ann Lab Med. 2012; 32: 5-16.
4. Mai M,H. Mansour, Hassan M. E, Azzazy, Steven C. Correction Factors for Estimating Potassium Concentrations in Samples With In Vitro Hemolysis.Clin Chem. 2010; 46: 306–307.
5. Characterization and mathematical correction of hemolysis interference in selected Hitachi 717 assays. Arch Pathol Lab Med. 2010; 133:960–966.
6. Jones BA, Calam RR, Howanitz PJ Chemistry specimen acceptability: A College of American Pathologists Q-Probes study of 453 laboratories. Arch Pathol Lab Med. 2011; 121:19–26.
7. Romero A, Munoz M, Ramos JR, et al. Identification of preanalytical mistakes in the stat section of the clinical laboratory. Clin Chem Lab Med. 2010; 43:974–975.
8. Jones BA, Meier F, Howanitz PJ .Complete blood count specimen acceptability: A College of American Pathologists Q-Probes study of 703 laboratories. Arch Pathol Lab Med. 2012; 119: 203–208.
9. Fidler JR. Task analysis revisited: Refining the phlebotomy technician scope of practice and assessing longitudinal change in competencies. Eval Health Prof. 2007; 30:150–169.
10. Lippi G, Blanckaert N, Bonini P, et al. Causes, consequences, detection and prevention of identification errors in laboratory diagnostics. Clin Chem Lab Med. 2011; 47:143– 153.
11. Goldschmit HMJ, Lent RW. Gross errors and work flow analysis in the clinical laboratory. Klin Biochem Metab 2010; 3:131-140.
12. Lapworth R, Teal TK. Laboratory blunders revisited. Ann C Biochem 2010; 31:78-84.
13. Plebani M, Carraro P. Mistakes in a stat laboratory: type frequency. Clin Chem 2009; 43: 1348-1351.
14. Stahl M, Lund ED, Brandslund I. Reasons for a laboratory's inability to report results for
requested analytical tests. Clin Chem 2012; 44:2195-2197.
15. Nutting PA, Main DS, Fischer PM, Stull TM, Pontious M, Seifert M, et al. Problems in laboratory testing in primary care. JAMA 2006; 275:635-639.
16. M. Pleban The detection and prevention of errors in laboratory medicin Ann Clin Biochem, 2010; 47: 101 - 110.
17. Ranjan and Binita. Do we know what inappropriate laboratory utilization is? A systematic review of laboratory clinical audits. JAMA 2011; 280: 550-558.
18. Romero and Cobos. The need for an outcomes research agenda for clinical laboratory testing. JAMA 2010; 280: 565-566.
AUTHORS
Dr. Jahangir Sultan Assistant Professor Pathology Chemical Section Continental Medical College Lahore, Pakistan
Dr. Tariq Afzal
Assistant Professor Pathology Sargodha Medical College, Sargodha, Pakistan
Dr. Kokab Jabeen
Assistant Professor Pathology Microbiology section Continental Medical College, Lahore, Pakistan
Submitted for Publication: 27-03-2013
Accepted for Publication: 03-10-2013
After minor revisions
|
<urn:uuid:d09b0a77-3476-475b-ab38-bdfac3c98a0b>
|
CC-MAIN-2019-09
|
http://apmc.com.pk/Download/APMC/apmc_v7n1/19-%20Identification%20of%20the%20Types%20of%20Pre-analytical%20Errors%20in%20the%20Clinical%20Chemistry%20Laboratory%20from%20Jan-2012%20to%20Dec-2012%20at%20Jinnah%20Hospital%2C%20Pathology%20Department.doc.pdf
|
2019-02-22T00:02:37Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511573.67/warc/CC-MAIN-20190221233437-20190222015437-00064.warc.gz
| 17,160,636
| 5,097
|
eng_Latn
|
eng_Latn
| 0.909177
|
eng_Latn
| 0.992817
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3351,
6746,
10915,
15905,
20421,
23347
] |
Identification of the Types of Pre-analytical Errors in the Clinical Chemistry Laboratory from Jan-2012 to Dec-2012 at Jinnah Hospital, Pathology Department
Jahangir Sultan, Tariq Afzal, Kokab Jabeen
ABSTRACT
Objective: To evaluate the leading causes of preanalytical errors in a clinical chemistry laboratory. Methods: A retrospective analysis of the results obtained from the clinical chemistry laboratory for errors in the pre-analytical phase has been carried out to summarize data regarding the frequency of the main factors affecting the pre-analytical quality of results. Laboratory personnel were asked to register rejections, and causes for rejection of ward as well as out-patient samples collected in
INTRODUCTION
Modern day diagnosis is heavily dependent upon reliable laboratory data. It is therefore pertinent to ensure credibility of the results emanating from the clinical laboratories. Remarkable advances in automation, sample collection, transport, and dispatch of reports have led to a drastic improvement in the performance of these laboratories. But there is long path to tread before we achieve 100% accuracy and precision. Errors arising during sample processing are classified into pre-analytical, analytical, and postanalytical, depending upon their source and time of presentation respectively. The pre-and post-analytical phases of the process account for 93% of errors. 1 The pre-analytical phase comprises all of the processes
Corresponding Author
Dr. Jahangir Sultan
Assistant Professor Pathology
Chemical Section
Continental Medical
College,
Pakistan
E-mail: [email protected]
A.P.M.C Vol: 7 No. 1 January-June 2013
Lahore, the laboratory. Results: Of the 1,54,554 tubes received during the data collection period, 2505 samples were found unsuitable for further processing. This accounted for 1.52% of all samples collected in the laboratory. Rejections arose as a result of the following reasons: 0.48 % were rejected due to hemolysis; 0.92 % were specimens without proper requisition slips; and 0.14 % had insufficient sample quantity. Conclusion: Of all the samples received in the lab, the overall percentage of rejection is 1.62%.
occurring before the sample is processed in the auto analyzer. 2 These include inappropriate tests that have been ordered, improper sample collection, transport delays, and illegible handwriting on requisition slips. 3,4 Although these areas are beyond the jurisdiction of the clinical laboratory per se, the credibility of 5,6,7 The labs have to bear the burden of the inconsistencies or the labs is at stake due to these errors. incorrect reporting that can ensue because of these preanalytical errors. 8,9
The goal of the present paper is to enumerate and analyze the prevalence of different pre-analytical errors that surfaced during sample processing in the clinical biochemistry department during a 1-year period.
Jinnah Hospital is a tertiary care super specialty center in Lahore specializing in cardiology, cardiothoracic surgery, neurology, neurosurgery, gastroenterology, gastro surgery, and psychiatry. Jinnah Hospital is a teaching hospital as well. With 1416 students studying to be doctors at Allama Iqbal Medical College and learning practical procedures at Jinnah Hospital, over 7,000 doctors have graduated from here over the last ten years.
It is a 1250-bed hospital offering specialized medical and surgical treatment to about an average of patients 700,000 visit the Out-Patient and Emergency Department every year, where 70% of the treatment is given completely free. Every year more than 1,500,000 tests are carried out in Pathology Laboratory
The clinical biochemistry department is equipped with a state-of-the-art autoanalyzer with ISE– Beckman Coulter CX9PRO Clinical System (Hamburg, Germany), electrolyte Plus analyzer–
Na/K/Cl,ABG Nova biochemical Analyser, and other ancillaries for sample processing. Inpatient phlebotomies are performed by clinical department staff, whereas blood specimens from outpatients are collected on site at a centralized collection center by laboratory personnel. The samples are delivered to the lab by the paramedical staff from the wards and laboratory support staff from the OPD respectively.
REVIEW OF THE LITERATURE ON LABORATORY ERRORS
| Sector of the laboratory | Lapworth and Teal.12 | Goldschmidt and Lent. 11 | M.Pleban.15 | Plebani and Carro.16 | Stahl M et al.14 | Jahangir Kokab and Tariq | Ranjan and Binita.17 |
|---|---|---|---|---|---|---|---|
| Sector of the laboratory | Clinical chemistry | Whole laboratory | Primary care. | Stat laboratory | Whole laboratory | Clinical chemistry | Clinical chemistry |
| Data collection period | 1 year | 6 year | 6 month | 6 month | 3 year | 1 year | 1 year |
| No of Patients | 997000 | ND | 160714 | ND | ND | 154554 | 96328 |
| No of errors | 120 | 123 | 180 | 189 | 4135 | 2505 | 736 |
| Frequency | | | | 0.47 % of patients | 0.61% of patients | 1. 6% of patients | 1.5 %.of patients |
| Pre-analytical phase | 31.6% | 53% | 55% | 55.65 | 68.2% | 0.05% | |
MATERIALS AND METHODS
A total of 1,54554 samples from the outpatient department and in-house patients were received by our clinical chemistry laboratory during the period from January 2012 to December 2012. Out of these, 97,185 samples were collected from the patients admitted in the wards and 57,369 samples were collected in the outpatient department. The samples are collected using evacuated tubes (vacutainers evacuated tubes from BD (Franklin Lakes, NJ). The lab provides routine and reference testing in biochemistry. Upon receiving the samples, the lab supervisor visually detects any problems. When an error occurs, entries are made in the problem notification log book. The data generated is reviewed on a weekly basis. The data collection procedure involved review of blood samples received from the inpatient as well as outpatient departments. Venous blood samples are considered unsuitable according to the following accepted criteria: inappropriate volume, wrong or missing patient identification, inappropriate container, visible hemolysis after centrifugation, and lipemic samples. The pre-analytical variables evaluated included all the criteria mentioned above for sample rejection as well as incomplete/incorrect patient details and illegible handwriting.
RESULTS
We will first discuss the findings of the routine samples obtained from the inpatients in our hospital. Out of the 97,185 blood collection tubes screened over a period of 1 year, pre-analytical errors were observed in 1626 samples, which is approximately 1.6 % of the total number of samples received. The distribution of the different types of errors was then calculated (Table
1). The majority of the rejected samples were hemolyzed. Hemolysis was responsible for rejection of 692 samples, which accounts for 0.71% of the total number of samples received during this period. The amount of blood was insufficient for complete analysis in 0.15 % (i.e., 144out of the 97,185samples).
A total of 687 samples were accompanied by inappropriate slips (i.e., wrong requisition slip, without requisition slip, central registration number ward not mentioned). This comprised approximately 0.70 % of all the samples received by the laboratory. Out of these 203 samples, laboratory personnel managed to ascertain correct patient data in 153 cases, and hence reporting was completed successfully for these patients. Fifty samples could not be processed even after elaborate and painstaking efforts by the laboratory staff. Gross lipemia led to rejection of 103samples (0.10 %).
Similarly, we evaluated the slips obtained from the outpatient department. A total of 57,369 samples were received for processing from our OPD. Out of these, the number of pre-analytical errors documented was 879. This constitutes an error rate of 1.5 %. The distribution of the various pre-analytical variables is depicted in (Table 2). The most frequent error encountered during processing was sample with insufficient information (wrong vial/wrong slip). This constitutes an error rate of 1.28% this led to rejection of 738 samples out 57369 samples. The insufficient volume with an incidence of 0.13 %. Hemolysis, which constituted the most frequent pre-analytical error observed during sample processing of admitted patients, contributed to the rejection of 0.09 % of the samples in OPD as compared to 0.71% in the previous case.
Table-1 Frequency of the Different Preanalytical Errors Observed in a Total of 97,185 Routine Inpatient Samples
| 01 | Insufficient volume |
|---|---|
| 02 | Hemolysis |
| 03 | Sample with insufficient information (wrong vial/wrong slip) |
| 04 | Lipemic samples |
Table-2 Preanalytical Errors Observed in a Total of 57,369 Outpatient Samples
| 01 | Insufficient volume | 75(0.13 %) |
|---|---|---|
| 02 | Hemolysis | 55(0.09 %) |
| 03 | Sample with insufficient information (wrong vial/wrong slip) | 738(1.28 %) |
| 04 | Lipemic samples | 11(0.019%) |
DISCUSSION
Advances in science and technology have led to many path-breaking innovations that have transformed laboratory diagnostics from manual, cumbersome testing methods to fully automated science, ensuring accuracy and speed. 1, 2 However, the laboratory cannot function in isolation. It is dependent upon other departments; mainly the clinical division for properly filled requisition slips and samples for analysis. 1, 2Mounting evidence indicates that reliability cannot be achieved in a clinical laboratory through the mere promotion of accuracy in the analytical phase of the testing process. 3
It is evident that the majority of all errors in the total testing processing are of pre-analytical origin, i.e. they occur before the sample arrives in the laboratory and the phase after the sample is analyzed (post-analytical) are equally important. 4 The pre-analytical phase is riddled with many shortcomings ranging from lax attitude about filling the requisition slips to the staff's lack of education about ideal phlebotomy procedures. The health care system must be more diligent in applying scientific knowledge to reduce the errors in this phase. This is imperative to curtail the dent on laboratory services that arise due to human errors.
There has been varied information on the error rate within the whole lab testing procedure (0.1% to 9.3%). Plebani and Carraro observed in their paper that the great majority of errors result from problems in the pre-analytical or post-analytical phases. 5
Pre-analytical errors are largely attributable to human mistakes and the majority of these errors are preventable. 15 This is understandable, since the preanalytical phase involves much more human handling, compared to the analytical and post-analytical phases. 6 Hemolysis accounted for the majority of rejections in our study. The introduction of vacuum tubes along
with the closed system of blood collection has made blood collection efficient and easy. But lack of staff training engaged in phlebotomy is an impediment for expediting sample collection and transport. Hemolysis of samples occurs when blood is forced through a fine needle, shaking the tubes vigorously, and centrifuging the sample specimens before clotting is complete. 7 Red top vacutainers without any anticoagulant should not be shaken after the sample has been collected, and vacutainers for plasma should be gently inverted a few times so the anticoagulant mixes with the blood.
Freezing and thawing of blood specimens may cause massive hemolysis. In a study by Jay and colleagues, the majority of hemolyzed samples (>95%) could be attributed to in vitro processes resulting from incorrect sampling procedure or transportation. 8 Hemolysis leads to the extravasation of intracellular contents into the plasma, leading to false high values of potassium and intracellular enzymes such as SGOT and LDH. It also leads to a prolongated turn around time (TAT) due to the need for fresh samples for processing the request. 9 The frequency of hemolysis was more in the samples that were collected from the admitted patients as compared to the patients attending the OPDs (0.71% as compared to 0.09 %). One plausible explanation for this phenomenon could be the systematic blood collection technique followed by the laboratory staff in the OPD. 10 As a part of our endeavor to achieve accreditation for our laboratory services; we carry out regular in-house training sessions for our technicians to familiarize them with the standard protocols for sample processing. For this purpose, we have developed standard operating procedures (SOPs) for the different steps involved in ideal laboratory operations and ethics. Such training has facilitated in the adoption of ideal phlebotomy practices by our laboratory personnel. The samples are thereby transported to our laboratory from the collection center by our staff following the basic precautions that must be adhered to during transportation. There is an urgent need to instill awareness about the intricacies of a seemingly "easy and basic" activity that forms the mainstay of laboratory services - phlebotomy among the staff engaged in sample collection in our hospitals to reduce inadvertent hemolysis. 11
Another factor leading to rejection of blood samples in Our study was insufficient blood volume. Every analytical process requires a fixed volume of serum/plasma for analysis. The main reasons behind this anomaly are ignorance of the phlebotomists, difficult sampling as in pediatric patients, patients with chroni
|
c, debilitating diseases, and patients on chemotherapy whose thin veins are difficult to localize.
|
Insufficient sample volume constituted the most frequent cause of test rejection in the samples collected in the OPD (1.28%). 12
Inpatient sampling with a frequency of 0.15 % for inadequate volume only. The difference is striking. This may be attributed to a number of factors. We have a centralized collection center where samples for clinical biochemistry, hematology, microbiology, and gastroenterology are collected simultaneously. 13 Due to the paucity of man power; the ratio of patients to phlebotomists is disproportionate, making sample collection difficult. This may hamper proper sample collection, leading to inadequate collection. The collection is carried out during fixed hours. Hence, this patient load combined with shortage of time may adversely affect proper sample collection in the OPD setting. Difficult sampling and patient non-compliance further aggravates this problem. Nevertheless, it is mandatory for the laboratory staff to practice a certain basic level of workmanship and skillful phlebotomy techniques to reduce such errors to a minimum. 14
A total of 0.70 % samples in the wards were accompanied by inappropriate requisition slips. The same figure for OPD samples was1.28 %. It has been observed that the clinicians often send incomplete slips with the samples. This could be due to excessive patient load or lack of awareness regarding patient information. Modern day diagnostics is not merely sample processing and preparation of reports. The laboratories are actively involved in disseminating information about critical results to clinicians so corrective measures can be initiated at the earliest. Incomplete/wrong patient information makes the practice redundant. Our laboratory staff could arrange the correct information about some of the patients admitted in the wards through their painstaking efforts. This leads to loss of precious time and is a laborintensive activity. The same protocol could not be followed for the OPD patients as it was virtually impossible to ascertain the patient/test information from either the clinicians or the patients. We followed a different protocol for these patients. The requisition slips, with an appropriate note citing reasons for
sample rejection, were dispatched to the OPD for the clinicians' knowledge. Those tests were repeated with fresh samples and new requisition slips as and when the patients revisited the hospital for checkup. This is definitely inconvenient for patients, who have to undergo the same process of registration and consequent sampling. Such errors can be completely wiped out by persistence by the laboratories for complete information and sincere efforts by the clinicians to provide the same. This will facilitate speedy sample processing and report dispatch to the patients to initiate therapeutic interventions at the earliest. 15, 16
Lipemia accounted for rejection of 0.10 % and 0.019 % of the samples in the inpatient and outpatient departments respectively. Lipemic samples can arise due to collection after heavy meals or the presence of some metabolic disorder (hyperlipoproteinemias). This can be avoided by sample collection, preferably after an overnight fast. If the patient has a metabolic disorder, the same must be mentioned in the requisition slip. Lipemia interferes with optical reading by the instrument and can affect interpretation of electrolyte values. A higher incidence of lipemia in OPD patients may be due to non-dissemination of information regarding prior preparation to the patients by the clinicians as well as non-compliance and/or miscomprehension of preparation rules by the patients. Hence, many patients give samples in non-fasting states leading to erroneous reporting. It is the responsibility of the clinicians and the phlebotomists to ensure that proper patient preparation is instituted before sample collection. 17
These data are comparable to those provided by other investigators, which confirm that problems directly related to specimen collection are the main cause of pre-analytic errors, especially hemolyzed, clotted, insufficient, and incorrect samples. 16, 17
With the exclusive use of vacutainers, the frequency of errors found in our study is 1.62 %. It is clear from the above discussion that incorrect phlebotomy practices are the main reason behind pre-analytical errors. The reason for incorrect phlebotomy practice includes lack of awareness or possibly a heavy workload. This is the reason phlebotomy has been considered a separate area of improvement for medical technicians in developed Countries. Those of us in developing nations must adopt a similar approach toward phlebotomy and initiate steps for the inculcation of ideal phlebotomy practices among health care workers. 17, 18
CONCLUSIONS
The concept of total quality management encompasses all the steps involved in sample processing, beginning from test ordering to the final interpretation of results by the clinicians to reduce or eliminate the errors that may arise during the various steps. The promotion of ideal phlebotomy practices and sample transport procedures is a pre-requisite for the efficacy of
Laboratory functioning. The dependence on accurate laboratory results for diagnostics makes it mandatory for labs to ensure accountability and accuracy of results to negate incorrect diagnosis as a consequence of faulty reporting. A practice of keeping a record of the errors at all stages of analysis and then devising corrective strategies for their prevention can gradually free a laboratory from such errors.
Errors in the laboratory can lead to inaccurate reports dispatched to clinicians, affecting health care services greatly. Ensuring the credibility of results is of utmost importance. While many clinicians probably believe that most errors in the laboratory are analytical, there are data showing that the pre-analytical and postanalytical phases are the greatest contributors to laboratory mistakes.
Though it is impossible to completely eliminate errors, it is possible to reduce them. We conclude that training of phlebotomists and technicians, bar coding of samples, implementation of a LIS, adoption of standardized procedures along with participation in external quality assessment programs and accreditation schemes can help to reduce laboratory errors to a minimum.
To attain this goal, we first implemented a continued education program, financed by our Regional Health Service and focused in Primary Care Nurses.
REFERENCES
1. Ranjna Chawla, PhD, Binita Goswami, MD, DNB, Devika Tayal, MD, V Mallika, MD.Identification of the Types of Preanalytical Errors in the Clinical Chemistry Laboratory: 1Year Study at G.B. Pant Hospital. LAB MED. 2010; 41: 89-92.
2. Plebani M, Carraro P. The detection and prevention of errors in laboratory medicine Ann Clin Biochem. 2010; 47: 101-110.
3. Robert Hawkins Managing the Pre- and Postanalytical Phases of the Total Testing Process. Ann Lab Med. 2012; 32: 5-16.
4. Mai M,H. Mansour, Hassan M. E, Azzazy, Steven C. Correction Factors for Estimating Potassium Concentrations in Samples With In Vitro Hemolysis.Clin Chem. 2010; 46: 306–307.
5. Characterization and mathematical correction of hemolysis interference in selected Hitachi 717 assays. Arch Pathol Lab Med. 2010; 133:960–966.
6. Jones BA, Calam RR, Howanitz PJ Chemistry specimen acceptability: A College of American Pathologists Q-Probes study of 453 laboratories. Arch Pathol Lab Med. 2011; 121:19–26.
7. Romero A, Munoz M, Ramos JR, et al. Identification of preanalytical mistakes in the stat section of the clinical laboratory. Clin Chem Lab Med. 2010; 43:974–975.
8. Jones BA, Meier F, Howanitz PJ .Complete blood count specimen acceptability: A College of American Pathologists Q-Probes study of 703 laboratories. Arch Pathol Lab Med. 2012; 119: 203–208.
9. Fidler JR. Task analysis revisited: Refining the phlebotomy technician scope of practice and assessing longitudinal change in competencies. Eval Health Prof. 2007; 30:150–169.
10. Lippi G, Blanckaert N, Bonini P, et al. Causes, consequences, detection and prevention of identification errors in laboratory diagnostics. Clin Chem Lab Med. 2011; 47:143– 153.
11. Goldschmit HMJ, Lent RW. Gross errors and work flow analysis in the clinical laboratory. Klin Biochem Metab 2010; 3:131-140.
12. Lapworth R, Teal TK. Laboratory blunders revisited. Ann C Biochem 2010; 31:78-84.
13. Plebani M, Carraro P. Mistakes in a stat laboratory: type frequency. Clin Chem 2009; 43: 1348-1351.
14. Stahl M, Lund ED, Brandslund I. Reasons for a laboratory's inability to report results for
requested analytical tests. Clin Chem 2012; 44:2195-2197.
15. Nutting PA, Main DS, Fischer PM, Stull TM, Pontious M, Seifert M, et al. Problems in laboratory testing in primary care. JAMA 2006; 275:635-639.
16. M. Pleban The detection and prevention of errors in laboratory medicin Ann Clin Biochem, 2010; 47: 101 - 110.
17. Ranjan and Binita. Do we know what inappropriate laboratory utilization is? A systematic review of laboratory clinical audits. JAMA 2011; 280: 550-558.
18. Romero and Cobos. The need for an outcomes research agenda for clinical laboratory testing. JAMA 2010; 280: 565-566.
AUTHORS
Dr. Jahangir Sultan Assistant Professor Pathology Chemical Section Continental Medical College Lahore, Pakistan
Dr. Tariq Afzal
Assistant Professor Pathology Sargodha Medical College, Sargodha, Pakistan
Dr. Kokab Jabeen
Assistant Professor Pathology Microbiology section Continental Medical College, Lahore, Pakistan
Submitted for Publication: 27-03-2013
Accepted for Publication: 03-10-2013
After minor revisions
| 13,583
|
inside_word
|
chronic,
|
remove_one_sentence
|
<url>
http://apmc.com.pk/Download/APMC/apmc_v7n1/19-%20Identification%20of%20the%20Types%20of%20Pre-analytical%20Errors%20in%20the%20Clinical%20Chemistry%20Laboratory%20from%20Jan-2012%20to%20Dec-2012%20at%20Jinnah%20Hospital%2C%20Pathology%20Department.doc.pdf
</url>
<text>
Identification of the Types of Pre-analytical Errors in the Clinical Chemistry Laboratory from Jan-2012 to Dec-2012 at Jinnah Hospital, Pathology Department
Jahangir Sultan, Tariq Afzal, Kokab Jabeen
ABSTRACT
Objective: To evaluate the leading causes of preanalytical errors in a clinical chemistry laboratory. Methods: A retrospective analysis of the results obtained from the clinical chemistry laboratory for errors in the pre-analytical phase has been carried out to summarize data regarding the frequency of the main factors affecting the pre-analytical quality of results. Laboratory personnel were asked to register rejections, and causes for rejection of ward as well as out-patient samples collected in
INTRODUCTION
Modern day diagnosis is heavily dependent upon reliable laboratory data. It is therefore pertinent to ensure credibility of the results emanating from the clinical laboratories. Remarkable advances in automation, sample collection, transport, and dispatch of reports have led to a drastic improvement in the performance of these laboratories. But there is long path to tread before we achieve 100% accuracy and precision. Errors arising during sample processing are classified into pre-analytical, analytical, and postanalytical, depending upon their source and time of presentation respectively. The pre-and post-analytical phases of the process account for 93% of errors. 1 The pre-analytical phase comprises all of the processes
Corresponding Author
Dr. Jahangir Sultan
Assistant Professor Pathology
Chemical Section
Continental Medical
College,
Pakistan
E-mail: [email protected]
A.P.M.C Vol: 7 No. 1 January-June 2013
Lahore, the laboratory. Results: Of the 1,54,554 tubes received during the data collection period, 2505 samples were found unsuitable for further processing. This accounted for 1.52% of all samples collected in the laboratory. Rejections arose as a result of the following reasons: 0.48 % were rejected due to hemolysis; 0.92 % were specimens without proper requisition slips; and 0.14 % had insufficient sample quantity. Conclusion: Of all the samples received in the lab, the overall percentage of rejection is 1.62%.
occurring before the sample is processed in the auto analyzer. 2 These include inappropriate tests that have been ordered, improper sample collection, transport delays, and illegible handwriting on requisition slips. 3,4 Although these areas are beyond the jurisdiction of the clinical laboratory per se, the credibility of 5,6,7 The labs have to bear the burden of the inconsistencies or the labs is at stake due to these errors. incorrect reporting that can ensue because of these preanalytical errors. 8,9
The goal of the present paper is to enumerate and analyze the prevalence of different pre-analytical errors that surfaced during sample processing in the clinical biochemistry department during a 1-year period.
Jinnah Hospital is a tertiary care super specialty center in Lahore specializing in cardiology, cardiothoracic surgery, neurology, neurosurgery, gastroenterology, gastro surgery, and psychiatry. Jinnah Hospital is a teaching hospital as well. With 1416 students studying to be doctors at Allama Iqbal Medical College and learning practical procedures at Jinnah Hospital, over 7,000 doctors have graduated from here over the last ten years.
It is a 1250-bed hospital offering specialized medical and surgical treatment to about an average of patients 700,000 visit the Out-Patient and Emergency Department every year, where 70% of the treatment is given completely free. Every year more than 1,500,000 tests are carried out in Pathology Laboratory
The clinical biochemistry department is equipped with a state-of-the-art autoanalyzer with ISE– Beckman Coulter CX9PRO Clinical System (Hamburg, Germany), electrolyte Plus analyzer–
Na/K/Cl,ABG Nova biochemical Analyser, and other ancillaries for sample processing. Inpatient phlebotomies are performed by clinical department staff, whereas blood specimens from outpatients are collected on site at a centralized collection center by laboratory personnel. The samples are delivered to the lab by the paramedical staff from the wards and laboratory support staff from the OPD respectively.
REVIEW OF THE LITERATURE ON LABORATORY ERRORS
| Sector of the laboratory | Lapworth and Teal.12 | Goldschmidt and Lent. 11 | M.Pleban.15 | Plebani and Carro.16 | Stahl M et al.14 | Jahangir Kokab and Tariq | Ranjan and Binita.17 |
|---|---|---|---|---|---|---|---|
| Sector of the laboratory | Clinical chemistry | Whole laboratory | Primary care. | Stat laboratory | Whole laboratory | Clinical chemistry | Clinical chemistry |
| Data collection period | 1 year | 6 year | 6 month | 6 month | 3 year | 1 year | 1 year |
| No of Patients | 997000 | ND | 160714 | ND | ND | 154554 | 96328 |
| No of errors | 120 | 123 | 180 | 189 | 4135 | 2505 | 736 |
| Frequency | | | | 0.47 % of patients | 0.61% of patients | 1. 6% of patients | 1.5 %.of patients |
| Pre-analytical phase | 31.6% | 53% | 55% | 55.65 | 68.2% | 0.05% | |
MATERIALS AND METHODS
A total of 1,54554 samples from the outpatient department and in-house patients were received by our clinical chemistry laboratory during the period from January 2012 to December 2012. Out of these, 97,185 samples were collected from the patients admitted in the wards and 57,369 samples were collected in the outpatient department. The samples are collected using evacuated tubes (vacutainers evacuated tubes from BD (Franklin Lakes, NJ). The lab provides routine and reference testing in biochemistry. Upon receiving the samples, the lab supervisor visually detects any problems. When an error occurs, entries are made in the problem notification log book. The data generated is reviewed on a weekly basis. The data collection procedure involved review of blood samples received from the inpatient as well as outpatient departments. Venous blood samples are considered unsuitable according to the following accepted criteria: inappropriate volume, wrong or missing patient identification, inappropriate container, visible hemolysis after centrifugation, and lipemic samples. The pre-analytical variables evaluated included all the criteria mentioned above for sample rejection as well as incomplete/incorrect patient details and illegible handwriting.
RESULTS
We will first discuss the findings of the routine samples obtained from the inpatients in our hospital. Out of the 97,185 blood collection tubes screened over a period of 1 year, pre-analytical errors were observed in 1626 samples, which is approximately 1.6 % of the total number of samples received. The distribution of the different types of errors was then calculated (Table
1). The majority of the rejected samples were hemolyzed. Hemolysis was responsible for rejection of 692 samples, which accounts for 0.71% of the total number of samples received during this period. The amount of blood was insufficient for complete analysis in 0.15 % (i.e., 144out of the 97,185samples).
A total of 687 samples were accompanied by inappropriate slips (i.e., wrong requisition slip, without requisition slip, central registration number ward not mentioned). This comprised approximately 0.70 % of all the samples received by the laboratory. Out of these 203 samples, laboratory personnel managed to ascertain correct patient data in 153 cases, and hence reporting was completed successfully for these patients. Fifty samples could not be processed even after elaborate and painstaking efforts by the laboratory staff. Gross lipemia led to rejection of 103samples (0.10 %).
Similarly, we evaluated the slips obtained from the outpatient department. A total of 57,369 samples were received for processing from our OPD. Out of these, the number of pre-analytical errors documented was 879. This constitutes an error rate of 1.5 %. The distribution of the various pre-analytical variables is depicted in (Table 2). The most frequent error encountered during processing was sample with insufficient information (wrong vial/wrong slip). This constitutes an error rate of 1.28% this led to rejection of 738 samples out 57369 samples. The insufficient volume with an incidence of 0.13 %. Hemolysis, which constituted the most frequent pre-analytical error observed during sample processing of admitted patients, contributed to the rejection of 0.09 % of the samples in OPD as compared to 0.71% in the previous case.
Table-1 Frequency of the Different Preanalytical Errors Observed in a Total of 97,185 Routine Inpatient Samples
| 01 | Insufficient volume |
|---|---|
| 02 | Hemolysis |
| 03 | Sample with insufficient information (wrong vial/wrong slip) |
| 04 | Lipemic samples |
Table-2 Preanalytical Errors Observed in a Total of 57,369 Outpatient Samples
| 01 | Insufficient volume | 75(0.13 %) |
|---|---|---|
| 02 | Hemolysis | 55(0.09 %) |
| 03 | Sample with insufficient information (wrong vial/wrong slip) | 738(1.28 %) |
| 04 | Lipemic samples | 11(0.019%) |
DISCUSSION
Advances in science and technology have led to many path-breaking innovations that have transformed laboratory diagnostics from manual, cumbersome testing methods to fully automated science, ensuring accuracy and speed. 1, 2 However, the laboratory cannot function in isolation. It is dependent upon other departments; mainly the clinical division for properly filled requisition slips and samples for analysis. 1, 2Mounting evidence indicates that reliability cannot be achieved in a clinical laboratory through the mere promotion of accuracy in the analytical phase of the testing process. 3
It is evident that the majority of all errors in the total testing processing are of pre-analytical origin, i.e. they occur before the sample arrives in the laboratory and the phase after the sample is analyzed (post-analytical) are equally important. 4 The pre-analytical phase is riddled with many shortcomings ranging from lax attitude about filling the requisition slips to the staff's lack of education about ideal phlebotomy procedures. The health care system must be more diligent in applying scientific knowledge to reduce the errors in this phase. This is imperative to curtail the dent on laboratory services that arise due to human errors.
There has been varied information on the error rate within the whole lab testing procedure (0.1% to 9.3%). Plebani and Carraro observed in their paper that the great majority of errors result from problems in the pre-analytical or post-analytical phases. 5
Pre-analytical errors are largely attributable to human mistakes and the majority of these errors are preventable. 15 This is understandable, since the preanalytical phase involves much more human handling, compared to the analytical and post-analytical phases. 6 Hemolysis accounted for the majority of rejections in our study. The introduction of vacuum tubes along
with the closed system of blood collection has made blood collection efficient and easy. But lack of staff training engaged in phlebotomy is an impediment for expediting sample collection and transport. Hemolysis of samples occurs when blood is forced through a fine needle, shaking the tubes vigorously, and centrifuging the sample specimens before clotting is complete. 7 Red top vacutainers without any anticoagulant should not be shaken after the sample has been collected, and vacutainers for plasma should be gently inverted a few times so the anticoagulant mixes with the blood.
Freezing and thawing of blood specimens may cause massive hemolysis. In a study by Jay and colleagues, the majority of hemolyzed samples (>95%) could be attributed to in vitro processes resulting from incorrect sampling procedure or transportation. 8 Hemolysis leads to the extravasation of intracellular contents into the plasma, leading to false high values of potassium and intracellular enzymes such as SGOT and LDH. It also leads to a prolongated turn around time (TAT) due to the need for fresh samples for processing the request. 9 The frequency of hemolysis was more in the samples that were collected from the admitted patients as compared to the patients attending the OPDs (0.71% as compared to 0.09 %). One plausible explanation for this phenomenon could be the systematic blood collection technique followed by the laboratory staff in the OPD. 10 As a part of our endeavor to achieve accreditation for our laboratory services; we carry out regular in-house training sessions for our technicians to familiarize them with the standard protocols for sample processing. For this purpose, we have developed standard operating procedures (SOPs) for the different steps involved in ideal laboratory operations and ethics. Such training has facilitated in the adoption of ideal phlebotomy practices by our laboratory personnel. The samples are thereby transported to our laboratory from the collection center by our staff following the basic precautions that must be adhered to during transportation. There is an urgent need to instill awareness about the intricacies of a seemingly "easy and basic" activity that forms the mainstay of laboratory services - phlebotomy among the staff engaged in sample collection in our hospitals to reduce inadvertent hemolysis. 11
Another factor leading to rejection of blood samples in Our study was insufficient blood volume. Every analytical process requires a fixed volume of serum/plasma for analysis. The main reasons behind this anomaly are ignorance of the phlebotomists, difficult sampling as in pediatric patients, patients with chroni<cursor_is_here> Insufficient sample volume constituted the most frequent cause of test rejection in the samples collected in the OPD (1.28%). 12
Inpatient sampling with a frequency of 0.15 % for inadequate volume only. The difference is striking. This may be attributed to a number of factors. We have a centralized collection center where samples for clinical biochemistry, hematology, microbiology, and gastroenterology are collected simultaneously. 13 Due to the paucity of man power; the ratio of patients to phlebotomists is disproportionate, making sample collection difficult. This may hamper proper sample collection, leading to inadequate collection. The collection is carried out during fixed hours. Hence, this patient load combined with shortage of time may adversely affect proper sample collection in the OPD setting. Difficult sampling and patient non-compliance further aggravates this problem. Nevertheless, it is mandatory for the laboratory staff to practice a certain basic level of workmanship and skillful phlebotomy techniques to reduce such errors to a minimum. 14
A total of 0.70 % samples in the wards were accompanied by inappropriate requisition slips. The same figure for OPD samples was1.28 %. It has been observed that the clinicians often send incomplete slips with the samples. This could be due to excessive patient load or lack of awareness regarding patient information. Modern day diagnostics is not merely sample processing and preparation of reports. The laboratories are actively involved in disseminating information about critical results to clinicians so corrective measures can be initiated at the earliest. Incomplete/wrong patient information makes the practice redundant. Our laboratory staff could arrange the correct information about some of the patients admitted in the wards through their painstaking efforts. This leads to loss of precious time and is a laborintensive activity. The same protocol could not be followed for the OPD patients as it was virtually impossible to ascertain the patient/test information from either the clinicians or the patients. We followed a different protocol for these patients. The requisition slips, with an appropriate note citing reasons for
sample rejection, were dispatched to the OPD for the clinicians' knowledge. Those tests were repeated with fresh samples and new requisition slips as and when the patients revisited the hospital for checkup. This is definitely inconvenient for patients, who have to undergo the same process of registration and consequent sampling. Such errors can be completely wiped out by persistence by the laboratories for complete information and sincere efforts by the clinicians to provide the same. This will facilitate speedy sample processing and report dispatch to the patients to initiate therapeutic interventions at the earliest. 15, 16
Lipemia accounted for rejection of 0.10 % and 0.019 % of the samples in the inpatient and outpatient departments respectively. Lipemic samples can arise due to collection after heavy meals or the presence of some metabolic disorder (hyperlipoproteinemias). This can be avoided by sample collection, preferably after an overnight fast. If the patient has a metabolic disorder, the same must be mentioned in the requisition slip. Lipemia interferes with optical reading by the instrument and can affect interpretation of electrolyte values. A higher incidence of lipemia in OPD patients may be due to non-dissemination of information regarding prior preparation to the patients by the clinicians as well as non-compliance and/or miscomprehension of preparation rules by the patients. Hence, many patients give samples in non-fasting states leading to erroneous reporting. It is the responsibility of the clinicians and the phlebotomists to ensure that proper patient preparation is instituted before sample collection. 17
These data are comparable to those provided by other investigators, which confirm that problems directly related to specimen collection are the main cause of pre-analytic errors, especially hemolyzed, clotted, insufficient, and incorrect samples. 16, 17
With the exclusive use of vacutainers, the frequency of errors found in our study is 1.62 %. It is clear from the above discussion that incorrect phlebotomy practices are the main reason behind pre-analytical errors. The reason for incorrect phlebotomy practice includes lack of awareness or possibly a heavy workload. This is the reason phlebotomy has been considered a separate area of improvement for medical technicians in developed Countries. Those of us in developing nations must adopt a similar approach toward phlebotomy and initiate steps for the inculcation of ideal phlebotomy practices among health care workers. 17, 18
CONCLUSIONS
The concept of total quality management encompasses all the steps involved in sample processing, beginning from test ordering to the final interpretation of results by the clinicians to reduce or eliminate the errors that may arise during the various steps. The promotion of ideal phlebotomy practices and sample transport procedures is a pre-requisite for the efficacy of
Laboratory functioning. The dependence on accurate laboratory results for diagnostics makes it mandatory for labs to ensure accountability and accuracy of results to negate incorrect diagnosis as a consequence of faulty reporting. A practice of keeping a record of the errors at all stages of analysis and then devising corrective strategies for their prevention can gradually free a laboratory from such errors.
Errors in the laboratory can lead to inaccurate reports dispatched to clinicians, affecting health care services greatly. Ensuring the credibility of results is of utmost importance. While many clinicians probably believe that most errors in the laboratory are analytical, there are data showing that the pre-analytical and postanalytical phases are the greatest contributors to laboratory mistakes.
Though it is impossible to completely eliminate errors, it is possible to reduce them. We conclude that training of phlebotomists and technicians, bar coding of samples, implementation of a LIS, adoption of standardized procedures along with participation in external quality assessment programs and accreditation schemes can help to reduce laboratory errors to a minimum.
To attain this goal, we first implemented a continued education program, financed by our Regional Health Service and focused in Primary Care Nurses.
REFERENCES
1. Ranjna Chawla, PhD, Binita Goswami, MD, DNB, Devika Tayal, MD, V Mallika, MD.Identification of the Types of Preanalytical Errors in the Clinical Chemistry Laboratory: 1Year Study at G.B. Pant Hospital. LAB MED. 2010; 41: 89-92.
2. Plebani M, Carraro P. The detection and prevention of errors in laboratory medicine Ann Clin Biochem. 2010; 47: 101-110.
3. Robert Hawkins Managing the Pre- and Postanalytical Phases of the Total Testing Process. Ann Lab Med. 2012; 32: 5-16.
4. Mai M,H. Mansour, Hassan M. E, Azzazy, Steven C. Correction Factors for Estimating Potassium Concentrations in Samples With In Vitro Hemolysis.Clin Chem. 2010; 46: 306–307.
5. Characterization and mathematical correction of hemolysis interference in selected Hitachi 717 assays. Arch Pathol Lab Med. 2010; 133:960–966.
6. Jones BA, Calam RR, Howanitz PJ Chemistry specimen acceptability: A College of American Pathologists Q-Probes study of 453 laboratories. Arch Pathol Lab Med. 2011; 121:19–26.
7. Romero A, Munoz M, Ramos JR, et al. Identification of preanalytical mistakes in the stat section of the clinical laboratory. Clin Chem Lab Med. 2010; 43:974–975.
8. Jones BA, Meier F, Howanitz PJ .Complete blood count specimen acceptability: A College of American Pathologists Q-Probes study of 703 laboratories. Arch Pathol Lab Med. 2012; 119: 203–208.
9. Fidler JR. Task analysis revisited: Refining the phlebotomy technician scope of practice and assessing longitudinal change in competencies. Eval Health Prof. 2007; 30:150–169.
10. Lippi G, Blanckaert N, Bonini P, et al. Causes, consequences, detection and prevention of identification errors in laboratory diagnostics. Clin Chem Lab Med. 2011; 47:143– 153.
11. Goldschmit HMJ, Lent RW. Gross errors and work flow analysis in the clinical laboratory. Klin Biochem Metab 2010; 3:131-140.
12. Lapworth R, Teal TK. Laboratory blunders revisited. Ann C Biochem 2010; 31:78-84.
13. Plebani M, Carraro P. Mistakes in a stat laboratory: type frequency. Clin Chem 2009; 43: 1348-1351.
14. Stahl M, Lund ED, Brandslund I. Reasons for a laboratory's inability to report results for
requested analytical tests. Clin Chem 2012; 44:2195-2197.
15. Nutting PA, Main DS, Fischer PM, Stull TM, Pontious M, Seifert M, et al. Problems in laboratory testing in primary care. JAMA 2006; 275:635-639.
16. M. Pleban The detection and prevention of errors in laboratory medicin Ann Clin Biochem, 2010; 47: 101 - 110.
17. Ranjan and Binita. Do we know what inappropriate laboratory utilization is? A systematic review of laboratory clinical audits. JAMA 2011; 280: 550-558.
18. Romero and Cobos. The need for an outcomes research agenda for clinical laboratory testing. JAMA 2010; 280: 565-566.
AUTHORS
Dr. Jahangir Sultan Assistant Professor Pathology Chemical Section Continental Medical College Lahore, Pakistan
Dr. Tariq Afzal
Assistant Professor Pathology Sargodha Medical College, Sargodha, Pakistan
Dr. Kokab Jabeen
Assistant Professor Pathology Microbiology section Continental Medical College, Lahore, Pakistan
Submitted for Publication: 27-03-2013
Accepted for Publication: 03-10-2013
After minor revisions
</text>
|
[
{
"content": "<url>\nhttp://apmc.com.pk/Download/APMC/apmc_v7n1/19-%20Identification%20of%20the%20Types%20of%20Pre-analytical%20Errors%20in%20the%20Clinical%20Chemistry%20Laboratory%20from%20Jan-2012%20to%20Dec-2012%20at%20Jinnah%20Hospital%2C%20Pathology%20Department.doc.pdf\n</url>\n<text>\nIdentification of the Types of Pre-analytical Errors in the Clinical Chemistry Laboratory from Jan-2012 to Dec-2012 at Jinnah Hospital, Pathology Department\n\nJahangir Sultan, Tariq Afzal, Kokab Jabeen\n\nABSTRACT\n\nObjective: To evaluate the leading causes of preanalytical errors in a clinical chemistry laboratory. Methods: A retrospective analysis of the results obtained from the clinical chemistry laboratory for errors in the pre-analytical phase has been carried out to summarize data regarding the frequency of the main factors affecting the pre-analytical quality of results. Laboratory personnel were asked to register rejections, and causes for rejection of ward as well as out-patient samples collected in\n\nINTRODUCTION\n\nModern day diagnosis is heavily dependent upon reliable laboratory data. It is therefore pertinent to ensure credibility of the results emanating from the clinical laboratories. Remarkable advances in automation, sample collection, transport, and dispatch of reports have led to a drastic improvement in the performance of these laboratories. But there is long path to tread before we achieve 100% accuracy and precision. Errors arising during sample processing are classified into pre-analytical, analytical, and postanalytical, depending upon their source and time of presentation respectively. The pre-and post-analytical phases of the process account for 93% of errors. 1 The pre-analytical phase comprises all of the processes\n\nCorresponding Author\n\nDr. Jahangir Sultan\nAssistant Professor Pathology\n\nChemical Section\n\nContinental Medical\n\nCollege,\n\nPakistan\nE-mail: [email protected]\n\nA.P.M.C Vol: 7 No. 1 January-June 2013\n\nLahore, the laboratory. Results: Of the 1,54,554 tubes received during the data collection period, 2505 samples were found unsuitable for further processing. This accounted for 1.52% of all samples collected in the laboratory. Rejections arose as a result of the following reasons: 0.48 % were rejected due to hemolysis; 0.92 % were specimens without proper requisition slips; and 0.14 % had insufficient sample quantity. Conclusion: Of all the samples received in the lab, the overall percentage of rejection is 1.62%.\n\noccurring before the sample is processed in the auto analyzer. 2 These include inappropriate tests that have been ordered, improper sample collection, transport delays, and illegible handwriting on requisition slips. 3,4 Although these areas are beyond the jurisdiction of the clinical laboratory per se, the credibility of 5,6,7 The labs have to bear the burden of the inconsistencies or the labs is at stake due to these errors. incorrect reporting that can ensue because of these preanalytical errors. 8,9\n\nThe goal of the present paper is to enumerate and analyze the prevalence of different pre-analytical errors that surfaced during sample processing in the clinical biochemistry department during a 1-year period.\n\nJinnah Hospital is a tertiary care super specialty center in Lahore specializing in cardiology, cardiothoracic surgery, neurology, neurosurgery, gastroenterology, gastro surgery, and psychiatry. Jinnah Hospital is a teaching hospital as well. With 1416 students studying to be doctors at Allama Iqbal Medical College and learning practical procedures at Jinnah Hospital, over 7,000 doctors have graduated from here over the last ten years.\n\nIt is a 1250-bed hospital offering specialized medical and surgical treatment to about an average of patients 700,000 visit the Out-Patient and Emergency Department every year, where 70% of the treatment is given completely free. Every year more than 1,500,000 tests are carried out in Pathology Laboratory\n\nThe clinical biochemistry department is equipped with a state-of-the-art autoanalyzer with ISE– Beckman Coulter CX9PRO Clinical System (Hamburg, Germany), electrolyte Plus analyzer–\n\nNa/K/Cl,ABG Nova biochemical Analyser, and other ancillaries for sample processing. Inpatient phlebotomies are performed by clinical department staff, whereas blood specimens from outpatients are collected on site at a centralized collection center by laboratory personnel. The samples are delivered to the lab by the paramedical staff from the wards and laboratory support staff from the OPD respectively.\n\nREVIEW OF THE LITERATURE ON LABORATORY ERRORS\n\n| Sector of the laboratory | Lapworth and Teal.12 | Goldschmidt and Lent. 11 | M.Pleban.15 | Plebani and Carro.16 | Stahl M et al.14 | Jahangir Kokab and Tariq | Ranjan and Binita.17 |\n|---|---|---|---|---|---|---|---|\n| Sector of the laboratory | Clinical chemistry | Whole laboratory | Primary care. | Stat laboratory | Whole laboratory | Clinical chemistry | Clinical chemistry |\n| Data collection period | 1 year | 6 year | 6 month | 6 month | 3 year | 1 year | 1 year |\n| No of Patients | 997000 | ND | 160714 | ND | ND | 154554 | 96328 |\n| No of errors | 120 | 123 | 180 | 189 | 4135 | 2505 | 736 |\n| Frequency | | | | 0.47 % of patients | 0.61% of patients | 1. 6% of patients | 1.5 %.of patients |\n| Pre-analytical phase | 31.6% | 53% | 55% | 55.65 | 68.2% | 0.05% | |\n\nMATERIALS AND METHODS\n\nA total of 1,54554 samples from the outpatient department and in-house patients were received by our clinical chemistry laboratory during the period from January 2012 to December 2012. Out of these, 97,185 samples were collected from the patients admitted in the wards and 57,369 samples were collected in the outpatient department. The samples are collected using evacuated tubes (vacutainers evacuated tubes from BD (Franklin Lakes, NJ). The lab provides routine and reference testing in biochemistry. Upon receiving the samples, the lab supervisor visually detects any problems. When an error occurs, entries are made in the problem notification log book. The data generated is reviewed on a weekly basis. The data collection procedure involved review of blood samples received from the inpatient as well as outpatient departments. Venous blood samples are considered unsuitable according to the following accepted criteria: inappropriate volume, wrong or missing patient identification, inappropriate container, visible hemolysis after centrifugation, and lipemic samples. The pre-analytical variables evaluated included all the criteria mentioned above for sample rejection as well as incomplete/incorrect patient details and illegible handwriting.\n\nRESULTS\n\nWe will first discuss the findings of the routine samples obtained from the inpatients in our hospital. Out of the 97,185 blood collection tubes screened over a period of 1 year, pre-analytical errors were observed in 1626 samples, which is approximately 1.6 % of the total number of samples received. The distribution of the different types of errors was then calculated (Table\n\n1). The majority of the rejected samples were hemolyzed. Hemolysis was responsible for rejection of 692 samples, which accounts for 0.71% of the total number of samples received during this period. The amount of blood was insufficient for complete analysis in 0.15 % (i.e., 144out of the 97,185samples).\n\nA total of 687 samples were accompanied by inappropriate slips (i.e., wrong requisition slip, without requisition slip, central registration number ward not mentioned). This comprised approximately 0.70 % of all the samples received by the laboratory. Out of these 203 samples, laboratory personnel managed to ascertain correct patient data in 153 cases, and hence reporting was completed successfully for these patients. Fifty samples could not be processed even after elaborate and painstaking efforts by the laboratory staff. Gross lipemia led to rejection of 103samples (0.10 %).\n\nSimilarly, we evaluated the slips obtained from the outpatient department. A total of 57,369 samples were received for processing from our OPD. Out of these, the number of pre-analytical errors documented was 879. This constitutes an error rate of 1.5 %. The distribution of the various pre-analytical variables is depicted in (Table 2). The most frequent error encountered during processing was sample with insufficient information (wrong vial/wrong slip). This constitutes an error rate of 1.28% this led to rejection of 738 samples out 57369 samples. The insufficient volume with an incidence of 0.13 %. Hemolysis, which constituted the most frequent pre-analytical error observed during sample processing of admitted patients, contributed to the rejection of 0.09 % of the samples in OPD as compared to 0.71% in the previous case.\n\nTable-1 Frequency of the Different Preanalytical Errors Observed in a Total of 97,185 Routine Inpatient Samples\n\n| 01 | Insufficient volume |\n|---|---|\n| 02 | Hemolysis |\n| 03 | Sample with insufficient information (wrong vial/wrong slip) |\n| 04 | Lipemic samples |\n\nTable-2 Preanalytical Errors Observed in a Total of 57,369 Outpatient Samples\n\n| 01 | Insufficient volume | 75(0.13 %) |\n|---|---|---|\n| 02 | Hemolysis | 55(0.09 %) |\n| 03 | Sample with insufficient information (wrong vial/wrong slip) | 738(1.28 %) |\n| 04 | Lipemic samples | 11(0.019%) |\n\nDISCUSSION\n\nAdvances in science and technology have led to many path-breaking innovations that have transformed laboratory diagnostics from manual, cumbersome testing methods to fully automated science, ensuring accuracy and speed. 1, 2 However, the laboratory cannot function in isolation. It is dependent upon other departments; mainly the clinical division for properly filled requisition slips and samples for analysis. 1, 2Mounting evidence indicates that reliability cannot be achieved in a clinical laboratory through the mere promotion of accuracy in the analytical phase of the testing process. 3\n\nIt is evident that the majority of all errors in the total testing processing are of pre-analytical origin, i.e. they occur before the sample arrives in the laboratory and the phase after the sample is analyzed (post-analytical) are equally important. 4 The pre-analytical phase is riddled with many shortcomings ranging from lax attitude about filling the requisition slips to the staff's lack of education about ideal phlebotomy procedures. The health care system must be more diligent in applying scientific knowledge to reduce the errors in this phase. This is imperative to curtail the dent on laboratory services that arise due to human errors.\n\nThere has been varied information on the error rate within the whole lab testing procedure (0.1% to 9.3%). Plebani and Carraro observed in their paper that the great majority of errors result from problems in the pre-analytical or post-analytical phases. 5\n\nPre-analytical errors are largely attributable to human mistakes and the majority of these errors are preventable. 15 This is understandable, since the preanalytical phase involves much more human handling, compared to the analytical and post-analytical phases. 6 Hemolysis accounted for the majority of rejections in our study. The introduction of vacuum tubes along\n\nwith the closed system of blood collection has made blood collection efficient and easy. But lack of staff training engaged in phlebotomy is an impediment for expediting sample collection and transport. Hemolysis of samples occurs when blood is forced through a fine needle, shaking the tubes vigorously, and centrifuging the sample specimens before clotting is complete. 7 Red top vacutainers without any anticoagulant should not be shaken after the sample has been collected, and vacutainers for plasma should be gently inverted a few times so the anticoagulant mixes with the blood.\n\nFreezing and thawing of blood specimens may cause massive hemolysis. In a study by Jay and colleagues, the majority of hemolyzed samples (>95%) could be attributed to in vitro processes resulting from incorrect sampling procedure or transportation. 8 Hemolysis leads to the extravasation of intracellular contents into the plasma, leading to false high values of potassium and intracellular enzymes such as SGOT and LDH. It also leads to a prolongated turn around time (TAT) due to the need for fresh samples for processing the request. 9 The frequency of hemolysis was more in the samples that were collected from the admitted patients as compared to the patients attending the OPDs (0.71% as compared to 0.09 %). One plausible explanation for this phenomenon could be the systematic blood collection technique followed by the laboratory staff in the OPD. 10 As a part of our endeavor to achieve accreditation for our laboratory services; we carry out regular in-house training sessions for our technicians to familiarize them with the standard protocols for sample processing. For this purpose, we have developed standard operating procedures (SOPs) for the different steps involved in ideal laboratory operations and ethics. Such training has facilitated in the adoption of ideal phlebotomy practices by our laboratory personnel. The samples are thereby transported to our laboratory from the collection center by our staff following the basic precautions that must be adhered to during transportation. There is an urgent need to instill awareness about the intricacies of a seemingly \"easy and basic\" activity that forms the mainstay of laboratory services - phlebotomy among the staff engaged in sample collection in our hospitals to reduce inadvertent hemolysis. 11\n\nAnother factor leading to rejection of blood samples in Our study was insufficient blood volume. Every analytical process requires a fixed volume of serum/plasma for analysis. The main reasons behind this anomaly are ignorance of the phlebotomists, difficult sampling as in pediatric patients, patients with chroni<cursor_is_here> Insufficient sample volume constituted the most frequent cause of test rejection in the samples collected in the OPD (1.28%). 12\n\nInpatient sampling with a frequency of 0.15 % for inadequate volume only. The difference is striking. This may be attributed to a number of factors. We have a centralized collection center where samples for clinical biochemistry, hematology, microbiology, and gastroenterology are collected simultaneously. 13 Due to the paucity of man power; the ratio of patients to phlebotomists is disproportionate, making sample collection difficult. This may hamper proper sample collection, leading to inadequate collection. The collection is carried out during fixed hours. Hence, this patient load combined with shortage of time may adversely affect proper sample collection in the OPD setting. Difficult sampling and patient non-compliance further aggravates this problem. Nevertheless, it is mandatory for the laboratory staff to practice a certain basic level of workmanship and skillful phlebotomy techniques to reduce such errors to a minimum. 14\n\nA total of 0.70 % samples in the wards were accompanied by inappropriate requisition slips. The same figure for OPD samples was1.28 %. It has been observed that the clinicians often send incomplete slips with the samples. This could be due to excessive patient load or lack of awareness regarding patient information. Modern day diagnostics is not merely sample processing and preparation of reports. The laboratories are actively involved in disseminating information about critical results to clinicians so corrective measures can be initiated at the earliest. Incomplete/wrong patient information makes the practice redundant. Our laboratory staff could arrange the correct information about some of the patients admitted in the wards through their painstaking efforts. This leads to loss of precious time and is a laborintensive activity. The same protocol could not be followed for the OPD patients as it was virtually impossible to ascertain the patient/test information from either the clinicians or the patients. We followed a different protocol for these patients. The requisition slips, with an appropriate note citing reasons for\n\nsample rejection, were dispatched to the OPD for the clinicians' knowledge. Those tests were repeated with fresh samples and new requisition slips as and when the patients revisited the hospital for checkup. This is definitely inconvenient for patients, who have to undergo the same process of registration and consequent sampling. Such errors can be completely wiped out by persistence by the laboratories for complete information and sincere efforts by the clinicians to provide the same. This will facilitate speedy sample processing and report dispatch to the patients to initiate therapeutic interventions at the earliest. 15, 16\n\nLipemia accounted for rejection of 0.10 % and 0.019 % of the samples in the inpatient and outpatient departments respectively. Lipemic samples can arise due to collection after heavy meals or the presence of some metabolic disorder (hyperlipoproteinemias). This can be avoided by sample collection, preferably after an overnight fast. If the patient has a metabolic disorder, the same must be mentioned in the requisition slip. Lipemia interferes with optical reading by the instrument and can affect interpretation of electrolyte values. A higher incidence of lipemia in OPD patients may be due to non-dissemination of information regarding prior preparation to the patients by the clinicians as well as non-compliance and/or miscomprehension of preparation rules by the patients. Hence, many patients give samples in non-fasting states leading to erroneous reporting. It is the responsibility of the clinicians and the phlebotomists to ensure that proper patient preparation is instituted before sample collection. 17\n\nThese data are comparable to those provided by other investigators, which confirm that problems directly related to specimen collection are the main cause of pre-analytic errors, especially hemolyzed, clotted, insufficient, and incorrect samples. 16, 17\n\nWith the exclusive use of vacutainers, the frequency of errors found in our study is 1.62 %. It is clear from the above discussion that incorrect phlebotomy practices are the main reason behind pre-analytical errors. The reason for incorrect phlebotomy practice includes lack of awareness or possibly a heavy workload. This is the reason phlebotomy has been considered a separate area of improvement for medical technicians in developed Countries. Those of us in developing nations must adopt a similar approach toward phlebotomy and initiate steps for the inculcation of ideal phlebotomy practices among health care workers. 17, 18\n\nCONCLUSIONS\n\nThe concept of total quality management encompasses all the steps involved in sample processing, beginning from test ordering to the final interpretation of results by the clinicians to reduce or eliminate the errors that may arise during the various steps. The promotion of ideal phlebotomy practices and sample transport procedures is a pre-requisite for the efficacy of\n\nLaboratory functioning. The dependence on accurate laboratory results for diagnostics makes it mandatory for labs to ensure accountability and accuracy of results to negate incorrect diagnosis as a consequence of faulty reporting. A practice of keeping a record of the errors at all stages of analysis and then devising corrective strategies for their prevention can gradually free a laboratory from such errors.\n\nErrors in the laboratory can lead to inaccurate reports dispatched to clinicians, affecting health care services greatly. Ensuring the credibility of results is of utmost importance. While many clinicians probably believe that most errors in the laboratory are analytical, there are data showing that the pre-analytical and postanalytical phases are the greatest contributors to laboratory mistakes.\n\nThough it is impossible to completely eliminate errors, it is possible to reduce them. We conclude that training of phlebotomists and technicians, bar coding of samples, implementation of a LIS, adoption of standardized procedures along with participation in external quality assessment programs and accreditation schemes can help to reduce laboratory errors to a minimum.\n\nTo attain this goal, we first implemented a continued education program, financed by our Regional Health Service and focused in Primary Care Nurses.\n\nREFERENCES\n\n1. Ranjna Chawla, PhD, Binita Goswami, MD, DNB, Devika Tayal, MD, V Mallika, MD.Identification of the Types of Preanalytical Errors in the Clinical Chemistry Laboratory: 1Year Study at G.B. Pant Hospital. LAB MED. 2010; 41: 89-92.\n\n2. Plebani M, Carraro P. The detection and prevention of errors in laboratory medicine Ann Clin Biochem. 2010; 47: 101-110.\n3. Robert Hawkins Managing the Pre- and Postanalytical Phases of the Total Testing Process. Ann Lab Med. 2012; 32: 5-16.\n4. Mai M,H. Mansour, Hassan M. E, Azzazy, Steven C. Correction Factors for Estimating Potassium Concentrations in Samples With In Vitro Hemolysis.Clin Chem. 2010; 46: 306–307.\n5. Characterization and mathematical correction of hemolysis interference in selected Hitachi 717 assays. Arch Pathol Lab Med. 2010; 133:960–966.\n6. Jones BA, Calam RR, Howanitz PJ Chemistry specimen acceptability: A College of American Pathologists Q-Probes study of 453 laboratories. Arch Pathol Lab Med. 2011; 121:19–26.\n7. Romero A, Munoz M, Ramos JR, et al. Identification of preanalytical mistakes in the stat section of the clinical laboratory. Clin Chem Lab Med. 2010; 43:974–975.\n8. Jones BA, Meier F, Howanitz PJ .Complete blood count specimen acceptability: A College of American Pathologists Q-Probes study of 703 laboratories. Arch Pathol Lab Med. 2012; 119: 203–208.\n9. Fidler JR. Task analysis revisited: Refining the phlebotomy technician scope of practice and assessing longitudinal change in competencies. Eval Health Prof. 2007; 30:150–169.\n10. Lippi G, Blanckaert N, Bonini P, et al. Causes, consequences, detection and prevention of identification errors in laboratory diagnostics. Clin Chem Lab Med. 2011; 47:143– 153.\n11. Goldschmit HMJ, Lent RW. Gross errors and work flow analysis in the clinical laboratory. Klin Biochem Metab 2010; 3:131-140.\n12. Lapworth R, Teal TK. Laboratory blunders revisited. Ann C Biochem 2010; 31:78-84.\n13. Plebani M, Carraro P. Mistakes in a stat laboratory: type frequency. Clin Chem 2009; 43: 1348-1351.\n14. Stahl M, Lund ED, Brandslund I. Reasons for a laboratory's inability to report results for\nrequested analytical tests. Clin Chem 2012; 44:2195-2197.\n15. Nutting PA, Main DS, Fischer PM, Stull TM, Pontious M, Seifert M, et al. Problems in laboratory testing in primary care. JAMA 2006; 275:635-639.\n16. M. Pleban The detection and prevention of errors in laboratory medicin Ann Clin Biochem, 2010; 47: 101 - 110.\n17. Ranjan and Binita. Do we know what inappropriate laboratory utilization is? A systematic review of laboratory clinical audits. JAMA 2011; 280: 550-558.\n18. Romero and Cobos. The need for an outcomes research agenda for clinical laboratory testing. JAMA 2010; 280: 565-566.\n\nAUTHORS\n\nDr. Jahangir Sultan Assistant Professor Pathology Chemical Section Continental Medical College Lahore, Pakistan\n\nDr. Tariq Afzal\n\nAssistant Professor Pathology Sargodha Medical College, Sargodha, Pakistan\n\nDr. Kokab Jabeen\n\nAssistant Professor Pathology Microbiology section Continental Medical College, Lahore, Pakistan\n\nSubmitted for Publication: 27-03-2013\n\nAccepted for Publication: 03-10-2013\n\nAfter minor revisions\n</text>\n",
"role": "user"
},
{
"content": "c, debilitating diseases, and patients on chemotherapy whose thin veins are difficult to localize.",
"role": "assistant"
}
] |
Afghanistan: The detention centre for teenage Taliban members
By Secunder Kermani BBC News, Kabul
* 21 April 2020
Media caption"I was with the Taliban for one year"
In a dusty courtyard, behind a tall mesh fence, a group of teenagers are playing a frenetic game of football, while others stand around watching from the sidelines.
These are some of Afghanistan's most vulnerable and most troubled children. Inmates of Kabul's Juvenile Rehabilitation Centre.
A small, excited crowd of boys press their faces up to the fence to talk to us.
"Some of us killed people… some of us are thieves," one lanky teenager tells me when I ask what they are accused of.
They're smiling and laughing but they aren't the most serious cases here. The centre generally holds approximately 300 inmates, aged between 12 and 18. On average, around half are accused of being in militant groups: the Islamic State (IS) or the Taliban.
The Taliban control or contest around half of Afghanistan, they've been waging a deadly war against the Afghan government and US-led international forces since being overthrown in 2001.
The staff try and keep the categories of detainees separate, to avoid fights between those linked to the Taliban and to the Islamic State group - which have clashed with each other in the outside world - and to prevent the boys accused of "general crimes" from becoming radicalised.
The boys talking to me in the courtyard all live on the ground floor of the bright green accommodation block. The Taliban and IS members are held in the two floors above them.
"They're terrorists, we are not," says one dismissively.
'Kill to survive'
The BBC was given rare access to the centre, surrounded by high concrete walls, with watchtowers and armed guards dotted around the periphery. In a quiet corner, a social worker introduces us to three alleged IS members. The group is newer, and far less powerful in Afghanistan than the Taliban, but has been responsible for dozens of deadly suicide bombings.
One, wearing an electric blue salwar kameez, and with a glare in his eyes, claims he was wrongly arrested. Many of the boys in the centre are wary about revealing their past activities, even though we are keeping their identities anonymous. Nevertheless, he gradually opens up about his extreme views.
"The foreigners haven't done anything wrong to me, but the Prophet has said jihad against them must continue until the Day of Judgement."
The extent of his radicalisation becomes even clearer as he explains why he hates the Afghan government - allied to US-led international forces.
"This is an Islamic country, but look at Kabul, it's full of brothels. There is so much adultery and homosexuality. There are musicians and, god forbid, there are even people having sex with their own mothers and sisters."
* Block Six: The prison wing which holds 2,000 Taliban
* Who are the Taliban?
* A month of killing in Afghanistan
He's from a province in the east of the country, and his description of the Afghan capital Kabul as a pit of debauchery bears no resemblance to reality. Yet it's clear it's something he deeply believes.
At the same time, there's a softer side to him too. Despite only having the beginnings of a beard growing on his face, he's a father to a one-year-old girl.
"I don't want her to see me here, she will cry," he says.
As the interview ends and we walk off, we pass the cells of the accommodation block. In one, a group of boys are dangling their legs out between the blue metal bars of the window, singing a song and hammering out a beat on a small plastic jug.
They giggle as they tell me the song is about "love", but I notice many of them have tattoos scratched onto their wrists, arms or ankles.
Some are crude images of guns or daggers, one - in Persian - reads "have a bad life, and an even worse future"; another, "kill to survive".
Kabul suffers from high levels of crime, with kidnappings and violent robberies common. Unemployment amongst young people is at more than 30% according to the World Bank.
"Kill to survive?" I ask. "Is that what you feel life is like?"
The mood has momentarily grown more serious.
"If you work as a labourer you only earn 200 Afghani (£2) a day, how can you feed your family?" one asks. "You have to steal and rob."
Then, another strikes up his song again, and we leave them giggling in their cell.
'I will join the Taliban again'
The following day, we meet a dizzying stream of boys, an IS recruit who joined up after seeing their propaganda on social media, a 17-year-old Taliban fighter who smilingly asserts that he has killed "lots" of American soldiers - a claim that's almost definitely not true.
One of the boys that stands out is Zakir, a tall, gangly 14-year-old. He looks like a rather dopey teenager, whose deep voice seems too old for his youthful face. But he's proud of his links to the Taliban.
"My job was to plant explosives," he tells me. "The Taliban used to come to the village at night time and I would give them reports about what was going on."
Zakir says he joined the group after seeing "how they prayed and looked after people" when visiting relatives in areas under their control, and watching Taliban propaganda videos.
He tells me he joined "secretly" and that his family never knew. In fact, his father and elder brother were fighting on the other side of the conflict, as members of the Afghan intelligence services.
Was he never worried the explosives he planted could end up killing his own father? He insisted he operated in areas his father never visited, targeting instead local pro government militias who he accused of "raping and stealing".
Zakir, like many of the boys, seemed to have a good relationship with the staff at the centre. But he was clear that he wanted to join the Taliban again.
"Here, we pray five times a day, and have lessons. But when I'm free I will look after my parents, and then I will join the Taliban again. They are fighting for the truth."
Some of his words sounded as if they were copied from propaganda videos. But there were also glimpses of how child-like he was.
What would he do if his parents forbade him from rejoining the Taliban?
"Then I won't… but when they die, I will."
Fighting back
The staff try to deradicalise the boys. There's a school in the centre, with lessons taking place behind thick metal doors, in what used to be cells.
One of the most popular subjects is Islamic studies.
Mubashir Nazari is a heavy set man, with a cropped beard. He's leading a class of around 25 boys - many accused of being in the Taliban or IS - who are reciting Quranic verses.
He admits it's not easy to change their minds, but says the lessons do make a difference.
"When they first come to the centre, and they hear that there's been a suicide attack in Kabul, they are happy and say, 'do you see how many people we have killed? This is jihad'.
"Then we ask them, 'what is the sin of those children killed in the blast? Or the people just going to work?'. And we say, 'where in Islam does it permit you to kill innocent people?'. By the end, when they hear of a suicide attack they get upset."
* We embraced - but I'd still kill him
* The Afghan women determined not to lose out
* Why Afghanistan is so dangerous
There are also lessons in academic subjects, with basic literacy taught for those who have never been to school before.
Abdullah, a slim 16-year-old, with bright eyes, and a small traditional cap perched atop his head, tells me he spent two months with the Taliban, and was arrested on his way to a shootout between the group and security forces in western Afghanistan.
He was inspired to sign up when he and his friends began attending a madrassa, or religious school, in his area, which was under the control of the Taliban.
"The preacher said it's your duty to fight and die in the name of Allah," he says.
But now, Abdullah is one of the centre's best students, despite having little to no formal education in the past.
"I'm in Class 10, and waiting for my results so I can move into Class 11," he says with pride. "The Taliban just put ammunition in your hand and tell you to fight, but when I am released from here I want to keep studying."
Traumatised
For staff trying to form relationships with boys like Abdullah, one of the biggest problems is the high turn-over in inmates.
Detainees are regularly released or transferred, whilst there's a constant stream of fresh arrivals.
One morning, we watch as the intelligence services drop off a small boy, his head shaved, wrists still in handcuffs.
He looks extremely nervous as he's taken to the medical centre to be registered. In an almost inaudible voice, he tells them he's suffering from psychological problems.
The doctor taking down his details says mental health issues are common.
He tells me he often sees boys who have self harmed, cutting their bodies or faces.
"Every week there's two or three cases…. They do it with whatever they can find
- pieces of glass or metal."
"I think almost all of them have gone through something traumatic and haven't had the ability to process it, so their response to it is fighting," Lyla Schwartz, a foreign psychologist with the Etidal Foundation, explains. "Finding something to be a part of in order to get their anger and frustration out, instead of actually acknowledge how much loss they've experienced."
Media captionSecunder Kermani reports from one of the country's busiest hospitals in the southern city of Kandahar
Ms Schwartz tries to get the boys to address their underlying trauma, but she's stretched for time.
"We always address the crises first - suicide attempts, fighting, riots - but there are some kids that we really have built relationships with. If we had the support and resources, we could go more in depth."
'Killing children'
Fourteen-year-old Mohammad looks particularly nervous
He led a small group of friends running away from an IS camp they were forced into, and is worried about other boys - with extremist views - overhearing us.
His parents both died, and he ended up in the care of his sister and his brother-inlaw. The brother-in-law joined IS, and took Mohammad with him to the group's stronghold in the east of Afghanistan.
There, he enrolled him in a madrassa.
"They pretend to be good Muslims," he says, "but they are not doing good things."
"Like what?" I ask.
"Killing children," he replies. It's not clear what he witnessed himself, and what he's simply heard about - he doesn't want to go into details - but later in the conversation, he again refers to IS "killing kids".
Mohammed says he tried to run away with a handful of others. "But we were arrested by IS and put in jail… They beat us and said, 'you want to join the infidels'."
When they could, they tried to escape again.
"We knew if we were discovered we would be killed… We walked all night through the hills and the next day we handed ourselves in."
But while Mohammad is relieved he's no longer in the madrassa, he's frustrated that he's being kept in the detention centre. "We thought we would go home, but instead they put us here."
'My father was wrong'
Aside from lessons in the morning, and a short period in the courtyard, the boys spend their days in their rooms.
Zakir, the 14-year-old Taliban member, shares his cell with nine others, all accused of being in the militant group.
Their favourite pastime? Beadwork.
Zakir shows me a tiny pair of sandals he's made for his younger sister, using red and white beads that are stuck together, others have decorated pens or made prayer beads for their parents.
I use the opportunity to ask Zakir more about life growing up in a warzone.
"I've been seeing dead bodies ever since I can remember," he tells me in a flat tone.
* The woman who negotiated with the Taliban
* The Afghan war: The long and the short story
* What would peace in Afghanistan look like
* What will the Taliban do after signing the US deal?
One episode stands out for him. When he was eight, one of his friends was killed by his own parents, for getting involved with local criminals. It's a reminder that the violence in Afghanistan isn't just restricted to the war.
How and why Zakir ended up joining the Taliban is confusing.
His father, whilst working for the intelligence services, was injured in an attack by the group when Zakir was 13. He remembers his parents trying to hide the fact from him. "My father said he was bitten by a dog, but later on I found out that wasn't true."
But despite what happened to his father, Zakir says he began to support the Taliban. "I knew my father was in the wrong, for supporting the foreigners," he tells me.
One of the main reasons he joined the group, he says, was because he was being harassed by local pro-government militia forces.
"If you are dressed like a religious Muslim with a skullcap, they arrest you, beat you and humiliate you."
Once with the Taliban, he felt "safer".
"Before joining the Taliban, I would get upset when I was beaten and ask why is this happening to me? But when I was with the Taliban, it was better, because at least then there was reason - we were enemies."
It's hard to know if all that is true, but Zakir seems genuine. He's conflicted about what he wants to do with his future. He's "proud" of his time with the Taliban, but adds: "Perhaps I won't do it again, as there are other fighters… I want to continue my jihad, but not if my parents are unhappy."
The centre does try and prepare the boys for life on the outside - there's a tailoring workshop for example.
But once they've been released there's no system for checking up on them.
It's a source of frustration for Ms Schwartz.
"There are supposed to be social workers who follow up with them," she says, but security concerns make it difficult for that to happen. "Support, school, jobs, alternatives to what they've come from, is extremely lacking."
Justice Minister Abdul Baseer Anwar - who ultimately has control of the centre recognises the need to rehabilitate the boys. "The psychologists," he says, "are even more important than the clerics" in fighting against the "brainwashing" done by militants.
Mr Anwar adds that he's looking at introducing new regulations that would make it easier to help find the detainees stable jobs after release. He hopes the international community can help both with more funding and expertise.
'I'll slit your throat'
Abdullah, the former Taliban member who has excelled in his studies, is due for release and worries about what will happen next.
"I won't go back to my village," he tells me. "The Taliban would kill me."
But others in the centre show little sign of changing their views. On our final day, one peering out of the window of his cell on the third floor, points to me and runs his fingers across his neck.
"I'll slit your throat," he shouts down.
It's a reminder of the challenges faced by the Afghan authorities in reintegrating those with extremist views into the rest of society.
The Taliban and US signed an agreement in February aimed at beginning to bring an end to the conflict. In the next stage of the peace process, talks between the insurgents and the government about the future of the country are due to begin, though fighting between them continues.
The boys in the centre linked to the Taliban celebrated the deal as a victory, staying awake late at night offering special prayers. Many hope now to eventually be released as part of a prisoner exchange that belatedly began earlier this month, although both sides have accused each other of not fully abiding by its terms.
Zakir, with a mixture of stubbornness and innocence, insists that the war in Afghanistan will end when American troops leave as Afghans are all "brothers". But he acknowledges he wants the Taliban's interpretation of an Islamic state established in the country, despite the fact many other Afghans clearly don't. Other boys I speak to make clear they believe their "jihad" will continue until sharia law is established.
When we ask Zakir what he thinks about democracy, he's instantly dismissive.
"Nonsense," he replies.
All the teenagers' names have been changed
|
<urn:uuid:f49fb18e-6f70-4dcd-b506-d1d30dd6464c>
|
CC-MAIN-2020-40
|
https://dila.ph/AfghanistanThedetentioncentreforteenageTalibanmembersBBCNews.pdf
|
2020-09-28T18:16:27+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00261-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 341,916,077
| 3,534
|
eng_Latn
|
eng_Latn
| 0.999721
|
eng_Latn
| 0.999787
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1388,
2894,
4380,
6200,
7656,
9413,
10632,
11998,
13735,
15661,
16229
] |
Afghanistan: The detention centre for teenage Taliban members
By Secunder Kermani BBC News, Kabul
* 21 April 2020
Media caption"I was with the Taliban for one year"
In a dusty courtyard, behind a tall mesh fence, a group of teenagers are playing a frenetic game of football, while others stand around watching from the sidelines.
These are some of Afghanistan's most vulnerable and most troubled children. Inmates of Kabul's Juvenile Rehabilitation Centre.
A small, excited crowd of boys press their faces up to the fence to talk to us.
"Some of us killed people… some of us are thieves," one lanky teenager tells me when I ask what they are accused of.
They're smiling and laughing but they aren't the most serious cases here. The centre generally holds approximately 300 inmates, aged between 12 and 18. On average, around half are accused of being in militant groups: the Islamic State (IS) or the Taliban.
The Taliban control or contest around half of Afghanistan, they've been waging a deadly war against the Afghan government and US-led international forces since being overthrown in 2001.
The staff try and keep the categories of detainees separate, to avoid fights between those linked to the Taliban and to the Islamic State group - which have clashed with each other in the outside world - and to prevent the boys accused of "general crimes" from becoming radicalised.
The boys talking to me in the courtyard all live on the ground floor of the bright green accommodation block. The Taliban and IS members are held in the two floors above them.
"They're terrorists, we are not," says one dismissively.
'Kill to survive'
The BBC was given rare access to the centre, surrounded by high concrete walls, with watchtowers and armed guards dotted around the periphery. In a quiet corner, a social worker introduces us to three alleged IS members. The group is newer, and far less powerful in Afghanistan than the Taliban, but has been responsible for dozens of deadly suicide bombings.
One, wearing an electric blue salwar kameez, and with a glare in his eyes, claims he was wrongly arrested. Many of the boys in the centre are wary about revealing their past activities, even though we are keeping their identities anonymous. Nevertheless, he gradually opens up about his extreme views.
"The foreigners haven't done anything wrong to me, but the Prophet has said jihad against them must continue until the Day of Judgement."
The extent of his radicalisation becomes even clearer as he explains why he hates the Afghan government - allied to US-led international forces.
"This is an Islamic country, but look at Kabul, it's full of brothels. There is so much adultery and homosexuality. There are musicians and, god forbid, there are even people having sex with their own mothers and sisters."
* Block Six: The prison wing which holds 2,000 Taliban
* Who are the Taliban?
* A month of killing in Afghanistan
He's from a province in the east of the country, and his description of the Afghan capital Kabul as a pit of debauchery bears no resemblance to reality. Yet it's clear it's something he deeply believes.
At the same time, there's a softer side to him too. Despite only having the beginnings of a beard growing on his face, he's a father to a one-year-old girl.
"I don't want her to see me here, she will cry," he says.
As the interview ends and we walk off, we pass the cells of the accommodation block. In one, a group of boys are dangling their legs out between the blue metal bars of the window, singing a song and hammering out a beat on a small plastic jug.
They giggle as they tell me the song is about "love", but I notice many of them have tattoos scratched onto their wrists, arms or ankles.
Some are crude images of guns or daggers, one - in Persian - reads "have a bad life, and an even worse future"; another, "kill to survive".
Kabul suffers from high levels of crime, with kidnappings and violent robberies common. Unemployment amongst young people is at more than 30% according to the World Bank.
"Kill to survive?" I ask. "Is that what you feel life is like?"
The mood has momentarily grown more serious.
"If you work as a labourer you only earn 200 Afghani (£2) a day, how can you feed your family?" one asks. "You have to steal and rob."
Then, another strikes up his song again, and we leave them giggling in their cell.
'I will join the Taliban again'
The following day, we meet a dizzying stream of boys, an IS recruit who joined up after seeing their propaganda on social media, a 17-year-old Taliban fighter who smilingly asserts that he has killed "lots" of American soldiers - a claim that's almost definitely not true.
One of the boys that stands out is Zakir, a tall, gangly 14-year-old. He looks like a rather dopey teenager, whose deep voice seems too old for his youthful face. But he's proud of his links to the Taliban.
"My job was to plant explosives," he tells me. "The Taliban used to come to the village at night time and I would give them reports about what was going on."
Zakir says he joined the group after seeing "how they prayed and looked after people" when visiting relatives in areas under their control, and watching Taliban propaganda videos.
He tells me he joined "secretly" and that his family never knew. In fact, his father and elder brother were fighting on the other side of the conflict, as members of the Afghan intelligence services.
Was he never worried the explosives he planted could end up killing his own father? He insisted he operated in areas his father never visited, targeting instead local pro government militias who he accused of "raping and stealing".
Zakir, like many of the boys, seemed to have a good relationship with the staff at the centre. But he was clear that he wanted to join the Taliban again.
"Here, we pray five times a day, and have lessons. But when I'm free I will look after my parents, and then I will join the Taliban again. They are fighting for the truth."
Some of his words sounded as if they were copied from propaganda videos. But there were also glimpses of how child-like he was.
What would he do if his parents forbade him from rejoining the Taliban?
"Then I won't… but when they die, I will."
Fighting back
The staff try to deradicalise the boys. There's a school in the centre, with lessons taking place behind thick metal doors, in what used to be cells.
One of the most popular subjects is Islamic studies.
Mubashir Nazari is a heavy set man, with a cropped beard. He's leading a class of around 25 boys - many accused of being in the Taliban or IS - who are reciting Quranic verses.
He admits it's not easy to change their minds, but says the lessons do make a difference.
"When they first come to the centre, and they hear that there's been a suicide attack in Kabul, they are happy and say, 'do you see how many people we have killed? This is jihad'.
"Then we ask them, 'what is the sin of those children killed in the blast? Or the people just going to work?'. And we say, 'where in Islam does it permit you to kill innocent people?'. By the end, when they hear of a suicide attack they get upset."
* We embraced - but I'd still kill him
* The Afghan women determined not to lose out
* Why Afghanistan is so dangerous
There are also lessons in academic subjects, with basic literacy taught for those who have never been to school before.
Abdullah, a slim 16-year-old, with bright eyes, and a small traditional cap perched atop his head, tells me he spent two months with the Taliban, and was arrested on his way to a shootout between the group and security forces in western Afghanistan.
He was inspired to sign up when he and his friends began attending a madrassa, or religious school, in his area, which was under the control of the Taliban.
"The preacher said it's your duty to fight and die in the name of Allah," he says.
But now, Abdullah is one of the centre's best students, despite having little to no formal education in the past.
"I'm in Class 10, and waiting for my results so I can move into Class 11," he says with pride. "The Taliban just put ammunition in your hand and tell you to fight, but when I am released from here I want to keep studying."
Traumatised
For staff trying to form relationships with boys like Abdullah, one of the biggest problems is the high turn-over in inmates.
Detainees are regularly released or transferred, whilst there's a constant stream of fresh arrivals.
One morning, we watch as the intelligence services drop off a small boy, his head shaved, wrists still in handcuffs.
He looks extremely nervous as he's taken to the medical centre to be registered. In an almost inaudible voice, he tells them he's suffering from psychological problems.
The doctor taking down his details says mental health issues are common.
He tells me he often sees boys who have self harmed, cutting their bodies or faces.
"Every week there's two or three cases…. They do it with whatever they can find
- pieces of glass or metal."
"I think almost all of them have gone through something traumatic and haven't had the ability to process it, so their response to it is fighting," Lyla Schwartz, a foreign psychologist with the Etidal Foundation, explains. "Finding something to be a part of in order to get their anger and frustration out, instead of actually acknowledge how much loss they've experienced."
Media captionSecunder Kermani reports from one of the country's busiest hospitals in the southern city of Kandahar
Ms Schwartz tries to get the boys to address their underlying trauma, but she's stretched for time.
"We always address the crises first - suicide attempts, fighting, riots - but there are some kids that we really have built relationships with. If we had the support and resources, we could go more in depth."
'Killing children'
Fourteen-year-old Mohammad looks particularly nervous
He led a small group of friends running away from an IS camp they were forced into, and is worried about other boys - with extremist views - overhearing us.
His parents both died, and he ended up in the care of his sister and his brother-inlaw. The brother-in-law joined IS, and took Mohammad with him to the group's stronghold in the east of Afghanistan.
There, he enrolled him in a madrassa.
"They pretend to be good Muslims," he says, "but they are not doing good things."
"Like what?" I ask.
"Killing children," he replies. It's not clear what he witnessed himself, and what he's simply heard about - he doesn't want to go into details - but later in the conversation, he again refers to IS "killing kids".
Mohammed says he tried to run away with a handful of others. "But we were arrested by IS and put in jail… They beat us and said, 'you want to join the infidels'."
When they could, they tried to escape again.
"We knew if we were discovered we would be killed… We walked all night through the hills and the next day we handed ourselves in."
But while Mohammad is relieved he's no longer in the madrassa, he's frustrated that he's being kept in the detention centre. "We thought we would go home, but instead they put us here."
'My father was wrong'
Aside from lessons in the morning, and a short period in the courtyard, the boys spend their days in their rooms.
Zakir, the 14-year-old Taliban member, shares his cell with nine others, all accused of being in the militant group.
Their favourite pastime? Beadwork.
Zakir shows me a tiny pair of sandals he's made for his younger sister, using red and white beads that are stuck together, others have decorated pens or made prayer beads for their parents.
I use the opportunity to ask Zakir more about life growing up in a warzone.
"I've been seeing dead bodies ever since I can remember," he tells me in a flat tone.
* The woman who negotiated with the Taliban
* The Afghan war: The long and the short story
* What would peace in Afghanistan look like
* What will the Taliban do after signing the US deal?
One episode stands out for him. When he was eight, one of his friends was killed by his own parents, for getting involved with local criminals. It's a reminder that the violence in Afghanistan isn't just restricted to the war.
How and why Zakir ended up joining the Taliban is confusing.
His father, whilst working for the intelligence services, was injured in an attack by the group when Zakir was 13. He remembers his parents trying to hide the fact from him. "My father said he was bitten by a dog, but later on I found out that wasn't true."
But despite what happened to his father, Zakir says he began to support the Taliban. "I knew my father was in the wrong, for supporting the foreigners," he tells me.
One of the main reasons he joined the group, he says, was because he was being harassed by local pro-government militia forces.
"If you are dressed like a religious Muslim with a skullcap, they arrest you, beat you and humiliate you."
Once with the Taliban, he felt "safer".
"Before joining the Taliban, I would get upset when I was beaten and ask why is this happening to me? But when I was with the Taliban, it was better, because at least then there was reason - we were enemies."
It's hard to know if all that is true, but Zakir seems genuine. He's conflicted about what he wants to do with his future. He's "proud" of his time with the Taliban, but adds: "Perhaps I won't do it again, as there are other fighters… I want to continue my jihad, but not if my parents are unhappy."
The centre does try and prepare the boys for life on the outside - there's a tailoring workshop for example.
But once they've been released there's no system for checking up on them.
It's a source of frustration for Ms Schwartz.
"There are supposed to be social workers who follow up with them," she says, but security concerns make it difficult for that to happen. "Support, school, jobs, alternatives to what they've come from, is extremely lacking."
Justice Minister Abdul Baseer Anwar - who ultimately has control of the centre recognises the need to rehabilitate the boys. "The psychologists," he says, "are even more important than the clerics" in fighting against the "brainwashing" done by militants.
Mr Anwar adds that he's looking at introducing new regulations that would make it easier to help find the detainees stable jobs after release. He hopes the international community can help both with more funding and expertise.
'I'll slit your throat'
Abdullah, the former Taliban member who has excelled in his studies, is due for release and worries about what will happen next.
"I won't go back to my village," he tells me. "The Taliban would kill me."
But others in the centre show little sign of changing their views. On our final day, one peering out of the window of his cell on the third floor, points to me and runs his fingers across his neck.
"I'll slit your throat," he shouts down.
It's a reminder of the challenges faced by the Afghan authorities in reintegrating those with extremist views into the rest of society.
The Taliban and US signed an agreement in February aimed at beginning to bring an end to the conflict. In the next stage of the peace process, talks between the insurgents and the government about the future of the cou
|
ntry are due to begin, though fighting between them continues.
|
The boys in the centre linked to the Taliban celebrated the deal as a victory, staying awake late at night offering special prayers. Many hope now to eventually be released as part of a prisoner exchange that belatedly began earlier this month, although both sides have accused each other of not fully abiding by its terms.
Zakir, with a mixture of stubbornness and innocence, insists that the war in Afghanistan will end when American troops leave as Afghans are all "brothers". But he acknowledges he wants the Taliban's interpretation of an Islamic state established in the country, despite the fact many other Afghans clearly don't. Other boys I speak to make clear they believe their "jihad" will continue until sharia law is established.
When we ask Zakir what he thinks about democracy, he's instantly dismissive.
"Nonsense," he replies.
All the teenagers' names have been changed
| 15,274
|
inside_word
|
country
|
remove_one_sentence
|
<url>
https://dila.ph/AfghanistanThedetentioncentreforteenageTalibanmembersBBCNews.pdf
</url>
<text>
Afghanistan: The detention centre for teenage Taliban members
By Secunder Kermani BBC News, Kabul
* 21 April 2020
Media caption"I was with the Taliban for one year"
In a dusty courtyard, behind a tall mesh fence, a group of teenagers are playing a frenetic game of football, while others stand around watching from the sidelines.
These are some of Afghanistan's most vulnerable and most troubled children. Inmates of Kabul's Juvenile Rehabilitation Centre.
A small, excited crowd of boys press their faces up to the fence to talk to us.
"Some of us killed people… some of us are thieves," one lanky teenager tells me when I ask what they are accused of.
They're smiling and laughing but they aren't the most serious cases here. The centre generally holds approximately 300 inmates, aged between 12 and 18. On average, around half are accused of being in militant groups: the Islamic State (IS) or the Taliban.
The Taliban control or contest around half of Afghanistan, they've been waging a deadly war against the Afghan government and US-led international forces since being overthrown in 2001.
The staff try and keep the categories of detainees separate, to avoid fights between those linked to the Taliban and to the Islamic State group - which have clashed with each other in the outside world - and to prevent the boys accused of "general crimes" from becoming radicalised.
The boys talking to me in the courtyard all live on the ground floor of the bright green accommodation block. The Taliban and IS members are held in the two floors above them.
"They're terrorists, we are not," says one dismissively.
'Kill to survive'
The BBC was given rare access to the centre, surrounded by high concrete walls, with watchtowers and armed guards dotted around the periphery. In a quiet corner, a social worker introduces us to three alleged IS members. The group is newer, and far less powerful in Afghanistan than the Taliban, but has been responsible for dozens of deadly suicide bombings.
One, wearing an electric blue salwar kameez, and with a glare in his eyes, claims he was wrongly arrested. Many of the boys in the centre are wary about revealing their past activities, even though we are keeping their identities anonymous. Nevertheless, he gradually opens up about his extreme views.
"The foreigners haven't done anything wrong to me, but the Prophet has said jihad against them must continue until the Day of Judgement."
The extent of his radicalisation becomes even clearer as he explains why he hates the Afghan government - allied to US-led international forces.
"This is an Islamic country, but look at Kabul, it's full of brothels. There is so much adultery and homosexuality. There are musicians and, god forbid, there are even people having sex with their own mothers and sisters."
* Block Six: The prison wing which holds 2,000 Taliban
* Who are the Taliban?
* A month of killing in Afghanistan
He's from a province in the east of the country, and his description of the Afghan capital Kabul as a pit of debauchery bears no resemblance to reality. Yet it's clear it's something he deeply believes.
At the same time, there's a softer side to him too. Despite only having the beginnings of a beard growing on his face, he's a father to a one-year-old girl.
"I don't want her to see me here, she will cry," he says.
As the interview ends and we walk off, we pass the cells of the accommodation block. In one, a group of boys are dangling their legs out between the blue metal bars of the window, singing a song and hammering out a beat on a small plastic jug.
They giggle as they tell me the song is about "love", but I notice many of them have tattoos scratched onto their wrists, arms or ankles.
Some are crude images of guns or daggers, one - in Persian - reads "have a bad life, and an even worse future"; another, "kill to survive".
Kabul suffers from high levels of crime, with kidnappings and violent robberies common. Unemployment amongst young people is at more than 30% according to the World Bank.
"Kill to survive?" I ask. "Is that what you feel life is like?"
The mood has momentarily grown more serious.
"If you work as a labourer you only earn 200 Afghani (£2) a day, how can you feed your family?" one asks. "You have to steal and rob."
Then, another strikes up his song again, and we leave them giggling in their cell.
'I will join the Taliban again'
The following day, we meet a dizzying stream of boys, an IS recruit who joined up after seeing their propaganda on social media, a 17-year-old Taliban fighter who smilingly asserts that he has killed "lots" of American soldiers - a claim that's almost definitely not true.
One of the boys that stands out is Zakir, a tall, gangly 14-year-old. He looks like a rather dopey teenager, whose deep voice seems too old for his youthful face. But he's proud of his links to the Taliban.
"My job was to plant explosives," he tells me. "The Taliban used to come to the village at night time and I would give them reports about what was going on."
Zakir says he joined the group after seeing "how they prayed and looked after people" when visiting relatives in areas under their control, and watching Taliban propaganda videos.
He tells me he joined "secretly" and that his family never knew. In fact, his father and elder brother were fighting on the other side of the conflict, as members of the Afghan intelligence services.
Was he never worried the explosives he planted could end up killing his own father? He insisted he operated in areas his father never visited, targeting instead local pro government militias who he accused of "raping and stealing".
Zakir, like many of the boys, seemed to have a good relationship with the staff at the centre. But he was clear that he wanted to join the Taliban again.
"Here, we pray five times a day, and have lessons. But when I'm free I will look after my parents, and then I will join the Taliban again. They are fighting for the truth."
Some of his words sounded as if they were copied from propaganda videos. But there were also glimpses of how child-like he was.
What would he do if his parents forbade him from rejoining the Taliban?
"Then I won't… but when they die, I will."
Fighting back
The staff try to deradicalise the boys. There's a school in the centre, with lessons taking place behind thick metal doors, in what used to be cells.
One of the most popular subjects is Islamic studies.
Mubashir Nazari is a heavy set man, with a cropped beard. He's leading a class of around 25 boys - many accused of being in the Taliban or IS - who are reciting Quranic verses.
He admits it's not easy to change their minds, but says the lessons do make a difference.
"When they first come to the centre, and they hear that there's been a suicide attack in Kabul, they are happy and say, 'do you see how many people we have killed? This is jihad'.
"Then we ask them, 'what is the sin of those children killed in the blast? Or the people just going to work?'. And we say, 'where in Islam does it permit you to kill innocent people?'. By the end, when they hear of a suicide attack they get upset."
* We embraced - but I'd still kill him
* The Afghan women determined not to lose out
* Why Afghanistan is so dangerous
There are also lessons in academic subjects, with basic literacy taught for those who have never been to school before.
Abdullah, a slim 16-year-old, with bright eyes, and a small traditional cap perched atop his head, tells me he spent two months with the Taliban, and was arrested on his way to a shootout between the group and security forces in western Afghanistan.
He was inspired to sign up when he and his friends began attending a madrassa, or religious school, in his area, which was under the control of the Taliban.
"The preacher said it's your duty to fight and die in the name of Allah," he says.
But now, Abdullah is one of the centre's best students, despite having little to no formal education in the past.
"I'm in Class 10, and waiting for my results so I can move into Class 11," he says with pride. "The Taliban just put ammunition in your hand and tell you to fight, but when I am released from here I want to keep studying."
Traumatised
For staff trying to form relationships with boys like Abdullah, one of the biggest problems is the high turn-over in inmates.
Detainees are regularly released or transferred, whilst there's a constant stream of fresh arrivals.
One morning, we watch as the intelligence services drop off a small boy, his head shaved, wrists still in handcuffs.
He looks extremely nervous as he's taken to the medical centre to be registered. In an almost inaudible voice, he tells them he's suffering from psychological problems.
The doctor taking down his details says mental health issues are common.
He tells me he often sees boys who have self harmed, cutting their bodies or faces.
"Every week there's two or three cases…. They do it with whatever they can find
- pieces of glass or metal."
"I think almost all of them have gone through something traumatic and haven't had the ability to process it, so their response to it is fighting," Lyla Schwartz, a foreign psychologist with the Etidal Foundation, explains. "Finding something to be a part of in order to get their anger and frustration out, instead of actually acknowledge how much loss they've experienced."
Media captionSecunder Kermani reports from one of the country's busiest hospitals in the southern city of Kandahar
Ms Schwartz tries to get the boys to address their underlying trauma, but she's stretched for time.
"We always address the crises first - suicide attempts, fighting, riots - but there are some kids that we really have built relationships with. If we had the support and resources, we could go more in depth."
'Killing children'
Fourteen-year-old Mohammad looks particularly nervous
He led a small group of friends running away from an IS camp they were forced into, and is worried about other boys - with extremist views - overhearing us.
His parents both died, and he ended up in the care of his sister and his brother-inlaw. The brother-in-law joined IS, and took Mohammad with him to the group's stronghold in the east of Afghanistan.
There, he enrolled him in a madrassa.
"They pretend to be good Muslims," he says, "but they are not doing good things."
"Like what?" I ask.
"Killing children," he replies. It's not clear what he witnessed himself, and what he's simply heard about - he doesn't want to go into details - but later in the conversation, he again refers to IS "killing kids".
Mohammed says he tried to run away with a handful of others. "But we were arrested by IS and put in jail… They beat us and said, 'you want to join the infidels'."
When they could, they tried to escape again.
"We knew if we were discovered we would be killed… We walked all night through the hills and the next day we handed ourselves in."
But while Mohammad is relieved he's no longer in the madrassa, he's frustrated that he's being kept in the detention centre. "We thought we would go home, but instead they put us here."
'My father was wrong'
Aside from lessons in the morning, and a short period in the courtyard, the boys spend their days in their rooms.
Zakir, the 14-year-old Taliban member, shares his cell with nine others, all accused of being in the militant group.
Their favourite pastime? Beadwork.
Zakir shows me a tiny pair of sandals he's made for his younger sister, using red and white beads that are stuck together, others have decorated pens or made prayer beads for their parents.
I use the opportunity to ask Zakir more about life growing up in a warzone.
"I've been seeing dead bodies ever since I can remember," he tells me in a flat tone.
* The woman who negotiated with the Taliban
* The Afghan war: The long and the short story
* What would peace in Afghanistan look like
* What will the Taliban do after signing the US deal?
One episode stands out for him. When he was eight, one of his friends was killed by his own parents, for getting involved with local criminals. It's a reminder that the violence in Afghanistan isn't just restricted to the war.
How and why Zakir ended up joining the Taliban is confusing.
His father, whilst working for the intelligence services, was injured in an attack by the group when Zakir was 13. He remembers his parents trying to hide the fact from him. "My father said he was bitten by a dog, but later on I found out that wasn't true."
But despite what happened to his father, Zakir says he began to support the Taliban. "I knew my father was in the wrong, for supporting the foreigners," he tells me.
One of the main reasons he joined the group, he says, was because he was being harassed by local pro-government militia forces.
"If you are dressed like a religious Muslim with a skullcap, they arrest you, beat you and humiliate you."
Once with the Taliban, he felt "safer".
"Before joining the Taliban, I would get upset when I was beaten and ask why is this happening to me? But when I was with the Taliban, it was better, because at least then there was reason - we were enemies."
It's hard to know if all that is true, but Zakir seems genuine. He's conflicted about what he wants to do with his future. He's "proud" of his time with the Taliban, but adds: "Perhaps I won't do it again, as there are other fighters… I want to continue my jihad, but not if my parents are unhappy."
The centre does try and prepare the boys for life on the outside - there's a tailoring workshop for example.
But once they've been released there's no system for checking up on them.
It's a source of frustration for Ms Schwartz.
"There are supposed to be social workers who follow up with them," she says, but security concerns make it difficult for that to happen. "Support, school, jobs, alternatives to what they've come from, is extremely lacking."
Justice Minister Abdul Baseer Anwar - who ultimately has control of the centre recognises the need to rehabilitate the boys. "The psychologists," he says, "are even more important than the clerics" in fighting against the "brainwashing" done by militants.
Mr Anwar adds that he's looking at introducing new regulations that would make it easier to help find the detainees stable jobs after release. He hopes the international community can help both with more funding and expertise.
'I'll slit your throat'
Abdullah, the former Taliban member who has excelled in his studies, is due for release and worries about what will happen next.
"I won't go back to my village," he tells me. "The Taliban would kill me."
But others in the centre show little sign of changing their views. On our final day, one peering out of the window of his cell on the third floor, points to me and runs his fingers across his neck.
"I'll slit your throat," he shouts down.
It's a reminder of the challenges faced by the Afghan authorities in reintegrating those with extremist views into the rest of society.
The Taliban and US signed an agreement in February aimed at beginning to bring an end to the conflict. In the next stage of the peace process, talks between the insurgents and the government about the future of the cou<cursor_is_here>
The boys in the centre linked to the Taliban celebrated the deal as a victory, staying awake late at night offering special prayers. Many hope now to eventually be released as part of a prisoner exchange that belatedly began earlier this month, although both sides have accused each other of not fully abiding by its terms.
Zakir, with a mixture of stubbornness and innocence, insists that the war in Afghanistan will end when American troops leave as Afghans are all "brothers". But he acknowledges he wants the Taliban's interpretation of an Islamic state established in the country, despite the fact many other Afghans clearly don't. Other boys I speak to make clear they believe their "jihad" will continue until sharia law is established.
When we ask Zakir what he thinks about democracy, he's instantly dismissive.
"Nonsense," he replies.
All the teenagers' names have been changed
</text>
|
[
{
"content": "<url>\nhttps://dila.ph/AfghanistanThedetentioncentreforteenageTalibanmembersBBCNews.pdf\n</url>\n<text>\nAfghanistan: The detention centre for teenage Taliban members\n\nBy Secunder Kermani BBC News, Kabul\n\n* 21 April 2020\n\nMedia caption\"I was with the Taliban for one year\"\n\nIn a dusty courtyard, behind a tall mesh fence, a group of teenagers are playing a frenetic game of football, while others stand around watching from the sidelines.\n\nThese are some of Afghanistan's most vulnerable and most troubled children. Inmates of Kabul's Juvenile Rehabilitation Centre.\n\nA small, excited crowd of boys press their faces up to the fence to talk to us.\n\n\"Some of us killed people… some of us are thieves,\" one lanky teenager tells me when I ask what they are accused of.\n\nThey're smiling and laughing but they aren't the most serious cases here. The centre generally holds approximately 300 inmates, aged between 12 and 18. On average, around half are accused of being in militant groups: the Islamic State (IS) or the Taliban.\n\nThe Taliban control or contest around half of Afghanistan, they've been waging a deadly war against the Afghan government and US-led international forces since being overthrown in 2001.\n\nThe staff try and keep the categories of detainees separate, to avoid fights between those linked to the Taliban and to the Islamic State group - which have clashed with each other in the outside world - and to prevent the boys accused of \"general crimes\" from becoming radicalised.\n\nThe boys talking to me in the courtyard all live on the ground floor of the bright green accommodation block. The Taliban and IS members are held in the two floors above them.\n\n\"They're terrorists, we are not,\" says one dismissively.\n\n'Kill to survive'\n\nThe BBC was given rare access to the centre, surrounded by high concrete walls, with watchtowers and armed guards dotted around the periphery. In a quiet corner, a social worker introduces us to three alleged IS members. The group is newer, and far less powerful in Afghanistan than the Taliban, but has been responsible for dozens of deadly suicide bombings.\n\nOne, wearing an electric blue salwar kameez, and with a glare in his eyes, claims he was wrongly arrested. Many of the boys in the centre are wary about revealing their past activities, even though we are keeping their identities anonymous. Nevertheless, he gradually opens up about his extreme views.\n\n\"The foreigners haven't done anything wrong to me, but the Prophet has said jihad against them must continue until the Day of Judgement.\"\n\nThe extent of his radicalisation becomes even clearer as he explains why he hates the Afghan government - allied to US-led international forces.\n\n\"This is an Islamic country, but look at Kabul, it's full of brothels. There is so much adultery and homosexuality. There are musicians and, god forbid, there are even people having sex with their own mothers and sisters.\"\n\n* Block Six: The prison wing which holds 2,000 Taliban\n* Who are the Taliban?\n\n* A month of killing in Afghanistan\n\nHe's from a province in the east of the country, and his description of the Afghan capital Kabul as a pit of debauchery bears no resemblance to reality. Yet it's clear it's something he deeply believes.\n\nAt the same time, there's a softer side to him too. Despite only having the beginnings of a beard growing on his face, he's a father to a one-year-old girl.\n\n\"I don't want her to see me here, she will cry,\" he says.\n\nAs the interview ends and we walk off, we pass the cells of the accommodation block. In one, a group of boys are dangling their legs out between the blue metal bars of the window, singing a song and hammering out a beat on a small plastic jug.\n\nThey giggle as they tell me the song is about \"love\", but I notice many of them have tattoos scratched onto their wrists, arms or ankles.\n\nSome are crude images of guns or daggers, one - in Persian - reads \"have a bad life, and an even worse future\"; another, \"kill to survive\".\n\nKabul suffers from high levels of crime, with kidnappings and violent robberies common. Unemployment amongst young people is at more than 30% according to the World Bank.\n\n\"Kill to survive?\" I ask. \"Is that what you feel life is like?\"\n\nThe mood has momentarily grown more serious.\n\n\"If you work as a labourer you only earn 200 Afghani (£2) a day, how can you feed your family?\" one asks. \"You have to steal and rob.\"\n\nThen, another strikes up his song again, and we leave them giggling in their cell.\n\n'I will join the Taliban again'\n\nThe following day, we meet a dizzying stream of boys, an IS recruit who joined up after seeing their propaganda on social media, a 17-year-old Taliban fighter who smilingly asserts that he has killed \"lots\" of American soldiers - a claim that's almost definitely not true.\n\nOne of the boys that stands out is Zakir, a tall, gangly 14-year-old. He looks like a rather dopey teenager, whose deep voice seems too old for his youthful face. But he's proud of his links to the Taliban.\n\n\"My job was to plant explosives,\" he tells me. \"The Taliban used to come to the village at night time and I would give them reports about what was going on.\"\n\nZakir says he joined the group after seeing \"how they prayed and looked after people\" when visiting relatives in areas under their control, and watching Taliban propaganda videos.\n\nHe tells me he joined \"secretly\" and that his family never knew. In fact, his father and elder brother were fighting on the other side of the conflict, as members of the Afghan intelligence services.\n\nWas he never worried the explosives he planted could end up killing his own father? He insisted he operated in areas his father never visited, targeting instead local pro government militias who he accused of \"raping and stealing\".\n\nZakir, like many of the boys, seemed to have a good relationship with the staff at the centre. But he was clear that he wanted to join the Taliban again.\n\n\"Here, we pray five times a day, and have lessons. But when I'm free I will look after my parents, and then I will join the Taliban again. They are fighting for the truth.\"\n\nSome of his words sounded as if they were copied from propaganda videos. But there were also glimpses of how child-like he was.\n\nWhat would he do if his parents forbade him from rejoining the Taliban?\n\n\"Then I won't… but when they die, I will.\"\n\nFighting back\n\nThe staff try to deradicalise the boys. There's a school in the centre, with lessons taking place behind thick metal doors, in what used to be cells.\n\nOne of the most popular subjects is Islamic studies.\n\nMubashir Nazari is a heavy set man, with a cropped beard. He's leading a class of around 25 boys - many accused of being in the Taliban or IS - who are reciting Quranic verses.\n\nHe admits it's not easy to change their minds, but says the lessons do make a difference.\n\n\"When they first come to the centre, and they hear that there's been a suicide attack in Kabul, they are happy and say, 'do you see how many people we have killed? This is jihad'.\n\n\"Then we ask them, 'what is the sin of those children killed in the blast? Or the people just going to work?'. And we say, 'where in Islam does it permit you to kill innocent people?'. By the end, when they hear of a suicide attack they get upset.\"\n\n* We embraced - but I'd still kill him\n* The Afghan women determined not to lose out\n* Why Afghanistan is so dangerous\n\nThere are also lessons in academic subjects, with basic literacy taught for those who have never been to school before.\n\nAbdullah, a slim 16-year-old, with bright eyes, and a small traditional cap perched atop his head, tells me he spent two months with the Taliban, and was arrested on his way to a shootout between the group and security forces in western Afghanistan.\n\nHe was inspired to sign up when he and his friends began attending a madrassa, or religious school, in his area, which was under the control of the Taliban.\n\n\"The preacher said it's your duty to fight and die in the name of Allah,\" he says.\n\nBut now, Abdullah is one of the centre's best students, despite having little to no formal education in the past.\n\n\"I'm in Class 10, and waiting for my results so I can move into Class 11,\" he says with pride. \"The Taliban just put ammunition in your hand and tell you to fight, but when I am released from here I want to keep studying.\"\n\nTraumatised\n\nFor staff trying to form relationships with boys like Abdullah, one of the biggest problems is the high turn-over in inmates.\n\nDetainees are regularly released or transferred, whilst there's a constant stream of fresh arrivals.\n\nOne morning, we watch as the intelligence services drop off a small boy, his head shaved, wrists still in handcuffs.\n\nHe looks extremely nervous as he's taken to the medical centre to be registered. In an almost inaudible voice, he tells them he's suffering from psychological problems.\n\nThe doctor taking down his details says mental health issues are common.\n\nHe tells me he often sees boys who have self harmed, cutting their bodies or faces.\n\n\"Every week there's two or three cases…. They do it with whatever they can find\n\n- pieces of glass or metal.\"\n\n\"I think almost all of them have gone through something traumatic and haven't had the ability to process it, so their response to it is fighting,\" Lyla Schwartz, a foreign psychologist with the Etidal Foundation, explains. \"Finding something to be a part of in order to get their anger and frustration out, instead of actually acknowledge how much loss they've experienced.\"\n\nMedia captionSecunder Kermani reports from one of the country's busiest hospitals in the southern city of Kandahar\n\nMs Schwartz tries to get the boys to address their underlying trauma, but she's stretched for time.\n\n\"We always address the crises first - suicide attempts, fighting, riots - but there are some kids that we really have built relationships with. If we had the support and resources, we could go more in depth.\"\n\n'Killing children'\n\nFourteen-year-old Mohammad looks particularly nervous\n\nHe led a small group of friends running away from an IS camp they were forced into, and is worried about other boys - with extremist views - overhearing us.\n\nHis parents both died, and he ended up in the care of his sister and his brother-inlaw. The brother-in-law joined IS, and took Mohammad with him to the group's stronghold in the east of Afghanistan.\n\nThere, he enrolled him in a madrassa.\n\n\"They pretend to be good Muslims,\" he says, \"but they are not doing good things.\"\n\n\"Like what?\" I ask.\n\n\"Killing children,\" he replies. It's not clear what he witnessed himself, and what he's simply heard about - he doesn't want to go into details - but later in the conversation, he again refers to IS \"killing kids\".\n\nMohammed says he tried to run away with a handful of others. \"But we were arrested by IS and put in jail… They beat us and said, 'you want to join the infidels'.\"\n\nWhen they could, they tried to escape again.\n\n\"We knew if we were discovered we would be killed… We walked all night through the hills and the next day we handed ourselves in.\"\n\nBut while Mohammad is relieved he's no longer in the madrassa, he's frustrated that he's being kept in the detention centre. \"We thought we would go home, but instead they put us here.\"\n\n'My father was wrong'\n\nAside from lessons in the morning, and a short period in the courtyard, the boys spend their days in their rooms.\n\nZakir, the 14-year-old Taliban member, shares his cell with nine others, all accused of being in the militant group.\n\nTheir favourite pastime? Beadwork.\n\nZakir shows me a tiny pair of sandals he's made for his younger sister, using red and white beads that are stuck together, others have decorated pens or made prayer beads for their parents.\n\nI use the opportunity to ask Zakir more about life growing up in a warzone.\n\n\"I've been seeing dead bodies ever since I can remember,\" he tells me in a flat tone.\n\n* The woman who negotiated with the Taliban\n* The Afghan war: The long and the short story\n* What would peace in Afghanistan look like\n* What will the Taliban do after signing the US deal?\n\nOne episode stands out for him. When he was eight, one of his friends was killed by his own parents, for getting involved with local criminals. It's a reminder that the violence in Afghanistan isn't just restricted to the war.\n\nHow and why Zakir ended up joining the Taliban is confusing.\n\nHis father, whilst working for the intelligence services, was injured in an attack by the group when Zakir was 13. He remembers his parents trying to hide the fact from him. \"My father said he was bitten by a dog, but later on I found out that wasn't true.\"\n\nBut despite what happened to his father, Zakir says he began to support the Taliban. \"I knew my father was in the wrong, for supporting the foreigners,\" he tells me.\n\nOne of the main reasons he joined the group, he says, was because he was being harassed by local pro-government militia forces.\n\n\"If you are dressed like a religious Muslim with a skullcap, they arrest you, beat you and humiliate you.\"\n\nOnce with the Taliban, he felt \"safer\".\n\n\"Before joining the Taliban, I would get upset when I was beaten and ask why is this happening to me? But when I was with the Taliban, it was better, because at least then there was reason - we were enemies.\"\n\nIt's hard to know if all that is true, but Zakir seems genuine. He's conflicted about what he wants to do with his future. He's \"proud\" of his time with the Taliban, but adds: \"Perhaps I won't do it again, as there are other fighters… I want to continue my jihad, but not if my parents are unhappy.\"\n\nThe centre does try and prepare the boys for life on the outside - there's a tailoring workshop for example.\n\nBut once they've been released there's no system for checking up on them.\n\nIt's a source of frustration for Ms Schwartz.\n\n\"There are supposed to be social workers who follow up with them,\" she says, but security concerns make it difficult for that to happen. \"Support, school, jobs, alternatives to what they've come from, is extremely lacking.\"\n\nJustice Minister Abdul Baseer Anwar - who ultimately has control of the centre recognises the need to rehabilitate the boys. \"The psychologists,\" he says, \"are even more important than the clerics\" in fighting against the \"brainwashing\" done by militants.\n\nMr Anwar adds that he's looking at introducing new regulations that would make it easier to help find the detainees stable jobs after release. He hopes the international community can help both with more funding and expertise.\n\n'I'll slit your throat'\n\nAbdullah, the former Taliban member who has excelled in his studies, is due for release and worries about what will happen next.\n\n\"I won't go back to my village,\" he tells me. \"The Taliban would kill me.\"\n\nBut others in the centre show little sign of changing their views. On our final day, one peering out of the window of his cell on the third floor, points to me and runs his fingers across his neck.\n\n\"I'll slit your throat,\" he shouts down.\n\nIt's a reminder of the challenges faced by the Afghan authorities in reintegrating those with extremist views into the rest of society.\n\nThe Taliban and US signed an agreement in February aimed at beginning to bring an end to the conflict. In the next stage of the peace process, talks between the insurgents and the government about the future of the cou<cursor_is_here>\n\nThe boys in the centre linked to the Taliban celebrated the deal as a victory, staying awake late at night offering special prayers. Many hope now to eventually be released as part of a prisoner exchange that belatedly began earlier this month, although both sides have accused each other of not fully abiding by its terms.\n\nZakir, with a mixture of stubbornness and innocence, insists that the war in Afghanistan will end when American troops leave as Afghans are all \"brothers\". But he acknowledges he wants the Taliban's interpretation of an Islamic state established in the country, despite the fact many other Afghans clearly don't. Other boys I speak to make clear they believe their \"jihad\" will continue until sharia law is established.\n\nWhen we ask Zakir what he thinks about democracy, he's instantly dismissive.\n\n\"Nonsense,\" he replies.\n\nAll the teenagers' names have been changed\n</text>\n",
"role": "user"
},
{
"content": "ntry are due to begin, though fighting between them continues.",
"role": "assistant"
}
] |
Life cycle and timing of emergence , 1852)
of Oligoneuriella rhenana (IMHOFF in the Kyll River (SW-Germany) [Ephemeroptera : Oligoneuriidae]
by Arne HAYBACH
Tannenweg 3, D- 55129 Mainz, E-mail : [email protected]
Keywords : Oligoneuriella rhenana, life cycle, timing of emergence, egg-laying, Germany
1) The life cycle of Oligoneuriella rhenana was studied by 2 min kick samples during the period of occurrence of preimaginal stages. Six samples were carried out from May to August in the Kyll River near Trier (Rhine catchment). O. rhenana is a univoltine summer species with overwintering eggs and a single extremely fast growing generation that emerges in July and August. 2) Larvae larger than 8-10 mm were sexed, and the sex ratio was about 50:50. 3) Winged adults of O. rhenana swarming horizontally over the water surface were collected by successive random sweeps during their daily emergence period, and the changes in sex and stage composition were examined. 4) The emergence occurred mainly during a 1½ h period beginning some time after sunset. Male sub-imagoes emerged synchronously and moulted to imagoes in a 30 min period immediately prior to the emergence of female sub-imagoes. 5) Females were mated as sub-imagoes, and the imaginal moult took place during flight after mating, prior to egg-laying, which was done in about 3 batches. 6) Life span of winged stages is extremely short and lasts on average about 40 min in males and about 50 min in females. 7) Egg laying was observed to be completed in several batches, with the females leaving the turbulent water surface several times. As the wings of Oligoneuriella remain unmoulted, the hydrophobic quality of the subimaginal hairs is thought to be advantageous for this.
Cycle biologique et timing de l'émergence d'Oligoneuriella rhenana (Imhoff, 1852) dans la rivière Kyll (SW de l'Allemagne) [Ephemeroptera : Oligoneuriidae]
Mot-clés : Oligoneuriella rhenana, cycle biologique, timing d'émergence, oviposition, Allemagne.
1) Le cycle biologique d'Oligoneuriella rhenana a été étudié par prélèvements foulés au pied de 2 min pendant la période d' occurrence du stade préimaginal. Six prélèvements ont été effectués de mai à août dans la rivière Kyll près de Trier (bassin-versant du Rhin). O. rhenana est une espèce estivale univoltine ; elle passe l'hiver à l'état d'œufs et présente une seule génération, à croissance extrêmement rapide, qui émerge en juillet et août. 2) La détermination du sexe des larves au dessus de 8-10 mm a révélé une sex ratio voisine de 50:50. 3) Les adultes d'O. rhenana volant en essaims horizontalement au dessus de la surface de l'eau ont été récoltés au filet entomologique par balayages successifs au hasard durant leur période d'émergence quotidienne, et les changements dans les proportions des sexes et des stades subimaginal et imaginal on été examinés. 4)L'émergence a lieu principalement pendant une période de 1 ½ h, débutant peu après le coucher du soleil. Les subimagos mâles émergent de façon synchrone et muent en imagos sur une période de 30 minutes précédant immédiatement l'émergence des subimagos femelles. 5) Les femelles s'accouplent au stade subimaginal, et la mue imaginale a lieu durant le vol qui suit l'accouplement, avant l'oviposition, cette dernière se déroulant en trois fois environ. 6) La durée de vie des stades ailés es extrêmement brève, en moyenne d'environ 40 minutes chez les mâles et d'environ 50 minutes chez les femelles. 7) Il a été observé que l'oviposition se déroule en plusieurs fois, les femelles quittant la surface agitée de l'eau à plusieurs reprise. Du fait que ailes d'Oligoneuriella ne s'exuvient pas, les caractéristiques hydrophobes de soies subimaginales apparaissent comme un avantage réel.
1. Introduction
The life-cycle of Oligoneuriella rhenana has been described in general or in detail several times as a univoltine summer cycle by several different European authors e.g. GRANDI, 1947, PINET, 1962, SOWA, 1975, FENOGLIO et al. 2005 and others. Interestingly, little information on its life cycle in the Rhine River, after which this species was named, has been published, and there are only general descriptions on the time of occurrence of larvae and the flight period e.g. in NEERACHER, 1910, SCHOENEMUND, 1930 or JANSEN, 2000. A full life cycle, however has never been published from this area or from any other region in Germany.
The imaginal flight of Oligoneuriella rhenana has attracted early the attention of entomologists, especially in the case of mass flights (e.g. STEINMANN, 1919 or BURMEISTER, 1989), and there are detailed descriptions on abiotic factors influencing the emergence, as well as on flight behaviour (PINET, 1962, 1967, FISCHER, 1991, STEINMANN, 1919, GRANDI, 1947, GRIMM, 1988). However, a detailed description of the timing of emergence is missing and this paper represents the first detailed description of the life cycle from Germany.
2. Materials and Methods
Study site
The study was conducted in the lower reach of the Kyll River at Kordel (long. 6°38' E, lat. 39°, 45' N), a 4 th -order left-handed tributary of the River Mosel near the City of Trier. The Mosel River has its confluence with the Rhine River at Koblenz. At Kordel the river is about 10-15m wide and the water flow is very rapid and turbulent. The main substratum is stones about 30-40 cm in diameter and pebbles. Larvae were collected about 100 m downstream, while imagoes were collected directly above the only bridge in Kordel.
Larvae
Larvae were sampled by 2 min kick samples with a hand-net (mesh width 0,5 mm), monthly from January to May and from September to December, and 14-daily from June to August. Specimens of O. rhenana were preserved in 70% ethyl alcohol solution. Their lengths without cerci were measured to the nearest 0,1 mm by use of a Wild-M3 stereo-microscope and a measuring graticule. Starting with samples from the end of June, and with an average size of about 8-10 mm it was possible to sex the larvae using the well-known sexual dimorphism of the eyes as the main criterion (cf. GRANDI, 1947). Simple size-frequency distribution was used to demonstrate the life-cycle.
Imagoes
On August, 4 th 1994 a spectacular mass flight took place at the Kyll River. The time of appearance of the swarm was noted as well as the "behaviour" of the male swarm. The horizontal speed of the male-flight, which took place directly in front of two bridge piers, was about 2m/s. Three years later, on August 6 th , 1997 an experiment was conducted to elaborate details on the timing of emergence in the different flight stages of Oligoneuriella largely following the methods introduced by WATANABE et al. (1989). Soon after sunset (~ 8. 00 p.m.) the first male sub-imagoes appeared. The imagoes and sub-imagoes swarming over the water surface were collected by random strokes through the air with an insect net of 40 cm diameter at a place about 3-5 m upstream of the bridge, where the water was about 30 cm deep. A tenstroke sweep was made every 10 min throughout the duration of the swarming, except for the last 30 min, where 15 min intervals were used. The specimens of O. rhenana were preserved in 70% ethyl alcohol solution. They were divided into their corresponding stages and sexes using GRIMM'S (1988) features for separation: ♂-Sub-imago: tails almost as long as the body, ♂-Imago, tails longer than the body, ♀-Sub-imago: tails with distinct fringes, ♀-Imago: tails without fringes. In addition, in female imagoes the degree of completeness of the eggs in the abdomen was noted, because several females were observed to lay some of their eggs on the water surface, drifting for several metres in the current, and then leaving the water again.
3. Results
Life cycle
The seasonal development of larvae in 1995 based on larval length without cerci is shown in fig. 1. Nymphs were first collected on 15 May. Nymphs larger than 8-10 mm were generally sexed after 29 June to estimate larval sex-ratios. No larvae were detected on April, 13 th , so that, judging from the mean size of 2,65 mm in the middle of May, egg-hatching most probably occurred between the middle and end of April in 1995. Collections on Sept. 14 th were unsuccessful, so that we can conclude that the full development from hatching to emergence took place within approximately 3½ months.
The growth of the larvae in this species is extraordinarily fast and impressive, as has been mentioned by several authors before. In the Kyll River Oligoneuriella larvae grow on average between 0,2-0,3 mm per day from mid-June to the end of July. Flexible strategies are known for O. rhenana with regard to thermal regimes (cf. FENOGLIO et al. 2005). In the Kyll River increasing growth is correlated with increasing water temperatures and the emergence begins at the highest water temperatures (Fig. 1), but note that only single temperature values from the sampling dates are available.
Sex ratio and size
Last instar larvae (with black wing pads) of both sexes show size differences (Table 1). Mature female larvae are approximately 3 mm larger than male larvae.
Sexing of larva was possible in 362 larvae: 180 were female, 182 male. There is therefore a strong indication that the sex ratio in Oligoneuriella rhenana is about 50:50.
Table 1. Mean size of fullgrown larvae showing sexual dimorphism.
| Date: July 29th., 1995 | Size (mm) : mean ± standard deviation |
|---|---|
| Sex ♂-larva (last instar) | 14,8 ± 1,0 |
| ♀-larva (last instar) | 18,1 ± 0,9 |
Tableau 1. Taille moyenne des larves en fin de développement, montrant le dimorphisme sexuel.
Fig. 1 Life cycle of Oligoneuriella rhenana (Imhoff) in the River Kyll. Boxes cover all larvae within a 0,5 mm size class. Simple size frequency is shown. Black boxes indicate the occurrence of last instar larvae, arrows indicate time of emergence. Black spots indicate water temperatures at sampling dates (~12.00 a.m.). Numbers below the dates refer to the number of classified specimen. Figured larva from SCHOENEMUND, 1930.
Fig. 1. Cycle biologique d'Oligoneuriella rhenana (Imhoff) dans la rivière Kyll. Les histogrammes rendent compte de la taille de toutes les larves par classes de 0,5 mm. Les parties foncées indiquent la présence de larves au dernier stade; les flèches indiquent la période d'émergence. Les ponts noirs indiquent la température de l'eau aux dates de prélèvements (~ 12.00 a.m.). Au-dessous des dates, les nombres correspondent aux spécimens classés. Figure de la larve empruntée à Schoenemund, 1930.
Timing of emergence
Table 2 shows the number of male sub-imagoes, male imagoes, female sub-imagoes, and female imagoes caught by the insect net from the swarm at successive sampling times on 6 August 1997, and Fig. 2 shows the same data normalized to 100%. To estimate whether females lay their eggs in one batch, or in several, female imagoes were separated into three categories: First, females with complete egg packages in their abdomen, prior to egg laying. Second, females that had partly laid their eggs, and third, females without eggs.
0
0
Table 2: Timing of emergence of O. rhenana in the Kyll River on August, 6 th , 1997 Tableau 2. Timing de l'émergence d'O. rhenana, rivière Kyll, le 6 août 1997.
The large majority of O. rhenana emerged synchronously within 40 min. After that time almost only egg laying female imagoes were recorded. Male emergence began abruptly at around 8. 10 p.m. At first male sub-imagoes appeared, but the proportion of male imagoes increased rapidly and within 20 min after detection of swarming adults, almost all males had moulted to imagoes during swarming, as is well known for this species. After this female sub-imagoes appeared. This stage is highly underrepresented in our data because emerging females were rapidly mated by patrolling males and then hidden away as couples high over the swarm. After a further 10 minutes the majority of specimens had been mated and fully moulted female imagoes occurred to begin egg laying. Note that in O. rhenana moulting occurs during flight, so that in adoption of this behaviour, the wings must remain unmoulted. Within another 10 min. at 9. 00 p.m. almost only female stages were captured.
Life span of adults
Individual life span may depend largely on environmental factors during flight, especially temperature or general weather influences such as rain, storm, etc. STEINMANN (1919) reports a 2-4 hr life span for captured individuals which had no possibility for flight. Our data based on more natural conditions suggest that the life span of male adults is on average about 40 min, and that of female adults a little longer at about 50 min, in concordance with the field observations of FISCHER (1991). This is one of the shortest life spans of mayflies at all, and only Behningiidae are known to have as short or shorter life spans. In both families adults are rapid horizontal flyers, and females are mated as subimagoes.
Fig. 2. Timing de l'émergence d'O. rhenana. La représentation des apparitions successives des subimagos mâles, imagos mâles, subimagoes femelles, imagos femelles, et les femelles en oviposition est effectuée selon les données du Tableau 2.
Egg laying
O. rhenana females were observed to lay the eggs directly on the water surface, but only in lotic areas with turbulent water and rapid flow. Females drifted 3-5 m with the current and then left the surface to fly into the swarm again. It was not possible to observe whether they were mated again, but this can't be excluded. Based on observations of the "degree of emptiness" of the abdomen in the captured female imagoes, it is suggested that females lay their eggs in at least 3 batches, and not in 1 large batch. There is perhaps some variability in egg-laying behaviour, dependent on the size of the females, and therefore in the temperature regime of the river in general.
4. Discussion
The current study confirmed that O. rhenana is a univoltine summer species with overwintering eggs and a rapid, temperature dependant growth during spring and summer. Our data also confirmed the observations and experiments of STEINMANN (1919), GRANDI (1947) and GRIMM (1988) that female sub-imagoes of O. rhenana are mated by maleimagoes. The mating flight of this species is shown to be highly synchronic, and males appear very shortly before females. This kind of protandry is well known for many short living mass flyers, mainly of larger rivers, such as Dolania americana (Behningiidae: PETERS & PETERS, 1977), Ephoron virgo (Polymitarcyidae: KURECK & FONTES, 1996) or Palingenia longicauda (Palingeniidae: RUSSEV, 1987), and is related to an optimal mating strategy in males
(WATANABE et al., 1989). It is important to note that females lay their eggs in batches, leaving the turbulent water surface on several occasions. For such behaviour the remaining subimaginal haired cuticle of the wings, having hydophobic properties, is advantageous (cf. EDMUNDS & MCCAFFERTY, 1988).
Acknowledgements
Dr. Andrea Buffagni (Brugherio) is thanked for his kind support with an Excel-program for plotting size-frequency distributions, Prof. Dr. R. Rupprecht and Dipl.-Biol. R. Mauden (Zoological Inst. of University of Mainz) for field assistance. Craig Macadam (Ephemeroptera Recording Scheme, UK) is sincerely thanked for correcting the English text and for helpful comments on the manuscript.
References
BURMEISTER, E.G. 1989. Das Massenschwärmen von Flußinsekten - ein an unseren großen Flüssen verschwundenes Phänomen. Verhandlungen des westdeutschen Entomologentags, 1988 : 59-74
EDMUNDS, G.F. JR. & W.P. MCCAFFERTY 1988. The Mayfly Subimago. Annual Review of Entomology, 33 : 509-529.
FENOGLIO, S., BO, T., BATTEGAZZORE, M., MORISI, A. 2005. Growth of Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera : Oligoneuriidae) in Two Rivers with Contrasting Temperatures in NW Italy. Zoological Studies, 44(2) : 271-274.
FISCHER, C. 1991. Evolution des Schwarmfluges und Flugverhalten der Ephemeroptera. Dissertation Universität Erlangen, Nürnberg VI, 172 pp.
GRANDI, M. 1947. Contributi allo studio degli "Efemeroidei" italiani. IX. Oligoneuriella rhenana Imh. Bolletino dell'Istituto di Entomologia della R. Università di Bologna, 16 : 176-218.
GRIMM, R. 1988. Zur Eintagsfliegenfauna der Donauzuflüsse Rot und Rauglen (Baden-Württemberg) (Insecta, Ephemeroptera). Nachrichtenblatt der Bayerischen Entomologen, 37 : 73-83.
JANSEN, W. 2000. Bestandssituation der "Rheinmücke" Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera, Oligoneuriidae) in Deutschland. Verhandlungen des westdeutschen Entomologentags, 1998 : 173-185.
KURECK, A., FONTES, R.J. 1996. The life cycle and emergence of Ephoron virgo, a large potamal mayfly that has returned to the River Rhine. Archiv für Hydrobiologie, Suppl. 113 (1-4) : 319-323.
NEERACHER, F. 1910. Die Insektenfauna des Rheins und seiner Zuflüsse bei Basel. Revue Suisse de Zoologie 18 : 497-590.
PETERS, W.L., PETERS, J.G. 1977. Adult life and emergence of Dolania americana in Northwestern Florida (Ephemeroptera : Behningiidae). Internationale Revue der gesamten Hydrobiologie, 62 : 409-438.
PINET, J.M. 1962. Observations sur la biologie et l'ecologie d'Oligoneuriella rhenana Imhoff (Ephemeroptera). Annales de la Station centrale d'Hydrobiologie appliquée, 9 : 303-332.
PINET, J.M. 1967. Observations sur le vol crépusculaire d'Oligoneuriella rhenana Imhoff (Ephem. Oligoneuriidae). Bulletin de la Société Entomologique de France, 72 (5-6) : 144-155.
RUSSEV, B. 1987. Ecology, life history and distribution of Palingenia longicauda(Olivier) (Ephemeroptera). Tijdschrift voor Entomologie, 130 : 109-127.
SCHOENEMUND, E. 1930 Eintagsfliegen oder Ephemeroptera In: Dahl (ed.) Die Tierwelt Deutschlands und der angrenzenden Meeresgebiete, 19 : 107 pp. Fischer, Jena
SOWA, R. 1975. Ecology and biogeography of mayflies (Ephemeroptera) of running waters in the Polish part of the Carpathians. 2. Life cycles. Acta Hydrobiologica Krakow 17(4) : 319-353.
STEINMANN, P. 1919. Zur Kenntnis der Eintagsfliege Oligoneuria rhenana. Mitteilungen der Aargauischen Naturforschenden Gesellschaft, 15 : 58-75.
WATANABE, N.C., Yoshitaka, I., Mori, I. 1989. Timing of emergence of males and females of Ephoron shigae (Ephemeroptera : Polymitarcyidae). Freshwater biology 21 : 473-476.
(appeared in April 2006)
|
<urn:uuid:7bd5b84d-437a-4fda-801a-66aaef22d0dc>
|
CC-MAIN-2018-47
|
http://ephemeroptera.de/pdf-files/42_Haybach_2006p1_A5867.pdf
|
2018-11-14T21:43:03Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742316.5/warc/CC-MAIN-20181114211915-20181114233915-00118.warc.gz
| 118,708,241
| 5,059
|
eng_Latn
|
eng_Latn
| 0.594605
|
eng_Latn
| 0.941546
|
[
"fra_Latn",
"eng_Latn",
"eng_Latn",
"fra_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
3754,
7745,
9624,
10552,
12980,
14709,
18369
] |
Life cycle and timing of emergence , 1852)
of Oligoneuriella rhenana (IMHOFF in the Kyll River (SW-Germany) [Ephemeroptera : Oligoneuriidae]
by Arne HAYBACH
Tannenweg 3, D- 55129 Mainz, E-mail : [email protected]
Keywords : Oligoneuriella rhenana, life cycle, timing of emergence, egg-laying, Germany
1) The life cycle of Oligoneuriella rhenana was studied by 2 min kick samples during the period of occurrence of preimaginal stages. Six samples were carried out from May to August in the Kyll River near Trier (Rhine catchment). O. rhenana is a univoltine summer species with overwintering eggs and a single extremely fast growing generation that emerges in July and August. 2) Larvae larger than 8-10 mm were sexed, and the sex ratio was about 50:50. 3) Winged adults of O. rhenana swarming horizontally over the water surface were collected by successive random sweeps during their daily emergence period, and the changes in sex and stage composition were examined. 4) The emergence occurred mainly during a 1½ h period beginning some time after sunset. Male sub-imagoes emerged synchronously and moulted to imagoes in a 30 min period immediately prior to the emergence of female sub-imagoes. 5) Females were mated as sub-imagoes, and the imaginal moult took place during flight after mating, prior to egg-laying, which was done in about 3 batches. 6) Life span of winged stages is extremely short and lasts on average about 40 min in males and about 50 min in females. 7) Egg laying was observed to be completed in several batches, with the females leaving the turbulent water surface several times. As the wings of Oligoneuriella remain unmoulted, the hydrophobic quality of the subimaginal hairs is thought to be advantageous for this.
Cycle biologique et timing de l'émergence d'Oligoneuriella rhenana (Imhoff, 1852) dans la rivière Kyll (SW de l'Allemagne) [Ephemeroptera : Oligoneuriidae]
Mot-clés : Oligoneuriella rhenana, cycle biologique, timing d'émergence, oviposition, Allemagne.
1) Le cycle biologique d'Oligoneuriella rhenana a été étudié par prélèvements foulés au pied de 2 min pendant la période d' occurrence du stade préimaginal. Six prélèvements ont été effectués de mai à août dans la rivière Kyll près de Trier (bassin-versant du Rhin). O. rhenana est une espèce estivale univoltine ; elle passe l'hiver à l'état d'œufs et présente une seule génération, à croissance extrêmement rapide, qui émerge en juillet et août. 2) La détermination du sexe des larves au dessus de 8-10 mm a révélé une sex ratio voisine de 50:50. 3) Les adultes d'O. rhenana volant en essaims horizontalement au dessus de la surface de l'eau ont été récoltés au filet entomologique par balayages successifs au hasard durant leur période d'émergence quotidienne, et les changements dans les proportions des sexes et des stades subimaginal et imaginal on été examinés. 4)L'émergence a lieu principalement pendant une période de 1 ½ h, débutant peu après le coucher du soleil. Les subimagos mâles émergent de façon synchrone et muent en imagos sur une période de 30 minutes précédant immédiatement l'émergence des subimagos femelles. 5) Les femelles s'accouplent au stade subimaginal, et la mue imaginale a lieu durant le vol qui suit l'accouplement, avant l'oviposition, cette dernière se déroulant en trois fois environ. 6) La durée de vie des stades ailés es extrêmement brève, en moyenne d'environ 40 minutes chez les mâles et d'environ 50 minutes chez les femelles. 7) Il a été observé que l'oviposition se déroule en plusieurs fois, les femelles quittant la surface agitée de l'eau à plusieurs reprise. Du fait que ailes d'Oligoneuriella ne s'exuvient pas, les caractéristiques hydrophobes de soies subimaginales apparaissent comme un avantage réel.
1. Introduction
The life-cycle of Oligoneuriella rhenana has been described in general or in detail several times as a univoltine summer cycle by several different European authors e.g. GRANDI, 1947, PINET, 1962, SOWA, 1975, FENOGLIO et al. 2005 and others. Interestingly, little information on its life cycle in the Rhine River, after which this species was named, has been published, and there are only general descriptions on the time of occurrence of larvae and the flight period e.g. in NEERACHER, 1910, SCHOENEMUND, 1930 or JANSEN, 2000. A full life cycle, however has never been published from this area or from any other region in Germany.
The imaginal flight of Oligoneuriella rhenana has attracted early the attention of entomologists, especially in the case of mass flights (e.g. STEINMANN, 1919 or BURMEISTER, 1989), and there are detailed descriptions on abiotic factors influencing the emergence, as well as on flight behaviour (PINET, 1962, 1967, FISCHER, 1991, STEINMANN, 1919, GRANDI, 1947, GRIMM, 1988). However, a detailed description of the timing of emergence is missing and this paper represents the first detailed description of the life cycle from Germany.
2. Materials and Methods
Study site
The study was conducted in the lower reach of the Kyll River at Kordel (long. 6°38' E, lat. 39°, 45' N), a 4 th -order left-handed tributary of the River Mosel near the City of Trier. The Mosel River has its confluence with the Rhine River at Koblenz. At Kordel the river is about 10-15m wide and the water flow is very rapid and turbulent. The main substratum is stones about 30-40 cm in diameter and pebbles. Larvae were collected about 100 m downstream, while imagoes were collected directly above the only bridge in Kordel.
Larvae
Larvae were sampled by 2 min kick samples with a hand-net (mesh width 0,5 mm), monthly from January to May and from September to December, and 14-daily from June to August. Specimens of O. rhenana were preserved in 70% ethyl alcohol solution. Their lengths without cerci were measured to the nearest 0,1 mm by use of a Wild-M3 stereo-microscope and a measuring graticule. Starting with samples from the end of June, and with an average size of about 8-10 mm it was possible to sex the larvae using the well-known sexual dimorphism of the eyes as the main criterion (cf. GRANDI, 1947). Simple size-frequency distribution was used to demonstrate the life-cycle.
Imagoes
On August, 4 th 1994 a spectacular mass flight took place at the Kyll River. The time of appearance of the swarm was noted as well as the "behaviour" of the male swarm. The horizontal speed of the male-flight, which took place directly in front of two bridge piers, was about 2m/s. Three years later, on August 6 th , 1997 an experiment was conducted to elaborate details on the timing of emergence in the different flight stages of Oligoneuriella largely following the methods introduced by WATANABE et al. (1989). Soon after sunset (~ 8. 00 p.m.) the first male sub-imagoes appeared. The imagoes and sub-imagoes swarming over the water surface were collected by random strokes through the air with an insect net of 40 cm diameter at a place about 3-5 m upstream of the bridge, where the water was about 30 cm deep. A tenstroke sweep was made every 10 min throughout the duration of the swarming, except for the last 30 min, where 15 min intervals were used. The specimens of O. rhenana were preserved in 70% ethyl alcohol solution. They were divided into their corresponding stages and sexes using GRIMM'S (1988) features for separation: ♂-Sub-imago: tails almost as long as the body, ♂-Imago, tails longer than the body, ♀-Sub-imago: tails with distinct fringes, ♀-Imago: tails without fringes. In addition, in female imagoes the degree of completeness of the eggs in the abdomen was noted, because several females were observed to lay some of their eggs on the water surface, drifting for several metres in the current, and then leaving the water again.
3. Results
Life cycle
The seasonal development of larvae in 1995 based on larval length without cerci is shown in fig. 1. Nymphs were first collected on 15 May. Nymphs larger than 8-10 mm were generally sexed after 29 June to estimate larval sex-ratios. No larvae were detected on April, 13 th , so that, judging from the mean size of 2,65 mm in the middle of May, egg-hatching most probably occurred between the middle and end of April in 1995. Collections on Sept. 14 th were unsuccessful, so that we can conclude that the full development from hatching to emergence took place within approximately 3½ months.
The growth of the larvae in this species is extraordinarily fast and impressive, as has been mentioned by several authors before. In the Kyll River Oligoneuriella larvae grow on average between 0,2-0,3 mm per day from mid-June to the end of July. Flexible strategies are known for O. rhenana with regard to thermal regimes (cf. FENOGLIO et al. 2005). In the Kyll River increasing growth is correlated with increasing water temperatures and the emergence begins at the highest water temperatures (Fig. 1), but note that only single temperature values from the sampling dates are available.
Sex ratio and size
Last instar larvae (with black wing pads) of both sexes show size differences (Table 1). Mature female larvae are approximately 3 mm larger than male larvae.
Sexing of larva was possible in 362 larvae: 180 were female, 182 male. There is therefore a strong indication that the sex ratio in Oligoneuriella rhenana is about 50:50.
Table 1. Mean size of fullgrown larvae showing sexual dimorphism.
| Date: July 29th., 1995 | Size (mm) : mean ± standard deviation |
|---|---|
| Sex ♂-larva (last instar) | 14,8 ± 1,0 |
| ♀-larva (last instar) | 18,1 ± 0,9 |
Tableau 1. Taille moyenne des larves en fin de développement, montrant le dimorphisme sexuel.
Fig. 1 Life cycle of Oligoneuriella rhenana (Imhoff) in the River Kyll. Boxes cover all larvae within a 0,5 mm size class. Simple size frequency is shown. Black boxes indicate the occurrence of last instar larvae, arrows indicate time of emergence. Black spots indicate water temperatures at sampling dates (~12.00 a.m.). Numbers below the dates refer to the number of classified specimen. Figured larva from SCHOENEMUND, 1930.
Fig. 1. Cycle biologique d'Oligoneuriella rhenana (Imhoff) dans la rivière Kyll. Les histogrammes rendent compte de la taille de toutes les larves par classes de 0,5 mm. Les parties foncées indiquent la présence de larves au dernier stade; les flèches indiquent la période d'émergence. Les ponts noirs indiquent la température de l'eau aux dates de prélèvements (~ 12.00 a.m.). Au-dessous des dates, les nombres correspondent aux spécimens classés. Figure de la larve empruntée à Schoenemund, 1930.
Timing of emergence
Table 2 shows the number of male sub-imagoes, male imagoes, female sub-imagoes, and female imagoes caught by the insect net from the swarm at successive sampling times on 6 August 1997, and Fig. 2 shows the same data normalized to 100%. To estimate whether females lay their eggs in one batch, or in several, female imagoes were separated into three categories: First, females with complete egg packages in their abdomen, prior to egg laying. Second, females that had partly laid their eggs, and third, females without eggs.
0
0
Table 2: Timing of emergence of O. rhenana in the Kyll River on August, 6 th , 1997 Tableau 2. Timing de l'émergence d'O. rhenana, rivière Kyll, le 6 août 1997.
The large majority of O. rhenana emerged synchronously within 40 min. After that time almost only egg laying female imagoes were recorded. Male emergence began abruptly at around 8. 10 p.m. At first male sub-imagoes appeared, but the proportion of male imagoes increased rapidly and within 20 min after detection of swarming adults, almost all males had moulted to imagoes during swarming, as is well known for this species. After this female sub-imagoes appeared. This stage is highly underrepresented in our data because emerging females were rapidly mated by patrolling males and then hidden away as couples high over the swarm. After a further 10 minutes the majority of specimens had be
|
en mated and fully moulted female imagoes occurred to begin egg laying.
|
Note that in O. rhenana moulting occurs during flight, so that in adoption of this behaviour, the wings must remain unmoulted. Within another 10 min. at 9. 00 p.m. almost only female stages were captured.
Life span of adults
Individual life span may depend largely on environmental factors during flight, especially temperature or general weather influences such as rain, storm, etc. STEINMANN (1919) reports a 2-4 hr life span for captured individuals which had no possibility for flight. Our data based on more natural conditions suggest that the life span of male adults is on average about 40 min, and that of female adults a little longer at about 50 min, in concordance with the field observations of FISCHER (1991). This is one of the shortest life spans of mayflies at all, and only Behningiidae are known to have as short or shorter life spans. In both families adults are rapid horizontal flyers, and females are mated as subimagoes.
Fig. 2. Timing de l'émergence d'O. rhenana. La représentation des apparitions successives des subimagos mâles, imagos mâles, subimagoes femelles, imagos femelles, et les femelles en oviposition est effectuée selon les données du Tableau 2.
Egg laying
O. rhenana females were observed to lay the eggs directly on the water surface, but only in lotic areas with turbulent water and rapid flow. Females drifted 3-5 m with the current and then left the surface to fly into the swarm again. It was not possible to observe whether they were mated again, but this can't be excluded. Based on observations of the "degree of emptiness" of the abdomen in the captured female imagoes, it is suggested that females lay their eggs in at least 3 batches, and not in 1 large batch. There is perhaps some variability in egg-laying behaviour, dependent on the size of the females, and therefore in the temperature regime of the river in general.
4. Discussion
The current study confirmed that O. rhenana is a univoltine summer species with overwintering eggs and a rapid, temperature dependant growth during spring and summer. Our data also confirmed the observations and experiments of STEINMANN (1919), GRANDI (1947) and GRIMM (1988) that female sub-imagoes of O. rhenana are mated by maleimagoes. The mating flight of this species is shown to be highly synchronic, and males appear very shortly before females. This kind of protandry is well known for many short living mass flyers, mainly of larger rivers, such as Dolania americana (Behningiidae: PETERS & PETERS, 1977), Ephoron virgo (Polymitarcyidae: KURECK & FONTES, 1996) or Palingenia longicauda (Palingeniidae: RUSSEV, 1987), and is related to an optimal mating strategy in males
(WATANABE et al., 1989). It is important to note that females lay their eggs in batches, leaving the turbulent water surface on several occasions. For such behaviour the remaining subimaginal haired cuticle of the wings, having hydophobic properties, is advantageous (cf. EDMUNDS & MCCAFFERTY, 1988).
Acknowledgements
Dr. Andrea Buffagni (Brugherio) is thanked for his kind support with an Excel-program for plotting size-frequency distributions, Prof. Dr. R. Rupprecht and Dipl.-Biol. R. Mauden (Zoological Inst. of University of Mainz) for field assistance. Craig Macadam (Ephemeroptera Recording Scheme, UK) is sincerely thanked for correcting the English text and for helpful comments on the manuscript.
References
BURMEISTER, E.G. 1989. Das Massenschwärmen von Flußinsekten - ein an unseren großen Flüssen verschwundenes Phänomen. Verhandlungen des westdeutschen Entomologentags, 1988 : 59-74
EDMUNDS, G.F. JR. & W.P. MCCAFFERTY 1988. The Mayfly Subimago. Annual Review of Entomology, 33 : 509-529.
FENOGLIO, S., BO, T., BATTEGAZZORE, M., MORISI, A. 2005. Growth of Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera : Oligoneuriidae) in Two Rivers with Contrasting Temperatures in NW Italy. Zoological Studies, 44(2) : 271-274.
FISCHER, C. 1991. Evolution des Schwarmfluges und Flugverhalten der Ephemeroptera. Dissertation Universität Erlangen, Nürnberg VI, 172 pp.
GRANDI, M. 1947. Contributi allo studio degli "Efemeroidei" italiani. IX. Oligoneuriella rhenana Imh. Bolletino dell'Istituto di Entomologia della R. Università di Bologna, 16 : 176-218.
GRIMM, R. 1988. Zur Eintagsfliegenfauna der Donauzuflüsse Rot und Rauglen (Baden-Württemberg) (Insecta, Ephemeroptera). Nachrichtenblatt der Bayerischen Entomologen, 37 : 73-83.
JANSEN, W. 2000. Bestandssituation der "Rheinmücke" Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera, Oligoneuriidae) in Deutschland. Verhandlungen des westdeutschen Entomologentags, 1998 : 173-185.
KURECK, A., FONTES, R.J. 1996. The life cycle and emergence of Ephoron virgo, a large potamal mayfly that has returned to the River Rhine. Archiv für Hydrobiologie, Suppl. 113 (1-4) : 319-323.
NEERACHER, F. 1910. Die Insektenfauna des Rheins und seiner Zuflüsse bei Basel. Revue Suisse de Zoologie 18 : 497-590.
PETERS, W.L., PETERS, J.G. 1977. Adult life and emergence of Dolania americana in Northwestern Florida (Ephemeroptera : Behningiidae). Internationale Revue der gesamten Hydrobiologie, 62 : 409-438.
PINET, J.M. 1962. Observations sur la biologie et l'ecologie d'Oligoneuriella rhenana Imhoff (Ephemeroptera). Annales de la Station centrale d'Hydrobiologie appliquée, 9 : 303-332.
PINET, J.M. 1967. Observations sur le vol crépusculaire d'Oligoneuriella rhenana Imhoff (Ephem. Oligoneuriidae). Bulletin de la Société Entomologique de France, 72 (5-6) : 144-155.
RUSSEV, B. 1987. Ecology, life history and distribution of Palingenia longicauda(Olivier) (Ephemeroptera). Tijdschrift voor Entomologie, 130 : 109-127.
SCHOENEMUND, E. 1930 Eintagsfliegen oder Ephemeroptera In: Dahl (ed.) Die Tierwelt Deutschlands und der angrenzenden Meeresgebiete, 19 : 107 pp. Fischer, Jena
SOWA, R. 1975. Ecology and biogeography of mayflies (Ephemeroptera) of running waters in the Polish part of the Carpathians. 2. Life cycles. Acta Hydrobiologica Krakow 17(4) : 319-353.
STEINMANN, P. 1919. Zur Kenntnis der Eintagsfliege Oligoneuria rhenana. Mitteilungen der Aargauischen Naturforschenden Gesellschaft, 15 : 58-75.
WATANABE, N.C., Yoshitaka, I., Mori, I. 1989. Timing of emergence of males and females of Ephoron shigae (Ephemeroptera : Polymitarcyidae). Freshwater biology 21 : 473-476.
(appeared in April 2006)
| 11,979
|
inside_word
|
been
|
remove_one_sentence
|
<url>
http://ephemeroptera.de/pdf-files/42_Haybach_2006p1_A5867.pdf
</url>
<text>
Life cycle and timing of emergence , 1852)
of Oligoneuriella rhenana (IMHOFF in the Kyll River (SW-Germany) [Ephemeroptera : Oligoneuriidae]
by Arne HAYBACH
Tannenweg 3, D- 55129 Mainz, E-mail : [email protected]
Keywords : Oligoneuriella rhenana, life cycle, timing of emergence, egg-laying, Germany
1) The life cycle of Oligoneuriella rhenana was studied by 2 min kick samples during the period of occurrence of preimaginal stages. Six samples were carried out from May to August in the Kyll River near Trier (Rhine catchment). O. rhenana is a univoltine summer species with overwintering eggs and a single extremely fast growing generation that emerges in July and August. 2) Larvae larger than 8-10 mm were sexed, and the sex ratio was about 50:50. 3) Winged adults of O. rhenana swarming horizontally over the water surface were collected by successive random sweeps during their daily emergence period, and the changes in sex and stage composition were examined. 4) The emergence occurred mainly during a 1½ h period beginning some time after sunset. Male sub-imagoes emerged synchronously and moulted to imagoes in a 30 min period immediately prior to the emergence of female sub-imagoes. 5) Females were mated as sub-imagoes, and the imaginal moult took place during flight after mating, prior to egg-laying, which was done in about 3 batches. 6) Life span of winged stages is extremely short and lasts on average about 40 min in males and about 50 min in females. 7) Egg laying was observed to be completed in several batches, with the females leaving the turbulent water surface several times. As the wings of Oligoneuriella remain unmoulted, the hydrophobic quality of the subimaginal hairs is thought to be advantageous for this.
Cycle biologique et timing de l'émergence d'Oligoneuriella rhenana (Imhoff, 1852) dans la rivière Kyll (SW de l'Allemagne) [Ephemeroptera : Oligoneuriidae]
Mot-clés : Oligoneuriella rhenana, cycle biologique, timing d'émergence, oviposition, Allemagne.
1) Le cycle biologique d'Oligoneuriella rhenana a été étudié par prélèvements foulés au pied de 2 min pendant la période d' occurrence du stade préimaginal. Six prélèvements ont été effectués de mai à août dans la rivière Kyll près de Trier (bassin-versant du Rhin). O. rhenana est une espèce estivale univoltine ; elle passe l'hiver à l'état d'œufs et présente une seule génération, à croissance extrêmement rapide, qui émerge en juillet et août. 2) La détermination du sexe des larves au dessus de 8-10 mm a révélé une sex ratio voisine de 50:50. 3) Les adultes d'O. rhenana volant en essaims horizontalement au dessus de la surface de l'eau ont été récoltés au filet entomologique par balayages successifs au hasard durant leur période d'émergence quotidienne, et les changements dans les proportions des sexes et des stades subimaginal et imaginal on été examinés. 4)L'émergence a lieu principalement pendant une période de 1 ½ h, débutant peu après le coucher du soleil. Les subimagos mâles émergent de façon synchrone et muent en imagos sur une période de 30 minutes précédant immédiatement l'émergence des subimagos femelles. 5) Les femelles s'accouplent au stade subimaginal, et la mue imaginale a lieu durant le vol qui suit l'accouplement, avant l'oviposition, cette dernière se déroulant en trois fois environ. 6) La durée de vie des stades ailés es extrêmement brève, en moyenne d'environ 40 minutes chez les mâles et d'environ 50 minutes chez les femelles. 7) Il a été observé que l'oviposition se déroule en plusieurs fois, les femelles quittant la surface agitée de l'eau à plusieurs reprise. Du fait que ailes d'Oligoneuriella ne s'exuvient pas, les caractéristiques hydrophobes de soies subimaginales apparaissent comme un avantage réel.
1. Introduction
The life-cycle of Oligoneuriella rhenana has been described in general or in detail several times as a univoltine summer cycle by several different European authors e.g. GRANDI, 1947, PINET, 1962, SOWA, 1975, FENOGLIO et al. 2005 and others. Interestingly, little information on its life cycle in the Rhine River, after which this species was named, has been published, and there are only general descriptions on the time of occurrence of larvae and the flight period e.g. in NEERACHER, 1910, SCHOENEMUND, 1930 or JANSEN, 2000. A full life cycle, however has never been published from this area or from any other region in Germany.
The imaginal flight of Oligoneuriella rhenana has attracted early the attention of entomologists, especially in the case of mass flights (e.g. STEINMANN, 1919 or BURMEISTER, 1989), and there are detailed descriptions on abiotic factors influencing the emergence, as well as on flight behaviour (PINET, 1962, 1967, FISCHER, 1991, STEINMANN, 1919, GRANDI, 1947, GRIMM, 1988). However, a detailed description of the timing of emergence is missing and this paper represents the first detailed description of the life cycle from Germany.
2. Materials and Methods
Study site
The study was conducted in the lower reach of the Kyll River at Kordel (long. 6°38' E, lat. 39°, 45' N), a 4 th -order left-handed tributary of the River Mosel near the City of Trier. The Mosel River has its confluence with the Rhine River at Koblenz. At Kordel the river is about 10-15m wide and the water flow is very rapid and turbulent. The main substratum is stones about 30-40 cm in diameter and pebbles. Larvae were collected about 100 m downstream, while imagoes were collected directly above the only bridge in Kordel.
Larvae
Larvae were sampled by 2 min kick samples with a hand-net (mesh width 0,5 mm), monthly from January to May and from September to December, and 14-daily from June to August. Specimens of O. rhenana were preserved in 70% ethyl alcohol solution. Their lengths without cerci were measured to the nearest 0,1 mm by use of a Wild-M3 stereo-microscope and a measuring graticule. Starting with samples from the end of June, and with an average size of about 8-10 mm it was possible to sex the larvae using the well-known sexual dimorphism of the eyes as the main criterion (cf. GRANDI, 1947). Simple size-frequency distribution was used to demonstrate the life-cycle.
Imagoes
On August, 4 th 1994 a spectacular mass flight took place at the Kyll River. The time of appearance of the swarm was noted as well as the "behaviour" of the male swarm. The horizontal speed of the male-flight, which took place directly in front of two bridge piers, was about 2m/s. Three years later, on August 6 th , 1997 an experiment was conducted to elaborate details on the timing of emergence in the different flight stages of Oligoneuriella largely following the methods introduced by WATANABE et al. (1989). Soon after sunset (~ 8. 00 p.m.) the first male sub-imagoes appeared. The imagoes and sub-imagoes swarming over the water surface were collected by random strokes through the air with an insect net of 40 cm diameter at a place about 3-5 m upstream of the bridge, where the water was about 30 cm deep. A tenstroke sweep was made every 10 min throughout the duration of the swarming, except for the last 30 min, where 15 min intervals were used. The specimens of O. rhenana were preserved in 70% ethyl alcohol solution. They were divided into their corresponding stages and sexes using GRIMM'S (1988) features for separation: ♂-Sub-imago: tails almost as long as the body, ♂-Imago, tails longer than the body, ♀-Sub-imago: tails with distinct fringes, ♀-Imago: tails without fringes. In addition, in female imagoes the degree of completeness of the eggs in the abdomen was noted, because several females were observed to lay some of their eggs on the water surface, drifting for several metres in the current, and then leaving the water again.
3. Results
Life cycle
The seasonal development of larvae in 1995 based on larval length without cerci is shown in fig. 1. Nymphs were first collected on 15 May. Nymphs larger than 8-10 mm were generally sexed after 29 June to estimate larval sex-ratios. No larvae were detected on April, 13 th , so that, judging from the mean size of 2,65 mm in the middle of May, egg-hatching most probably occurred between the middle and end of April in 1995. Collections on Sept. 14 th were unsuccessful, so that we can conclude that the full development from hatching to emergence took place within approximately 3½ months.
The growth of the larvae in this species is extraordinarily fast and impressive, as has been mentioned by several authors before. In the Kyll River Oligoneuriella larvae grow on average between 0,2-0,3 mm per day from mid-June to the end of July. Flexible strategies are known for O. rhenana with regard to thermal regimes (cf. FENOGLIO et al. 2005). In the Kyll River increasing growth is correlated with increasing water temperatures and the emergence begins at the highest water temperatures (Fig. 1), but note that only single temperature values from the sampling dates are available.
Sex ratio and size
Last instar larvae (with black wing pads) of both sexes show size differences (Table 1). Mature female larvae are approximately 3 mm larger than male larvae.
Sexing of larva was possible in 362 larvae: 180 were female, 182 male. There is therefore a strong indication that the sex ratio in Oligoneuriella rhenana is about 50:50.
Table 1. Mean size of fullgrown larvae showing sexual dimorphism.
| Date: July 29th., 1995 | Size (mm) : mean ± standard deviation |
|---|---|
| Sex ♂-larva (last instar) | 14,8 ± 1,0 |
| ♀-larva (last instar) | 18,1 ± 0,9 |
Tableau 1. Taille moyenne des larves en fin de développement, montrant le dimorphisme sexuel.
Fig. 1 Life cycle of Oligoneuriella rhenana (Imhoff) in the River Kyll. Boxes cover all larvae within a 0,5 mm size class. Simple size frequency is shown. Black boxes indicate the occurrence of last instar larvae, arrows indicate time of emergence. Black spots indicate water temperatures at sampling dates (~12.00 a.m.). Numbers below the dates refer to the number of classified specimen. Figured larva from SCHOENEMUND, 1930.
Fig. 1. Cycle biologique d'Oligoneuriella rhenana (Imhoff) dans la rivière Kyll. Les histogrammes rendent compte de la taille de toutes les larves par classes de 0,5 mm. Les parties foncées indiquent la présence de larves au dernier stade; les flèches indiquent la période d'émergence. Les ponts noirs indiquent la température de l'eau aux dates de prélèvements (~ 12.00 a.m.). Au-dessous des dates, les nombres correspondent aux spécimens classés. Figure de la larve empruntée à Schoenemund, 1930.
Timing of emergence
Table 2 shows the number of male sub-imagoes, male imagoes, female sub-imagoes, and female imagoes caught by the insect net from the swarm at successive sampling times on 6 August 1997, and Fig. 2 shows the same data normalized to 100%. To estimate whether females lay their eggs in one batch, or in several, female imagoes were separated into three categories: First, females with complete egg packages in their abdomen, prior to egg laying. Second, females that had partly laid their eggs, and third, females without eggs.
0
0
Table 2: Timing of emergence of O. rhenana in the Kyll River on August, 6 th , 1997 Tableau 2. Timing de l'émergence d'O. rhenana, rivière Kyll, le 6 août 1997.
The large majority of O. rhenana emerged synchronously within 40 min. After that time almost only egg laying female imagoes were recorded. Male emergence began abruptly at around 8. 10 p.m. At first male sub-imagoes appeared, but the proportion of male imagoes increased rapidly and within 20 min after detection of swarming adults, almost all males had moulted to imagoes during swarming, as is well known for this species. After this female sub-imagoes appeared. This stage is highly underrepresented in our data because emerging females were rapidly mated by patrolling males and then hidden away as couples high over the swarm. After a further 10 minutes the majority of specimens had be<cursor_is_here> Note that in O. rhenana moulting occurs during flight, so that in adoption of this behaviour, the wings must remain unmoulted. Within another 10 min. at 9. 00 p.m. almost only female stages were captured.
Life span of adults
Individual life span may depend largely on environmental factors during flight, especially temperature or general weather influences such as rain, storm, etc. STEINMANN (1919) reports a 2-4 hr life span for captured individuals which had no possibility for flight. Our data based on more natural conditions suggest that the life span of male adults is on average about 40 min, and that of female adults a little longer at about 50 min, in concordance with the field observations of FISCHER (1991). This is one of the shortest life spans of mayflies at all, and only Behningiidae are known to have as short or shorter life spans. In both families adults are rapid horizontal flyers, and females are mated as subimagoes.
Fig. 2. Timing de l'émergence d'O. rhenana. La représentation des apparitions successives des subimagos mâles, imagos mâles, subimagoes femelles, imagos femelles, et les femelles en oviposition est effectuée selon les données du Tableau 2.
Egg laying
O. rhenana females were observed to lay the eggs directly on the water surface, but only in lotic areas with turbulent water and rapid flow. Females drifted 3-5 m with the current and then left the surface to fly into the swarm again. It was not possible to observe whether they were mated again, but this can't be excluded. Based on observations of the "degree of emptiness" of the abdomen in the captured female imagoes, it is suggested that females lay their eggs in at least 3 batches, and not in 1 large batch. There is perhaps some variability in egg-laying behaviour, dependent on the size of the females, and therefore in the temperature regime of the river in general.
4. Discussion
The current study confirmed that O. rhenana is a univoltine summer species with overwintering eggs and a rapid, temperature dependant growth during spring and summer. Our data also confirmed the observations and experiments of STEINMANN (1919), GRANDI (1947) and GRIMM (1988) that female sub-imagoes of O. rhenana are mated by maleimagoes. The mating flight of this species is shown to be highly synchronic, and males appear very shortly before females. This kind of protandry is well known for many short living mass flyers, mainly of larger rivers, such as Dolania americana (Behningiidae: PETERS & PETERS, 1977), Ephoron virgo (Polymitarcyidae: KURECK & FONTES, 1996) or Palingenia longicauda (Palingeniidae: RUSSEV, 1987), and is related to an optimal mating strategy in males
(WATANABE et al., 1989). It is important to note that females lay their eggs in batches, leaving the turbulent water surface on several occasions. For such behaviour the remaining subimaginal haired cuticle of the wings, having hydophobic properties, is advantageous (cf. EDMUNDS & MCCAFFERTY, 1988).
Acknowledgements
Dr. Andrea Buffagni (Brugherio) is thanked for his kind support with an Excel-program for plotting size-frequency distributions, Prof. Dr. R. Rupprecht and Dipl.-Biol. R. Mauden (Zoological Inst. of University of Mainz) for field assistance. Craig Macadam (Ephemeroptera Recording Scheme, UK) is sincerely thanked for correcting the English text and for helpful comments on the manuscript.
References
BURMEISTER, E.G. 1989. Das Massenschwärmen von Flußinsekten - ein an unseren großen Flüssen verschwundenes Phänomen. Verhandlungen des westdeutschen Entomologentags, 1988 : 59-74
EDMUNDS, G.F. JR. & W.P. MCCAFFERTY 1988. The Mayfly Subimago. Annual Review of Entomology, 33 : 509-529.
FENOGLIO, S., BO, T., BATTEGAZZORE, M., MORISI, A. 2005. Growth of Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera : Oligoneuriidae) in Two Rivers with Contrasting Temperatures in NW Italy. Zoological Studies, 44(2) : 271-274.
FISCHER, C. 1991. Evolution des Schwarmfluges und Flugverhalten der Ephemeroptera. Dissertation Universität Erlangen, Nürnberg VI, 172 pp.
GRANDI, M. 1947. Contributi allo studio degli "Efemeroidei" italiani. IX. Oligoneuriella rhenana Imh. Bolletino dell'Istituto di Entomologia della R. Università di Bologna, 16 : 176-218.
GRIMM, R. 1988. Zur Eintagsfliegenfauna der Donauzuflüsse Rot und Rauglen (Baden-Württemberg) (Insecta, Ephemeroptera). Nachrichtenblatt der Bayerischen Entomologen, 37 : 73-83.
JANSEN, W. 2000. Bestandssituation der "Rheinmücke" Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera, Oligoneuriidae) in Deutschland. Verhandlungen des westdeutschen Entomologentags, 1998 : 173-185.
KURECK, A., FONTES, R.J. 1996. The life cycle and emergence of Ephoron virgo, a large potamal mayfly that has returned to the River Rhine. Archiv für Hydrobiologie, Suppl. 113 (1-4) : 319-323.
NEERACHER, F. 1910. Die Insektenfauna des Rheins und seiner Zuflüsse bei Basel. Revue Suisse de Zoologie 18 : 497-590.
PETERS, W.L., PETERS, J.G. 1977. Adult life and emergence of Dolania americana in Northwestern Florida (Ephemeroptera : Behningiidae). Internationale Revue der gesamten Hydrobiologie, 62 : 409-438.
PINET, J.M. 1962. Observations sur la biologie et l'ecologie d'Oligoneuriella rhenana Imhoff (Ephemeroptera). Annales de la Station centrale d'Hydrobiologie appliquée, 9 : 303-332.
PINET, J.M. 1967. Observations sur le vol crépusculaire d'Oligoneuriella rhenana Imhoff (Ephem. Oligoneuriidae). Bulletin de la Société Entomologique de France, 72 (5-6) : 144-155.
RUSSEV, B. 1987. Ecology, life history and distribution of Palingenia longicauda(Olivier) (Ephemeroptera). Tijdschrift voor Entomologie, 130 : 109-127.
SCHOENEMUND, E. 1930 Eintagsfliegen oder Ephemeroptera In: Dahl (ed.) Die Tierwelt Deutschlands und der angrenzenden Meeresgebiete, 19 : 107 pp. Fischer, Jena
SOWA, R. 1975. Ecology and biogeography of mayflies (Ephemeroptera) of running waters in the Polish part of the Carpathians. 2. Life cycles. Acta Hydrobiologica Krakow 17(4) : 319-353.
STEINMANN, P. 1919. Zur Kenntnis der Eintagsfliege Oligoneuria rhenana. Mitteilungen der Aargauischen Naturforschenden Gesellschaft, 15 : 58-75.
WATANABE, N.C., Yoshitaka, I., Mori, I. 1989. Timing of emergence of males and females of Ephoron shigae (Ephemeroptera : Polymitarcyidae). Freshwater biology 21 : 473-476.
(appeared in April 2006)
</text>
|
[
{
"content": "<url>\nhttp://ephemeroptera.de/pdf-files/42_Haybach_2006p1_A5867.pdf\n</url>\n<text>\nLife cycle and timing of emergence , 1852)\n\nof Oligoneuriella rhenana (IMHOFF in the Kyll River (SW-Germany) [Ephemeroptera : Oligoneuriidae]\n\nby Arne HAYBACH\n\nTannenweg 3, D- 55129 Mainz, E-mail : [email protected]\n\nKeywords : Oligoneuriella rhenana, life cycle, timing of emergence, egg-laying, Germany\n\n1) The life cycle of Oligoneuriella rhenana was studied by 2 min kick samples during the period of occurrence of preimaginal stages. Six samples were carried out from May to August in the Kyll River near Trier (Rhine catchment). O. rhenana is a univoltine summer species with overwintering eggs and a single extremely fast growing generation that emerges in July and August. 2) Larvae larger than 8-10 mm were sexed, and the sex ratio was about 50:50. 3) Winged adults of O. rhenana swarming horizontally over the water surface were collected by successive random sweeps during their daily emergence period, and the changes in sex and stage composition were examined. 4) The emergence occurred mainly during a 1½ h period beginning some time after sunset. Male sub-imagoes emerged synchronously and moulted to imagoes in a 30 min period immediately prior to the emergence of female sub-imagoes. 5) Females were mated as sub-imagoes, and the imaginal moult took place during flight after mating, prior to egg-laying, which was done in about 3 batches. 6) Life span of winged stages is extremely short and lasts on average about 40 min in males and about 50 min in females. 7) Egg laying was observed to be completed in several batches, with the females leaving the turbulent water surface several times. As the wings of Oligoneuriella remain unmoulted, the hydrophobic quality of the subimaginal hairs is thought to be advantageous for this.\n\nCycle biologique et timing de l'émergence d'Oligoneuriella rhenana (Imhoff, 1852) dans la rivière Kyll (SW de l'Allemagne) [Ephemeroptera : Oligoneuriidae]\n\nMot-clés : Oligoneuriella rhenana, cycle biologique, timing d'émergence, oviposition, Allemagne.\n\n1) Le cycle biologique d'Oligoneuriella rhenana a été étudié par prélèvements foulés au pied de 2 min pendant la période d' occurrence du stade préimaginal. Six prélèvements ont été effectués de mai à août dans la rivière Kyll près de Trier (bassin-versant du Rhin). O. rhenana est une espèce estivale univoltine ; elle passe l'hiver à l'état d'œufs et présente une seule génération, à croissance extrêmement rapide, qui émerge en juillet et août. 2) La détermination du sexe des larves au dessus de 8-10 mm a révélé une sex ratio voisine de 50:50. 3) Les adultes d'O. rhenana volant en essaims horizontalement au dessus de la surface de l'eau ont été récoltés au filet entomologique par balayages successifs au hasard durant leur période d'émergence quotidienne, et les changements dans les proportions des sexes et des stades subimaginal et imaginal on été examinés. 4)L'émergence a lieu principalement pendant une période de 1 ½ h, débutant peu après le coucher du soleil. Les subimagos mâles émergent de façon synchrone et muent en imagos sur une période de 30 minutes précédant immédiatement l'émergence des subimagos femelles. 5) Les femelles s'accouplent au stade subimaginal, et la mue imaginale a lieu durant le vol qui suit l'accouplement, avant l'oviposition, cette dernière se déroulant en trois fois environ. 6) La durée de vie des stades ailés es extrêmement brève, en moyenne d'environ 40 minutes chez les mâles et d'environ 50 minutes chez les femelles. 7) Il a été observé que l'oviposition se déroule en plusieurs fois, les femelles quittant la surface agitée de l'eau à plusieurs reprise. Du fait que ailes d'Oligoneuriella ne s'exuvient pas, les caractéristiques hydrophobes de soies subimaginales apparaissent comme un avantage réel.\n\n1. Introduction\n\nThe life-cycle of Oligoneuriella rhenana has been described in general or in detail several times as a univoltine summer cycle by several different European authors e.g. GRANDI, 1947, PINET, 1962, SOWA, 1975, FENOGLIO et al. 2005 and others. Interestingly, little information on its life cycle in the Rhine River, after which this species was named, has been published, and there are only general descriptions on the time of occurrence of larvae and the flight period e.g. in NEERACHER, 1910, SCHOENEMUND, 1930 or JANSEN, 2000. A full life cycle, however has never been published from this area or from any other region in Germany.\n\nThe imaginal flight of Oligoneuriella rhenana has attracted early the attention of entomologists, especially in the case of mass flights (e.g. STEINMANN, 1919 or BURMEISTER, 1989), and there are detailed descriptions on abiotic factors influencing the emergence, as well as on flight behaviour (PINET, 1962, 1967, FISCHER, 1991, STEINMANN, 1919, GRANDI, 1947, GRIMM, 1988). However, a detailed description of the timing of emergence is missing and this paper represents the first detailed description of the life cycle from Germany.\n\n2. Materials and Methods\n\nStudy site\n\nThe study was conducted in the lower reach of the Kyll River at Kordel (long. 6°38' E, lat. 39°, 45' N), a 4 th -order left-handed tributary of the River Mosel near the City of Trier. The Mosel River has its confluence with the Rhine River at Koblenz. At Kordel the river is about 10-15m wide and the water flow is very rapid and turbulent. The main substratum is stones about 30-40 cm in diameter and pebbles. Larvae were collected about 100 m downstream, while imagoes were collected directly above the only bridge in Kordel.\n\nLarvae\n\nLarvae were sampled by 2 min kick samples with a hand-net (mesh width 0,5 mm), monthly from January to May and from September to December, and 14-daily from June to August. Specimens of O. rhenana were preserved in 70% ethyl alcohol solution. Their lengths without cerci were measured to the nearest 0,1 mm by use of a Wild-M3 stereo-microscope and a measuring graticule. Starting with samples from the end of June, and with an average size of about 8-10 mm it was possible to sex the larvae using the well-known sexual dimorphism of the eyes as the main criterion (cf. GRANDI, 1947). Simple size-frequency distribution was used to demonstrate the life-cycle.\n\nImagoes\n\nOn August, 4 th 1994 a spectacular mass flight took place at the Kyll River. The time of appearance of the swarm was noted as well as the \"behaviour\" of the male swarm. The horizontal speed of the male-flight, which took place directly in front of two bridge piers, was about 2m/s. Three years later, on August 6 th , 1997 an experiment was conducted to elaborate details on the timing of emergence in the different flight stages of Oligoneuriella largely following the methods introduced by WATANABE et al. (1989). Soon after sunset (~ 8. 00 p.m.) the first male sub-imagoes appeared. The imagoes and sub-imagoes swarming over the water surface were collected by random strokes through the air with an insect net of 40 cm diameter at a place about 3-5 m upstream of the bridge, where the water was about 30 cm deep. A tenstroke sweep was made every 10 min throughout the duration of the swarming, except for the last 30 min, where 15 min intervals were used. The specimens of O. rhenana were preserved in 70% ethyl alcohol solution. They were divided into their corresponding stages and sexes using GRIMM'S (1988) features for separation: ♂-Sub-imago: tails almost as long as the body, ♂-Imago, tails longer than the body, ♀-Sub-imago: tails with distinct fringes, ♀-Imago: tails without fringes. In addition, in female imagoes the degree of completeness of the eggs in the abdomen was noted, because several females were observed to lay some of their eggs on the water surface, drifting for several metres in the current, and then leaving the water again.\n\n3. Results\n\nLife cycle\n\nThe seasonal development of larvae in 1995 based on larval length without cerci is shown in fig. 1. Nymphs were first collected on 15 May. Nymphs larger than 8-10 mm were generally sexed after 29 June to estimate larval sex-ratios. No larvae were detected on April, 13 th , so that, judging from the mean size of 2,65 mm in the middle of May, egg-hatching most probably occurred between the middle and end of April in 1995. Collections on Sept. 14 th were unsuccessful, so that we can conclude that the full development from hatching to emergence took place within approximately 3½ months.\n\nThe growth of the larvae in this species is extraordinarily fast and impressive, as has been mentioned by several authors before. In the Kyll River Oligoneuriella larvae grow on average between 0,2-0,3 mm per day from mid-June to the end of July. Flexible strategies are known for O. rhenana with regard to thermal regimes (cf. FENOGLIO et al. 2005). In the Kyll River increasing growth is correlated with increasing water temperatures and the emergence begins at the highest water temperatures (Fig. 1), but note that only single temperature values from the sampling dates are available.\n\nSex ratio and size\n\nLast instar larvae (with black wing pads) of both sexes show size differences (Table 1). Mature female larvae are approximately 3 mm larger than male larvae.\n\nSexing of larva was possible in 362 larvae: 180 were female, 182 male. There is therefore a strong indication that the sex ratio in Oligoneuriella rhenana is about 50:50.\n\nTable 1. Mean size of fullgrown larvae showing sexual dimorphism.\n\n| Date: July 29th., 1995 | Size (mm) : mean ± standard deviation |\n|---|---|\n| Sex ♂-larva (last instar) | 14,8 ± 1,0 |\n| ♀-larva (last instar) | 18,1 ± 0,9 |\n\nTableau 1. Taille moyenne des larves en fin de développement, montrant le dimorphisme sexuel.\n\nFig. 1 Life cycle of Oligoneuriella rhenana (Imhoff) in the River Kyll. Boxes cover all larvae within a 0,5 mm size class. Simple size frequency is shown. Black boxes indicate the occurrence of last instar larvae, arrows indicate time of emergence. Black spots indicate water temperatures at sampling dates (~12.00 a.m.). Numbers below the dates refer to the number of classified specimen. Figured larva from SCHOENEMUND, 1930.\nFig. 1. Cycle biologique d'Oligoneuriella rhenana (Imhoff) dans la rivière Kyll. Les histogrammes rendent compte de la taille de toutes les larves par classes de 0,5 mm. Les parties foncées indiquent la présence de larves au dernier stade; les flèches indiquent la période d'émergence. Les ponts noirs indiquent la température de l'eau aux dates de prélèvements (~ 12.00 a.m.). Au-dessous des dates, les nombres correspondent aux spécimens classés. Figure de la larve empruntée à Schoenemund, 1930.\n\nTiming of emergence\n\nTable 2 shows the number of male sub-imagoes, male imagoes, female sub-imagoes, and female imagoes caught by the insect net from the swarm at successive sampling times on 6 August 1997, and Fig. 2 shows the same data normalized to 100%. To estimate whether females lay their eggs in one batch, or in several, female imagoes were separated into three categories: First, females with complete egg packages in their abdomen, prior to egg laying. Second, females that had partly laid their eggs, and third, females without eggs.\n\n0\n\n0\n\nTable 2: Timing of emergence of O. rhenana in the Kyll River on August, 6 th , 1997 Tableau 2. Timing de l'émergence d'O. rhenana, rivière Kyll, le 6 août 1997.\n\nThe large majority of O. rhenana emerged synchronously within 40 min. After that time almost only egg laying female imagoes were recorded. Male emergence began abruptly at around 8. 10 p.m. At first male sub-imagoes appeared, but the proportion of male imagoes increased rapidly and within 20 min after detection of swarming adults, almost all males had moulted to imagoes during swarming, as is well known for this species. After this female sub-imagoes appeared. This stage is highly underrepresented in our data because emerging females were rapidly mated by patrolling males and then hidden away as couples high over the swarm. After a further 10 minutes the majority of specimens had be<cursor_is_here> Note that in O. rhenana moulting occurs during flight, so that in adoption of this behaviour, the wings must remain unmoulted. Within another 10 min. at 9. 00 p.m. almost only female stages were captured.\n\nLife span of adults\n\nIndividual life span may depend largely on environmental factors during flight, especially temperature or general weather influences such as rain, storm, etc. STEINMANN (1919) reports a 2-4 hr life span for captured individuals which had no possibility for flight. Our data based on more natural conditions suggest that the life span of male adults is on average about 40 min, and that of female adults a little longer at about 50 min, in concordance with the field observations of FISCHER (1991). This is one of the shortest life spans of mayflies at all, and only Behningiidae are known to have as short or shorter life spans. In both families adults are rapid horizontal flyers, and females are mated as subimagoes.\n\nFig. 2. Timing de l'émergence d'O. rhenana. La représentation des apparitions successives des subimagos mâles, imagos mâles, subimagoes femelles, imagos femelles, et les femelles en oviposition est effectuée selon les données du Tableau 2.\n\nEgg laying\n\nO. rhenana females were observed to lay the eggs directly on the water surface, but only in lotic areas with turbulent water and rapid flow. Females drifted 3-5 m with the current and then left the surface to fly into the swarm again. It was not possible to observe whether they were mated again, but this can't be excluded. Based on observations of the \"degree of emptiness\" of the abdomen in the captured female imagoes, it is suggested that females lay their eggs in at least 3 batches, and not in 1 large batch. There is perhaps some variability in egg-laying behaviour, dependent on the size of the females, and therefore in the temperature regime of the river in general.\n\n4. Discussion\n\nThe current study confirmed that O. rhenana is a univoltine summer species with overwintering eggs and a rapid, temperature dependant growth during spring and summer. Our data also confirmed the observations and experiments of STEINMANN (1919), GRANDI (1947) and GRIMM (1988) that female sub-imagoes of O. rhenana are mated by maleimagoes. The mating flight of this species is shown to be highly synchronic, and males appear very shortly before females. This kind of protandry is well known for many short living mass flyers, mainly of larger rivers, such as Dolania americana (Behningiidae: PETERS & PETERS, 1977), Ephoron virgo (Polymitarcyidae: KURECK & FONTES, 1996) or Palingenia longicauda (Palingeniidae: RUSSEV, 1987), and is related to an optimal mating strategy in males\n\n(WATANABE et al., 1989). It is important to note that females lay their eggs in batches, leaving the turbulent water surface on several occasions. For such behaviour the remaining subimaginal haired cuticle of the wings, having hydophobic properties, is advantageous (cf. EDMUNDS & MCCAFFERTY, 1988).\n\nAcknowledgements\n\nDr. Andrea Buffagni (Brugherio) is thanked for his kind support with an Excel-program for plotting size-frequency distributions, Prof. Dr. R. Rupprecht and Dipl.-Biol. R. Mauden (Zoological Inst. of University of Mainz) for field assistance. Craig Macadam (Ephemeroptera Recording Scheme, UK) is sincerely thanked for correcting the English text and for helpful comments on the manuscript.\n\nReferences\n\nBURMEISTER, E.G. 1989. Das Massenschwärmen von Flußinsekten - ein an unseren großen Flüssen verschwundenes Phänomen. Verhandlungen des westdeutschen Entomologentags, 1988 : 59-74\nEDMUNDS, G.F. JR. & W.P. MCCAFFERTY 1988. The Mayfly Subimago. Annual Review of Entomology, 33 : 509-529.\nFENOGLIO, S., BO, T., BATTEGAZZORE, M., MORISI, A. 2005. Growth of Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera : Oligoneuriidae) in Two Rivers with Contrasting Temperatures in NW Italy. Zoological Studies, 44(2) : 271-274.\nFISCHER, C. 1991. Evolution des Schwarmfluges und Flugverhalten der Ephemeroptera. Dissertation Universität Erlangen, Nürnberg VI, 172 pp.\nGRANDI, M. 1947. Contributi allo studio degli \"Efemeroidei\" italiani. IX. Oligoneuriella rhenana Imh. Bolletino dell'Istituto di Entomologia della R. Università di Bologna, 16 : 176-218.\nGRIMM, R. 1988. Zur Eintagsfliegenfauna der Donauzuflüsse Rot und Rauglen (Baden-Württemberg) (Insecta, Ephemeroptera). Nachrichtenblatt der Bayerischen Entomologen, 37 : 73-83.\nJANSEN, W. 2000. Bestandssituation der \"Rheinmücke\" Oligoneuriella rhenana (Imhoff, 1852) (Ephemeroptera, Oligoneuriidae) in Deutschland. Verhandlungen des westdeutschen Entomologentags, 1998 : 173-185.\nKURECK, A., FONTES, R.J. 1996. The life cycle and emergence of Ephoron virgo, a large potamal mayfly that has returned to the River Rhine. Archiv für Hydrobiologie, Suppl. 113 (1-4) : 319-323.\nNEERACHER, F. 1910. Die Insektenfauna des Rheins und seiner Zuflüsse bei Basel. Revue Suisse de Zoologie 18 : 497-590.\nPETERS, W.L., PETERS, J.G. 1977. Adult life and emergence of Dolania americana in Northwestern Florida (Ephemeroptera : Behningiidae). Internationale Revue der gesamten Hydrobiologie, 62 : 409-438.\nPINET, J.M. 1962. Observations sur la biologie et l'ecologie d'Oligoneuriella rhenana Imhoff (Ephemeroptera). Annales de la Station centrale d'Hydrobiologie appliquée, 9 : 303-332.\nPINET, J.M. 1967. Observations sur le vol crépusculaire d'Oligoneuriella rhenana Imhoff (Ephem. Oligoneuriidae). Bulletin de la Société Entomologique de France, 72 (5-6) : 144-155.\nRUSSEV, B. 1987. Ecology, life history and distribution of Palingenia longicauda(Olivier) (Ephemeroptera). Tijdschrift voor Entomologie, 130 : 109-127.\nSCHOENEMUND, E. 1930 Eintagsfliegen oder Ephemeroptera In: Dahl (ed.) Die Tierwelt Deutschlands und der angrenzenden Meeresgebiete, 19 : 107 pp. Fischer, Jena\nSOWA, R. 1975. Ecology and biogeography of mayflies (Ephemeroptera) of running waters in the Polish part of the Carpathians. 2. Life cycles. Acta Hydrobiologica Krakow 17(4) : 319-353.\nSTEINMANN, P. 1919. Zur Kenntnis der Eintagsfliege Oligoneuria rhenana. Mitteilungen der Aargauischen Naturforschenden Gesellschaft, 15 : 58-75.\nWATANABE, N.C., Yoshitaka, I., Mori, I. 1989. Timing of emergence of males and females of Ephoron shigae (Ephemeroptera : Polymitarcyidae). Freshwater biology 21 : 473-476.\n\n(appeared in April 2006)\n</text>\n",
"role": "user"
},
{
"content": "en mated and fully moulted female imagoes occurred to begin egg laying.",
"role": "assistant"
}
] |
PROPERTY DEVELOPMENT MASTERCLASS
The Masterclass is a comprehensive two-day intensive course with leading industry experts to take you through all the aspects you need to take your development career to the next level:
MAJOR TOPICS COVERED:
- Structuring
- Asset Protection and Risk Mitigation
- Legal Documentation
- Attracting Investors and Financing the Project
- Finding a Site and Case Study
- Market Research and Sales Strategies
- Due Diligence and Financial feasibility
- Completing the Project
REGISTER NOW
Course includes:
- All course materials
- Catering for all meals and breaks including Friday networking session with hosted drinks and canapes
- Access to course materials and add-ons via login access following the event
REGULAR PRICE: $2,750
Property Development Masterclass has been approved for 8 MFAA CPD hours.
Business Concepts Group
Suite 1, Level 1, 333 Whitehorse Road Balwyn, VIC, 3103
03 9816 4200
[email protected]
Liability limited by a scheme approved under Professional Standards Legislation
## PROPERTY DEVELOPMENT MASTERCLASS
### COURSE AGENDA
| Time | Day 1 Morning | Day 2 Morning |
|---------------|----------------------------------------------------|----------------------------------------------------|
| 8:30AM - 6:00PM | Registration and light breakfast | Light breakfast |
| | Course and Attendee Introduction | Finding Development Sites - David Hunt & Domenic Suleman |
| | Be Development Ready - Chris Reed | |
| 9:30 - 10:30 | Be Development Ready - Chris Reed | |
| 10:45 - 11:45 | Legal Documentation - Stephanie McGrath | Attracting Investors - Peter Hutchinson & Domenic Suleman |
| 11:45 - 1:15 | | Case Study - John Spurigan |
### LUNCH
| Time | Day 1 Afternoon | Day 2 Afternoon |
|---------------|----------------------------------------------------|----------------------------------------------------|
| 2:00 - 3:30 | Research Your Market - Heath Thompson | Due Diligence and Financial Feasibility - Domenic Suleman |
| 3:50 - 5:20 | Financing the Project - Matthew Royal | Project Completion - Chris Reed |
| 5:20 - 5:30 | Review and Wrap up | Review and Wrap up |
| 6:00 | Drinks and Networking | |
Be Development Ready
So what is your plan? Property Development is like any business activity, whether it is for a ‘single one-off’ project or you are looking to make a career out of property development, you need to have a plan to succeed.
This session looks at addressing all the issues to you need look at prior to entering into any property development transaction including:
- **Understand your Business Model**
What’s your plan? Are you an active or passive developer? Are you looking to establish a brand?
- **Asset Protection**
‘Get your House in order’ before embarking on a project. Protect your personal assets from the risk of the property development, including estate planning considerations
- **Understand the Risk**
Assess the various types of risk in property development and understand your level of acceptable risk
- **Structures**
Understand the various structures available
Special Purpose Vehicles (SPVs)
Structuring for:
- flexibility
- Investors
- Outcomes
- Service Entities
Legal Documentation
The legal documentation is often one of the areas in property development that is given the least thought. Many developers seek out legal advisors based on costs rather than their expertise. It is only usually once you reach a hurdle in a project that a developer realises the importance of good legal documentation.
In this session we have one of Melbourne’s leading legal advisors to private property developers that will be presenting on the various type of legal agreements in property development, what should and shouldn’t be included in these agreements and when they should be used;
- Investor agreements; Head of Agreement, Joint Venture, Shareholder, Unit holder
- Purchasing Agreements; Options, Contracts of Sale. Conditional terms etc.
- Contract of sale; terms and special conditions, off the plan sales, sunset clauses etc.
- Consultants and DM Agreements
- Construction and Building Contracts
- S173 Agreements
- General Tricks and Traps
Research your Market
Some developers often have a concept in mind for their development but often don’t consider if the development actually has a market in the area they are looking to develop.
In this session we have some leading experts in market research and sales and marketing of property development projects that will help you to better understand;
- Your product
- Who your market is
- Research data available
- The current Melbourne market
- Marketing trends for projects
- Effective sales strategies
- Understand how Channel sales are used to support financial close
Financing
Having a great project and equity is only the start. You still need to finance the project which can often be difficult without a solid track record of property development. Understanding the general finance terms and conditions are essential and are particularly important in the financial feasibility stage when preparing your cash flows, financial ratios, time frames and equity levels.
Assisting to present this session will be a leading expert in property development financing and will address such issues as:
- Development financing terms and conditions
- Minimum Financial ratios for the project
- Issues around guarantees
- Alternate financing solutions
- Benchmark interest rates and charges
- How to best present the project for financing
Finding Development Sites
Having a process and a good team can help you make sure you are selecting sites that are going to work, and also allows you to explore different development options for those sites.
In this session we talk through the consideration when selecting a site including:
- Policy, zoning and overlays
- Early site assessments
- Tools and resources for gathering data and information
Case Study - Finding a Site
Developer John Spurigan of MILA Development Group will use actual developments as live case studies and talk through how he found the sites, and multiple options that had to be explored to arrive at the optimal use of the sites.
- Site Selection
- Development Options
- Decision Making
Attracting Investors
The key to getting any project off the ground is actually being able to have the equity to get started. Many developers new to the industry often look to commence their projects with very no or little money and therefore rely heavily on raising equity through investors. Without ‘the runs on the board’ it is often difficult for a developer to attract investors and give them the confidence of your ability to deliver a project.
In this sessions we will cover off:
- Alternative ways to structure a deal to attract investors to your project.
- How to present the deal to potential investors
- Understanding the needs of your targeted investors
- Issues surrounding licensing requirements with promoting to investors
Due Diligence and Feasibility
Before making the decision to commit to any project, every property developer needs a sound process of completing their due diligence and conducting a financial feasibility to make sure that the project ‘stacks up’. This is an area that many get completely wrong particularly newer developers that don’t pay respect to effort required at this stage.
It is crucial that any financial feasibility is not just a one page document that is based around general rules of thumb and proper consideration is made to factors such as:
- Risk and reward
- Timing of events and payments
- Various federal and taxes
- Authority contributions and bonds
- Cash flow planning
- Investors’ expectations
- Financial ratios required for debt funding
- Corporate governance.
- Contingencies
- Variance analysis
Tax, GST and Project Completion
So you are coming to the end of your project but what are the main areas that you need address to wrap up the project?
In this session we will look at:
- Record Keeping and Reporting
- Taxation considerations including GST, the margin scheme, income tax and CGT issues, stamp duty
- Settlement related issues and risks
- Winding Up development entities
Domenic Suleman is a director of Business Concepts Group and leads the Property Services and Lending Divisions.
Domenic’s extensive range of skills and qualifications, combined with his many years of experience, set him apart as an adviser. He has an accounting, tax and business advisory background and is an FCPA, holds a Real Estate Agent License, is a lending specialist and is a certified member of MFAA (Mortgage and Finance Association of Australia).
Business Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.
The ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:
- Large Scale Property Developers
- Property Development Syndicates
- Emerging/New Property Developers
- Property Developers conducting ‘One-Off’ projects
- Land Bankers
- SMSF Property Development
Chris Reed is a director of Business Concepts Group and leads the business advisory, superannuation and financial planning divisions.
Chris is a FCPA (financial planning specialist) and SMSF Specialist with the SMSF Association and has over 20 years’ experience advising property developers on projects of all sizes from simple backyard subdivisions right through to large scale apartment projects.
Business Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.
The ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:
- Large Scale Property Developers
- Property Development Syndicates
- Emerging/New Property Developers
- Property Developers conducting ‘One-Off’ projects
- Land Bankers
- SMSF Property Development
For Heath, experience, professionalism and accurate information are key in achieving successful results for his clients. Heath grew up in a property development family and completed a Bachelor of Business Property at RMIT specialising in Property Valuations.
This was followed by more than 12 years completing a variety of development projects, ranging from apartments to hotel accommodation across Melbourne and country Victoria.
Heath has developed a depth of experience across multiple property sectors and understands the pressures and challenges that a property developer faces better than most.
Away from the office, Heath loves spending time with his wife Sophie and two children Harvey and Maisey, as well as watching his beloved St Kilda.
Heath shares his extensive real estate expertise to help his clients improve the value of their property assets through strategic development and effective marketing.
Matthew Royal
Development Finance Partners
Director
Matthew has extensive experience in the Real Estate and Finance Industries.
Prior to co-founding Airlisting.com & Development Finance Partners Pty Ltd, Matthew Royal was an Associate Director of Property Finance BankWest.
He has exceptional knowledge and understanding of the financial criteria and methodology used in assessing Property Development and Investment proposals.
Matthew advises Property Developers how to optimise the financing and marketing of their projects to achieve strategic improvements.
Matthew has participated in the negotiation and consummation of numerous significant transactions involving Property Development Loans, Corporate Loan Notes, Equity Partners, Mezzanine Finance, Joint Venture Partners and Construction Finance Loans.
Matthew is regularly quoted by major media outlets such as the AFR and The Australian and is a regular key note speaker, panel expert and moderator at various industry functions such as Urbanity'17 & '18, Property Finance Masterclass Presenter, Basis Point Non-Bank and Aus-China Financing Conferences, Euromoney Annual Distressed Debt and Restructuring Conference, Urbandeveloper.com special event series, PDM Group, Property Developers Association, BCG Finance Masterclass Educational Courses.
Stephanie McGrath
twenty20 Legal
Principal
Stephanie is Principal of twenty20 legal and brings with her over 12 years’ experience in commercial law with a focus on property development, acquisitions, disposals and similar property transactions across Australia.
She has been a presenter on Legal Documentation in the Property Development Masterclass since 2016. Stephanie provides legal solutions to property developers, builders, project managers, property professionals and investors through all aspects of structuring, financing, carrying out and sale of a variety of developments and property ventures including: due diligence, advising on ownership structures, application of relevant taxes and stamp duties, negotiating and drafting commercial agreements and resolving commercial disputes.
She utilises her technical knowledge coupled with strategic commercial solutions to assist clients to achieve their commercial goals and realise the best possible outcome. As a boutique, innovative firm, twenty20 legal offers a clear vision: Clear advice. Clear about costs. Making law easier.
Peter Hutchinson
Master Capital Group
Managing Director
Peter founded Master Capital in 2014 to create and manage investments in residential property and for Master Capital to co-invest alongside its clients.
Peter first worked as an electrical tradesman on construction sites. He jointly owned and managed a building automation and controls business before being (Vic) State Service Manager with Environmental Automation.
Master Capital builds on Peter’s diverse managerial and business career experience over the past 25 years in engineering, construction, and property investment companies.
He was a Director of Bendigo Bank’s Mt Eliza Community Branch and chaired its Investment and Business Growth Committee.
The Master Capital Group teams with successful development and project professionals to provide investment opportunities in premium residential property developments for a client base of individuals and self managed superannuation funds who are wholesale investors. Our objective is to generate superior returns and diversify risk.
John Spurigan is an entrepreneur with a unique background in Engineering, Applied Science (Computer) and Aviation (First Officer).
Having spent more than a decade in industries that value systems & processes as a way of driving standards he discovered his passion for property development in 2010.
John is not only passionate about property development but an evangelist for creating financial freedom through property development for others.
His skills and background have lead to a unique and repeatable way of finding suburbs and sites to invest in and create wealth through 'small' developments ($3 - $15M).
David Hunt has over 25 years of experience in the Australian Property sector. David owned a Real Estate Agency in Sydney earlier in his career and over the past 16 years has held leadership roles in construction and property data businesses.
He is the former Executive National Sales Manager of Cordell Information and a former Senior Manager at CoreLogic (RP Data). David has 'sales and business development in his DNA' and is an advocate of businesses across the property and construction sector using technology, and data driven insights to help achieve their business objectives.
David came into Archistar in early 2018 as Head of Sales to help founders Dr Ben Coorey and Rob Coorey commercialise the ground-breaking Property Platform which helps users find and analyse development sites, and includes world first parametric design generators.
The business has grown rapidly with a customer base across Property Developers, Property Professionals, Architects, Consultants and Government. David holds a Bachelor of Business in Land Economics, has undertaken a Building Diploma and is completing an MBA at Macquarie Graduate School of Management.
|
fc5f9561-ea0d-4153-a2d0-ea62b4f22841
|
CC-MAIN-2021-43
|
https://www.buscgroup.com.au/wp-content/uploads/2021/09/2022-MC-PDM-Full-Course-Information-1.pdf
|
2021-10-16T12:42:22+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00267-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 836,102,174
| 3,170
|
eng_Latn
|
eng_Latn
| 0.989669
|
eng_Latn
| 0.99525
|
[
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
1035,
2870,
4875,
6221,
7686,
8899,
10037,
11116,
12036,
13350,
14445,
15497,
16113,
17266
] |
PROPERTY DEVELOPMENT MASTERCLASS
The Masterclass is a comprehensive two-day intensive course with leading industry experts to take you through all the aspects you need to take your development career to the next level:
MAJOR TOPICS COVERED:
- Structuring
- Asset Protection and Risk Mitigation
- Legal Documentation
- Attracting Investors and Financing the Project
- Finding a Site and Case Study
- Market Research and Sales Strategies
- Due Diligence and Financial feasibility
- Completing the Project
REGISTER NOW
Course includes:
- All course materials
- Catering for all meals and breaks including Friday networking session with hosted drinks and canapes
- Access to course materials and add-ons via login access following the event
REGULAR PRICE: $2,750
Property Development Masterclass has been approved for 8 MFAA CPD hours.
Business Concepts Group
Suite 1, Level 1, 333 Whitehorse Road Balwyn, VIC, 3103
03 9816 4200
[email protected]
Liability limited by a scheme approved under Professional Standards Legislation
## PROPERTY DEVELOPMENT MASTERCLASS
### COURSE AGENDA
| Time | Day 1 Morning | Day 2 Morning |
|---------------|----------------------------------------------------|----------------------------------------------------|
| 8:30AM - 6:00PM | Registration and light breakfast | Light breakfast |
| | Course and Attendee Introduction | Finding Development Sites - David Hunt & Domenic Suleman |
| | Be Development Ready - Chris Reed | |
| 9:30 - 10:30 | Be Development Ready - Chris Reed | |
| 10:45 - 11:45 | Legal Documentation - Stephanie McGrath | Attracting Investors - Peter Hutchinson & Domenic Suleman |
| 11:45 - 1:15 | | Case Study - John Spurigan |
### LUNCH
| Time | Day 1 Afternoon | Day 2 Afternoon |
|---------------|----------------------------------------------------|----------------------------------------------------|
| 2:00 - 3:30 | Research Your Market - Heath Thompson | Due Diligence and Financial Feasibility - Domenic Suleman |
| 3:50 - 5:20 | Financing the Project - Matthew Royal | Project Completion - Chris Reed |
| 5:20 - 5:30 | Review and Wrap up | Review and Wrap up |
| 6:00 | Drinks and Networking | |
Be Development Ready
So what is your plan? Property Development is like any business activity, whether it is for a ‘single one-off’ project or you are looking to make a career out of property development, you need to have a plan to succeed.
This session looks at addressing all the issues to you need look at prior to entering into any property development transaction including:
- **Understand your Business Model**
What’s your plan? Are you an active or passive developer? Are you looking to establish a brand?
- **Asset Protection**
‘Get your House in order’ before embarking on a project. Protect your personal assets from the risk of the property development, including estate planning considerations
- **Understand the Risk**
Assess the various types of risk in property development and understand your level of acceptable risk
- **Structures**
Understand the various structures available
Special Purpose Vehicles (SPVs)
Structuring for:
- flexibility
- Investors
- Outcomes
- Service Entities
Legal Documentation
The legal documentation is often one of the areas in property development that is given the least thought. Many developers seek out legal advisors based on costs rather than their expertise. It is only usually once you reach a hurdle in a project that a developer realises the importance of good legal documentation.
In this session we have one of Melbourne’s leading legal advisors to private property developers that will be presenting on the various type of legal agreements in property development, what should and shouldn’t be included in these agreements and when they should be used;
- Investor agreements; Head of Agreement, Joint Venture, Shareholder, Unit holder
- Purchasing Agreements; Options, Contracts of Sale. Conditional terms etc.
- Contract of sale; terms and special conditions, off the plan sales, sunset clauses etc.
- Consultants and DM Agreements
- Construction and Building Contracts
- S173 Agreements
- General Tricks and Traps
Research your Market
Some developers often have a concept in mind for their development but often don’t consider if the development actually has a market in the area they are looking to develop.
In this session we have some leading experts in market research and sales and marketing of property development projects that will help you to better understand;
- Your product
- Who your market is
- Research data available
- The current Melbourne market
- Marketing trends for projects
- Effective sales strategies
- Understand how Channel sales are used to support financial close
Financing
Having a great project and equity is only the start. You still need to finance the project which can often be difficult without a solid track record of property development. Understanding the general finance terms and conditions are essential and are particularly important in the financial feasibility stage when preparing your cash flows, financial ratios, time frames and equity levels.
Assisting to present this session will be a leading expert in property development financing and will address such issues as:
- Development financing terms and conditions
- Minimum Financial ratios for the project
- Issues around guarantees
- Alternate financing solutions
- Benchmark interest rates and charges
- How to best present the project for financing
Finding Development Sites
Having a process and a good team can help you make sure you are selecting sites that are going to work, and also allows you to explore different development options for those sites.
In this session we talk through the consideration when selecting a site including:
- Policy, zoning and overlays
- Early site assessments
- Tools and resources for gathering data and information
Case Study - Finding a Site
Developer John Spurigan of MILA Development Group will use actual developments as live case studies and talk through how he found the sites, and multiple options that had to be explored to arrive at the optimal use of the sites.
- Site Selection
- Development Options
- Decision Making
Attracting Investors
The key to getting any project off the ground is actually being able to have the equity to get started. Many developers new to the industry often look to commence their projects with very no or little money and therefore rely heavily on raising equity through investors. Without ‘the runs on the board’ it is often difficult for a developer to attract investors and give them the confidence of your ability to deliver a project.
In this sessions we will cover off:
- Alternative ways to structure a deal to attract investors to your project.
- How to present the deal to potential investors
- Understanding the needs of your targeted investors
- Issues surrounding licensing requirements with promoting to investors
Due Diligence and Feasibility
Before making the decision to commit to any project, every property developer needs a sound process of completing their due diligence and conducting a financial feasibility to make sure that the project ‘stacks up’. This is an area that many get completely wrong particularly newer developers that don’t pay respect to effort required at this stage.
It is crucial that any financial feasibility is not just a one page document that is based around general rules of thumb and proper consideration is made to factors such as:
- Risk and reward
- Timing of events and payments
- Various federal and taxes
- Authority contributions and bonds
- Cash flow planning
- Investors’ expectations
- Financial ratios required for debt funding
- Corporate governance.
- Contingencies
- Variance analysis
Tax, GST and Project Completion
So you are coming to the end of your project but what are the main areas that you need address to wrap up the project?
In this session we will look at:
- Record Keeping and Reporting
- Taxation considerations including GST, the margin scheme, income tax and CGT issues, stamp duty
- Settlement related issues and risks
- Winding Up development entities
Domenic Suleman is a director of Business Concepts Group and leads the Property Services and Lending Divisions.
Domenic’s extensive range of skills and qualifications, combined with his many years of experience, set him apart as an adviser. He has an accounting, tax and business advisory background and is an FCPA, holds a Real Estate Agent License, is a lending specialist and is a certified member of MFAA (Mortgage and Finance Association of Australia).
Business Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.
The ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:
- Large Scale Property Developers
- Property Development Syndicates
- Emerging/New Property Developers
- Property Developers conducting ‘One-Off’ projects
- Land Bankers
- SMSF Property Development
Chris Reed is a director of Business Concepts Group and leads the business advisory, superannuation and financial planning divisions.
Chris is a FCPA (financial planning specialist) and SMSF Specialist with the SMSF Association and has over 20 years’ experience advising property developers on projects of all sizes from simple backyard subdivisions right through to large scale apartment projects.
Business Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.
The ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:
- Large Scale Property Developers
- Property Development Syndicates
- Emerging/New Property Developers
- Property Developers conducting ‘One-Off’ projects
- Land Bankers
- SMSF Property Development
For Heath, experience, professionalism and accurate information are key in achieving successful results for his clients. Heath grew up in a property development family and completed a Bachelor of Business Property at RMIT specialising in Property Valuations.
This was followed by more than 12 years completing a variety of development projects, ranging from apartments to hotel accommodation across Melbourne and country Victoria.
Heath has developed a depth of experience across multiple property sectors and understands the pressures and challenges that a property developer faces better than most.
Away from the office, Heath loves spending time with his wife Sophie and two children Harvey and Maisey, as well as watching his beloved St Kilda.
Heath shares his extensive real estate expertise to help his clients improve the value of their property assets through strategic development and effective marketing.
Matthew Royal
Development Finance Partners
Director
Matthew has extensive experience in the Real Estate and Finance Industries.
Prior to co-founding Airlisting.com & Development Finance Partners Pty Ltd, Matthew Royal was an Associate Director of Property Finance BankWest.
He has exceptional knowledge and understanding of the financial criteria and methodology used in assessing Property Development and Investment proposals.
Matthew advises Property Developers how to optimise the financing and marketing of their projects to achieve strategic improvements.
Matthew has participated in the negotiation and consummation of numerous significant transac
|
tions involving Property Development Loans, Corporate Loan Notes, Equity Partners, Mezzanine Finance, Joint Venture Partners and Construction Finance Loans.
|
Matthew is regularly quoted by major media outlets such as the AFR and The Australian and is a regular key note speaker, panel expert and moderator at various industry functions such as Urbanity'17 & '18, Property Finance Masterclass Presenter, Basis Point Non-Bank and Aus-China Financing Conferences, Euromoney Annual Distressed Debt and Restructuring Conference, Urbandeveloper.com special event series, PDM Group, Property Developers Association, BCG Finance Masterclass Educational Courses.
Stephanie McGrath
twenty20 Legal
Principal
Stephanie is Principal of twenty20 legal and brings with her over 12 years’ experience in commercial law with a focus on property development, acquisitions, disposals and similar property transactions across Australia.
She has been a presenter on Legal Documentation in the Property Development Masterclass since 2016. Stephanie provides legal solutions to property developers, builders, project managers, property professionals and investors through all aspects of structuring, financing, carrying out and sale of a variety of developments and property ventures including: due diligence, advising on ownership structures, application of relevant taxes and stamp duties, negotiating and drafting commercial agreements and resolving commercial disputes.
She utilises her technical knowledge coupled with strategic commercial solutions to assist clients to achieve their commercial goals and realise the best possible outcome. As a boutique, innovative firm, twenty20 legal offers a clear vision: Clear advice. Clear about costs. Making law easier.
Peter Hutchinson
Master Capital Group
Managing Director
Peter founded Master Capital in 2014 to create and manage investments in residential property and for Master Capital to co-invest alongside its clients.
Peter first worked as an electrical tradesman on construction sites. He jointly owned and managed a building automation and controls business before being (Vic) State Service Manager with Environmental Automation.
Master Capital builds on Peter’s diverse managerial and business career experience over the past 25 years in engineering, construction, and property investment companies.
He was a Director of Bendigo Bank’s Mt Eliza Community Branch and chaired its Investment and Business Growth Committee.
The Master Capital Group teams with successful development and project professionals to provide investment opportunities in premium residential property developments for a client base of individuals and self managed superannuation funds who are wholesale investors. Our objective is to generate superior returns and diversify risk.
John Spurigan is an entrepreneur with a unique background in Engineering, Applied Science (Computer) and Aviation (First Officer).
Having spent more than a decade in industries that value systems & processes as a way of driving standards he discovered his passion for property development in 2010.
John is not only passionate about property development but an evangelist for creating financial freedom through property development for others.
His skills and background have lead to a unique and repeatable way of finding suburbs and sites to invest in and create wealth through 'small' developments ($3 - $15M).
David Hunt has over 25 years of experience in the Australian Property sector. David owned a Real Estate Agency in Sydney earlier in his career and over the past 16 years has held leadership roles in construction and property data businesses.
He is the former Executive National Sales Manager of Cordell Information and a former Senior Manager at CoreLogic (RP Data). David has 'sales and business development in his DNA' and is an advocate of businesses across the property and construction sector using technology, and data driven insights to help achieve their business objectives.
David came into Archistar in early 2018 as Head of Sales to help founders Dr Ben Coorey and Rob Coorey commercialise the ground-breaking Property Platform which helps users find and analyse development sites, and includes world first parametric design generators.
The business has grown rapidly with a customer base across Property Developers, Property Professionals, Architects, Consultants and Government. David holds a Bachelor of Business in Land Economics, has undertaken a Building Diploma and is completing an MBA at Macquarie Graduate School of Management.
| 12,692
|
inside_word
|
transactions
|
remove_one_sentence
|
<url>
https://www.buscgroup.com.au/wp-content/uploads/2021/09/2022-MC-PDM-Full-Course-Information-1.pdf
</url>
<text>
PROPERTY DEVELOPMENT MASTERCLASS
The Masterclass is a comprehensive two-day intensive course with leading industry experts to take you through all the aspects you need to take your development career to the next level:
MAJOR TOPICS COVERED:
- Structuring
- Asset Protection and Risk Mitigation
- Legal Documentation
- Attracting Investors and Financing the Project
- Finding a Site and Case Study
- Market Research and Sales Strategies
- Due Diligence and Financial feasibility
- Completing the Project
REGISTER NOW
Course includes:
- All course materials
- Catering for all meals and breaks including Friday networking session with hosted drinks and canapes
- Access to course materials and add-ons via login access following the event
REGULAR PRICE: $2,750
Property Development Masterclass has been approved for 8 MFAA CPD hours.
Business Concepts Group
Suite 1, Level 1, 333 Whitehorse Road Balwyn, VIC, 3103
03 9816 4200
[email protected]
Liability limited by a scheme approved under Professional Standards Legislation
## PROPERTY DEVELOPMENT MASTERCLASS
### COURSE AGENDA
| Time | Day 1 Morning | Day 2 Morning |
|---------------|----------------------------------------------------|----------------------------------------------------|
| 8:30AM - 6:00PM | Registration and light breakfast | Light breakfast |
| | Course and Attendee Introduction | Finding Development Sites - David Hunt & Domenic Suleman |
| | Be Development Ready - Chris Reed | |
| 9:30 - 10:30 | Be Development Ready - Chris Reed | |
| 10:45 - 11:45 | Legal Documentation - Stephanie McGrath | Attracting Investors - Peter Hutchinson & Domenic Suleman |
| 11:45 - 1:15 | | Case Study - John Spurigan |
### LUNCH
| Time | Day 1 Afternoon | Day 2 Afternoon |
|---------------|----------------------------------------------------|----------------------------------------------------|
| 2:00 - 3:30 | Research Your Market - Heath Thompson | Due Diligence and Financial Feasibility - Domenic Suleman |
| 3:50 - 5:20 | Financing the Project - Matthew Royal | Project Completion - Chris Reed |
| 5:20 - 5:30 | Review and Wrap up | Review and Wrap up |
| 6:00 | Drinks and Networking | |
Be Development Ready
So what is your plan? Property Development is like any business activity, whether it is for a ‘single one-off’ project or you are looking to make a career out of property development, you need to have a plan to succeed.
This session looks at addressing all the issues to you need look at prior to entering into any property development transaction including:
- **Understand your Business Model**
What’s your plan? Are you an active or passive developer? Are you looking to establish a brand?
- **Asset Protection**
‘Get your House in order’ before embarking on a project. Protect your personal assets from the risk of the property development, including estate planning considerations
- **Understand the Risk**
Assess the various types of risk in property development and understand your level of acceptable risk
- **Structures**
Understand the various structures available
Special Purpose Vehicles (SPVs)
Structuring for:
- flexibility
- Investors
- Outcomes
- Service Entities
Legal Documentation
The legal documentation is often one of the areas in property development that is given the least thought. Many developers seek out legal advisors based on costs rather than their expertise. It is only usually once you reach a hurdle in a project that a developer realises the importance of good legal documentation.
In this session we have one of Melbourne’s leading legal advisors to private property developers that will be presenting on the various type of legal agreements in property development, what should and shouldn’t be included in these agreements and when they should be used;
- Investor agreements; Head of Agreement, Joint Venture, Shareholder, Unit holder
- Purchasing Agreements; Options, Contracts of Sale. Conditional terms etc.
- Contract of sale; terms and special conditions, off the plan sales, sunset clauses etc.
- Consultants and DM Agreements
- Construction and Building Contracts
- S173 Agreements
- General Tricks and Traps
Research your Market
Some developers often have a concept in mind for their development but often don’t consider if the development actually has a market in the area they are looking to develop.
In this session we have some leading experts in market research and sales and marketing of property development projects that will help you to better understand;
- Your product
- Who your market is
- Research data available
- The current Melbourne market
- Marketing trends for projects
- Effective sales strategies
- Understand how Channel sales are used to support financial close
Financing
Having a great project and equity is only the start. You still need to finance the project which can often be difficult without a solid track record of property development. Understanding the general finance terms and conditions are essential and are particularly important in the financial feasibility stage when preparing your cash flows, financial ratios, time frames and equity levels.
Assisting to present this session will be a leading expert in property development financing and will address such issues as:
- Development financing terms and conditions
- Minimum Financial ratios for the project
- Issues around guarantees
- Alternate financing solutions
- Benchmark interest rates and charges
- How to best present the project for financing
Finding Development Sites
Having a process and a good team can help you make sure you are selecting sites that are going to work, and also allows you to explore different development options for those sites.
In this session we talk through the consideration when selecting a site including:
- Policy, zoning and overlays
- Early site assessments
- Tools and resources for gathering data and information
Case Study - Finding a Site
Developer John Spurigan of MILA Development Group will use actual developments as live case studies and talk through how he found the sites, and multiple options that had to be explored to arrive at the optimal use of the sites.
- Site Selection
- Development Options
- Decision Making
Attracting Investors
The key to getting any project off the ground is actually being able to have the equity to get started. Many developers new to the industry often look to commence their projects with very no or little money and therefore rely heavily on raising equity through investors. Without ‘the runs on the board’ it is often difficult for a developer to attract investors and give them the confidence of your ability to deliver a project.
In this sessions we will cover off:
- Alternative ways to structure a deal to attract investors to your project.
- How to present the deal to potential investors
- Understanding the needs of your targeted investors
- Issues surrounding licensing requirements with promoting to investors
Due Diligence and Feasibility
Before making the decision to commit to any project, every property developer needs a sound process of completing their due diligence and conducting a financial feasibility to make sure that the project ‘stacks up’. This is an area that many get completely wrong particularly newer developers that don’t pay respect to effort required at this stage.
It is crucial that any financial feasibility is not just a one page document that is based around general rules of thumb and proper consideration is made to factors such as:
- Risk and reward
- Timing of events and payments
- Various federal and taxes
- Authority contributions and bonds
- Cash flow planning
- Investors’ expectations
- Financial ratios required for debt funding
- Corporate governance.
- Contingencies
- Variance analysis
Tax, GST and Project Completion
So you are coming to the end of your project but what are the main areas that you need address to wrap up the project?
In this session we will look at:
- Record Keeping and Reporting
- Taxation considerations including GST, the margin scheme, income tax and CGT issues, stamp duty
- Settlement related issues and risks
- Winding Up development entities
Domenic Suleman is a director of Business Concepts Group and leads the Property Services and Lending Divisions.
Domenic’s extensive range of skills and qualifications, combined with his many years of experience, set him apart as an adviser. He has an accounting, tax and business advisory background and is an FCPA, holds a Real Estate Agent License, is a lending specialist and is a certified member of MFAA (Mortgage and Finance Association of Australia).
Business Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.
The ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:
- Large Scale Property Developers
- Property Development Syndicates
- Emerging/New Property Developers
- Property Developers conducting ‘One-Off’ projects
- Land Bankers
- SMSF Property Development
Chris Reed is a director of Business Concepts Group and leads the business advisory, superannuation and financial planning divisions.
Chris is a FCPA (financial planning specialist) and SMSF Specialist with the SMSF Association and has over 20 years’ experience advising property developers on projects of all sizes from simple backyard subdivisions right through to large scale apartment projects.
Business Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.
The ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:
- Large Scale Property Developers
- Property Development Syndicates
- Emerging/New Property Developers
- Property Developers conducting ‘One-Off’ projects
- Land Bankers
- SMSF Property Development
For Heath, experience, professionalism and accurate information are key in achieving successful results for his clients. Heath grew up in a property development family and completed a Bachelor of Business Property at RMIT specialising in Property Valuations.
This was followed by more than 12 years completing a variety of development projects, ranging from apartments to hotel accommodation across Melbourne and country Victoria.
Heath has developed a depth of experience across multiple property sectors and understands the pressures and challenges that a property developer faces better than most.
Away from the office, Heath loves spending time with his wife Sophie and two children Harvey and Maisey, as well as watching his beloved St Kilda.
Heath shares his extensive real estate expertise to help his clients improve the value of their property assets through strategic development and effective marketing.
Matthew Royal
Development Finance Partners
Director
Matthew has extensive experience in the Real Estate and Finance Industries.
Prior to co-founding Airlisting.com & Development Finance Partners Pty Ltd, Matthew Royal was an Associate Director of Property Finance BankWest.
He has exceptional knowledge and understanding of the financial criteria and methodology used in assessing Property Development and Investment proposals.
Matthew advises Property Developers how to optimise the financing and marketing of their projects to achieve strategic improvements.
Matthew has participated in the negotiation and consummation of numerous significant transac<cursor_is_here>
Matthew is regularly quoted by major media outlets such as the AFR and The Australian and is a regular key note speaker, panel expert and moderator at various industry functions such as Urbanity'17 & '18, Property Finance Masterclass Presenter, Basis Point Non-Bank and Aus-China Financing Conferences, Euromoney Annual Distressed Debt and Restructuring Conference, Urbandeveloper.com special event series, PDM Group, Property Developers Association, BCG Finance Masterclass Educational Courses.
Stephanie McGrath
twenty20 Legal
Principal
Stephanie is Principal of twenty20 legal and brings with her over 12 years’ experience in commercial law with a focus on property development, acquisitions, disposals and similar property transactions across Australia.
She has been a presenter on Legal Documentation in the Property Development Masterclass since 2016. Stephanie provides legal solutions to property developers, builders, project managers, property professionals and investors through all aspects of structuring, financing, carrying out and sale of a variety of developments and property ventures including: due diligence, advising on ownership structures, application of relevant taxes and stamp duties, negotiating and drafting commercial agreements and resolving commercial disputes.
She utilises her technical knowledge coupled with strategic commercial solutions to assist clients to achieve their commercial goals and realise the best possible outcome. As a boutique, innovative firm, twenty20 legal offers a clear vision: Clear advice. Clear about costs. Making law easier.
Peter Hutchinson
Master Capital Group
Managing Director
Peter founded Master Capital in 2014 to create and manage investments in residential property and for Master Capital to co-invest alongside its clients.
Peter first worked as an electrical tradesman on construction sites. He jointly owned and managed a building automation and controls business before being (Vic) State Service Manager with Environmental Automation.
Master Capital builds on Peter’s diverse managerial and business career experience over the past 25 years in engineering, construction, and property investment companies.
He was a Director of Bendigo Bank’s Mt Eliza Community Branch and chaired its Investment and Business Growth Committee.
The Master Capital Group teams with successful development and project professionals to provide investment opportunities in premium residential property developments for a client base of individuals and self managed superannuation funds who are wholesale investors. Our objective is to generate superior returns and diversify risk.
John Spurigan is an entrepreneur with a unique background in Engineering, Applied Science (Computer) and Aviation (First Officer).
Having spent more than a decade in industries that value systems & processes as a way of driving standards he discovered his passion for property development in 2010.
John is not only passionate about property development but an evangelist for creating financial freedom through property development for others.
His skills and background have lead to a unique and repeatable way of finding suburbs and sites to invest in and create wealth through 'small' developments ($3 - $15M).
David Hunt has over 25 years of experience in the Australian Property sector. David owned a Real Estate Agency in Sydney earlier in his career and over the past 16 years has held leadership roles in construction and property data businesses.
He is the former Executive National Sales Manager of Cordell Information and a former Senior Manager at CoreLogic (RP Data). David has 'sales and business development in his DNA' and is an advocate of businesses across the property and construction sector using technology, and data driven insights to help achieve their business objectives.
David came into Archistar in early 2018 as Head of Sales to help founders Dr Ben Coorey and Rob Coorey commercialise the ground-breaking Property Platform which helps users find and analyse development sites, and includes world first parametric design generators.
The business has grown rapidly with a customer base across Property Developers, Property Professionals, Architects, Consultants and Government. David holds a Bachelor of Business in Land Economics, has undertaken a Building Diploma and is completing an MBA at Macquarie Graduate School of Management.
</text>
|
[
{
"content": "<url>\nhttps://www.buscgroup.com.au/wp-content/uploads/2021/09/2022-MC-PDM-Full-Course-Information-1.pdf\n</url>\n<text>\nPROPERTY DEVELOPMENT MASTERCLASS\n\nThe Masterclass is a comprehensive two-day intensive course with leading industry experts to take you through all the aspects you need to take your development career to the next level:\n\nMAJOR TOPICS COVERED:\n- Structuring\n- Asset Protection and Risk Mitigation\n- Legal Documentation\n- Attracting Investors and Financing the Project\n- Finding a Site and Case Study\n- Market Research and Sales Strategies\n- Due Diligence and Financial feasibility\n- Completing the Project\n\nREGISTER NOW\n\nCourse includes:\n- All course materials\n- Catering for all meals and breaks including Friday networking session with hosted drinks and canapes\n- Access to course materials and add-ons via login access following the event\n\nREGULAR PRICE: $2,750\n\nProperty Development Masterclass has been approved for 8 MFAA CPD hours.\n\nBusiness Concepts Group\nSuite 1, Level 1, 333 Whitehorse Road Balwyn, VIC, 3103\n03 9816 4200\[email protected]\n\nLiability limited by a scheme approved under Professional Standards Legislation\n\n## PROPERTY DEVELOPMENT MASTERCLASS\n\n### COURSE AGENDA\n\n| Time | Day 1 Morning | Day 2 Morning |\n|---------------|----------------------------------------------------|----------------------------------------------------|\n| 8:30AM - 6:00PM | Registration and light breakfast | Light breakfast |\n| | Course and Attendee Introduction | Finding Development Sites - David Hunt & Domenic Suleman |\n| | Be Development Ready - Chris Reed | |\n| 9:30 - 10:30 | Be Development Ready - Chris Reed | |\n| 10:45 - 11:45 | Legal Documentation - Stephanie McGrath | Attracting Investors - Peter Hutchinson & Domenic Suleman |\n| 11:45 - 1:15 | | Case Study - John Spurigan |\n\n### LUNCH\n\n| Time | Day 1 Afternoon | Day 2 Afternoon |\n|---------------|----------------------------------------------------|----------------------------------------------------|\n| 2:00 - 3:30 | Research Your Market - Heath Thompson | Due Diligence and Financial Feasibility - Domenic Suleman |\n| 3:50 - 5:20 | Financing the Project - Matthew Royal | Project Completion - Chris Reed |\n| 5:20 - 5:30 | Review and Wrap up | Review and Wrap up |\n| 6:00 | Drinks and Networking | |\n\nBe Development Ready\n\nSo what is your plan? Property Development is like any business activity, whether it is for a ‘single one-off’ project or you are looking to make a career out of property development, you need to have a plan to succeed.\n\nThis session looks at addressing all the issues to you need look at prior to entering into any property development transaction including:\n\n- **Understand your Business Model**\n What’s your plan? Are you an active or passive developer? Are you looking to establish a brand?\n\n- **Asset Protection**\n ‘Get your House in order’ before embarking on a project. Protect your personal assets from the risk of the property development, including estate planning considerations\n\n- **Understand the Risk**\n Assess the various types of risk in property development and understand your level of acceptable risk\n\n- **Structures**\n Understand the various structures available\n Special Purpose Vehicles (SPVs)\n Structuring for:\n - flexibility\n - Investors\n - Outcomes\n - Service Entities\n\nLegal Documentation\n\nThe legal documentation is often one of the areas in property development that is given the least thought. Many developers seek out legal advisors based on costs rather than their expertise. It is only usually once you reach a hurdle in a project that a developer realises the importance of good legal documentation.\n\nIn this session we have one of Melbourne’s leading legal advisors to private property developers that will be presenting on the various type of legal agreements in property development, what should and shouldn’t be included in these agreements and when they should be used;\n\n- Investor agreements; Head of Agreement, Joint Venture, Shareholder, Unit holder\n- Purchasing Agreements; Options, Contracts of Sale. Conditional terms etc.\n- Contract of sale; terms and special conditions, off the plan sales, sunset clauses etc.\n- Consultants and DM Agreements\n- Construction and Building Contracts\n- S173 Agreements\n- General Tricks and Traps\n\nResearch your Market\n\nSome developers often have a concept in mind for their development but often don’t consider if the development actually has a market in the area they are looking to develop.\n\nIn this session we have some leading experts in market research and sales and marketing of property development projects that will help you to better understand;\n\n- Your product\n- Who your market is\n- Research data available\n- The current Melbourne market\n- Marketing trends for projects\n- Effective sales strategies\n- Understand how Channel sales are used to support financial close\n\nFinancing\n\nHaving a great project and equity is only the start. You still need to finance the project which can often be difficult without a solid track record of property development. Understanding the general finance terms and conditions are essential and are particularly important in the financial feasibility stage when preparing your cash flows, financial ratios, time frames and equity levels.\n\nAssisting to present this session will be a leading expert in property development financing and will address such issues as:\n\n- Development financing terms and conditions\n- Minimum Financial ratios for the project\n- Issues around guarantees\n- Alternate financing solutions\n- Benchmark interest rates and charges\n- How to best present the project for financing\n\nFinding Development Sites\n\nHaving a process and a good team can help you make sure you are selecting sites that are going to work, and also allows you to explore different development options for those sites.\n\nIn this session we talk through the consideration when selecting a site including:\n\n- Policy, zoning and overlays\n- Early site assessments\n- Tools and resources for gathering data and information\n\nCase Study - Finding a Site\n\nDeveloper John Spurigan of MILA Development Group will use actual developments as live case studies and talk through how he found the sites, and multiple options that had to be explored to arrive at the optimal use of the sites.\n\n- Site Selection\n- Development Options\n- Decision Making\n\nAttracting Investors\n\nThe key to getting any project off the ground is actually being able to have the equity to get started. Many developers new to the industry often look to commence their projects with very no or little money and therefore rely heavily on raising equity through investors. Without ‘the runs on the board’ it is often difficult for a developer to attract investors and give them the confidence of your ability to deliver a project.\n\nIn this sessions we will cover off:\n\n- Alternative ways to structure a deal to attract investors to your project.\n- How to present the deal to potential investors\n- Understanding the needs of your targeted investors\n- Issues surrounding licensing requirements with promoting to investors\n\nDue Diligence and Feasibility\n\nBefore making the decision to commit to any project, every property developer needs a sound process of completing their due diligence and conducting a financial feasibility to make sure that the project ‘stacks up’. This is an area that many get completely wrong particularly newer developers that don’t pay respect to effort required at this stage.\n\nIt is crucial that any financial feasibility is not just a one page document that is based around general rules of thumb and proper consideration is made to factors such as:\n\n- Risk and reward\n- Timing of events and payments\n- Various federal and taxes\n- Authority contributions and bonds\n- Cash flow planning\n- Investors’ expectations\n- Financial ratios required for debt funding\n- Corporate governance.\n- Contingencies\n- Variance analysis\n\nTax, GST and Project Completion\n\nSo you are coming to the end of your project but what are the main areas that you need address to wrap up the project?\n\nIn this session we will look at:\n\n- Record Keeping and Reporting\n- Taxation considerations including GST, the margin scheme, income tax and CGT issues, stamp duty\n- Settlement related issues and risks\n- Winding Up development entities\n\nDomenic Suleman is a director of Business Concepts Group and leads the Property Services and Lending Divisions.\n\nDomenic’s extensive range of skills and qualifications, combined with his many years of experience, set him apart as an adviser. He has an accounting, tax and business advisory background and is an FCPA, holds a Real Estate Agent License, is a lending specialist and is a certified member of MFAA (Mortgage and Finance Association of Australia).\n\nBusiness Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.\n\nThe ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:\n\n- Large Scale Property Developers\n- Property Development Syndicates\n- Emerging/New Property Developers\n- Property Developers conducting ‘One-Off’ projects\n- Land Bankers\n- SMSF Property Development\n\nChris Reed is a director of Business Concepts Group and leads the business advisory, superannuation and financial planning divisions.\n\nChris is a FCPA (financial planning specialist) and SMSF Specialist with the SMSF Association and has over 20 years’ experience advising property developers on projects of all sizes from simple backyard subdivisions right through to large scale apartment projects.\n\nBusiness Concepts Group assists private property developers in every aspect of their project in order to help derisk and de-stress all elements of the property development cycle.\n\nThe ability to assist developers comes from BCG’s multi-disciplinary approach where they provide a total and holistic service offering for property developers that extends far beyond the normal accounting, taxation and advisory services of a typical accounting firm. BCG services are tailored for:\n\n- Large Scale Property Developers\n- Property Development Syndicates\n- Emerging/New Property Developers\n- Property Developers conducting ‘One-Off’ projects\n- Land Bankers\n- SMSF Property Development\n\nFor Heath, experience, professionalism and accurate information are key in achieving successful results for his clients. Heath grew up in a property development family and completed a Bachelor of Business Property at RMIT specialising in Property Valuations.\n\nThis was followed by more than 12 years completing a variety of development projects, ranging from apartments to hotel accommodation across Melbourne and country Victoria.\n\nHeath has developed a depth of experience across multiple property sectors and understands the pressures and challenges that a property developer faces better than most.\n\nAway from the office, Heath loves spending time with his wife Sophie and two children Harvey and Maisey, as well as watching his beloved St Kilda.\n\nHeath shares his extensive real estate expertise to help his clients improve the value of their property assets through strategic development and effective marketing.\n\nMatthew Royal\n\nDevelopment Finance Partners\nDirector\n\nMatthew has extensive experience in the Real Estate and Finance Industries.\n\nPrior to co-founding Airlisting.com & Development Finance Partners Pty Ltd, Matthew Royal was an Associate Director of Property Finance BankWest.\n\nHe has exceptional knowledge and understanding of the financial criteria and methodology used in assessing Property Development and Investment proposals.\n\nMatthew advises Property Developers how to optimise the financing and marketing of their projects to achieve strategic improvements.\n\nMatthew has participated in the negotiation and consummation of numerous significant transac<cursor_is_here>\n\nMatthew is regularly quoted by major media outlets such as the AFR and The Australian and is a regular key note speaker, panel expert and moderator at various industry functions such as Urbanity'17 & '18, Property Finance Masterclass Presenter, Basis Point Non-Bank and Aus-China Financing Conferences, Euromoney Annual Distressed Debt and Restructuring Conference, Urbandeveloper.com special event series, PDM Group, Property Developers Association, BCG Finance Masterclass Educational Courses.\n\nStephanie McGrath\n\ntwenty20 Legal\nPrincipal\n\nStephanie is Principal of twenty20 legal and brings with her over 12 years’ experience in commercial law with a focus on property development, acquisitions, disposals and similar property transactions across Australia.\n\nShe has been a presenter on Legal Documentation in the Property Development Masterclass since 2016. Stephanie provides legal solutions to property developers, builders, project managers, property professionals and investors through all aspects of structuring, financing, carrying out and sale of a variety of developments and property ventures including: due diligence, advising on ownership structures, application of relevant taxes and stamp duties, negotiating and drafting commercial agreements and resolving commercial disputes.\n\nShe utilises her technical knowledge coupled with strategic commercial solutions to assist clients to achieve their commercial goals and realise the best possible outcome. As a boutique, innovative firm, twenty20 legal offers a clear vision: Clear advice. Clear about costs. Making law easier.\n\nPeter Hutchinson\nMaster Capital Group\nManaging Director\n\nPeter founded Master Capital in 2014 to create and manage investments in residential property and for Master Capital to co-invest alongside its clients.\n\nPeter first worked as an electrical tradesman on construction sites. He jointly owned and managed a building automation and controls business before being (Vic) State Service Manager with Environmental Automation.\n\nMaster Capital builds on Peter’s diverse managerial and business career experience over the past 25 years in engineering, construction, and property investment companies.\n\nHe was a Director of Bendigo Bank’s Mt Eliza Community Branch and chaired its Investment and Business Growth Committee.\n\nThe Master Capital Group teams with successful development and project professionals to provide investment opportunities in premium residential property developments for a client base of individuals and self managed superannuation funds who are wholesale investors. Our objective is to generate superior returns and diversify risk.\n\nJohn Spurigan is an entrepreneur with a unique background in Engineering, Applied Science (Computer) and Aviation (First Officer).\n\nHaving spent more than a decade in industries that value systems & processes as a way of driving standards he discovered his passion for property development in 2010.\n\nJohn is not only passionate about property development but an evangelist for creating financial freedom through property development for others.\n\nHis skills and background have lead to a unique and repeatable way of finding suburbs and sites to invest in and create wealth through 'small' developments ($3 - $15M).\n\nDavid Hunt has over 25 years of experience in the Australian Property sector. David owned a Real Estate Agency in Sydney earlier in his career and over the past 16 years has held leadership roles in construction and property data businesses.\n\nHe is the former Executive National Sales Manager of Cordell Information and a former Senior Manager at CoreLogic (RP Data). David has 'sales and business development in his DNA' and is an advocate of businesses across the property and construction sector using technology, and data driven insights to help achieve their business objectives.\n\nDavid came into Archistar in early 2018 as Head of Sales to help founders Dr Ben Coorey and Rob Coorey commercialise the ground-breaking Property Platform which helps users find and analyse development sites, and includes world first parametric design generators.\n\nThe business has grown rapidly with a customer base across Property Developers, Property Professionals, Architects, Consultants and Government. David holds a Bachelor of Business in Land Economics, has undertaken a Building Diploma and is completing an MBA at Macquarie Graduate School of Management.\n</text>\n",
"role": "user"
},
{
"content": "tions involving Property Development Loans, Corporate Loan Notes, Equity Partners, Mezzanine Finance, Joint Venture Partners and Construction Finance Loans.",
"role": "assistant"
}
] |
Charlottetown DAC members 2017-18
Stephanie Knickle (Charlottetown Rural), Brent Byrnes (Glen Stewart), Melanie Belik (Lucy Maud Montgomery), Tasha Moore (Sherwood Elementary), Mike Stanley (Stonepark Intermediate), Lindy McQuillan (Stratford Elementary), Jonah Bartlett (Rural Student), Kaytlyn Bryenton (Rural Student), Denice Spenceley (Colonel Gray - outgoing),Alison MacDougall (Colonel Gray - incoming) Vinay Upreti (Prince Street), Allie Keedwell (Queen Charlotte - outgoing), Karma McCallum (Queen Charlotte- incoming) Bourlaye Fofana (Spring Park), Kent Nicholson (West Kent - outgoing), Kirk Wiseman (West Kent - incoming), Jack Wheeler (Parkdale Elementary), Hailey Brake (Colonel Gray student), Sandy Nicholson (PEI HSF Regional Director, Colonel Gray), Angus Orford (Birchwood), Janna-Lynne Durant (St Jean), Vanessa Ford (West Royalty), Lisa Garland-Baird (Donagh Regional), Tami Lewis (PEIHSF Regional Director, Charlottetown Rural)
May 23rd, 2018 at West Kent School
Charlottetown DAC Ministerial Meeting
Guests: Minister Jordan Brown, Dale Sabean (Board member), Harvey MacEwen (Board Member), Tammy Hubley-Little (Director of Leadership and Learning, EELC)
Members: Angus Orford, Alison MacDougall, Allie Keedwell, Karma MacCallum, Richard MacEwen, Bourlaye Fofana, Kirk Wiseman, Tara Roche, Stephanie Knickle, Jonah Bartlett, Kaytlyn Bryenton, Andrea Richard, Melanie Belik, Jennifer Spencer, Lindy MacQuillan, Wanda Ellsworth.
Discussion and Outcomes
Class Composition
- The DAC is seeking information about students requiring supports in each class, i.e. students with learning disabilities, behavioural issues, EAs, etc.
- It is felt that with this data, the DAC members could advocate for increased in school supports to students and teachers.
- The Minister acknowledged that this information is key in allocating and adding front line positions, and the Department is always looking at classroom needs, which are not always relative to school size.
- Principals have good information and allocate resources to best meet all the student needs.
- Classroom composition data is complex and would require a lot of effort to make it nonidentifiable.
- It was suggested that perhaps composition data the DAC receives could focus on families of schools, and not individual schools or classes, that way no one class/child is identified.
- Minister Brown reminded the group that FOIPP legislation is clear that you can't share information that could lead back to a specific person. He did say that perhaps they could look at providing some information in some format that would not identify individuals.
- A DAC request will be made to the Public Schools Branch to provide composition data to the public.
Homework
- The DAC related how there is currently a lack of consistency across PEI regarding homework – assignment, time, volume.
- Some research this DAC did this year as well as the draft policy/guidelines framework they created for K-6 were circulated.
- Teachers in one member's school are asking for guidance on this issue. Some teachers assign homework, some don't. There is no consistency across grades.
- Studies show increased achievement in grades 7-9 when students have homework in elementary.
- This DAC has not reached consensus on homework, but agreed that stakeholders should be consulted to try and achieve a solution.
- Tammy Hubley-Little spoke about the ongoing debate on the value of homework:
o It should not be used as compliance, but for assessing whether a student is meeting the curriculum outcomes.
o There are curriculum outcomes for habits (execution, completion) which teachers use when assigning homework.
o The principles the Department supports for homework are: Practice, Production and Preparation. It should be meaningful and at a level students can achieve on their own at home, and not new work.
- Minister Brown said teachers may not share the same philosophies around homework, and that is why parents see inconsistencies.
- The Minister agreed that guidelines may be a better route than a policy, and that they would need to be evidence-based.
- Moving forward, a multi-stakeholder committee will be created to further discuss possible guidelines.
Enrichment
- Tammy Hubley-Little spoke about how students with exceptionalities - whose class by age does not meet their academic needs – have an Individualized Education Plan.
- Students who move quickly though curriculum are offered support once the need is identified.
- There are Department leaders for every subject area. Teachers consult with the leaders to find additional supports they can provide to students who need enrichment.
- It is appropriate for a parent to advocate for their child to receive enrichment.
- Accelerated students work well beyond their grade level and are placed in higher grades.
- Enriched students remain with their cohort and should receive extra work and challenges. They may excel in one subject and not in another.
- The DAC recommends that there be better communication to parents and students about resources available to them for enrichment.
May 10, 2018 at West Royalty Elementary
Discussion and Outcomes
Student Well-Being Teams
- Geoff MacDonald, Student Well-Being Project Lead, presented a PowerPoint (and its associated handouts) about the Student Well-Being Teams to the group.
- Highlights included:
o Employing a multi-agency approach, and better co-ordination of services. Health, Education, Family and Human Services and Justice all fund and play a role in the SWB team.
o Early intervention using a tiered approach and the social determinants of health. Investing at the earlier years means less support needed in the higher grades.
o Working upstream to build strength and resilience.
- The SWB teams focus is:
o Child centered;
o Easy access (any door is the right door);
o Early intervention;
o Collaboration.
- The teams are made up of:
o Mental health therapist (who holds a Masters in Social Work in Mental Health);
o School Outreach Worker (Child and Youth Care graduate);
o School Health Nurse (RN);
o Branch-based Counselling Consultant.
- Colonel Gray Family of Schools will see the SWB teams introduced in September 2018 (hubbed out of St Jean School) and the Charlottetown Rural Family of Schools will receive them in September 2019.
- Some unique things about Charlottetown District schools were discussed, including:
o Large numbers of newcomers creating needs around cultural sensitivity, class composition, language barriers and trauma these students carry;
o Student transitions – to new schools, uncertainly over school closures, small school to larger schools;
o Students in urban schools being approached by adults in on school property, and older students off-campus activities and influences;
o Bored students are distracting others. The under- and over- achievers have little support to keep them engaged;
o Lack of exercise and time to eat healthy food;
o School is too structured around learning instead of knowledge;
o Students using drugs and alcohol as a coping mechanism for stress. High rates of binge drinking and marijuana use. It is widely seen and accepted by peers as a regular thing;
o Student performance anxiety. Wanting that high mark – but have they actually retained knowledge? Or just remembered for a test? Parent and self-pressure to high achieve;
o 1st generation Canadians feel the pressure to succeed;
o Teachers seeing students who may not have a strong parental influence, or positive adult influence. Come to school hungry, dirty and may not see an adult all day.
- Geoff was thanked for his presentation. Members had the opportunity to provide additional feedback about the needs of the District. Members are encouraged to reach out to Geoff at any time.
Homework
- A DAC member outlined the research she assembled since the last meeting re: homework in other jurisdictions. Her information had been shared previous to the meeting, and was again available to members at the meeting.
o Her research indicated the stronger evidence for homework from Grade 7 onward, but that from K-6 there was less evidence of its value. She based a proposed K-6 policy on those from Nova Scotia Ontario, Alberta and some American states.
o Her proposed home study guidelines are based her experiences in the elementary schools in PEI, as well as what worked in her family – giving then flexibility and less stress.
- One member is against homework, but ensures he talks with his children every day about school and learning.
- There was discussion how there may be less need for a policy, and more for guidelines and parent supporting modelling and skill development.
- Several DAC members indicated they would like to work with other stakeholders – PSB, EELC, parents, students, teachers, etc. – to engage in a discussion about homework about why homework is needed K-6, and the amounts assigned per grade. They would like to see consistency across grades, schools and teachers. One member suggested a survey to parents and teachers about the current volume and frequency of homework, to get a baseline.
- A member offered to draft a letter to be sent to the PSB. It will ask for the PSB to start the process of engaging to outline homework guidelines and/or policy.
Zoning
- A DAC member presented a backgrounder on the recent history of zoning in the District. She had presented over the winter to her Home & School and to the PSB Board about the data she extrapolated which indicated there is an over-capacity issue at the District high schools.
- Her research indicated that there would be 400 more students than capacity in 4 years. She met with Minister Brown and DM Willis to discuss the PSB plan moving forward, and an update on the review process. It was recently announced that there is a Category 1 school review happening in the Charlottetown District to address the functional capacity of the schools there. The RFP has been issued and will close mid-May. It is expected the tender will be assigned late May with work commencing in June and completed by end of August.
Class Size and Composition Data
- A member had requested data on class composition last August. The DAC members are looking for a snapshot of Island schools, and what the numbers are for each school in terms of number of students needing educational supports overall as well as grade by grade. What are classes looking like? What are the compositional factors that teachers are facing? Another DAC member agreed to reach out to the PSB for that data again. It was recognized that the data would have to be non-identifying.
Wellbeing Subcommittee Update
- Committee members updated the group on the discussions and outcomes of the meeting they had in March (notes had been send to all members in March). Some of the concerns they raised were:
o Lack of enrichment for advanced students;
o Lack of free time at school;
o Combating student test anxiety;
o Wait times for assessments.
It was suggested that the committee meet with the SWB team to further discuss these issues. The legalization of marijuana was discussed and added to a forward agenda.
Ministerial Meeting May 23rd, 2018 at West Kent School
- Items for discussion were chosen.They are:
o Data on Class Composition
o Homework
o Enrichment
February 7th, 2018 at Charlottetown Rural High
Discussion and Outcomes
Student Wellness
- There was an update given on the rollout of the Student Well-being teams in the Westisle and Montague Districts.
- Colonel Gray Family of Schools will be getting their Wellbeing team in September 2018, and Charlottetown Rural Family of Schools in September 2019.
- There was a lengthy discussion about supports in place and needed for students in the Charlottetown District.
- A subcommittee was struck to focus on priorities in student wellness at all grade levels. This committee has DAC members from elementary to senior high, including two senior high students.
Homework Policy
- DAC members shared differing opinions on the value and need for homework.
- They did come to agreement that there should be a policy in place to ensure that students at the same grade level have the same amount of homework.
- A letter will be drafted and sent to the Public Schools Branch and Dept. of Education, Early Learning and Culture on behalf of the DAC regarding the need for a provincial homework policy.
Zoning
- Students in this District will attend the high school associated with their elementary school. This will remain the case for the next two years.
- A DAC member will present to the PSB Board of Directors at the Feb 21st meeting in an effort to collaborate regarding the student population needs for this District now and in the future.
Dec 7th, 2017 at Stratford Elementary
Discussion and Outcomes
Role of the DAC
- The role of the District Advisory Councils, including the mandate and responsibilities, as well as the term appointments and process for the appointments was discussed, with information sheets to support the discussion.
Review of Colonel Gray DAC priorities
Student Mental Health
- There was some questions about when the Student Well-Being Teams will be in place for this District. The dates for the specific Family of Schools will be confirmed and shared.
- Members were curious about how the Wellness Demonstration is rolling out. How is it working so far from the student, parent and teacher perspective? The DAC members would like some information shared. A presentation will be arranged.
Homework
- There was discussion around homework across and among grade levels. Members wish to consider developing homework guidelines for grade levels, and to develop a policy about the aim of homework, and the variables depending on the student's needs.
Student Buy-in for programming
- Student consultation and participation in developing new course offerings will ensure they will/ do meet the needs of students.
- We need to engage students and parents to identify the needs and then deliver based on those needs. Both students and parents need to be participatory and engaged.
Quality of Teaching
- DAC members are concerned with professional evaluation for teachers. How does PD address this? How do we bring up the lowest 10% to the middle?
- How do we create a culture of excellence? Can/do students and parents have the
opportunity to offer feedback to the teacher? And then what would happen?
- Should the principals be reviewing each teacher every year to make sure that they are striving for excellence?
- Anyone who has a stake in the outcome of the evaluations should not participate in the evaluations, that is should be an independent body who evaluates teachers, similar to the French school system which has inspectors.
High School Zoning
- Parents are unsure where their child is zoned for in the District as they transition to Senior High.
- They would like more communication from the Public Schools branch about zoning transitions.
Review of Charlottetown Rural DAC priorities
Overcrowding
- There needs to be long-term solutions for ensuring schools are not overcrowded. There are still issues that need to be addressed.
- It was noted that even with 14 classrooms added to SES, the schools are still full. There is no room for the extras. Students will have to share a gym, there will be inadequate space for music. There is no break out space for conferencing or working one-on-one. With the additional space at Stratford, it still means that students will have to share a gym. There is no extra space - math classes are happening in the library on top of the librarian and EAL teaching. There is programming/services/ extras that simply cannot happen because of the high population in Stratford schools.
- It was suggested to bring in the Bluefield FOS as well to develop a comprehensive zoning and needs plan for the Charlottetown District.
Class Size
- DAC members would like to see FTE positions reflective of classroom teachers only - not including music, gym, VP, Guidance and Principals.
Composition
- Composition is also important, as is having a better understanding of the challenges teachers face.
- Each school decides how to compose class sizes and choose how to group students.
- A DAC member suggested mandatory class caps similar to the kindergarten model.
- Good supports are key to a successful classrooms. Having access to a student teacher or an EA can allow for breakouts into smaller groups targeting different abilities and levels.
|
<urn:uuid:5e2624cc-7fc5-4df2-8a4d-7aac32cf4ba7>
|
CC-MAIN-2024-10
|
https://www.princeedwardisland.ca/sites/default/files/publications/charlottetown2017.pdf
|
2024-02-22T07:31:14+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00163-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 1,001,683,372
| 3,369
|
eng_Latn
|
eng_Latn
| 0.994942
|
eng_Latn
| 0.997971
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2986,
7786,
9284,
11308,
12829,
15038,
16529
] |
Charlottetown DAC members 2017-18
Stephanie Knickle (Charlottetown Rural), Brent Byrnes (Glen Stewart), Melanie Belik (Lucy Maud Montgomery), Tasha Moore (Sherwood Elementary), Mike Stanley (Stonepark Intermediate), Lindy McQuillan (Stratford Elementary), Jonah Bartlett (Rural Student), Kaytlyn Bryenton (Rural Student), Denice Spenceley (Colonel Gray - outgoing),Alison MacDougall (Colonel Gray - incoming) Vinay Upreti (Prince Street), Allie Keedwell (Queen Charlotte - outgoing), Karma McCallum (Queen Charlotte- incoming) Bourlaye Fofana (Spring Park), Kent Nicholson (West Kent - outgoing), Kirk Wiseman (West Kent - incoming), Jack Wheeler (Parkdale Elementary), Hailey Brake (Colonel Gray student), Sandy Nicholson (PEI HSF Regional Director, Colonel Gray), Angus Orford (Birchwood), Janna-Lynne Durant (St Jean), Vanessa Ford (West Royalty), Lisa Garland-Baird (Donagh Regional), Tami Lewis (PEIHSF Regional Director, Charlottetown Rural)
May 23rd, 2018 at West Kent School
Charlottetown DAC Ministerial Meeting
Guests: Minister Jordan Brown, Dale Sabean (Board member), Harvey MacEwen (Board Member), Tammy Hubley-Little (Director of Leadership and Learning, EELC)
Members: Angus Orford, Alison MacDougall, Allie Keedwell, Karma MacCallum, Richard MacEwen, Bourlaye Fofana, Kirk Wiseman, Tara Roche, Stephanie Knickle, Jonah Bartlett, Kaytlyn Bryenton, Andrea Richard, Melanie Belik, Jennifer Spencer, Lindy MacQuillan, Wanda Ellsworth.
Discussion and Outcomes
Class Composition
- The DAC is seeking information about students requiring supports in each class, i.e. students with learning disabilities, behavioural issues, EAs, etc.
- It is felt that with this data, the DAC members could advocate for increased in school supports to students and teachers.
- The Minister acknowledged that this information is key in allocating and adding front line positions, and the Department is always looking at classroom needs, which are not always relative to school size.
- Principals have good information and allocate resources to best meet all the student needs.
- Classroom composition data is complex and would require a lot of effort to make it nonidentifiable.
- It was suggested that perhaps composition data the DAC receives could focus on families of schools, and not individual schools or classes, that way no one class/child is identified.
- Minister Brown reminded the group that FOIPP legislation is clear that you can't share information that could lead back to a specific person. He did say that perhaps they could look at providing some information in some format that would not identify individuals.
- A DAC request will be made to the Public Schools Branch to provide composition data to the public.
Homework
- The DAC related how there is currently a lack of consistency across PEI regarding homework – assignment, time, volume.
- Some research this DAC did this year as well as the draft policy/guidelines framework they created for K-6 were circulated.
- Teachers in one member's school are asking for guidance on this issue. Some teachers assign homework, some don't. There is no consistency across grades.
- Studies show increased achievement in grades 7-9 when students have homework in elementary.
- This DAC has not reached consensus on homework, but agreed that stakeholders should be consulted to try and achieve a solution.
- Tammy Hubley-Little spoke about the ongoing debate on the value of homework:
o It should not be used as compliance, but for assessing whether a student is meeting the curriculum outcomes.
o There are curriculum outcomes for habits (execution, completion) which teachers use when assigning homework.
o The principles the Department supports for homework are: Practice, Production and Preparation. It should be meaningful and at a level students can achieve on their own at home, and not new work.
- Minister Brown said teachers may not share the same philosophies around homework, and that is why parents see inconsistencies.
- The Minister agreed that guidelines may be a better route than a policy, and that they would need to be evidence-based.
- Moving forward, a multi-stakeholder committee will be created to further discuss possible guidelines.
Enrichment
- Tammy Hubley-Little spoke about how students with exceptionalities - whose class by age does not meet their academic needs – have an Individualized Education Plan.
- Students who move quickly though curriculum are offered support once the need is identified.
- There are Department leaders for every subject area. Teachers consult with the leaders to find additional supports they can provide to students who need enrichment.
- It is appropriate for a parent to advocate for their child to receive enrichment.
- Accelerated students work well beyond their grade level and are placed in higher grades.
- Enriched students remain with their cohort and should receive extra work and challenges. They may excel in one subject and not in another.
- The DAC recommends that there be better communication to parents and students about resources available to them for enrichment.
May 10, 2018 at West Royalty Elementary
Discussion and Outcomes
Student Well-Being Teams
- Geoff MacDonald, Student Well-Being Project Lead, presented a PowerPoint (and its associated handouts) about the Student Well-Being Teams to the group.
- Highlights included:
o Employing a multi-agency approach, and better co-ordination of services. Health, Education, Family and Human Services and Justice all fund and play a role in the SWB team.
o Early intervention using a tiered approach and the social determinants of health. Investing at the earlier years means less support needed in the higher grades.
o Working upstream to build strength and resilience.
- The SWB teams focus is:
o Child centered;
o Easy access (any door is the right door);
o Early intervention;
o Collaboration.
- The teams are made up of:
o Mental health therapist (who holds a Masters in Social Work in Mental Health);
o School Outreach Worker (Child and Youth Care graduate);
o School Health Nurse (RN);
o Branch-based Counselling Consultant.
- Colonel Gray Family of Schools will see the SWB teams introduced in September 2018 (hubbed out of St Jean School) and the Charlottetown Rural Family of Schools will receive them in September 2019.
- Some unique things about Charlottetown District schools were discussed, including:
o Large numbers of newcomers creating needs around cultural sensitivity, class composition, language barriers and trauma these students carry;
o Student transitions – to new schools, uncertainly over school closures, small school to larger schools;
o Students in urban schools being approached by adults in on school property, and older students off-campus activities and influences;
o Bored students are distracting others. The under- and over- achievers have little support to keep them engaged;
o Lack of exercise and time to eat healthy food;
o School is too structured around learning instead of knowledge;
o Students using drugs and alcohol as a coping mechanism for stress. High rates of binge drinking and marijuana use. It is widely seen and accepted by peers as a regular thing;
o Student performance anxiety. Wanting that high mark – but have they actually retained knowledge? Or just remembered for a test? Parent and self-pressure to high achieve;
o 1st generation Canadians feel the pressure to succeed;
o Teachers seeing students who may not have a strong parental influence, or positive adult influence. Come to school hungry, dirty and may not see an adult all day.
- Geoff was thanked for his presentation. Members had the opportunity to provide additional feedback about the needs of the District. Members are encouraged to reach out to Geoff at any time.
Homework
- A DAC member outlined the research she assembled since the last meeting re: homework in other jurisdictions. Her information had been shared previous to the meeting, and was again available to members at the meeting.
o Her research indicated the stronger evidence for homework from Grade 7 onward, but that from K-6 there was less evidence of its value. She based a proposed K-6 policy on those from Nova Scotia Ontario, Alberta and some American states.
o Her proposed home study guidelines are based her experiences in the elementary schools in PEI, as well as what worked in her family – giving then flexibility and less stress.
- One member is against homework, but ensures he talks with his children every day about school and learning.
- There was discussion how there may be less need for a policy, and more for guidelines and parent supporting modelling and skill development.
- Several DAC members indicated they would like to work with other stakeholders – PSB, EELC, parents, students, teachers, etc. – to engage in a discussion about homework about why homework is needed K-6, and the amounts assigned per grade. They would like to see consistency across grades, schools and teachers. One member suggested a survey to parents and teachers about the current volume and frequency of homework, to get a baseline.
- A member offered to draft a letter to be sent to the PSB. It will ask for the PSB to start the process of engaging to outline homework guidelines and/or policy.
Zoning
- A DAC member presented a backgrounder on the recent history of zoning in the District. She had presented over the winter to her Home & School and to the PSB Board about the data she extrapolated which indicated there is an over-capacity issue at the District high schools.
- Her research indicated that there would be 400 more students than capacity in 4 years. She met with Minister Brown and DM Willis to discuss the PSB plan moving forward, and an update on the review process. It was recently announced that there is a Category 1 school review happening in the Charlottetown District to address the functional capacity of the schools there. The RFP has been issued and will close mid-May. It is expected the tender will be assigned late May with work commencing in June and completed by end of August.
Class Size and Composition Data
- A member had requested data on class composition last August. The DAC members are looking for a snapshot of Island schools, and what the numbers are for each school in terms of number of students needing educational supports overall as well as grade by grade. What are classes looking like? What are the compositional factors that teachers are facing? Another DAC member agreed to reach out to the PSB for that data again. It was recognized that the data would have to be non-identifying.
Wellbeing Subcommittee Update
- Committee members updated the group on the discussions and outcomes of the meeting they had in March (notes had been send to all members in March). Some of the concerns they raised were:
o Lack of enrichment for advanced students;
o Lack of free time at school;
o Combating student test anxiety;
o Wait times for assessments.
It was suggested that the committee meet with the SWB team to further discuss these issues. The legalization of marijuana was discussed and added to a forward agenda.
Ministerial Meeting May 23rd, 2018 at West Kent School
- Items for discussion were chosen.They are:
o Data on Class Composition
o Homework
o Enrichment
February 7th, 2018 at Charlottetown Rural High
Discussion and Outcomes
Student Wellness
- There was an update given on the rollout of the Student Well-being teams in the Westisle and Montague Districts.
- Colonel Gray Family of Schools will be getting their Wellbeing team in September 2018, and Charlottetown Rural Family of Schools in September 2019.
- There was a lengthy discussion about supports in place and needed for students in the Charlottetown District.
- A subcommittee was struck to focus on priorities in student wellness at all grade levels. This committee has DAC members from elementary to senior high, including two senior high students.
Homework Policy
- DAC members shared differing opinions on the value and need for homework.
|
- They did come to agreement that there should be a policy in place to ensure that students at the same grade level have the same amount of homework.
|
- A letter will be drafted and sent to the Public Schools Branch and Dept. of Education, Early Learning and Culture on behalf of the DAC regarding the need for a provincial homework policy.
Zoning
- Students in this District will attend the high school associated with their elementary school. This will remain the case for the next two years.
- A DAC member will present to the PSB Board of Directors at the Feb 21st meeting in an effort to collaborate regarding the student population needs for this District now and in the future.
Dec 7th, 2017 at Stratford Elementary
Discussion and Outcomes
Role of the DAC
- The role of the District Advisory Councils, including the mandate and responsibilities, as well as the term appointments and process for the appointments was discussed, with information sheets to support the discussion.
Review of Colonel Gray DAC priorities
Student Mental Health
- There was some questions about when the Student Well-Being Teams will be in place for this District. The dates for the specific Family of Schools will be confirmed and shared.
- Members were curious about how the Wellness Demonstration is rolling out. How is it working so far from the student, parent and teacher perspective? The DAC members would like some information shared. A presentation will be arranged.
Homework
- There was discussion around homework across and among grade levels. Members wish to consider developing homework guidelines for grade levels, and to develop a policy about the aim of homework, and the variables depending on the student's needs.
Student Buy-in for programming
- Student consultation and participation in developing new course offerings will ensure they will/ do meet the needs of students.
- We need to engage students and parents to identify the needs and then deliver based on those needs. Both students and parents need to be participatory and engaged.
Quality of Teaching
- DAC members are concerned with professional evaluation for teachers. How does PD address this? How do we bring up the lowest 10% to the middle?
- How do we create a culture of excellence? Can/do students and parents have the
opportunity to offer feedback to the teacher? And then what would happen?
- Should the principals be reviewing each teacher every year to make sure that they are striving for excellence?
- Anyone who has a stake in the outcome of the evaluations should not participate in the evaluations, that is should be an independent body who evaluates teachers, similar to the French school system which has inspectors.
High School Zoning
- Parents are unsure where their child is zoned for in the District as they transition to Senior High.
- They would like more communication from the Public Schools branch about zoning transitions.
Review of Charlottetown Rural DAC priorities
Overcrowding
- There needs to be long-term solutions for ensuring schools are not overcrowded. There are still issues that need to be addressed.
- It was noted that even with 14 classrooms added to SES, the schools are still full. There is no room for the extras. Students will have to share a gym, there will be inadequate space for music. There is no break out space for conferencing or working one-on-one. With the additional space at Stratford, it still means that students will have to share a gym. There is no extra space - math classes are happening in the library on top of the librarian and EAL teaching. There is programming/services/ extras that simply cannot happen because of the high population in Stratford schools.
- It was suggested to bring in the Bluefield FOS as well to develop a comprehensive zoning and needs plan for the Charlottetown District.
Class Size
- DAC members would like to see FTE positions reflective of classroom teachers only - not including music, gym, VP, Guidance and Principals.
Composition
- Composition is also important, as is having a better understanding of the challenges teachers face.
- Each school decides how to compose class sizes and choose how to group students.
- A DAC member suggested mandatory class caps similar to the kindergarten model.
- Good supports are key to a successful classrooms. Having access to a student teacher or an EA can allow for breakouts into smaller groups targeting different abilities and levels.
| 12,063
|
inside_word
|
-
|
remove_one_sentence
|
<url>
https://www.princeedwardisland.ca/sites/default/files/publications/charlottetown2017.pdf
</url>
<text>
Charlottetown DAC members 2017-18
Stephanie Knickle (Charlottetown Rural), Brent Byrnes (Glen Stewart), Melanie Belik (Lucy Maud Montgomery), Tasha Moore (Sherwood Elementary), Mike Stanley (Stonepark Intermediate), Lindy McQuillan (Stratford Elementary), Jonah Bartlett (Rural Student), Kaytlyn Bryenton (Rural Student), Denice Spenceley (Colonel Gray - outgoing),Alison MacDougall (Colonel Gray - incoming) Vinay Upreti (Prince Street), Allie Keedwell (Queen Charlotte - outgoing), Karma McCallum (Queen Charlotte- incoming) Bourlaye Fofana (Spring Park), Kent Nicholson (West Kent - outgoing), Kirk Wiseman (West Kent - incoming), Jack Wheeler (Parkdale Elementary), Hailey Brake (Colonel Gray student), Sandy Nicholson (PEI HSF Regional Director, Colonel Gray), Angus Orford (Birchwood), Janna-Lynne Durant (St Jean), Vanessa Ford (West Royalty), Lisa Garland-Baird (Donagh Regional), Tami Lewis (PEIHSF Regional Director, Charlottetown Rural)
May 23rd, 2018 at West Kent School
Charlottetown DAC Ministerial Meeting
Guests: Minister Jordan Brown, Dale Sabean (Board member), Harvey MacEwen (Board Member), Tammy Hubley-Little (Director of Leadership and Learning, EELC)
Members: Angus Orford, Alison MacDougall, Allie Keedwell, Karma MacCallum, Richard MacEwen, Bourlaye Fofana, Kirk Wiseman, Tara Roche, Stephanie Knickle, Jonah Bartlett, Kaytlyn Bryenton, Andrea Richard, Melanie Belik, Jennifer Spencer, Lindy MacQuillan, Wanda Ellsworth.
Discussion and Outcomes
Class Composition
- The DAC is seeking information about students requiring supports in each class, i.e. students with learning disabilities, behavioural issues, EAs, etc.
- It is felt that with this data, the DAC members could advocate for increased in school supports to students and teachers.
- The Minister acknowledged that this information is key in allocating and adding front line positions, and the Department is always looking at classroom needs, which are not always relative to school size.
- Principals have good information and allocate resources to best meet all the student needs.
- Classroom composition data is complex and would require a lot of effort to make it nonidentifiable.
- It was suggested that perhaps composition data the DAC receives could focus on families of schools, and not individual schools or classes, that way no one class/child is identified.
- Minister Brown reminded the group that FOIPP legislation is clear that you can't share information that could lead back to a specific person. He did say that perhaps they could look at providing some information in some format that would not identify individuals.
- A DAC request will be made to the Public Schools Branch to provide composition data to the public.
Homework
- The DAC related how there is currently a lack of consistency across PEI regarding homework – assignment, time, volume.
- Some research this DAC did this year as well as the draft policy/guidelines framework they created for K-6 were circulated.
- Teachers in one member's school are asking for guidance on this issue. Some teachers assign homework, some don't. There is no consistency across grades.
- Studies show increased achievement in grades 7-9 when students have homework in elementary.
- This DAC has not reached consensus on homework, but agreed that stakeholders should be consulted to try and achieve a solution.
- Tammy Hubley-Little spoke about the ongoing debate on the value of homework:
o It should not be used as compliance, but for assessing whether a student is meeting the curriculum outcomes.
o There are curriculum outcomes for habits (execution, completion) which teachers use when assigning homework.
o The principles the Department supports for homework are: Practice, Production and Preparation. It should be meaningful and at a level students can achieve on their own at home, and not new work.
- Minister Brown said teachers may not share the same philosophies around homework, and that is why parents see inconsistencies.
- The Minister agreed that guidelines may be a better route than a policy, and that they would need to be evidence-based.
- Moving forward, a multi-stakeholder committee will be created to further discuss possible guidelines.
Enrichment
- Tammy Hubley-Little spoke about how students with exceptionalities - whose class by age does not meet their academic needs – have an Individualized Education Plan.
- Students who move quickly though curriculum are offered support once the need is identified.
- There are Department leaders for every subject area. Teachers consult with the leaders to find additional supports they can provide to students who need enrichment.
- It is appropriate for a parent to advocate for their child to receive enrichment.
- Accelerated students work well beyond their grade level and are placed in higher grades.
- Enriched students remain with their cohort and should receive extra work and challenges. They may excel in one subject and not in another.
- The DAC recommends that there be better communication to parents and students about resources available to them for enrichment.
May 10, 2018 at West Royalty Elementary
Discussion and Outcomes
Student Well-Being Teams
- Geoff MacDonald, Student Well-Being Project Lead, presented a PowerPoint (and its associated handouts) about the Student Well-Being Teams to the group.
- Highlights included:
o Employing a multi-agency approach, and better co-ordination of services. Health, Education, Family and Human Services and Justice all fund and play a role in the SWB team.
o Early intervention using a tiered approach and the social determinants of health. Investing at the earlier years means less support needed in the higher grades.
o Working upstream to build strength and resilience.
- The SWB teams focus is:
o Child centered;
o Easy access (any door is the right door);
o Early intervention;
o Collaboration.
- The teams are made up of:
o Mental health therapist (who holds a Masters in Social Work in Mental Health);
o School Outreach Worker (Child and Youth Care graduate);
o School Health Nurse (RN);
o Branch-based Counselling Consultant.
- Colonel Gray Family of Schools will see the SWB teams introduced in September 2018 (hubbed out of St Jean School) and the Charlottetown Rural Family of Schools will receive them in September 2019.
- Some unique things about Charlottetown District schools were discussed, including:
o Large numbers of newcomers creating needs around cultural sensitivity, class composition, language barriers and trauma these students carry;
o Student transitions – to new schools, uncertainly over school closures, small school to larger schools;
o Students in urban schools being approached by adults in on school property, and older students off-campus activities and influences;
o Bored students are distracting others. The under- and over- achievers have little support to keep them engaged;
o Lack of exercise and time to eat healthy food;
o School is too structured around learning instead of knowledge;
o Students using drugs and alcohol as a coping mechanism for stress. High rates of binge drinking and marijuana use. It is widely seen and accepted by peers as a regular thing;
o Student performance anxiety. Wanting that high mark – but have they actually retained knowledge? Or just remembered for a test? Parent and self-pressure to high achieve;
o 1st generation Canadians feel the pressure to succeed;
o Teachers seeing students who may not have a strong parental influence, or positive adult influence. Come to school hungry, dirty and may not see an adult all day.
- Geoff was thanked for his presentation. Members had the opportunity to provide additional feedback about the needs of the District. Members are encouraged to reach out to Geoff at any time.
Homework
- A DAC member outlined the research she assembled since the last meeting re: homework in other jurisdictions. Her information had been shared previous to the meeting, and was again available to members at the meeting.
o Her research indicated the stronger evidence for homework from Grade 7 onward, but that from K-6 there was less evidence of its value. She based a proposed K-6 policy on those from Nova Scotia Ontario, Alberta and some American states.
o Her proposed home study guidelines are based her experiences in the elementary schools in PEI, as well as what worked in her family – giving then flexibility and less stress.
- One member is against homework, but ensures he talks with his children every day about school and learning.
- There was discussion how there may be less need for a policy, and more for guidelines and parent supporting modelling and skill development.
- Several DAC members indicated they would like to work with other stakeholders – PSB, EELC, parents, students, teachers, etc. – to engage in a discussion about homework about why homework is needed K-6, and the amounts assigned per grade. They would like to see consistency across grades, schools and teachers. One member suggested a survey to parents and teachers about the current volume and frequency of homework, to get a baseline.
- A member offered to draft a letter to be sent to the PSB. It will ask for the PSB to start the process of engaging to outline homework guidelines and/or policy.
Zoning
- A DAC member presented a backgrounder on the recent history of zoning in the District. She had presented over the winter to her Home & School and to the PSB Board about the data she extrapolated which indicated there is an over-capacity issue at the District high schools.
- Her research indicated that there would be 400 more students than capacity in 4 years. She met with Minister Brown and DM Willis to discuss the PSB plan moving forward, and an update on the review process. It was recently announced that there is a Category 1 school review happening in the Charlottetown District to address the functional capacity of the schools there. The RFP has been issued and will close mid-May. It is expected the tender will be assigned late May with work commencing in June and completed by end of August.
Class Size and Composition Data
- A member had requested data on class composition last August. The DAC members are looking for a snapshot of Island schools, and what the numbers are for each school in terms of number of students needing educational supports overall as well as grade by grade. What are classes looking like? What are the compositional factors that teachers are facing? Another DAC member agreed to reach out to the PSB for that data again. It was recognized that the data would have to be non-identifying.
Wellbeing Subcommittee Update
- Committee members updated the group on the discussions and outcomes of the meeting they had in March (notes had been send to all members in March). Some of the concerns they raised were:
o Lack of enrichment for advanced students;
o Lack of free time at school;
o Combating student test anxiety;
o Wait times for assessments.
It was suggested that the committee meet with the SWB team to further discuss these issues. The legalization of marijuana was discussed and added to a forward agenda.
Ministerial Meeting May 23rd, 2018 at West Kent School
- Items for discussion were chosen.They are:
o Data on Class Composition
o Homework
o Enrichment
February 7th, 2018 at Charlottetown Rural High
Discussion and Outcomes
Student Wellness
- There was an update given on the rollout of the Student Well-being teams in the Westisle and Montague Districts.
- Colonel Gray Family of Schools will be getting their Wellbeing team in September 2018, and Charlottetown Rural Family of Schools in September 2019.
- There was a lengthy discussion about supports in place and needed for students in the Charlottetown District.
- A subcommittee was struck to focus on priorities in student wellness at all grade levels. This committee has DAC members from elementary to senior high, including two senior high students.
Homework Policy
- DAC members shared differing opinions on the value and need for homework.
<cursor_is_here>
- A letter will be drafted and sent to the Public Schools Branch and Dept. of Education, Early Learning and Culture on behalf of the DAC regarding the need for a provincial homework policy.
Zoning
- Students in this District will attend the high school associated with their elementary school. This will remain the case for the next two years.
- A DAC member will present to the PSB Board of Directors at the Feb 21st meeting in an effort to collaborate regarding the student population needs for this District now and in the future.
Dec 7th, 2017 at Stratford Elementary
Discussion and Outcomes
Role of the DAC
- The role of the District Advisory Councils, including the mandate and responsibilities, as well as the term appointments and process for the appointments was discussed, with information sheets to support the discussion.
Review of Colonel Gray DAC priorities
Student Mental Health
- There was some questions about when the Student Well-Being Teams will be in place for this District. The dates for the specific Family of Schools will be confirmed and shared.
- Members were curious about how the Wellness Demonstration is rolling out. How is it working so far from the student, parent and teacher perspective? The DAC members would like some information shared. A presentation will be arranged.
Homework
- There was discussion around homework across and among grade levels. Members wish to consider developing homework guidelines for grade levels, and to develop a policy about the aim of homework, and the variables depending on the student's needs.
Student Buy-in for programming
- Student consultation and participation in developing new course offerings will ensure they will/ do meet the needs of students.
- We need to engage students and parents to identify the needs and then deliver based on those needs. Both students and parents need to be participatory and engaged.
Quality of Teaching
- DAC members are concerned with professional evaluation for teachers. How does PD address this? How do we bring up the lowest 10% to the middle?
- How do we create a culture of excellence? Can/do students and parents have the
opportunity to offer feedback to the teacher? And then what would happen?
- Should the principals be reviewing each teacher every year to make sure that they are striving for excellence?
- Anyone who has a stake in the outcome of the evaluations should not participate in the evaluations, that is should be an independent body who evaluates teachers, similar to the French school system which has inspectors.
High School Zoning
- Parents are unsure where their child is zoned for in the District as they transition to Senior High.
- They would like more communication from the Public Schools branch about zoning transitions.
Review of Charlottetown Rural DAC priorities
Overcrowding
- There needs to be long-term solutions for ensuring schools are not overcrowded. There are still issues that need to be addressed.
- It was noted that even with 14 classrooms added to SES, the schools are still full. There is no room for the extras. Students will have to share a gym, there will be inadequate space for music. There is no break out space for conferencing or working one-on-one. With the additional space at Stratford, it still means that students will have to share a gym. There is no extra space - math classes are happening in the library on top of the librarian and EAL teaching. There is programming/services/ extras that simply cannot happen because of the high population in Stratford schools.
- It was suggested to bring in the Bluefield FOS as well to develop a comprehensive zoning and needs plan for the Charlottetown District.
Class Size
- DAC members would like to see FTE positions reflective of classroom teachers only - not including music, gym, VP, Guidance and Principals.
Composition
- Composition is also important, as is having a better understanding of the challenges teachers face.
- Each school decides how to compose class sizes and choose how to group students.
- A DAC member suggested mandatory class caps similar to the kindergarten model.
- Good supports are key to a successful classrooms. Having access to a student teacher or an EA can allow for breakouts into smaller groups targeting different abilities and levels.
</text>
|
[
{
"content": "<url>\nhttps://www.princeedwardisland.ca/sites/default/files/publications/charlottetown2017.pdf\n</url>\n<text>\nCharlottetown DAC members 2017-18\n\nStephanie Knickle (Charlottetown Rural), Brent Byrnes (Glen Stewart), Melanie Belik (Lucy Maud Montgomery), Tasha Moore (Sherwood Elementary), Mike Stanley (Stonepark Intermediate), Lindy McQuillan (Stratford Elementary), Jonah Bartlett (Rural Student), Kaytlyn Bryenton (Rural Student), Denice Spenceley (Colonel Gray - outgoing),Alison MacDougall (Colonel Gray - incoming) Vinay Upreti (Prince Street), Allie Keedwell (Queen Charlotte - outgoing), Karma McCallum (Queen Charlotte- incoming) Bourlaye Fofana (Spring Park), Kent Nicholson (West Kent - outgoing), Kirk Wiseman (West Kent - incoming), Jack Wheeler (Parkdale Elementary), Hailey Brake (Colonel Gray student), Sandy Nicholson (PEI HSF Regional Director, Colonel Gray), Angus Orford (Birchwood), Janna-Lynne Durant (St Jean), Vanessa Ford (West Royalty), Lisa Garland-Baird (Donagh Regional), Tami Lewis (PEIHSF Regional Director, Charlottetown Rural)\n\nMay 23rd, 2018 at West Kent School\n\nCharlottetown DAC Ministerial Meeting\n\nGuests: Minister Jordan Brown, Dale Sabean (Board member), Harvey MacEwen (Board Member), Tammy Hubley-Little (Director of Leadership and Learning, EELC)\n\nMembers: Angus Orford, Alison MacDougall, Allie Keedwell, Karma MacCallum, Richard MacEwen, Bourlaye Fofana, Kirk Wiseman, Tara Roche, Stephanie Knickle, Jonah Bartlett, Kaytlyn Bryenton, Andrea Richard, Melanie Belik, Jennifer Spencer, Lindy MacQuillan, Wanda Ellsworth.\n\nDiscussion and Outcomes\n\nClass Composition\n\n- The DAC is seeking information about students requiring supports in each class, i.e. students with learning disabilities, behavioural issues, EAs, etc.\n- It is felt that with this data, the DAC members could advocate for increased in school supports to students and teachers.\n- The Minister acknowledged that this information is key in allocating and adding front line positions, and the Department is always looking at classroom needs, which are not always relative to school size.\n- Principals have good information and allocate resources to best meet all the student needs.\n- Classroom composition data is complex and would require a lot of effort to make it nonidentifiable.\n- It was suggested that perhaps composition data the DAC receives could focus on families of schools, and not individual schools or classes, that way no one class/child is identified.\n- Minister Brown reminded the group that FOIPP legislation is clear that you can't share information that could lead back to a specific person. He did say that perhaps they could look at providing some information in some format that would not identify individuals.\n- A DAC request will be made to the Public Schools Branch to provide composition data to the public.\n\nHomework\n\n- The DAC related how there is currently a lack of consistency across PEI regarding homework – assignment, time, volume.\n- Some research this DAC did this year as well as the draft policy/guidelines framework they created for K-6 were circulated.\n\n- Teachers in one member's school are asking for guidance on this issue. Some teachers assign homework, some don't. There is no consistency across grades.\n- Studies show increased achievement in grades 7-9 when students have homework in elementary.\n- This DAC has not reached consensus on homework, but agreed that stakeholders should be consulted to try and achieve a solution.\n- Tammy Hubley-Little spoke about the ongoing debate on the value of homework:\no It should not be used as compliance, but for assessing whether a student is meeting the curriculum outcomes.\no There are curriculum outcomes for habits (execution, completion) which teachers use when assigning homework.\no The principles the Department supports for homework are: Practice, Production and Preparation. It should be meaningful and at a level students can achieve on their own at home, and not new work.\n- Minister Brown said teachers may not share the same philosophies around homework, and that is why parents see inconsistencies.\n- The Minister agreed that guidelines may be a better route than a policy, and that they would need to be evidence-based.\n- Moving forward, a multi-stakeholder committee will be created to further discuss possible guidelines.\n\nEnrichment\n\n- Tammy Hubley-Little spoke about how students with exceptionalities - whose class by age does not meet their academic needs – have an Individualized Education Plan.\n- Students who move quickly though curriculum are offered support once the need is identified.\n- There are Department leaders for every subject area. Teachers consult with the leaders to find additional supports they can provide to students who need enrichment.\n- It is appropriate for a parent to advocate for their child to receive enrichment.\n- Accelerated students work well beyond their grade level and are placed in higher grades.\n- Enriched students remain with their cohort and should receive extra work and challenges. They may excel in one subject and not in another.\n- The DAC recommends that there be better communication to parents and students about resources available to them for enrichment.\n\nMay 10, 2018 at West Royalty Elementary\n\nDiscussion and Outcomes\n\nStudent Well-Being Teams\n\n- Geoff MacDonald, Student Well-Being Project Lead, presented a PowerPoint (and its associated handouts) about the Student Well-Being Teams to the group.\n- Highlights included:\no Employing a multi-agency approach, and better co-ordination of services. Health, Education, Family and Human Services and Justice all fund and play a role in the SWB team.\no Early intervention using a tiered approach and the social determinants of health. Investing at the earlier years means less support needed in the higher grades.\no Working upstream to build strength and resilience.\n- The SWB teams focus is:\no Child centered;\no Easy access (any door is the right door);\no Early intervention;\no Collaboration.\n- The teams are made up of:\no Mental health therapist (who holds a Masters in Social Work in Mental Health);\no School Outreach Worker (Child and Youth Care graduate);\no School Health Nurse (RN);\no Branch-based Counselling Consultant.\n- Colonel Gray Family of Schools will see the SWB teams introduced in September 2018 (hubbed out of St Jean School) and the Charlottetown Rural Family of Schools will receive them in September 2019.\n- Some unique things about Charlottetown District schools were discussed, including:\no Large numbers of newcomers creating needs around cultural sensitivity, class composition, language barriers and trauma these students carry;\no Student transitions – to new schools, uncertainly over school closures, small school to larger schools;\no Students in urban schools being approached by adults in on school property, and older students off-campus activities and influences;\no Bored students are distracting others. The under- and over- achievers have little support to keep them engaged;\no Lack of exercise and time to eat healthy food;\no School is too structured around learning instead of knowledge;\no Students using drugs and alcohol as a coping mechanism for stress. High rates of binge drinking and marijuana use. It is widely seen and accepted by peers as a regular thing;\no Student performance anxiety. Wanting that high mark – but have they actually retained knowledge? Or just remembered for a test? Parent and self-pressure to high achieve;\no 1st generation Canadians feel the pressure to succeed;\no Teachers seeing students who may not have a strong parental influence, or positive adult influence. Come to school hungry, dirty and may not see an adult all day.\n- Geoff was thanked for his presentation. Members had the opportunity to provide additional feedback about the needs of the District. Members are encouraged to reach out to Geoff at any time.\n\nHomework\n\n- A DAC member outlined the research she assembled since the last meeting re: homework in other jurisdictions. Her information had been shared previous to the meeting, and was again available to members at the meeting.\no Her research indicated the stronger evidence for homework from Grade 7 onward, but that from K-6 there was less evidence of its value. She based a proposed K-6 policy on those from Nova Scotia Ontario, Alberta and some American states.\no Her proposed home study guidelines are based her experiences in the elementary schools in PEI, as well as what worked in her family – giving then flexibility and less stress.\n- One member is against homework, but ensures he talks with his children every day about school and learning.\n- There was discussion how there may be less need for a policy, and more for guidelines and parent supporting modelling and skill development.\n- Several DAC members indicated they would like to work with other stakeholders – PSB, EELC, parents, students, teachers, etc. – to engage in a discussion about homework about why homework is needed K-6, and the amounts assigned per grade. They would like to see consistency across grades, schools and teachers. One member suggested a survey to parents and teachers about the current volume and frequency of homework, to get a baseline.\n- A member offered to draft a letter to be sent to the PSB. It will ask for the PSB to start the process of engaging to outline homework guidelines and/or policy.\n\nZoning\n\n- A DAC member presented a backgrounder on the recent history of zoning in the District. She had presented over the winter to her Home & School and to the PSB Board about the data she extrapolated which indicated there is an over-capacity issue at the District high schools.\n- Her research indicated that there would be 400 more students than capacity in 4 years. She met with Minister Brown and DM Willis to discuss the PSB plan moving forward, and an update on the review process. It was recently announced that there is a Category 1 school review happening in the Charlottetown District to address the functional capacity of the schools there. The RFP has been issued and will close mid-May. It is expected the tender will be assigned late May with work commencing in June and completed by end of August.\n\nClass Size and Composition Data\n\n- A member had requested data on class composition last August. The DAC members are looking for a snapshot of Island schools, and what the numbers are for each school in terms of number of students needing educational supports overall as well as grade by grade. What are classes looking like? What are the compositional factors that teachers are facing? Another DAC member agreed to reach out to the PSB for that data again. It was recognized that the data would have to be non-identifying.\n\nWellbeing Subcommittee Update\n\n- Committee members updated the group on the discussions and outcomes of the meeting they had in March (notes had been send to all members in March). Some of the concerns they raised were:\no Lack of enrichment for advanced students;\no Lack of free time at school;\no Combating student test anxiety;\no Wait times for assessments.\n\nIt was suggested that the committee meet with the SWB team to further discuss these issues. The legalization of marijuana was discussed and added to a forward agenda.\n\nMinisterial Meeting May 23rd, 2018 at West Kent School\n\n- Items for discussion were chosen.They are:\no Data on Class Composition\no Homework\no Enrichment\n\nFebruary 7th, 2018 at Charlottetown Rural High\n\nDiscussion and Outcomes\n\nStudent Wellness\n\n- There was an update given on the rollout of the Student Well-being teams in the Westisle and Montague Districts.\n- Colonel Gray Family of Schools will be getting their Wellbeing team in September 2018, and Charlottetown Rural Family of Schools in September 2019.\n- There was a lengthy discussion about supports in place and needed for students in the Charlottetown District.\n- A subcommittee was struck to focus on priorities in student wellness at all grade levels. This committee has DAC members from elementary to senior high, including two senior high students.\n\nHomework Policy\n\n- DAC members shared differing opinions on the value and need for homework.\n<cursor_is_here>\n- A letter will be drafted and sent to the Public Schools Branch and Dept. of Education, Early Learning and Culture on behalf of the DAC regarding the need for a provincial homework policy.\n\nZoning\n\n- Students in this District will attend the high school associated with their elementary school. This will remain the case for the next two years.\n- A DAC member will present to the PSB Board of Directors at the Feb 21st meeting in an effort to collaborate regarding the student population needs for this District now and in the future.\n\nDec 7th, 2017 at Stratford Elementary\n\nDiscussion and Outcomes\n\nRole of the DAC\n\n- The role of the District Advisory Councils, including the mandate and responsibilities, as well as the term appointments and process for the appointments was discussed, with information sheets to support the discussion.\n\nReview of Colonel Gray DAC priorities\n\nStudent Mental Health\n\n- There was some questions about when the Student Well-Being Teams will be in place for this District. The dates for the specific Family of Schools will be confirmed and shared.\n- Members were curious about how the Wellness Demonstration is rolling out. How is it working so far from the student, parent and teacher perspective? The DAC members would like some information shared. A presentation will be arranged.\n\nHomework\n\n- There was discussion around homework across and among grade levels. Members wish to consider developing homework guidelines for grade levels, and to develop a policy about the aim of homework, and the variables depending on the student's needs.\n\nStudent Buy-in for programming\n\n- Student consultation and participation in developing new course offerings will ensure they will/ do meet the needs of students.\n- We need to engage students and parents to identify the needs and then deliver based on those needs. Both students and parents need to be participatory and engaged.\n\nQuality of Teaching\n\n- DAC members are concerned with professional evaluation for teachers. How does PD address this? How do we bring up the lowest 10% to the middle?\n- How do we create a culture of excellence? Can/do students and parents have the\nopportunity to offer feedback to the teacher? And then what would happen?\n- Should the principals be reviewing each teacher every year to make sure that they are striving for excellence?\n- Anyone who has a stake in the outcome of the evaluations should not participate in the evaluations, that is should be an independent body who evaluates teachers, similar to the French school system which has inspectors.\n\nHigh School Zoning\n\n- Parents are unsure where their child is zoned for in the District as they transition to Senior High.\n- They would like more communication from the Public Schools branch about zoning transitions.\n\nReview of Charlottetown Rural DAC priorities\n\nOvercrowding\n\n- There needs to be long-term solutions for ensuring schools are not overcrowded. There are still issues that need to be addressed.\n- It was noted that even with 14 classrooms added to SES, the schools are still full. There is no room for the extras. Students will have to share a gym, there will be inadequate space for music. There is no break out space for conferencing or working one-on-one. With the additional space at Stratford, it still means that students will have to share a gym. There is no extra space - math classes are happening in the library on top of the librarian and EAL teaching. There is programming/services/ extras that simply cannot happen because of the high population in Stratford schools.\n- It was suggested to bring in the Bluefield FOS as well to develop a comprehensive zoning and needs plan for the Charlottetown District.\n\nClass Size\n\n- DAC members would like to see FTE positions reflective of classroom teachers only - not including music, gym, VP, Guidance and Principals.\n\nComposition\n\n- Composition is also important, as is having a better understanding of the challenges teachers face.\n- Each school decides how to compose class sizes and choose how to group students.\n- A DAC member suggested mandatory class caps similar to the kindergarten model.\n- Good supports are key to a successful classrooms. Having access to a student teacher or an EA can allow for breakouts into smaller groups targeting different abilities and levels.\n</text>\n",
"role": "user"
},
{
"content": "- They did come to agreement that there should be a policy in place to ensure that students at the same grade level have the same amount of homework.",
"role": "assistant"
}
] |
Academic Services Faculty and Staff Publications
2014
The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?
LeEtta M. Schmidt University of South Florida, [email protected]
Dennis Smith
Brandeis University
Follow this and additional works at: http://scholarcommons.usf.edu/tlas_pub Part of the Library and Information Science Commons
Scholar Commons Citation
Schmidt, LeEtta M. and Smith, Dennis, "The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?" (2014). Academic Services Faculty and Staff Publications. Paper 171.
http://scholarcommons.usf.edu/tlas_pub/171
This Article is brought to you for free and open access by the Tampa Library at Scholar Commons. It has been accepted for inclusion in Academic Services Faculty and Staff Publications by an authorized administrator of Scholar Commons. For more information, please contact [email protected].
Tampa Library
Abstract
This article revisits discussion from "The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group" (2012) on the implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The program and it's effects are assessed after two years with comparison to the project launch's original predictions.
Keywords: Resource Sharing, ALEPH, ILLiad, Statewide Programs, Interlibrary Loan, shared collections, consortial resource sharing, remote circulation
Introduction
Consortial resource sharing services have been a primary objective for many libraries as they seek ways to expand their patrons' access to collections. Many libraries have focused on the possibilities of such a service as a means to provide access and ensure cost effectiveness while looking for more efficient delivery of materials to patrons. UBorrow was developed as a consortial resource sharing program through the State Universities Libraries (SUL) of Florida. This program was based on the Interlibrary Loan component of the Ex Libris ALEPH Integrated Library System (ILS). The eleven participant state university libraries all utilize the ALEPH system with centralized support for the system and UBorrow program provided by the Florida Center for Library Automation (FCLA).
This article revisits discussion from "The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group" (2012) which discussed the creation, testing and implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The UBorrow development group, consisting of delegates from each of the eleven state university main, health, and law libraries, tested possible systems and workflows and compiled a list of policies for program launch. The development group predicted that the new UBorrow service, with unmediated request sending and automated availability checks would be faster and create less work for library staff than the traditional interlibrary loan systems in place throughout the state. They also predicted that 30 to 40% of total traditional interlibrary loan request traffic would be diverted to this unmediated local system, which would ease burden on staff and save money (Schmidt and Smith, 2012).
This resource sharing program was tested in spring 2012 with a soft launch during the summer academic period. Full launch was done at the beginning of the 2011-12 academic year. Uborrow, similar to other statewide programs such as OhioLink and GIL Express, enjoyed significant praise from patrons while requiring moderate additional staff workload and
challenges to the system's operations.
Literature Review
The rising importance of electronic materials to researchers versus the declining use of print materials in the library is an oft discussed topic among library practitioners. Niu, Hemminger et al conducted a survey of academic researchers to understand the way they search for information to support their research (2010). One of the findings of this survey is that the majority of researchers preferred using print as well as electronic formats while fewer preferred one over the other (Nui, Hemminger et al, 2010). This may be one of the reasons many libraries continue to develop and expand cooperative and consortial resource sharing services to provide access to print materials while concentrating their acquisitions money on electronic materials. UBorrow's goals were to provide researchers and students with access to the combined collections of the state universities via a unified and cost effective service (Schmidt & Smith, 2012). The continued success of statewide programs, such as OhioLink and Gil Express, continue to encourage the development of other statewide cooperative programs. Cook and Smith described the growth of OhioLink to include various libraries across Ohio that provided access to materials beyond researchers' and students' home institutions (2011). Gil Express is a highly successful resource-sharing service that includes 35 state institutions belonging to the University Systems of Georgia (Smith, 2012). As seen in OhioLink and Gil Express, these statewide programs are often facilitated by a common Integrated Library System (ILS). UBorrow, OhioLink and Gil Express libraries all shared a common ILS, ALEPH by Ex Libris (Schmidt & Smith, 2012)(Cook & Smith, 2011)(Smith, 2012).
In addition to a state sponsored university programs, farther reaching cooperative organizations continue to develop programs that expand access to library materials without dependence on a common ILS system. The Pennsylvania Academic Libraries Consortium created a union catalog and E-Z Borrow program for their members which provided a statewide program originally independent of the state university system (Fennewald, 2005). Consortiums are often involved in the negotiation of agreements for electronic material at enhanced member pricing. The success of lending programs and consortial contract agreements can be seen as driving factors in developing the future of resource sharing programs such as e-book sharing. The Boston Library Consortium (BLC) has begun an E-Book pilot program that allows its 17 university and research library members to collectively purchase and use E-Books (BLC, 2012). The possibility of expanding consortial borrowing activities into lending of E-Books, combined with the demonstrated success of print material lending, ensure that programs like UBorrow will continue to be a significant resource for researchers and students.
Background
The Florida State University Libraries' (SUL) leadership group, the Council of State University Libraries (CSUL), conceptualized the creation of an unmediated borrowing service (FCLA, 2009) that would eventually be named UBorrow. The UBorrow resource sharing development team, made of members from all participant libraries, initially reviewed two possible systems to support the new program. This review included a recently upgraded ILS ALEPH version 19 and the current ILLiad system by Atlas Systems (FCLA, 2009). The development team selected the ALEPH ILL module as the system for the UBorrow service (Schmidt and Smith, 2012). The SULs already had a shared Union Catalog, which would be used as the patron interface for the new resource sharing program, and all the institutions used the same statewide courier services for interlibrary loan material transfer, which was thoroughly evaluated by the development team to assess its ability to absorb an increase in traffic while still guaranteeing timely delivery of materials.
Initial goals for the UBorrow service included enhancements to the catalog to better direct patron requests, allow full automation of lending request processing and make sure every institution had courier service five days a week to speed delivery. Prior to launch, the participating libraries agreed on a set of policies that would standardize the service and patron interaction with the request process. Policies regarding lost and overdue materials were put on hold until after the program had generated enough data to support an argument on whether or not a transfer of funds between institutions would be necessary.
Outcomes
The First Year
Enhancements to the catalog continued long after full launch in August 2011. Great discussion was had among the development group as to whether the UBorrow request button should be shown on items that were not 'UBorrow-able.' One view was that it would better direct patrons only to UBorrow-able items and not give them the incorrect impression that UBorrow could support their request. An opposing argument was made for making the UBorrow request button more of an all request button. In this scenario, the button on records that were not 'UBorrow-able' would direct the patron to traditional ILL requesting, using ILLiad's OpenURL feature. Patrons would never hit a wall in the system where they could see what they wanted, but not be shown how to ask for it. The simplest option was limiting the UBorrow request button to 'UBorrow-able' material only.
After two years of UBorrow service, full lending automation among all the libraries had still not been obtained. This was primarily due to individual participants desiring more control over when and where request pull slips printed. The ideal pull slip situation involved automated printing one or more times a day on a designated printer; staff or student workers would retrieve the print outs and fetch the material. In this scenario, noting on the requests that the items are on their way would be the first time any library staff would have to interact directly with the system. However, many libraries wanted to fit printing times into their staff's workflow, and required staff to log in to the UBorrow system in order to manually send the print command before materials could be fetched from the stacks. In addition to the timing of the pull slips, some libraries wanted to use removable adhesive labels instead of paper pull slips that would become book bands. Additional work had to be done in the UBorrow system, post program launch, to develop this option. Budget restrictions also kept those libraries that had less than 5 day per week courier pick up from changing their courier contracts. UBorrow remained far from the function for which it was intended.
Additional work was also done to automate what began as a manual processing of renewal requests. Similar to traditional Interlibrary loan, a patron would send a renewal request, via their web accessible library account, that then had to be forwarded by his/her borrowing library to the lending library. The lending library would determine whether or not to approve the request and send their response, which would then be transmitted back to the patron. This excess of processing, spurred on discussion in the group on whether or not to extend the standard loan period from 30 to 60 days (Shrauger, Radnor, Schmidt, 2012). A longer loan period would result in less renewal requests made by patrons and thus less work. Though the loan period among the group was eventually changed to 60 days in September of 2012, work in the system to automate the renewal request process continued and eventually saw success. If an item had no other requests or holds in the system when the patron requested the renewal, that request would bypass any borrowing library processing and automatically update in the lending libraries system.
There was a total of 9,660 requests sent through the UBorrow system during the soft launch period of March 1, 2011 to August 1, 2011. Requests were automatically routed to the libraries where the item was currently available, and, because of this, many libraries were able to provide materials for a high percentage of incoming lending requests. However, when examining lender answers as to whether they could supply material, the average fill rate was just 54%. It appeared as though materials were being supplied by approximately three quarters of participating libraries, while the remaining quarter consistently denied requests. This trend continued through the first year of launch and only rose by 3% in the following year.
It was hoped that using real time availability checks and automating lending processes, book delivery would be faster than traditional ILL. This proved true as the average UBorrow delivery time in 2012 was just 4.11 days, 59.73% faster than average ILL book delivery time at
7.61 days.
<Fig. 1.1>
During the first year of full program launch patrons were given the option of commenting on the service at the point of request. A total of 300 responses were collected between March 2011 and the end of January 2012. Of those comments, more than half were positive, cheering the ease of requesting and speed of delivery. None were negative. Patrons' satisfaction with the increased speed of the service indicated that the UBorrow automations in place were doing their job of simplifying the process.
Figure 1.1 also shows that 30% of patron comments included extra instructions like emailing a different address than was on record or delivering to a campus address; 11% included questions about pick up locations, reserve and suggested purchases. These questions and comments were forwarded on to UBorrow sites for follow-up, but may indicate an area where the service could be improved with a more accessible FAQ and instructions for contacting a specific UBorrow site.
<Fig.1.2 >
The development group forecasted a decline in traditional interlibrary loan traffic after the launch of UBorrow. Investigation before the launch indicated that 30% of all interlibrary loan transactions at any one of the SULs occurred within the group. After a full launch and marketing campaign, the assumption was that this 30% of requests would move over to UBorrow. There was also an opinion within the group that resource sharing traffic in general, (i.e. the combination of ILL and UBorrow) would increase as it had with OhioLink after the launch of patron initiated borrowing in 1994 (Cook & Smith, 2011). Figure 2.1 shows the combined resource sharing traffic between traditional interlibrary loan and UBorrow after the UBorrow service launch until June of 2012. Contrary to expectations, UBorrow does not account for 30% of overall resource sharing traffic among the institutions. Two example institutions were chosen for a closer look.
The University of South Florida Tampa library, representative of the larger institutions in the group, services a community of 41,428 students enrolled full time with a $1.5 billion budget. Bachelor, Master, and Doctorate degrees are awarded among a total of 237 academic programs (University of South Florida, 2014). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 54,000 requests per year. USF is a net lender with nearly double the amount of lending requests received (~36,000 in 2010/11) compared to borrowing requests (~18,000 in 2010/11).
New College of Florida, representative of the smaller institutions, services an honors community of 832 students enrolled full time with a budget of $32.9 million (NCF Fast Facts). Bachelor degrees are awarded from 22 different liberal arts programs (NCF General Catalog). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 8,000 requests per year. NCF is a net borrower with triple the amount of borrowing requests processed (~6,000 in 2010/11) compared to lending requests (~2,000 in 2010/11).
USF numbers
<Fig. 2.1 >
A year after lauch, the use of UBorrow added to total borrowing traffic at USF, not removed or displaced it. This seems to suggest that the new environment and the marketing efforts associated with the launch of the new service gathered new patrons instead of wooing patrons who already used ILL through ILLiad.
The array of patron use also indicates that new users are finding the service. Though graduate patrons are the primary requesters of both systems, the percentage of undergraduates who used UBorrow in 2011/12 is noticeably different between the two services. 15% of ILL traffic through ILLiad belonged to undergraduates compared to 25% of undergraduate traffic in UBorrow.
<Fig. 2.2 >
Lending traffic, in comparison to the previous year, seemed to have been displaced by
the UBorrow system as predicted. Requests among the SULs for materials simply moved from ILL service through ILLiad to UBorrow service through the ALEPH system.
NCF numbers
<Fig. 3.1 >
The numbers at New College of Florida show a very different picture. For NCF, UBorrow does appear to have displaced borrowing traffic as well as increased resource sharing traffic overall. The most remarkable spike in resource sharing can be seen in September, the month after full launch.
<Fig. 3.2 >
In contrast, NCF's lending via traditional ILL did not diminish very much at all. Instead, lending traffic from UBorrow nearly doubled the amount of loans from NCF's collection. This hearkens to another concern of the original development group: that demands on the collections of smaller institutions would be most changed.
Years Two and Three
An early spring 2014 survey of the participating institutions shows that UBorrow processing is dissimilar among the libraries. While UBorrow was initially developed as extended circulation, most institutions locate it in the interlibrary loan department. Most institutions also use the paper pull slips to create book bands for UBorrow items even if they use removable labels for traditional interlibrary loan, or, as one library indicated "would prefer labels" but did not have the workflow established in UBorrow.
A questionnaire to library staff in charge of processing UBorrow was also circulated among the libraries in the fall of 2013. Answers from the participants of this survey are summarized in list of pros and cons for how the system currently functions. Among the benefits of UBorrow were faster turn around and ease of patron requesting, partially aided by the
patron's familiarity with the catalog interface. Overall, staff across the state saw UBorrow as an improved use of statewide library resources. However, UBorrow was seen as not quite fulfilling its potential. UBorrow's weaknesses were listed as needing more marketing and a better link between UBorrow and other ILL systems. The paperwork and labels are regarded as inefficient and many staff would like greater standardization. Though UBorrow deliveries are reported as faster than interlibrary loan the turnaround time is still not acceptable to staff and the patrons they serve. Similarly unacceptable is patron confusion about ebooks and what items are and are not borrowable in UBorrow. Staff members also pointed out that, though the intentions of UBorrow were admirable, the execution of the service left much to be desired (Resource Sharing Task Force, 2013).
<Fig 4.1 >
The majority of institutions have UBorrow borrowing and lending ratios similar to traditional interlibrary loan rates. The University of Central Florida (CFU in figure 4.1) has configured its instance of the UBorrow catalog to direct patrons to the ILLiad interlibrary loan request management system it uses for traditional ILL service to avoid duplicated workflows, so it's borrowing rates are not shown. The Florida Academic Repository (FLARE; FLR in figure 4.1) was added to UBorrow in the summer of 2013 and has thus far lent under one hundred books. FLARE was constructed to be a shared storage option for low use items among the universities (Florida Academic Repository, 2014). As more libraries send their materials to FLARE, UBorrow use of the collection may increase regardless of the items' low use status at their original owning institution. Among the few universities with UBorrow traffic greatly different from traditional ILL the University of Florida, Florida State University, and New College University's high rates of borrowing to lending illustrate the effect of strong and devoted marketing efforts at those institutions.
<Fig. 4.2 >
UBorrow request traffic in general has plateaued since the launch, as illustrated in figure
4.2, with volumes consistently under 20,000 total requests. This could be due to a drop in marketing efforts and increase in project load and distractions as the universities and statewide technical support worked through a legislative mandate to combine technical support for university and college libraries into one organization (FCLA, 2012). For instance, though each library has included the instructive information deemed necessary for their patrons in local web sites, there is currently no shared web page that describes and explains the service available to all patrons of UBorrow. Though the examples of what strong marketing efforts can do at University of Florida, Florida State University, and New College University in figure 4.1 offer a hint at the future should statewide marketing efforts be revived.
Lessons learned/Looking ahead
UBorrow currently only manages to fill 64% of patron requests on average. This is in stark contrast to the GWLA recommended 85-95% fill rate for borrowing in resource sharing. A low fill rate can be directly linked to a limited collection of materials and a high local demand for items at each university. The low instance of patron's moving their request to the interlibrary loan system (1% at USF; 5% at New College) indicates that the user sees the UBorrow cancellation as a dead end. Whether they are satisfied with this option may be linked to their knowledge of available resources. Whether libraries should be satisfied with this brick wall may be something that needs more emphasis on the UBorrow development priority list.
The average supply rate of 55% among lender libraries after the first year also needs consideration. This is due primarily to the almost one quarter of participating libraries not filling most or all of the requests that get sent them. These collections are only delaying patron requests from finding a lender. A review of the available collections, load leveling and policies could improve this situation. It might also alleviate increased lending workload at smaller institutions, as seen at NCF.
UBorrow is intended to be a great service, and like all great services, it must be in a
state of constant improvement. Patron satisfaction is at the heart of this mission. To this end the UBorrow Development priorities list gives libraries and users a peek into future modifications some of which include enhancing the UBorrow request button display and a plan to prevent requests going to non-lenders (FCLA, 2012). Continuing development faced new challenges in the reorganization of preexisting technical support centers across the state into a new service organization called the Florida Virtual Campus (FLVC) (FCLA, 2012).
No additional money was directed toward the development and launch of UBorrow, and staffing levels at participating institutions remained the same since the launch of the service in 2011. The new cooperative state university and college system, organized during the creation of the Florida Virtual Campus, meant the opportunity for UBorrow to expand. State colleges also used the ALEPH ILS and in February 2014 were added as potential lenders in UBorrow as the first step in a multi-phase merger. Future phases would include the holdings of the state colleges in the shared UBorrow catalog in conjunction with the launch of a shared statewide discovery tool. A committee of access services and interlibrary loan representatives from the universities and colleges, the FLVC Resource Sharing Standing Committee, was tasked with improving the existing systems and recommending new ways libraries across the state could cooperatively perfect resource sharing. Discussions about the future of UBorrow include lending media items, though agreement has not yet been reached on how long these items should circulate. These two new developments, the addition of state college holdings to the existing UBorrow system and the possibility of adding media, are contributing to increased complexity in the service. Items in UBorrow will no longer have the same due date and the same possibility for renewal no matter the lender. The FLVC Resource Sharing Standing Committee is also responsible for reviewing and updating the UBorrow policies developed for the launch of the original service.
Conclusion/Result
The merger of the pre-existing statewide technical support centers, the Florida Center
for Library Automation that serviced the universities, and the College Center for Library Automation that serviced the state colleges, delayed analysis, evaluation, and review of the UBorrow service and the policies it launched under. This may have also contributed to the leveling off of UBorrow traffic since the launch of the service. It is clear that marketing and promotion of the service is a key to the success of this cooperative lending program. As with other library programs, there must be continued focus on educating new students, faculty and researchers as you would with other library literacy programs. There must also be an effort to service review and improvement. These efforts must ensure that hindrances to the fulfillment of requests should be monitored and corrective action be taken to ensure improvement.
The new environment of expanded cooperation offers exciting possibilities and a much larger state wide library collection of access to UBorrow users. However, the inconsistent due dates and policies will probably cause initial confusion to users and, in the end, hamper the success of the system as a whole. The FLVC Resource Sharing Standing Committee's work on a set of shared policies becomes the most important part of future developments. UBorrow always has had the potential for adding more institutions similar to other programs like OhioLink. However, growth must be managed and supported to ensure that service delivery is maintained and improved for all participants. It is important that standardized policies, improved workflows and funding be provided so that there can be a baseline for the service. Experience has shown that inconsistent policies and low fulfillment rates could ultimately prevent this resource sharing program from achieving true success.
References
BLC, Ebrary, YBP partner for E-book pilot. (2012). Advanced Technology Libraries, 41(11), 6-6. Retrieved
from http://ezproxy.lib.usf.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&d b=llf&AN=83393836&site=eds-live
Cook, A., & Smith, D. J. (2011). The ohio library and information network : Resource sharing at its best. Journal of Interlibrary Loan, Document Delivery & Electronic Reserves, 21(5)
Fennewald, J. (2005). PALCI's virtual union catalog: Sharing the wealth. Journal of Library
Administration, 42(1), 63-78. doi:10.1300/J111v42n01-04
Florida Center for Library Automation (FCLA). (2012). Background on UBorrow pilot project..
Florida Center for Library Automation (FCLA). (2012). Florida virtual campus. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/5263
Florida Center for Library Automation (FCLA). (2012). Top development issues. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/3902
Niu, X., Hemminger, B. M., Lown, C., Adams, S., Brown, C., Level, A., . . . Cataldo, T. (2010). National study of information seeking behavior of academic researchers in the united states. Journal of the American Society for Information Science and Technology, 61(5), 869-890. doi:10.1002/asi.21307
Schmidt, L., & Smith, D. (2012). The florida state libraries resource sharing initiative: Unity among a disparate group. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(1), 9-15.
Smith, F. (2012). GIL express in georgia: An interlibrary Loan/Circulation hybrid for circulating books. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(2), 73-81.
University of South Florida. (2014). Common data sets 2013-2014 tampa & lakeland campus.
Retrieved, 2014, Retrieved from http://usfweb3.usf.edu/infocenter/Surveys/cds/CDS2013_2014_T a m pa . p
df
|
<urn:uuid:43e87a12-0b79-4440-a451-8ea0aa80ae0c>
|
CC-MAIN-2021-43
|
https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1176&context=tlas_pub
|
2021-10-20T16:53:00+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00052-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 305,159,097
| 5,773
|
eng_Latn
|
eng_Latn
| 0.91154
|
eng_Latn
| 0.996874
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
949,
1487,
3633,
6586,
8258,
10424,
12567,
14533,
16452,
18181,
20326,
22511,
24748,
26561,
28210,
28409
] |
Academic Services Faculty and Staff Publications
2014
The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?
LeEtta M. Schmidt University of South Florida, [email protected]
Dennis Smith
Brandeis University
Follow this and additional works at: http://scholarcommons.usf.edu/tlas_pub Part of the Library and Information Science Commons
Scholar Commons Citation
Schmidt, LeEtta M. and Smith, Dennis, "The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?" (2014). Academic Services Faculty and Staff Publications. Paper 171.
http://scholarcommons.usf.edu/tlas_pub/171
This Article is brought to you for free and open access by the Tampa Library at Scholar Commons. It has been accepted for inclusion in Academic Services Faculty and Staff Publications by an authorized administrator of Scholar Commons. For more information, please contact [email protected].
Tampa Library
Abstract
This article revisits discussion from "The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group" (2012) on the implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The program and it's effects are assessed after two years with comparison to the project launch's original predictions.
Keywords: Resource Sharing, ALEPH, ILLiad, Statewide Programs, Interlibrary Loan, shared collections, consortial resource sharing, remote circulation
Introduction
Consortial resource sharing services have been a primary objective for many libraries as they seek ways to expand their patrons' access to collections. Many libraries have focused on the possibilities of such a service as a means to provide access and ensure cost effectiveness while looking for more efficient delivery of materials to patrons. UBorrow was developed as a consortial resource sharing program through the State Universities Libraries (SUL) of Florida. This program was based on the Interlibrary Loan component of the Ex Libris ALEPH Integrated Library System (ILS). The eleven participant state university libraries all utilize the ALEPH system with centralized support for the system and UBorrow program provided by the Florida Center for Library Automation (FCLA).
This article revisits discussion from "The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group" (2012) which discussed the creation, testing and implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The UBorrow development group, consisting of delegates from each of the eleven state university main, health, and law libraries, tested possible systems and workflows and compiled a list of policies for program launch. The development group predicted that the new UBorrow service, with unmediated request sending and automated availability checks would be faster and create less work for library staff than the traditional interlibrary loan systems in place throughout the state. They also predicted that 30 to 40% of total traditional interlibrary loan request traffic would be diverted to this unmediated local system, which would ease burden on staff and save money (Schmidt and Smith, 2012).
This resource sharing program was tested in spring 2012 with a soft launch during the summer academic period. Full launch was done at the beginning of the 2011-12 academic year. Uborrow, similar to other statewide programs such as OhioLink and GIL Express, enjoyed significant praise from patrons while requiring moderate additional staff workload and
challenges to the system's operations.
Literature Review
The rising importance of electronic materials to researchers versus the declining use of print materials in the library is an oft discussed topic among library practitioners. Niu, Hemminger et al conducted a survey of academic researchers to understand the way they search for information to support their research (2010). One of the findings of this survey is that the majority of researchers preferred using print as well as electronic formats while fewer preferred one over the other (Nui, Hemminger et al, 2010). This may be one of the reasons many libraries continue to develop and expand cooperative and consortial resource sharing services to provide access to print materials while concentrating their acquisitions money on electronic materials. UBorrow's goals were to provide researchers and students with access to the combined collections of the state universities via a unified and cost effective service (Schmidt & Smith, 2012). The continued success of statewide programs, such as OhioLink and Gil Express, continue to encourage the development of other statewide cooperative programs. Cook and Smith described the growth of OhioLink to include various libraries across Ohio that provided access to materials beyond researchers' and students' home institutions (2011). Gil Express is a highly successful resource-sharing service that includes 35 state institutions belonging to the University Systems of Georgia (Smith, 2012). As seen in OhioLink and Gil Express, these statewide programs are often facilitated by a common Integrated Library System (ILS). UBorrow, OhioLink and Gil Express libraries all shared a common ILS, ALEPH by Ex Libris (Schmidt & Smith, 2012)(Cook & Smith, 2011)(Smith, 2012).
In addition to a state sponsored university programs, farther reaching cooperative organizations continue to develop programs that expand access to library materials without dependence on a common ILS system. The Pennsylvania Academic Libraries Consortium created a union catalog and E-Z Borrow program for their members which provided a statewide program originally independent of the state university system (Fennewald, 2005). Consortiums are often involved in the negotiation of agreements for electronic material at enhanced member pricing. The success of lending programs and consortial contract agreements can be seen as driving factors in developing the future of resource sharing programs such as e-book sharing. The Boston Library Consortium (BLC) has begun an E-Book pilot program that allows its 17 university and research library members to collectively purchase and use E-Books (BLC, 2012). The possibility of expanding consortial borrowing activities into lending of E-Books, combined with the demonstrated success of print material lending, ensure that programs like UBorrow will continue to be a significant resource for researchers and students.
Background
The Florida State University Libraries' (SUL) leadership group, the Council of State University Libraries (CSUL), conceptualized the creation of an unmediated borrowing service (FCLA, 2009) that would eventually be named UBorrow. The UBorrow resource sharing development team, made of members from all participant libraries, initially reviewed two possible systems to support the new program. This review included a recently upgraded ILS ALEPH version 19 and the current ILLiad system by Atlas Systems (FCLA, 2009). The development team selected the ALEPH ILL module as the system for the UBorrow service (Schmidt and Smith, 2012). The SULs already had a shared Union Catalog, which would be used as the patron interface for the new resource sharing program, and all the institutions used the same statewide courier services for interlibrary loan material transfer, which was thoroughly evaluated by the development team to assess its ability to absorb an increase in traffic while still guaranteeing timely delivery of materials.
Initial goals for the UBorrow service included enhancements to the catalog to better direct patron requests, allow full automation of lending request processing and make sure every institution had courier service five days a week to speed delivery. Prior to launch, the participating libraries agreed on a set of policies that would standardize the service and patron interaction with the request process. Policies regarding lost and overdue materials were put on hold until after the program had generated enough data to support an argument on whether or not a transfer of funds between institutions would be necessary.
Outcomes
The First Year
Enhancements to the catalog continued long after full launch in August 2011. Great discussion was had among the development group as to whether the UBorrow request button should be shown on items that were not 'UBorrow-able.' One view was that it would better direct patrons only to UBorrow-able items and not give them the incorrect impression that UBorrow could support their request. An opposing argument was made for making the UBorrow request button more of an all request button. In this scenario, the button on records that were not 'UBorrow-able' would direct the patron to traditional ILL requesting, using ILLiad's OpenURL feature. Patrons would never hit a wall in the system where they could see what they wanted, but not be shown how to ask for it. The simplest option was limiting the UBorrow request button to 'UBorrow-able' material only.
After two years of UBorrow service, full lending automation among all the libraries had still not been obtained. This was primarily due to individual participants desiring more control over when and where request pull slips printed. The ideal pull slip situation involved automated printing one or more times a day on a designated printer; staff or student workers would retrieve the print outs and fetch the material. In this scenario, noting on the requests that the items are on their way would be the first time any library staff would have to interact directly with the system. However, many libraries wanted to fit printing times into their staff's workflow, and required staff to log in to the UBorrow system in order to manually send the print command before materials could be fetched from the stacks. In addition to the timing of the pull slips, some libraries wanted to use removable adhesive labels instead of paper pull slips that would become book bands. Additional work had to
|
be done in the UBorrow system, post program launch, to develop this option.
|
Budget restrictions also kept those libraries that had less than 5 day per week courier pick up from changing their courier contracts. UBorrow remained far from the function for which it was intended.
Additional work was also done to automate what began as a manual processing of renewal requests. Similar to traditional Interlibrary loan, a patron would send a renewal request, via their web accessible library account, that then had to be forwarded by his/her borrowing library to the lending library. The lending library would determine whether or not to approve the request and send their response, which would then be transmitted back to the patron. This excess of processing, spurred on discussion in the group on whether or not to extend the standard loan period from 30 to 60 days (Shrauger, Radnor, Schmidt, 2012). A longer loan period would result in less renewal requests made by patrons and thus less work. Though the loan period among the group was eventually changed to 60 days in September of 2012, work in the system to automate the renewal request process continued and eventually saw success. If an item had no other requests or holds in the system when the patron requested the renewal, that request would bypass any borrowing library processing and automatically update in the lending libraries system.
There was a total of 9,660 requests sent through the UBorrow system during the soft launch period of March 1, 2011 to August 1, 2011. Requests were automatically routed to the libraries where the item was currently available, and, because of this, many libraries were able to provide materials for a high percentage of incoming lending requests. However, when examining lender answers as to whether they could supply material, the average fill rate was just 54%. It appeared as though materials were being supplied by approximately three quarters of participating libraries, while the remaining quarter consistently denied requests. This trend continued through the first year of launch and only rose by 3% in the following year.
It was hoped that using real time availability checks and automating lending processes, book delivery would be faster than traditional ILL. This proved true as the average UBorrow delivery time in 2012 was just 4.11 days, 59.73% faster than average ILL book delivery time at
7.61 days.
<Fig. 1.1>
During the first year of full program launch patrons were given the option of commenting on the service at the point of request. A total of 300 responses were collected between March 2011 and the end of January 2012. Of those comments, more than half were positive, cheering the ease of requesting and speed of delivery. None were negative. Patrons' satisfaction with the increased speed of the service indicated that the UBorrow automations in place were doing their job of simplifying the process.
Figure 1.1 also shows that 30% of patron comments included extra instructions like emailing a different address than was on record or delivering to a campus address; 11% included questions about pick up locations, reserve and suggested purchases. These questions and comments were forwarded on to UBorrow sites for follow-up, but may indicate an area where the service could be improved with a more accessible FAQ and instructions for contacting a specific UBorrow site.
<Fig.1.2 >
The development group forecasted a decline in traditional interlibrary loan traffic after the launch of UBorrow. Investigation before the launch indicated that 30% of all interlibrary loan transactions at any one of the SULs occurred within the group. After a full launch and marketing campaign, the assumption was that this 30% of requests would move over to UBorrow. There was also an opinion within the group that resource sharing traffic in general, (i.e. the combination of ILL and UBorrow) would increase as it had with OhioLink after the launch of patron initiated borrowing in 1994 (Cook & Smith, 2011). Figure 2.1 shows the combined resource sharing traffic between traditional interlibrary loan and UBorrow after the UBorrow service launch until June of 2012. Contrary to expectations, UBorrow does not account for 30% of overall resource sharing traffic among the institutions. Two example institutions were chosen for a closer look.
The University of South Florida Tampa library, representative of the larger institutions in the group, services a community of 41,428 students enrolled full time with a $1.5 billion budget. Bachelor, Master, and Doctorate degrees are awarded among a total of 237 academic programs (University of South Florida, 2014). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 54,000 requests per year. USF is a net lender with nearly double the amount of lending requests received (~36,000 in 2010/11) compared to borrowing requests (~18,000 in 2010/11).
New College of Florida, representative of the smaller institutions, services an honors community of 832 students enrolled full time with a budget of $32.9 million (NCF Fast Facts). Bachelor degrees are awarded from 22 different liberal arts programs (NCF General Catalog). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 8,000 requests per year. NCF is a net borrower with triple the amount of borrowing requests processed (~6,000 in 2010/11) compared to lending requests (~2,000 in 2010/11).
USF numbers
<Fig. 2.1 >
A year after lauch, the use of UBorrow added to total borrowing traffic at USF, not removed or displaced it. This seems to suggest that the new environment and the marketing efforts associated with the launch of the new service gathered new patrons instead of wooing patrons who already used ILL through ILLiad.
The array of patron use also indicates that new users are finding the service. Though graduate patrons are the primary requesters of both systems, the percentage of undergraduates who used UBorrow in 2011/12 is noticeably different between the two services. 15% of ILL traffic through ILLiad belonged to undergraduates compared to 25% of undergraduate traffic in UBorrow.
<Fig. 2.2 >
Lending traffic, in comparison to the previous year, seemed to have been displaced by
the UBorrow system as predicted. Requests among the SULs for materials simply moved from ILL service through ILLiad to UBorrow service through the ALEPH system.
NCF numbers
<Fig. 3.1 >
The numbers at New College of Florida show a very different picture. For NCF, UBorrow does appear to have displaced borrowing traffic as well as increased resource sharing traffic overall. The most remarkable spike in resource sharing can be seen in September, the month after full launch.
<Fig. 3.2 >
In contrast, NCF's lending via traditional ILL did not diminish very much at all. Instead, lending traffic from UBorrow nearly doubled the amount of loans from NCF's collection. This hearkens to another concern of the original development group: that demands on the collections of smaller institutions would be most changed.
Years Two and Three
An early spring 2014 survey of the participating institutions shows that UBorrow processing is dissimilar among the libraries. While UBorrow was initially developed as extended circulation, most institutions locate it in the interlibrary loan department. Most institutions also use the paper pull slips to create book bands for UBorrow items even if they use removable labels for traditional interlibrary loan, or, as one library indicated "would prefer labels" but did not have the workflow established in UBorrow.
A questionnaire to library staff in charge of processing UBorrow was also circulated among the libraries in the fall of 2013. Answers from the participants of this survey are summarized in list of pros and cons for how the system currently functions. Among the benefits of UBorrow were faster turn around and ease of patron requesting, partially aided by the
patron's familiarity with the catalog interface. Overall, staff across the state saw UBorrow as an improved use of statewide library resources. However, UBorrow was seen as not quite fulfilling its potential. UBorrow's weaknesses were listed as needing more marketing and a better link between UBorrow and other ILL systems. The paperwork and labels are regarded as inefficient and many staff would like greater standardization. Though UBorrow deliveries are reported as faster than interlibrary loan the turnaround time is still not acceptable to staff and the patrons they serve. Similarly unacceptable is patron confusion about ebooks and what items are and are not borrowable in UBorrow. Staff members also pointed out that, though the intentions of UBorrow were admirable, the execution of the service left much to be desired (Resource Sharing Task Force, 2013).
<Fig 4.1 >
The majority of institutions have UBorrow borrowing and lending ratios similar to traditional interlibrary loan rates. The University of Central Florida (CFU in figure 4.1) has configured its instance of the UBorrow catalog to direct patrons to the ILLiad interlibrary loan request management system it uses for traditional ILL service to avoid duplicated workflows, so it's borrowing rates are not shown. The Florida Academic Repository (FLARE; FLR in figure 4.1) was added to UBorrow in the summer of 2013 and has thus far lent under one hundred books. FLARE was constructed to be a shared storage option for low use items among the universities (Florida Academic Repository, 2014). As more libraries send their materials to FLARE, UBorrow use of the collection may increase regardless of the items' low use status at their original owning institution. Among the few universities with UBorrow traffic greatly different from traditional ILL the University of Florida, Florida State University, and New College University's high rates of borrowing to lending illustrate the effect of strong and devoted marketing efforts at those institutions.
<Fig. 4.2 >
UBorrow request traffic in general has plateaued since the launch, as illustrated in figure
4.2, with volumes consistently under 20,000 total requests. This could be due to a drop in marketing efforts and increase in project load and distractions as the universities and statewide technical support worked through a legislative mandate to combine technical support for university and college libraries into one organization (FCLA, 2012). For instance, though each library has included the instructive information deemed necessary for their patrons in local web sites, there is currently no shared web page that describes and explains the service available to all patrons of UBorrow. Though the examples of what strong marketing efforts can do at University of Florida, Florida State University, and New College University in figure 4.1 offer a hint at the future should statewide marketing efforts be revived.
Lessons learned/Looking ahead
UBorrow currently only manages to fill 64% of patron requests on average. This is in stark contrast to the GWLA recommended 85-95% fill rate for borrowing in resource sharing. A low fill rate can be directly linked to a limited collection of materials and a high local demand for items at each university. The low instance of patron's moving their request to the interlibrary loan system (1% at USF; 5% at New College) indicates that the user sees the UBorrow cancellation as a dead end. Whether they are satisfied with this option may be linked to their knowledge of available resources. Whether libraries should be satisfied with this brick wall may be something that needs more emphasis on the UBorrow development priority list.
The average supply rate of 55% among lender libraries after the first year also needs consideration. This is due primarily to the almost one quarter of participating libraries not filling most or all of the requests that get sent them. These collections are only delaying patron requests from finding a lender. A review of the available collections, load leveling and policies could improve this situation. It might also alleviate increased lending workload at smaller institutions, as seen at NCF.
UBorrow is intended to be a great service, and like all great services, it must be in a
state of constant improvement. Patron satisfaction is at the heart of this mission. To this end the UBorrow Development priorities list gives libraries and users a peek into future modifications some of which include enhancing the UBorrow request button display and a plan to prevent requests going to non-lenders (FCLA, 2012). Continuing development faced new challenges in the reorganization of preexisting technical support centers across the state into a new service organization called the Florida Virtual Campus (FLVC) (FCLA, 2012).
No additional money was directed toward the development and launch of UBorrow, and staffing levels at participating institutions remained the same since the launch of the service in 2011. The new cooperative state university and college system, organized during the creation of the Florida Virtual Campus, meant the opportunity for UBorrow to expand. State colleges also used the ALEPH ILS and in February 2014 were added as potential lenders in UBorrow as the first step in a multi-phase merger. Future phases would include the holdings of the state colleges in the shared UBorrow catalog in conjunction with the launch of a shared statewide discovery tool. A committee of access services and interlibrary loan representatives from the universities and colleges, the FLVC Resource Sharing Standing Committee, was tasked with improving the existing systems and recommending new ways libraries across the state could cooperatively perfect resource sharing. Discussions about the future of UBorrow include lending media items, though agreement has not yet been reached on how long these items should circulate. These two new developments, the addition of state college holdings to the existing UBorrow system and the possibility of adding media, are contributing to increased complexity in the service. Items in UBorrow will no longer have the same due date and the same possibility for renewal no matter the lender. The FLVC Resource Sharing Standing Committee is also responsible for reviewing and updating the UBorrow policies developed for the launch of the original service.
Conclusion/Result
The merger of the pre-existing statewide technical support centers, the Florida Center
for Library Automation that serviced the universities, and the College Center for Library Automation that serviced the state colleges, delayed analysis, evaluation, and review of the UBorrow service and the policies it launched under. This may have also contributed to the leveling off of UBorrow traffic since the launch of the service. It is clear that marketing and promotion of the service is a key to the success of this cooperative lending program. As with other library programs, there must be continued focus on educating new students, faculty and researchers as you would with other library literacy programs. There must also be an effort to service review and improvement. These efforts must ensure that hindrances to the fulfillment of requests should be monitored and corrective action be taken to ensure improvement.
The new environment of expanded cooperation offers exciting possibilities and a much larger state wide library collection of access to UBorrow users. However, the inconsistent due dates and policies will probably cause initial confusion to users and, in the end, hamper the success of the system as a whole. The FLVC Resource Sharing Standing Committee's work on a set of shared policies becomes the most important part of future developments. UBorrow always has had the potential for adding more institutions similar to other programs like OhioLink. However, growth must be managed and supported to ensure that service delivery is maintained and improved for all participants. It is important that standardized policies, improved workflows and funding be provided so that there can be a baseline for the service. Experience has shown that inconsistent policies and low fulfillment rates could ultimately prevent this resource sharing program from achieving true success.
References
BLC, Ebrary, YBP partner for E-book pilot. (2012). Advanced Technology Libraries, 41(11), 6-6. Retrieved
from http://ezproxy.lib.usf.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&d b=llf&AN=83393836&site=eds-live
Cook, A., & Smith, D. J. (2011). The ohio library and information network : Resource sharing at its best. Journal of Interlibrary Loan, Document Delivery & Electronic Reserves, 21(5)
Fennewald, J. (2005). PALCI's virtual union catalog: Sharing the wealth. Journal of Library
Administration, 42(1), 63-78. doi:10.1300/J111v42n01-04
Florida Center for Library Automation (FCLA). (2012). Background on UBorrow pilot project..
Florida Center for Library Automation (FCLA). (2012). Florida virtual campus. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/5263
Florida Center for Library Automation (FCLA). (2012). Top development issues. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/3902
Niu, X., Hemminger, B. M., Lown, C., Adams, S., Brown, C., Level, A., . . . Cataldo, T. (2010). National study of information seeking behavior of academic researchers in the united states. Journal of the American Society for Information Science and Technology, 61(5), 869-890. doi:10.1002/asi.21307
Schmidt, L., & Smith, D. (2012). The florida state libraries resource sharing initiative: Unity among a disparate group. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(1), 9-15.
Smith, F. (2012). GIL express in georgia: An interlibrary Loan/Circulation hybrid for circulating books. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(2), 73-81.
University of South Florida. (2014). Common data sets 2013-2014 tampa & lakeland campus.
Retrieved, 2014, Retrieved from http://usfweb3.usf.edu/infocenter/Surveys/cds/CDS2013_2014_T a m pa . p
df
| 10,154
|
inside_word
|
be
|
remove_one_sentence
|
<url>
https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1176&context=tlas_pub
</url>
<text>
Academic Services Faculty and Staff Publications
2014
The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?
LeEtta M. Schmidt University of South Florida, [email protected]
Dennis Smith
Brandeis University
Follow this and additional works at: http://scholarcommons.usf.edu/tlas_pub Part of the Library and Information Science Commons
Scholar Commons Citation
Schmidt, LeEtta M. and Smith, Dennis, "The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?" (2014). Academic Services Faculty and Staff Publications. Paper 171.
http://scholarcommons.usf.edu/tlas_pub/171
This Article is brought to you for free and open access by the Tampa Library at Scholar Commons. It has been accepted for inclusion in Academic Services Faculty and Staff Publications by an authorized administrator of Scholar Commons. For more information, please contact [email protected].
Tampa Library
Abstract
This article revisits discussion from "The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group" (2012) on the implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The program and it's effects are assessed after two years with comparison to the project launch's original predictions.
Keywords: Resource Sharing, ALEPH, ILLiad, Statewide Programs, Interlibrary Loan, shared collections, consortial resource sharing, remote circulation
Introduction
Consortial resource sharing services have been a primary objective for many libraries as they seek ways to expand their patrons' access to collections. Many libraries have focused on the possibilities of such a service as a means to provide access and ensure cost effectiveness while looking for more efficient delivery of materials to patrons. UBorrow was developed as a consortial resource sharing program through the State Universities Libraries (SUL) of Florida. This program was based on the Interlibrary Loan component of the Ex Libris ALEPH Integrated Library System (ILS). The eleven participant state university libraries all utilize the ALEPH system with centralized support for the system and UBorrow program provided by the Florida Center for Library Automation (FCLA).
This article revisits discussion from "The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group" (2012) which discussed the creation, testing and implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The UBorrow development group, consisting of delegates from each of the eleven state university main, health, and law libraries, tested possible systems and workflows and compiled a list of policies for program launch. The development group predicted that the new UBorrow service, with unmediated request sending and automated availability checks would be faster and create less work for library staff than the traditional interlibrary loan systems in place throughout the state. They also predicted that 30 to 40% of total traditional interlibrary loan request traffic would be diverted to this unmediated local system, which would ease burden on staff and save money (Schmidt and Smith, 2012).
This resource sharing program was tested in spring 2012 with a soft launch during the summer academic period. Full launch was done at the beginning of the 2011-12 academic year. Uborrow, similar to other statewide programs such as OhioLink and GIL Express, enjoyed significant praise from patrons while requiring moderate additional staff workload and
challenges to the system's operations.
Literature Review
The rising importance of electronic materials to researchers versus the declining use of print materials in the library is an oft discussed topic among library practitioners. Niu, Hemminger et al conducted a survey of academic researchers to understand the way they search for information to support their research (2010). One of the findings of this survey is that the majority of researchers preferred using print as well as electronic formats while fewer preferred one over the other (Nui, Hemminger et al, 2010). This may be one of the reasons many libraries continue to develop and expand cooperative and consortial resource sharing services to provide access to print materials while concentrating their acquisitions money on electronic materials. UBorrow's goals were to provide researchers and students with access to the combined collections of the state universities via a unified and cost effective service (Schmidt & Smith, 2012). The continued success of statewide programs, such as OhioLink and Gil Express, continue to encourage the development of other statewide cooperative programs. Cook and Smith described the growth of OhioLink to include various libraries across Ohio that provided access to materials beyond researchers' and students' home institutions (2011). Gil Express is a highly successful resource-sharing service that includes 35 state institutions belonging to the University Systems of Georgia (Smith, 2012). As seen in OhioLink and Gil Express, these statewide programs are often facilitated by a common Integrated Library System (ILS). UBorrow, OhioLink and Gil Express libraries all shared a common ILS, ALEPH by Ex Libris (Schmidt & Smith, 2012)(Cook & Smith, 2011)(Smith, 2012).
In addition to a state sponsored university programs, farther reaching cooperative organizations continue to develop programs that expand access to library materials without dependence on a common ILS system. The Pennsylvania Academic Libraries Consortium created a union catalog and E-Z Borrow program for their members which provided a statewide program originally independent of the state university system (Fennewald, 2005). Consortiums are often involved in the negotiation of agreements for electronic material at enhanced member pricing. The success of lending programs and consortial contract agreements can be seen as driving factors in developing the future of resource sharing programs such as e-book sharing. The Boston Library Consortium (BLC) has begun an E-Book pilot program that allows its 17 university and research library members to collectively purchase and use E-Books (BLC, 2012). The possibility of expanding consortial borrowing activities into lending of E-Books, combined with the demonstrated success of print material lending, ensure that programs like UBorrow will continue to be a significant resource for researchers and students.
Background
The Florida State University Libraries' (SUL) leadership group, the Council of State University Libraries (CSUL), conceptualized the creation of an unmediated borrowing service (FCLA, 2009) that would eventually be named UBorrow. The UBorrow resource sharing development team, made of members from all participant libraries, initially reviewed two possible systems to support the new program. This review included a recently upgraded ILS ALEPH version 19 and the current ILLiad system by Atlas Systems (FCLA, 2009). The development team selected the ALEPH ILL module as the system for the UBorrow service (Schmidt and Smith, 2012). The SULs already had a shared Union Catalog, which would be used as the patron interface for the new resource sharing program, and all the institutions used the same statewide courier services for interlibrary loan material transfer, which was thoroughly evaluated by the development team to assess its ability to absorb an increase in traffic while still guaranteeing timely delivery of materials.
Initial goals for the UBorrow service included enhancements to the catalog to better direct patron requests, allow full automation of lending request processing and make sure every institution had courier service five days a week to speed delivery. Prior to launch, the participating libraries agreed on a set of policies that would standardize the service and patron interaction with the request process. Policies regarding lost and overdue materials were put on hold until after the program had generated enough data to support an argument on whether or not a transfer of funds between institutions would be necessary.
Outcomes
The First Year
Enhancements to the catalog continued long after full launch in August 2011. Great discussion was had among the development group as to whether the UBorrow request button should be shown on items that were not 'UBorrow-able.' One view was that it would better direct patrons only to UBorrow-able items and not give them the incorrect impression that UBorrow could support their request. An opposing argument was made for making the UBorrow request button more of an all request button. In this scenario, the button on records that were not 'UBorrow-able' would direct the patron to traditional ILL requesting, using ILLiad's OpenURL feature. Patrons would never hit a wall in the system where they could see what they wanted, but not be shown how to ask for it. The simplest option was limiting the UBorrow request button to 'UBorrow-able' material only.
After two years of UBorrow service, full lending automation among all the libraries had still not been obtained. This was primarily due to individual participants desiring more control over when and where request pull slips printed. The ideal pull slip situation involved automated printing one or more times a day on a designated printer; staff or student workers would retrieve the print outs and fetch the material. In this scenario, noting on the requests that the items are on their way would be the first time any library staff would have to interact directly with the system. However, many libraries wanted to fit printing times into their staff's workflow, and required staff to log in to the UBorrow system in order to manually send the print command before materials could be fetched from the stacks. In addition to the timing of the pull slips, some libraries wanted to use removable adhesive labels instead of paper pull slips that would become book bands. Additional work had to <cursor_is_here> Budget restrictions also kept those libraries that had less than 5 day per week courier pick up from changing their courier contracts. UBorrow remained far from the function for which it was intended.
Additional work was also done to automate what began as a manual processing of renewal requests. Similar to traditional Interlibrary loan, a patron would send a renewal request, via their web accessible library account, that then had to be forwarded by his/her borrowing library to the lending library. The lending library would determine whether or not to approve the request and send their response, which would then be transmitted back to the patron. This excess of processing, spurred on discussion in the group on whether or not to extend the standard loan period from 30 to 60 days (Shrauger, Radnor, Schmidt, 2012). A longer loan period would result in less renewal requests made by patrons and thus less work. Though the loan period among the group was eventually changed to 60 days in September of 2012, work in the system to automate the renewal request process continued and eventually saw success. If an item had no other requests or holds in the system when the patron requested the renewal, that request would bypass any borrowing library processing and automatically update in the lending libraries system.
There was a total of 9,660 requests sent through the UBorrow system during the soft launch period of March 1, 2011 to August 1, 2011. Requests were automatically routed to the libraries where the item was currently available, and, because of this, many libraries were able to provide materials for a high percentage of incoming lending requests. However, when examining lender answers as to whether they could supply material, the average fill rate was just 54%. It appeared as though materials were being supplied by approximately three quarters of participating libraries, while the remaining quarter consistently denied requests. This trend continued through the first year of launch and only rose by 3% in the following year.
It was hoped that using real time availability checks and automating lending processes, book delivery would be faster than traditional ILL. This proved true as the average UBorrow delivery time in 2012 was just 4.11 days, 59.73% faster than average ILL book delivery time at
7.61 days.
<Fig. 1.1>
During the first year of full program launch patrons were given the option of commenting on the service at the point of request. A total of 300 responses were collected between March 2011 and the end of January 2012. Of those comments, more than half were positive, cheering the ease of requesting and speed of delivery. None were negative. Patrons' satisfaction with the increased speed of the service indicated that the UBorrow automations in place were doing their job of simplifying the process.
Figure 1.1 also shows that 30% of patron comments included extra instructions like emailing a different address than was on record or delivering to a campus address; 11% included questions about pick up locations, reserve and suggested purchases. These questions and comments were forwarded on to UBorrow sites for follow-up, but may indicate an area where the service could be improved with a more accessible FAQ and instructions for contacting a specific UBorrow site.
<Fig.1.2 >
The development group forecasted a decline in traditional interlibrary loan traffic after the launch of UBorrow. Investigation before the launch indicated that 30% of all interlibrary loan transactions at any one of the SULs occurred within the group. After a full launch and marketing campaign, the assumption was that this 30% of requests would move over to UBorrow. There was also an opinion within the group that resource sharing traffic in general, (i.e. the combination of ILL and UBorrow) would increase as it had with OhioLink after the launch of patron initiated borrowing in 1994 (Cook & Smith, 2011). Figure 2.1 shows the combined resource sharing traffic between traditional interlibrary loan and UBorrow after the UBorrow service launch until June of 2012. Contrary to expectations, UBorrow does not account for 30% of overall resource sharing traffic among the institutions. Two example institutions were chosen for a closer look.
The University of South Florida Tampa library, representative of the larger institutions in the group, services a community of 41,428 students enrolled full time with a $1.5 billion budget. Bachelor, Master, and Doctorate degrees are awarded among a total of 237 academic programs (University of South Florida, 2014). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 54,000 requests per year. USF is a net lender with nearly double the amount of lending requests received (~36,000 in 2010/11) compared to borrowing requests (~18,000 in 2010/11).
New College of Florida, representative of the smaller institutions, services an honors community of 832 students enrolled full time with a budget of $32.9 million (NCF Fast Facts). Bachelor degrees are awarded from 22 different liberal arts programs (NCF General Catalog). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 8,000 requests per year. NCF is a net borrower with triple the amount of borrowing requests processed (~6,000 in 2010/11) compared to lending requests (~2,000 in 2010/11).
USF numbers
<Fig. 2.1 >
A year after lauch, the use of UBorrow added to total borrowing traffic at USF, not removed or displaced it. This seems to suggest that the new environment and the marketing efforts associated with the launch of the new service gathered new patrons instead of wooing patrons who already used ILL through ILLiad.
The array of patron use also indicates that new users are finding the service. Though graduate patrons are the primary requesters of both systems, the percentage of undergraduates who used UBorrow in 2011/12 is noticeably different between the two services. 15% of ILL traffic through ILLiad belonged to undergraduates compared to 25% of undergraduate traffic in UBorrow.
<Fig. 2.2 >
Lending traffic, in comparison to the previous year, seemed to have been displaced by
the UBorrow system as predicted. Requests among the SULs for materials simply moved from ILL service through ILLiad to UBorrow service through the ALEPH system.
NCF numbers
<Fig. 3.1 >
The numbers at New College of Florida show a very different picture. For NCF, UBorrow does appear to have displaced borrowing traffic as well as increased resource sharing traffic overall. The most remarkable spike in resource sharing can be seen in September, the month after full launch.
<Fig. 3.2 >
In contrast, NCF's lending via traditional ILL did not diminish very much at all. Instead, lending traffic from UBorrow nearly doubled the amount of loans from NCF's collection. This hearkens to another concern of the original development group: that demands on the collections of smaller institutions would be most changed.
Years Two and Three
An early spring 2014 survey of the participating institutions shows that UBorrow processing is dissimilar among the libraries. While UBorrow was initially developed as extended circulation, most institutions locate it in the interlibrary loan department. Most institutions also use the paper pull slips to create book bands for UBorrow items even if they use removable labels for traditional interlibrary loan, or, as one library indicated "would prefer labels" but did not have the workflow established in UBorrow.
A questionnaire to library staff in charge of processing UBorrow was also circulated among the libraries in the fall of 2013. Answers from the participants of this survey are summarized in list of pros and cons for how the system currently functions. Among the benefits of UBorrow were faster turn around and ease of patron requesting, partially aided by the
patron's familiarity with the catalog interface. Overall, staff across the state saw UBorrow as an improved use of statewide library resources. However, UBorrow was seen as not quite fulfilling its potential. UBorrow's weaknesses were listed as needing more marketing and a better link between UBorrow and other ILL systems. The paperwork and labels are regarded as inefficient and many staff would like greater standardization. Though UBorrow deliveries are reported as faster than interlibrary loan the turnaround time is still not acceptable to staff and the patrons they serve. Similarly unacceptable is patron confusion about ebooks and what items are and are not borrowable in UBorrow. Staff members also pointed out that, though the intentions of UBorrow were admirable, the execution of the service left much to be desired (Resource Sharing Task Force, 2013).
<Fig 4.1 >
The majority of institutions have UBorrow borrowing and lending ratios similar to traditional interlibrary loan rates. The University of Central Florida (CFU in figure 4.1) has configured its instance of the UBorrow catalog to direct patrons to the ILLiad interlibrary loan request management system it uses for traditional ILL service to avoid duplicated workflows, so it's borrowing rates are not shown. The Florida Academic Repository (FLARE; FLR in figure 4.1) was added to UBorrow in the summer of 2013 and has thus far lent under one hundred books. FLARE was constructed to be a shared storage option for low use items among the universities (Florida Academic Repository, 2014). As more libraries send their materials to FLARE, UBorrow use of the collection may increase regardless of the items' low use status at their original owning institution. Among the few universities with UBorrow traffic greatly different from traditional ILL the University of Florida, Florida State University, and New College University's high rates of borrowing to lending illustrate the effect of strong and devoted marketing efforts at those institutions.
<Fig. 4.2 >
UBorrow request traffic in general has plateaued since the launch, as illustrated in figure
4.2, with volumes consistently under 20,000 total requests. This could be due to a drop in marketing efforts and increase in project load and distractions as the universities and statewide technical support worked through a legislative mandate to combine technical support for university and college libraries into one organization (FCLA, 2012). For instance, though each library has included the instructive information deemed necessary for their patrons in local web sites, there is currently no shared web page that describes and explains the service available to all patrons of UBorrow. Though the examples of what strong marketing efforts can do at University of Florida, Florida State University, and New College University in figure 4.1 offer a hint at the future should statewide marketing efforts be revived.
Lessons learned/Looking ahead
UBorrow currently only manages to fill 64% of patron requests on average. This is in stark contrast to the GWLA recommended 85-95% fill rate for borrowing in resource sharing. A low fill rate can be directly linked to a limited collection of materials and a high local demand for items at each university. The low instance of patron's moving their request to the interlibrary loan system (1% at USF; 5% at New College) indicates that the user sees the UBorrow cancellation as a dead end. Whether they are satisfied with this option may be linked to their knowledge of available resources. Whether libraries should be satisfied with this brick wall may be something that needs more emphasis on the UBorrow development priority list.
The average supply rate of 55% among lender libraries after the first year also needs consideration. This is due primarily to the almost one quarter of participating libraries not filling most or all of the requests that get sent them. These collections are only delaying patron requests from finding a lender. A review of the available collections, load leveling and policies could improve this situation. It might also alleviate increased lending workload at smaller institutions, as seen at NCF.
UBorrow is intended to be a great service, and like all great services, it must be in a
state of constant improvement. Patron satisfaction is at the heart of this mission. To this end the UBorrow Development priorities list gives libraries and users a peek into future modifications some of which include enhancing the UBorrow request button display and a plan to prevent requests going to non-lenders (FCLA, 2012). Continuing development faced new challenges in the reorganization of preexisting technical support centers across the state into a new service organization called the Florida Virtual Campus (FLVC) (FCLA, 2012).
No additional money was directed toward the development and launch of UBorrow, and staffing levels at participating institutions remained the same since the launch of the service in 2011. The new cooperative state university and college system, organized during the creation of the Florida Virtual Campus, meant the opportunity for UBorrow to expand. State colleges also used the ALEPH ILS and in February 2014 were added as potential lenders in UBorrow as the first step in a multi-phase merger. Future phases would include the holdings of the state colleges in the shared UBorrow catalog in conjunction with the launch of a shared statewide discovery tool. A committee of access services and interlibrary loan representatives from the universities and colleges, the FLVC Resource Sharing Standing Committee, was tasked with improving the existing systems and recommending new ways libraries across the state could cooperatively perfect resource sharing. Discussions about the future of UBorrow include lending media items, though agreement has not yet been reached on how long these items should circulate. These two new developments, the addition of state college holdings to the existing UBorrow system and the possibility of adding media, are contributing to increased complexity in the service. Items in UBorrow will no longer have the same due date and the same possibility for renewal no matter the lender. The FLVC Resource Sharing Standing Committee is also responsible for reviewing and updating the UBorrow policies developed for the launch of the original service.
Conclusion/Result
The merger of the pre-existing statewide technical support centers, the Florida Center
for Library Automation that serviced the universities, and the College Center for Library Automation that serviced the state colleges, delayed analysis, evaluation, and review of the UBorrow service and the policies it launched under. This may have also contributed to the leveling off of UBorrow traffic since the launch of the service. It is clear that marketing and promotion of the service is a key to the success of this cooperative lending program. As with other library programs, there must be continued focus on educating new students, faculty and researchers as you would with other library literacy programs. There must also be an effort to service review and improvement. These efforts must ensure that hindrances to the fulfillment of requests should be monitored and corrective action be taken to ensure improvement.
The new environment of expanded cooperation offers exciting possibilities and a much larger state wide library collection of access to UBorrow users. However, the inconsistent due dates and policies will probably cause initial confusion to users and, in the end, hamper the success of the system as a whole. The FLVC Resource Sharing Standing Committee's work on a set of shared policies becomes the most important part of future developments. UBorrow always has had the potential for adding more institutions similar to other programs like OhioLink. However, growth must be managed and supported to ensure that service delivery is maintained and improved for all participants. It is important that standardized policies, improved workflows and funding be provided so that there can be a baseline for the service. Experience has shown that inconsistent policies and low fulfillment rates could ultimately prevent this resource sharing program from achieving true success.
References
BLC, Ebrary, YBP partner for E-book pilot. (2012). Advanced Technology Libraries, 41(11), 6-6. Retrieved
from http://ezproxy.lib.usf.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&d b=llf&AN=83393836&site=eds-live
Cook, A., & Smith, D. J. (2011). The ohio library and information network : Resource sharing at its best. Journal of Interlibrary Loan, Document Delivery & Electronic Reserves, 21(5)
Fennewald, J. (2005). PALCI's virtual union catalog: Sharing the wealth. Journal of Library
Administration, 42(1), 63-78. doi:10.1300/J111v42n01-04
Florida Center for Library Automation (FCLA). (2012). Background on UBorrow pilot project..
Florida Center for Library Automation (FCLA). (2012). Florida virtual campus. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/5263
Florida Center for Library Automation (FCLA). (2012). Top development issues. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/3902
Niu, X., Hemminger, B. M., Lown, C., Adams, S., Brown, C., Level, A., . . . Cataldo, T. (2010). National study of information seeking behavior of academic researchers in the united states. Journal of the American Society for Information Science and Technology, 61(5), 869-890. doi:10.1002/asi.21307
Schmidt, L., & Smith, D. (2012). The florida state libraries resource sharing initiative: Unity among a disparate group. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(1), 9-15.
Smith, F. (2012). GIL express in georgia: An interlibrary Loan/Circulation hybrid for circulating books. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(2), 73-81.
University of South Florida. (2014). Common data sets 2013-2014 tampa & lakeland campus.
Retrieved, 2014, Retrieved from http://usfweb3.usf.edu/infocenter/Surveys/cds/CDS2013_2014_T a m pa . p
df
</text>
|
[
{
"content": "<url>\nhttps://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1176&context=tlas_pub\n</url>\n<text>\nAcademic Services Faculty and Staff Publications\n\n2014\n\nThe Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?\n\nLeEtta M. Schmidt University of South Florida, [email protected]\n\nDennis Smith\n\nBrandeis University\n\nFollow this and additional works at: http://scholarcommons.usf.edu/tlas_pub Part of the Library and Information Science Commons\n\nScholar Commons Citation\n\nSchmidt, LeEtta M. and Smith, Dennis, \"The Florida State Libraries Resource Sharing Initiative: Did the Predictions Pan Out?\" (2014). Academic Services Faculty and Staff Publications. Paper 171.\n\nhttp://scholarcommons.usf.edu/tlas_pub/171\n\nThis Article is brought to you for free and open access by the Tampa Library at Scholar Commons. It has been accepted for inclusion in Academic Services Faculty and Staff Publications by an authorized administrator of Scholar Commons. For more information, please contact [email protected].\n\nTampa Library\n\nAbstract\n\nThis article revisits discussion from \"The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group\" (2012) on the implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The program and it's effects are assessed after two years with comparison to the project launch's original predictions.\n\nKeywords: Resource Sharing, ALEPH, ILLiad, Statewide Programs, Interlibrary Loan, shared collections, consortial resource sharing, remote circulation\n\nIntroduction\n\nConsortial resource sharing services have been a primary objective for many libraries as they seek ways to expand their patrons' access to collections. Many libraries have focused on the possibilities of such a service as a means to provide access and ensure cost effectiveness while looking for more efficient delivery of materials to patrons. UBorrow was developed as a consortial resource sharing program through the State Universities Libraries (SUL) of Florida. This program was based on the Interlibrary Loan component of the Ex Libris ALEPH Integrated Library System (ILS). The eleven participant state university libraries all utilize the ALEPH system with centralized support for the system and UBorrow program provided by the Florida Center for Library Automation (FCLA).\n\nThis article revisits discussion from \"The Florida State Libraries Resource Sharing Initiative: Unity Among a Disparate Group\" (2012) which discussed the creation, testing and implementation of a new resource sharing program within the Florida State University Libraries called UBorrow. The UBorrow development group, consisting of delegates from each of the eleven state university main, health, and law libraries, tested possible systems and workflows and compiled a list of policies for program launch. The development group predicted that the new UBorrow service, with unmediated request sending and automated availability checks would be faster and create less work for library staff than the traditional interlibrary loan systems in place throughout the state. They also predicted that 30 to 40% of total traditional interlibrary loan request traffic would be diverted to this unmediated local system, which would ease burden on staff and save money (Schmidt and Smith, 2012).\n\nThis resource sharing program was tested in spring 2012 with a soft launch during the summer academic period. Full launch was done at the beginning of the 2011-12 academic year. Uborrow, similar to other statewide programs such as OhioLink and GIL Express, enjoyed significant praise from patrons while requiring moderate additional staff workload and\n\nchallenges to the system's operations.\n\nLiterature Review\n\nThe rising importance of electronic materials to researchers versus the declining use of print materials in the library is an oft discussed topic among library practitioners. Niu, Hemminger et al conducted a survey of academic researchers to understand the way they search for information to support their research (2010). One of the findings of this survey is that the majority of researchers preferred using print as well as electronic formats while fewer preferred one over the other (Nui, Hemminger et al, 2010). This may be one of the reasons many libraries continue to develop and expand cooperative and consortial resource sharing services to provide access to print materials while concentrating their acquisitions money on electronic materials. UBorrow's goals were to provide researchers and students with access to the combined collections of the state universities via a unified and cost effective service (Schmidt & Smith, 2012). The continued success of statewide programs, such as OhioLink and Gil Express, continue to encourage the development of other statewide cooperative programs. Cook and Smith described the growth of OhioLink to include various libraries across Ohio that provided access to materials beyond researchers' and students' home institutions (2011). Gil Express is a highly successful resource-sharing service that includes 35 state institutions belonging to the University Systems of Georgia (Smith, 2012). As seen in OhioLink and Gil Express, these statewide programs are often facilitated by a common Integrated Library System (ILS). UBorrow, OhioLink and Gil Express libraries all shared a common ILS, ALEPH by Ex Libris (Schmidt & Smith, 2012)(Cook & Smith, 2011)(Smith, 2012).\n\nIn addition to a state sponsored university programs, farther reaching cooperative organizations continue to develop programs that expand access to library materials without dependence on a common ILS system. The Pennsylvania Academic Libraries Consortium created a union catalog and E-Z Borrow program for their members which provided a statewide program originally independent of the state university system (Fennewald, 2005). Consortiums are often involved in the negotiation of agreements for electronic material at enhanced member pricing. The success of lending programs and consortial contract agreements can be seen as driving factors in developing the future of resource sharing programs such as e-book sharing. The Boston Library Consortium (BLC) has begun an E-Book pilot program that allows its 17 university and research library members to collectively purchase and use E-Books (BLC, 2012). The possibility of expanding consortial borrowing activities into lending of E-Books, combined with the demonstrated success of print material lending, ensure that programs like UBorrow will continue to be a significant resource for researchers and students.\n\nBackground\n\nThe Florida State University Libraries' (SUL) leadership group, the Council of State University Libraries (CSUL), conceptualized the creation of an unmediated borrowing service (FCLA, 2009) that would eventually be named UBorrow. The UBorrow resource sharing development team, made of members from all participant libraries, initially reviewed two possible systems to support the new program. This review included a recently upgraded ILS ALEPH version 19 and the current ILLiad system by Atlas Systems (FCLA, 2009). The development team selected the ALEPH ILL module as the system for the UBorrow service (Schmidt and Smith, 2012). The SULs already had a shared Union Catalog, which would be used as the patron interface for the new resource sharing program, and all the institutions used the same statewide courier services for interlibrary loan material transfer, which was thoroughly evaluated by the development team to assess its ability to absorb an increase in traffic while still guaranteeing timely delivery of materials.\n\nInitial goals for the UBorrow service included enhancements to the catalog to better direct patron requests, allow full automation of lending request processing and make sure every institution had courier service five days a week to speed delivery. Prior to launch, the participating libraries agreed on a set of policies that would standardize the service and patron interaction with the request process. Policies regarding lost and overdue materials were put on hold until after the program had generated enough data to support an argument on whether or not a transfer of funds between institutions would be necessary.\n\nOutcomes\n\nThe First Year\n\nEnhancements to the catalog continued long after full launch in August 2011. Great discussion was had among the development group as to whether the UBorrow request button should be shown on items that were not 'UBorrow-able.' One view was that it would better direct patrons only to UBorrow-able items and not give them the incorrect impression that UBorrow could support their request. An opposing argument was made for making the UBorrow request button more of an all request button. In this scenario, the button on records that were not 'UBorrow-able' would direct the patron to traditional ILL requesting, using ILLiad's OpenURL feature. Patrons would never hit a wall in the system where they could see what they wanted, but not be shown how to ask for it. The simplest option was limiting the UBorrow request button to 'UBorrow-able' material only.\n\nAfter two years of UBorrow service, full lending automation among all the libraries had still not been obtained. This was primarily due to individual participants desiring more control over when and where request pull slips printed. The ideal pull slip situation involved automated printing one or more times a day on a designated printer; staff or student workers would retrieve the print outs and fetch the material. In this scenario, noting on the requests that the items are on their way would be the first time any library staff would have to interact directly with the system. However, many libraries wanted to fit printing times into their staff's workflow, and required staff to log in to the UBorrow system in order to manually send the print command before materials could be fetched from the stacks. In addition to the timing of the pull slips, some libraries wanted to use removable adhesive labels instead of paper pull slips that would become book bands. Additional work had to <cursor_is_here> Budget restrictions also kept those libraries that had less than 5 day per week courier pick up from changing their courier contracts. UBorrow remained far from the function for which it was intended.\n\nAdditional work was also done to automate what began as a manual processing of renewal requests. Similar to traditional Interlibrary loan, a patron would send a renewal request, via their web accessible library account, that then had to be forwarded by his/her borrowing library to the lending library. The lending library would determine whether or not to approve the request and send their response, which would then be transmitted back to the patron. This excess of processing, spurred on discussion in the group on whether or not to extend the standard loan period from 30 to 60 days (Shrauger, Radnor, Schmidt, 2012). A longer loan period would result in less renewal requests made by patrons and thus less work. Though the loan period among the group was eventually changed to 60 days in September of 2012, work in the system to automate the renewal request process continued and eventually saw success. If an item had no other requests or holds in the system when the patron requested the renewal, that request would bypass any borrowing library processing and automatically update in the lending libraries system.\n\nThere was a total of 9,660 requests sent through the UBorrow system during the soft launch period of March 1, 2011 to August 1, 2011. Requests were automatically routed to the libraries where the item was currently available, and, because of this, many libraries were able to provide materials for a high percentage of incoming lending requests. However, when examining lender answers as to whether they could supply material, the average fill rate was just 54%. It appeared as though materials were being supplied by approximately three quarters of participating libraries, while the remaining quarter consistently denied requests. This trend continued through the first year of launch and only rose by 3% in the following year.\n\nIt was hoped that using real time availability checks and automating lending processes, book delivery would be faster than traditional ILL. This proved true as the average UBorrow delivery time in 2012 was just 4.11 days, 59.73% faster than average ILL book delivery time at\n\n7.61 days.\n\n<Fig. 1.1>\n\nDuring the first year of full program launch patrons were given the option of commenting on the service at the point of request. A total of 300 responses were collected between March 2011 and the end of January 2012. Of those comments, more than half were positive, cheering the ease of requesting and speed of delivery. None were negative. Patrons' satisfaction with the increased speed of the service indicated that the UBorrow automations in place were doing their job of simplifying the process.\n\nFigure 1.1 also shows that 30% of patron comments included extra instructions like emailing a different address than was on record or delivering to a campus address; 11% included questions about pick up locations, reserve and suggested purchases. These questions and comments were forwarded on to UBorrow sites for follow-up, but may indicate an area where the service could be improved with a more accessible FAQ and instructions for contacting a specific UBorrow site.\n\n<Fig.1.2 >\n\nThe development group forecasted a decline in traditional interlibrary loan traffic after the launch of UBorrow. Investigation before the launch indicated that 30% of all interlibrary loan transactions at any one of the SULs occurred within the group. After a full launch and marketing campaign, the assumption was that this 30% of requests would move over to UBorrow. There was also an opinion within the group that resource sharing traffic in general, (i.e. the combination of ILL and UBorrow) would increase as it had with OhioLink after the launch of patron initiated borrowing in 1994 (Cook & Smith, 2011). Figure 2.1 shows the combined resource sharing traffic between traditional interlibrary loan and UBorrow after the UBorrow service launch until June of 2012. Contrary to expectations, UBorrow does not account for 30% of overall resource sharing traffic among the institutions. Two example institutions were chosen for a closer look.\n\nThe University of South Florida Tampa library, representative of the larger institutions in the group, services a community of 41,428 students enrolled full time with a $1.5 billion budget. Bachelor, Master, and Doctorate degrees are awarded among a total of 237 academic programs (University of South Florida, 2014). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 54,000 requests per year. USF is a net lender with nearly double the amount of lending requests received (~36,000 in 2010/11) compared to borrowing requests (~18,000 in 2010/11).\n\nNew College of Florida, representative of the smaller institutions, services an honors community of 832 students enrolled full time with a budget of $32.9 million (NCF Fast Facts). Bachelor degrees are awarded from 22 different liberal arts programs (NCF General Catalog). Previous to and outside of UBorrow, regular interlibrary loan traffic totals 8,000 requests per year. NCF is a net borrower with triple the amount of borrowing requests processed (~6,000 in 2010/11) compared to lending requests (~2,000 in 2010/11).\n\nUSF numbers\n\n<Fig. 2.1 >\n\nA year after lauch, the use of UBorrow added to total borrowing traffic at USF, not removed or displaced it. This seems to suggest that the new environment and the marketing efforts associated with the launch of the new service gathered new patrons instead of wooing patrons who already used ILL through ILLiad.\n\nThe array of patron use also indicates that new users are finding the service. Though graduate patrons are the primary requesters of both systems, the percentage of undergraduates who used UBorrow in 2011/12 is noticeably different between the two services. 15% of ILL traffic through ILLiad belonged to undergraduates compared to 25% of undergraduate traffic in UBorrow.\n\n<Fig. 2.2 >\n\nLending traffic, in comparison to the previous year, seemed to have been displaced by\n\nthe UBorrow system as predicted. Requests among the SULs for materials simply moved from ILL service through ILLiad to UBorrow service through the ALEPH system.\n\nNCF numbers\n\n<Fig. 3.1 >\n\nThe numbers at New College of Florida show a very different picture. For NCF, UBorrow does appear to have displaced borrowing traffic as well as increased resource sharing traffic overall. The most remarkable spike in resource sharing can be seen in September, the month after full launch.\n\n<Fig. 3.2 >\n\nIn contrast, NCF's lending via traditional ILL did not diminish very much at all. Instead, lending traffic from UBorrow nearly doubled the amount of loans from NCF's collection. This hearkens to another concern of the original development group: that demands on the collections of smaller institutions would be most changed.\n\nYears Two and Three\n\nAn early spring 2014 survey of the participating institutions shows that UBorrow processing is dissimilar among the libraries. While UBorrow was initially developed as extended circulation, most institutions locate it in the interlibrary loan department. Most institutions also use the paper pull slips to create book bands for UBorrow items even if they use removable labels for traditional interlibrary loan, or, as one library indicated \"would prefer labels\" but did not have the workflow established in UBorrow.\n\nA questionnaire to library staff in charge of processing UBorrow was also circulated among the libraries in the fall of 2013. Answers from the participants of this survey are summarized in list of pros and cons for how the system currently functions. Among the benefits of UBorrow were faster turn around and ease of patron requesting, partially aided by the\n\npatron's familiarity with the catalog interface. Overall, staff across the state saw UBorrow as an improved use of statewide library resources. However, UBorrow was seen as not quite fulfilling its potential. UBorrow's weaknesses were listed as needing more marketing and a better link between UBorrow and other ILL systems. The paperwork and labels are regarded as inefficient and many staff would like greater standardization. Though UBorrow deliveries are reported as faster than interlibrary loan the turnaround time is still not acceptable to staff and the patrons they serve. Similarly unacceptable is patron confusion about ebooks and what items are and are not borrowable in UBorrow. Staff members also pointed out that, though the intentions of UBorrow were admirable, the execution of the service left much to be desired (Resource Sharing Task Force, 2013).\n\n<Fig 4.1 >\n\nThe majority of institutions have UBorrow borrowing and lending ratios similar to traditional interlibrary loan rates. The University of Central Florida (CFU in figure 4.1) has configured its instance of the UBorrow catalog to direct patrons to the ILLiad interlibrary loan request management system it uses for traditional ILL service to avoid duplicated workflows, so it's borrowing rates are not shown. The Florida Academic Repository (FLARE; FLR in figure 4.1) was added to UBorrow in the summer of 2013 and has thus far lent under one hundred books. FLARE was constructed to be a shared storage option for low use items among the universities (Florida Academic Repository, 2014). As more libraries send their materials to FLARE, UBorrow use of the collection may increase regardless of the items' low use status at their original owning institution. Among the few universities with UBorrow traffic greatly different from traditional ILL the University of Florida, Florida State University, and New College University's high rates of borrowing to lending illustrate the effect of strong and devoted marketing efforts at those institutions.\n\n<Fig. 4.2 >\n\nUBorrow request traffic in general has plateaued since the launch, as illustrated in figure\n\n4.2, with volumes consistently under 20,000 total requests. This could be due to a drop in marketing efforts and increase in project load and distractions as the universities and statewide technical support worked through a legislative mandate to combine technical support for university and college libraries into one organization (FCLA, 2012). For instance, though each library has included the instructive information deemed necessary for their patrons in local web sites, there is currently no shared web page that describes and explains the service available to all patrons of UBorrow. Though the examples of what strong marketing efforts can do at University of Florida, Florida State University, and New College University in figure 4.1 offer a hint at the future should statewide marketing efforts be revived.\n\nLessons learned/Looking ahead\n\nUBorrow currently only manages to fill 64% of patron requests on average. This is in stark contrast to the GWLA recommended 85-95% fill rate for borrowing in resource sharing. A low fill rate can be directly linked to a limited collection of materials and a high local demand for items at each university. The low instance of patron's moving their request to the interlibrary loan system (1% at USF; 5% at New College) indicates that the user sees the UBorrow cancellation as a dead end. Whether they are satisfied with this option may be linked to their knowledge of available resources. Whether libraries should be satisfied with this brick wall may be something that needs more emphasis on the UBorrow development priority list.\n\nThe average supply rate of 55% among lender libraries after the first year also needs consideration. This is due primarily to the almost one quarter of participating libraries not filling most or all of the requests that get sent them. These collections are only delaying patron requests from finding a lender. A review of the available collections, load leveling and policies could improve this situation. It might also alleviate increased lending workload at smaller institutions, as seen at NCF.\n\nUBorrow is intended to be a great service, and like all great services, it must be in a\n\nstate of constant improvement. Patron satisfaction is at the heart of this mission. To this end the UBorrow Development priorities list gives libraries and users a peek into future modifications some of which include enhancing the UBorrow request button display and a plan to prevent requests going to non-lenders (FCLA, 2012). Continuing development faced new challenges in the reorganization of preexisting technical support centers across the state into a new service organization called the Florida Virtual Campus (FLVC) (FCLA, 2012).\n\nNo additional money was directed toward the development and launch of UBorrow, and staffing levels at participating institutions remained the same since the launch of the service in 2011. The new cooperative state university and college system, organized during the creation of the Florida Virtual Campus, meant the opportunity for UBorrow to expand. State colleges also used the ALEPH ILS and in February 2014 were added as potential lenders in UBorrow as the first step in a multi-phase merger. Future phases would include the holdings of the state colleges in the shared UBorrow catalog in conjunction with the launch of a shared statewide discovery tool. A committee of access services and interlibrary loan representatives from the universities and colleges, the FLVC Resource Sharing Standing Committee, was tasked with improving the existing systems and recommending new ways libraries across the state could cooperatively perfect resource sharing. Discussions about the future of UBorrow include lending media items, though agreement has not yet been reached on how long these items should circulate. These two new developments, the addition of state college holdings to the existing UBorrow system and the possibility of adding media, are contributing to increased complexity in the service. Items in UBorrow will no longer have the same due date and the same possibility for renewal no matter the lender. The FLVC Resource Sharing Standing Committee is also responsible for reviewing and updating the UBorrow policies developed for the launch of the original service.\n\nConclusion/Result\n\nThe merger of the pre-existing statewide technical support centers, the Florida Center\n\nfor Library Automation that serviced the universities, and the College Center for Library Automation that serviced the state colleges, delayed analysis, evaluation, and review of the UBorrow service and the policies it launched under. This may have also contributed to the leveling off of UBorrow traffic since the launch of the service. It is clear that marketing and promotion of the service is a key to the success of this cooperative lending program. As with other library programs, there must be continued focus on educating new students, faculty and researchers as you would with other library literacy programs. There must also be an effort to service review and improvement. These efforts must ensure that hindrances to the fulfillment of requests should be monitored and corrective action be taken to ensure improvement.\n\nThe new environment of expanded cooperation offers exciting possibilities and a much larger state wide library collection of access to UBorrow users. However, the inconsistent due dates and policies will probably cause initial confusion to users and, in the end, hamper the success of the system as a whole. The FLVC Resource Sharing Standing Committee's work on a set of shared policies becomes the most important part of future developments. UBorrow always has had the potential for adding more institutions similar to other programs like OhioLink. However, growth must be managed and supported to ensure that service delivery is maintained and improved for all participants. It is important that standardized policies, improved workflows and funding be provided so that there can be a baseline for the service. Experience has shown that inconsistent policies and low fulfillment rates could ultimately prevent this resource sharing program from achieving true success.\n\nReferences\n\nBLC, Ebrary, YBP partner for E-book pilot. (2012). Advanced Technology Libraries, 41(11), 6-6. Retrieved\n\nfrom http://ezproxy.lib.usf.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&d b=llf&AN=83393836&site=eds-live\n\nCook, A., & Smith, D. J. (2011). The ohio library and information network : Resource sharing at its best. Journal of Interlibrary Loan, Document Delivery & Electronic Reserves, 21(5)\nFennewald, J. (2005). PALCI's virtual union catalog: Sharing the wealth. Journal of Library\nAdministration, 42(1), 63-78. doi:10.1300/J111v42n01-04\n\nFlorida Center for Library Automation (FCLA). (2012). Background on UBorrow pilot project..\n\nFlorida Center for Library Automation (FCLA). (2012). Florida virtual campus. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/5263\nFlorida Center for Library Automation (FCLA). (2012). Top development issues. Retrieved, 2014, Retrieved from https://fclaweb.fcla.edu/node/3902\nNiu, X., Hemminger, B. M., Lown, C., Adams, S., Brown, C., Level, A., . . . Cataldo, T. (2010). National study of information seeking behavior of academic researchers in the united states. Journal of the American Society for Information Science and Technology, 61(5), 869-890. doi:10.1002/asi.21307\nSchmidt, L., & Smith, D. (2012). The florida state libraries resource sharing initiative: Unity among a disparate group. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(1), 9-15.\nSmith, F. (2012). GIL express in georgia: An interlibrary Loan/Circulation hybrid for circulating books. Journal of Interlibrary Loan,Document Delivery Electronic Reserve, 22(2), 73-81.\n\nUniversity of South Florida. (2014). Common data sets 2013-2014 tampa & lakeland campus.\n\nRetrieved, 2014, Retrieved from http://usfweb3.usf.edu/infocenter/Surveys/cds/CDS2013_2014_T a m pa . p\n\ndf\n</text>\n",
"role": "user"
},
{
"content": "be done in the UBorrow system, post program launch, to develop this option.",
"role": "assistant"
}
] |
Zurich Tax Handbook 2015 16
This is likewise one of the factors by obtaining the soft documents of this zurich tax handbook 2015 16 by online. You might not require more epoch to spend to go to the books establishment as without difficulty as search for them. In some cases, you likewise pull off not discover the pronouncement zurich tax handbook 2015 16 that you are looking for. It will enormously squander the time.
However below, taking into account you visit this web page, it will be suitably unconditionally easy to get as capably as download guide zurich tax handbook 2015 16
It will not allow many times as we notify before. You can realize it even if sham something else at house and even in your workplace. so easy! So, are you question? Just exercise just what we meet the expense of under as without difficulty as evaluation zurich tax handbook 2015 16 what you in imitation of to read!
NEC code book layout \"basic\" English listening and reading practice test 2020 - August 17, 2020 Alcoholics Anonymous Big Book Audio Read Aloud Debt, service, and the origins of capitalism Michael Moore Presents: Planet of the Humans | Full Documentary | Directed by Jeff Gibbs 100 Questions for U.S. Citizenship - Easy Answers/Random Order!
Kindle Paperwhite Tips and Tricks TutorialTaxes in Switzerland. How to Pay Less Taxes. 5 Tips. Income Tax Switzerland Living in Switzerland - 5 Best Tax Haven Cantons to stay Study Section 1 CDL Manual - Introduction Tolley Exam Training: How to use the legislation to pass your tax exams The Best Tax Haven is Switzerland (2018) - Why? How to Get your CDL Permit - Pass the first time - Driving Academy Real Cost of Living in Switzerland for a Family I Got a Job in Switzerland. Information For Foreigners. That One Time In Switzerland | Sony A7SIII How to Explain Loan Documents!! Top 10 Offshore Tax Havens You Can Still Stash Your Cash
An American Quarantined in Germany E23: Dresden Day
Longplayer Conversation 2014: David Graeber and Brian Eno3 Levels Of Taxation In Switzerland Download Handbook of Taxation for FY 2077/78, IT \u0026 VAT Act (2/2)OPENING ACCOUNTS OF VARIOUS TYPES OF CUSTOMERS I JAIIB I PPB I UNIT - 15 Compliance Tips for Florida Medicaid Providers Tolley's Tax Guide 2014 15 Understanding Financial Statements and Accounting: Crash Course Entrepreneurship #15 Study Section 1 CDL Manual Introduction
Land Rover Discovery-4 long-term test reviewTolley's Yellow Tax Handbook 2014 2015 Zurich Tax Handbook 2015 16
The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16: Amazon.co.uk: Mowles, Gerald ...
The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
9781292098784: Zurich Tax Handbook 2015-16 - AbeBooks ...
Buy [(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ] published on (September, 2015) by Gerald Mowles (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible orders.
[(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ...
'The "Zurich Tax Handbook" should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' "Pensions World" The "Zurich Tax Handbook 2015-16" is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definition
Zurich Tax Handbook 2015-16 by Gerald Mowles
The Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16 by Gerald Mowles, Anthony ...
The Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16 : Anthony Foreman : 9781292098784
Find Zurich Tax Handbook 2015 - 16, by Gerald A. Mowles, Tony Foreman, ISBN 9781292098784, published by Pearson Education Ltd from www.wildy.com, the World's Legal Bookshop. Shipping in the UK is free. Competitive shipping rates world-wide.
Wildy & Sons Ltd — The World's Legal Bookshop Search ...
Hello Select your address Best Sellers Today's Deals Electronics Customer Service Books New Releases Home Computers Gift Ideas Gift Cards Sell
Zurich Tax Handbook 2015-16: Mowles, Gerald, Foreman ...
Amazon.in - Buy Zurich Tax Handbook 2015-16 book online at best prices in India on Amazon.in. Read Zurich Tax Handbook 2015-16 book reviews & author details and more at Amazon.in. Free delivery on qualified orders.
Buy Zurich Tax Handbook 2015-16 Book Online at Low Prices ...
Compre online Zurich Tax Handbook 2015-16, de Mowles, Gerald, Foreman, Mr Anthony na Amazon. Frete GRTIS em milhares de produtos com o Amazon Prime. Encontre diversos livros escritos por Mowles, Gerald, Foreman, Mr Anthony com ótimos preos.
Zurich Tax Handbook 2015-16 | Amazon.com.br
Get Free Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 If you ally craving such a referred zurich tax handbook 2015 16 book that will allow you worth, acquire the unquestionably best seller from us currently from several preferred authors.
Page 1/3
Zurich Tax Handbook 2015 16 - electionsdev.calmatters.org
Zurich Tax Handbook 2015-16. By author: Gerald Mowles, Anthony Foreman ...
9781292098784-Zurich Tax Handbook 2015-16
Read Online Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 When somebody should go to the book stores, search foundation by shop, shelf by shelf, it is in reality problematic. This is why we provide the books compilations in this website. It will utterly ease you to look guide zurich tax handbook 2015 16 as you such as.
Zurich Tax Handbook 2015 16 - dc-75c7d428c907.tecadmin.net
Inbunden, 2015. Den hr utgvan av Zurich Tax Handbook 2015-16 r slutsld. Kom in och se andra utgvor eller andra bcker av samma frfattare.
Zurich Tax Handbook 2015-16 - Gerald Mowles - Bok ...
Find many great new & used options and get the best deals for Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition) at the best online prices at eBay! Free shipping for many products!
Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition ...
as well as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition the zurich tax handbook 2015 16 is your annual authoritative guide to
Zurich Tax Handbook 2015 2016 [PDF]
Description 'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.'. Pensions World . The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and ...
Zurich Tax Handbook 2015-16 - GeraldMowles - 9781292098784 ...
many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it handbook 2015 16 zurich tax handbook 2015 16 when somebody should go to the book stores search foundation by shop shelf by shelf it is in reality problematic this is why we provide the books compilations in this website it will utterly ease you to look guide zurich tax handbook 2015 16 as you such as by searching the title publisher or authors of guide ...
Zurich Tax Handbook 2015 2016 - viladimo.dassie.co.uk as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition ebook zurich tax handbook 2015 2016 uploaded by karl may the zurich tax
'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2015–16 Over 120 key 'tax notes' to help save you money Detailed advice on how to reduce tax liabilities for yourself and your clients Comprehensive information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net worth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.
This tax handbook covers every aspect of taxation in a totally accessible manner, providing worked examples, checklists and shrewd advice in the form of taxsaving tips.
This is an essential annual purchase for anyone involved in taxation, from individuals through to advisers, investors, accountants and tax lawyers. The Zurich Tax Handbook 2013 – 2014 provides detailed coverage of the UK tax system and identifies the way that it may affect you or your clients. Up-to-date and userfriendly, this book explains the key aspects of taxation providing worked examples, checklists, definitions and tax-saving hints.
'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2014–15 is your annual authoritative guide to the UK tax system and details how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the March 2014 Budget and the Finance Act 2014. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2014-15 Over 120 key 'tax notes' to help save you money Comprehensive advice on how to reduce tax liabilities for yourself and your clients Detailed information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net wealth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.
An unprecedented new international moral and legal rule forbids one state from hosting money stolen by the leaders of another state. The aim is to counter grand corruption or kleptocracy ("rule by thieves"), when leaders of poorer countries—such as Marcos in the Philippines, Mobutu in the Congo, and more recently those overthrown in revolutions in the Arab world and Ukraine—loot billions of dollars at the expense of their own citizens. This money tends to end up hosted in rich countries. These host states now have a duty to block, trace, freeze, and seize these illicit funds and hand them back to the countries from which they were stolen. In The Despot's Guide to Wealth Management, J. C. Sharman asks how this anti-kleptocracy regime came about, how well it is working, and how it could work better. Although there have been some real achievements, the international campaign against grand corruption has run into major obstacles. The vested interests of banks, lawyers, and even law enforcement often favor turning a blind eye to foreign corruption proceeds. Recovering and returning looted assets is a long, complicated, and expensive process. Sharman used a private investigator, participated in and observed anti-corruption policy, and conducted more than a hundred interviews with key players. He also draws on various journalistic exposés, whistle-blower accounts, and government investigations to inform his comparison of the anti-kleptocracy records of the United States, Britain, Switzerland, and Australia. Sharman calls for better policing, preventative measures, and
Page 2/3
Copyright : elearning.saem.org use of gatekeepers like bankers, lawyers, and real estate agents. He also recommends giving nongovernmental organizations and for-profit firms more scope to independently investigate corruption and seize stolen assets.
International taxation is evolving in response to globalization, capital mobility, and the increased trade in services, and introduces international tax practitioner, student and researcher to the theory, practice, and international examples of the changing landscape. Models of tax competition in a flat and connected world are very different than those necessary to ensure compliance in a world dominated by cross-border flows of goods and repatriation of profits. Taxes on consumption, e-commerce, and services are looming innovations in future of international taxation. Tax coordination and standardization are immense challenges in a world in which the movement of value is increasingly subtle and hard to detect. And as corporations and individuals become more sophisticated in the internationalization of flows of capital, our models must become more sophisticated in their scope and inclusion. In the era when trade was dominated by the exchange of manufactured goods, international taxation was designed to protect domestic industries, create tax revenue, prevent evasion, and promote compliance. The traditional toolbox of customs duties, tariffs, and taxes on repatriated profits must be augmented as the movement of goods across borders represents a much smaller fraction of trade and as international taxation policy is increasingly used to attract foreign corporations rather than discourage branch offices. International taxation models that can better tax services, track international flows of capital, and allow a nation to compete in a world market for capital formation are the tools of the modern tax practitioner. International tax policy is now viewed as an integral part of economic policy. This approach is bound to accelerate as the world becomes increasingly flat and better connected. Economic progress is more and more influenced by the movement of services and information, movements that are no longer through ports but through fiber optic lines. This book contributes to the growing literature on international taxation by bringing together theory and experience, current practices and innovation, and our current understanding of some of the challenges now facing and arguably frustrating current international taxation policy. The book will create new avenues of research for scholars, a new awareness for students of International Taxation, and new possibilities for international tax practitioners. The models and examples presented here suggest that there are serious problems with measurability of flows of services and information, and points to an increasingly need for greater harmonization of international taxation, perhaps through coordinated consumption-tax oriented approaches. * Describe the rapidly evolving role of International Taxation in a globalizing information economy * Present theoretical models that act as the basis for successful international tax competition * Describe the experiences and innovations of representative internationalized countries * Discuss some new approaches to International Taxation * Makes the case for new models of international taxation in an increasingly global information world
Behavioural change has become a core issue of public policy. Behavioural instruments such as 'nudging' apply insights from behavioural economics and behavioural sciences, psychology and neurosciences across a broad range of policy areas. Behavioural insights teams and networks facilitate the global spread of behavioural public policies. Despite an ever-growing amount of literature, research has remained fragmented. This comprehensive Handbook unites interdisciplinary scholarship, with contributions critically assessing the state and direction of behavioural public policies, their normative implications and political consequences.
The Routledge Handbook of Taxation and Philanthropy ventures into a territory that is still widely unexplored. It contains 30 academic contributions that aim to provide a better understanding of whether, why, and how philanthropic initiatives, understood as voluntary contributions for the common good, can and should be fostered by states through tax incentives. The topic has been addressed from a multidisciplinary and multicultural perspective – covering neuroeconomics, sociology, political science, psychology, affective sciences, philosophy, behavioral economy, and law – because of its global and multifaceted nature. It also contains the OECD report on Taxation and Philanthropy released in November 2020, which was prepared in this context as a result of a collaboration with the Geneva Centre for Philanthropy of the University of Geneva. The book is divided into four sections, exploring, respectively, the justification of tax incentives for philanthropy, theoretical and empirical insights about taxes, efficiency and donor behavior in that context, and tax incentives for cross-border philanthropy and for hybrid entities and social entrepreneurship. It is believed that this volume will be a landmark yet only the beginning of a journey in which a lot remains to be studied, learned, and said.
Ingeniously organized in a life cycle format, the Handbook covers environmental taxation concepts, design, acceptance, implementation, and impact. The universal themes discussed in each area will appeal to a broad range of readers. Larry Kreiser, Cleveland State University, US This book is a smart and useful readers guide providing analytical tools for a full comprehension of environmental taxes, with an interdisciplinary approach that looks at all the different phases of environmental taxation: from the design to the implementation, the political acceptance and the impact on the economy. The authors effort is very successful in endowing academicians, policy makers and the general public with an excellent proof of the effectiveness of environmental taxes and green tax reforms. Alberto Majocchi, University of Pavia, Italy Putting the words environment next to taxation might not always be the flavour of the month, but no modern society can ignore the value of the natural environment and the need to maintain its good quality and no competitive economy can prosper without the necessary tax revenues to function. Environmental taxation offers the prospect of moving towards a more resource-efficient economy, where preference is given to tax more what we burn, less what we earn. I welcome this contribution to the literature. Commissioner Connie Hedegaard, European Commission The Milne and Andersen volume provides a splendid treatment of environmental taxation that encompasses the basic conceptual issues, problems of tax design and implementation, and several insightful case studies that show how environmental taxes actually work in practice. It is the best overall treatment of environmental taxation available: comprehensive, rigorous, and readable. Wallace Oates, University of Maryland, US The Handbook of Research on Environmental Taxation captures the state of the art of research on environmental taxation. Written by 36 specialists in environmental taxation from 16 countries, it takes an interdisciplinary and international approach, focusing on issues that are universal to using taxation to achieve environmental goals. The Handbook explores the conceptual foundations of environmental taxation, essential elements for designing environmental tax measures, factors that influence the acceptance of environmental taxation, the variety of ways to implement environmental taxes, their environmental and economic impact and, finally, the larger question of the role of taxation among other policy approaches to environmental protection. Intermixing theory with case studies, the Handbook offers readers lessons that can be applied around the world. It identifies key bodies of research for people who are already working in the field or entering the field and highlights issues that call for more research in the future. With systematic analysis of key issues in environmental taxation, this book will appeal to researchers, governments, think tanks, NGOs, and academics in law, economics, political science and public finance, as well as students specializing in environmental taxation and other market-based instruments.
Copyright code : a4120afd08441b058cd839b5c3ea0cca
Page 3/3
|
<urn:uuid:d3a9d1a2-e4bb-49a2-8d92-437ee6a9a34e>
|
CC-MAIN-2022-05
|
http://elearning.saem.org/cgi-bin/content/view.php?data=zurich_tax_handbook_2015_16&filetype=pdf&id=a4120afd08441b058cd839b5c3ea0cca
|
2022-01-17T22:38:50+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-05/subset=warc/part-00263-1e2959d8-5649-433a-b76e-f1b876a6479d.c000.gz.parquet
| 26,134,307
| 4,602
|
eng_Latn
|
eng_Latn
| 0.993774
|
eng_Latn
| 0.996373
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
6391,
13801,
22386
] |
Zurich Tax Handbook 2015 16
This is likewise one of the factors by obtaining the soft documents of this zurich tax handbook 2015 16 by online. You might not require more epoch to spend to go to the books establishment as without difficulty as search for them. In some cases, you likewise pull off not discover the pronouncement zurich tax handbook 2015 16 that you are looking for. It will enormously squander the time.
However below, taking into account you visit this web page, it will be suitably unconditionally easy to get as capably as download guide zurich tax handbook 2015 16
It will not allow many times as we notify before. You can realize it even if sham something else at house and even in your workplace. so easy! So, are you question? Just exercise just what we meet the expense of under as without difficulty as evaluation zurich tax handbook 2015 16 what you in imitation of to read!
NEC code book layout \"basic\" English listening and reading practice test 2020 - August 17, 2020 Alcoholics Anonymous Big Book Audio Read Aloud Debt, service, and the origins of capitalism Michael Moore Presents: Planet of the Humans | Full Documentary | Directed by Jeff Gibbs 100 Questions for U.S. Citizenship - Easy Answers/Random Order!
Kindle Paperwhite Tips and Tricks TutorialTaxes in Switzerland. How to Pay Less Taxes. 5 Tips. Income Tax Switzerland Living in Switzerland - 5 Best Tax Haven Cantons to stay Study Section 1 CDL Manual - Introduction Tolley Exam Training: How to use the legislation to pass your tax exams The Best Tax Haven is Switzerland (2018) - Why? How to Get your CDL Permit - Pass the first time - Driving Academy Real Cost of Living in Switzerland for a Family I Got a Job in Switzerland. Information For Foreigners. That One Time In Switzerland | Sony A7SIII How to Explain Loan Documents!! Top 10 Offshore Tax Havens You Can Still Stash Your Cash
An American Quarantined in Germany E23: Dresden Day
Longplayer Conversation 2014: David Graeber and Brian Eno3 Levels Of Taxation In Switzerland Download Handbook of Taxation for FY 2077/78, IT \u0026 VAT Act (2/2)OPENING ACCOUNTS OF VARIOUS TYPES OF CUSTOMERS I JAIIB I PPB I UNIT - 15 Compliance Tips for Florida Medicaid Providers Tolley's Tax Guide 2014 15 Understanding Financial Statements and Accounting: Crash Course Entrepreneurship #15 Study Section 1 CDL Manual Introduction
Land Rover Discovery-4 long-term test reviewTolley's Yellow Tax Handbook 2014 2015 Zurich Tax Handbook 2015 16
The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16: Amazon.co.uk: Mowles, Gerald ...
The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
9781292098784: Zurich Tax Handbook 2015-16 - AbeBooks ...
Buy [(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ] published on (September, 2015) by Gerald Mowles (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible orders.
[(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ...
'The "Zurich Tax Handbook" should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' "Pensions World" The "Zurich Tax Handbook 2015-16" is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definition
Zurich Tax Handbook 2015-16 by Gerald Mowles
The Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16 by Gerald Mowles, Anthony ...
The Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16 : Anthony Foreman : 9781292098784
Find Zurich Tax Handbook 2015 - 16, by Gerald A. Mowles, Tony Foreman, ISBN 9781292098784, published by Pearson Education Ltd from www.wildy.com, the World's Legal Bookshop. Shipping in the UK is free. Competitive shipping rates world-wide.
Wildy & Sons Ltd — The World's Legal Bookshop Search ...
Hello Select your address Best Sellers Today's Deals Electronics Customer Service Books New Releases Home Computers Gift Ideas Gift Cards Sell
Zurich Tax Handbook 2015-16: Mowles, Gerald, Foreman ...
Amazon.in - Buy Zurich Tax Handbook 2015-16 book online at best prices in India on Amazon.in. Read Zurich Tax Handbook 2015-16 book reviews & author details and more at Amazon.in. Free delivery on qualified orders.
Buy Zurich Tax Handbook 2015-16 Book Online at Low Prices ...
Compre online Zurich Tax Handbook 2015-16, de Mowles, Gerald, Foreman, Mr Anthony na Amazon. Frete GRTIS em milhares de produtos com o Amazon Prime. Encontre diversos livros escritos por Mowles, Gerald, Foreman, Mr Anthony com ótimos preos.
Zurich Tax Handbook 2015-16 | Amazon.com.br
Get Free Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 If you ally craving such a referred zurich tax handbook 2015 16 book that will allow you worth, acquire the unquestionably best seller from us currently from several preferred authors.
Page 1/3
Zurich Tax Handbook 2015 16 - electionsdev.calmatters.org
Zurich Tax Handbook 2015-16. By author: Gerald Mowles, Anthony Foreman ...
9781292098784-Zurich Tax Handbook 2015-16
Read Online Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 When somebody should go to the book stores, search foundation by shop, shelf by shelf, it is in reality problematic. This is why we provide the books compilations in this website. It will utterly ease you to look guide zurich tax handbook 2015 16 as you such as.
Zurich Tax Handbook 2015 16 - dc-75c7d428c907.tecadmin.net
Inbunden, 2015. Den hr utgvan av Zurich Tax Handbook 2015-16 r slutsld. Kom in och se andra utgvor eller andra bcker av samma frfattare.
Zurich Tax Handbook 2015-16 - Gerald Mowles - Bok ...
Find many great new & used options and get the best deals for Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition) at the best online prices at eBay! Free shipping for many products!
Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition ...
as well as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition the zurich tax handbook 2015 16 is your annual authoritative guide to
Zurich Tax Handbook 2015 2016 [PDF]
Description 'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.'. Pensions World . The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and ...
Zurich Tax Handbook 2015-16 - GeraldMowles - 9781292098784 ...
many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it handbook 2015 16 zurich tax handbook 2015 16 when somebody should go to the book stores search foundation by shop shelf by shelf it is in reality problematic this is why we provide the books compilations in this website it will utterly ease you to look guide zurich tax handbook 2015 16 as you such as by searching the title publisher or authors of guide ...
Zurich Tax Handbook 2015 2016 - viladimo.dassie.co.uk as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition ebook zurich tax handbook 2015 2016 uploaded by karl may the zurich tax
'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2015–16 Over 120 key 'tax notes' to help save you money Detailed advice on how to reduce tax liabilities for yourself and your clients Comprehensive information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net worth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.
This tax handbook covers every aspect of taxation in a totally accessible manner, providing worked examples, checklists and shrewd advice in the form of taxsaving tips.
This is an essential annual purchase for anyone involved in taxation, from individuals through to advisers, investors, accountants and tax lawyers. The Zurich Tax Handbook 2013 – 2014 provides detailed coverage of the UK tax system and identifies the way that it may affect you or your clients. Up-to-date and userfriendly, this book explains the key aspects of taxation providing worked examples, checklists, definitions and tax-saving hints.
'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2014–15 is your annual authoritative guide to the UK tax system and details how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the March 2014 Budget and the Finance Act 2014. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2014-15 Over 120 key 'tax notes' to help save you money Comprehensive advice on how to reduce tax liabilities for yourself and your clients Detailed information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net wealth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.
An unprecedented new international moral and legal rule forbids one state from hosting money stolen by the leaders of another state. The aim is to counter grand corruption or kleptocracy ("rule by thieves"), when leaders of poorer countries—such as Marcos in the Philippines, Mobutu in the Congo, and more recently those overthrown in revolutions in the Arab world and Ukraine—loot billions of dollars at the expense of their own citizens. This money tends to end up hosted in rich countries. These host states now have a duty to block, trace, freeze, and seize these illicit funds and hand them back to the countries from which they were stolen. In The Despot's Guide to Wealth Management, J. C. Sharman asks how this anti-kleptocracy regime came about, how well it is working, and how it could work better. Although there have been some real achievements, the international campaign against grand corruption has run into major obstacles. The vested interests of banks, lawyers, and even law enforcement often favor turning a blind eye to foreign corruption proceeds. Recovering and returning looted assets is a long, complicated, and expensive process. Sharman used a private investigator, participated in and observed anti-corruption policy, and conducted more than a hundred interviews with key players. He also draws on various journalistic exposés, whistle-blower accounts, and government investigations to inform his comparison of the anti-kleptocracy records of the United States, Britain, Switzerland, and Australia. Sharman calls for better policing, preventative measures, and
Page 2/3
Copyright : elearning.saem.org use of gatekeepers like bankers, lawyers, and real estate agents. He also recommends giving nongovernmental organizations and for-profit firms more scope to independently investigate corruption and seize stolen assets.
International taxation is evolving in response to globalization, capital mobility, and the increased trade in services, and introduces international tax practitioner, student and researcher to the theory, practice, and international examples of the changing landscape. Models of tax competition in a flat and connected world are very different than those necessary to ensure compliance in a world dominated by cross-border flows of goods and repatriation of profits. Taxes on consumption, e-commerce, and services are looming innovations in future of international taxation. Tax coordination and standardization are immense challenges in a world in which the movement of value is increasingly subtle and hard to detect. And as corporations and individuals become more sophisticated in the internationalization of flows of capital, our models must become more sophisticated in their scope and inclusion. In the era when trade was dominated by the exchange of manufactured goods, international taxation was designed to protect domestic industries, create tax revenue, prevent evasion, and promote compliance. The traditional toolbox of customs duties, tariffs, and taxes on repatriated profits must be augmented as the movement of goods across borders represents a much smaller fraction of trade and as international taxation policy is increasingly used to attract foreign corporations rather than discourage branch offices. International taxation models that can better tax services, track international flows of capital, and allow a nation to compete in a world market for capital formation are the tools of the modern tax practitioner. International tax policy is now viewed as an integral part of economic policy. This approach is bound to accelerate as the world becomes increasingly flat and better connected. Economic progress is more and more influenced by the movement of services and information, movements that are no longer through ports but through fiber optic lines. This book contributes to the growing literature on international taxation by bringing together theory and experience, current practices and innovation, and our current understanding of some of the challenges now facing and arguably frustrating current international taxation policy. The book will create new avenues of research for scholars, a new awareness for students of International Taxation, and new possibilities for international tax practitioners. The models and examples presented here suggest that there are serious problems with measurability of flows of services and information, and points to an increasingly need for greater harmonization of international taxation, perhaps through coordinated consumption-tax oriented approaches. * Describe the rapidly evolving role of International Taxation in a globalizing information economy * Present theoretical models that act as the basis for successful international tax competition * Describe the experiences and innovations of representative internationalized countries * Discuss some new approaches to International Taxation * Makes the case for new models of international taxation in an increasingly global information world
Behavioural change has become a core issue of public policy. Behavioural instruments such as 'nudging' apply insights from behavioural economics and behavioural sciences, psychology and neurosciences across a broad range of policy areas. Behavioural insights teams and networks facilitate the global spread of behavioural public policies. Despite an ever-growing amount of literature, research has remained fragmented. This comprehensive Handbook unites interdisciplinary scholarship, with contributions critically assessing the state and direction of behavioural public policies, their normative implications and political consequences.
The Routledge Handbook of Taxation and Philanthropy ventures into a territory that is still widely unexplored. It contains 30 academic contributions that aim to provide a better understanding of whethe
|
r, why, and how philanthropic initiatives, understood as voluntary contributions for the common good, can and should be fostered by states through tax incentives.
|
The topic has been addressed from a multidisciplinary and multicultural perspective – covering neuroeconomics, sociology, political science, psychology, affective sciences, philosophy, behavioral economy, and law – because of its global and multifaceted nature. It also contains the OECD report on Taxation and Philanthropy released in November 2020, which was prepared in this context as a result of a collaboration with the Geneva Centre for Philanthropy of the University of Geneva. The book is divided into four sections, exploring, respectively, the justification of tax incentives for philanthropy, theoretical and empirical insights about taxes, efficiency and donor behavior in that context, and tax incentives for cross-border philanthropy and for hybrid entities and social entrepreneurship. It is believed that this volume will be a landmark yet only the beginning of a journey in which a lot remains to be studied, learned, and said.
Ingeniously organized in a life cycle format, the Handbook covers environmental taxation concepts, design, acceptance, implementation, and impact. The universal themes discussed in each area will appeal to a broad range of readers. Larry Kreiser, Cleveland State University, US This book is a smart and useful readers guide providing analytical tools for a full comprehension of environmental taxes, with an interdisciplinary approach that looks at all the different phases of environmental taxation: from the design to the implementation, the political acceptance and the impact on the economy. The authors effort is very successful in endowing academicians, policy makers and the general public with an excellent proof of the effectiveness of environmental taxes and green tax reforms. Alberto Majocchi, University of Pavia, Italy Putting the words environment next to taxation might not always be the flavour of the month, but no modern society can ignore the value of the natural environment and the need to maintain its good quality and no competitive economy can prosper without the necessary tax revenues to function. Environmental taxation offers the prospect of moving towards a more resource-efficient economy, where preference is given to tax more what we burn, less what we earn. I welcome this contribution to the literature. Commissioner Connie Hedegaard, European Commission The Milne and Andersen volume provides a splendid treatment of environmental taxation that encompasses the basic conceptual issues, problems of tax design and implementation, and several insightful case studies that show how environmental taxes actually work in practice. It is the best overall treatment of environmental taxation available: comprehensive, rigorous, and readable. Wallace Oates, University of Maryland, US The Handbook of Research on Environmental Taxation captures the state of the art of research on environmental taxation. Written by 36 specialists in environmental taxation from 16 countries, it takes an interdisciplinary and international approach, focusing on issues that are universal to using taxation to achieve environmental goals. The Handbook explores the conceptual foundations of environmental taxation, essential elements for designing environmental tax measures, factors that influence the acceptance of environmental taxation, the variety of ways to implement environmental taxes, their environmental and economic impact and, finally, the larger question of the role of taxation among other policy approaches to environmental protection. Intermixing theory with case studies, the Handbook offers readers lessons that can be applied around the world. It identifies key bodies of research for people who are already working in the field or entering the field and highlights issues that call for more research in the future. With systematic analysis of key issues in environmental taxation, this book will appeal to researchers, governments, think tanks, NGOs, and academics in law, economics, political science and public finance, as well as students specializing in environmental taxation and other market-based instruments.
Copyright code : a4120afd08441b058cd839b5c3ea0cca
Page 3/3
| 18,063
|
inside_word
|
whether,
|
remove_one_sentence
|
<url>
http://elearning.saem.org/cgi-bin/content/view.php?data=zurich_tax_handbook_2015_16&filetype=pdf&id=a4120afd08441b058cd839b5c3ea0cca
</url>
<text>
Zurich Tax Handbook 2015 16
This is likewise one of the factors by obtaining the soft documents of this zurich tax handbook 2015 16 by online. You might not require more epoch to spend to go to the books establishment as without difficulty as search for them. In some cases, you likewise pull off not discover the pronouncement zurich tax handbook 2015 16 that you are looking for. It will enormously squander the time.
However below, taking into account you visit this web page, it will be suitably unconditionally easy to get as capably as download guide zurich tax handbook 2015 16
It will not allow many times as we notify before. You can realize it even if sham something else at house and even in your workplace. so easy! So, are you question? Just exercise just what we meet the expense of under as without difficulty as evaluation zurich tax handbook 2015 16 what you in imitation of to read!
NEC code book layout \"basic\" English listening and reading practice test 2020 - August 17, 2020 Alcoholics Anonymous Big Book Audio Read Aloud Debt, service, and the origins of capitalism Michael Moore Presents: Planet of the Humans | Full Documentary | Directed by Jeff Gibbs 100 Questions for U.S. Citizenship - Easy Answers/Random Order!
Kindle Paperwhite Tips and Tricks TutorialTaxes in Switzerland. How to Pay Less Taxes. 5 Tips. Income Tax Switzerland Living in Switzerland - 5 Best Tax Haven Cantons to stay Study Section 1 CDL Manual - Introduction Tolley Exam Training: How to use the legislation to pass your tax exams The Best Tax Haven is Switzerland (2018) - Why? How to Get your CDL Permit - Pass the first time - Driving Academy Real Cost of Living in Switzerland for a Family I Got a Job in Switzerland. Information For Foreigners. That One Time In Switzerland | Sony A7SIII How to Explain Loan Documents!! Top 10 Offshore Tax Havens You Can Still Stash Your Cash
An American Quarantined in Germany E23: Dresden Day
Longplayer Conversation 2014: David Graeber and Brian Eno3 Levels Of Taxation In Switzerland Download Handbook of Taxation for FY 2077/78, IT \u0026 VAT Act (2/2)OPENING ACCOUNTS OF VARIOUS TYPES OF CUSTOMERS I JAIIB I PPB I UNIT - 15 Compliance Tips for Florida Medicaid Providers Tolley's Tax Guide 2014 15 Understanding Financial Statements and Accounting: Crash Course Entrepreneurship #15 Study Section 1 CDL Manual Introduction
Land Rover Discovery-4 long-term test reviewTolley's Yellow Tax Handbook 2014 2015 Zurich Tax Handbook 2015 16
The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16: Amazon.co.uk: Mowles, Gerald ...
The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
9781292098784: Zurich Tax Handbook 2015-16 - AbeBooks ...
Buy [(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ] published on (September, 2015) by Gerald Mowles (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible orders.
[(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ...
'The "Zurich Tax Handbook" should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' "Pensions World" The "Zurich Tax Handbook 2015-16" is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definition
Zurich Tax Handbook 2015-16 by Gerald Mowles
The Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16 by Gerald Mowles, Anthony ...
The Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:
Zurich Tax Handbook 2015-16 : Anthony Foreman : 9781292098784
Find Zurich Tax Handbook 2015 - 16, by Gerald A. Mowles, Tony Foreman, ISBN 9781292098784, published by Pearson Education Ltd from www.wildy.com, the World's Legal Bookshop. Shipping in the UK is free. Competitive shipping rates world-wide.
Wildy & Sons Ltd — The World's Legal Bookshop Search ...
Hello Select your address Best Sellers Today's Deals Electronics Customer Service Books New Releases Home Computers Gift Ideas Gift Cards Sell
Zurich Tax Handbook 2015-16: Mowles, Gerald, Foreman ...
Amazon.in - Buy Zurich Tax Handbook 2015-16 book online at best prices in India on Amazon.in. Read Zurich Tax Handbook 2015-16 book reviews & author details and more at Amazon.in. Free delivery on qualified orders.
Buy Zurich Tax Handbook 2015-16 Book Online at Low Prices ...
Compre online Zurich Tax Handbook 2015-16, de Mowles, Gerald, Foreman, Mr Anthony na Amazon. Frete GRTIS em milhares de produtos com o Amazon Prime. Encontre diversos livros escritos por Mowles, Gerald, Foreman, Mr Anthony com ótimos preos.
Zurich Tax Handbook 2015-16 | Amazon.com.br
Get Free Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 If you ally craving such a referred zurich tax handbook 2015 16 book that will allow you worth, acquire the unquestionably best seller from us currently from several preferred authors.
Page 1/3
Zurich Tax Handbook 2015 16 - electionsdev.calmatters.org
Zurich Tax Handbook 2015-16. By author: Gerald Mowles, Anthony Foreman ...
9781292098784-Zurich Tax Handbook 2015-16
Read Online Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 When somebody should go to the book stores, search foundation by shop, shelf by shelf, it is in reality problematic. This is why we provide the books compilations in this website. It will utterly ease you to look guide zurich tax handbook 2015 16 as you such as.
Zurich Tax Handbook 2015 16 - dc-75c7d428c907.tecadmin.net
Inbunden, 2015. Den hr utgvan av Zurich Tax Handbook 2015-16 r slutsld. Kom in och se andra utgvor eller andra bcker av samma frfattare.
Zurich Tax Handbook 2015-16 - Gerald Mowles - Bok ...
Find many great new & used options and get the best deals for Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition) at the best online prices at eBay! Free shipping for many products!
Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition ...
as well as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition the zurich tax handbook 2015 16 is your annual authoritative guide to
Zurich Tax Handbook 2015 2016 [PDF]
Description 'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.'. Pensions World . The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and ...
Zurich Tax Handbook 2015-16 - GeraldMowles - 9781292098784 ...
many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it handbook 2015 16 zurich tax handbook 2015 16 when somebody should go to the book stores search foundation by shop shelf by shelf it is in reality problematic this is why we provide the books compilations in this website it will utterly ease you to look guide zurich tax handbook 2015 16 as you such as by searching the title publisher or authors of guide ...
Zurich Tax Handbook 2015 2016 - viladimo.dassie.co.uk as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition ebook zurich tax handbook 2015 2016 uploaded by karl may the zurich tax
'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2015–16 Over 120 key 'tax notes' to help save you money Detailed advice on how to reduce tax liabilities for yourself and your clients Comprehensive information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net worth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.
This tax handbook covers every aspect of taxation in a totally accessible manner, providing worked examples, checklists and shrewd advice in the form of taxsaving tips.
This is an essential annual purchase for anyone involved in taxation, from individuals through to advisers, investors, accountants and tax lawyers. The Zurich Tax Handbook 2013 – 2014 provides detailed coverage of the UK tax system and identifies the way that it may affect you or your clients. Up-to-date and userfriendly, this book explains the key aspects of taxation providing worked examples, checklists, definitions and tax-saving hints.
'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2014–15 is your annual authoritative guide to the UK tax system and details how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the March 2014 Budget and the Finance Act 2014. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2014-15 Over 120 key 'tax notes' to help save you money Comprehensive advice on how to reduce tax liabilities for yourself and your clients Detailed information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net wealth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.
An unprecedented new international moral and legal rule forbids one state from hosting money stolen by the leaders of another state. The aim is to counter grand corruption or kleptocracy ("rule by thieves"), when leaders of poorer countries—such as Marcos in the Philippines, Mobutu in the Congo, and more recently those overthrown in revolutions in the Arab world and Ukraine—loot billions of dollars at the expense of their own citizens. This money tends to end up hosted in rich countries. These host states now have a duty to block, trace, freeze, and seize these illicit funds and hand them back to the countries from which they were stolen. In The Despot's Guide to Wealth Management, J. C. Sharman asks how this anti-kleptocracy regime came about, how well it is working, and how it could work better. Although there have been some real achievements, the international campaign against grand corruption has run into major obstacles. The vested interests of banks, lawyers, and even law enforcement often favor turning a blind eye to foreign corruption proceeds. Recovering and returning looted assets is a long, complicated, and expensive process. Sharman used a private investigator, participated in and observed anti-corruption policy, and conducted more than a hundred interviews with key players. He also draws on various journalistic exposés, whistle-blower accounts, and government investigations to inform his comparison of the anti-kleptocracy records of the United States, Britain, Switzerland, and Australia. Sharman calls for better policing, preventative measures, and
Page 2/3
Copyright : elearning.saem.org use of gatekeepers like bankers, lawyers, and real estate agents. He also recommends giving nongovernmental organizations and for-profit firms more scope to independently investigate corruption and seize stolen assets.
International taxation is evolving in response to globalization, capital mobility, and the increased trade in services, and introduces international tax practitioner, student and researcher to the theory, practice, and international examples of the changing landscape. Models of tax competition in a flat and connected world are very different than those necessary to ensure compliance in a world dominated by cross-border flows of goods and repatriation of profits. Taxes on consumption, e-commerce, and services are looming innovations in future of international taxation. Tax coordination and standardization are immense challenges in a world in which the movement of value is increasingly subtle and hard to detect. And as corporations and individuals become more sophisticated in the internationalization of flows of capital, our models must become more sophisticated in their scope and inclusion. In the era when trade was dominated by the exchange of manufactured goods, international taxation was designed to protect domestic industries, create tax revenue, prevent evasion, and promote compliance. The traditional toolbox of customs duties, tariffs, and taxes on repatriated profits must be augmented as the movement of goods across borders represents a much smaller fraction of trade and as international taxation policy is increasingly used to attract foreign corporations rather than discourage branch offices. International taxation models that can better tax services, track international flows of capital, and allow a nation to compete in a world market for capital formation are the tools of the modern tax practitioner. International tax policy is now viewed as an integral part of economic policy. This approach is bound to accelerate as the world becomes increasingly flat and better connected. Economic progress is more and more influenced by the movement of services and information, movements that are no longer through ports but through fiber optic lines. This book contributes to the growing literature on international taxation by bringing together theory and experience, current practices and innovation, and our current understanding of some of the challenges now facing and arguably frustrating current international taxation policy. The book will create new avenues of research for scholars, a new awareness for students of International Taxation, and new possibilities for international tax practitioners. The models and examples presented here suggest that there are serious problems with measurability of flows of services and information, and points to an increasingly need for greater harmonization of international taxation, perhaps through coordinated consumption-tax oriented approaches. * Describe the rapidly evolving role of International Taxation in a globalizing information economy * Present theoretical models that act as the basis for successful international tax competition * Describe the experiences and innovations of representative internationalized countries * Discuss some new approaches to International Taxation * Makes the case for new models of international taxation in an increasingly global information world
Behavioural change has become a core issue of public policy. Behavioural instruments such as 'nudging' apply insights from behavioural economics and behavioural sciences, psychology and neurosciences across a broad range of policy areas. Behavioural insights teams and networks facilitate the global spread of behavioural public policies. Despite an ever-growing amount of literature, research has remained fragmented. This comprehensive Handbook unites interdisciplinary scholarship, with contributions critically assessing the state and direction of behavioural public policies, their normative implications and political consequences.
The Routledge Handbook of Taxation and Philanthropy ventures into a territory that is still widely unexplored. It contains 30 academic contributions that aim to provide a better understanding of whethe<cursor_is_here> The topic has been addressed from a multidisciplinary and multicultural perspective – covering neuroeconomics, sociology, political science, psychology, affective sciences, philosophy, behavioral economy, and law – because of its global and multifaceted nature. It also contains the OECD report on Taxation and Philanthropy released in November 2020, which was prepared in this context as a result of a collaboration with the Geneva Centre for Philanthropy of the University of Geneva. The book is divided into four sections, exploring, respectively, the justification of tax incentives for philanthropy, theoretical and empirical insights about taxes, efficiency and donor behavior in that context, and tax incentives for cross-border philanthropy and for hybrid entities and social entrepreneurship. It is believed that this volume will be a landmark yet only the beginning of a journey in which a lot remains to be studied, learned, and said.
Ingeniously organized in a life cycle format, the Handbook covers environmental taxation concepts, design, acceptance, implementation, and impact. The universal themes discussed in each area will appeal to a broad range of readers. Larry Kreiser, Cleveland State University, US This book is a smart and useful readers guide providing analytical tools for a full comprehension of environmental taxes, with an interdisciplinary approach that looks at all the different phases of environmental taxation: from the design to the implementation, the political acceptance and the impact on the economy. The authors effort is very successful in endowing academicians, policy makers and the general public with an excellent proof of the effectiveness of environmental taxes and green tax reforms. Alberto Majocchi, University of Pavia, Italy Putting the words environment next to taxation might not always be the flavour of the month, but no modern society can ignore the value of the natural environment and the need to maintain its good quality and no competitive economy can prosper without the necessary tax revenues to function. Environmental taxation offers the prospect of moving towards a more resource-efficient economy, where preference is given to tax more what we burn, less what we earn. I welcome this contribution to the literature. Commissioner Connie Hedegaard, European Commission The Milne and Andersen volume provides a splendid treatment of environmental taxation that encompasses the basic conceptual issues, problems of tax design and implementation, and several insightful case studies that show how environmental taxes actually work in practice. It is the best overall treatment of environmental taxation available: comprehensive, rigorous, and readable. Wallace Oates, University of Maryland, US The Handbook of Research on Environmental Taxation captures the state of the art of research on environmental taxation. Written by 36 specialists in environmental taxation from 16 countries, it takes an interdisciplinary and international approach, focusing on issues that are universal to using taxation to achieve environmental goals. The Handbook explores the conceptual foundations of environmental taxation, essential elements for designing environmental tax measures, factors that influence the acceptance of environmental taxation, the variety of ways to implement environmental taxes, their environmental and economic impact and, finally, the larger question of the role of taxation among other policy approaches to environmental protection. Intermixing theory with case studies, the Handbook offers readers lessons that can be applied around the world. It identifies key bodies of research for people who are already working in the field or entering the field and highlights issues that call for more research in the future. With systematic analysis of key issues in environmental taxation, this book will appeal to researchers, governments, think tanks, NGOs, and academics in law, economics, political science and public finance, as well as students specializing in environmental taxation and other market-based instruments.
Copyright code : a4120afd08441b058cd839b5c3ea0cca
Page 3/3
</text>
|
[
{
"content": "<url>\nhttp://elearning.saem.org/cgi-bin/content/view.php?data=zurich_tax_handbook_2015_16&filetype=pdf&id=a4120afd08441b058cd839b5c3ea0cca\n</url>\n<text>\nZurich Tax Handbook 2015 16\n\nThis is likewise one of the factors by obtaining the soft documents of this zurich tax handbook 2015 16 by online. You might not require more epoch to spend to go to the books establishment as without difficulty as search for them. In some cases, you likewise pull off not discover the pronouncement zurich tax handbook 2015 16 that you are looking for. It will enormously squander the time.\n\nHowever below, taking into account you visit this web page, it will be suitably unconditionally easy to get as capably as download guide zurich tax handbook 2015 16\n\nIt will not allow many times as we notify before. You can realize it even if sham something else at house and even in your workplace. so easy! So, are you question? Just exercise just what we meet the expense of under as without difficulty as evaluation zurich tax handbook 2015 16 what you in imitation of to read!\n\nNEC code book layout \\\"basic\\\" English listening and reading practice test 2020 - August 17, 2020 Alcoholics Anonymous Big Book Audio Read Aloud Debt, service, and the origins of capitalism Michael Moore Presents: Planet of the Humans | Full Documentary | Directed by Jeff Gibbs 100 Questions for U.S. Citizenship - Easy Answers/Random Order!\n\nKindle Paperwhite Tips and Tricks TutorialTaxes in Switzerland. How to Pay Less Taxes. 5 Tips. Income Tax Switzerland Living in Switzerland - 5 Best Tax Haven Cantons to stay Study Section 1 CDL Manual - Introduction Tolley Exam Training: How to use the legislation to pass your tax exams The Best Tax Haven is Switzerland (2018) - Why? How to Get your CDL Permit - Pass the first time - Driving Academy Real Cost of Living in Switzerland for a Family I Got a Job in Switzerland. Information For Foreigners. That One Time In Switzerland | Sony A7SIII How to Explain Loan Documents!! Top 10 Offshore Tax Havens You Can Still Stash Your Cash\n\nAn American Quarantined in Germany E23: Dresden Day\n\nLongplayer Conversation 2014: David Graeber and Brian Eno3 Levels Of Taxation In Switzerland Download Handbook of Taxation for FY 2077/78, IT \\u0026 VAT Act (2/2)OPENING ACCOUNTS OF VARIOUS TYPES OF CUSTOMERS I JAIIB I PPB I UNIT - 15 Compliance Tips for Florida Medicaid Providers Tolley's Tax Guide 2014 15 Understanding Financial Statements and Accounting: Crash Course Entrepreneurship #15 Study Section 1 CDL Manual Introduction\n\nLand Rover Discovery-4 long-term test reviewTolley's Yellow Tax Handbook 2014 2015 Zurich Tax Handbook 2015 16\n\nThe Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:\n\nZurich Tax Handbook 2015-16: Amazon.co.uk: Mowles, Gerald ...\n\nThe Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:\n\n9781292098784: Zurich Tax Handbook 2015-16 - AbeBooks ...\n\nBuy [(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ] published on (September, 2015) by Gerald Mowles (ISBN: ) from Amazon's Book Store. Everyday low prices and free delivery on eligible orders.\n\n[(Zurich Tax Handbook 2015-16)] [By (author) Gerald Mowles ...\n\n'The \"Zurich Tax Handbook\" should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' \"Pensions World\" The \"Zurich Tax Handbook 2015-16\" is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definition\n\nZurich Tax Handbook 2015-16 by Gerald Mowles\n\nThe Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:\n\nZurich Tax Handbook 2015-16 by Gerald Mowles, Anthony ...\n\nThe Zurich Tax Handbook 2015-16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include:\n\nZurich Tax Handbook 2015-16 : Anthony Foreman : 9781292098784\n\nFind Zurich Tax Handbook 2015 - 16, by Gerald A. Mowles, Tony Foreman, ISBN 9781292098784, published by Pearson Education Ltd from www.wildy.com, the World's Legal Bookshop. Shipping in the UK is free. Competitive shipping rates world-wide.\n\nWildy & Sons Ltd — The World's Legal Bookshop Search ...\n\nHello Select your address Best Sellers Today's Deals Electronics Customer Service Books New Releases Home Computers Gift Ideas Gift Cards Sell\n\nZurich Tax Handbook 2015-16: Mowles, Gerald, Foreman ...\n\nAmazon.in - Buy Zurich Tax Handbook 2015-16 book online at best prices in India on Amazon.in. Read Zurich Tax Handbook 2015-16 book reviews & author details and more at Amazon.in. Free delivery on qualified orders.\n\nBuy Zurich Tax Handbook 2015-16 Book Online at Low Prices ...\n\nCompre online Zurich Tax Handbook 2015-16, de Mowles, Gerald, Foreman, Mr Anthony na Amazon. Frete GRTIS em milhares de produtos com o Amazon Prime. Encontre diversos livros escritos por Mowles, Gerald, Foreman, Mr Anthony com ótimos preos.\n\nZurich Tax Handbook 2015-16 | Amazon.com.br\n\nGet Free Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 If you ally craving such a referred zurich tax handbook 2015 16 book that will allow you worth, acquire the unquestionably best seller from us currently from several preferred authors.\n\nPage 1/3\n\nZurich Tax Handbook 2015 16 - electionsdev.calmatters.org\n\nZurich Tax Handbook 2015-16. By author: Gerald Mowles, Anthony Foreman ...\n\n9781292098784-Zurich Tax Handbook 2015-16\n\nRead Online Zurich Tax Handbook 2015 16 Zurich Tax Handbook 2015 16 When somebody should go to the book stores, search foundation by shop, shelf by shelf, it is in reality problematic. This is why we provide the books compilations in this website. It will utterly ease you to look guide zurich tax handbook 2015 16 as you such as.\n\nZurich Tax Handbook 2015 16 - dc-75c7d428c907.tecadmin.net\n\nInbunden, 2015. Den hr utgvan av Zurich Tax Handbook 2015-16 r slutsld. Kom in och se andra utgvor eller andra bcker av samma frfattare.\n\nZurich Tax Handbook 2015-16 - Gerald Mowles - Bok ...\n\nFind many great new & used options and get the best deals for Zurich Tax Handbook 2015-16 (2015, Hardcover, New Edition) at the best online prices at eBay! Free shipping for many products!\n\nZurich Tax Handbook 2015-16 (2015, Hardcover, New Edition ...\n\nas well as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition the zurich tax handbook 2015 16 is your annual authoritative guide to\n\nZurich Tax Handbook 2015 2016 [PDF]\n\nDescription 'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.'. Pensions World . The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and ...\n\nZurich Tax Handbook 2015-16 - GeraldMowles - 9781292098784 ...\n\nmany higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it handbook 2015 16 zurich tax handbook 2015 16 when somebody should go to the book stores search foundation by shop shelf by shelf it is in reality problematic this is why we provide the books compilations in this website it will utterly ease you to look guide zurich tax handbook 2015 16 as you such as by searching the title publisher or authors of guide ...\n\nZurich Tax Handbook 2015 2016 - viladimo.dassie.co.uk as many higher rate tax payers pensions world the zurich tax handbook 2015 16 is your annual authoritative guide to the uk tax system and how it may affect you or your clients it explains the key aspects of taxation providing worked examples checklists definition ebook zurich tax handbook 2015 2016 uploaded by karl may the zurich tax\n\n'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2015–16 is your annual authoritative guide to the UK tax system and how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the 2014 Autumn Statement, the March 2015 Budget, the July 2015 Budget and the Finance Act 2015. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2015–16 Over 120 key 'tax notes' to help save you money Detailed advice on how to reduce tax liabilities for yourself and your clients Comprehensive information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net worth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.\n\nThis tax handbook covers every aspect of taxation in a totally accessible manner, providing worked examples, checklists and shrewd advice in the form of taxsaving tips.\n\nThis is an essential annual purchase for anyone involved in taxation, from individuals through to advisers, investors, accountants and tax lawyers. The Zurich Tax Handbook 2013 – 2014 provides detailed coverage of the UK tax system and identifies the way that it may affect you or your clients. Up-to-date and userfriendly, this book explains the key aspects of taxation providing worked examples, checklists, definitions and tax-saving hints.\n\n'The Zurich Tax Handbook should be on the bookshelf of every independent financial adviser, as well as many higher rate tax payers.' Pensions World The Zurich Tax Handbook 2014–15 is your annual authoritative guide to the UK tax system and details how it may affect you or your clients. It explains the key aspects of taxation, providing worked examples, checklists, definitions and tax-saving hints. This edition includes full information from the March 2014 Budget and the Finance Act 2014. Key features include: A digest at the beginning of the book which summarises the main tax changes for 2014-15 Over 120 key 'tax notes' to help save you money Comprehensive advice on how to reduce tax liabilities for yourself and your clients Detailed information on tax allowances and thresholds Guidance on how to complete tax returns on time and without penalties Gerald A. Mowles is the founder of BBL (UK) Services LLP – London. He is a US and UK tax accountant with over two decades of experience in dealing with high net wealth individuals and their tax affairs. Tony Foreman is an Associate with BBL. He is a Fellow of the Chartered Institute of Taxation and has specialised in tax planning since 1975.\n\nAn unprecedented new international moral and legal rule forbids one state from hosting money stolen by the leaders of another state. The aim is to counter grand corruption or kleptocracy (\"rule by thieves\"), when leaders of poorer countries—such as Marcos in the Philippines, Mobutu in the Congo, and more recently those overthrown in revolutions in the Arab world and Ukraine—loot billions of dollars at the expense of their own citizens. This money tends to end up hosted in rich countries. These host states now have a duty to block, trace, freeze, and seize these illicit funds and hand them back to the countries from which they were stolen. In The Despot's Guide to Wealth Management, J. C. Sharman asks how this anti-kleptocracy regime came about, how well it is working, and how it could work better. Although there have been some real achievements, the international campaign against grand corruption has run into major obstacles. The vested interests of banks, lawyers, and even law enforcement often favor turning a blind eye to foreign corruption proceeds. Recovering and returning looted assets is a long, complicated, and expensive process. Sharman used a private investigator, participated in and observed anti-corruption policy, and conducted more than a hundred interviews with key players. He also draws on various journalistic exposés, whistle-blower accounts, and government investigations to inform his comparison of the anti-kleptocracy records of the United States, Britain, Switzerland, and Australia. Sharman calls for better policing, preventative measures, and\n\nPage 2/3\n\nCopyright : elearning.saem.org use of gatekeepers like bankers, lawyers, and real estate agents. He also recommends giving nongovernmental organizations and for-profit firms more scope to independently investigate corruption and seize stolen assets.\n\nInternational taxation is evolving in response to globalization, capital mobility, and the increased trade in services, and introduces international tax practitioner, student and researcher to the theory, practice, and international examples of the changing landscape. Models of tax competition in a flat and connected world are very different than those necessary to ensure compliance in a world dominated by cross-border flows of goods and repatriation of profits. Taxes on consumption, e-commerce, and services are looming innovations in future of international taxation. Tax coordination and standardization are immense challenges in a world in which the movement of value is increasingly subtle and hard to detect. And as corporations and individuals become more sophisticated in the internationalization of flows of capital, our models must become more sophisticated in their scope and inclusion. In the era when trade was dominated by the exchange of manufactured goods, international taxation was designed to protect domestic industries, create tax revenue, prevent evasion, and promote compliance. The traditional toolbox of customs duties, tariffs, and taxes on repatriated profits must be augmented as the movement of goods across borders represents a much smaller fraction of trade and as international taxation policy is increasingly used to attract foreign corporations rather than discourage branch offices. International taxation models that can better tax services, track international flows of capital, and allow a nation to compete in a world market for capital formation are the tools of the modern tax practitioner. International tax policy is now viewed as an integral part of economic policy. This approach is bound to accelerate as the world becomes increasingly flat and better connected. Economic progress is more and more influenced by the movement of services and information, movements that are no longer through ports but through fiber optic lines. This book contributes to the growing literature on international taxation by bringing together theory and experience, current practices and innovation, and our current understanding of some of the challenges now facing and arguably frustrating current international taxation policy. The book will create new avenues of research for scholars, a new awareness for students of International Taxation, and new possibilities for international tax practitioners. The models and examples presented here suggest that there are serious problems with measurability of flows of services and information, and points to an increasingly need for greater harmonization of international taxation, perhaps through coordinated consumption-tax oriented approaches. * Describe the rapidly evolving role of International Taxation in a globalizing information economy * Present theoretical models that act as the basis for successful international tax competition * Describe the experiences and innovations of representative internationalized countries * Discuss some new approaches to International Taxation * Makes the case for new models of international taxation in an increasingly global information world\n\nBehavioural change has become a core issue of public policy. Behavioural instruments such as 'nudging' apply insights from behavioural economics and behavioural sciences, psychology and neurosciences across a broad range of policy areas. Behavioural insights teams and networks facilitate the global spread of behavioural public policies. Despite an ever-growing amount of literature, research has remained fragmented. This comprehensive Handbook unites interdisciplinary scholarship, with contributions critically assessing the state and direction of behavioural public policies, their normative implications and political consequences.\n\nThe Routledge Handbook of Taxation and Philanthropy ventures into a territory that is still widely unexplored. It contains 30 academic contributions that aim to provide a better understanding of whethe<cursor_is_here> The topic has been addressed from a multidisciplinary and multicultural perspective – covering neuroeconomics, sociology, political science, psychology, affective sciences, philosophy, behavioral economy, and law – because of its global and multifaceted nature. It also contains the OECD report on Taxation and Philanthropy released in November 2020, which was prepared in this context as a result of a collaboration with the Geneva Centre for Philanthropy of the University of Geneva. The book is divided into four sections, exploring, respectively, the justification of tax incentives for philanthropy, theoretical and empirical insights about taxes, efficiency and donor behavior in that context, and tax incentives for cross-border philanthropy and for hybrid entities and social entrepreneurship. It is believed that this volume will be a landmark yet only the beginning of a journey in which a lot remains to be studied, learned, and said.\n\nIngeniously organized in a life cycle format, the Handbook covers environmental taxation concepts, design, acceptance, implementation, and impact. The universal themes discussed in each area will appeal to a broad range of readers. Larry Kreiser, Cleveland State University, US This book is a smart and useful readers guide providing analytical tools for a full comprehension of environmental taxes, with an interdisciplinary approach that looks at all the different phases of environmental taxation: from the design to the implementation, the political acceptance and the impact on the economy. The authors effort is very successful in endowing academicians, policy makers and the general public with an excellent proof of the effectiveness of environmental taxes and green tax reforms. Alberto Majocchi, University of Pavia, Italy Putting the words environment next to taxation might not always be the flavour of the month, but no modern society can ignore the value of the natural environment and the need to maintain its good quality and no competitive economy can prosper without the necessary tax revenues to function. Environmental taxation offers the prospect of moving towards a more resource-efficient economy, where preference is given to tax more what we burn, less what we earn. I welcome this contribution to the literature. Commissioner Connie Hedegaard, European Commission The Milne and Andersen volume provides a splendid treatment of environmental taxation that encompasses the basic conceptual issues, problems of tax design and implementation, and several insightful case studies that show how environmental taxes actually work in practice. It is the best overall treatment of environmental taxation available: comprehensive, rigorous, and readable. Wallace Oates, University of Maryland, US The Handbook of Research on Environmental Taxation captures the state of the art of research on environmental taxation. Written by 36 specialists in environmental taxation from 16 countries, it takes an interdisciplinary and international approach, focusing on issues that are universal to using taxation to achieve environmental goals. The Handbook explores the conceptual foundations of environmental taxation, essential elements for designing environmental tax measures, factors that influence the acceptance of environmental taxation, the variety of ways to implement environmental taxes, their environmental and economic impact and, finally, the larger question of the role of taxation among other policy approaches to environmental protection. Intermixing theory with case studies, the Handbook offers readers lessons that can be applied around the world. It identifies key bodies of research for people who are already working in the field or entering the field and highlights issues that call for more research in the future. With systematic analysis of key issues in environmental taxation, this book will appeal to researchers, governments, think tanks, NGOs, and academics in law, economics, political science and public finance, as well as students specializing in environmental taxation and other market-based instruments.\n\nCopyright code : a4120afd08441b058cd839b5c3ea0cca\n\nPage 3/3\n</text>\n",
"role": "user"
},
{
"content": "r, why, and how philanthropic initiatives, understood as voluntary contributions for the common good, can and should be fostered by states through tax incentives.",
"role": "assistant"
}
] |
2010 CONVENTION ON THE SUPPRESSION OF UNLAWFUL ACTS RELATING TO INTERNATIONAL CIVIL AVIATION
Adopted in Beijing, China on 10 September 2010.
[http://legacy.icao.int/DCAS2010/restr/docs/beijing_convention_multi.pdf]
THE STATES PARTIES TO THIS CONVENTION,
DEEPLY CONCERNED that unlawful acts against civil aviation jeopardize the safety and security of persons and property, seriously affect the operation of air services, airports and air navigation, and undermine the confidence of the peoples of the world in the safe and orderly conduct of civil aviation for all States;
RECOGNIZING that new types of threats against civil aviation require new concerted efforts and policies of cooperation on the part of States; and
BEING CONVINCED that in order to better address these threats, there is an urgent need to strengthen the legal framework for international cooperation in preventing and suppressing unlawful acts against civil aviation;
HAVE AGREED AS FOLLOWS:
ARTICLE 1
1. Any person commits an offence if that person unlawfully and intentionally:
(a) performs an act of violence against a person on board an aircraft in flight if that act is likely to endanger the safety of that aircraft; or
(b) destroys an aircraft in service or causes damage to such an aircraft which renders it incapable of flight or which is likely to endanger its safety in flight; or
(c) places or causes to be placed on an aircraft in service, by any means whatsoever, a device or substance which is likely to destroy that aircraft, or to cause damage to it which renders it incapable of flight, or to cause damage to it which is likely to endanger its safety in flight; or
(d) destroys or damages air navigation facilities or interferes with their operation, if any such act is likely to endanger the safety of aircraft in flight; or
(e) communicates information which that person knows to be false, thereby endangering the safety of an aircraft in flight; or
(f) uses an aircraft in service for the purpose of causing death, serious bodily injury, or serious damage to property or the environment; or
(g) releases or discharges from an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or
(h) uses against or on board an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or
(i) transports, causes to be transported, or facilitates the transport of, on board an aircraft:
(1) any explosive or radioactive material, knowing that it is intended to be used to cause, or in a threat to cause, with or without a condition, as is provided for under national law, death or serious injury or damage for the purpose of intimidating a population, or compelling a government or an international organization to do or to abstain from doing any act; or
(2) any BCN weapon, knowing it to be a BCN weapon as defined in Article 2; or
(3) any source material, special fissionable material, or equipment or material especially designed or prepared for the processing, use or production of special fissionable material, knowing that it is intended to be used in a nuclear explosive activity or in any other nuclear activity not under safeguards pursuant to a safeguards agreement with the International Atomic Energy Agency; or
(4) any equipment, materials or software or related technology that significantly contributes to the design, manufacture or delivery of a BCN weapon without lawful authorization and with the intention that it will be used for such purpose;
provided that for activities involving a State Party, including those undertaken by a person or legal entity authorized by a State Party, it shall not be an offence under subparagraphs (3) and (4) if the transport of such items or materials is consistent with or is for a use or activity that is consistent with its rights, responsibilities and obligations under the applicable multilateral non-proliferation treaty to which it is a party including those referred to in Article 7.
2. Any person commits an offence if that person unlawfully and intentionally, using any device, substance or weapon:
(a) performs an act of violence against a person at an airport serving international civil aviation which causes or is likely to cause serious injury or death; or
(b) destroys or seriously damages the facilities of an airport serving international civil aviation or aircraft not in service located thereon or disrupts the services of the airport,
if such an act endangers or is likely to endanger safety at that airport.
3. Any person also commits an offence if that person:
(a) makes a threat to commit any of the offences in subparagraphs (a), (b), (c), (d), (f), (g) and (h) of paragraph 1 or in paragraph 2 of this Article; or
(b) unlawfully and intentionally causes any person to receive such a threat,
Page 2 of 12
under circumstances which indicate that the threat is credible.
4. Any person also commits an offence if that person:
(a) attempts to commit any of the offences set forth in paragraph 1 or 2 of this Article; or
(b) organizes or directs others to commit an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or
(c) participates as an accomplice in an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or
(d) unlawfully and intentionally assists another person to evade investigation, prosecution or punishment, knowing that the person has committed an act that constitutes an offence set forth in paragraph 1, 2, 3, 4(a), 4(b) or 4(c) of this Article, or that the person is wanted for criminal prosecution by law enforcement authorities for such an offence or has been sentenced for such an offence.
5. Each State Party shall also establish as offences, when committed intentionally, whether or not any of the offences set forth in paragraph 1, 2 or 3 of this Article is actually committed or attempted, either or both of the following:
(a) agreeing with one or more other persons to commit an offence set forth in paragraph 1, 2 or 3 of this Article and, where required by national law, involving an act undertaken by one of the participants in furtherance of the agreement; or
(b) contributing in any other way to the commission of one or more offences set forth in paragraph 1, 2 or 3 of this Article by a group of persons acting with a common purpose, and such contribution shall either:
(i) be made with the aim of furthering the general criminal activity or purpose of the group, where such activity or purpose involves the commission of an offence set forth in paragraph 1, 2 or 3 of this Article; or
(ii) be made in the knowledge of the intention of the group to commit an offence set forth in paragraph 1, 2 or 3 of this Article.
ARTICLE 2
For the purposes of this Convention:
(a) an aircraft is considered to be in flight at any time from the moment when all its external doors are closed following embarkation until the moment when any such door is opened for disembarkation; in the case of a forced landing, the flight shall be deemed to continue until the competent authorities take over the responsibility for the aircraft and for persons and property on board;
(b) an aircraft is considered to be in service from the beginning of the preflight preparation of the aircraft by ground personnel or by the crew for a specific flight until twenty-four hours after any landing; the period of service shall, in any event, extend for the entire period during which the aircraft is in flight as defined in paragraph (a) of this Article;
N
(c) "Air navigation facilities" include signals, data, information or systems necessary for the navigation of the aircraft;
(d) "Toxic chemical" means any chemical which through its chemical action on life processes can cause death, temporary incapacitation or permanent harm to humans or animals. This includes all such chemicals, regardless of their origin or of their method of production, and regardless of whether they are produced in facilities, in munitions or elsewhere;
(e) "Radioactive material" means nuclear material and other radioactive substances which contain nuclides which undergo spontaneous disintegration (a process accompanied by emission of one or more types of ionizing radiation, such as alpha-, beta-, neutron particles and gamma rays) and which may, owing to their radiological or fissile properties, cause death, serious bodily injury or substantial damage to property or to the environment;
(f) "Nuclear material" means plutonium, except that with isotopic concentration exceeding 80 per cent in plutonium-238; uranium-233; uranium enriched in the isotope 235 or 233; uranium containing the mixture of isotopes as occurring in nature other than in the form of ore or ore residue; or any material containing one or more of the foregoing;
(g) "Uranium enriched in the isotope 235 or 233" means uranium containing the isotope 235 or 233 or both in an amount such that the abundance ratio of the sum of these isotopes to the isotope 238 is greater than the ratio of the isotope 235 to the isotope 238 occurring in nature;
(h) "BCN weapon" means:
(a) "biological weapons", which are:
(i) microbial or other biological agents, or toxins whatever their origin or method of production, of types and in quantities that have no justification for prophylactic, protective or other peaceful purposes; or
(ii) weapons, equipment or means of delivery designed to use such agents or toxins for hostile purposes or in armed conflict.
(b) "chemical weapons", which are, together or separately:
(i) toxic chemicals and their precursors, except where intended for:
(A) industrial, agricultural, research, medical, pharmaceutical or other peaceful purposes; or
(B) protective purposes, namely those purposes directly related to protection against toxic chemicals and to protection against chemical weapons; or
(C) military purposes not connected with the use of chemical weapons and not dependent on the use of the toxic properties of chemicals as a method of warfare; or
(D) law enforcement including domestic riot control purposes, as long as the types and quantities are consistent with such purposes;
(ii) munitions and devices specifically designed to cause death or other harm through the toxic properties of those toxic chemicals specified in subparagraph (b)(i), which would be released as a result of the employment of such munitions and devices;
(iii) any equipment specifically designed for use directly in connection with the employment of munitions and devices specified in subparagraph (b)(ii).
(c) nuclear weapons and other nuclear explosive devices.
(i) "Precursor" means any chemical reactant which takes part at any stage in the production by whatever method of a toxic chemical. This includes any key component of a binary or multicomponent chemical system;
(j) the terms "source material" and "special fissionable material" have the same meaning as given to those terms in the Statute of the International Atomic Energy Agency, done at New York on 26 October 1956.
ARTICLE 3
Each State Party undertakes to make the offences set forth in Article 1 punishable by severe penalties.
ARTICLE 4
1. Each State Party, in accordance with its national legal principles, may take the necessary measures to enable a legal entity located in its territory or organized under its laws to be held liable when a person responsible for management or control of that legal entity has, in that capacity, committed an offence set forth in Article 1. Such liability may be criminal, civil or administrative.
2. Such liability is incurred without prejudice to the criminal liability of individuals having committed the offences.
3. If a State Party takes the necessary measures to make a legal entity liable in accordance with paragraph 1 of this Article, it shall endeavour to ensure that the applicable criminal, civil or administrative sanctions are effective, proportionate and dissuasive. Such sanctions may include monetary sanctions.
ARTICLE 5
1. This Convention shall not apply to aircraft used in military, customs or police services.
2. In the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall apply irrespective of whether the aircraft is engaged in an international or domestic flight, only if:
(a) the place of take-off or landing, actual or intended, of the aircraft is situated outside the territory of the State of registry of that aircraft; or
(b) the offence is committed in the territory of a State other than the State of registry of the aircraft.
3. Notwithstanding paragraph 2 of this Article, in the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall also apply if the offender or the alleged offender is found in the territory of a State other than the State of registry of the aircraft.
4. With respect to the States Parties mentioned in Article 15 and in the cases set forth in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall not apply if the places referred to in subparagraph (a) of paragraph 2 of this Article are situated within the territory of the same State where that State is one of those referred to in Article 15, unless the offence is committed or the offender or alleged offender is found in the territory of a State other than that State.
5. In the cases contemplated in subparagraph (d) of paragraph 1 of Article 1, this Convention shall apply only if the air navigation facilities are used in international air navigation.
6. The provisions of paragraphs 2, 3, 4 and 5 of this Article shall also apply in the cases contemplated in paragraph 4 of Article 1.
ARTICLE 6
1. Nothing in this Convention shall affect other rights, obligations and responsibilities of States and individuals under international law, in particular the purposes and principles of the Charter of the United Nations, the Convention on International Civil Aviation and international humanitarian law.
2. The activities of armed forces during an armed conflict, as those terms are understood under international humanitarian law, which are governed by that law are not governed by this Convention, and the activities undertaken by military forces of a State in the exercise of their official duties, inasmuch as they are governed by other rules of international law, are not governed by this Convention.
3. The provisions of paragraph 2 of this Article shall not be interpreted as condoning or making lawful otherwise unlawful acts, or precluding prosecution under other laws.
ARTICLE 7
Nothing in this Convention shall affect the rights, obligations and responsibilities under the Treaty on the Non-Proliferation of Nuclear Weapons, signed at London, Moscow and Washington on 1 July 1968, the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, signed at London, Moscow and Washington on 10 April 1972, or the Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction, signed at Paris on 13 January 1993, of States Parties to such treaties.
ARTICLE 8
1. Each State Party shall take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1 in the following cases:
(a) when the offence is committed in the territory of that State;
(b) when the offence is committed against or on board an aircraft registered in that State;
(c) when the aircraft on board which the offence is committed lands in its territory with the alleged offender still on board;
(d) when the offence is committed against or on board an aircraft leased without crew to a lessee whose principal place of business or, if the lessee has no such place of business, whose permanent residence is in that State;
(e) when the offence is committed by a national of that State.
2. Each State Party may also establish its jurisdiction over any such offence in the following cases:
(a) when the offence is committed against a national of that State;
(b) when the offence is committed by a stateless person whose habitual residence is in the territory of that State.
3. Each State Party shall likewise take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1, in the case where the alleged offender is present in its territory and it does not extradite that person pursuant to Article 12 to any of the States Parties that have established their jurisdiction in accordance with the applicable paragraphs of this Article with regard to those offences.
4. This Convention does not exclude any criminal jurisdiction exercised in accordance with national law.
ARTICLE 9
1. Upon being satisfied that the circumstances so warrant, any State Party in the territory of which the offender or the alleged offender is present, shall take that person into custody or take other measures to ensure that person's presence. The custody and other measures shall be as provided in the law of that State but may only be continued for such time as is necessary to enable any criminal or extradition proceedings to be instituted.
2. Such State shall immediately make a preliminary enquiry into the facts.
3. Any person in custody pursuant to paragraph 1 of this Article shall be assisted in communicating immediately with the nearest appropriate representative of the State of which that person is a national.
4. When a State Party, pursuant to this Article, has taken a person into custody, it shall immediately notify the States Parties which have established jurisdiction under paragraph 1 of
Article 8 and established jurisdiction and notified the Depositary under subparagraph (a) of paragraph 4 of Article 21 and, if it considers it advisable, any other interested States of the fact that such person is in custody and of the circumstances which warrant that person's detention. The State Party which makes the preliminary enquiry contemplated in paragraph 2 of this Article shall promptly report its findings to the said States Parties and shall indicate whether it intends to exercise jurisdiction.
ARTICLE 10
The State Party in the territory of which the alleged offender is found shall, if it does not extradite that person, be obliged, without exception whatsoever and whether or not the offence was committed in its territory, to submit the case to its competent authorities for the purpose of prosecution. Those authorities shall take their decision in the same manner as in the case of any ordinary offence of a serious nature under the law of that State.
ARTICLE 11
Any person who is taken into custody, or regarding whom any other measures are taken or proceedings are being carried out pursuant to this Convention, shall be guaranteed fair treatment, including enjoyment of all rights and guarantees in conformity with the law of the State in the territory of which that person is present and applicable provisions of international law, including international human rights law.
ARTICLE 12
1. The offences set forth in Article 1 shall be deemed to be included as extraditable offences in any extradition treaty existing between States Parties. States Parties undertake to include the offences as extraditable offences in every extradition treaty to be concluded between them.
2. If a State Party which makes extradition conditional on the existence of a treaty receives a request for extradition from another State Party with which it has no extradition treaty, it may at its option consider this Convention as the legal basis for extradition in respect of the offences set forth in Article 1. Extradition shall be subject to the other conditions provided by the law of the requested State.
3. States Parties which do not make extradition conditional on the existence of a treaty shall recognize the offences set forth in Article 1 as extraditable offences between themselves subject to the conditions provided by the law of the requested State.
4. Each of the offences shall be treated, for the purpose of extradition between States Parties, as if it had been committed not only in the place in which it occurred but also in the territories of the States Parties required to establish their jurisdiction in accordance with subparagraphs (b), (c), (d) and (e) of paragraph 1 of Article 8, and who have established jurisdiction in accordance with paragraph 2 of Article 8.
5. The offences set forth in subparagraphs (a) and (b) of paragraph 5 of Article 1 shall, for the purpose of extradition between States Parties, be treated as equivalent.
ARTICLE 13
None of the offences set forth in Article 1 shall be regarded, for the purposes of extradition or mutual legal assistance, as a political offence or as an offence connected with a political offence or as an offence inspired by political motives. Accordingly, a request for extradition or for mutual legal assistance based on such an offence may not be refused on the sole ground that it concerns a political offence or an offence connected with a political offence or an offence inspired by political motives.
ARTICLE 14
Nothing in this Convention shall be interpreted as imposing an obligation to extradite or to afford mutual legal assistance if the requested State Party has substantial grounds for believing that the request for extradition for offences set forth in Article 1 or for mutual legal assistance with respect to such offences has been made for the purpose of prosecuting or punishing a person on account of that person's race, religion, nationality, ethnic origin, political opinion or gender, or that compliance with the request would cause prejudice to that person's position for any of these reasons.
ARTICLE 15
The States Parties which establish joint air transport operating organizations or international operating agencies, which operate aircraft which are subject to joint or international registration shall, by appropriate means, designate for each aircraft the State among them which shall exercise the jurisdiction and have the attributes of the State of registry for the purpose of this Convention and shall give notice thereof to the Secretary General of the International Civil Aviation Organization who shall communicate the notice to all States Parties to this Convention.
ARTICLE 16
1. States Parties shall, in accordance with international and national law, endeavour to take all practicable measures for the purpose of preventing the offences set forth in Article 1.
2. When, due to the commission of one of the offences set forth in Article 1, a flight has been delayed or interrupted, any State Party in whose territory the aircraft or passengers or crew are present shall facilitate the continuation of the journey of the passengers and crew as soon as practicable, and shall without delay return the aircraft and its cargo to the persons lawfully entitled to possession.
ARTICLE 17
1. States Parties shall afford one another the greatest measure of assistance in connection with criminal proceedings brought in respect of the offences set forth in Article 1. The law of the State requested shall apply in all cases.
2. The provisions of paragraph 1 of this Article shall not affect obligations under any other treaty, bilateral or multilateral, which governs or will govern, in whole or in part, mutual assistance in criminal matters.
ARTICLE 18
Any State Party having reason to believe that one of the offences set forth in Article 1 will be committed shall, in accordance with its national law, furnish any relevant information in its possession to those States Parties which it believes would be the States set forth in paragraphs 1 and 2 of Article 8.
ARTICLE 19
Each State Party shall in accordance with its national law report to the Council of the International Civil Aviation Organization as promptly as possible any relevant information in its possession concerning:
(a) the circumstances of the offence;
(b) the action taken pursuant to paragraph 2 of Article 16;
(c) the measures taken in relation to the offender or the alleged offender and, in particular, the results of any extradition proceedings or other legal proceedings.
ARTICLE 20
1. Any dispute between two or more States Parties concerning the interpretation or application of this Convention which cannot be settled through negotiation, shall, at the request of one of them, be submitted to arbitration. If within six months from the date of the request for arbitration the Parties are unable to agree on the organization of the arbitration, any one of those Parties may refer the dispute to the International Court of Justice by request in conformity with the Statute of the Court.
2. Each State may at the time of signature, ratification, acceptance or approval of this Convention or accession thereto, declare that it does not consider itself bound by the preceding paragraph. The other States Parties shall not be bound by the preceding paragraph with respect to any State Party having made such a reservation.
3. Any State Party having made a reservation in accordance with the preceding paragraph may at any time withdraw this reservation by notification to the Depositary.
ARTICLE 21
1. This Convention shall be open for signature in Beijing on 10 September 2010 by States participating in the Diplomatic Conference on Aviation Security held at Beijing from 30 August to 10 September 2010. After 27 September 2010, this Convention shall be open to all States for signature at the Headquarters of the International Civil Aviation Organization in Montréal until it enters into force in accordance with Article 22.
2. This Convention is subject to ratification, acceptance or approval. The instruments of ratification, acceptance or approval shall be deposited with the Secretary General of the International Civil Aviation Organization, which is hereby designated as the Depositary.
3. Any State which does not ratify, accept or approve this Convention in accordance with paragraph 2 of this Article may accede to it at any time. The instrument of accession shall be deposited with the Depositary.
4. Upon ratifying, accepting, approving or acceding to this Convention, each State Party:
(a) shall notify the Depositary of the jurisdiction it has established under its national law in accordance with paragraph 2 of Article 8, and immediately notify the Depositary of any change; and
(b) may declare that it shall apply the provisions of subparagraph (d) of paragraph 4 of Article 1 in accordance with the principles of its criminal law concerning family exemptions from liability.
ARTICLE 22
1. This Convention shall enter into force on the first day of the second month following the date of the deposit of the twenty-second instrument of ratification, acceptance, approval or accession.
2. For each State ratifying, accepting, approving or acceding to this Convention after the deposit of the twenty-second instrument of ratification, acceptance, approval or accession, this Convention shall enter into force on the first day of the second month following the date of the deposit by such State of its instrument of ratification, acceptance, approval or accession.
3. As soon as this Convention enters into force, it shall be registered with the United Nations by the Depositary.
ARTICLE 23
1. Any State Party may denounce this Convention by written notification to the Depositary.
2. Denunciation shall take effect one year following the date on which notification is received by the Depositary.
ARTICLE 24
As between the States Parties, this Convention shall prevail over the following instruments:
(a) the Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation, Signed at Montreal on 23 September 1971; and
(b) the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, Supplementary to the Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation, Done at Montreal on 23 September 1971, Signed at Montreal on 24 February 1988.
ARTICLE 25
The Depositary shall promptly inform all States Parties to this Convention and all signatory or acceding States to this Convention of the date of each signature, the date of deposit of each instrument of ratification, approval, acceptance or accession, the date of coming into force of this Convention, and other relevant information.
IN WITNESS WHEREOF the undersigned Plenipotentiaries, having been duly authorized, have signed this Convention.
DONE at Beijing on the tenth day of September of the year Two Thousand and Ten in the English, Arabic, Chinese, French, Russian and Spanish languages, all texts being equally authentic, such authenticity to take effect upon verification by the Secretariat of the Conference under the authority of the President of the Conference within ninety days hereof as to the conformity of the texts with one another. This Convention shall remain deposited in the archives of the International Civil Aviation Organization, and certified copies thereof shall be transmitted by the Depositary to all Contracting States to this Convention.
|
<urn:uuid:74481980-ddc2-463f-89f2-8d98f93c35b4>
|
CC-MAIN-2021-39
|
http://www.grocjusz.edu.pl/Materials/jp_sem_20200109_D.pdf
|
2021-09-21T15:29:11+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00007-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 88,088,283
| 5,933
|
eng_Latn
|
eng_Latn
| 0.979417
|
eng_Latn
| 0.987357
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2090,
5078,
7752,
10621,
12816,
15513,
18007,
20807,
23309,
25600,
27930,
29566
] |
2010 CONVENTION ON THE SUPPRESSION OF UNLAWFUL ACTS RELATING TO INTERNATIONAL CIVIL AVIATION
Adopted in Beijing, China on 10 September 2010.
[http://legacy.icao.int/DCAS2010/restr/docs/beijing_convention_multi.pdf]
THE STATES PARTIES TO THIS CONVENTION,
DEEPLY CONCERNED that unlawful acts against civil aviation jeopardize the safety and security of persons and property, seriously affect the operation of air services, airports and air navigation, and undermine the confidence of the peoples of the world in the safe and orderly conduct of civil aviation for all States;
RECOGNIZING that new types of threats against civil aviation require new concerted efforts and policies of cooperation on the part of States; and
BEING CONVINCED that in order to better address these threats, there is an urgent need to strengthen the legal framework for international cooperation in preventing and suppressing unlawful acts against civil aviation;
HAVE AGREED AS FOLLOWS:
ARTICLE 1
1. Any person commits an offence if that person unlawfully and intentionally:
(a) performs an act of violence against a person on board an aircraft in flight if that act is likely to endanger the safety of that aircraft; or
(b) destroys an aircraft in service or causes damage to such an aircraft which renders it incapable of flight or which is likely to endanger its safety in flight; or
(c) places or causes to be placed on an aircraft in service, by any means whatsoever, a device or substance which is likely to destroy that aircraft, or to cause damage to it which renders it incapable of flight, or to cause damage to it which is likely to endanger its safety in flight; or
(d) destroys or damages air navigation facilities or interferes with their operation, if any such act is likely to endanger the safety of aircraft in flight; or
(e) communicates information which that person knows to be false, thereby endangering the safety of an aircraft in flight; or
(f) uses an aircraft in service for the purpose of causing death, serious bodily injury, or serious damage to property or the environment; or
(g) releases or discharges from an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or
(h) uses against or on board an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or
(i) transports, causes to be transported, or facilitates the transport of, on board an aircraft:
(1) any explosive or radioactive material, knowing that it is intended to be used to cause, or in a threat to cause, with or without a condition, as is provided for under national law, death or serious injury or damage for the purpose of intimidating a population, or compelling a government or an international organization to do or to abstain from doing any act; or
(2) any BCN weapon, knowing it to be a BCN weapon as defined in Article 2; or
(3) any source material, special fissionable material, or equipment or material especially designed or prepared for the processing, use or production of special fissionable material, knowing that it is intended to be used in a nuclear explosive activity or in any other nuclear activity not under safeguards pursuant to a safeguards agreement with the International Atomic Energy Agency; or
(4) any equipment, materials or software or related technology that significantly contributes to the design, manufacture or delivery of a BCN weapon without lawful authorization and with the intention that it will be used for such purpose;
provided that for activities involving a State Party, including those undertaken by a person or legal entity authorized by a State Party, it shall not be an offence under subparagraphs (3) and (4) if the transport of such items or materials is consistent with or is for a use or activity that is consistent with its rights, responsibilities and obligations under the applicable multilateral non-proliferation treaty to which it is a party including those referred to in Article 7.
2. Any person commits an offence if that person unlawfully and intentionally, using any device, substance or weapon:
(a) performs an act of violence against a person at an airport serving international civil aviation which causes or is likely to cause serious injury or death; or
(b) destroys or seriously damages the facilities of an airport serving international civil aviation or aircraft not in service located thereon or disrupts the services of the airport,
if such an act endangers or is likely to endanger safety at that airport.
3. Any person also commits an offence if that person:
(a) makes a threat to commit any of the offences in subparagraphs (a), (b), (c), (d), (f), (g) and (h) of paragraph 1 or in paragraph 2 of this Article; or
(b) unlawfully and intentionally causes any person to receive such a threat,
Page 2 of 12
under circumstances which indicate that the threat is credible.
4. Any person also commits an offence if that person:
(a) attempts to commit any of the offences set forth in paragraph 1 or 2 of this Article; or
(b) organizes or directs others to commit an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or
(c) participates as an accomplice in an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or
(d) unlawfully and intentionally assists another person to evade investigation, prosecution or punishment, knowing that the person has committed an act that constitutes an offence set forth in paragraph 1, 2, 3, 4(a), 4(b) or 4(c) of this Article, or that the person is wanted for criminal prosecution by law enforcement authorities for such an offence or has been sentenced for such an offence.
5. Each State Party shall also establish as offences, when committed intentionally, whether or not any of the offences set forth in paragraph 1, 2 or 3 of this Article is actually committed or attempted, either or both of the following:
(a) agreeing with one or more other persons to commit an offence set forth in paragraph 1, 2 or 3 of this Article and, where required by national law, involving an act undertaken by one of the participants in furtherance of the agreement; or
(b) contributing in any other way to the commission of one or more offences set forth in paragraph 1, 2 or 3 of this Article by a group of persons acting with a common purpose, and such contribution shall either:
(i) be made with the aim of furthering the general criminal activity or purpose of the group, where such activity or purpose involves the commission of an offence set forth in paragraph 1, 2 or 3 of this Article; or
(ii) be made in the knowledge of the intention of the group to commit an offence set forth in paragraph 1, 2 or 3 of this Article.
ARTICLE 2
For the purposes of this Convention:
(a) an aircraft is considered to be in flight at any time from the moment when all its external doors are closed following embarkation until the moment when any such door is opened for disembarkation; in the case of a forced landing, the flight shall be deemed to continue until the competent authorities take over the responsibility for the aircraft and for persons and property on board;
(b) an aircraft is considered to be in service from the beginning of the preflight preparation of the aircraft by ground personnel or by the crew for a specific flight until twenty-four hours after any landing; the period of service shall, in any event, extend for the entire period during which the aircraft is in flight as defined in paragraph (a) of this Article;
N
(c) "Air navigation facilities" include signals, data, information or systems necessary for the navigation of the aircraft;
(d) "Toxic chemical" means any chemical which through its chemical action on life processes can cause death, temporary incapacitation or permanent harm to humans or animals. This includes all such chemicals, regardless of their origin or of their method of production, and regardless of whether they are produced in facilities, in munitions or elsewhere;
(e) "Radioactive material" means nuclear material and other radioactive substances which contain nuclides which undergo spontaneous disintegration (a process accompanied by emission of one or more types of ionizing radiation, such as alpha-, beta-, neutron particles and gamma rays) and which may, owing to their radiological or fissile properties, cause death, serious bodily injury or substantial damage to property or to the environment;
(f) "Nuclear material" means plutonium, except that with isotopic concentration exceeding 80 per cent in plutonium-238; uranium-233; uranium enriched in the isotope 235 or 233; uranium containing the mixture of isotopes as occurring in nature other than in the form of ore or ore residue; or any material containing one or more of the foregoing;
(g) "Uranium enriched in the isotope 235 or 233" means uranium containing the isotope 235 or 233 or both in an amount such that the abundance ratio of the sum of these isotopes to the isotope 238 is greater than the ratio of the isotope 235 to the isotope 238 occurring in nature;
(h) "BCN weapon" means:
(a) "biological weapons", which are:
(i) microbial or other biological agents, or toxins whatever their origin or method of production, of types and in quantities that have no justification for prophylactic, protective or other peaceful purposes; or
(ii) weapons, equipment or means of delivery designed to use such agents or toxins for hostile purposes or in armed conflict.
(b) "chemical weapons", which are, together or separately:
(i) toxic chemicals and their precursors, except where intended for:
(A) industrial, agricultural, research, medical, pharmaceutical or other peaceful purposes; or
(B) protective purposes, namely those purposes directly related to protection against toxic chemicals and to protection against chemical weapons; or
(C) military purposes not connected with the use of chemical weapons and not dependent on the use of the toxic properties of chemicals as a method of warfare; or
(D) law enforcement including domestic riot control purposes, as long as the types and quantities are consistent with such purposes;
(ii) munitions and devices specifically designed to cause death or other harm through the toxic properties of those toxic chemicals specified in subparagraph (b)(i), which would be released as a result of the employment of such munitions and devices;
(iii) any equipment specifically designed for use directly in connection with the employment of munitions and devices specified in subparagraph (b)(ii).
(c) nuclear weapons and other nuclear explosive devices.
(i) "Precursor" means any chemical reactant which takes part at any stage in the production by whatever method of a toxic chemical. This includes any key component of a binary or multicomponent chemical system;
(j) the terms "source material" and "special fissionable material" have the same meaning as given to those terms in the Statute of the International Atomic Energy Agency, done at New York on 26 October 1956.
ARTICLE 3
Each State Party undertakes to make the offences set forth in Article 1 punishable by severe penalties.
ARTICLE 4
1. Each State Party, in accordance with its national legal principles, may take the necessary measures to enable a legal entity located in its territory or organized under its laws to be held liable when a person responsible for management or control of that legal entity has, in that capacity, committed an offence set forth in Article 1. Such liability may be criminal, civil or administrative.
2. Such liability is incurred without prejudice to the criminal liability of individuals having committed the offences.
3. If a State Party takes the necessary measures to make a legal entity liable in accordance with paragraph 1 of this Article, it shall endeavour to ensure that the applicable criminal, civil or administrative sanctions are effective, proportionate and dissuasive. Such sanctions may include monetary sanctions.
ARTICLE 5
1. This Convention shall not apply to aircraft used in military, customs or police services.
2. In the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall apply irrespective of whether the aircraft is engaged in an international or domestic flight, only if:
(a) the place of take-off or landing, actual or intended, of the aircraft is situated outside the territory of the State of registry of that aircraft; or
(b) the offence is committed in the territory of a State other than the State of registry of the aircraft.
3. Notwithstanding paragraph 2 of this Article, in the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall also apply if the offender or the alleged offender is found in the territory of a State other than the State of registry of the aircraft.
4. With respect to the States Parties mentioned in Article 15 and in the cases set forth in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall not apply if the places referred to in subparagraph (a) of paragraph 2 of this Article are situated within the territory of the same State where that State is one of those referred to in Article 15, unless the offence is committed or the offender or alleged offender is found in the territory of a State other than that State.
5. In the cases contemplated in subparagraph (d) of paragraph 1 of Article 1, this Convention shall apply only if the air navigation facilities are used in international air navigation.
6. The provisions of paragraphs 2, 3, 4 and 5 of this Article shall also apply in the cases contemplated in paragraph 4 of Article 1.
ARTICLE 6
1. Nothing in this Convention shall affect other rights, obligations and responsibilities of States and individuals under international law, in particular the purposes and principles of the Charter of the United Nations, the Convention on International Civil Aviation and international humanitarian law.
2. The activities of armed forces during an armed conflict, as those terms are understood under international humanitarian law, which are governed by that law are not governed by this Convention, and the activities undertaken by military forces of a State in the exercise of their official duties, inasmuch as they are governed by other rules of international law, are not governed by this Convention.
3. The provisions of paragraph 2 of this Article shall not be interpreted as condoning or making lawful otherwise unlawful acts, or precluding prosecution under other laws.
ARTICLE 7
Nothing in this Convention shall affect the rights, obligations and responsibilities under the Treaty on the Non-Proliferation of Nuclear Weapons, signed at London, Moscow and Washington on 1 July 1968, the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, signed at London, Moscow and Washington on 10 April 1972, or the Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction, signed at Paris on 13 January 1993, of States Parties to such treaties.
ARTICLE 8
1. Each State Party shall take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1 in the following cases:
(a) when the offence is committed in the territory of that State;
(b) when the offence is committed against or on board an aircraft registered in that State;
(c) when the aircraft on board which the offence is committed lands in its territory with the alleged offender still on board;
(d) when the offence is committed against or on board an aircraft leased without crew to a lessee whose principal place of business or, if the lessee has no such place of business, whose permanent residence is in that State;
(e) when the offence is committed by a national of that State.
2. Each State Party may also establish its jurisdiction over any such offence in the following cases:
(a) when the offence is committed against a national of that State;
(b) when the offence is committed by a stateless person whose habitual residence is in the territory of that State.
3. Each State Party shall likewise take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1, in the case where the alleged offender is present in its territory and it does not extradite that person pursuant to Article 12 to any of the States Parties that have established their jurisdiction in accordance with the applicable paragraphs of this Article with regard to those offences.
4. This Convention does not exclude any criminal jurisdiction exercised in accordance with national law.
ARTICLE 9
1. Upon being satisfied that the circumstances so warrant, any State Party in the territory of which the offender or the alleged offender is present, shall take that person into custody or take other measures to ensure that person's presence. The custody and other measures shall be as provided in the law of that State but may only be continued for such time as is necessary to enable any criminal or extradition proceedings to be instituted.
2. Such State shall immediately make a preliminary enquiry into the facts.
3. Any person in custody pursuant to paragraph 1 of this Article shall be assisted in communicating immediately with the nearest appropriate representative of the State of which that person is a national.
4. When a State Party, pursuant to this Article, has taken a person into custody, it shall immediately notify the States Parties which have established jurisdiction under paragraph 1 of
Article 8 and established jurisdiction and notified the Depositary under subparagraph (a) of paragraph 4 of Article 21 and, if it considers it advisable, any other interested States of the fact that such person is in custody and of the circumstances which warrant that person's detention. The State Party which makes the preliminary enquiry contemplated in paragraph 2 of this Article shall promptly report its findings to the said States Parties and shall indicate whether it intends to exercise jurisdiction.
ARTICLE 10
The State Party in the territory of which the alleged offender is found shall, if it does not extradite that person, be obliged, without exception whatsoever and whether or not the offence was committed in its territory, to submit the case to its competent authorities for the purpose of prosecution. Those authorities shall take their decision in the same manner as in the case of any ordinary offence of a serious nature under the law of that State.
ARTICLE 11
Any person who is taken into custody, or regarding whom any other measures are taken or proceedings are being carried out pursuant to this Convention, shall be guaranteed fair treatment, including enjoyment of all rights and guarantees in conformity with the law of the State in the territory of which that person is present and applicable provisions of international law, including international human rights law.
ARTICLE 12
1. The offences set forth in Article 1 shall be deemed to be included as extraditable offences in any extradition treaty existing between States Parties. States Parties undertake to include the offences as extraditable offences in every extradition treaty to be concluded between them.
2. If a State Party which makes extradition conditional on the existence of a treaty receives a request for extradition from another State Party with which it has no extradition treaty, it may at its option consider this Convention as the legal basis for extradition in respect of the offences set forth in Article 1. Extradition shall be subject to the other conditions provided by the law of the requested State.
3. States Parties which do not make extradition conditional on the existence of a treaty shall recognize the offences set forth in Article 1 as extraditable offences between themselves subject to the conditions provided by the law of the requested State.
4. Each of the offences shall be treated, for the purpose of extradition between States Parties, as if it had been committed not only in the place in which it occurred but also in the territories of the States Parties required to establish their jurisdiction in accordance with subparagraphs (b), (c), (d) and (e) of paragraph 1 of Article 8, and who have established jurisdiction in accordance with paragraph 2 of Article 8.
5. The offences set forth in subparagraphs (a) and (b) of paragraph 5 of Article 1 shall, for the purpose of extradition between States Parties, be treated as equivalent.
ARTICLE 13
None of the offences set forth in Article 1 shall be regarded, for the purposes of extradition
|
or mutual legal assistance, as a political offence or as an offence connected with a political offence or as an offence inspired by political motives.
| 21,088
|
inside_word
|
or
|
remove_all
|
<url>
http://www.grocjusz.edu.pl/Materials/jp_sem_20200109_D.pdf
</url>
<text>
2010 CONVENTION ON THE SUPPRESSION OF UNLAWFUL ACTS RELATING TO INTERNATIONAL CIVIL AVIATION
Adopted in Beijing, China on 10 September 2010.
[http://legacy.icao.int/DCAS2010/restr/docs/beijing_convention_multi.pdf]
THE STATES PARTIES TO THIS CONVENTION,
DEEPLY CONCERNED that unlawful acts against civil aviation jeopardize the safety and security of persons and property, seriously affect the operation of air services, airports and air navigation, and undermine the confidence of the peoples of the world in the safe and orderly conduct of civil aviation for all States;
RECOGNIZING that new types of threats against civil aviation require new concerted efforts and policies of cooperation on the part of States; and
BEING CONVINCED that in order to better address these threats, there is an urgent need to strengthen the legal framework for international cooperation in preventing and suppressing unlawful acts against civil aviation;
HAVE AGREED AS FOLLOWS:
ARTICLE 1
1. Any person commits an offence if that person unlawfully and intentionally:
(a) performs an act of violence against a person on board an aircraft in flight if that act is likely to endanger the safety of that aircraft; or
(b) destroys an aircraft in service or causes damage to such an aircraft which renders it incapable of flight or which is likely to endanger its safety in flight; or
(c) places or causes to be placed on an aircraft in service, by any means whatsoever, a device or substance which is likely to destroy that aircraft, or to cause damage to it which renders it incapable of flight, or to cause damage to it which is likely to endanger its safety in flight; or
(d) destroys or damages air navigation facilities or interferes with their operation, if any such act is likely to endanger the safety of aircraft in flight; or
(e) communicates information which that person knows to be false, thereby endangering the safety of an aircraft in flight; or
(f) uses an aircraft in service for the purpose of causing death, serious bodily injury, or serious damage to property or the environment; or
(g) releases or discharges from an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or
(h) uses against or on board an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or
(i) transports, causes to be transported, or facilitates the transport of, on board an aircraft:
(1) any explosive or radioactive material, knowing that it is intended to be used to cause, or in a threat to cause, with or without a condition, as is provided for under national law, death or serious injury or damage for the purpose of intimidating a population, or compelling a government or an international organization to do or to abstain from doing any act; or
(2) any BCN weapon, knowing it to be a BCN weapon as defined in Article 2; or
(3) any source material, special fissionable material, or equipment or material especially designed or prepared for the processing, use or production of special fissionable material, knowing that it is intended to be used in a nuclear explosive activity or in any other nuclear activity not under safeguards pursuant to a safeguards agreement with the International Atomic Energy Agency; or
(4) any equipment, materials or software or related technology that significantly contributes to the design, manufacture or delivery of a BCN weapon without lawful authorization and with the intention that it will be used for such purpose;
provided that for activities involving a State Party, including those undertaken by a person or legal entity authorized by a State Party, it shall not be an offence under subparagraphs (3) and (4) if the transport of such items or materials is consistent with or is for a use or activity that is consistent with its rights, responsibilities and obligations under the applicable multilateral non-proliferation treaty to which it is a party including those referred to in Article 7.
2. Any person commits an offence if that person unlawfully and intentionally, using any device, substance or weapon:
(a) performs an act of violence against a person at an airport serving international civil aviation which causes or is likely to cause serious injury or death; or
(b) destroys or seriously damages the facilities of an airport serving international civil aviation or aircraft not in service located thereon or disrupts the services of the airport,
if such an act endangers or is likely to endanger safety at that airport.
3. Any person also commits an offence if that person:
(a) makes a threat to commit any of the offences in subparagraphs (a), (b), (c), (d), (f), (g) and (h) of paragraph 1 or in paragraph 2 of this Article; or
(b) unlawfully and intentionally causes any person to receive such a threat,
Page 2 of 12
under circumstances which indicate that the threat is credible.
4. Any person also commits an offence if that person:
(a) attempts to commit any of the offences set forth in paragraph 1 or 2 of this Article; or
(b) organizes or directs others to commit an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or
(c) participates as an accomplice in an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or
(d) unlawfully and intentionally assists another person to evade investigation, prosecution or punishment, knowing that the person has committed an act that constitutes an offence set forth in paragraph 1, 2, 3, 4(a), 4(b) or 4(c) of this Article, or that the person is wanted for criminal prosecution by law enforcement authorities for such an offence or has been sentenced for such an offence.
5. Each State Party shall also establish as offences, when committed intentionally, whether or not any of the offences set forth in paragraph 1, 2 or 3 of this Article is actually committed or attempted, either or both of the following:
(a) agreeing with one or more other persons to commit an offence set forth in paragraph 1, 2 or 3 of this Article and, where required by national law, involving an act undertaken by one of the participants in furtherance of the agreement; or
(b) contributing in any other way to the commission of one or more offences set forth in paragraph 1, 2 or 3 of this Article by a group of persons acting with a common purpose, and such contribution shall either:
(i) be made with the aim of furthering the general criminal activity or purpose of the group, where such activity or purpose involves the commission of an offence set forth in paragraph 1, 2 or 3 of this Article; or
(ii) be made in the knowledge of the intention of the group to commit an offence set forth in paragraph 1, 2 or 3 of this Article.
ARTICLE 2
For the purposes of this Convention:
(a) an aircraft is considered to be in flight at any time from the moment when all its external doors are closed following embarkation until the moment when any such door is opened for disembarkation; in the case of a forced landing, the flight shall be deemed to continue until the competent authorities take over the responsibility for the aircraft and for persons and property on board;
(b) an aircraft is considered to be in service from the beginning of the preflight preparation of the aircraft by ground personnel or by the crew for a specific flight until twenty-four hours after any landing; the period of service shall, in any event, extend for the entire period during which the aircraft is in flight as defined in paragraph (a) of this Article;
N
(c) "Air navigation facilities" include signals, data, information or systems necessary for the navigation of the aircraft;
(d) "Toxic chemical" means any chemical which through its chemical action on life processes can cause death, temporary incapacitation or permanent harm to humans or animals. This includes all such chemicals, regardless of their origin or of their method of production, and regardless of whether they are produced in facilities, in munitions or elsewhere;
(e) "Radioactive material" means nuclear material and other radioactive substances which contain nuclides which undergo spontaneous disintegration (a process accompanied by emission of one or more types of ionizing radiation, such as alpha-, beta-, neutron particles and gamma rays) and which may, owing to their radiological or fissile properties, cause death, serious bodily injury or substantial damage to property or to the environment;
(f) "Nuclear material" means plutonium, except that with isotopic concentration exceeding 80 per cent in plutonium-238; uranium-233; uranium enriched in the isotope 235 or 233; uranium containing the mixture of isotopes as occurring in nature other than in the form of ore or ore residue; or any material containing one or more of the foregoing;
(g) "Uranium enriched in the isotope 235 or 233" means uranium containing the isotope 235 or 233 or both in an amount such that the abundance ratio of the sum of these isotopes to the isotope 238 is greater than the ratio of the isotope 235 to the isotope 238 occurring in nature;
(h) "BCN weapon" means:
(a) "biological weapons", which are:
(i) microbial or other biological agents, or toxins whatever their origin or method of production, of types and in quantities that have no justification for prophylactic, protective or other peaceful purposes; or
(ii) weapons, equipment or means of delivery designed to use such agents or toxins for hostile purposes or in armed conflict.
(b) "chemical weapons", which are, together or separately:
(i) toxic chemicals and their precursors, except where intended for:
(A) industrial, agricultural, research, medical, pharmaceutical or other peaceful purposes; or
(B) protective purposes, namely those purposes directly related to protection against toxic chemicals and to protection against chemical weapons; or
(C) military purposes not connected with the use of chemical weapons and not dependent on the use of the toxic properties of chemicals as a method of warfare; or
(D) law enforcement including domestic riot control purposes, as long as the types and quantities are consistent with such purposes;
(ii) munitions and devices specifically designed to cause death or other harm through the toxic properties of those toxic chemicals specified in subparagraph (b)(i), which would be released as a result of the employment of such munitions and devices;
(iii) any equipment specifically designed for use directly in connection with the employment of munitions and devices specified in subparagraph (b)(ii).
(c) nuclear weapons and other nuclear explosive devices.
(i) "Precursor" means any chemical reactant which takes part at any stage in the production by whatever method of a toxic chemical. This includes any key component of a binary or multicomponent chemical system;
(j) the terms "source material" and "special fissionable material" have the same meaning as given to those terms in the Statute of the International Atomic Energy Agency, done at New York on 26 October 1956.
ARTICLE 3
Each State Party undertakes to make the offences set forth in Article 1 punishable by severe penalties.
ARTICLE 4
1. Each State Party, in accordance with its national legal principles, may take the necessary measures to enable a legal entity located in its territory or organized under its laws to be held liable when a person responsible for management or control of that legal entity has, in that capacity, committed an offence set forth in Article 1. Such liability may be criminal, civil or administrative.
2. Such liability is incurred without prejudice to the criminal liability of individuals having committed the offences.
3. If a State Party takes the necessary measures to make a legal entity liable in accordance with paragraph 1 of this Article, it shall endeavour to ensure that the applicable criminal, civil or administrative sanctions are effective, proportionate and dissuasive. Such sanctions may include monetary sanctions.
ARTICLE 5
1. This Convention shall not apply to aircraft used in military, customs or police services.
2. In the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall apply irrespective of whether the aircraft is engaged in an international or domestic flight, only if:
(a) the place of take-off or landing, actual or intended, of the aircraft is situated outside the territory of the State of registry of that aircraft; or
(b) the offence is committed in the territory of a State other than the State of registry of the aircraft.
3. Notwithstanding paragraph 2 of this Article, in the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall also apply if the offender or the alleged offender is found in the territory of a State other than the State of registry of the aircraft.
4. With respect to the States Parties mentioned in Article 15 and in the cases set forth in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall not apply if the places referred to in subparagraph (a) of paragraph 2 of this Article are situated within the territory of the same State where that State is one of those referred to in Article 15, unless the offence is committed or the offender or alleged offender is found in the territory of a State other than that State.
5. In the cases contemplated in subparagraph (d) of paragraph 1 of Article 1, this Convention shall apply only if the air navigation facilities are used in international air navigation.
6. The provisions of paragraphs 2, 3, 4 and 5 of this Article shall also apply in the cases contemplated in paragraph 4 of Article 1.
ARTICLE 6
1. Nothing in this Convention shall affect other rights, obligations and responsibilities of States and individuals under international law, in particular the purposes and principles of the Charter of the United Nations, the Convention on International Civil Aviation and international humanitarian law.
2. The activities of armed forces during an armed conflict, as those terms are understood under international humanitarian law, which are governed by that law are not governed by this Convention, and the activities undertaken by military forces of a State in the exercise of their official duties, inasmuch as they are governed by other rules of international law, are not governed by this Convention.
3. The provisions of paragraph 2 of this Article shall not be interpreted as condoning or making lawful otherwise unlawful acts, or precluding prosecution under other laws.
ARTICLE 7
Nothing in this Convention shall affect the rights, obligations and responsibilities under the Treaty on the Non-Proliferation of Nuclear Weapons, signed at London, Moscow and Washington on 1 July 1968, the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, signed at London, Moscow and Washington on 10 April 1972, or the Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction, signed at Paris on 13 January 1993, of States Parties to such treaties.
ARTICLE 8
1. Each State Party shall take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1 in the following cases:
(a) when the offence is committed in the territory of that State;
(b) when the offence is committed against or on board an aircraft registered in that State;
(c) when the aircraft on board which the offence is committed lands in its territory with the alleged offender still on board;
(d) when the offence is committed against or on board an aircraft leased without crew to a lessee whose principal place of business or, if the lessee has no such place of business, whose permanent residence is in that State;
(e) when the offence is committed by a national of that State.
2. Each State Party may also establish its jurisdiction over any such offence in the following cases:
(a) when the offence is committed against a national of that State;
(b) when the offence is committed by a stateless person whose habitual residence is in the territory of that State.
3. Each State Party shall likewise take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1, in the case where the alleged offender is present in its territory and it does not extradite that person pursuant to Article 12 to any of the States Parties that have established their jurisdiction in accordance with the applicable paragraphs of this Article with regard to those offences.
4. This Convention does not exclude any criminal jurisdiction exercised in accordance with national law.
ARTICLE 9
1. Upon being satisfied that the circumstances so warrant, any State Party in the territory of which the offender or the alleged offender is present, shall take that person into custody or take other measures to ensure that person's presence. The custody and other measures shall be as provided in the law of that State but may only be continued for such time as is necessary to enable any criminal or extradition proceedings to be instituted.
2. Such State shall immediately make a preliminary enquiry into the facts.
3. Any person in custody pursuant to paragraph 1 of this Article shall be assisted in communicating immediately with the nearest appropriate representative of the State of which that person is a national.
4. When a State Party, pursuant to this Article, has taken a person into custody, it shall immediately notify the States Parties which have established jurisdiction under paragraph 1 of
Article 8 and established jurisdiction and notified the Depositary under subparagraph (a) of paragraph 4 of Article 21 and, if it considers it advisable, any other interested States of the fact that such person is in custody and of the circumstances which warrant that person's detention. The State Party which makes the preliminary enquiry contemplated in paragraph 2 of this Article shall promptly report its findings to the said States Parties and shall indicate whether it intends to exercise jurisdiction.
ARTICLE 10
The State Party in the territory of which the alleged offender is found shall, if it does not extradite that person, be obliged, without exception whatsoever and whether or not the offence was committed in its territory, to submit the case to its competent authorities for the purpose of prosecution. Those authorities shall take their decision in the same manner as in the case of any ordinary offence of a serious nature under the law of that State.
ARTICLE 11
Any person who is taken into custody, or regarding whom any other measures are taken or proceedings are being carried out pursuant to this Convention, shall be guaranteed fair treatment, including enjoyment of all rights and guarantees in conformity with the law of the State in the territory of which that person is present and applicable provisions of international law, including international human rights law.
ARTICLE 12
1. The offences set forth in Article 1 shall be deemed to be included as extraditable offences in any extradition treaty existing between States Parties. States Parties undertake to include the offences as extraditable offences in every extradition treaty to be concluded between them.
2. If a State Party which makes extradition conditional on the existence of a treaty receives a request for extradition from another State Party with which it has no extradition treaty, it may at its option consider this Convention as the legal basis for extradition in respect of the offences set forth in Article 1. Extradition shall be subject to the other conditions provided by the law of the requested State.
3. States Parties which do not make extradition conditional on the existence of a treaty shall recognize the offences set forth in Article 1 as extraditable offences between themselves subject to the conditions provided by the law of the requested State.
4. Each of the offences shall be treated, for the purpose of extradition between States Parties, as if it had been committed not only in the place in which it occurred but also in the territories of the States Parties required to establish their jurisdiction in accordance with subparagraphs (b), (c), (d) and (e) of paragraph 1 of Article 8, and who have established jurisdiction in accordance with paragraph 2 of Article 8.
5. The offences set forth in subparagraphs (a) and (b) of paragraph 5 of Article 1 shall, for the purpose of extradition between States Parties, be treated as equivalent.
ARTICLE 13
None of the offences set forth in Article 1 shall be regarded, for the purposes of extradition <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.grocjusz.edu.pl/Materials/jp_sem_20200109_D.pdf\n</url>\n<text>\n2010 CONVENTION ON THE SUPPRESSION OF UNLAWFUL ACTS RELATING TO INTERNATIONAL CIVIL AVIATION\n\nAdopted in Beijing, China on 10 September 2010.\n\n[http://legacy.icao.int/DCAS2010/restr/docs/beijing_convention_multi.pdf]\n\nTHE STATES PARTIES TO THIS CONVENTION,\n\nDEEPLY CONCERNED that unlawful acts against civil aviation jeopardize the safety and security of persons and property, seriously affect the operation of air services, airports and air navigation, and undermine the confidence of the peoples of the world in the safe and orderly conduct of civil aviation for all States;\n\nRECOGNIZING that new types of threats against civil aviation require new concerted efforts and policies of cooperation on the part of States; and\n\nBEING CONVINCED that in order to better address these threats, there is an urgent need to strengthen the legal framework for international cooperation in preventing and suppressing unlawful acts against civil aviation;\n\nHAVE AGREED AS FOLLOWS:\n\nARTICLE 1\n\n1. Any person commits an offence if that person unlawfully and intentionally:\n(a) performs an act of violence against a person on board an aircraft in flight if that act is likely to endanger the safety of that aircraft; or\n(b) destroys an aircraft in service or causes damage to such an aircraft which renders it incapable of flight or which is likely to endanger its safety in flight; or\n(c) places or causes to be placed on an aircraft in service, by any means whatsoever, a device or substance which is likely to destroy that aircraft, or to cause damage to it which renders it incapable of flight, or to cause damage to it which is likely to endanger its safety in flight; or\n(d) destroys or damages air navigation facilities or interferes with their operation, if any such act is likely to endanger the safety of aircraft in flight; or\n(e) communicates information which that person knows to be false, thereby endangering the safety of an aircraft in flight; or\n(f) uses an aircraft in service for the purpose of causing death, serious bodily injury, or serious damage to property or the environment; or\n\n(g) releases or discharges from an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or\n(h) uses against or on board an aircraft in service any BCN weapon or explosive, radioactive, or similar substances in a manner that causes or is likely to cause death, serious bodily injury or serious damage to property or the environment; or\n(i) transports, causes to be transported, or facilitates the transport of, on board an aircraft:\n(1) any explosive or radioactive material, knowing that it is intended to be used to cause, or in a threat to cause, with or without a condition, as is provided for under national law, death or serious injury or damage for the purpose of intimidating a population, or compelling a government or an international organization to do or to abstain from doing any act; or\n(2) any BCN weapon, knowing it to be a BCN weapon as defined in Article 2; or\n(3) any source material, special fissionable material, or equipment or material especially designed or prepared for the processing, use or production of special fissionable material, knowing that it is intended to be used in a nuclear explosive activity or in any other nuclear activity not under safeguards pursuant to a safeguards agreement with the International Atomic Energy Agency; or\n(4) any equipment, materials or software or related technology that significantly contributes to the design, manufacture or delivery of a BCN weapon without lawful authorization and with the intention that it will be used for such purpose;\nprovided that for activities involving a State Party, including those undertaken by a person or legal entity authorized by a State Party, it shall not be an offence under subparagraphs (3) and (4) if the transport of such items or materials is consistent with or is for a use or activity that is consistent with its rights, responsibilities and obligations under the applicable multilateral non-proliferation treaty to which it is a party including those referred to in Article 7.\n2. Any person commits an offence if that person unlawfully and intentionally, using any device, substance or weapon:\n(a) performs an act of violence against a person at an airport serving international civil aviation which causes or is likely to cause serious injury or death; or\n(b) destroys or seriously damages the facilities of an airport serving international civil aviation or aircraft not in service located thereon or disrupts the services of the airport,\n\nif such an act endangers or is likely to endanger safety at that airport.\n\n3. Any person also commits an offence if that person:\n(a) makes a threat to commit any of the offences in subparagraphs (a), (b), (c), (d), (f), (g) and (h) of paragraph 1 or in paragraph 2 of this Article; or\n(b) unlawfully and intentionally causes any person to receive such a threat,\n\nPage 2 of 12\n\nunder circumstances which indicate that the threat is credible.\n\n4. Any person also commits an offence if that person:\n(a) attempts to commit any of the offences set forth in paragraph 1 or 2 of this Article; or\n(b) organizes or directs others to commit an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or\n(c) participates as an accomplice in an offence set forth in paragraph 1, 2, 3 or 4(a) of this Article; or\n(d) unlawfully and intentionally assists another person to evade investigation, prosecution or punishment, knowing that the person has committed an act that constitutes an offence set forth in paragraph 1, 2, 3, 4(a), 4(b) or 4(c) of this Article, or that the person is wanted for criminal prosecution by law enforcement authorities for such an offence or has been sentenced for such an offence.\n5. Each State Party shall also establish as offences, when committed intentionally, whether or not any of the offences set forth in paragraph 1, 2 or 3 of this Article is actually committed or attempted, either or both of the following:\n(a) agreeing with one or more other persons to commit an offence set forth in paragraph 1, 2 or 3 of this Article and, where required by national law, involving an act undertaken by one of the participants in furtherance of the agreement; or\n(b) contributing in any other way to the commission of one or more offences set forth in paragraph 1, 2 or 3 of this Article by a group of persons acting with a common purpose, and such contribution shall either:\n(i) be made with the aim of furthering the general criminal activity or purpose of the group, where such activity or purpose involves the commission of an offence set forth in paragraph 1, 2 or 3 of this Article; or\n(ii) be made in the knowledge of the intention of the group to commit an offence set forth in paragraph 1, 2 or 3 of this Article.\n\nARTICLE 2\n\nFor the purposes of this Convention:\n\n(a) an aircraft is considered to be in flight at any time from the moment when all its external doors are closed following embarkation until the moment when any such door is opened for disembarkation; in the case of a forced landing, the flight shall be deemed to continue until the competent authorities take over the responsibility for the aircraft and for persons and property on board;\n(b) an aircraft is considered to be in service from the beginning of the preflight preparation of the aircraft by ground personnel or by the crew for a specific flight until twenty-four hours after any landing; the period of service shall, in any event, extend for the entire period during which the aircraft is in flight as defined in paragraph (a) of this Article;\n\nN\n\n(c) \"Air navigation facilities\" include signals, data, information or systems necessary for the navigation of the aircraft;\n(d) \"Toxic chemical\" means any chemical which through its chemical action on life processes can cause death, temporary incapacitation or permanent harm to humans or animals. This includes all such chemicals, regardless of their origin or of their method of production, and regardless of whether they are produced in facilities, in munitions or elsewhere;\n(e) \"Radioactive material\" means nuclear material and other radioactive substances which contain nuclides which undergo spontaneous disintegration (a process accompanied by emission of one or more types of ionizing radiation, such as alpha-, beta-, neutron particles and gamma rays) and which may, owing to their radiological or fissile properties, cause death, serious bodily injury or substantial damage to property or to the environment;\n(f) \"Nuclear material\" means plutonium, except that with isotopic concentration exceeding 80 per cent in plutonium-238; uranium-233; uranium enriched in the isotope 235 or 233; uranium containing the mixture of isotopes as occurring in nature other than in the form of ore or ore residue; or any material containing one or more of the foregoing;\n(g) \"Uranium enriched in the isotope 235 or 233\" means uranium containing the isotope 235 or 233 or both in an amount such that the abundance ratio of the sum of these isotopes to the isotope 238 is greater than the ratio of the isotope 235 to the isotope 238 occurring in nature;\n(h) \"BCN weapon\" means:\n(a) \"biological weapons\", which are:\n(i) microbial or other biological agents, or toxins whatever their origin or method of production, of types and in quantities that have no justification for prophylactic, protective or other peaceful purposes; or\n(ii) weapons, equipment or means of delivery designed to use such agents or toxins for hostile purposes or in armed conflict.\n(b) \"chemical weapons\", which are, together or separately:\n(i) toxic chemicals and their precursors, except where intended for:\n(A) industrial, agricultural, research, medical, pharmaceutical or other peaceful purposes; or\n(B) protective purposes, namely those purposes directly related to protection against toxic chemicals and to protection against chemical weapons; or\n(C) military purposes not connected with the use of chemical weapons and not dependent on the use of the toxic properties of chemicals as a method of warfare; or\n(D) law enforcement including domestic riot control purposes, as long as the types and quantities are consistent with such purposes;\n(ii) munitions and devices specifically designed to cause death or other harm through the toxic properties of those toxic chemicals specified in subparagraph (b)(i), which would be released as a result of the employment of such munitions and devices;\n\n(iii) any equipment specifically designed for use directly in connection with the employment of munitions and devices specified in subparagraph (b)(ii).\n(c) nuclear weapons and other nuclear explosive devices.\n(i) \"Precursor\" means any chemical reactant which takes part at any stage in the production by whatever method of a toxic chemical. This includes any key component of a binary or multicomponent chemical system;\n(j) the terms \"source material\" and \"special fissionable material\" have the same meaning as given to those terms in the Statute of the International Atomic Energy Agency, done at New York on 26 October 1956.\n\nARTICLE 3\n\nEach State Party undertakes to make the offences set forth in Article 1 punishable by severe penalties.\n\nARTICLE 4\n\n1. Each State Party, in accordance with its national legal principles, may take the necessary measures to enable a legal entity located in its territory or organized under its laws to be held liable when a person responsible for management or control of that legal entity has, in that capacity, committed an offence set forth in Article 1. Such liability may be criminal, civil or administrative.\n2. Such liability is incurred without prejudice to the criminal liability of individuals having committed the offences.\n3. If a State Party takes the necessary measures to make a legal entity liable in accordance with paragraph 1 of this Article, it shall endeavour to ensure that the applicable criminal, civil or administrative sanctions are effective, proportionate and dissuasive. Such sanctions may include monetary sanctions.\n\nARTICLE 5\n\n1. This Convention shall not apply to aircraft used in military, customs or police services.\n2. In the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall apply irrespective of whether the aircraft is engaged in an international or domestic flight, only if:\n(a) the place of take-off or landing, actual or intended, of the aircraft is situated outside the territory of the State of registry of that aircraft; or\n(b) the offence is committed in the territory of a State other than the State of registry of the aircraft.\n\n3. Notwithstanding paragraph 2 of this Article, in the cases contemplated in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall also apply if the offender or the alleged offender is found in the territory of a State other than the State of registry of the aircraft.\n4. With respect to the States Parties mentioned in Article 15 and in the cases set forth in subparagraphs (a), (b), (c), (e), (f), (g), (h) and (i) of paragraph 1 of Article 1, this Convention shall not apply if the places referred to in subparagraph (a) of paragraph 2 of this Article are situated within the territory of the same State where that State is one of those referred to in Article 15, unless the offence is committed or the offender or alleged offender is found in the territory of a State other than that State.\n5. In the cases contemplated in subparagraph (d) of paragraph 1 of Article 1, this Convention shall apply only if the air navigation facilities are used in international air navigation.\n6. The provisions of paragraphs 2, 3, 4 and 5 of this Article shall also apply in the cases contemplated in paragraph 4 of Article 1.\n\nARTICLE 6\n\n1. Nothing in this Convention shall affect other rights, obligations and responsibilities of States and individuals under international law, in particular the purposes and principles of the Charter of the United Nations, the Convention on International Civil Aviation and international humanitarian law.\n2. The activities of armed forces during an armed conflict, as those terms are understood under international humanitarian law, which are governed by that law are not governed by this Convention, and the activities undertaken by military forces of a State in the exercise of their official duties, inasmuch as they are governed by other rules of international law, are not governed by this Convention.\n3. The provisions of paragraph 2 of this Article shall not be interpreted as condoning or making lawful otherwise unlawful acts, or precluding prosecution under other laws.\n\nARTICLE 7\n\nNothing in this Convention shall affect the rights, obligations and responsibilities under the Treaty on the Non-Proliferation of Nuclear Weapons, signed at London, Moscow and Washington on 1 July 1968, the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, signed at London, Moscow and Washington on 10 April 1972, or the Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction, signed at Paris on 13 January 1993, of States Parties to such treaties.\n\nARTICLE 8\n\n1. Each State Party shall take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1 in the following cases:\n(a) when the offence is committed in the territory of that State;\n(b) when the offence is committed against or on board an aircraft registered in that State;\n(c) when the aircraft on board which the offence is committed lands in its territory with the alleged offender still on board;\n(d) when the offence is committed against or on board an aircraft leased without crew to a lessee whose principal place of business or, if the lessee has no such place of business, whose permanent residence is in that State;\n(e) when the offence is committed by a national of that State.\n2. Each State Party may also establish its jurisdiction over any such offence in the following cases:\n(a) when the offence is committed against a national of that State;\n(b) when the offence is committed by a stateless person whose habitual residence is in the territory of that State.\n3. Each State Party shall likewise take such measures as may be necessary to establish its jurisdiction over the offences set forth in Article 1, in the case where the alleged offender is present in its territory and it does not extradite that person pursuant to Article 12 to any of the States Parties that have established their jurisdiction in accordance with the applicable paragraphs of this Article with regard to those offences.\n4. This Convention does not exclude any criminal jurisdiction exercised in accordance with national law.\n\nARTICLE 9\n\n1. Upon being satisfied that the circumstances so warrant, any State Party in the territory of which the offender or the alleged offender is present, shall take that person into custody or take other measures to ensure that person's presence. The custody and other measures shall be as provided in the law of that State but may only be continued for such time as is necessary to enable any criminal or extradition proceedings to be instituted.\n2. Such State shall immediately make a preliminary enquiry into the facts.\n3. Any person in custody pursuant to paragraph 1 of this Article shall be assisted in communicating immediately with the nearest appropriate representative of the State of which that person is a national.\n4. When a State Party, pursuant to this Article, has taken a person into custody, it shall immediately notify the States Parties which have established jurisdiction under paragraph 1 of\n\nArticle 8 and established jurisdiction and notified the Depositary under subparagraph (a) of paragraph 4 of Article 21 and, if it considers it advisable, any other interested States of the fact that such person is in custody and of the circumstances which warrant that person's detention. The State Party which makes the preliminary enquiry contemplated in paragraph 2 of this Article shall promptly report its findings to the said States Parties and shall indicate whether it intends to exercise jurisdiction.\n\nARTICLE 10\n\nThe State Party in the territory of which the alleged offender is found shall, if it does not extradite that person, be obliged, without exception whatsoever and whether or not the offence was committed in its territory, to submit the case to its competent authorities for the purpose of prosecution. Those authorities shall take their decision in the same manner as in the case of any ordinary offence of a serious nature under the law of that State.\n\nARTICLE 11\n\nAny person who is taken into custody, or regarding whom any other measures are taken or proceedings are being carried out pursuant to this Convention, shall be guaranteed fair treatment, including enjoyment of all rights and guarantees in conformity with the law of the State in the territory of which that person is present and applicable provisions of international law, including international human rights law.\n\nARTICLE 12\n\n1. The offences set forth in Article 1 shall be deemed to be included as extraditable offences in any extradition treaty existing between States Parties. States Parties undertake to include the offences as extraditable offences in every extradition treaty to be concluded between them.\n2. If a State Party which makes extradition conditional on the existence of a treaty receives a request for extradition from another State Party with which it has no extradition treaty, it may at its option consider this Convention as the legal basis for extradition in respect of the offences set forth in Article 1. Extradition shall be subject to the other conditions provided by the law of the requested State.\n3. States Parties which do not make extradition conditional on the existence of a treaty shall recognize the offences set forth in Article 1 as extraditable offences between themselves subject to the conditions provided by the law of the requested State.\n4. Each of the offences shall be treated, for the purpose of extradition between States Parties, as if it had been committed not only in the place in which it occurred but also in the territories of the States Parties required to establish their jurisdiction in accordance with subparagraphs (b), (c), (d) and (e) of paragraph 1 of Article 8, and who have established jurisdiction in accordance with paragraph 2 of Article 8.\n\n5. The offences set forth in subparagraphs (a) and (b) of paragraph 5 of Article 1 shall, for the purpose of extradition between States Parties, be treated as equivalent.\n\nARTICLE 13\n\nNone of the offences set forth in Article 1 shall be regarded, for the purposes of extradition <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "or mutual legal assistance, as a political offence or as an offence connected with a political offence or as an offence inspired by political motives.",
"role": "assistant"
}
] |
|
STATEWIDE
ECOSYSTEM BASED FISHERIES MANAGEMENT
Identification of Statewide Ecological Assets using the EBFM framework
While the bioregional scale of management has been adopted by the Department through the implementation of an Ecosystem Based Fisheries Management (EBFM) framework (see How to Use section for more details), due to their life histories or broader impacts, a small number of ecological assets cannot realistically be managed at a single bioregional level but need to be considered at either a statewide or at a multiple bioregional level.
Risk Assessment of Statewide Ecological Assets and External Drivers
The EBFM process identifies the ecological assets in a hierarchical manner such that the assets outlined in Statewide Ecosystem Management Figure 1 are often made up of individual components at species or stock level. The risks to each of the individual stock or lower level components are mostly detailed in the individual fishery reports presented in this document. The following table (Statewide Ecosystem Management Table 1) provides an overview and cumulative assessment of the current risks to those ecological assets that function at a Statewide level and provides a mechanism for reporting on their status and the fisheries management arrangements that are being applied. These level risks are now used by the Department as a key input into the Department's Risk Register which, combined with an assessment of the economic and social values and risks associated with these assets, is integral for use in the annual planning cycle for assigning priorities for activities across all Divisions for Statewide issues.
Summary of Monitoring and Assessment of Statewide Assets
The Department is working closely with the Commonwealth Government and other jurisdictions to develop and implement the National System for the Prevention and Management of Marine Pest Incursions that will minimise the biosecurity risks associated with increased shipping in all parts of the State. Within WA, this is currently being achieved through the Fish Resources Management Act 1994 and the Biosecurity and Agriculture Management Act 2007. Work has also been undertaken to develop monitoring designs for introduced marine species for the high risk ports in WA. These designs have been approved by the Invasive Marine Pests Program within DAFF (Department of Agriculture, Fisheries and Forestry). This work contributes toward the management of introduced aquatic organism incursions and fish kill incident response programs already in place.
The Department of Fisheries' Research Division's Biodiversity and Biosecurity Branch works collaboratively with the Department of Parks and Wildlife (DPaW) in monitoring the condition of the state's fish resources within Marine Parks across the State. Development of Collaborative Operational Plans between the Department and DPaW ensure efficient and cost effective delivery of research and monitoring activities where jurisdictions overlap. The Department's risk based approach to research and monitoring (under its EBFM framework) in conjunction with marine park management plans drives research and monitoring activities within marine parks.
STATEWIDE ECOSYSTEM MANAGEMENT TABLE 1 - RISK LEVELS FOR EACH ASSET.
Low and Medium values are both considered to be acceptable levels of risk. High and Significant risks indicate that the asset is no longer in a condition that is considered appropriate and additional management actions are required.
Captured fish species
External Drivers (NON FISHING)
South West Sharks
North West Sharks
Aquarium Fish
Specimen Shells
Captured Species
Climate
Introduced Diseases/Pests
External Drivers
Statewide
Ecological Resources/Assets
STATEWIDE ECOSYSTEM MANAGEMENT FIGURE 1
Component tree showing the Statewide ecological assets and external drivers identified and separately assessed.
FISHERIES
Marine Aquarium Fish Managed Fishery Report: Statistics Only
S.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green
Fishery Description
Commercial
The Marine Aquarium Fish Managed Fishery (MAFMF) has the capacity to target more than 950 species of marine aquarium fish under the Marine Aquarium Fish Management Plan 1995 (this includes sharks and rays (Chondrichthyes), syngnathids, moral eels, and higher taxonomic groups at the Order, Family or Genus level in cases where the species cannot be specifically identified and also includes unquantified aquarium species). However, the number of marine aquarium fish species targeted and/or landed by the fishery varies from year to year (e.g. in the period from 2005 to 2014 the number of marine aquarium fish species landed ranged from 183 to 288; 170 marine aquarium fish species were recorded in 2014). Operators in the MAFMF are also permitted to take coral, live rock, algae, seagrass and invertebrates under the Prohibition on Fishing (Coral, 'Live Rock' and Algae) Order 2007 and by way of Ministerial Exemption. In 2014, a total of over 321 species or species groups were reported in the landed catch of the MAFMF. The reported catch includes groups that were reported at the level of Order, Family, Genus or species. The MAFMF is primarily a dive-based fishery that uses hand-held nets to capture the desired target species. While the MAFMF operates throughout all Western Australian waters, catches are relatively low in volume due to the special handling requirements of live fish. Fishing operations are also heavily
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 301
weather-dependent due to the small vessels used and the potentially hazardous conditions (e.g. waves, swell) encountered. In addition, human constraints (i.e. physiological effects of decompression) limit the amount of effort exerted in the fishery, the depth of water and the offshore extent where collections can occur.
Recreational
There is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to normal recreational bag limits and, for some species, size limits. There is a complete ban on the recreational take of coral, live rock and listed fish such as leafy and weedy seadragons.
Boundaries
The MAFMF operates in Western Australia's state waters spanning the coastline from the Northern Territory border in the north to the South Australian border in the south. The effort is spread over a total gazetted area of 20,781 km 2 . During the past three years the fishery has been active in waters from Esperance to Broome with popular areas being around the Capes region, Perth, Geraldton, Exmouth and Dampier.
Management arrangements
This fishery is managed primarily through input controls in the form of limited entry to the fishery and permanent closed areas. There are 12 licences in the fishery; however, only six licences are permitted to take all hard corals and most soft corals (all 12 licences are permitted to take coral like anemone groups such as corallimorphs and zoanthids in the Class Anthozoa). In 2014, 10 licences operated in the fishery.
Licensees are not permitted to operate within any waters closed to fishing (e.g. Rowley Shoals, Reef Protected Areas, sanctuary zones). The fishery is permitted to operate in general-purpose zones of marine parks for the collection of fish and some invertebrates (usually excluding coral and live rock). Fishing is also prohibited on Cleaverville Reef in order to exclude the take of coral and associated organisms.
Fish caught in this fishery may not be used for food purposes, and operators are not permitted to take non-finfish species covered by other specific commercial management arrangements or management plans.
The MAFMF is permitted to take most species from the Syngnathid family (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999. However, there is a total ban on the take of leafy seadragons (Phycodurus eques). There is currently an upper limit of 2,000 individual syngnathids across the State, if this limit is exceeded, a review will be initiated, and the results used to determine whether further management action is required.
Landings and Effort
Data for assessing the status of the MAFMF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.
A total of 20,052 fish (excluding syngnathids) were landed in 2014. Collectors in this ornamental fishery can earn a high return from the capture of very small quantities of individuals. Therefore, the catches are small in comparison to the more common, food-fish fisheries. Fishers report the level of catch as either - kg, numbers or litres depending upon the species or species group involved (Marine Aquarium Fish Table 1). The reported landings of aquarium fish for 2014 was higher than that reported in 2013 (19,302), but lower than that reported in 2012 (22,780). The level of catch of aquarium fish reported over the last 5 years is all somewhat similar.
The main fish (excluding syngnathids) species landed in 2014 were damselfish of the Chromis genus and the Neopomacentrus genus, followed by the spotted blenny (Istiblennius meleagris) and the scribbled angelfish (Chaetodontoplus duboulayi) (Marine Aquarium Fish Table 2). Likewise, the main coral species landed in 2014 were the coral like anemones of the Corallimorphus genus (Marine Aquarium Fish Table 3). The numbers of fish species and the weight of coral species landed vary from year to year depending on market demand.
The syngnathid catch was low and stable between 2009 and 2010 (i.e. 340 and 338 respectively). The syngnathid catches in 2011 (1,138), 2012 (1,232) and 2013 (1,635) were higher in comparison and were similar to the catch levels reported in 2008 (1,218). In 2014, the syngnathid catch was again low, similar to the 2009-2010 level (359 individuals).
In 2014, 10 licences reported some level of activity (effort). Effort in the fishery has decreased from 981 fishing days (2007) to 479 fishing days in 2014. Effort in the fishery is concentrated in a number of discrete areas adjacent to the limited number of boat landing sites along the Western Australian coastline.
Given that the specimens are collected for a live market, licences are restricted in terms of the quantities that they can safely handle and transport (for example, by boat to shore, by vehicle to the holding facility and then on to the retailer) without impacting on the quality of the product. The size of the holding facility and access to regular freight and infrastructure services (such as airports, particularly in the remote northern locations of Western Australia) restricts the levels of effort that can be expended in the fishery at any given time.
There were no reported listed species interactions for the fishery in 2014.
The performance measures for the fishery relate to the catch of the syngnathids. The MAFMF is permitted to take species from the Family Syngnathidae (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999, from state waters only (within 3nm). In 2014, the catch of syngnathids from all species and areas was 359, well below the target commercial catch range level of 2,000 individuals per year. The catch level of syngnathids has decreased from that reported in 2013 (1,635), 2012 (1,232) and 2011 (1,138). Note, that there is a prohibition on the take of leafy seadragons (Phycodurus eques) in the MAFMF.
Fishery Governance
Target commercial catch range:
2000 Syngnathids
Current Fishing (or Effort) Level: Acceptable
The current effort level in the fishery is relatively constant from year to year and the operating extent of the fishery is very low relative to the widespread distribution of the numerous species targeted. No other fisheries exploit these species and therefore there is extremely limited potential for any impact on breeding stocks. Therefore the current level of fishing activity is considered acceptable.
New management initiatives (2015/16)
The MAFMF is currently under review with changes to the management arrangements expected to be introduced in 2015. Among the changes under consideration is to consolidate existing legislative instruments for the fishery into a new Management Plan that will provide for the take of finfish, invertebrates, hard and soft coral, live rock, algae and seagrass.
In December 2012 an application for reassessment of the MAFMF as ecologically sustainable under the provisions of the EPBC Act 1999 was submitted to the Department of the Environment (DotE), the then Department of Sustainability, Environment, Water, Population and Communities. This application was successful and Wildlife Trade Operation (WTO) approval was granted till December 2013. In November 2013 a subsequent application was submitted to DotE for further WTO approval, this application was successful and WTO approval was granted till October 2016.
The MAFMF is scheduled to undergo MSC pre-assessment in 2015.
MARINE AQUARIUM FISH TABLE 1
Summary of the reported catch landed from the Marine Aquarium Fish Managed Fishery and associated endorsements in 2014 (Note: the catch of hermit crabs is now reported in the Hermit Crab Fishery Status Report).
1 The soft coral category includes 2,765 kg of coral like anemone groups such as corallimorphs and zoanthids in the Class anthozoa. These are harvested under an invertebrate Ministerial Exemption and are not part of the annual coral TAC.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 303
MARINE AQUARIUM FISH TABLE 2
Summary of the reported catch (number of individuals) of the main fish (excluding Syngnathids) species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years. Note the species reported in this table vary from year to year.
MARINE AQUARIUM FISH TABLE 3
Summary of the reported catch (kg) of the main coral species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 305
Specimen Shell Managed Fishery Status Report
A. Hart, K. Crowe
Fishery Description
The Specimen Shell Managed Fishery (SSMF) is based on the collection of individual shells for the purposes of display, collection, cataloguing, classification and sale.
Just over 200 (218) different Specimen Shell species were collected in 2014, using a variety of methods. The main methods are by hand by a small group of divers operating from small boats in shallow coastal waters or by wading along coastal beaches below the high water mark. A current exemption method being employed by the fishery is using a remote controlled underwater vehicle at depths between 60 and 300 m and a new exemption method using baited habitat structures at depths is being trialled. While the fishery covers the entire Western Australian coastline, there is some concentration of effort in areas adjacent to population centres such as Broome, Karratha, Shark Bay, metropolitan Perth, Mandurah, the Capes area and Albany.
Governing legislation/fishing authority
Specimen Shell Management Plan 1995
Specimen Shell Managed Fishery Licence
Commonwealth Government Environment Protection and Biodiversity Conservation Act 1999 (Export Exemption)
Consultation process
The Department undertakes consultation directly with licensees on operational issues. Industry Annual General Meetings are convened by the Western Australian Fishing Industry Council (WAFIC), who are also responsible for statutory management plan consultation under a Service Level Agreement with the Department.
Boundaries
The fishing area includes all Western Australian waters between the high water mark and the 200 m isobath.
Management arrangements
This is a limited entry fishery with 32 licences in the fishery, with 18 of the licences being active. Furthermore, a maximum of 2 divers are allowed in the water per licence at any one time and specimens may only be collected by hand.
There are a number of closed areas where the SSMF is not permitted to operate. This includes within various marine parks and aquatic reserves and other closed waters such as Reef Observation Areas and Fish Habitat Protection Areas. Much of the west side of North-West Cape and the Ningaloo Marine Park are prohibited areas for the fishery. The exclusion of Marmion Marine Park in the Perth metropolitan area is also important because of its populations of 2 rare cowrie species.
The SSMF is not permitted to take any mollusc species for which separate management arrangements exist – such as abalone, mussels, scallops and pearl oysters.
A comprehensive Ecologically Sustainable Development assessment of this fishery has been undertaken to identify any potential sustainability risks requiring direct management. The only issue identified through this process related to the breeding stock levels of specimen shell species. Boxed text in this status report provides the annual assessment of performance for this issue.
Some minor-scale collection of dead shells is also undertaken above the high water mark by collectors operating under the authority of a commercial fishing licence, mainly for sale into the souvenir, pet supply and hobby craft markets. However, this activity does not form part of the Specimen Shell Managed Fishery.
Research summary
Current fishery-dependent data collection systems monitor the catch (species-specific), effort and catch rates for the fishery. Fishers within the SSMF provide monthly returns under the statutory catch and effort system (CAES). These returns contain information on catch (species, numbers and spatial area), and days and hours fished by method by month and year.
This fishery is managed through input controls in the form of limited entry, gear restrictions and permanent closed areas. The primary controls in the fishery are operational limitations – depth, time and tide.
A new specific Specimen Shell logbook was formally introduced in August 2013 (which built on the logbook being trialled in the fishery) to aid the reporting of the number sighted and number taken alive and/or dead of the 8 mollusc species identified as potentially 'vulnerable' and the reporting of the finer spatial scale, 10 x 10 nautical mile (nm) grid blocks.
This data is used as the basis to provide research advice for fisheries management.
Retained Species
Commercial landings (season 2014): 31,371 shells
Recreational catch estimate (season 2014):
Unknown
Commercial Landings
In 2014, the total number of specimen shells collected was 31,371 distributed over a wide range of species. This is based on 100% of submitted catch returns. In the past 5 years, more than 487 separate species of molluscs have been collected, with an average of more than 200 species per year – the majority in low numbers.
There is some focus of effort on mollusc families most popular with shell collectors, such as cowries, cones, murexes and volutes. Cypraeidae or cowries are noted for their localised variations in both shape and colour, making them attractive to collectors.
Fishing effort/access level
Although there are 32 licences in the fishery, about 11 of these are regularly active. Effort in 2014 was 644 days, a decrease from 745 days in 2013. Over the past 5 years, there was an average of around 800 days fished.
Recreational component: Not assessed
Shell collecting is a popular recreational pastime, and members of the public are permitted to collect shells for their private collections. The recreational catch, while unknown, is considered to be declining, as evidenced by declining membership in shell collecting associations.
Stock Assessment
Assessment complete: Yes
Breeding stock levels: Adequate
During the 2014 season the catch rate was approximately 49 shells per day.
Ponder and Grayson (1998) examined the specimen shell industry on a nationwide basis, rating vulnerability to overexploitation on the basis of species biology, accessibility to collection, and rarity. Species collected in Western Australia which were identified by Ponder and Grayson as potentially vulnerable comprised of 6 cowries (Cypraea (Austrocypraea) reevei, Cypraea (Zoila) friendii vercoi, Cypraea (Zoila) marginata (albanyensis), Cypraea (Zoila) marginata (consueta), Cypraea (Zoila) rosselli and Cypraea (Zoila) venusta) and 2 volutes (Amoria damoni (keatsiana) and Amoria damoni (reevei)).
sighted is reported correctly in about 98 % of the cases where one of the vulnerable species is reported. It is anticipated that current sightings are an under estimate of the available populations.
This improvement in reporting of the vulnerable (indicator) species, in terms of species identification and the number sighted and number taken alive and/or dead can be contributed to the new return form.
The reporting of catch and effort on the finer spatial scale of 10 x 10 nm blocks from August 2004 is also providing more accurate information on the distribution of certain species. Again, the 2014 season has seen ll licensees report the smaller spatial resolution grid blocks rather than reporting the 60 x 60 nm blocks..
All species collected in Western Australia, including the 8 indicator species, occur over wide geographic ranges (hundreds or thousands of kilometres) and wide depth ranges (up to 200 m) where a substantial portion of the population cannot for logistical and safety reasons be collected. However, with the introduction of the remote controlled underwater vehicles these depth restrictions are starting to be overcome.
Even in shallow waters, many localities cannot be fished because of the lack of access to the beach and the small boats used, and collecting is prohibited in many of the more easily reached areas which are now in marine parks and reserves. Additional protection is afforded by the fact that collectors will ignore any specimens with slight visual imperfections, but their reproductive potential in the population remains undiminished. In summary, it is considered that the fishery has very little likelihood of having an unacceptable impact on breeding stocks.
The performance measures for the fishery relate to the maintenance of breeding stocks, as indicated by catch levels and catch rates. In 2014, the catch level of approximately 31,300 shells is above the range set , i.e. 10,000 – 25,000 shells and the catch rate of 49 shells/day was also above the range set., i.e. 10 – 40 shells/day.
Non-Retained Species
Bycatch species impact: Negligible
There is no bycatch in this fishery owing to the highly selective fishing methods.
Listed species interaction: Negligible
The fishery reported no interactions with listed species during 2014. Reports of interactions with listed species are required to be recorded on monthly catch and effort returns.
Ecosystem Effects
'Shell sighting' is a new abundance category. It is a measure of the population of vulnerable shells that is observed but not taken, and provides evidence for the breeding stock being conserved each year. Of the 8 vulnerable species an overall average of approximately 47 % of the shells sighted were not harvested in 2014. The measure of the number of shells
Food chain effects: Negligible
Habitat effects: Negligible
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 307
Social Effects
In 2014 there were 32 authorisation holders in this fishery with around 11 licences recording consistent activity, the number of people employed regularly in the fishery (licensees plus crew/ dive buddies) is likely to be around 19. There were also around 8 people (licensees plus crew/dive buddies) that operated occasionally in this fishery. With many of the licences there might be the additional employment of people to prepare the shells for collection, pack and distribute the shells and also, some licensees might have shop fronts, therefore, employing shop assistants. The number employed in this area is unknown.
Economic Effects
Estimated annual value (to fishers) for 2014:
Not assessed
Fishery Governance
Target catch range: 10,000 – 25,000 shells
A preliminary performance measure has been developed of a total annual catch range from 10,000 to 25,000 shells, which encompasses the range of catches taken from 2000 to 2003. This performance measure has been developed to ensure that any major change in the patterns of fishing is noticed and investigated. If it is triggered, this may not necessarily indicate any problem with the stocks, but rather fluctuations in the natural environment or market dynamics. Catch in 2014 was above the range, due principally to increased activity of one licence holder.
New management initiatives (2015/16)
The Specimen Shell Managed Fishery is currently under review with changes to the management arrangements expected to be introduced in 2016. Among the changes under consideration is to consolidate existing management arrangements for the fishery into a new Management Plan that will provide for additional permitted methods of collection in the Fishery such as remotely operated underwater vehicles.
Hermit Crab Fishery Report: Statistics Only
S.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green
Fishery Description
Commercial
The Hermit Crab Fishery (HCF) specifically targets the Australian land hermit crab (Coenobita variabilis) for the domestic and international live pet trade. The fishery operates throughout the year and is the only land-based commercial fishery in Western Australia.
Collectors use four-wheel drive vehicles to access remote beaches predominantly in the states north. Collection usually occurs on foot and at night when hermit crabs are most active.
Recreational
There is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to a recreational daily bag limit of 10 (for "unlisted" crustaceans).
Boundaries
The HCF is currently permitted to fish Western Australian waters (as defined in Section 5, Part 1 FRMA 1994) north of Exmouth Gulf (22 o 30'S).
Management arrangements
behalf) listed in the Instrument of Exemption enabling the take of land hermit crabs (C. variabilis) by hand collection only.
The Fishery has been managed by way of an exemption authorisation since 2008. Prior to 2008 the fishery was managed by CFL conditions.
Landings and Effort
Data for assessing the status of the HCF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.
A total of 77,675 hermit crabs were landed in 2014. The reported landings of hermit crabs for 2014 were lower than those reported in 2013 (88,443), 2012 (90,364) and in 2010 (105,774) and 2009 (110,250), but were at level similar to that reported in 2011 (75,667; see Hermit Crab Fishery Table 1).
In 2014, 3 of the 5 collectors reported some level of activity in this fishery. Effort in the fishery is variable and does not appear related to catch. A total of 219 effort days were reported in the HCF in 2014. Effort in the fishery is spread over large areas along the Western Australian coastline.
This fishery is managed primarily through input controls in the form of limited entry to the fishery, nominated operators, species restrictions, gear restrictions and permanent closed areas. Access to the fishery is limited to the 5 Commercial Fishing Licence (CFL) holders (or persons acting on their
Hermit crabs are collected for a live market, licencees are restricted in terms of the quantities that they can safely handle and transport.
Land hermit crabs inhabit dead mollusc shells which have no attached biota. There is no bycatch associated with this fishery.
There are no reported listed species interactions for this fishery. The HCF is highly selective and land based. It is highly unlikely that this fishery has any interactions with endangered, threatened or protected species (ETPs). The main opportunity for interaction maybe through four-wheel drive vehicles on beaches and whilst walking to collect the crabs, however, if ETPs are sighted they can be easily avoided. The potential for ETP interactions is further limited due to the low fishing effort and restricted areas of collection.
Fishery Governance
Target commercial catch range:
Not Applicable
Current Fishing (or Effort) Level: Acceptable
The current effort level in the fishery has been relatively constant over the last 4 years and the operating extent of the fishery is low relative to the widespread distribution of the target species. There is limited potential for any impact on the breeding stock. Therefore the current level of fishing activity is considered acceptable.
New management initiatives (2015/16)
The Department of Fisheries is currently reviewing the management of the Western Australian Hermit Crab fishery with a view to transitioning the fishery to Interim Managed Fishery status through the drafting of a (Interim) Fishery Management Plan.
The development of the (Interim) Management Plan will be in accordance with Part 6 of the FRMA 1994. Management arrangements under the management plan will be consistent with, and guided by stock assessment data in accordance with Ecosystem Based Fisheries Management requirements, Commonwealth Wildlife Trade Operation export accreditation requirements, Ecological Risk Assessment outcomes, and minimum effective regulation principles.
HERMIT CRAB FISHERY TABLE 1
Summary of the reported catch of Hermit Crabs landed from the Hermit Crab Fishery for 2014, with catch for the previous six years.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 309
There is currently no Wildlife Trade Operation (WTO) approval for the whole fishery under the provisions of the EPBC Act (Department of the Environment (DotE)). However, one operator has received WTO approval to export land hermit crabs. This WTO is in force until November 2015 and is subject to conditions. The primary condition is the export limitation of C. variabilis under the EPBC Act is not to exceed 10,000 specimens per year.
External factors
Terrestrial hermit crabs such as C. variabilis have large gill chambers which are kept moist acting as a type of lung. This facilitates their terrestrial life stage, however females must move to the ocean to release eggs which hatch as planktonic larvae. Larvae settle as small juveniles, find a tiny shell and move onshore.
In order for C. variabilis individuals to grow, they must exchange their shell for a larger sized one. There is frequently strong competition for any available shells, with C. variabilis individuals fighting over shells as intact gastropod shells are not an unlimited resource. The availability of empty shells is dependent not only on the abundance of C. variabilis and the gastropods whose shells they seek, but importantly on the occurrence of predators that prey on gastropods yet leave the shells intact.
C. variabilis is endemic to northern Australia including northern Western Australia, the Northern Territory and northern Queensland. Given the warming climate of Australia and the moving of moist air southwards, the distribution of this species may extend further south in future years.
|
<urn:uuid:c2c94bce-2811-4835-b0f0-66f4e6e61fbc>
|
CC-MAIN-2020-45
|
https://www.fish.wa.gov.au/Documents/sofar/status_reports_of_the_fisheries_2014-15_statewide.pdf
|
2020-10-25T11:31:17+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-45/subset=warc/part-00151-6409130e-6e9b-44d1-90ec-9f9d0ade2504.c000.gz.parquet
| 711,154,883
| 6,774
|
eng_Latn
|
eng_Latn
| 0.985442
|
eng_Latn
| 0.992638
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3534,
5594,
11669,
13815,
14115,
14414,
18653,
24011,
28357,
32080
] |
STATEWIDE
ECOSYSTEM BASED FISHERIES MANAGEMENT
Identification of Statewide Ecological Assets using the EBFM framework
While the bioregional scale of management has been adopted by the Department through the implementation of an Ecosystem Based Fisheries Management (EBFM) framework (see How to Use section for more details), due to their life histories or broader impacts, a small number of ecological assets cannot realistically be managed at a single bioregional level but need to be considered at either a statewide or at a multiple bioregional level.
Risk Assessment of Statewide Ecological Assets and External Drivers
The EBFM process identifies the ecological assets in a hierarchical manner such that the assets outlined in Statewide Ecosystem Management Figure 1 are often made up of individual components at species or stock level. The risks to each of the individual stock or lower level components are mostly detailed in the individual fishery reports presented in this document. The following table (Statewide Ecosystem Management Table 1) provides an overview and cumulative assessment of the current risks to those ecological assets that function at a Statewide level and provides a mechanism for reporting on their status and the fisheries management arrangements that are being applied. These level risks are now used by the Department as a key input into the Department's Risk Register which, combined with an assessment of the economic and social values and risks associated with these assets, is integral for use in the annual planning cycle for assigning priorities for activities across all Divisions for Statewide issues.
Summary of Monitoring and Assessment of Statewide Assets
The Department is working closely with the Commonwealth Government and other jurisdictions to develop and implement the National System for the Prevention and Management of Marine Pest Incursions that will minimise the biosecurity risks associated with increased shipping in all parts of the State. Within WA, this is currently being achieved through the Fish Resources Management Act 1994 and the Biosecurity and Agriculture Management Act 2007. Work has also been undertaken to develop monitoring designs for introduced marine species for the high risk ports in WA. These designs have been approved by the Invasive Marine Pests Program within DAFF (Department of Agriculture, Fisheries and Forestry). This work contributes toward the management of introduced aquatic organism incursions and fish kill incident response programs already in place.
The Department of Fisheries' Research Division's Biodiversity and Biosecurity Branch works collaboratively with the Department of Parks and Wildlife (DPaW) in monitoring the condition of the state's fish resources within Marine Parks across the State. Development of Collaborative Operational Plans between the Department and DPaW ensure efficient and cost effective delivery of research and monitoring activities where jurisdictions overlap. The Department's risk based approach to research and monitoring (under its EBFM framework) in conjunction with marine park management plans drives research and monitoring activities within marine parks.
STATEWIDE ECOSYSTEM MANAGEMENT TABLE 1 - RISK LEVELS FOR EACH ASSET.
Low and Medium values are both considered to be acceptable levels of risk. High and Significant risks indicate that the asset is no longer in a condition that is considered appropriate and additional management actions are required.
Captured fish species
External Drivers (NON FISHING)
South West Sharks
North West Sharks
Aquarium Fish
Specimen Shells
Captured Species
Climate
Introduced Diseases/Pests
External Drivers
Statewide
Ecological Resources/Assets
STATEWIDE ECOSYSTEM MANAGEMENT FIGURE 1
Component tree showing the Statewide ecological assets and external drivers identified and separately assessed.
FISHERIES
Marine Aquarium Fish Managed Fishery Report: Statistics Only
S.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green
Fishery Description
Commercial
The Marine Aquarium Fish Managed Fishery (MAFMF) has the capacity to target more than 950 species of marine aquarium fish under the Marine Aquarium Fish Management Plan 1995 (this includes sharks and rays (Chondrichthyes), syngnathids, moral eels, and higher taxonomic groups at the Order, Family or Genus level in cases where the species cannot be specifically identified and also includes unquantified aquarium species). However, the number of marine aquarium fish species targeted and/or landed by the fishery varies from year to year (e.g. in the period from 2005 to 2014 the number of marine aquarium fish species landed ranged from 183 to 288; 170 marine aquarium fish species were recorded in 2014). Operators in the MAFMF are also permitted to take coral, live rock, algae, seagrass and invertebrates under the Prohibition on Fishing (Coral, 'Live Rock' and Algae) Order 2007 and by way of Ministerial Exemption. In 2014, a total of over 321 species or species groups were reported in the landed catch of the MAFMF. The reported catch includes groups that were reported at the level of Order, Family, Genus or species. The MAFMF is primarily a dive-based fishery that uses hand-held nets to capture the desired target species. While the MAFMF operates throughout all Western Australian waters, catches are relatively low in volume due to the special handling requirements of live fish. Fishing operations are also heavily
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 301
weather-dependent due to the small vessels used and the potentially hazardous conditions (e.g. waves, swell) encountered. In addition, human constraints (i.e. physiological effects of decompression) limit the amount of effort exerted in the fishery, the depth of water and the offshore extent where collections can occur.
Recreational
There is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to normal recreational bag limits and, for some species, size limits. There is a complete ban on the recreational take of coral, live rock and listed fish such as leafy and weedy seadragons.
Boundaries
The MAFMF operates in Western Australia's state waters spanning the coastline from the Northern Territory border in the north to the South Australian border in the south. The effort is spread over a total gazetted area of 20,781 km 2 . During the past three years the fishery has been active in waters from Esperance to Broome with popular areas being around the Capes region, Perth, Geraldton, Exmouth and Dampier.
Management arrangements
This fishery is managed primarily through input controls in the form of limited entry to the fishery and permanent closed areas. There are 12 licences in the fishery; however, only six licences are permitted to take all hard corals and most soft corals (all 12 licences are permitted to take coral like anemone groups such as corallimorphs and zoanthids in the Class Anthozoa). In 2014, 10 licences operated in the fishery.
Licensees are not permitted to operate within any waters closed to fishing (e.g. Rowley Shoals, Reef Protected Areas, sanctuary zones). The fishery is permitted to operate in general-purpose zones of marine parks for the collection of fish and some invertebrates (usually excluding coral and live rock). Fishing is also prohibited on Cleaverville Reef in order to exclude the take of coral and associated organisms.
Fish caught in this fishery may not be used for food purposes, and operators are not permitted to take non-finfish species covered by other specific commercial management arrangements or management plans.
The MAFMF is permitted to take most species from the Syngnathid family (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999. However, there is a total ban on the take of leafy seadragons (Phycodurus eques). There is currently an upper limit of 2,000 individual syngnathids across the State, if this limit is exceeded, a review will be initiated, and the results used to determine whether further management action is required.
Landings and Effort
Data for assessing the status of the MAFMF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.
A total of 20,052 fish (excluding syngnathids) were landed in 2014. Collectors in this ornamental fishery can earn a high return from the capture of very small quantities of individuals. Therefore, the catches are small in comparison to the more common, food-fish fisheries. Fishers report the level of catch as either - kg, numbers or litres depending upon the species or species group involved (Marine Aquarium Fish Table 1). The reported landings of aquarium fish for 2014 was higher than that reported in 2013 (19,302), but lower than that reported in 2012 (22,780). The level of catch of aquarium fish reported over the last 5 years is all somewhat similar.
The main fish (excluding syngnathids) species landed in 2014 were damselfish of the Chromis genus and the Neopomacentrus genus, followed by the spotted blenny (Istiblennius meleagris) and the scribbled angelfish (Chaetodontoplus duboulayi) (Marine Aquarium Fish Table 2). Likewise, the main coral species landed in 2014 were the coral like anemones of the Corallimorphus genus (Marine Aquarium Fish Table 3). The numbers of fish species and the weight of coral species landed vary from year to year depending on market demand.
The syngnathid catch was low and stable between 2009 and 2010 (i.e. 340 and 338 respectively). The syngnathid catches in 2011 (1,138), 2012 (1,232) and 2013 (1,635) were higher in comparison and were similar to the catch levels reported in 2008 (1,218). In 2014, the syngnathid catch was again low, similar to the 2009-2010 level (359 individuals).
In 2014, 10 licences reported some level of activity (effort). Effort in the fishery has decreased from 981 fishing days (2007) to 479 fishing days in 2014. Effort in the fishery is concentrated in a number of discrete areas adjacent to the limited number of boat landing sites along the Western Australian coastline.
Given that the specimens are collected for a live market, licences are restricted in terms of the quantities that they can safely handle and transport (for example, by boat to shore, by vehicle to the holding facility and then on to the retailer) without impacting on the quality of the product. The size of the holding facility and access to regular freight and infrastructure services (such as airports, particularly in the remote northern locations of Western Australia) restricts the levels of effort that can be expended in the fishery at any given time.
There were no reported listed species interactions for the fishery in 2014.
The performance measures for the fishery relate to the catch of the syngnathids. The MAFMF is permitted to take species from the Family Syngnathidae (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999, from state waters only (within 3nm). In 2014, the catch of syngnathids from all species and areas was 359, well below the target commercial catch range level of 2,000 individuals per year. The catch level of syngnathids has decreased from that reported in 2013 (1,635), 2012 (1,232) and 2011 (1,138). Note, that there is a prohibition on the take of leafy seadragons (Phycodurus eques) in the MAFMF.
Fishery Governance
Target commercial catch range:
2000 Syngnathids
Current Fishing (or Effort) Level: Acceptable
The current effort level in the fishery is relatively constant from year to year and the operating extent of the fishery is very low relative to the widespread distribution of the numerous species targeted. No other fisheries exploit these species and therefore there is extremely limited potential for any impact on breeding stocks. Therefore the current level of fishing activity is considered acceptable.
New management initiatives (2015/16)
The MAFMF is currently under review with changes to the management arrangements expected to be introduced in 2015. Among the changes under consideration is to consolidate existing legislative instruments for the fishery into a new Management Plan that will provide for the take of finfish, invertebrates, hard and soft coral, live rock, algae and seagrass.
In December 2012 an application for reassessment of the MAFMF as ecologically sustainable under the provisions of the EPBC Act 1999 was submitted to the Department of the Environment (DotE), the then Department of Sustainability, Environment, Water, Population and Communities. This application was successful and Wildlife Trade Operation (WTO) approval was granted till December 2013. In November 2013 a subsequent application was submitted to DotE for further WTO approval, this application was successful and WTO approval was granted till October 2016.
The MAFMF is scheduled to undergo MSC pre-assessment in 2015.
MARINE AQUARIUM FISH TABLE 1
Summary of the reported catch landed from the Marine Aquarium Fish Managed Fishery and associated endorsements in 2014 (Note: the catch of hermit crabs is now reported in the Hermit Crab Fishery Status Report).
1 The soft coral category includes 2,765 kg of coral like anemone groups such as corallimorphs and zoanthids in the Class anthozoa. These are harvested under an invertebrate Ministerial Exemption and are not part of the annual coral TAC.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 303
MARINE AQUARIUM FISH TABLE 2
Summary of the reported catch (number of individuals) of the main fish (excluding Syngnathids) species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years. Note the species reported in this table vary from year to year.
MARINE AQUARIUM FISH TABLE 3
Summary of the reported catch (kg) of the main coral species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 305
Specimen Shell Managed Fishery Status Report
A. Hart, K. Crowe
Fishery Description
The Specimen Shell Managed Fishery (SSMF) is based on the collection of individual shells for the purposes of display, collection, cataloguing, classification and sale.
Just over 200 (218) different Specimen Shell species were collected in 2014, using a variety of methods. The main methods are by hand by a small group of divers operating from small boats in shallow coastal waters or by wading along coastal beaches below the high water mark. A current exemption method being employed by the fishery is using a remote controlled underwater vehicle at depths between 60 and 300 m and a new exemption method using baited habitat structures at depths is being trialled. While the fishery covers the entire Western Australian coastline, there is some concentration of effort in areas adjacent to population centres such as Broome, Karratha, Shark Bay, metropolitan Perth, Mandurah, the Capes area and Albany.
Governing legislation/fishing authority
Specimen Shell Management Plan 1995
Specimen Shell Managed Fishery Licence
Commonwealth Government Environment Protection and Biodiversity Conservation Act 1999 (Export Exemption)
Consultation process
The Department undertakes consultation directly with licensees on operational issues. Industry Annual General Meetings are convened by the Western Australian Fishing Industry Council (WAFIC), who are also responsible for statutory management plan consultation under a Service Level Agreement with the Department.
Boundaries
The fishing area includes all Western Australian waters between the high water mark and the 200 m isobath.
Management arrangements
This is a limited entry fishery with 32 licences in the fishery, with 18 of the licences being active. Furthermore, a maximum of 2 divers are allowed in the water per licence at any one time and specimens may only be collected by hand.
There are a number of closed areas where the SSMF is not permitted to operate. This includes within various marine parks and aquatic reserves and other closed waters such as Reef Observation Areas and Fish Habitat Protection Areas. Much of the west side of North-West Cape and the Ningaloo Marine Park are prohibited areas for the fishery. The exclusion of Marmion Marine Park in the Perth metropolitan area is also important because of its populations of 2 rare cowrie species.
The SSMF is not permitted to take any mollusc species for which separate management arrangements exist – such as abalone, mussels, scallops and pearl oysters.
A comprehensive Ecologically Sustainable Development assessment of this fishery has been undertaken to identify any potential sustainability risks requiring direct management. The only issue identified through this process related to the breeding stock levels of specimen shell species. Boxed text in this status report provides the annual assessment of performance for this issue.
Some minor-scale collection of dead shells is also undertaken above the high water mark by collectors operating under the authority of a commercial fishing licence, mainly for sale into the souvenir, pet supply and hobby craft markets. However, this activity does not form part of the Specimen Shell Managed Fishery.
Research summary
Current fishery-dependent data collection systems monitor the catch (species-specific), effort and catch rates for the fishery. Fishers within the SSMF provide monthly returns under the statutory catch and effort system (CAES). These returns contain information on catch (species, numbers and spatial area), and days and hours fished by method by month and year.
This fishery is managed through input controls in the form of limited entry, gear restrictions and permanent closed areas. The primary controls in the fishery are operational limitations – depth, time and tide.
A new specific Specimen Shell logbook was formally introduced in August 2013 (which built on the logbook being trialled in the fishery) to aid the reporting of the number sighted and number taken alive and/or dead of the 8 mollusc species identified as potentially 'vulnerable' and the reporting of the finer spatial scale, 10 x 10 nautical mile (nm) grid blocks.
This data is used as the basis to provide research advice for fisheries management.
Retained Species
Commercial landings (season 2014): 31,371 shells
Recreational catch estimate (season 2014):
Unknown
Commercial Landings
In 2014, the total number of specimen shells collected was 31,371 distributed over a wide range of species. This is based on 100% of submitted catch returns. In the past 5 years, more than 487 separate species of molluscs have been collected, with an average of more than 200 species per year – the majority in low numbers.
There is some focus of effort on mollusc families most popular with shell collectors, such as cowries, cones, murexes and volutes. Cypraeidae or cowries are noted for their localised variations in both shape and colour, making them attractive to collectors.
Fishing effort/access level
Although there are 32 licences in the fishery, about 11 of these are regularly active. Effort in 2014 was 644 days, a decrease from 745 days in 2013. Over the past 5 years, there was an average of around 800 days fished.
Recreational component: Not assessed
Shell collecting is a popular recreational pastime, and members of the public are permitted to collect shells for their private collections. The recreational catch, while unknown, is considered to be declining, as evidenced by declining membership in shell collecting associations.
Stock Assessment
Assessment complete: Yes
Breeding stock levels: Adequate
During the 2014 season the catch rate was approximately 49 shells per day.
Ponder and Grayson (1998) examined the specimen shell industry on a nationwide basis, rating vulnerability to overexploitation on the basis of species biology, accessibility to collection, and rarity. Species collected in Western Australia which were identified by Ponder and Grayson as potentially vulnerable comprised of 6 cowries (Cypraea (Austrocypraea) reevei, Cypraea (Zoila) friendii vercoi, Cypraea (Zoila) marginata (albanyensis), Cypraea (Zoila) marginata (consueta), Cypraea (Zoila) rosselli and Cypraea (Zoila) venusta) and 2 volutes (Amoria damoni (keatsiana) and Amoria damoni (reevei)).
sighted is reported correctly in about 98 % of the cases where one of the vulnerable species is reported. It is anticipated that current sightings are an under estimate of the available populations.
This improvement in reporting of the vulnerable (indicator) species, in terms of species identification and the number sighted and number taken alive and/or dead can be contributed to the new return form.
The reporting of catch and effort on the finer spatial scale of 10 x 10 nm blocks from August 2004 is also providing more accurate information on the distribution of certain species. Again, the 2014 season has seen ll licensees report the smaller spatial resolution grid blocks rather than reporting the 60 x 60 nm blocks..
All species collected in Western Australia, including the 8 indicator species, occur over wide geographic ranges (hundreds or thousands of kilometres) and wide depth ranges (up to 200 m) where a substantial portion of the population cannot for logistical and safety reasons be collected. However, with the introduction of the remote controlled underwater vehicles these depth restrictions are starting to be overcome.
Even in shallow waters, many localities cannot be fished because of the lack of access to the beach and the small boats used, and collecting is prohibited in many of the more easily reached areas which are now in marine parks and reserves. Additional protection is afforded by the fact that collectors will ignore any specimens with slight visual imperfections, but their reproductive potential in the population remains undiminished. In summary, it is considered that the fishery has very little likelihood of having an unacceptable impact on breeding stocks.
The performance measures for the fishery relate to the maintenance of breeding stocks, as indicated by catch levels and catch rates. In 2014, the catch level of approximately 31,300 shells is above the range set , i.e. 10,000 – 25,000 shells and the catch rate of 49 shells/day was also above the range set., i.e. 10 – 40 shells/day.
Non-Retained Species
Bycatch species impact: Negligible
There is no bycatch in this fishery owing to the highly selective fishing methods.
Listed species interaction: Negligible
The fishery reported no interactions with listed species during 2014. Reports of interactions with listed species are required to be recorded on monthly catch and effort returns.
Ecosystem Effects
'Shell sighting' is a new abundance category. It is a measure of the population of vulnerable shells that is observed but not taken, and provides evidence for the breeding stock being conserved each year. Of the 8 vulnerable species an overall average of approximately 47 % of the shells sighted were not harvested in 2014. The measure of the number of shells
Food chain effects: Negligible
Habitat effects: Negligible
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 307
Social Effects
In 2014 there were 32 authorisation holders in this fishery with around 11 licences recording consistent activity, the number of people employed regularly in the fishery (licensees plus crew/ dive buddies) is likely to be around 19. There were also around 8 people (licensees plus crew/dive buddies) that operated occasionally in this fishery. With many of the licences there might be the additional employment of people to prepare the shells for collection, pack and distribute the shells and also, some licensees might have shop fronts, therefore, employing shop assistants. The number employed in this area is unknown.
Economic Effects
Estimated annual value (to fishers) for 2014:
Not assessed
Fishery Governance
Target catch range: 10,000 – 25,000 shells
A preliminary performance measure has been developed of a total annual catch range from 10,000 to 25,000 shells, which encompasses the range of catches taken from 2000 to 2003. This performance measure has been developed to ensure that a
|
ny major change in the patterns of fishing is noticed and investigated.
|
If it is triggered, this may not necessarily indicate any problem with the stocks, but rather fluctuations in the natural environment or market dynamics. Catch in 2014 was above the range, due principally to increased activity of one licence holder.
New management initiatives (2015/16)
The Specimen Shell Managed Fishery is currently under review with changes to the management arrangements expected to be introduced in 2016. Among the changes under consideration is to consolidate existing management arrangements for the fishery into a new Management Plan that will provide for additional permitted methods of collection in the Fishery such as remotely operated underwater vehicles.
Hermit Crab Fishery Report: Statistics Only
S.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green
Fishery Description
Commercial
The Hermit Crab Fishery (HCF) specifically targets the Australian land hermit crab (Coenobita variabilis) for the domestic and international live pet trade. The fishery operates throughout the year and is the only land-based commercial fishery in Western Australia.
Collectors use four-wheel drive vehicles to access remote beaches predominantly in the states north. Collection usually occurs on foot and at night when hermit crabs are most active.
Recreational
There is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to a recreational daily bag limit of 10 (for "unlisted" crustaceans).
Boundaries
The HCF is currently permitted to fish Western Australian waters (as defined in Section 5, Part 1 FRMA 1994) north of Exmouth Gulf (22 o 30'S).
Management arrangements
behalf) listed in the Instrument of Exemption enabling the take of land hermit crabs (C. variabilis) by hand collection only.
The Fishery has been managed by way of an exemption authorisation since 2008. Prior to 2008 the fishery was managed by CFL conditions.
Landings and Effort
Data for assessing the status of the HCF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.
A total of 77,675 hermit crabs were landed in 2014. The reported landings of hermit crabs for 2014 were lower than those reported in 2013 (88,443), 2012 (90,364) and in 2010 (105,774) and 2009 (110,250), but were at level similar to that reported in 2011 (75,667; see Hermit Crab Fishery Table 1).
In 2014, 3 of the 5 collectors reported some level of activity in this fishery. Effort in the fishery is variable and does not appear related to catch. A total of 219 effort days were reported in the HCF in 2014. Effort in the fishery is spread over large areas along the Western Australian coastline.
This fishery is managed primarily through input controls in the form of limited entry to the fishery, nominated operators, species restrictions, gear restrictions and permanent closed areas. Access to the fishery is limited to the 5 Commercial Fishing Licence (CFL) holders (or persons acting on their
Hermit crabs are collected for a live market, licencees are restricted in terms of the quantities that they can safely handle and transport.
Land hermit crabs inhabit dead mollusc shells which have no attached biota. There is no bycatch associated with this fishery.
There are no reported listed species interactions for this fishery. The HCF is highly selective and land based. It is highly unlikely that this fishery has any interactions with endangered, threatened or protected species (ETPs). The main opportunity for interaction maybe through four-wheel drive vehicles on beaches and whilst walking to collect the crabs, however, if ETPs are sighted they can be easily avoided. The potential for ETP interactions is further limited due to the low fishing effort and restricted areas of collection.
Fishery Governance
Target commercial catch range:
Not Applicable
Current Fishing (or Effort) Level: Acceptable
The current effort level in the fishery has been relatively constant over the last 4 years and the operating extent of the fishery is low relative to the widespread distribution of the target species. There is limited potential for any impact on the breeding stock. Therefore the current level of fishing activity is considered acceptable.
New management initiatives (2015/16)
The Department of Fisheries is currently reviewing the management of the Western Australian Hermit Crab fishery with a view to transitioning the fishery to Interim Managed Fishery status through the drafting of a (Interim) Fishery Management Plan.
The development of the (Interim) Management Plan will be in accordance with Part 6 of the FRMA 1994. Management arrangements under the management plan will be consistent with, and guided by stock assessment data in accordance with Ecosystem Based Fisheries Management requirements, Commonwealth Wildlife Trade Operation export accreditation requirements, Ecological Risk Assessment outcomes, and minimum effective regulation principles.
HERMIT CRAB FISHERY TABLE 1
Summary of the reported catch of Hermit Crabs landed from the Hermit Crab Fishery for 2014, with catch for the previous six years.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 309
There is currently no Wildlife Trade Operation (WTO) approval for the whole fishery under the provisions of the EPBC Act (Department of the Environment (DotE)). However, one operator has received WTO approval to export land hermit crabs. This WTO is in force until November 2015 and is subject to conditions. The primary condition is the export limitation of C. variabilis under the EPBC Act is not to exceed 10,000 specimens per year.
External factors
Terrestrial hermit crabs such as C. variabilis have large gill chambers which are kept moist acting as a type of lung. This facilitates their terrestrial life stage, however females must move to the ocean to release eggs which hatch as planktonic larvae. Larvae settle as small juveniles, find a tiny shell and move onshore.
In order for C. variabilis individuals to grow, they must exchange their shell for a larger sized one. There is frequently strong competition for any available shells, with C. variabilis individuals fighting over shells as intact gastropod shells are not an unlimited resource. The availability of empty shells is dependent not only on the abundance of C. variabilis and the gastropods whose shells they seek, but importantly on the occurrence of predators that prey on gastropods yet leave the shells intact.
C. variabilis is endemic to northern Australia including northern Western Australia, the Northern Territory and northern Queensland. Given the warming climate of Australia and the moving of moist air southwards, the distribution of this species may extend further south in future years.
| 25,049
|
inside_word
|
any
|
remove_one_sentence
|
<url>
https://www.fish.wa.gov.au/Documents/sofar/status_reports_of_the_fisheries_2014-15_statewide.pdf
</url>
<text>
STATEWIDE
ECOSYSTEM BASED FISHERIES MANAGEMENT
Identification of Statewide Ecological Assets using the EBFM framework
While the bioregional scale of management has been adopted by the Department through the implementation of an Ecosystem Based Fisheries Management (EBFM) framework (see How to Use section for more details), due to their life histories or broader impacts, a small number of ecological assets cannot realistically be managed at a single bioregional level but need to be considered at either a statewide or at a multiple bioregional level.
Risk Assessment of Statewide Ecological Assets and External Drivers
The EBFM process identifies the ecological assets in a hierarchical manner such that the assets outlined in Statewide Ecosystem Management Figure 1 are often made up of individual components at species or stock level. The risks to each of the individual stock or lower level components are mostly detailed in the individual fishery reports presented in this document. The following table (Statewide Ecosystem Management Table 1) provides an overview and cumulative assessment of the current risks to those ecological assets that function at a Statewide level and provides a mechanism for reporting on their status and the fisheries management arrangements that are being applied. These level risks are now used by the Department as a key input into the Department's Risk Register which, combined with an assessment of the economic and social values and risks associated with these assets, is integral for use in the annual planning cycle for assigning priorities for activities across all Divisions for Statewide issues.
Summary of Monitoring and Assessment of Statewide Assets
The Department is working closely with the Commonwealth Government and other jurisdictions to develop and implement the National System for the Prevention and Management of Marine Pest Incursions that will minimise the biosecurity risks associated with increased shipping in all parts of the State. Within WA, this is currently being achieved through the Fish Resources Management Act 1994 and the Biosecurity and Agriculture Management Act 2007. Work has also been undertaken to develop monitoring designs for introduced marine species for the high risk ports in WA. These designs have been approved by the Invasive Marine Pests Program within DAFF (Department of Agriculture, Fisheries and Forestry). This work contributes toward the management of introduced aquatic organism incursions and fish kill incident response programs already in place.
The Department of Fisheries' Research Division's Biodiversity and Biosecurity Branch works collaboratively with the Department of Parks and Wildlife (DPaW) in monitoring the condition of the state's fish resources within Marine Parks across the State. Development of Collaborative Operational Plans between the Department and DPaW ensure efficient and cost effective delivery of research and monitoring activities where jurisdictions overlap. The Department's risk based approach to research and monitoring (under its EBFM framework) in conjunction with marine park management plans drives research and monitoring activities within marine parks.
STATEWIDE ECOSYSTEM MANAGEMENT TABLE 1 - RISK LEVELS FOR EACH ASSET.
Low and Medium values are both considered to be acceptable levels of risk. High and Significant risks indicate that the asset is no longer in a condition that is considered appropriate and additional management actions are required.
Captured fish species
External Drivers (NON FISHING)
South West Sharks
North West Sharks
Aquarium Fish
Specimen Shells
Captured Species
Climate
Introduced Diseases/Pests
External Drivers
Statewide
Ecological Resources/Assets
STATEWIDE ECOSYSTEM MANAGEMENT FIGURE 1
Component tree showing the Statewide ecological assets and external drivers identified and separately assessed.
FISHERIES
Marine Aquarium Fish Managed Fishery Report: Statistics Only
S.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green
Fishery Description
Commercial
The Marine Aquarium Fish Managed Fishery (MAFMF) has the capacity to target more than 950 species of marine aquarium fish under the Marine Aquarium Fish Management Plan 1995 (this includes sharks and rays (Chondrichthyes), syngnathids, moral eels, and higher taxonomic groups at the Order, Family or Genus level in cases where the species cannot be specifically identified and also includes unquantified aquarium species). However, the number of marine aquarium fish species targeted and/or landed by the fishery varies from year to year (e.g. in the period from 2005 to 2014 the number of marine aquarium fish species landed ranged from 183 to 288; 170 marine aquarium fish species were recorded in 2014). Operators in the MAFMF are also permitted to take coral, live rock, algae, seagrass and invertebrates under the Prohibition on Fishing (Coral, 'Live Rock' and Algae) Order 2007 and by way of Ministerial Exemption. In 2014, a total of over 321 species or species groups were reported in the landed catch of the MAFMF. The reported catch includes groups that were reported at the level of Order, Family, Genus or species. The MAFMF is primarily a dive-based fishery that uses hand-held nets to capture the desired target species. While the MAFMF operates throughout all Western Australian waters, catches are relatively low in volume due to the special handling requirements of live fish. Fishing operations are also heavily
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 301
weather-dependent due to the small vessels used and the potentially hazardous conditions (e.g. waves, swell) encountered. In addition, human constraints (i.e. physiological effects of decompression) limit the amount of effort exerted in the fishery, the depth of water and the offshore extent where collections can occur.
Recreational
There is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to normal recreational bag limits and, for some species, size limits. There is a complete ban on the recreational take of coral, live rock and listed fish such as leafy and weedy seadragons.
Boundaries
The MAFMF operates in Western Australia's state waters spanning the coastline from the Northern Territory border in the north to the South Australian border in the south. The effort is spread over a total gazetted area of 20,781 km 2 . During the past three years the fishery has been active in waters from Esperance to Broome with popular areas being around the Capes region, Perth, Geraldton, Exmouth and Dampier.
Management arrangements
This fishery is managed primarily through input controls in the form of limited entry to the fishery and permanent closed areas. There are 12 licences in the fishery; however, only six licences are permitted to take all hard corals and most soft corals (all 12 licences are permitted to take coral like anemone groups such as corallimorphs and zoanthids in the Class Anthozoa). In 2014, 10 licences operated in the fishery.
Licensees are not permitted to operate within any waters closed to fishing (e.g. Rowley Shoals, Reef Protected Areas, sanctuary zones). The fishery is permitted to operate in general-purpose zones of marine parks for the collection of fish and some invertebrates (usually excluding coral and live rock). Fishing is also prohibited on Cleaverville Reef in order to exclude the take of coral and associated organisms.
Fish caught in this fishery may not be used for food purposes, and operators are not permitted to take non-finfish species covered by other specific commercial management arrangements or management plans.
The MAFMF is permitted to take most species from the Syngnathid family (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999. However, there is a total ban on the take of leafy seadragons (Phycodurus eques). There is currently an upper limit of 2,000 individual syngnathids across the State, if this limit is exceeded, a review will be initiated, and the results used to determine whether further management action is required.
Landings and Effort
Data for assessing the status of the MAFMF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.
A total of 20,052 fish (excluding syngnathids) were landed in 2014. Collectors in this ornamental fishery can earn a high return from the capture of very small quantities of individuals. Therefore, the catches are small in comparison to the more common, food-fish fisheries. Fishers report the level of catch as either - kg, numbers or litres depending upon the species or species group involved (Marine Aquarium Fish Table 1). The reported landings of aquarium fish for 2014 was higher than that reported in 2013 (19,302), but lower than that reported in 2012 (22,780). The level of catch of aquarium fish reported over the last 5 years is all somewhat similar.
The main fish (excluding syngnathids) species landed in 2014 were damselfish of the Chromis genus and the Neopomacentrus genus, followed by the spotted blenny (Istiblennius meleagris) and the scribbled angelfish (Chaetodontoplus duboulayi) (Marine Aquarium Fish Table 2). Likewise, the main coral species landed in 2014 were the coral like anemones of the Corallimorphus genus (Marine Aquarium Fish Table 3). The numbers of fish species and the weight of coral species landed vary from year to year depending on market demand.
The syngnathid catch was low and stable between 2009 and 2010 (i.e. 340 and 338 respectively). The syngnathid catches in 2011 (1,138), 2012 (1,232) and 2013 (1,635) were higher in comparison and were similar to the catch levels reported in 2008 (1,218). In 2014, the syngnathid catch was again low, similar to the 2009-2010 level (359 individuals).
In 2014, 10 licences reported some level of activity (effort). Effort in the fishery has decreased from 981 fishing days (2007) to 479 fishing days in 2014. Effort in the fishery is concentrated in a number of discrete areas adjacent to the limited number of boat landing sites along the Western Australian coastline.
Given that the specimens are collected for a live market, licences are restricted in terms of the quantities that they can safely handle and transport (for example, by boat to shore, by vehicle to the holding facility and then on to the retailer) without impacting on the quality of the product. The size of the holding facility and access to regular freight and infrastructure services (such as airports, particularly in the remote northern locations of Western Australia) restricts the levels of effort that can be expended in the fishery at any given time.
There were no reported listed species interactions for the fishery in 2014.
The performance measures for the fishery relate to the catch of the syngnathids. The MAFMF is permitted to take species from the Family Syngnathidae (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999, from state waters only (within 3nm). In 2014, the catch of syngnathids from all species and areas was 359, well below the target commercial catch range level of 2,000 individuals per year. The catch level of syngnathids has decreased from that reported in 2013 (1,635), 2012 (1,232) and 2011 (1,138). Note, that there is a prohibition on the take of leafy seadragons (Phycodurus eques) in the MAFMF.
Fishery Governance
Target commercial catch range:
2000 Syngnathids
Current Fishing (or Effort) Level: Acceptable
The current effort level in the fishery is relatively constant from year to year and the operating extent of the fishery is very low relative to the widespread distribution of the numerous species targeted. No other fisheries exploit these species and therefore there is extremely limited potential for any impact on breeding stocks. Therefore the current level of fishing activity is considered acceptable.
New management initiatives (2015/16)
The MAFMF is currently under review with changes to the management arrangements expected to be introduced in 2015. Among the changes under consideration is to consolidate existing legislative instruments for the fishery into a new Management Plan that will provide for the take of finfish, invertebrates, hard and soft coral, live rock, algae and seagrass.
In December 2012 an application for reassessment of the MAFMF as ecologically sustainable under the provisions of the EPBC Act 1999 was submitted to the Department of the Environment (DotE), the then Department of Sustainability, Environment, Water, Population and Communities. This application was successful and Wildlife Trade Operation (WTO) approval was granted till December 2013. In November 2013 a subsequent application was submitted to DotE for further WTO approval, this application was successful and WTO approval was granted till October 2016.
The MAFMF is scheduled to undergo MSC pre-assessment in 2015.
MARINE AQUARIUM FISH TABLE 1
Summary of the reported catch landed from the Marine Aquarium Fish Managed Fishery and associated endorsements in 2014 (Note: the catch of hermit crabs is now reported in the Hermit Crab Fishery Status Report).
1 The soft coral category includes 2,765 kg of coral like anemone groups such as corallimorphs and zoanthids in the Class anthozoa. These are harvested under an invertebrate Ministerial Exemption and are not part of the annual coral TAC.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 303
MARINE AQUARIUM FISH TABLE 2
Summary of the reported catch (number of individuals) of the main fish (excluding Syngnathids) species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years. Note the species reported in this table vary from year to year.
MARINE AQUARIUM FISH TABLE 3
Summary of the reported catch (kg) of the main coral species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 305
Specimen Shell Managed Fishery Status Report
A. Hart, K. Crowe
Fishery Description
The Specimen Shell Managed Fishery (SSMF) is based on the collection of individual shells for the purposes of display, collection, cataloguing, classification and sale.
Just over 200 (218) different Specimen Shell species were collected in 2014, using a variety of methods. The main methods are by hand by a small group of divers operating from small boats in shallow coastal waters or by wading along coastal beaches below the high water mark. A current exemption method being employed by the fishery is using a remote controlled underwater vehicle at depths between 60 and 300 m and a new exemption method using baited habitat structures at depths is being trialled. While the fishery covers the entire Western Australian coastline, there is some concentration of effort in areas adjacent to population centres such as Broome, Karratha, Shark Bay, metropolitan Perth, Mandurah, the Capes area and Albany.
Governing legislation/fishing authority
Specimen Shell Management Plan 1995
Specimen Shell Managed Fishery Licence
Commonwealth Government Environment Protection and Biodiversity Conservation Act 1999 (Export Exemption)
Consultation process
The Department undertakes consultation directly with licensees on operational issues. Industry Annual General Meetings are convened by the Western Australian Fishing Industry Council (WAFIC), who are also responsible for statutory management plan consultation under a Service Level Agreement with the Department.
Boundaries
The fishing area includes all Western Australian waters between the high water mark and the 200 m isobath.
Management arrangements
This is a limited entry fishery with 32 licences in the fishery, with 18 of the licences being active. Furthermore, a maximum of 2 divers are allowed in the water per licence at any one time and specimens may only be collected by hand.
There are a number of closed areas where the SSMF is not permitted to operate. This includes within various marine parks and aquatic reserves and other closed waters such as Reef Observation Areas and Fish Habitat Protection Areas. Much of the west side of North-West Cape and the Ningaloo Marine Park are prohibited areas for the fishery. The exclusion of Marmion Marine Park in the Perth metropolitan area is also important because of its populations of 2 rare cowrie species.
The SSMF is not permitted to take any mollusc species for which separate management arrangements exist – such as abalone, mussels, scallops and pearl oysters.
A comprehensive Ecologically Sustainable Development assessment of this fishery has been undertaken to identify any potential sustainability risks requiring direct management. The only issue identified through this process related to the breeding stock levels of specimen shell species. Boxed text in this status report provides the annual assessment of performance for this issue.
Some minor-scale collection of dead shells is also undertaken above the high water mark by collectors operating under the authority of a commercial fishing licence, mainly for sale into the souvenir, pet supply and hobby craft markets. However, this activity does not form part of the Specimen Shell Managed Fishery.
Research summary
Current fishery-dependent data collection systems monitor the catch (species-specific), effort and catch rates for the fishery. Fishers within the SSMF provide monthly returns under the statutory catch and effort system (CAES). These returns contain information on catch (species, numbers and spatial area), and days and hours fished by method by month and year.
This fishery is managed through input controls in the form of limited entry, gear restrictions and permanent closed areas. The primary controls in the fishery are operational limitations – depth, time and tide.
A new specific Specimen Shell logbook was formally introduced in August 2013 (which built on the logbook being trialled in the fishery) to aid the reporting of the number sighted and number taken alive and/or dead of the 8 mollusc species identified as potentially 'vulnerable' and the reporting of the finer spatial scale, 10 x 10 nautical mile (nm) grid blocks.
This data is used as the basis to provide research advice for fisheries management.
Retained Species
Commercial landings (season 2014): 31,371 shells
Recreational catch estimate (season 2014):
Unknown
Commercial Landings
In 2014, the total number of specimen shells collected was 31,371 distributed over a wide range of species. This is based on 100% of submitted catch returns. In the past 5 years, more than 487 separate species of molluscs have been collected, with an average of more than 200 species per year – the majority in low numbers.
There is some focus of effort on mollusc families most popular with shell collectors, such as cowries, cones, murexes and volutes. Cypraeidae or cowries are noted for their localised variations in both shape and colour, making them attractive to collectors.
Fishing effort/access level
Although there are 32 licences in the fishery, about 11 of these are regularly active. Effort in 2014 was 644 days, a decrease from 745 days in 2013. Over the past 5 years, there was an average of around 800 days fished.
Recreational component: Not assessed
Shell collecting is a popular recreational pastime, and members of the public are permitted to collect shells for their private collections. The recreational catch, while unknown, is considered to be declining, as evidenced by declining membership in shell collecting associations.
Stock Assessment
Assessment complete: Yes
Breeding stock levels: Adequate
During the 2014 season the catch rate was approximately 49 shells per day.
Ponder and Grayson (1998) examined the specimen shell industry on a nationwide basis, rating vulnerability to overexploitation on the basis of species biology, accessibility to collection, and rarity. Species collected in Western Australia which were identified by Ponder and Grayson as potentially vulnerable comprised of 6 cowries (Cypraea (Austrocypraea) reevei, Cypraea (Zoila) friendii vercoi, Cypraea (Zoila) marginata (albanyensis), Cypraea (Zoila) marginata (consueta), Cypraea (Zoila) rosselli and Cypraea (Zoila) venusta) and 2 volutes (Amoria damoni (keatsiana) and Amoria damoni (reevei)).
sighted is reported correctly in about 98 % of the cases where one of the vulnerable species is reported. It is anticipated that current sightings are an under estimate of the available populations.
This improvement in reporting of the vulnerable (indicator) species, in terms of species identification and the number sighted and number taken alive and/or dead can be contributed to the new return form.
The reporting of catch and effort on the finer spatial scale of 10 x 10 nm blocks from August 2004 is also providing more accurate information on the distribution of certain species. Again, the 2014 season has seen ll licensees report the smaller spatial resolution grid blocks rather than reporting the 60 x 60 nm blocks..
All species collected in Western Australia, including the 8 indicator species, occur over wide geographic ranges (hundreds or thousands of kilometres) and wide depth ranges (up to 200 m) where a substantial portion of the population cannot for logistical and safety reasons be collected. However, with the introduction of the remote controlled underwater vehicles these depth restrictions are starting to be overcome.
Even in shallow waters, many localities cannot be fished because of the lack of access to the beach and the small boats used, and collecting is prohibited in many of the more easily reached areas which are now in marine parks and reserves. Additional protection is afforded by the fact that collectors will ignore any specimens with slight visual imperfections, but their reproductive potential in the population remains undiminished. In summary, it is considered that the fishery has very little likelihood of having an unacceptable impact on breeding stocks.
The performance measures for the fishery relate to the maintenance of breeding stocks, as indicated by catch levels and catch rates. In 2014, the catch level of approximately 31,300 shells is above the range set , i.e. 10,000 – 25,000 shells and the catch rate of 49 shells/day was also above the range set., i.e. 10 – 40 shells/day.
Non-Retained Species
Bycatch species impact: Negligible
There is no bycatch in this fishery owing to the highly selective fishing methods.
Listed species interaction: Negligible
The fishery reported no interactions with listed species during 2014. Reports of interactions with listed species are required to be recorded on monthly catch and effort returns.
Ecosystem Effects
'Shell sighting' is a new abundance category. It is a measure of the population of vulnerable shells that is observed but not taken, and provides evidence for the breeding stock being conserved each year. Of the 8 vulnerable species an overall average of approximately 47 % of the shells sighted were not harvested in 2014. The measure of the number of shells
Food chain effects: Negligible
Habitat effects: Negligible
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 307
Social Effects
In 2014 there were 32 authorisation holders in this fishery with around 11 licences recording consistent activity, the number of people employed regularly in the fishery (licensees plus crew/ dive buddies) is likely to be around 19. There were also around 8 people (licensees plus crew/dive buddies) that operated occasionally in this fishery. With many of the licences there might be the additional employment of people to prepare the shells for collection, pack and distribute the shells and also, some licensees might have shop fronts, therefore, employing shop assistants. The number employed in this area is unknown.
Economic Effects
Estimated annual value (to fishers) for 2014:
Not assessed
Fishery Governance
Target catch range: 10,000 – 25,000 shells
A preliminary performance measure has been developed of a total annual catch range from 10,000 to 25,000 shells, which encompasses the range of catches taken from 2000 to 2003. This performance measure has been developed to ensure that a<cursor_is_here> If it is triggered, this may not necessarily indicate any problem with the stocks, but rather fluctuations in the natural environment or market dynamics. Catch in 2014 was above the range, due principally to increased activity of one licence holder.
New management initiatives (2015/16)
The Specimen Shell Managed Fishery is currently under review with changes to the management arrangements expected to be introduced in 2016. Among the changes under consideration is to consolidate existing management arrangements for the fishery into a new Management Plan that will provide for additional permitted methods of collection in the Fishery such as remotely operated underwater vehicles.
Hermit Crab Fishery Report: Statistics Only
S.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green
Fishery Description
Commercial
The Hermit Crab Fishery (HCF) specifically targets the Australian land hermit crab (Coenobita variabilis) for the domestic and international live pet trade. The fishery operates throughout the year and is the only land-based commercial fishery in Western Australia.
Collectors use four-wheel drive vehicles to access remote beaches predominantly in the states north. Collection usually occurs on foot and at night when hermit crabs are most active.
Recreational
There is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to a recreational daily bag limit of 10 (for "unlisted" crustaceans).
Boundaries
The HCF is currently permitted to fish Western Australian waters (as defined in Section 5, Part 1 FRMA 1994) north of Exmouth Gulf (22 o 30'S).
Management arrangements
behalf) listed in the Instrument of Exemption enabling the take of land hermit crabs (C. variabilis) by hand collection only.
The Fishery has been managed by way of an exemption authorisation since 2008. Prior to 2008 the fishery was managed by CFL conditions.
Landings and Effort
Data for assessing the status of the HCF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.
A total of 77,675 hermit crabs were landed in 2014. The reported landings of hermit crabs for 2014 were lower than those reported in 2013 (88,443), 2012 (90,364) and in 2010 (105,774) and 2009 (110,250), but were at level similar to that reported in 2011 (75,667; see Hermit Crab Fishery Table 1).
In 2014, 3 of the 5 collectors reported some level of activity in this fishery. Effort in the fishery is variable and does not appear related to catch. A total of 219 effort days were reported in the HCF in 2014. Effort in the fishery is spread over large areas along the Western Australian coastline.
This fishery is managed primarily through input controls in the form of limited entry to the fishery, nominated operators, species restrictions, gear restrictions and permanent closed areas. Access to the fishery is limited to the 5 Commercial Fishing Licence (CFL) holders (or persons acting on their
Hermit crabs are collected for a live market, licencees are restricted in terms of the quantities that they can safely handle and transport.
Land hermit crabs inhabit dead mollusc shells which have no attached biota. There is no bycatch associated with this fishery.
There are no reported listed species interactions for this fishery. The HCF is highly selective and land based. It is highly unlikely that this fishery has any interactions with endangered, threatened or protected species (ETPs). The main opportunity for interaction maybe through four-wheel drive vehicles on beaches and whilst walking to collect the crabs, however, if ETPs are sighted they can be easily avoided. The potential for ETP interactions is further limited due to the low fishing effort and restricted areas of collection.
Fishery Governance
Target commercial catch range:
Not Applicable
Current Fishing (or Effort) Level: Acceptable
The current effort level in the fishery has been relatively constant over the last 4 years and the operating extent of the fishery is low relative to the widespread distribution of the target species. There is limited potential for any impact on the breeding stock. Therefore the current level of fishing activity is considered acceptable.
New management initiatives (2015/16)
The Department of Fisheries is currently reviewing the management of the Western Australian Hermit Crab fishery with a view to transitioning the fishery to Interim Managed Fishery status through the drafting of a (Interim) Fishery Management Plan.
The development of the (Interim) Management Plan will be in accordance with Part 6 of the FRMA 1994. Management arrangements under the management plan will be consistent with, and guided by stock assessment data in accordance with Ecosystem Based Fisheries Management requirements, Commonwealth Wildlife Trade Operation export accreditation requirements, Ecological Risk Assessment outcomes, and minimum effective regulation principles.
HERMIT CRAB FISHERY TABLE 1
Summary of the reported catch of Hermit Crabs landed from the Hermit Crab Fishery for 2014, with catch for the previous six years.
STATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 309
There is currently no Wildlife Trade Operation (WTO) approval for the whole fishery under the provisions of the EPBC Act (Department of the Environment (DotE)). However, one operator has received WTO approval to export land hermit crabs. This WTO is in force until November 2015 and is subject to conditions. The primary condition is the export limitation of C. variabilis under the EPBC Act is not to exceed 10,000 specimens per year.
External factors
Terrestrial hermit crabs such as C. variabilis have large gill chambers which are kept moist acting as a type of lung. This facilitates their terrestrial life stage, however females must move to the ocean to release eggs which hatch as planktonic larvae. Larvae settle as small juveniles, find a tiny shell and move onshore.
In order for C. variabilis individuals to grow, they must exchange their shell for a larger sized one. There is frequently strong competition for any available shells, with C. variabilis individuals fighting over shells as intact gastropod shells are not an unlimited resource. The availability of empty shells is dependent not only on the abundance of C. variabilis and the gastropods whose shells they seek, but importantly on the occurrence of predators that prey on gastropods yet leave the shells intact.
C. variabilis is endemic to northern Australia including northern Western Australia, the Northern Territory and northern Queensland. Given the warming climate of Australia and the moving of moist air southwards, the distribution of this species may extend further south in future years.
</text>
|
[
{
"content": "<url>\nhttps://www.fish.wa.gov.au/Documents/sofar/status_reports_of_the_fisheries_2014-15_statewide.pdf\n</url>\n<text>\nSTATEWIDE\n\nECOSYSTEM BASED FISHERIES MANAGEMENT\n\nIdentification of Statewide Ecological Assets using the EBFM framework\n\nWhile the bioregional scale of management has been adopted by the Department through the implementation of an Ecosystem Based Fisheries Management (EBFM) framework (see How to Use section for more details), due to their life histories or broader impacts, a small number of ecological assets cannot realistically be managed at a single bioregional level but need to be considered at either a statewide or at a multiple bioregional level.\n\nRisk Assessment of Statewide Ecological Assets and External Drivers\n\nThe EBFM process identifies the ecological assets in a hierarchical manner such that the assets outlined in Statewide Ecosystem Management Figure 1 are often made up of individual components at species or stock level. The risks to each of the individual stock or lower level components are mostly detailed in the individual fishery reports presented in this document. The following table (Statewide Ecosystem Management Table 1) provides an overview and cumulative assessment of the current risks to those ecological assets that function at a Statewide level and provides a mechanism for reporting on their status and the fisheries management arrangements that are being applied. These level risks are now used by the Department as a key input into the Department's Risk Register which, combined with an assessment of the economic and social values and risks associated with these assets, is integral for use in the annual planning cycle for assigning priorities for activities across all Divisions for Statewide issues.\n\nSummary of Monitoring and Assessment of Statewide Assets\n\nThe Department is working closely with the Commonwealth Government and other jurisdictions to develop and implement the National System for the Prevention and Management of Marine Pest Incursions that will minimise the biosecurity risks associated with increased shipping in all parts of the State. Within WA, this is currently being achieved through the Fish Resources Management Act 1994 and the Biosecurity and Agriculture Management Act 2007. Work has also been undertaken to develop monitoring designs for introduced marine species for the high risk ports in WA. These designs have been approved by the Invasive Marine Pests Program within DAFF (Department of Agriculture, Fisheries and Forestry). This work contributes toward the management of introduced aquatic organism incursions and fish kill incident response programs already in place.\n\nThe Department of Fisheries' Research Division's Biodiversity and Biosecurity Branch works collaboratively with the Department of Parks and Wildlife (DPaW) in monitoring the condition of the state's fish resources within Marine Parks across the State. Development of Collaborative Operational Plans between the Department and DPaW ensure efficient and cost effective delivery of research and monitoring activities where jurisdictions overlap. The Department's risk based approach to research and monitoring (under its EBFM framework) in conjunction with marine park management plans drives research and monitoring activities within marine parks.\n\nSTATEWIDE ECOSYSTEM MANAGEMENT TABLE 1 - RISK LEVELS FOR EACH ASSET.\n\nLow and Medium values are both considered to be acceptable levels of risk. High and Significant risks indicate that the asset is no longer in a condition that is considered appropriate and additional management actions are required.\n\nCaptured fish species\n\nExternal Drivers (NON FISHING)\n\nSouth West Sharks\nNorth West Sharks\nAquarium Fish\nSpecimen Shells\nCaptured Species\nClimate\nIntroduced Diseases/Pests\nExternal Drivers\nStatewide\nEcological Resources/Assets\n\nSTATEWIDE ECOSYSTEM MANAGEMENT FIGURE 1\n\nComponent tree showing the Statewide ecological assets and external drivers identified and separately assessed.\n\nFISHERIES\n\nMarine Aquarium Fish Managed Fishery Report: Statistics Only\n\nS.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green\n\nFishery Description\n\nCommercial\n\nThe Marine Aquarium Fish Managed Fishery (MAFMF) has the capacity to target more than 950 species of marine aquarium fish under the Marine Aquarium Fish Management Plan 1995 (this includes sharks and rays (Chondrichthyes), syngnathids, moral eels, and higher taxonomic groups at the Order, Family or Genus level in cases where the species cannot be specifically identified and also includes unquantified aquarium species). However, the number of marine aquarium fish species targeted and/or landed by the fishery varies from year to year (e.g. in the period from 2005 to 2014 the number of marine aquarium fish species landed ranged from 183 to 288; 170 marine aquarium fish species were recorded in 2014). Operators in the MAFMF are also permitted to take coral, live rock, algae, seagrass and invertebrates under the Prohibition on Fishing (Coral, 'Live Rock' and Algae) Order 2007 and by way of Ministerial Exemption. In 2014, a total of over 321 species or species groups were reported in the landed catch of the MAFMF. The reported catch includes groups that were reported at the level of Order, Family, Genus or species. The MAFMF is primarily a dive-based fishery that uses hand-held nets to capture the desired target species. While the MAFMF operates throughout all Western Australian waters, catches are relatively low in volume due to the special handling requirements of live fish. Fishing operations are also heavily\n\nSTATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 301\n\nweather-dependent due to the small vessels used and the potentially hazardous conditions (e.g. waves, swell) encountered. In addition, human constraints (i.e. physiological effects of decompression) limit the amount of effort exerted in the fishery, the depth of water and the offshore extent where collections can occur.\n\nRecreational\n\nThere is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to normal recreational bag limits and, for some species, size limits. There is a complete ban on the recreational take of coral, live rock and listed fish such as leafy and weedy seadragons.\n\nBoundaries\n\nThe MAFMF operates in Western Australia's state waters spanning the coastline from the Northern Territory border in the north to the South Australian border in the south. The effort is spread over a total gazetted area of 20,781 km 2 . During the past three years the fishery has been active in waters from Esperance to Broome with popular areas being around the Capes region, Perth, Geraldton, Exmouth and Dampier.\n\nManagement arrangements\n\nThis fishery is managed primarily through input controls in the form of limited entry to the fishery and permanent closed areas. There are 12 licences in the fishery; however, only six licences are permitted to take all hard corals and most soft corals (all 12 licences are permitted to take coral like anemone groups such as corallimorphs and zoanthids in the Class Anthozoa). In 2014, 10 licences operated in the fishery.\n\nLicensees are not permitted to operate within any waters closed to fishing (e.g. Rowley Shoals, Reef Protected Areas, sanctuary zones). The fishery is permitted to operate in general-purpose zones of marine parks for the collection of fish and some invertebrates (usually excluding coral and live rock). Fishing is also prohibited on Cleaverville Reef in order to exclude the take of coral and associated organisms.\n\nFish caught in this fishery may not be used for food purposes, and operators are not permitted to take non-finfish species covered by other specific commercial management arrangements or management plans.\n\nThe MAFMF is permitted to take most species from the Syngnathid family (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999. However, there is a total ban on the take of leafy seadragons (Phycodurus eques). There is currently an upper limit of 2,000 individual syngnathids across the State, if this limit is exceeded, a review will be initiated, and the results used to determine whether further management action is required.\n\nLandings and Effort\n\nData for assessing the status of the MAFMF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.\n\nA total of 20,052 fish (excluding syngnathids) were landed in 2014. Collectors in this ornamental fishery can earn a high return from the capture of very small quantities of individuals. Therefore, the catches are small in comparison to the more common, food-fish fisheries. Fishers report the level of catch as either - kg, numbers or litres depending upon the species or species group involved (Marine Aquarium Fish Table 1). The reported landings of aquarium fish for 2014 was higher than that reported in 2013 (19,302), but lower than that reported in 2012 (22,780). The level of catch of aquarium fish reported over the last 5 years is all somewhat similar.\n\nThe main fish (excluding syngnathids) species landed in 2014 were damselfish of the Chromis genus and the Neopomacentrus genus, followed by the spotted blenny (Istiblennius meleagris) and the scribbled angelfish (Chaetodontoplus duboulayi) (Marine Aquarium Fish Table 2). Likewise, the main coral species landed in 2014 were the coral like anemones of the Corallimorphus genus (Marine Aquarium Fish Table 3). The numbers of fish species and the weight of coral species landed vary from year to year depending on market demand.\n\nThe syngnathid catch was low and stable between 2009 and 2010 (i.e. 340 and 338 respectively). The syngnathid catches in 2011 (1,138), 2012 (1,232) and 2013 (1,635) were higher in comparison and were similar to the catch levels reported in 2008 (1,218). In 2014, the syngnathid catch was again low, similar to the 2009-2010 level (359 individuals).\n\nIn 2014, 10 licences reported some level of activity (effort). Effort in the fishery has decreased from 981 fishing days (2007) to 479 fishing days in 2014. Effort in the fishery is concentrated in a number of discrete areas adjacent to the limited number of boat landing sites along the Western Australian coastline.\n\nGiven that the specimens are collected for a live market, licences are restricted in terms of the quantities that they can safely handle and transport (for example, by boat to shore, by vehicle to the holding facility and then on to the retailer) without impacting on the quality of the product. The size of the holding facility and access to regular freight and infrastructure services (such as airports, particularly in the remote northern locations of Western Australia) restricts the levels of effort that can be expended in the fishery at any given time.\n\nThere were no reported listed species interactions for the fishery in 2014.\n\nThe performance measures for the fishery relate to the catch of the syngnathids. The MAFMF is permitted to take species from the Family Syngnathidae (seahorses and pipefish), which are listed under the Environment Protection and Biodiversity Conservation Act 1999, from state waters only (within 3nm). In 2014, the catch of syngnathids from all species and areas was 359, well below the target commercial catch range level of 2,000 individuals per year. The catch level of syngnathids has decreased from that reported in 2013 (1,635), 2012 (1,232) and 2011 (1,138). Note, that there is a prohibition on the take of leafy seadragons (Phycodurus eques) in the MAFMF.\n\nFishery Governance\n\nTarget commercial catch range:\n\n2000 Syngnathids\n\nCurrent Fishing (or Effort) Level: Acceptable\n\nThe current effort level in the fishery is relatively constant from year to year and the operating extent of the fishery is very low relative to the widespread distribution of the numerous species targeted. No other fisheries exploit these species and therefore there is extremely limited potential for any impact on breeding stocks. Therefore the current level of fishing activity is considered acceptable.\n\nNew management initiatives (2015/16)\n\nThe MAFMF is currently under review with changes to the management arrangements expected to be introduced in 2015. Among the changes under consideration is to consolidate existing legislative instruments for the fishery into a new Management Plan that will provide for the take of finfish, invertebrates, hard and soft coral, live rock, algae and seagrass.\n\nIn December 2012 an application for reassessment of the MAFMF as ecologically sustainable under the provisions of the EPBC Act 1999 was submitted to the Department of the Environment (DotE), the then Department of Sustainability, Environment, Water, Population and Communities. This application was successful and Wildlife Trade Operation (WTO) approval was granted till December 2013. In November 2013 a subsequent application was submitted to DotE for further WTO approval, this application was successful and WTO approval was granted till October 2016.\n\nThe MAFMF is scheduled to undergo MSC pre-assessment in 2015.\n\nMARINE AQUARIUM FISH TABLE 1\n\nSummary of the reported catch landed from the Marine Aquarium Fish Managed Fishery and associated endorsements in 2014 (Note: the catch of hermit crabs is now reported in the Hermit Crab Fishery Status Report).\n\n1 The soft coral category includes 2,765 kg of coral like anemone groups such as corallimorphs and zoanthids in the Class anthozoa. These are harvested under an invertebrate Ministerial Exemption and are not part of the annual coral TAC.\n\nSTATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 303\n\nMARINE AQUARIUM FISH TABLE 2\n\nSummary of the reported catch (number of individuals) of the main fish (excluding Syngnathids) species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years. Note the species reported in this table vary from year to year.\n\nMARINE AQUARIUM FISH TABLE 3\n\nSummary of the reported catch (kg) of the main coral species landed from the Marine Aquarium Fish Managed Fishery for 2014, with catch for the previous six years.\n\nSTATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 305\n\nSpecimen Shell Managed Fishery Status Report\n\nA. Hart, K. Crowe\n\nFishery Description\n\nThe Specimen Shell Managed Fishery (SSMF) is based on the collection of individual shells for the purposes of display, collection, cataloguing, classification and sale.\n\nJust over 200 (218) different Specimen Shell species were collected in 2014, using a variety of methods. The main methods are by hand by a small group of divers operating from small boats in shallow coastal waters or by wading along coastal beaches below the high water mark. A current exemption method being employed by the fishery is using a remote controlled underwater vehicle at depths between 60 and 300 m and a new exemption method using baited habitat structures at depths is being trialled. While the fishery covers the entire Western Australian coastline, there is some concentration of effort in areas adjacent to population centres such as Broome, Karratha, Shark Bay, metropolitan Perth, Mandurah, the Capes area and Albany.\n\nGoverning legislation/fishing authority\n\nSpecimen Shell Management Plan 1995\n\nSpecimen Shell Managed Fishery Licence\n\nCommonwealth Government Environment Protection and Biodiversity Conservation Act 1999 (Export Exemption)\n\nConsultation process\n\nThe Department undertakes consultation directly with licensees on operational issues. Industry Annual General Meetings are convened by the Western Australian Fishing Industry Council (WAFIC), who are also responsible for statutory management plan consultation under a Service Level Agreement with the Department.\n\nBoundaries\n\nThe fishing area includes all Western Australian waters between the high water mark and the 200 m isobath.\n\nManagement arrangements\n\nThis is a limited entry fishery with 32 licences in the fishery, with 18 of the licences being active. Furthermore, a maximum of 2 divers are allowed in the water per licence at any one time and specimens may only be collected by hand.\n\nThere are a number of closed areas where the SSMF is not permitted to operate. This includes within various marine parks and aquatic reserves and other closed waters such as Reef Observation Areas and Fish Habitat Protection Areas. Much of the west side of North-West Cape and the Ningaloo Marine Park are prohibited areas for the fishery. The exclusion of Marmion Marine Park in the Perth metropolitan area is also important because of its populations of 2 rare cowrie species.\n\nThe SSMF is not permitted to take any mollusc species for which separate management arrangements exist – such as abalone, mussels, scallops and pearl oysters.\n\nA comprehensive Ecologically Sustainable Development assessment of this fishery has been undertaken to identify any potential sustainability risks requiring direct management. The only issue identified through this process related to the breeding stock levels of specimen shell species. Boxed text in this status report provides the annual assessment of performance for this issue.\n\nSome minor-scale collection of dead shells is also undertaken above the high water mark by collectors operating under the authority of a commercial fishing licence, mainly for sale into the souvenir, pet supply and hobby craft markets. However, this activity does not form part of the Specimen Shell Managed Fishery.\n\nResearch summary\n\nCurrent fishery-dependent data collection systems monitor the catch (species-specific), effort and catch rates for the fishery. Fishers within the SSMF provide monthly returns under the statutory catch and effort system (CAES). These returns contain information on catch (species, numbers and spatial area), and days and hours fished by method by month and year.\n\nThis fishery is managed through input controls in the form of limited entry, gear restrictions and permanent closed areas. The primary controls in the fishery are operational limitations – depth, time and tide.\n\nA new specific Specimen Shell logbook was formally introduced in August 2013 (which built on the logbook being trialled in the fishery) to aid the reporting of the number sighted and number taken alive and/or dead of the 8 mollusc species identified as potentially 'vulnerable' and the reporting of the finer spatial scale, 10 x 10 nautical mile (nm) grid blocks.\n\nThis data is used as the basis to provide research advice for fisheries management.\n\nRetained Species\n\nCommercial landings (season 2014): 31,371 shells\n\nRecreational catch estimate (season 2014):\n\nUnknown\n\nCommercial Landings\n\nIn 2014, the total number of specimen shells collected was 31,371 distributed over a wide range of species. This is based on 100% of submitted catch returns. In the past 5 years, more than 487 separate species of molluscs have been collected, with an average of more than 200 species per year – the majority in low numbers.\n\nThere is some focus of effort on mollusc families most popular with shell collectors, such as cowries, cones, murexes and volutes. Cypraeidae or cowries are noted for their localised variations in both shape and colour, making them attractive to collectors.\n\nFishing effort/access level\n\nAlthough there are 32 licences in the fishery, about 11 of these are regularly active. Effort in 2014 was 644 days, a decrease from 745 days in 2013. Over the past 5 years, there was an average of around 800 days fished.\n\nRecreational component: Not assessed\n\nShell collecting is a popular recreational pastime, and members of the public are permitted to collect shells for their private collections. The recreational catch, while unknown, is considered to be declining, as evidenced by declining membership in shell collecting associations.\n\nStock Assessment\n\nAssessment complete: Yes\n\nBreeding stock levels: Adequate\n\nDuring the 2014 season the catch rate was approximately 49 shells per day.\n\nPonder and Grayson (1998) examined the specimen shell industry on a nationwide basis, rating vulnerability to overexploitation on the basis of species biology, accessibility to collection, and rarity. Species collected in Western Australia which were identified by Ponder and Grayson as potentially vulnerable comprised of 6 cowries (Cypraea (Austrocypraea) reevei, Cypraea (Zoila) friendii vercoi, Cypraea (Zoila) marginata (albanyensis), Cypraea (Zoila) marginata (consueta), Cypraea (Zoila) rosselli and Cypraea (Zoila) venusta) and 2 volutes (Amoria damoni (keatsiana) and Amoria damoni (reevei)).\n\nsighted is reported correctly in about 98 % of the cases where one of the vulnerable species is reported. It is anticipated that current sightings are an under estimate of the available populations.\n\nThis improvement in reporting of the vulnerable (indicator) species, in terms of species identification and the number sighted and number taken alive and/or dead can be contributed to the new return form.\n\nThe reporting of catch and effort on the finer spatial scale of 10 x 10 nm blocks from August 2004 is also providing more accurate information on the distribution of certain species. Again, the 2014 season has seen ll licensees report the smaller spatial resolution grid blocks rather than reporting the 60 x 60 nm blocks..\n\nAll species collected in Western Australia, including the 8 indicator species, occur over wide geographic ranges (hundreds or thousands of kilometres) and wide depth ranges (up to 200 m) where a substantial portion of the population cannot for logistical and safety reasons be collected. However, with the introduction of the remote controlled underwater vehicles these depth restrictions are starting to be overcome.\n\nEven in shallow waters, many localities cannot be fished because of the lack of access to the beach and the small boats used, and collecting is prohibited in many of the more easily reached areas which are now in marine parks and reserves. Additional protection is afforded by the fact that collectors will ignore any specimens with slight visual imperfections, but their reproductive potential in the population remains undiminished. In summary, it is considered that the fishery has very little likelihood of having an unacceptable impact on breeding stocks.\n\nThe performance measures for the fishery relate to the maintenance of breeding stocks, as indicated by catch levels and catch rates. In 2014, the catch level of approximately 31,300 shells is above the range set , i.e. 10,000 – 25,000 shells and the catch rate of 49 shells/day was also above the range set., i.e. 10 – 40 shells/day.\n\nNon-Retained Species\n\nBycatch species impact: Negligible\n\nThere is no bycatch in this fishery owing to the highly selective fishing methods.\n\nListed species interaction: Negligible\n\nThe fishery reported no interactions with listed species during 2014. Reports of interactions with listed species are required to be recorded on monthly catch and effort returns.\n\nEcosystem Effects\n\n'Shell sighting' is a new abundance category. It is a measure of the population of vulnerable shells that is observed but not taken, and provides evidence for the breeding stock being conserved each year. Of the 8 vulnerable species an overall average of approximately 47 % of the shells sighted were not harvested in 2014. The measure of the number of shells\n\nFood chain effects: Negligible\n\nHabitat effects: Negligible\n\nSTATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 307\n\nSocial Effects\n\nIn 2014 there were 32 authorisation holders in this fishery with around 11 licences recording consistent activity, the number of people employed regularly in the fishery (licensees plus crew/ dive buddies) is likely to be around 19. There were also around 8 people (licensees plus crew/dive buddies) that operated occasionally in this fishery. With many of the licences there might be the additional employment of people to prepare the shells for collection, pack and distribute the shells and also, some licensees might have shop fronts, therefore, employing shop assistants. The number employed in this area is unknown.\n\nEconomic Effects\n\nEstimated annual value (to fishers) for 2014:\n\nNot assessed\n\nFishery Governance\n\nTarget catch range: 10,000 – 25,000 shells\n\nA preliminary performance measure has been developed of a total annual catch range from 10,000 to 25,000 shells, which encompasses the range of catches taken from 2000 to 2003. This performance measure has been developed to ensure that a<cursor_is_here> If it is triggered, this may not necessarily indicate any problem with the stocks, but rather fluctuations in the natural environment or market dynamics. Catch in 2014 was above the range, due principally to increased activity of one licence holder.\n\nNew management initiatives (2015/16)\n\nThe Specimen Shell Managed Fishery is currently under review with changes to the management arrangements expected to be introduced in 2016. Among the changes under consideration is to consolidate existing management arrangements for the fishery into a new Management Plan that will provide for additional permitted methods of collection in the Fishery such as remotely operated underwater vehicles.\n\nHermit Crab Fishery Report: Statistics Only\n\nS.J. Newman, K. Crowe, C. Bruce, C. Syers and K. Green\n\nFishery Description\n\nCommercial\n\nThe Hermit Crab Fishery (HCF) specifically targets the Australian land hermit crab (Coenobita variabilis) for the domestic and international live pet trade. The fishery operates throughout the year and is the only land-based commercial fishery in Western Australia.\n\nCollectors use four-wheel drive vehicles to access remote beaches predominantly in the states north. Collection usually occurs on foot and at night when hermit crabs are most active.\n\nRecreational\n\nThere is no documented recreational fishery. If members of the public wish to collect specimens for their own private aquariums they are permitted to do so, but are restricted to a recreational daily bag limit of 10 (for \"unlisted\" crustaceans).\n\nBoundaries\n\nThe HCF is currently permitted to fish Western Australian waters (as defined in Section 5, Part 1 FRMA 1994) north of Exmouth Gulf (22 o 30'S).\n\nManagement arrangements\n\nbehalf) listed in the Instrument of Exemption enabling the take of land hermit crabs (C. variabilis) by hand collection only.\n\nThe Fishery has been managed by way of an exemption authorisation since 2008. Prior to 2008 the fishery was managed by CFL conditions.\n\nLandings and Effort\n\nData for assessing the status of the HCF are derived from the catch and effort returns provided by industry. These data are compiled annually and used as the basis for this assessment.\n\nA total of 77,675 hermit crabs were landed in 2014. The reported landings of hermit crabs for 2014 were lower than those reported in 2013 (88,443), 2012 (90,364) and in 2010 (105,774) and 2009 (110,250), but were at level similar to that reported in 2011 (75,667; see Hermit Crab Fishery Table 1).\n\nIn 2014, 3 of the 5 collectors reported some level of activity in this fishery. Effort in the fishery is variable and does not appear related to catch. A total of 219 effort days were reported in the HCF in 2014. Effort in the fishery is spread over large areas along the Western Australian coastline.\n\nThis fishery is managed primarily through input controls in the form of limited entry to the fishery, nominated operators, species restrictions, gear restrictions and permanent closed areas. Access to the fishery is limited to the 5 Commercial Fishing Licence (CFL) holders (or persons acting on their\n\nHermit crabs are collected for a live market, licencees are restricted in terms of the quantities that they can safely handle and transport.\n\nLand hermit crabs inhabit dead mollusc shells which have no attached biota. There is no bycatch associated with this fishery.\n\nThere are no reported listed species interactions for this fishery. The HCF is highly selective and land based. It is highly unlikely that this fishery has any interactions with endangered, threatened or protected species (ETPs). The main opportunity for interaction maybe through four-wheel drive vehicles on beaches and whilst walking to collect the crabs, however, if ETPs are sighted they can be easily avoided. The potential for ETP interactions is further limited due to the low fishing effort and restricted areas of collection.\n\nFishery Governance\n\nTarget commercial catch range:\n\nNot Applicable\n\nCurrent Fishing (or Effort) Level: Acceptable\n\nThe current effort level in the fishery has been relatively constant over the last 4 years and the operating extent of the fishery is low relative to the widespread distribution of the target species. There is limited potential for any impact on the breeding stock. Therefore the current level of fishing activity is considered acceptable.\n\nNew management initiatives (2015/16)\n\nThe Department of Fisheries is currently reviewing the management of the Western Australian Hermit Crab fishery with a view to transitioning the fishery to Interim Managed Fishery status through the drafting of a (Interim) Fishery Management Plan.\n\nThe development of the (Interim) Management Plan will be in accordance with Part 6 of the FRMA 1994. Management arrangements under the management plan will be consistent with, and guided by stock assessment data in accordance with Ecosystem Based Fisheries Management requirements, Commonwealth Wildlife Trade Operation export accreditation requirements, Ecological Risk Assessment outcomes, and minimum effective regulation principles.\n\nHERMIT CRAB FISHERY TABLE 1\n\nSummary of the reported catch of Hermit Crabs landed from the Hermit Crab Fishery for 2014, with catch for the previous six years.\n\nSTATUS REPORTS OF THE FISHERIES AND AQUATIC RESOURCES OF WESTERN AUSTRALIA 2014/15 309\n\nThere is currently no Wildlife Trade Operation (WTO) approval for the whole fishery under the provisions of the EPBC Act (Department of the Environment (DotE)). However, one operator has received WTO approval to export land hermit crabs. This WTO is in force until November 2015 and is subject to conditions. The primary condition is the export limitation of C. variabilis under the EPBC Act is not to exceed 10,000 specimens per year.\n\nExternal factors\n\nTerrestrial hermit crabs such as C. variabilis have large gill chambers which are kept moist acting as a type of lung. This facilitates their terrestrial life stage, however females must move to the ocean to release eggs which hatch as planktonic larvae. Larvae settle as small juveniles, find a tiny shell and move onshore.\n\nIn order for C. variabilis individuals to grow, they must exchange their shell for a larger sized one. There is frequently strong competition for any available shells, with C. variabilis individuals fighting over shells as intact gastropod shells are not an unlimited resource. The availability of empty shells is dependent not only on the abundance of C. variabilis and the gastropods whose shells they seek, but importantly on the occurrence of predators that prey on gastropods yet leave the shells intact.\n\nC. variabilis is endemic to northern Australia including northern Western Australia, the Northern Territory and northern Queensland. Given the warming climate of Australia and the moving of moist air southwards, the distribution of this species may extend further south in future years.\n</text>\n",
"role": "user"
},
{
"content": "ny major change in the patterns of fishing is noticed and investigated.",
"role": "assistant"
}
] |
PRESIDENT
Wes Schmidt 480-299-0153
VICE-PRESIDENT
Dean Becraft
SECRETARY/GRAPESHOT
Karen Becraft 480-991-2668
TREASURER
Charles Madigan
PROGRAM CHAIRMAN
Mack Stanley 480-272-8207
BOARD MEMBERS (thru 5/2012)
Mack Stanley, John Bamberl
Duff McGovern
BOARD MEMBERS (thru 5/2011)
Jay Webber, Don Swanson, Henry Potosky
COMMITTEES...
MEMBERSHIP: John Bamberl
EDITORIAL: Don Swanson
BOOK TABLE: Henry Potosky
WEBMASTER: Jay Webber
HISTORICAL:
Mary Anne Hammond
PUBLIC RELATIONS: available and in need of a volunteer
WEBSITE: scottsdalecwrt.vze.com
.Meets @ Civic Center Library 3839 N Drinkwater Blvd Scottsdale .on the 3rd Tuesday of the month 6:45 PM—8:45 PM .September thru May .$35 Annual Dues (individual) .$45 Annual Dues (family) .Everyone Welcome
THE GRAPESHOT
FRANK O'REILLY
presents-
The Liberty Hall Volunteers: Stonewall Jackson's College Boys
April 19, 2011 Tuesday 6:45 PM Civic Center Library
Graduating from Washington and Lee University, Frank A. O'Reilly first worked for the Stonewall Jackson House in Lexington, Va. Joining the National Park Service in 1987 as a temporary historian at the Fredericksburg & Spotsylvania National Military Park, he later took a position at Independence Hall in Philadelphia, returning to Fredericksburg in 1990 as historian at the Stonewall Jackson Shrine. Mr. O'Reilly has also served as historical consultant for the City of Fredericksburg and the Shenandoah Valley Battlefield Planning Commission. He is the author of several articles on the war in Virginia, and of the book, The Fredericksburg Campaign: Winter War on the Rappahannock, which won the Capital District Book Award in 2002. He continues to conduct extensive battlefield studies and tours throughout Virginia, many for the National Park Service. One week after his visit here, Mr. O'Reilly will be the speaker at the American Civil War Round Table of the United Kingdom, in Oxford, England.
FROM WES‟ DEN…....All of us understand that the Civil War‟s 150th anniversary begins April 12th, when Fort Sumter is attacked in Charleston, SC. All CSA secession events have been celebrated with dinners, dances and re-enactments. Mississippi seceded on January 9, 1861. Four days later Mississippi artillery stared firing on all northern shipping trying to pass Vicksburg. I was actually shocked to learn that last month. Were these the first shots of the Civil War? The re-enactment was a big success as the riverboat Tyler steamed by in a cloud of smoke. The Vicksburg River Battery was well prepared. For the next four years events will be happening every month. Try and catch a few.
I want you to know that We/SCWRT received a heartfelt letter of thanks from the Civil War Trust, formerly the CW Preservation Trust, President Jim Lighthizer, to let one of "our strongest supporters know how much they mean to us". You are entitled to this commendation by your support of this Round Table. For the third consecutive year we have sent them over $2500! They, as good stewards, have now acquired 30,000 acres of battlefields. That is 47 square miles, in 20 states. It is estimated that 20% of Civil War battlefields are totally destroyed and only 15% are protected as National Parks. Only one national organization is working to save our battlefield heritage and that is the Civil War Trust. Please sustain this effort. Dues turned in anytime now will cover you thru June 1, 2012. It will even save us sending you a bill. I remain your most obedient servant..........Wes Schmidt
"FIX BAYONETS"
by
Tom Lannon SCWRT member
In his study of combat On Killing author Dave Grossman discusses the instinctive reluctance of human beings to kill at close range, particularly with edged weapons. Killing at a distance, any distance, with a firearm in much easier than the intimacy of killing with a knife or bayonet. Even in those fights involving hand to hand engagements most soldiers preferred to use their rifles to slash or club the enemy rather than actually stab their opponents with the bayonet. In fact there are studies that indicate it was actually more dangerous to break contact with the enemy and turn to flee than it was to stand face to face and continue to fight. It was easier psychologically for the troops to shoot or stab retreating soldiers as they no longer had to observe their facial expressions when they received the blow.
But the lack of documented bayonet wounds among the casualties after a battle does not necessarily translate into the bayonet being an ineffective instrument of war or a weapon without tactical value.
On July 2, 1863 Colonel Joshua Chamberlain and men of the 20 th Maine were assigned a position at the extreme left flank of Federal forces on the hill called Little Round Top during the battle of Gettysburg. Chamberlain‟s orders were to hold that position at all costs, for if the Confederates could get to the top of the hill and overwhelm Chamberlain‟s men, they would be able to rake flanking fire down the entire line of Northern defenders. Chamberlain and his men repulsed two charges by the enemy until at last, depleted of sufficient ammunition to repel the next charge the enemy was about to send, he gave the order to "Fix bayonets" and sent the 20 th Maine down the hill to the startled Confederates who broke and ran in retreat. The left flank of Little Round Top was, at least temporarily, secure.
But how often did a bayonet charge actually occur in Civil War engagements? Opinions on this vary and the argument has endured over the years.
In The Bloody Crucible of Courage historian Brent Nosworthy makes a distinction between bayonet fighting and a bayonet charge. He argues that although the bayonet was used with comparative rarity to inflict casualties, military tacticians recognized the value of a bayonet charge. In a bayonet charge the goal is a tactical victory, such a turning a line or moving the enemy from the field as opposed to his destruction. The bayonet charge was an action that united the men in formation and gave a boost to morale in the sense that it gave them a defined, unified physical action that helped maintain cohesiveness of the lines. And such a coordinated movement toward the enemy, if done with obvious resolve, was equally effective in demoralizing the soldiers on the receiving end of the charge as the phalanx of shining blades got increasingly, and more terrifyingly, closer. Nosworthy maintains the effectiveness of the bayonet was in the psychological realm rather than as a weapon of physical destruction.
Similar conclusions are offered by Paddy Griffith in Battle Tactics of the Civil War. He contrasts different tactics of large unit combat describing them as the „engineer‟ theory as opposed to the „infantry" solution to defeating the enemy. The former relied on static positions behind fortifications such as earthworks and firing away at the approaching enemy, who often would go to ground as they found themselves within range of the bullets of the protected defenders. Engagements turned into stationary lines
Some historians examining the records have dismissed the bayonet as an ineffective weapon during the conflict. After the Battle of Gaines‟s Mills stories were told in the Confederate camps of the extensive hand to hand fighting in the engagement, much of it with bayonets. Heros Von Borcke, a Confederate cavalry officer, toured the site the next day and reported only three or four bayonet wounds among the numerous dead still on the field. And those wounds appeared to have been subsequent to the victims having already been shot. Other sources of doubt come from the medical records kept by surgeons who served in the war. After the Battle of Lookout Mountain the medical director for the Army of the Cumberland reported finding no bayonet wounds among the casualties, despite the close quarter nature of the fighting. And a doctor for the Army of the Potomac assembled a more organized record of that army‟s casualties from May to July of 1864 and found bayonet wounds accounted for less than one half of one percent of the injuries. Some think the bayonet was an archaic and ineffectual weapon in the age of rifled muskets and cannon. There is also skepticism about the average soldier‟s ability to thrust a bayonet into an enemy even in the heat of hand to hand fighting.
shooting at one another until either one side was sufficiently reduced in number or the troops of either side ran low on ammunition and were forced to retire. In contrast the „infantry‟ theory relied on fluidity of movement and taking action as appropriate in the engagement to exploit any advantage that developed and move the enemy from the field. This second theory was not as dependent on firepower as it was on „shock action‟ and the bayonet charge was a very good method to generate the desired shock. The bayonet charge could be employed by the defenders, who would withhold fire until the approaching troops were very close and only then release a volley of fire which would be all the more effective due to the reduced range. That volley would be followed immediately with a bayonet charge to press the advantage and take the fight to the attackers rather than waiting for them to recover and return fire. Similarly, attacking lines would withhold fire until very close, admittedly absorbing some casualties. But the sight of men coming on relentlessly in the face of fire, followed by a coordinated volley and a charge from the attackers, could induce the defenders to abandon their fortifications and retreat. In either case, the bayonet charge could be extremely effective even with all the casualties caused by firearms, but the bayonet still being a critical factor in the ultimate victory. This type of fighting was more difficult because of the coordination required. The risk was higher but the result was often more decisive, and the value of „shock action‟ was important when a smaller unit was forced to engage a larger, because of the measure of advantage it brought to the fight.
May 17, 2011...Brian Wills My Dancing Days Are Over: William Dorsey Pender & The Civil War
IN THEATERS...APRIL 15TH
The Conspirator
This movie tells the story of Mary Surratt, whose boardinghouse was used as a meeting place for John Wilkes Booth and friends who plotted
Lincoln's assassination and her ensuing trial where she is represented by a Union war hero. Directed by Robert Redford.
For more info:
www.conspiratorthemovie.com
In conclusion it would seem the bayonet charge was utilized with some regularity throughout the Civil War, even if bayonet fighting in close quarter combat was something much rarer. This would account for the numerous accounts of units engaging with their bayonets at the ready and also the scarcity of documented bayonet wounds found among the casualties. A bayonet charge, even with no bayonet wounds, could still be responsible for the victory. It certainly was an effective tactic for Chamberlain that day on Little Round Top.
WEB SITE OF INTEREST
www.americancivilwar.org.uk
Did you even know they even had such an organization in England? Check out their website...it is a good one.
www.scottsdalecwrt.vze.com
That's us...check it out and "thank you" Jay Webber for the fantastic job you do with it.
MY UNCLE HENRY -- A GERMAN YANKEE
by Mary Jane Baetz SCWRT Member
(Part Four of a four-part series)
My great uncle, Major Henry Baetz of Company F of the Twenty-Sixth Wisconsin infantry, fought in the Battle of Gettysburg.
Early in the morning of July 1, 1863 the boom of cannons and artillery roused the Twenty-Sixth from their encampment in Emmitsburg, Maryland and within minutes they fell into a rapid march towards Gettysburg, less than 15 miles away. As they marched they passed the two Round Tops to the east and continued ahead past Cemetery Hill. Upon reaching the center of town, they were deployed to a small hill to the north. As the Confederate forces attacked from the west, the men became fully engaged in the furious fight.
That afternoon the Twenty-Sixth Wisconsin retreated and fell into the position of rear guard at Cemetery Hill. During the fighting in Gettysburg, Uncle Henry fell, severely wounded in the leg. (Note: * The Twenty-Sixth Wisconsin went on to fight in many other battles until the end of the war and was mustered out of service in 1865.*) Shot in the leg, Uncle Henry was unable to continue the fight. A month later, on a surgeon's certificate of disability, he resigned his commission and returned to his home town of Manitowoc where he slowly recovered and was honorably discharged from the Union Army.
Proud of his service to his country, but disgusted and angry about the slurs and accusations laid upon the German soldiers who served for the Union, he vowed to never again speak of that controversy. Instead, he looked to the future and as soon as his health permitted, he embarked on a lifetime of service and success in both the public and private sectors.
Memoirs of Milwaukee County, printed in 1909, describes his life as follows:
In 1866 he was elected Treasurer of Manitowoc County, and re-elected in 1868. In 1869 he was elected to the position of Treasurer of the State of Wisconsin, and two years later was re-elected to the same position, filling the office in a very creditable manner four years.
Upon retiring from office he returned to Manitowoc, and a year later, in 1875, he removed to the city of Milwaukee, where he engaged in newspaper work. In 1878 he was elected by the common council as City Librarian of Milwaukee, being the first to fill that position, and this he resigned to accept the office of Secretary of the State Board of Immigration in 1880.
Three years later, in 1883, he resigned the lastnamed position to enter the employ of the Philip Best, now the Pabst Brewing Company of Milwaukee, with whom he was associated for the ensuing twenty-one years. After being with that firm some time he obtained a financial interest in the Pabst Mine, near Ironwood, Mich., being made Secretary and General Agent of the same, and he lived at the mine three years, so engaged. He then disposed of his mining interests and returned to Milwaukee, accepting the position of General Purchaser for the Pabst Brewing Company. In 1904 he retired from the activities of business.
Major Baetz gives an unswerving allegiance to the men and measures of the Republican party, with which organization he has been prominently identified from the beginning, and his fraternal associations are with the Masonic order, having been a member of Tracy lodge, No. 107, of Manitowoc.
Other organizations with which Major Baetz is identified are the Wisconsin Academy of Sciences, Arts and Letters; the Wisconsin Archeological Society; the Milwaukee Musical Society; and the Old Settlers' Club of Milwaukee County. He has been president of the Deutscher Club, and for a period of nine years served in a like capacity for the "Deutsche Gesellschaft von Milwaukee," an incorporated society to aid and assist immigrants from Germany and other European countries, on their arrival in Milwaukee.
He lived until he was nearly 80 years old, July 27, 1830 to January 2, 1910. He and his wife, Emma, are buried in Manitowoc, Wisconsin along with their only child, Oscar, who died in 1860 at the tender age of five months.
And so, this concludes the fourth and final segment in the series about Major Henry Baetz -- except for one last thought: "What a guy! I wish I could have known My Uncle Henry, A German Yankee."
|
<urn:uuid:56f6cddb-122e-4032-b6cf-527d977e3b01>
|
CC-MAIN-2024-22
|
https://www.scottsdalecwrt.org/uploads/1/0/1/7/10178993/gs2011april.pdf
|
2024-05-23T02:58:28+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-22/subset=warc/part-00206-4dd72944-e9c0-41a1-9026-dfd2d0615bf2.c000.gz.parquet
| 855,081,972
| 3,479
|
eng_Latn
|
eng_Latn
| 0.997306
|
eng_Latn
| 0.998731
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3541,
8396,
11371,
15643
] |
PRESIDENT
Wes Schmidt 480-299-0153
VICE-PRESIDENT
Dean Becraft
SECRETARY/GRAPESHOT
Karen Becraft 480-991-2668
TREASURER
Charles Madigan
PROGRAM CHAIRMAN
Mack Stanley 480-272-8207
BOARD MEMBERS (thru 5/2012)
Mack Stanley, John Bamberl
Duff McGovern
BOARD MEMBERS (thru 5/2011)
Jay Webber, Don Swanson, Henry Potosky
COMMITTEES...
MEMBERSHIP: John Bamberl
EDITORIAL: Don Swanson
BOOK TABLE: Henry Potosky
WEBMASTER: Jay Webber
HISTORICAL:
Mary Anne Hammond
PUBLIC RELATIONS: available and in need of a volunteer
WEBSITE: scottsdalecwrt.vze.com
.Meets @ Civic Center Library 3839 N Drinkwater Blvd Scottsdale .on the 3rd Tuesday of the month 6:45 PM—8:45 PM .September thru May .$35 Annual Dues (individual) .$45 Annual Dues (family) .Everyone Welcome
THE GRAPESHOT
FRANK O'REILLY
presents-
The Liberty Hall Volunteers: Stonewall Jackson's College Boys
April 19, 2011 Tuesday 6:45 PM Civic Center Library
Graduating from Washington and Lee University, Frank A. O'Reilly first worked for the Stonewall Jackson House in Lexington, Va. Joining the National Park Service in 1987 as a temporary historian at the Fredericksburg & Spotsylvania National Military Park, he later took a position at Independence Hall in Philadelphia, returning to Fredericksburg in 1990 as historian at the Stonewall Jackson Shrine. Mr. O'Reilly has also served as historical consultant for the City of Fredericksburg and the Shenandoah Valley Battlefield Planning Commission. He is the author of several articles on the war in Virginia, and of the book, The Fredericksburg Campaign: Winter War on the Rappahannock, which won the Capital District Book Award in 2002. He continues to conduct extensive battlefield studies and tours throughout Virginia, many for the National Park Service. One week after his visit here, Mr. O'Reilly will be the speaker at the American Civil War Round Table of the United Kingdom, in Oxford, England.
FROM WES‟ DEN…....All of us understand that the Civil War‟s 150th anniversary begins April 12th, when Fort Sumter is attacked in Charleston, SC. All CSA secession events have been celebrated with dinners, dances and re-enactments. Mississippi seceded on January 9, 1861. Four days later Mississippi artillery stared firing on all northern shipping trying to pass Vicksburg. I was actually shocked to learn that last month. Were these the first shots of the Civil War? The re-enactment was a big success as the riverboat Tyler steamed by in a cloud of smoke. The Vicksburg River Battery was well prepared. For the next four years events will be happening every month. Try and catch a few.
I want you to know that We/SCWRT received a heartfelt letter of thanks from the Civil War Trust, formerly the CW Preservation Trust, President Jim Lighthizer, to let one of "our strongest supporters know how much they mean to us". You are entitled to this commendation by your support of this Round Table. For the third consecutive year we have sent them over $2500! They, as good stewards, have now acquired 30,000 acres of battlefields. That is 47 square miles, in 20 states. It is estimated that 20% of Civil War battlefields are totally destroyed and only 15% are protected as National Parks. Only one national organization is working to save our battlefield heritage and that is the Civil War Trust. Please sustain this effort. Dues turned in anytime now will cover you thru June 1, 2012. It will even save us sending you a bill. I remain your most obedient servant..........Wes Schmidt
"FIX BAYONETS"
by
Tom Lannon SCWRT member
In his study of combat On Killing author Dave Grossman discusses the instinctive reluctance of human beings to kill at close range, particularly with edged weapons. Killing at a distance, any distance, with a firearm in much easier than the intimacy of killing with a knife or bayonet. Even in those fights involving hand to hand engagements most soldiers preferred to use their rifles to slash or club the enemy rather than actually stab their opponents with the bayonet. In fact there are studies that indicate it was actually more dangerous to break contact with the enemy and turn to flee than it was to stand face to face and continue to fight. It was easier psychologically for the troops to shoot or stab retreating soldiers as they no longer had to observe their facial expressions when they received the blow.
But the lack of documented bayonet wounds among the casualties after a battle does not necessarily translate into the bayonet being an ineffective instrument of war or a weapon without tactical value.
On July 2, 1863 Colonel Joshua Chamberlain and men of the 20 th Maine were assigned a position at the extreme left flank of Federal forces on the hill called Little Round Top during the battle of Gettysburg. Chamberlain‟s orders were to hold that position at all costs, for if the Confederates could get to the top of the hill and overwhelm Chamberlain‟s men, they would be able to rake flanking fire down the entire line of Northern defenders. Chamberlain and his men repulsed two charges by the enemy until at last, depleted of sufficient ammunition to repel the next charge the enemy was about to send, he gave the order to "Fix bayonets" and sent the 20 th Maine down the hill to the startled Confederates who broke and ran in retreat. The left flank of Little Round Top was, at least temporarily, secure.
But how often did a bayonet charge actually occur in Civil War engagements? Opinions on this vary and the argument has endured over the years.
In The Bloody Crucible of Courage historian Brent Nosworthy makes a distinction between bayonet fighting and a bayonet charge. He argues that although the bayonet was used with comparative rarity to inflict casualties, military tacticians recognized the value of a bayonet charge. In a bayonet charge the goal is a tactical victory, such a turning a line or moving the enemy from the field as opposed to his destruction. The bayonet charge was an action that united the men in formation and gave a boost to morale in the sense that it gave them a defined, unified physical action that helped maintain cohesiveness of the lines. And such a coordinated movement toward the enemy, if done with obvious resolve, was equally effective in demoralizing the soldiers on the receiving end of the charge as the phalanx of shining blades got increasingly, and more terrifyingly, closer. Nosworthy maintains the
|
effectiveness of the bayonet was in the psychological realm rather than as a weapon of physical destruction.
| 6,478
|
beginning_of_word
|
effectiveness
|
remove_all
|
<url>
https://www.scottsdalecwrt.org/uploads/1/0/1/7/10178993/gs2011april.pdf
</url>
<text>
PRESIDENT
Wes Schmidt 480-299-0153
VICE-PRESIDENT
Dean Becraft
SECRETARY/GRAPESHOT
Karen Becraft 480-991-2668
TREASURER
Charles Madigan
PROGRAM CHAIRMAN
Mack Stanley 480-272-8207
BOARD MEMBERS (thru 5/2012)
Mack Stanley, John Bamberl
Duff McGovern
BOARD MEMBERS (thru 5/2011)
Jay Webber, Don Swanson, Henry Potosky
COMMITTEES...
MEMBERSHIP: John Bamberl
EDITORIAL: Don Swanson
BOOK TABLE: Henry Potosky
WEBMASTER: Jay Webber
HISTORICAL:
Mary Anne Hammond
PUBLIC RELATIONS: available and in need of a volunteer
WEBSITE: scottsdalecwrt.vze.com
.Meets @ Civic Center Library 3839 N Drinkwater Blvd Scottsdale .on the 3rd Tuesday of the month 6:45 PM—8:45 PM .September thru May .$35 Annual Dues (individual) .$45 Annual Dues (family) .Everyone Welcome
THE GRAPESHOT
FRANK O'REILLY
presents-
The Liberty Hall Volunteers: Stonewall Jackson's College Boys
April 19, 2011 Tuesday 6:45 PM Civic Center Library
Graduating from Washington and Lee University, Frank A. O'Reilly first worked for the Stonewall Jackson House in Lexington, Va. Joining the National Park Service in 1987 as a temporary historian at the Fredericksburg & Spotsylvania National Military Park, he later took a position at Independence Hall in Philadelphia, returning to Fredericksburg in 1990 as historian at the Stonewall Jackson Shrine. Mr. O'Reilly has also served as historical consultant for the City of Fredericksburg and the Shenandoah Valley Battlefield Planning Commission. He is the author of several articles on the war in Virginia, and of the book, The Fredericksburg Campaign: Winter War on the Rappahannock, which won the Capital District Book Award in 2002. He continues to conduct extensive battlefield studies and tours throughout Virginia, many for the National Park Service. One week after his visit here, Mr. O'Reilly will be the speaker at the American Civil War Round Table of the United Kingdom, in Oxford, England.
FROM WES‟ DEN…....All of us understand that the Civil War‟s 150th anniversary begins April 12th, when Fort Sumter is attacked in Charleston, SC. All CSA secession events have been celebrated with dinners, dances and re-enactments. Mississippi seceded on January 9, 1861. Four days later Mississippi artillery stared firing on all northern shipping trying to pass Vicksburg. I was actually shocked to learn that last month. Were these the first shots of the Civil War? The re-enactment was a big success as the riverboat Tyler steamed by in a cloud of smoke. The Vicksburg River Battery was well prepared. For the next four years events will be happening every month. Try and catch a few.
I want you to know that We/SCWRT received a heartfelt letter of thanks from the Civil War Trust, formerly the CW Preservation Trust, President Jim Lighthizer, to let one of "our strongest supporters know how much they mean to us". You are entitled to this commendation by your support of this Round Table. For the third consecutive year we have sent them over $2500! They, as good stewards, have now acquired 30,000 acres of battlefields. That is 47 square miles, in 20 states. It is estimated that 20% of Civil War battlefields are totally destroyed and only 15% are protected as National Parks. Only one national organization is working to save our battlefield heritage and that is the Civil War Trust. Please sustain this effort. Dues turned in anytime now will cover you thru June 1, 2012. It will even save us sending you a bill. I remain your most obedient servant..........Wes Schmidt
"FIX BAYONETS"
by
Tom Lannon SCWRT member
In his study of combat On Killing author Dave Grossman discusses the instinctive reluctance of human beings to kill at close range, particularly with edged weapons. Killing at a distance, any distance, with a firearm in much easier than the intimacy of killing with a knife or bayonet. Even in those fights involving hand to hand engagements most soldiers preferred to use their rifles to slash or club the enemy rather than actually stab their opponents with the bayonet. In fact there are studies that indicate it was actually more dangerous to break contact with the enemy and turn to flee than it was to stand face to face and continue to fight. It was easier psychologically for the troops to shoot or stab retreating soldiers as they no longer had to observe their facial expressions when they received the blow.
But the lack of documented bayonet wounds among the casualties after a battle does not necessarily translate into the bayonet being an ineffective instrument of war or a weapon without tactical value.
On July 2, 1863 Colonel Joshua Chamberlain and men of the 20 th Maine were assigned a position at the extreme left flank of Federal forces on the hill called Little Round Top during the battle of Gettysburg. Chamberlain‟s orders were to hold that position at all costs, for if the Confederates could get to the top of the hill and overwhelm Chamberlain‟s men, they would be able to rake flanking fire down the entire line of Northern defenders. Chamberlain and his men repulsed two charges by the enemy until at last, depleted of sufficient ammunition to repel the next charge the enemy was about to send, he gave the order to "Fix bayonets" and sent the 20 th Maine down the hill to the startled Confederates who broke and ran in retreat. The left flank of Little Round Top was, at least temporarily, secure.
But how often did a bayonet charge actually occur in Civil War engagements? Opinions on this vary and the argument has endured over the years.
In The Bloody Crucible of Courage historian Brent Nosworthy makes a distinction between bayonet fighting and a bayonet charge. He argues that although the bayonet was used with comparative rarity to inflict casualties, military tacticians recognized the value of a bayonet charge. In a bayonet charge the goal is a tactical victory, such a turning a line or moving the enemy from the field as opposed to his destruction. The bayonet charge was an action that united the men in formation and gave a boost to morale in the sense that it gave them a defined, unified physical action that helped maintain cohesiveness of the lines. And such a coordinated movement toward the enemy, if done with obvious resolve, was equally effective in demoralizing the soldiers on the receiving end of the charge as the phalanx of shining blades got increasingly, and more terrifyingly, closer. Nosworthy maintains the <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.scottsdalecwrt.org/uploads/1/0/1/7/10178993/gs2011april.pdf\n</url>\n<text>\nPRESIDENT\n\nWes Schmidt 480-299-0153\n\nVICE-PRESIDENT\n\nDean Becraft\n\nSECRETARY/GRAPESHOT\n\nKaren Becraft 480-991-2668\n\nTREASURER\n\nCharles Madigan\n\nPROGRAM CHAIRMAN\n\nMack Stanley 480-272-8207\n\nBOARD MEMBERS (thru 5/2012)\n\nMack Stanley, John Bamberl\n\nDuff McGovern\n\nBOARD MEMBERS (thru 5/2011)\n\nJay Webber, Don Swanson, Henry Potosky\n\nCOMMITTEES...\n\nMEMBERSHIP: John Bamberl\n\nEDITORIAL: Don Swanson\n\nBOOK TABLE: Henry Potosky\n\nWEBMASTER: Jay Webber\n\nHISTORICAL:\n\nMary Anne Hammond\n\nPUBLIC RELATIONS: available and in need of a volunteer\n\nWEBSITE: scottsdalecwrt.vze.com\n\n.Meets @ Civic Center Library 3839 N Drinkwater Blvd Scottsdale .on the 3rd Tuesday of the month 6:45 PM—8:45 PM .September thru May .$35 Annual Dues (individual) .$45 Annual Dues (family) .Everyone Welcome\n\nTHE GRAPESHOT\n\nFRANK O'REILLY\n\npresents-\n\nThe Liberty Hall Volunteers: Stonewall Jackson's College Boys\n\nApril 19, 2011 Tuesday 6:45 PM Civic Center Library\n\nGraduating from Washington and Lee University, Frank A. O'Reilly first worked for the Stonewall Jackson House in Lexington, Va. Joining the National Park Service in 1987 as a temporary historian at the Fredericksburg & Spotsylvania National Military Park, he later took a position at Independence Hall in Philadelphia, returning to Fredericksburg in 1990 as historian at the Stonewall Jackson Shrine. Mr. O'Reilly has also served as historical consultant for the City of Fredericksburg and the Shenandoah Valley Battlefield Planning Commission. He is the author of several articles on the war in Virginia, and of the book, The Fredericksburg Campaign: Winter War on the Rappahannock, which won the Capital District Book Award in 2002. He continues to conduct extensive battlefield studies and tours throughout Virginia, many for the National Park Service. One week after his visit here, Mr. O'Reilly will be the speaker at the American Civil War Round Table of the United Kingdom, in Oxford, England.\n\nFROM WES‟ DEN…....All of us understand that the Civil War‟s 150th anniversary begins April 12th, when Fort Sumter is attacked in Charleston, SC. All CSA secession events have been celebrated with dinners, dances and re-enactments. Mississippi seceded on January 9, 1861. Four days later Mississippi artillery stared firing on all northern shipping trying to pass Vicksburg. I was actually shocked to learn that last month. Were these the first shots of the Civil War? The re-enactment was a big success as the riverboat Tyler steamed by in a cloud of smoke. The Vicksburg River Battery was well prepared. For the next four years events will be happening every month. Try and catch a few.\n\nI want you to know that We/SCWRT received a heartfelt letter of thanks from the Civil War Trust, formerly the CW Preservation Trust, President Jim Lighthizer, to let one of \"our strongest supporters know how much they mean to us\". You are entitled to this commendation by your support of this Round Table. For the third consecutive year we have sent them over $2500! They, as good stewards, have now acquired 30,000 acres of battlefields. That is 47 square miles, in 20 states. It is estimated that 20% of Civil War battlefields are totally destroyed and only 15% are protected as National Parks. Only one national organization is working to save our battlefield heritage and that is the Civil War Trust. Please sustain this effort. Dues turned in anytime now will cover you thru June 1, 2012. It will even save us sending you a bill. I remain your most obedient servant..........Wes Schmidt\n\n\"FIX BAYONETS\"\n\nby\n\nTom Lannon SCWRT member\n\nIn his study of combat On Killing author Dave Grossman discusses the instinctive reluctance of human beings to kill at close range, particularly with edged weapons. Killing at a distance, any distance, with a firearm in much easier than the intimacy of killing with a knife or bayonet. Even in those fights involving hand to hand engagements most soldiers preferred to use their rifles to slash or club the enemy rather than actually stab their opponents with the bayonet. In fact there are studies that indicate it was actually more dangerous to break contact with the enemy and turn to flee than it was to stand face to face and continue to fight. It was easier psychologically for the troops to shoot or stab retreating soldiers as they no longer had to observe their facial expressions when they received the blow.\n\nBut the lack of documented bayonet wounds among the casualties after a battle does not necessarily translate into the bayonet being an ineffective instrument of war or a weapon without tactical value.\n\nOn July 2, 1863 Colonel Joshua Chamberlain and men of the 20 th Maine were assigned a position at the extreme left flank of Federal forces on the hill called Little Round Top during the battle of Gettysburg. Chamberlain‟s orders were to hold that position at all costs, for if the Confederates could get to the top of the hill and overwhelm Chamberlain‟s men, they would be able to rake flanking fire down the entire line of Northern defenders. Chamberlain and his men repulsed two charges by the enemy until at last, depleted of sufficient ammunition to repel the next charge the enemy was about to send, he gave the order to \"Fix bayonets\" and sent the 20 th Maine down the hill to the startled Confederates who broke and ran in retreat. The left flank of Little Round Top was, at least temporarily, secure.\n\nBut how often did a bayonet charge actually occur in Civil War engagements? Opinions on this vary and the argument has endured over the years.\n\nIn The Bloody Crucible of Courage historian Brent Nosworthy makes a distinction between bayonet fighting and a bayonet charge. He argues that although the bayonet was used with comparative rarity to inflict casualties, military tacticians recognized the value of a bayonet charge. In a bayonet charge the goal is a tactical victory, such a turning a line or moving the enemy from the field as opposed to his destruction. The bayonet charge was an action that united the men in formation and gave a boost to morale in the sense that it gave them a defined, unified physical action that helped maintain cohesiveness of the lines. And such a coordinated movement toward the enemy, if done with obvious resolve, was equally effective in demoralizing the soldiers on the receiving end of the charge as the phalanx of shining blades got increasingly, and more terrifyingly, closer. Nosworthy maintains the <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "effectiveness of the bayonet was in the psychological realm rather than as a weapon of physical destruction.",
"role": "assistant"
}
] |
|
Report Based On The Following Settings
Monthly Report for Trail Managers run on Sunday 1st of December 2019
Note that results based on small sample sizes (less than n=30) should be treated as indicative and not conclusive.
Range :
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
Twin Coast last 12 months :
Organisation Name : Is equal to 'Pou Herenga Tai Twin Coast Cycle Trail'
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
All Trails last 12 Months :
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
Twin Coast last month :
Organisation Name : Is equal to 'Pou Herenga Tai Twin Coast Cycle Trail'
Survey Completion Date : Is between the first day of last month (01/11/2019) and the last day of last month (30/11/2019)
All trails last month :
Survey Completion Date : Is between the first day of last month (01/11/2019) and the last day of last month (30/11/2019)
Net Promoter Score©
Sample Size: Twin Coast last 12 months 221 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Net Promoter Score© | 57 | 72 | 44 |
Net Promoter Score©
Sample Size: Twin Coast last 12 months 221 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
Overall Satisfaction (1=very dissatisfied and 10=very satisfied)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4285 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Overall Satisfaction | 8.5 | 8.9 | 8.1 |
Overall Satisfaction
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4285 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
Channels generating first awareness
Sample Size: Twin Coast last 12 months 216 / 222 (97%) | All Trails last 12 Months 4280 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| From friends, family or work colleagues (e.g. word of mouth) | 50% | 60% | 56% |
| From an information centre (including i- SITEs, Department of Conservation Visitor Centres, or other) | 7% | 10% | 6% |
| The AA guide | 15% | 6% | 19% |
| From an accommodation provider (e.g. hotel, motel, backpackers/youth hostel) | 2% | 1% | 0% |
| Newspaper or magazine | 16% | 12% | 31% |
| Travel guide/book | 8% | 7% | 6% |
| Trail brochure/map | 8% | 14% | 13% |
| Trail website | 20% | 18% | 25% |
| New Zealand Cycle Trail website | 35% | 19% | 56% |
| Social media (e.g. Facebook, Twitter, blog) | 8% | 14% | 0% |
| Other (please specify) | 13% | 15% | 6% |
Local or visitor to area
Sample Size: Twin Coast last 12 months 216 / 222 (97%) | All Trails last 12 Months 4280 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH | |
|---|---|---|---|---|
| I live in the area | 26% | 39% | 31% | 36% |
| I was visiting the area | 74% | 61% | 69% | |
Trail influence on visiting the area
Sample Size: Twin Coast last 12 months 160 / 222 (72%) | All Trails last 12 Months 2603 / 4290 (61%) | Twin Coast last month 11 / 16 (69%) | All trails last month 179 / 279 (64%)
Trail use
Sample Size: Twin Coast last 12 months 217 / 222 (98%) | All Trails last 12 Months 4282 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| 52% | 57% | 38% |
|---|---|---|
| 40% | 48% | 31% |
| 0% | 2% | 0% |
| 4% | 8% | 6% |
| 32% | 20% | 75% |
| 0% | 1% | 0% |
| 33% | 30% | 19% |
| 41% | 39% | 13% |
| 5% | 7% | 0% |
Main method of transport on the trail
Sample Size: Twin Coast last 12 months 217 / 222 (98%) | All Trails last 12 Months 4282 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Cycling the trail (on a road/touring/standard bike) | 13% | 11% | 19% |
| Cycling the trail (on a mountain bike) | 58% | 61% | 56% |
| Cycling the trail (on a electric bicycle/e-bike) | 8% | 8% | 13% |
| Cycling the trail (on a e-mountain bike) | 9% | 5% | 6% |
| Cycling the trail (on a hybrid bike) | 7% | 3% | 6% |
| Cycling the trail (on a bike modified for someone with a disability) | 0% | 0% | 0% |
| Walking/hiking | 3% | 7% | 0% |
| Running/jogging | 1% | 3% | 0% |
Nights stayed in the area
Sample Size: Twin Coast last 12 months 161 / 222 (73%) | All Trails last 12 Months 2606 / 4290 (61%) | Twin Coast last month 11 / 16 (69%) | All trails last month 179 / 279 (64%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH | |
|---|---|---|---|---|
| Average | 2.73 | 3.36 | 2.64 | 3.06 |
Extended stay in area
Sample Size: Twin Coast last 12 months 16 / 222 (7%) | All Trails last 12 Months 196 / 4290 (5%) | Twin Coast last month 1 / 16 (6%) | All trails last month 17 / 279 (6%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Yes | 31% | 22% | 100% |
| No | 69% | 78% | 0% |
Extra nights in area
Sample Size: Twin Coast last 12 months 5 / 222 (2%) | All Trails last 12 Months 43 / 4290 (1%) | Twin Coast last month 1 / 16 (6%) | All trails last month 3 / 279 (1%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH | ALL TRAILS LAST MONTH |
|---|---|---|---|---|
| Average | 2.4 | 2.23 | 2 | 1.33 |
Travel Party Numbers
Sample Size: Twin Coast last 12 months 217 / 222 (98%) | All Trails last 12 Months 4282 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Adults, aged 15 years or more: | 3.53 | 3.65 | 3.69 |
| Children, aged 14 years or less: | 0.41 | 0.48 | 1 |
Time spent on the trail
Time spent on the trail
Sample Size: Twin Coast last 12 months 217 / 222 (98%) | All Trails last 12 Months 4281 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH | |
|---|---|---|---|---|
| Less than 1 hour | 2% | 4% | 0% | 6% |
| 1-4 hours (half a day) | 24% | 35% | 19% | |
| 1 day (more than 4 hours) | 22% | 18% | 13% | 15% |
| 2 days | 46% | 15% | 63% | |
| 3 days | 4% | 10% | 0% | 11% |
| 4 days | 2% | 11% | 6% | |
| 5 days | 0% | 5% | 0% | 5% |
| 6 days or more | 0% | 3% | 0% | |
Ratings - Trail Information (1=very poor and 5=very good)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4284 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
Ratings - Trail Information (1=very poor and 5=very good)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4284 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Information available on the NZCT website | 4.3 | 4.3 | 4.3 |
| Information available on the trails website | 4.3 | 4.4 | 4.3 |
| Trail map or brochure | 4.2 | 4.3 | 4.2 |
Ratings - Facilities / Services On The Trail (1=very poor and 5=very good)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4284 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
Ratings - Facilities / Services On The Trail (1=very poor and 5=very good)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4284 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Bike hire facilities/services available in the area of the trail | 4.3 | 4.4 | 4.6 |
| Quality of hire bikes | 4.5 | 4.5 | 4 |
| Bike shuttle/other transport service available to/from the trail | 4.5 | 4.5 | 4.5 |
| Guiding on the cycle trail | 4.1 | 4.2 | 4.1 |
| Toilet facilities along the trail | 3.7 | 3.8 | 4.3 |
| Accommodation available in the area of the trail | 4.1 | 4.3 | 4.3 |
| Food and beverage services available along the trail | 3.5 | 3.8 | 3.5 |
Ratings - The Trail (1=very poor and 5=very good)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4285 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
Ratings - The Trail (1=very poor and 5=very good)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4285 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Scenery/setting | 4.5 | 4.8 | 4.3 |
| Trail difficulty (was as expected) | 4.4 | 4.4 | 4.3 |
| Trail gradient/slope | 4.3 | 4.4 | 4.1 |
| Condition of the trail surface | 4.2 | 4.3 | 4.3 |
| Directional and other signage on the trail (e.g. interpretation - history, culture and stories) | 4.2 | 4.2 | 4.3 |
| Overall trail conditions | 4.2 | 4.4 | 4.1 |
Gender
Sample Size: Twin Coast last 12 months 222 / 222 (100%) | All Trails last 12 Months 4290 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Male | 40% | 50% | 31% |
| Female | 59% | 50% | 63% |
| Gender diverse | 1% | 1% | 6% |
Age
Sample Size: Twin Coast last 12 months 222 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| 15 to 19 years | 2% | 1% | 0% |
| 20 to 29 years | 2% | 5% | 0% |
| 30 to 39 years | 8% | 11% | 6% |
| 40 to 49 years | 20% | 22% | 19% |
| 50 to 59 years | 32% | 30% | 31% |
| 60 to 69 years | 28% | 23% | 31% |
| 70 years or more | 6% | 8% | 13% |
| Would prefer not to say | 1% | 0% | 0% |
Location
Sample Size: Twin Coast last 12 months 222 / 222 (100%)
Location
Sample Size: Twin Coast last 12 months 222 / 222 (100%) | All Trails last 12 Months 4290 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| COUNTRIES | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Australia | 2% | 5% | 0% |
| New Zealand | 92% | 90% | 100% |
| United States | 2% | 1% | 0% |
1 December 2019
Page 10 of 14
1 December 2019
Page 11 of 14
Location
Sample Size: Twin Coast last 12 months 205 / 222 (92%) | All Trails last 12 Months 3879 / 4290 (90%) | Twin Coast last month 16 / 16 (100%) | All trails last month 251 / 279 (90%)
| REGIONS | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Northland | 35% | 3% | 38% |
| Auckland | 41% | 15% | 31% |
| Waikato | 3% | 10% | 0% |
| Bay Of Plenty | 7% | 8% | 13% |
| Gisborne | 1% | 1% | 0% |
| Hawke's Bay | 2% | 7% | 0% |
| Taranaki | 1% | 1% | 6% |
| Manawatu Wanganui | 1% | 3% | 0% |
| Wellington | 3% | 7% | 0% |
| Nelson | 1% | 8% | 6% |
| Marlborough | 1% | 2% | 6% |
Location
Location
Sample Size: Twin Coast last 12 months 5 / 222 (2%) | All Trails last 12 Months 229 / 4290 (5%) | Twin Coast last month 0 / 16 (0%) | All trails last month 16 / 279 (6%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS |
|---|---|---|
| New South Wales | 20% | 40% |
| Queensland | 60% | 24% |
1 December 2019
Page 12 of 14
Western Australia
20%
8%
6%
1 December 2019
Page 13 of 14
Sample Size: Twin Coast last month 16 / 16 (100%)
TWIN COAST LAST MONTH
NO signage around Kaikohe re the cycle trail - where to find the start if new to kaikhoe driving into the town arrows/signage at Okaihau signage should be around the toilet block indicating to go down the road plus when at the gate the sign should indicate Ohaikhau to Kaikohe to the LEFT - Horeke to the RIGHT
I loved the coastal/river ttrail between Opua and Kawakawa. Its beautiful and the water looks clean. Also the Utakura river trail thats lovely. B&B at Horeke was exceptional.
Kawakawa public restrooms, old rail way line, the restaurant at the Mint in Kaikohe, Mission House the scenery
The boards with cultural information along the trail, the part of the trail next to the river (between Okaihau and Horeke)
Diversity of scenery Ease of access Ability to do different sections at different times the scenery, the width of the trail so we could ride side by side and chat, not have to worry about vehicles
easy gradient. good scenery
Scenery, small towns, cafe experience at Moerewa (lovely staff and coconut cake) and our host, Shane, at Twin Coast Adventures.
Lovely countryside . Nice way to see places you can't see from the road. Beautiful picnic spots.
We enjoyed the scenery and being on a trail separate from the road.
all of it nice acenery at times
Who ever is maintaining the track, congratulations. Sad bit, no beer available at Horeke. A pub that doesn't serve beer.
The Horeke Boardwalk and riding beside the estuary from Opua to Taumarere.
KAWAKAWA
Comments - What might have made the experience more enjoyable
Sample Size: Twin Coast last month 14 / 16 (88%)
TWIN COAST LAST MONTH
Some information re water fountains IF available at any of the town stops
Bike stands outside cafes. Okaihau and Opua were the only places with bike stands. Some vegan food would be nice. I understand 10% of the NZ population are vegetarian. And what's happened to the Kawakawa railway station cafe? Thats really gone downhill.
More native bush, more shade from trees and less direct sun exposed sections, fewer places where you have to dismount especially as many of them did not make sense where they were (use the rollers where possible), less rubbish dumped along the trail, a diversion away from the effluent waste disposal plant rather than right next to it.... an extension to the Waiwere Boulders...
Much shorter section of the trail on or next to roads (especially dirt roads), a lot less gates (many of which appeared to serve no purpose), fewer road crossings, better riding surface on many parts of the trail
A few more toilet stops en route More cross sections of the trail on trail site / map to plan journey direction More facitities at Horeke end eg pop up cafe.
more food coffee places to stop at only good one was mint in kaikohe the blimmen pipe barriers are to restrictive. the cattle stops ste great
Notification of any closure of any part of the track. Providers of shuttles, accommodation etc should be given prior notification. We had arranged for pickup at Opua at 3pm. At Kawakawa the track was closed for maintenance for the day. We had to ride the open highway to hopefully reconnect further down. Luckily we were able to do this. Signage: Perhaps some in the town giving more clear directions as to where to go for the start of each section. Other than that the track has in our eyes been wonderfully done. Thank you.
We did not enjoy the restrictive barriers at each entry/exit/road crossing on the trail. This disrupted the cycling flow and as we had panniers on our bikes (as we were self sufficiently camping) it took two people to lift each bike through each time. With more than 30 of these barriers this was tedious and tiring. We would prefer if we could have had access which would not have required us to dismount.
possibly something open for a drink/food at Horeke end of trail some of the surface of track a bit rough but you are working on it
see before
More shelters to sit under in the summer sun.
No post in centre of cattle grid
1 December 2019
Page 14 of 14
|
<urn:uuid:6ab41413-819e-4864-8328-1d8151f84bcd>
|
CC-MAIN-2021-39
|
https://twincoastcycletrail.kiwi.nz/wp-content/uploads/2020/09/pou-herenga-tai-twin-coast-cycle-trail_dashboard-report_01-12-2019.pdf
|
2021-09-21T13:40:17+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00161-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 624,433,134
| 5,860
|
eng_Latn
|
eng_Latn
| 0.717693
|
eng_Latn
| 0.978242
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"eng_Latn"
] | false
|
rolmOCR
|
[
1147,
1714,
2329,
3962,
5521,
6696,
8104,
9207,
10542,
11647,
11679,
12688,
12752,
16871
] |
Report Based On The Following Settings
Monthly Report for Trail Managers run on Sunday 1st of December 2019
Note that results based on small sample sizes (less than n=30) should be treated as indicative and not conclusive.
Range :
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
Twin Coast last 12 months :
Organisation Name
|
: Is equal to 'Pou Herenga Tai Twin Coast Cycle Trail'
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
All Trails last 12 Months :
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
Twin Coast last month :
Organisation Name : Is equal to 'Pou Herenga Tai Twin Coast Cycle Trail'
Survey Completion Date : Is between the first day of last month (01/11/2019) and the last day of last month (30/11/2019)
All trails last month :
Survey Completion Date : Is between the first day of last month (01/11/2019) and the last day of last month (30/11/2019)
Net Promoter Score©
Sample Size: Twin Coast last 12 months 221 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Net Promoter Score© | 57 | 72 | 44 |
Net Promoter Score©
Sample Size: Twin Coast last 12 months 221 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
Overall Satisfaction (1=very dissatisfied and 10=very satisfied)
Sample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4285 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)
| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |
|---|---|---|---|
| Overall Satisfaction | 8.
| 420
|
inside_word
|
:
|
remove_all
|
<url>
https://twincoastcycletrail.kiwi.nz/wp-content/uploads/2020/09/pou-herenga-tai-twin-coast-cycle-trail_dashboard-report_01-12-2019.pdf
</url>
<text>
Report Based On The Following Settings
Monthly Report for Trail Managers run on Sunday 1st of December 2019
Note that results based on small sample sizes (less than n=30) should be treated as indicative and not conclusive.
Range :
Survey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)
Twin Coast last 12 months :
Organisation Name <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://twincoastcycletrail.kiwi.nz/wp-content/uploads/2020/09/pou-herenga-tai-twin-coast-cycle-trail_dashboard-report_01-12-2019.pdf\n</url>\n<text>\nReport Based On The Following Settings\n\nMonthly Report for Trail Managers run on Sunday 1st of December 2019\n\nNote that results based on small sample sizes (less than n=30) should be treated as indicative and not conclusive.\n\nRange :\n\nSurvey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)\n\nTwin Coast last 12 months :\n\nOrganisation Name <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": ": Is equal to 'Pou Herenga Tai Twin Coast Cycle Trail'\n\nSurvey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)\n\nAll Trails last 12 Months :\n\nSurvey Completion Date : Is between 12 months ago on the first day of the month (01/12/2018) and the last day of last month (30/11/2019)\n\nTwin Coast last month :\n\nOrganisation Name : Is equal to 'Pou Herenga Tai Twin Coast Cycle Trail'\n\nSurvey Completion Date : Is between the first day of last month (01/11/2019) and the last day of last month (30/11/2019)\n\nAll trails last month :\n\nSurvey Completion Date : Is between the first day of last month (01/11/2019) and the last day of last month (30/11/2019)\n\nNet Promoter Score©\n\nSample Size: Twin Coast last 12 months 221 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)\n\n| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |\n|---|---|---|---|\n| Net Promoter Score© | 57 | 72 | 44 |\n\nNet Promoter Score©\n\nSample Size: Twin Coast last 12 months 221 / 222 (100%) | All Trails last 12 Months 4289 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)\n\nOverall Satisfaction (1=very dissatisfied and 10=very satisfied)\n\nSample Size: Twin Coast last 12 months 218 / 222 (98%) | All Trails last 12 Months 4285 / 4290 (100%) | Twin Coast last month 16 / 16 (100%) | All trails last month 279 / 279 (100%)\n\n| | TWIN COAST LAST 12 MONTHS | ALL TRAILS LAST 12 MONTHS | TWIN COAST LAST MONTH |\n|---|---|---|---|\n| Overall Satisfaction | 8.",
"role": "assistant"
}
] |
|
Brain Injury Alliance of New Jersey
Article Library
Veterans' Issues
Acquired Brain Injury Resources
Alcohol Related Brain Injury
Wernicke-Korsakoff Syndrome
Anoxia
Anoxic Brain Injury
Anoxic-Hypoxic Brain Injury (BIAQ)
Anoxic Encephalopathy
Hypoxic-Anoxic Brain Injury
Brain Tumor
Brain Tumor Resources Coping with your Loved One's Brain Tumor Essential Guide to Brain Tumors Financial Assistance (American Brain Tumor Association) Life After Brain Tumor My Name is Buddy Understanding and Coping With Your Child's Brain Tumor
Stroke
Stroke (BIAQ)
Stroke Resources
Alternative Treatments
Alternative Medicines
Animal Assisted Therapy
Hippotherapy Lists
Nutritional Tips to Speed Recovery
Pets as Therapy
Role of Mindfulness, Meditation and Prayer After Brain Injury
Service Dog Providers in New Jersey
Sound Medicine—Music Therapy
Why Aquatic Therapy
Assistive Technology
Assistive Technology and Special Education
Assistive Technology Evaluations
Assistive Technology for Individuals with Cognitive & Psychiatric Disabilities
Assistive Technology for Individuals with Traumatic Brain Injury
Assistive Technology for Students with Brain Injury
Assistive Technology Resources in NJ
Case Studies in Adaptive Technology for People with Brain Injury
Family Guide to Assistive Technology
Home Modifications
Acquired Brain Injury
How to Match a PWBI with Assistive Technology Supports
Life-Changing iPad and iPhone Apps for PWBI
Life-Changing Android Apps for PWBI
Vehicle Modifications
Caregiver and Family Issues
Other Family Issues
Changes in Relationships for Families and Couples
Emotional Problems Experienced by Families
Holding a Family Meeting
Letting Go- Steps to Independence
My Adult Child Has Brain Injury
My Friend or Extended Family Member Has Brain Injury
Parenting After Brain Injury
Sexuality is a Family Matter
Support Groups Can Make a Difference for the Entire Family
The Family and Medical Leave Act
Understanding Family Issues
Your Workplace Rights When an Immediate Family Member Suffers TBI
Siblings and Children of PWBIs
Brothers and Sisters: Brain Injury is a Family Affair
Caring for Young Children
Helping Brothers and Sisters
How to Talk to Children about Brain Injury
I Know a Child Who Has a Family Member with Brain Injury
Recovering from Head Injury: A Guide for Kids
Siblings and Brain Injury
Skills for Caregiving
Advocacy Tips for Family Caregivers
Caring for Adults with Cognitive and Memory Impairments
Coping Effectively with Loss and Change—A Guide for Families and Friends
Guide to Improving Doctor / Caregiver Communications
Paying the Bills (Checklist for Success)
Spouses and Partners of PWBIs
Couples: Hope and Intimacy After Brain Injury
Healing Your Marriage After Brain Injury
Well Spouse Foundation
Stress Management
Caregiving and Ambigious Loss
Caregiving and Depression
Compassion Fatigue
Focus on What You Can Control (Checklist for Success)
Mom to Mom Helpline Program
Stress Management Following Brain Injury: Strategies for Families & Caregivers Take Care of Yourself
Coma
Coma Guide for Caregivers
Coma or Reduced Level of Awareness?
Coma Stimulation
Facts about the Vegetative and Minimally Conscious States After Brain Injury
Interacting with Persons who are Confused and Agitated
Locked-In Syndrome: Advances in Communication Spur Rehabilitation
Community Reintegration
Brain Injury, When the Call Comes: A Congregrational Guide (BIANJ booklet)
Driving after Brain Injury: Issues, Obstacles, and Possibilities
Friends and Families—Rebuilding Social Networks after BI
Helping Your Family Member Live Independently
How and Where Can I Meet New Friends or People to Date?
Making Life Work: A Family Guide for Life at Home (BIANJ booklet)
Overcoming Loneliness and Building Lasting Relationships
Tips for Successful Communication (BIANJ fact sheet)
What Happens to Relationships after Brain Injury?
What I Really Want is a Girlfriend: Meaningful Social Interaction after TBI
What to Tell People About Your Injury
When They Don't Believe You Have a Brain Injury
Community Support Services
Centers for Independent Living
Atlantic / Cape May CIL
Bergen / Hudson CIL
Burlington CIL
Camden City CIL
Camden / Gloucester CIL
Cape May / Cumberland / Salem CIL
Essex / Passaic CIL
Hunterdon / Mercer CIL
Middlesex / Somerset / Union CIL
Monmouth / Ocean CIL
Morris / Sussex / Warren CIL
NJ Statewide Independent Living Council
Home Health and Personal Assistance
Hiring In-Home Help
Home Care: A Family Caregiver's Guide
Making It Work With a Little Help
NJ Home Care Member Directory (book)
Personal Assistance Services Program
Respite—A Gift of Time
Respite Providers / Lists
Statewide Respite Care Program
When Home Care Ends: A Family Caregiver's Guide
Supported Living
Assisted Living and Supportive Housing
Community Care Options
Consequences of Brain Injury
Behavior- Anger and Aggression
Irritability and Anger Neurological Illness and Anger Preventing and Managing Anger Responding to Angry Behavior
Behavior- Depression and Anxiety
Anxiety and Brain Injury
Depression After Brain Injury
Depression And Brain Injury
Behavior- General
Behavior Changes and Brain Injury
Behavioral Challenges after Brain Injury (BIANJ booklet)
Denial
Disinhibited and Inappropriate Sexual Behavior
Emotional Lability
Impulsive Behavior
Long-Term Psychosocial Problems
Medication Non-Compliance
Medications and Behavior
Neuroanatomy of Behavior after Brain Injury
Stress and Brain Injury
Behavior- Treatment
Behavior Guidelines
Giving Feedback About Behavior
How to Clean Up Stinking Thinking and Cope Better with Negative Emotions
Positive Interactions after Brain Injury
Positive Ways to Manage Behavior
Understanding Your Emotions
Cognition / Memory
Am I Nothing But What I Remember?
Cognitive Fatigue
Effects of Brain Injury on Sensory and Perceptual Skills
Impaired Self Awareness Fatigue and Lack of Motivation Fatigue and Overload Insight and Self-Awareness Memory and Learning Motivation and Initiation Summary of Cognitive Effects of Brain Injury Topographic Disorientation Understanding Egocentricity
Hearing
ASL Interpreter Referral Service Assistive Listening Technology Loan Program Deafness and Hearing Loss Hearing Problems NJ Division of the Deaf and Hard of Hearing Recognizing and Evaluating Head Injury Associated Hearing Loss SPAN Directory of Resources for Deaf and Hard of Hearing Students
Other Medical
Anosmia
Dizziness
Balance and Vestibular Issues
Dealing with Pain and Brain Injury
Getting A Good Night's Sleep
Headaches after TBI
Imbalance: Ask the Doctor
Long-Term Medical Problems
Pain Assessment in the Nonverbal Patient
Post-Traumatic Headaches and Brain Injury (Road to Rehab Series)
Sensory Hypersensitivity
Sleep Disorders
Spasticity Management (Road to Rehab Series)
TBI and Associated Fatigue
Psychiatric
Can Traumatic Brain Injury Cause Psychiatric Disorders?
Neurobehavioral Sequelae of TBI Evaluation and Treatment
Panic Attacks
Post-Traumatic Stress
Psychiatric Problems after Brain Injury ("Ask the Doctor")
PTSD—National Center for PTSD Information
Suicide and Brain Injury
Seizures
A Closer Look: Seizures
Epilepsy as a Consequence of Brain Injury
Medical Issues: Seizures
Speech
Aphasia: When Speech is Lost
Communication Problems
Educating Others About Slurred Speech
Questions about Speech and Communication after Brain Injury
Social Communication after TBI
Speech, Language and Brain Injury (Road to Rehab Series)
Strategies to Make Your Speech Clearer
Vision
Commission for the Blind and Visually Impaired
Vision and Rehabilitation after Brain Trauma
Vision is Our Dominant Sense
Visual and Perceptual Problems After a Brain Injury
Visual Disorders
DDD
DDD: An Overview of Services (COSAC) DDD Circular on Determination of Eligibility Obtaining Residential Services from DDD Options in Achieving Medicaid Eligibility
Education
BIANJ Educator Guide for Educators (BIANJ booklet)
BIANJ Educator Guide for Families (BIANJ booklet)
BIANJ Educator Guide for Nurses (BIANJ booklet)
TBI and NJ Special Education (BIANJ factsheet)
Accommodations and Strategies
Brain Injury Quick Guide for School Staff
Effective Teaching Strategies
Feeling Safe at School: How New Technologies Can Help
Integration of Neuropsychology in Educational Planning Following TBI
Planning Healthcare for Children with TBI in School
Return to Learn After Concussion
School Accommodations for Students with BI
SPAN Brochure: Related Services
TBI and Teens: Info for School Administrators
Teaching Strategies for Students with BI
Accommodations for Students with Disabilities
Therapies in School
Behavior / Communication Problems and School
Behavioral Challenges in Children: Linking School and Home
Handle With Care: School Integration: Addressing Behavior Needs of Children Following BI
Managing Challenging Behaviors in the Classroom
Evaluations and Assessments
A Parent's Guide to Neuropsych Evaluations
Neuropsych Assessment and Schools
Requesting an Independent Evaluation
What is a Functional Behavioral Assessment of my Child
What is needed for a TBI School Evaluation and who should evaluate?
IEP, 504, Special Education Code
Developing Your Child's IEP
Here's What You Need To Know Before Your Child's Next IEP Meeting
Parent's Guide to Assessing the IEP For Students With Brain Injury
Understanding ADA and Section 504
What are IDEA and Section 504?
Parent / Educator Collaboration and Conflict
Parental Rights in Special Education
Problem Solving with Your School District
SPAN Brochure: Your Child's Records
Special Education Mediation A Guide for Parents
Post-Secondary Info
College Funding for Students with Disabilities
Community Colleges and Students with Disabilities
Going the Distance: Pursuing Post-Secondary Education after a TBI
Learning Support Accommodations for College: What Parents Need to Know
Non-Degree Postsecondary Options For Individuals with Disabilities
Overview of Health Care Options for College Transitions
There are No IEPs in College
Young Adults with Brain Injury and College
Resources for Parents
SPAN Brochure: Overview of Services
School Nurses: A Valuable Resource Following BI
Transition Planning
Know Your Rights Transition Planning
Planning School Transitions for Students with BI
Preparing for Life After High School (BIANJ booklet)
School to Work: Moving from Adolescence to Adulthood
Transition Services: Bridge between Adolescence and Young Adulthood
Transition to Adult Healthcare (Boggs Center booklet)
Employment
Employer and Professional Info
Accommodations and Compliance for Employees with Brain Injury
Brain Injury Handbook: Intro to BI for Voc Rehab Professionals
Information gathering guide for job coaches
Job Accommodations for People with Brain Injury
Job Accommodations for People with Executive Functioning Deficits
Returning to Work after Brain Injury—A Strategy Guide for Job Coaches (BIANJ booklet)
Understanding Brain Injury—A Guide for Employers
Working Effectively With Employees Who Have Sustained A Brain Injury
Family and PWBI Info
Challenges to Working after Brain Injury and How to Overcome Them
Checklist for Thinking (or Rethinking) about Employment
Dos and Don'ts of Disclosure
Employee Rights in the Workplace
Employment After Traumatic Brain Injury
Entering or Re-entering the Workplace after Brain Injury
Job search process
Volunteering—Everybody Can Be Great
Services
NJ Work Ability: Health Coverage That Works With You
NJ Work Incentive Network Support (NJWINS)
Ticket to Work and Self-Sufficiency Program
Financial Assistance
Catastrophic Illness in Children Relief Fund
Childrens' Emergency Medical Fund
Disabled Childrens Relief Fund
Financial Assistance and Debt Crisis Intervention
Get Well, Spend Less - Patient Assistance Programs
Living Through A Layoff
Low Income Home Energy Assistance Program (LIHEAP)
NJ Pediatric Patients Charitable Trust Fund
NJ Shares
PAAD, Lifeline, HAAAD
Prescription Assistance Programs in New Jersey
Sources of Funding (BIANJ factsheet)
Housing
Easy Access Housing—Accessible Housing Checklist
Housing Information Sheet
Foreclosure Fast Facts from the NJ Housing and Mortgage Finance Agency
Housing and Mortgages for People with Disabilities
Predatory Lending Practices—Risk of Foreclosure
How to Choose Fact Sheets (Not in File Library)
Attorney Fact Sheet
Day Rehabilitation Facility Fact Sheet
Inpatient Rehabilitation Facility Fact Sheet
Long Term Residential Fact Sheet
Neurologist Fact Sheet
Neuropsychiatrist Fact Sheet
Neuropsychologist Fact Sheet
Nursing Home Fact Sheet
Outpatient Rehabilitation Fact Sheet
Primary Care Physician Fact Sheet
Hospitalization
Acute Brain Injury Guide (BIANJ booklet)
Charity Care Factsheet
Dealing With Doctors
In The Hospital
Post-Traumatic Amnesia
The First Few Days (Checklist for Success)
When Your Loved One is Hospitalized
Rehabilitation
Family Role in Rehabilitation
Guide to Selecting and Monitoring Rehabilitation Services
How You Can Help with Recovery: A Guide for Family and Friends
Inpatient Rehabilitation
Management of Behavioral Problems During Acute Rehab
Planning for Inpatient Rehab Services
Planning for Rehabilitation (Checklist for Success)
Preparing for Home
Rehabilitation Basics
Selecting a Rehabilitation Facility
The Role of the Social Worker in Discharge Planning (BIANJ factsheet)
Understanding the Rehabilitation Process (BIANJ factsheet)
Legal
Attorney-Client Partnership
Do We Need An Attorney?
Guide to Selecting Legal Representation for Brain Injury
Selecting a Neurolawyer
What Are an Attorney's Obligations When a Client Has Had a Brain Injury?
Brain Injury Litigation
Brain Injury Ligitation: A Guide for Individuals with TBI and Families
Closer Look: TBI and Personal Injury Litigation
Inpatient Care
Competency and Brain Injury Independent Medical Examination: Ask the Doctor Psychological Syndromes in TBI Ligitation Recovering Compensation for Pediatric TBI Role of Neuropsychologists in Brain Injury Ligitation
General Information
NJ Court Access for the Disabled Public Benefits in the Context of Divorce Understanding the ADA Welfare Application Appeal Rights Welfare Application Rights
Guardianship
Emancipation and Guardianship in NJ
Guardianship and Alternatives
Guardianship and Surrogacy for Persons with Brain Injury (GANJI)
Guardianship Association of NJ
Guardianship Services of NJ
Guardianship through the Division of Developmental Disabilities
Power of Attorney, Guardianship and Representative Payee
Healthcare
Appealing a Denial of Benefits from Managed Care
Avoid Insult to Brain Injury
Before COBRA Ends
Custodial Care—An Unforeseen Emergency for Patients with TBIs
Guide to Finding Health Insurance Coverage
Health Care Access for Immigrants and Refugees
Help I Am Uninsured
How to Discuss the Costs of Healthcare Treatments with Your Provider
Interpreting Your Explanation of Benefits
Living Wills and Health Care Proxies
LSNJ Health Care Access Project
Managing Benefits When Moving to New Jersey from Another State
NJ's Charity Care Program—Finding the Answers
Paying the Bills: Health Insurance, Disability Pay, and Attorneys
Planning for the Future: The Importance of Advance Directives
Second Opinions: Know Your Rights and Options
TBIs: Challenging HMO Guidelines—Are Patients Powerful or Powerless?
Your Guide to the Insurance Appeal Process
Legal Service Organizations
Community Health Law Project
Developmentally Disabled Offenders' Project (ARC of NJ)
Disability Rights of New Jersey
Free and Low Cost Legal Services and Advocate Services
Legal Services of NJ
Office of Civil Rights of NJ
Trusts and Future Planning
Five Things to Consider When Setting Up a Special Needs Trust
How Structured Settlements Protect Your Financial Future
Legal Considerations in Planning for Individuals with Disabilities
Special Needs Trusts to Safeguard Disability Benefits in Personal Injury and Divorce Settlements
Long Term Planning
20 Common Nursing Home Problems—And How to Resolve Them
Consumers' Guide to Medicaid Planning and Division of Assets
Hard Choice: Choosing Residential Care
Having the Conversation About Long Term Care
List of PLAN NJ Affiliated Professionals
Long-Term Placement Considerations
Nursing Homes
Planned Lifetime Assistance Network (PLAN/NJ)
Planning for the Future Starts Today
Residential Care Options
When Short-Term Rehab Turns Into A Long-Term Stay
Medicaid
LogistiCare Transportation
Medicaid in New Jersey Fact Sheet
Your Guide to Making Medicaid Managed Care Work for You (Boggs Center booklet)
What You Need to Know About Applying for Medical Assistance
When You Have Medicaid and Other Insurance
Medicare
Medicare (Booklet from SSA)
Medicare Beneficiaries Outreach and Assistance
SHIP—Statewide Health Insurance Program
Your Medicare Managed Care Grievance and Appeal Rights
Mental Health
Family Crisis Handbook
Mental Health Association of New Jersey
NAMI New Jersey
NJ Child Behavioral Health Services
Reaching Out to Your Local Crisis Center After a Brain Injury
Selected Listing of NJ Mental Health Resources
Using Community Mental Health Centers
What Families Need to Know About Community Mental Health Centers
Mild Brain Injury
Cervicogenic Post Concussion Disorder
Coping with Mild TBI: Finances
Headsmart Handbook: Understanding Concussions for Return to School
How Can Parents Educate Their Childrens' Coaches About Concussion?
Mild Head Injury and Posttraumatic Headache
Mild TBI Factsheet
Persistent Post-Concussive Syndrome
Physiological Post Concussion Disorder
Psychologists in Concussion Clinics
Recovering from Mild TBI: A Resource Guide
Repeated MBI - Myths and New Directions
Road to Rehab Series: Journey Towards Understanding—Concussion and Mild Brain Injury
Second Impact Syndrome
Sports Concussions
Vestibular and Ocular Issues in Concussion Assessment
Neuropsychology
Clinical Neuropsychology Guide for Patients and Families
Neuropsychological Assessment of ABI: Emphasis on Changes of Self-Definition and Experience
Neuropsychologist as Psychologist, (The)
Screening for Substance Abuse as Part of the Neuropsychological Assessment
The Specifics of Neuropsych Tests
Pediatrics
Adolescence
Double Trouble: Substance Abuse and TBI in Youth
Emerging Sexuality—Parents Guide
Legal Issues
Risk-Taking Behaviors in Adolescents with Brain Injury
Social Cognition and Judgment in Adolescents
Substance Abuse
Behavior
Breaking the Law—Parents Guide Diagnosing Pediatric Post-Injury Behavior Behavior after Brain Injury
Early Intervention
Family Rights in NJ's Early Intervention NJ's Early Intervention System FAQ
General Information
Augmentative Communication Building Social Skills—Parents Guide
Children and Brain Injury
Coma
Communication: How Communication Changes Over Time
Disability Pay and Health Insurance for Children
Helping Brothers and Sisters
Keeping Children Safe
Language and Living Skills—Parents Guide
Medication Management in a Child / Adolescent with Brain Injury
Meds After Brain Injury
Pediatric Neuropsychology
Promoting Your Family's Well-Being—Parents Guide
Reactions and Responses—Parents Guide
Resources for Parents of Children with Brain Injury
Setting Up The Home
Summer Recreation Activities for Children and Adolescents
Teaching Social Skills to Children with Brain Injury
The Early Days—Parents Guide
When Your Child Has a Brain Injury: Myths and Facts
Your Child's Development—Parents Guide
Professionals Helping Families
Helping Families Cope
Right to Know: Educating Parents with a Child Has a Brain Injury
Talking with Parents
Rehabilitation
Early Recovery Guidelines for Families Roles of the Family in the Ongoing Recovery of their Child When the Very Young Child is Injured
Shaken Baby Syndrome
National Information, Support, and Referral Service on Shaken Baby Syndrome
Shaken Baby Syndrome: The Facts and Hard Realities
Prevention
Falls and Traumatic Brain Injury: The Basics
Playground Safety for Your Child with Special Needs
Sports Injury Prevention—American Football
Sports Injury Prevention—Baseball and Softball
Sports Injury Prevention—Ice Hockey
Sports Injury Prevention—Soccer
Recreation
Accessible Facilities—NJ State Park Service
Recreation and Leisure Services for Individuals with Disabilities
Summer Recreational Activities for Children and Adolescents with Brain Injury
Therapeutic Riding Directory
Vacations for Persons with Disabilities
Very Special Arts of New Jersey
Cognitive and Functional Rehabilitation
Be Your Own Best Friend
Building Routines
Cognitive Exercises
Cognitive Rehabilitation: Help for Attention, Memory, and Other Problems with Thinking
Creative Therapy—Relevance
Denial of Cognitive Rehab Claim Overturned
Evidence-Based Cognitive Rehabilitation
Home Cognitive Stimulation Program
Insurance Coverage of Cognitive Rehabilitation
Memory Strategies After Brain Injury
Role of Processing Speed in Brain Injury Recovery
Emotional Aspects of Recovery
Adjusting to Traumatic Brain Injury—The Role of a "Sense" of Self After Brain Injury, Telling Your Story: A Journaling Workbook Emotional Stages of Recovery How To Tell Your Story How Well Will My Survivor Recover? Nurturing Your Sense of Self Positive Approach to Coping with Life after Brain Injury Self-Esteem After Brain Injury
General Information
Mapping the Way—Drug Therapy and Brain Injury Maximal Medical Improvement Neurotechnology for Brain Injury Post-Rehabilitation Recovery Physical Therapy Recovering from Brain Injury—A Continual Process The Post Rehab Slump When Will I Recover?
Self-Advocacy
Dealing Effectively with Your Doctor
Dealing with Doctors
How to Be Your Own Brain Injury Case Manager
How to Find What You Need
Rehabilitation
Seniors
Aging and Brain Injury
Aging and the Behavioral Problems of Brain Injury
Statewide Benefits for Older Persons (NJDHSS)
TBI and Older Adults
Sexuality
Adolescents with Brain Injury: Issues of Sexuality
Coping with Sexual Problems after TBI
Disruption of Sexuality Following a Head Injury
Sexual Changes
Social Security
Appeals Process
Benefits for Children
Figuring Out Social Security Benefits After a TBI
How We Decide if You Are Still Disabled
How Workers Compensation and Other Disability Payments May Affect Your Benefits
NJWINS Brochure
Reviewing Your Disability
Social Security Disability and SSI Claims: Your Need for Representation
Social Security Disability: Determination and Review Regarding TBI
What You Should Know Before You Apply for SSD Benefits
When a Representative Payee Manages Your Money
You May Be Able to Get SSI
Your Guide to the Disability Process
Your Right to Question the Decision to Stop Your Disability Benefits
Your Right to Representation
Spanish
Consequences of Brain Injury
Aphasia
Emotional Problems and Brain Injury
Fatigue and Brain Injury
Head Injuries
Personality Changes Following Acquired Brain Injury
General Information
Alcohol and Brain Injury
Brain Injury—Discharge
Brain Injury and Substance Abuse
Cerebral Hypoxia
Disability Rights New Jersey
Medicaid Managed Care (Boggs Center booklet)
One-Stop Career Center
Return to Work—A Personal Perspective
Right Hemisphere Lesions
Selecting a Neurolawyer
Social Security Information
Stroke
Traumatic Brain Injury Factsheet
What is a Coma?
What is a Support Group?
What You Should Know About Minor Head Injury
Pediatrics
Benefits for Children with Disabilities (Social Security Administration)
Concussion in Sports
New Jersey's Early Intervention System FAQ
Sports Concussion in High School—Facts for Coaches
Sports Concussion in High School—Facts for Parents
What is Shaken Baby Syndrome?
Prevention
BIAA Prevention Fact Sheets
Helmets for Children: A Guide for Parents
How to Prevent Brain Injury
Preventing Concussion
Rehabilitation
Guide to Selecting and Monitoring Brain Injury Rehabilitation Services
Journey Towards Recovery: A Guide for Families
Road to Rehab (entire booklet)
Road to Rehab, Part 1: Pathways to Comfort: Dealing with Pain & Brain Injury
Road to Rehab, Part 2: Highways to Healing: Post-Traumatic Headaches & Brain Injury
Road to Rehab, Part 3: Guideposts to Recognition: Cognition, Memory & Brain Injury
Road to Rehab, Part 4: Navigating The Curves: Behavior Changes & Brain Injury
Road to Rehab, Part 5: Crossing the Communication Bridge: Speech, Language & Brain Injury
Road to Rehab, Part 6: Mapping the Way: Drug Therapy & Brain Injury
Road to Rehab, Part 7: Traveling Toward Relief: Dealing with Spasticity & Brain Injury
Road to Rehab, Part 8: Journey Toward Understanding: Concussion & Mild Brain Injury
Special Education
Education Law Center Special Education Guide
Know Your Rights—Transition Planning
Mediation in Special Education—A Guide for Parents
Neuropsychological Assessment and Schools
NICHCY Factsheet on Brain Injury
Planning School Transitions for Students with TBI
Transition to Adult Healthcare (Boggs Center booklet)
Statistics (Not in File Library)
Brain Injury Fact Sheet (BIANJ factsheet)
TBI Incidence Fact Sheet (BIANJ factsheet)
Substance Abuse
Alcohol Use After TBI
Brain Injury / Addictive Disorders: 12-Step Workbook
Denial of Substance Abuse: Symptom of Brain Injury
Family Guide to Use of Alcohol and Other Substances after Brain Injury
Substance Abuse Issues after TBI
Substance Abuse Treatment Advisory: Treating Clients with TBI
Substance Abuse Treatment for People with Disabilities (Treatment Improvement Protocol)
Treating Substance Abuse in Individuals with TBI
User's Manual (Ohio Valley Center)
Transportation
NJ Access Link Passenger Guidelines
NJ Guide to Handicapped Parking
NJ MVC Medical Review Guidelines
NJ Transit: Guide to Accessible Services
People with Disabilities Find a Ride Online
Transportation Options for People with Brain Injury (BIANJ factsheet)
Veterans' Issues
Brain Injuries Can Range from Loss of Coordination to Loss of Self
Community Justice Center
Defense and Veterans Brain Injury Center
Disability Benefits for Wounded Warriors
Resources for Wounded Service Members and their Families
Understanding Post-Deployment Stress Symptoms
Veterans Health Care Benefits Overview
War on the Brain
|
<urn:uuid:a38768bd-6cdf-46e9-9ec1-367bab1033ef>
|
CC-MAIN-2017-17
|
http://bianj.org/wp-content/uploads/2016/06/article-library-table-of-contents.pdf
|
2017-04-26T02:17:52Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121121.5/warc/CC-MAIN-20170423031201-00381-ip-10-145-167-34.ec2.internal.warc.gz
| 48,503,604
| 5,546
|
eng_Latn
|
eng_Latn
| 0.807417
|
eng_Latn
| 0.831105
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
70,
1360,
2996,
4652,
5949,
7334,
8957,
10770,
12509,
13992,
15819,
17436,
18969,
20637,
22024,
23422,
25294,
26509
] |
Brain Injury Alliance of New Jersey
Article Library
Veterans' Issues
Acquired Brain Injury Resources
Alcohol Related Brain Injury
Wernicke-Korsakoff Syndrome
Anoxia
Anoxic Brain Injury
Anoxic-Hypoxic Brain Injury (BIAQ)
Anoxic Encephalopathy
Hypoxic-Anoxic Brain Injury
Brain Tumor
Brain Tumor Resources Coping with your Loved One's Brain Tumor Essential Guide to Brain Tumors Financial Assistance (American Brain Tumor Association) Life After Brain Tumor My Name is Buddy Understanding and Coping With Your Child's Brain Tumor
Stroke
Stroke (BIAQ)
Stroke Resources
Alternative Treatments
Alternative Medicines
Animal Assisted Therapy
Hippotherapy Lists
Nutritional Tips to Speed Recovery
Pets as Therapy
Role of Mindfulness, Meditation and Prayer After Brain Injury
Service Dog Providers in New Jersey
Sound Medicine—Music Therapy
Why Aquatic Therapy
Assistive Technology
Assistive Technology and Special Education
Assistive Technology Evaluations
Assistive Technology for Individuals with Cognitive & Psychiatric Disabilities
Assistive Technology for Individuals with Traumatic Brain Injury
Assistive Technology for Students with Brain Injury
Assistive Technology Resources in NJ
Case Studies in Adaptive Technology for People with Brain Injury
Family Guide to Assistive Technology
Home Modifications
Acquired Brain Injury
How to Match a PWBI with Assistive Technology Supports
Life-Changing iPad and iPhone Apps for PWBI
Life-Changing Android Apps for PWBI
Vehicle Modifications
Caregiver and Family Issues
Other Family Issues
Changes in Relationships for Families and Couples
Emotional Problems Experienced by Families
Holding a Family Meeting
Letting Go- Steps to Independence
My Adult Child Has Brain Injury
My Friend or Extended Family Member Has Brain Injury
Parenting After Brain Injury
Sexuality is a Family Matter
Support Groups Can Make a Difference for the Entire Family
The Family and Medical Leave Act
Understanding Family Issues
Your Workplace Rights When an Immediate Family Member Suffers TBI
Siblings and Children of PWBIs
Brothers and Sisters: Brain Injury is a Family Affair
Caring for Young Children
Helping Brothers and Sisters
How to Talk to Children about Brain Injury
I Know a Child Who Has a Family Member with Brain Injury
Recovering from Head Injury: A Guide for Kids
Siblings and Brain Injury
Skills for Caregiving
Advocacy Tips for Family Caregivers
Caring for Adults with Cognitive and Memory Impairments
Coping Effectively with Loss and Change—A Guide for Families and Friends
Guide to Improving Doctor / Caregiver Communications
Paying the Bills (Checklist for Success)
Spouses and Partners of PWBIs
Couples: Hope and Intimacy After Brain Injury
Healing Your Marriage After Brain Injury
Well Spouse Foundation
Stress Management
Caregiving and Ambigious Loss
Caregiving and Depression
Compassion Fatigue
Focus on What You Can Control (Checklist for Success)
Mom to Mom Helpline Program
Stress Management Following Brain Injury: Strategies for Families & Caregivers Take Care of Yourself
Coma
Coma Guide for Caregivers
Coma or Reduced Level of Awareness?
Coma Stimulation
Facts about the Vegetative and Minimally Conscious States After Brain Injury
Interacting with Persons who are Confused and Agitated
Locked-In Syndrome: Advances in Communication Spur Rehabilitation
Community Reintegration
Brain Injury, When the Call Comes: A Congregrational Guide (BIANJ booklet)
Driving after Brain Injury: Issues, Obstacles, and Possibilities
Friends and Families—Rebuilding Social Networks after BI
Helping Your Family Member Live Independently
How and Where Can I Meet New Friends or People to Date?
Making Life Work: A Family Guide for Life at Home (BIANJ booklet)
Overcoming Loneliness and Building Lasting Relationships
Tips for Successful Communication (BIANJ fact sheet)
What Happens to Relationships after Brain Injury?
What I Really Want is a Girlfriend: Meaningful Social Interaction after TBI
What to Tell People About Your Injury
When They Don't Believe You Have a Brain Injury
Community Support Services
Centers for Independent Living
Atlantic / Cape May CIL
Bergen / Hudson CIL
Burlington CIL
Camden City CIL
Camden / Gloucester CIL
Cape May / Cumberland / Salem CIL
Essex / Passaic CIL
Hunterdon / Mercer CIL
Middlesex / Somerset / Union CIL
Monmouth / Ocean CIL
Morris / Sussex / Warren CIL
NJ Statewide Independent Living Council
Home Health and Personal Assistance
Hiring In-Home Help
Home Care: A Family Caregiver's Guide
Making It Work With a Little Help
NJ Home Care Member Directory (book)
Personal Assistance Services Program
Respite—A Gift of Time
Respite Providers / Lists
Statewide Respite Care Program
When Home Care Ends: A Family Caregiver's Guide
Supported Living
Assisted Living and Supportive Housing
Community Care Options
Consequences of Brain Injury
Behavior- Anger and Aggression
Irritability and Anger Neurological Illness and Anger Preventing and Managing Anger Responding to Angry Behavior
Behavior- Depression and Anxiety
Anxiety and Brain Injury
Depression After Brain Injury
Depression And Brain Injury
Behavior- General
Behavior Changes and Brain Injury
Behavioral Challenges after Brain Injury (BIANJ booklet)
Denial
Disinhibited and Inappropriate Sexual Behavior
Emotional Lability
Impulsive Behavior
Long-Term Psychosocial Problems
Medication Non-Compliance
Medications and Behavior
Neuroanatomy of Behavior after Brain Injury
Stress and Brain Injury
Behavior- Treatment
Behavior Guidelines
Giving Feedback About Behavior
How to Clean Up Stinking Thinking and Cope Better with Negative Emotions
Positive Interactions after Bra
|
in Injury
Positive Ways to Manage Behavior
Understanding Your Emotions
Cognition / Memory
Am I Nothing But What I Remember?
|
Cognitive Fatigue
Effects of Brain Injury on Sensory and Perceptual Skills
Impaired Self Awareness Fatigue and Lack of Motivation Fatigue and Overload Insight and Self-Awareness Memory and Learning Motivation and Initiation Summary of Cognitive Effects of Brain Injury Topographic Disorientation Understanding Egocentricity
Hearing
ASL Interpreter Referral Service Assistive Listening Technology Loan Program Deafness and Hearing Loss Hearing Problems NJ Division of the Deaf and Hard of Hearing Recognizing and Evaluating Head Injury Associated Hearing Loss SPAN Directory of Resources for Deaf and Hard of Hearing Students
Other Medical
Anosmia
Dizziness
Balance and Vestibular Issues
Dealing with Pain and Brain Injury
Getting A Good Night's Sleep
Headaches after TBI
Imbalance: Ask the Doctor
Long-Term Medical Problems
Pain Assessment in the Nonverbal Patient
Post-Traumatic Headaches and Brain Injury (Road to Rehab Series)
Sensory Hypersensitivity
Sleep Disorders
Spasticity Management (Road to Rehab Series)
TBI and Associated Fatigue
Psychiatric
Can Traumatic Brain Injury Cause Psychiatric Disorders?
Neurobehavioral Sequelae of TBI Evaluation and Treatment
Panic Attacks
Post-Traumatic Stress
Psychiatric Problems after Brain Injury ("Ask the Doctor")
PTSD—National Center for PTSD Information
Suicide and Brain Injury
Seizures
A Closer Look: Seizures
Epilepsy as a Consequence of Brain Injury
Medical Issues: Seizures
Speech
Aphasia: When Speech is Lost
Communication Problems
Educating Others About Slurred Speech
Questions about Speech and Communication after Brain Injury
Social Communication after TBI
Speech, Language and Brain Injury (Road to Rehab Series)
Strategies to Make Your Speech Clearer
Vision
Commission for the Blind and Visually Impaired
Vision and Rehabilitation after Brain Trauma
Vision is Our Dominant Sense
Visual and Perceptual Problems After a Brain Injury
Visual Disorders
DDD
DDD: An Overview of Services (COSAC) DDD Circular on Determination of Eligibility Obtaining Residential Services from DDD Options in Achieving Medicaid Eligibility
Education
BIANJ Educator Guide for Educators (BIANJ booklet)
BIANJ Educator Guide for Families (BIANJ booklet)
BIANJ Educator Guide for Nurses (BIANJ booklet)
TBI and NJ Special Education (BIANJ factsheet)
Accommodations and Strategies
Brain Injury Quick Guide for School Staff
Effective Teaching Strategies
Feeling Safe at School: How New Technologies Can Help
Integration of Neuropsychology in Educational Planning Following TBI
Planning Healthcare for Children with TBI in School
Return to Learn After Concussion
School Accommodations for Students with BI
SPAN Brochure: Related Services
TBI and Teens: Info for School Administrators
Teaching Strategies for Students with BI
Accommodations for Students with Disabilities
Therapies in School
Behavior / Communication Problems and School
Behavioral Challenges in Children: Linking School and Home
Handle With Care: School Integration: Addressing Behavior Needs of Children Following BI
Managing Challenging Behaviors in the Classroom
Evaluations and Assessments
A Parent's Guide to Neuropsych Evaluations
Neuropsych Assessment and Schools
Requesting an Independent Evaluation
What is a Functional Behavioral Assessment of my Child
What is needed for a TBI School Evaluation and who should evaluate?
IEP, 504, Special Education Code
Developing Your Child's IEP
Here's What You Need To Know Before Your Child's Next IEP Meeting
Parent's Guide to Assessing the IEP For Students With Brain Injury
Understanding ADA and Section 504
What are IDEA and Section 504?
Parent / Educator Collaboration and Conflict
Parental Rights in Special Education
Problem Solving with Your School District
SPAN Brochure: Your Child's Records
Special Education Mediation A Guide for Parents
Post-Secondary Info
College Funding for Students with Disabilities
Community Colleges and Students with Disabilities
Going the Distance: Pursuing Post-Secondary Education after a TBI
Learning Support Accommodations for College: What Parents Need to Know
Non-Degree Postsecondary Options For Individuals with Disabilities
Overview of Health Care Options for College Transitions
There are No IEPs in College
Young Adults with Brain Injury and College
Resources for Parents
SPAN Brochure: Overview of Services
School Nurses: A Valuable Resource Following BI
Transition Planning
Know Your Rights Transition Planning
Planning School Transitions for Students with BI
Preparing for Life After High School (BIANJ booklet)
School to Work: Moving from Adolescence to Adulthood
Transition Services: Bridge between Adolescence and Young Adulthood
Transition to Adult Healthcare (Boggs Center booklet)
Employment
Employer and Professional Info
Accommodations and Compliance for Employees with Brain Injury
Brain Injury Handbook: Intro to BI for Voc Rehab Professionals
Information gathering guide for job coaches
Job Accommodations for People with Brain Injury
Job Accommodations for People with Executive Functioning Deficits
Returning to Work after Brain Injury—A Strategy Guide for Job Coaches (BIANJ booklet)
Understanding Brain Injury—A Guide for Employers
Working Effectively With Employees Who Have Sustained A Brain Injury
Family and PWBI Info
Challenges to Working after Brain Injury and How to Overcome Them
Checklist for Thinking (or Rethinking) about Employment
Dos and Don'ts of Disclosure
Employee Rights in the Workplace
Employment After Traumatic Brain Injury
Entering or Re-entering the Workplace after Brain Injury
Job search process
Volunteering—Everybody Can Be Great
Services
NJ Work Ability: Health Coverage That Works With You
NJ Work Incentive Network Support (NJWINS)
Ticket to Work and Self-Sufficiency Program
Financial Assistance
Catastrophic Illness in Children Relief Fund
Childrens' Emergency Medical Fund
Disabled Childrens Relief Fund
Financial Assistance and Debt Crisis Intervention
Get Well, Spend Less - Patient Assistance Programs
Living Through A Layoff
Low Income Home Energy Assistance Program (LIHEAP)
NJ Pediatric Patients Charitable Trust Fund
NJ Shares
PAAD, Lifeline, HAAAD
Prescription Assistance Programs in New Jersey
Sources of Funding (BIANJ factsheet)
Housing
Easy Access Housing—Accessible Housing Checklist
Housing Information Sheet
Foreclosure Fast Facts from the NJ Housing and Mortgage Finance Agency
Housing and Mortgages for People with Disabilities
Predatory Lending Practices—Risk of Foreclosure
How to Choose Fact Sheets (Not in File Library)
Attorney Fact Sheet
Day Rehabilitation Facility Fact Sheet
Inpatient Rehabilitation Facility Fact Sheet
Long Term Residential Fact Sheet
Neurologist Fact Sheet
Neuropsychiatrist Fact Sheet
Neuropsychologist Fact Sheet
Nursing Home Fact Sheet
Outpatient Rehabilitation Fact Sheet
Primary Care Physician Fact Sheet
Hospitalization
Acute Brain Injury Guide (BIANJ booklet)
Charity Care Factsheet
Dealing With Doctors
In The Hospital
Post-Traumatic Amnesia
The First Few Days (Checklist for Success)
When Your Loved One is Hospitalized
Rehabilitation
Family Role in Rehabilitation
Guide to Selecting and Monitoring Rehabilitation Services
How You Can Help with Recovery: A Guide for Family and Friends
Inpatient Rehabilitation
Management of Behavioral Problems During Acute Rehab
Planning for Inpatient Rehab Services
Planning for Rehabilitation (Checklist for Success)
Preparing for Home
Rehabilitation Basics
Selecting a Rehabilitation Facility
The Role of the Social Worker in Discharge Planning (BIANJ factsheet)
Understanding the Rehabilitation Process (BIANJ factsheet)
Legal
Attorney-Client Partnership
Do We Need An Attorney?
Guide to Selecting Legal Representation for Brain Injury
Selecting a Neurolawyer
What Are an Attorney's Obligations When a Client Has Had a Brain Injury?
Brain Injury Litigation
Brain Injury Ligitation: A Guide for Individuals with TBI and Families
Closer Look: TBI and Personal Injury Litigation
Inpatient Care
Competency and Brain Injury Independent Medical Examination: Ask the Doctor Psychological Syndromes in TBI Ligitation Recovering Compensation for Pediatric TBI Role of Neuropsychologists in Brain Injury Ligitation
General Information
NJ Court Access for the Disabled Public Benefits in the Context of Divorce Understanding the ADA Welfare Application Appeal Rights Welfare Application Rights
Guardianship
Emancipation and Guardianship in NJ
Guardianship and Alternatives
Guardianship and Surrogacy for Persons with Brain Injury (GANJI)
Guardianship Association of NJ
Guardianship Services of NJ
Guardianship through the Division of Developmental Disabilities
Power of Attorney, Guardianship and Representative Payee
Healthcare
Appealing a Denial of Benefits from Managed Care
Avoid Insult to Brain Injury
Before COBRA Ends
Custodial Care—An Unforeseen Emergency for Patients with TBIs
Guide to Finding Health Insurance Coverage
Health Care Access for Immigrants and Refugees
Help I Am Uninsured
How to Discuss the Costs of Healthcare Treatments with Your Provider
Interpreting Your Explanation of Benefits
Living Wills and Health Care Proxies
LSNJ Health Care Access Project
Managing Benefits When Moving to New Jersey from Another State
NJ's Charity Care Program—Finding the Answers
Paying the Bills: Health Insurance, Disability Pay, and Attorneys
Planning for the Future: The Importance of Advance Directives
Second Opinions: Know Your Rights and Options
TBIs: Challenging HMO Guidelines—Are Patients Powerful or Powerless?
Your Guide to the Insurance Appeal Process
Legal Service Organizations
Community Health Law Project
Developmentally Disabled Offenders' Project (ARC of NJ)
Disability Rights of New Jersey
Free and Low Cost Legal Services and Advocate Services
Legal Services of NJ
Office of Civil Rights of NJ
Trusts and Future Planning
Five Things to Consider When Setting Up a Special Needs Trust
How Structured Settlements Protect Your Financial Future
Legal Considerations in Planning for Individuals with Disabilities
Special Needs Trusts to Safeguard Disability Benefits in Personal Injury and Divorce Settlements
Long Term Planning
20 Common Nursing Home Problems—And How to Resolve Them
Consumers' Guide to Medicaid Planning and Division of Assets
Hard Choice: Choosing Residential Care
Having the Conversation About Long Term Care
List of PLAN NJ Affiliated Professionals
Long-Term Placement Considerations
Nursing Homes
Planned Lifetime Assistance Network (PLAN/NJ)
Planning for the Future Starts Today
Residential Care Options
When Short-Term Rehab Turns Into A Long-Term Stay
Medicaid
LogistiCare Transportation
Medicaid in New Jersey Fact Sheet
Your Guide to Making Medicaid Managed Care Work for You (Boggs Center booklet)
What You Need to Know About Applying for Medical Assistance
When You Have Medicaid and Other Insurance
Medicare
Medicare (Booklet from SSA)
Medicare Beneficiaries Outreach and Assistance
SHIP—Statewide Health Insurance Program
Your Medicare Managed Care Grievance and Appeal Rights
Mental Health
Family Crisis Handbook
Mental Health Association of New Jersey
NAMI New Jersey
NJ Child Behavioral Health Services
Reaching Out to Your Local Crisis Center After a Brain Injury
Selected Listing of NJ Mental Health Resources
Using Community Mental Health Centers
What Families Need to Know About Community Mental Health Centers
Mild Brain Injury
Cervicogenic Post Concussion Disorder
Coping with Mild TBI: Finances
Headsmart Handbook: Understanding Concussions for Return to School
How Can Parents Educate Their Childrens' Coaches About Concussion?
Mild Head Injury and Posttraumatic Headache
Mild TBI Factsheet
Persistent Post-Concussive Syndrome
Physiological Post Concussion Disorder
Psychologists in Concussion Clinics
Recovering from Mild TBI: A Resource Guide
Repeated MBI - Myths and New Directions
Road to Rehab Series: Journey Towards Understanding—Concussion and Mild Brain Injury
Second Impact Syndrome
Sports Concussions
Vestibular and Ocular Issues in Concussion Assessment
Neuropsychology
Clinical Neuropsychology Guide for Patients and Families
Neuropsychological Assessment of ABI: Emphasis on Changes of Self-Definition and Experience
Neuropsychologist as Psychologist, (The)
Screening for Substance Abuse as Part of the Neuropsychological Assessment
The Specifics of Neuropsych Tests
Pediatrics
Adolescence
Double Trouble: Substance Abuse and TBI in Youth
Emerging Sexuality—Parents Guide
Legal Issues
Risk-Taking Behaviors in Adolescents with Brain Injury
Social Cognition and Judgment in Adolescents
Substance Abuse
Behavior
Breaking the Law—Parents Guide Diagnosing Pediatric Post-Injury Behavior Behavior after Brain Injury
Early Intervention
Family Rights in NJ's Early Intervention NJ's Early Intervention System FAQ
General Information
Augmentative Communication Building Social Skills—Parents Guide
Children and Brain Injury
Coma
Communication: How Communication Changes Over Time
Disability Pay and Health Insurance for Children
Helping Brothers and Sisters
Keeping Children Safe
Language and Living Skills—Parents Guide
Medication Management in a Child / Adolescent with Brain Injury
Meds After Brain Injury
Pediatric Neuropsychology
Promoting Your Family's Well-Being—Parents Guide
Reactions and Responses—Parents Guide
Resources for Parents of Children with Brain Injury
Setting Up The Home
Summer Recreation Activities for Children and Adolescents
Teaching Social Skills to Children with Brain Injury
The Early Days—Parents Guide
When Your Child Has a Brain Injury: Myths and Facts
Your Child's Development—Parents Guide
Professionals Helping Families
Helping Families Cope
Right to Know: Educating Parents with a Child Has a Brain Injury
Talking with Parents
Rehabilitation
Early Recovery Guidelines for Families Roles of the Family in the Ongoing Recovery of their Child When the Very Young Child is Injured
Shaken Baby Syndrome
National Information, Support, and Referral Service on Shaken Baby Syndrome
Shaken Baby Syndrome: The Facts and Hard Realities
Prevention
Falls and Traumatic Brain Injury: The Basics
Playground Safety for Your Child with Special Needs
Sports Injury Prevention—American Football
Sports Injury Prevention—Baseball and Softball
Sports Injury Prevention—Ice Hockey
Sports Injury Prevention—Soccer
Recreation
Accessible Facilities—NJ State Park Service
Recreation and Leisure Services for Individuals with Disabilities
Summer Recreational Activities for Children and Adolescents with Brain Injury
Therapeutic Riding Directory
Vacations for Persons with Disabilities
Very Special Arts of New Jersey
Cognitive and Functional Rehabilitation
Be Your Own Best Friend
Building Routines
Cognitive Exercises
Cognitive Rehabilitation: Help for Attention, Memory, and Other Problems with Thinking
Creative Therapy—Relevance
Denial of Cognitive Rehab Claim Overturned
Evidence-Based Cognitive Rehabilitation
Home Cognitive Stimulation Program
Insurance Coverage of Cognitive Rehabilitation
Memory Strategies After Brain Injury
Role of Processing Speed in Brain Injury Recovery
Emotional Aspects of Recovery
Adjusting to Traumatic Brain Injury—The Role of a "Sense" of Self After Brain Injury, Telling Your Story: A Journaling Workbook Emotional Stages of Recovery How To Tell Your Story How Well Will My Survivor Recover? Nurturing Your Sense of Self Positive Approach to Coping with Life after Brain Injury Self-Esteem After Brain Injury
General Information
Mapping the Way—Drug Therapy and Brain Injury Maximal Medical Improvement Neurotechnology for Brain Injury Post-Rehabilitation Recovery Physical Therapy Recovering from Brain Injury—A Continual Process The Post Rehab Slump When Will I Recover?
Self-Advocacy
Dealing Effectively with Your Doctor
Dealing with Doctors
How to Be Your Own Brain Injury Case Manager
How to Find What You Need
Rehabilitation
Seniors
Aging and Brain Injury
Aging and the Behavioral Problems of Brain Injury
Statewide Benefits for Older Persons (NJDHSS)
TBI and Older Adults
Sexuality
Adolescents with Brain Injury: Issues of Sexuality
Coping with Sexual Problems after TBI
Disruption of Sexuality Following a Head Injury
Sexual Changes
Social Security
Appeals Process
Benefits for Children
Figuring Out Social Security Benefits After a TBI
How We Decide if You Are Still Disabled
How Workers Compensation and Other Disability Payments May Affect Your Benefits
NJWINS Brochure
Reviewing Your Disability
Social Security Disability and SSI Claims: Your Need for Representation
Social Security Disability: Determination and Review Regarding TBI
What You Should Know Before You Apply for SSD Benefits
When a Representative Payee Manages Your Money
You May Be Able to Get SSI
Your Guide to the Disability Process
Your Right to Question the Decision to Stop Your Disability Benefits
Your Right to Representation
Spanish
Consequences of Brain Injury
Aphasia
Emotional Problems and Brain Injury
Fatigue and Brain Injury
Head Injuries
Personality Changes Following Acquired Brain Injury
General Information
Alcohol and Brain Injury
Brain Injury—Discharge
Brain Injury and Substance Abuse
Cerebral Hypoxia
Disability Rights New Jersey
Medicaid Managed Care (Boggs Center booklet)
One-Stop Career Center
Return to Work—A Personal Perspective
Right Hemisphere Lesions
Selecting a Neurolawyer
Social Security Information
Stroke
Traumatic Brain Injury Factsheet
What is a Coma?
What is a Support Group?
What You Should Know About Minor Head Injury
Pediatrics
Benefits for Children with Disabilities (Social Security Administration)
Concussion in Sports
New Jersey's Early Intervention System FAQ
Sports Concussion in High School—Facts for Coaches
Sports Concussion in High School—Facts for Parents
What is Shaken Baby Syndrome?
Prevention
BIAA Prevention Fact Sheets
Helmets for Children: A Guide for Parents
How to Prevent Brain Injury
Preventing Concussion
Rehabilitation
Guide to Selecting and Monitoring Brain Injury Rehabilitation Services
Journey Towards Recovery: A Guide for Families
Road to Rehab (entire booklet)
Road to Rehab, Part 1: Pathways to Comfort: Dealing with Pain & Brain Injury
Road to Rehab, Part 2: Highways to Healing: Post-Traumatic Headaches & Brain Injury
Road to Rehab, Part 3: Guideposts to Recognition: Cognition, Memory & Brain Injury
Road to Rehab, Part 4: Navigating The Curves: Behavior Changes & Brain Injury
Road to Rehab, Part 5: Crossing the Communication Bridge: Speech, Language & Brain Injury
Road to Rehab, Part 6: Mapping the Way: Drug Therapy & Brain Injury
Road to Rehab, Part 7: Traveling Toward Relief: Dealing with Spasticity & Brain Injury
Road to Rehab, Part 8: Journey Toward Understanding: Concussion & Mild Brain Injury
Special Education
Education Law Center Special Education Guide
Know Your Rights—Transition Planning
Mediation in Special Education—A Guide for Parents
Neuropsychological Assessment and Schools
NICHCY Factsheet on Brain Injury
Planning School Transitions for Students with TBI
Transition to Adult Healthcare (Boggs Center booklet)
Statistics (Not in File Library)
Brain Injury Fact Sheet (BIANJ factsheet)
TBI Incidence Fact Sheet (BIANJ factsheet)
Substance Abuse
Alcohol Use After TBI
Brain Injury / Addictive Disorders: 12-Step Workbook
Denial of Substance Abuse: Symptom of Brain Injury
Family Guide to Use of Alcohol and Other Substances after Brain Injury
Substance Abuse Issues after TBI
Substance Abuse Treatment Advisory: Treating Clients with TBI
Substance Abuse Treatment for People with Disabilities (Treatment Improvement Protocol)
Treating Substance Abuse in Individuals with TBI
User's Manual (Ohio Valley Center)
Transportation
NJ Access Link Passenger Guidelines
NJ Guide to Handicapped Parking
NJ MVC Medical Review Guidelines
NJ Transit: Guide to Accessible Services
People with Disabilities Find a Ride Online
Transportation Options for People with Brain Injury (BIANJ factsheet)
Veterans' Issues
Brain Injuries Can Range from Loss of Coordination to Loss of Self
Community Justice Center
Defense and Veterans Brain Injury Center
Disability Benefits for Wounded Warriors
Resources for Wounded Service Members and their Families
Understanding Post-Deployment Stress Symptoms
Veterans Health Care Benefits Overview
War on the Brain
| 5,745
|
inside_word
|
Brain
|
remove_one_sentence
|
<url>
http://bianj.org/wp-content/uploads/2016/06/article-library-table-of-contents.pdf
</url>
<text>
Brain Injury Alliance of New Jersey
Article Library
Veterans' Issues
Acquired Brain Injury Resources
Alcohol Related Brain Injury
Wernicke-Korsakoff Syndrome
Anoxia
Anoxic Brain Injury
Anoxic-Hypoxic Brain Injury (BIAQ)
Anoxic Encephalopathy
Hypoxic-Anoxic Brain Injury
Brain Tumor
Brain Tumor Resources Coping with your Loved One's Brain Tumor Essential Guide to Brain Tumors Financial Assistance (American Brain Tumor Association) Life After Brain Tumor My Name is Buddy Understanding and Coping With Your Child's Brain Tumor
Stroke
Stroke (BIAQ)
Stroke Resources
Alternative Treatments
Alternative Medicines
Animal Assisted Therapy
Hippotherapy Lists
Nutritional Tips to Speed Recovery
Pets as Therapy
Role of Mindfulness, Meditation and Prayer After Brain Injury
Service Dog Providers in New Jersey
Sound Medicine—Music Therapy
Why Aquatic Therapy
Assistive Technology
Assistive Technology and Special Education
Assistive Technology Evaluations
Assistive Technology for Individuals with Cognitive & Psychiatric Disabilities
Assistive Technology for Individuals with Traumatic Brain Injury
Assistive Technology for Students with Brain Injury
Assistive Technology Resources in NJ
Case Studies in Adaptive Technology for People with Brain Injury
Family Guide to Assistive Technology
Home Modifications
Acquired Brain Injury
How to Match a PWBI with Assistive Technology Supports
Life-Changing iPad and iPhone Apps for PWBI
Life-Changing Android Apps for PWBI
Vehicle Modifications
Caregiver and Family Issues
Other Family Issues
Changes in Relationships for Families and Couples
Emotional Problems Experienced by Families
Holding a Family Meeting
Letting Go- Steps to Independence
My Adult Child Has Brain Injury
My Friend or Extended Family Member Has Brain Injury
Parenting After Brain Injury
Sexuality is a Family Matter
Support Groups Can Make a Difference for the Entire Family
The Family and Medical Leave Act
Understanding Family Issues
Your Workplace Rights When an Immediate Family Member Suffers TBI
Siblings and Children of PWBIs
Brothers and Sisters: Brain Injury is a Family Affair
Caring for Young Children
Helping Brothers and Sisters
How to Talk to Children about Brain Injury
I Know a Child Who Has a Family Member with Brain Injury
Recovering from Head Injury: A Guide for Kids
Siblings and Brain Injury
Skills for Caregiving
Advocacy Tips for Family Caregivers
Caring for Adults with Cognitive and Memory Impairments
Coping Effectively with Loss and Change—A Guide for Families and Friends
Guide to Improving Doctor / Caregiver Communications
Paying the Bills (Checklist for Success)
Spouses and Partners of PWBIs
Couples: Hope and Intimacy After Brain Injury
Healing Your Marriage After Brain Injury
Well Spouse Foundation
Stress Management
Caregiving and Ambigious Loss
Caregiving and Depression
Compassion Fatigue
Focus on What You Can Control (Checklist for Success)
Mom to Mom Helpline Program
Stress Management Following Brain Injury: Strategies for Families & Caregivers Take Care of Yourself
Coma
Coma Guide for Caregivers
Coma or Reduced Level of Awareness?
Coma Stimulation
Facts about the Vegetative and Minimally Conscious States After Brain Injury
Interacting with Persons who are Confused and Agitated
Locked-In Syndrome: Advances in Communication Spur Rehabilitation
Community Reintegration
Brain Injury, When the Call Comes: A Congregrational Guide (BIANJ booklet)
Driving after Brain Injury: Issues, Obstacles, and Possibilities
Friends and Families—Rebuilding Social Networks after BI
Helping Your Family Member Live Independently
How and Where Can I Meet New Friends or People to Date?
Making Life Work: A Family Guide for Life at Home (BIANJ booklet)
Overcoming Loneliness and Building Lasting Relationships
Tips for Successful Communication (BIANJ fact sheet)
What Happens to Relationships after Brain Injury?
What I Really Want is a Girlfriend: Meaningful Social Interaction after TBI
What to Tell People About Your Injury
When They Don't Believe You Have a Brain Injury
Community Support Services
Centers for Independent Living
Atlantic / Cape May CIL
Bergen / Hudson CIL
Burlington CIL
Camden City CIL
Camden / Gloucester CIL
Cape May / Cumberland / Salem CIL
Essex / Passaic CIL
Hunterdon / Mercer CIL
Middlesex / Somerset / Union CIL
Monmouth / Ocean CIL
Morris / Sussex / Warren CIL
NJ Statewide Independent Living Council
Home Health and Personal Assistance
Hiring In-Home Help
Home Care: A Family Caregiver's Guide
Making It Work With a Little Help
NJ Home Care Member Directory (book)
Personal Assistance Services Program
Respite—A Gift of Time
Respite Providers / Lists
Statewide Respite Care Program
When Home Care Ends: A Family Caregiver's Guide
Supported Living
Assisted Living and Supportive Housing
Community Care Options
Consequences of Brain Injury
Behavior- Anger and Aggression
Irritability and Anger Neurological Illness and Anger Preventing and Managing Anger Responding to Angry Behavior
Behavior- Depression and Anxiety
Anxiety and Brain Injury
Depression After Brain Injury
Depression And Brain Injury
Behavior- General
Behavior Changes and Brain Injury
Behavioral Challenges after Brain Injury (BIANJ booklet)
Denial
Disinhibited and Inappropriate Sexual Behavior
Emotional Lability
Impulsive Behavior
Long-Term Psychosocial Problems
Medication Non-Compliance
Medications and Behavior
Neuroanatomy of Behavior after Brain Injury
Stress and Brain Injury
Behavior- Treatment
Behavior Guidelines
Giving Feedback About Behavior
How to Clean Up Stinking Thinking and Cope Better with Negative Emotions
Positive Interactions after Bra<cursor_is_here>
Cognitive Fatigue
Effects of Brain Injury on Sensory and Perceptual Skills
Impaired Self Awareness Fatigue and Lack of Motivation Fatigue and Overload Insight and Self-Awareness Memory and Learning Motivation and Initiation Summary of Cognitive Effects of Brain Injury Topographic Disorientation Understanding Egocentricity
Hearing
ASL Interpreter Referral Service Assistive Listening Technology Loan Program Deafness and Hearing Loss Hearing Problems NJ Division of the Deaf and Hard of Hearing Recognizing and Evaluating Head Injury Associated Hearing Loss SPAN Directory of Resources for Deaf and Hard of Hearing Students
Other Medical
Anosmia
Dizziness
Balance and Vestibular Issues
Dealing with Pain and Brain Injury
Getting A Good Night's Sleep
Headaches after TBI
Imbalance: Ask the Doctor
Long-Term Medical Problems
Pain Assessment in the Nonverbal Patient
Post-Traumatic Headaches and Brain Injury (Road to Rehab Series)
Sensory Hypersensitivity
Sleep Disorders
Spasticity Management (Road to Rehab Series)
TBI and Associated Fatigue
Psychiatric
Can Traumatic Brain Injury Cause Psychiatric Disorders?
Neurobehavioral Sequelae of TBI Evaluation and Treatment
Panic Attacks
Post-Traumatic Stress
Psychiatric Problems after Brain Injury ("Ask the Doctor")
PTSD—National Center for PTSD Information
Suicide and Brain Injury
Seizures
A Closer Look: Seizures
Epilepsy as a Consequence of Brain Injury
Medical Issues: Seizures
Speech
Aphasia: When Speech is Lost
Communication Problems
Educating Others About Slurred Speech
Questions about Speech and Communication after Brain Injury
Social Communication after TBI
Speech, Language and Brain Injury (Road to Rehab Series)
Strategies to Make Your Speech Clearer
Vision
Commission for the Blind and Visually Impaired
Vision and Rehabilitation after Brain Trauma
Vision is Our Dominant Sense
Visual and Perceptual Problems After a Brain Injury
Visual Disorders
DDD
DDD: An Overview of Services (COSAC) DDD Circular on Determination of Eligibility Obtaining Residential Services from DDD Options in Achieving Medicaid Eligibility
Education
BIANJ Educator Guide for Educators (BIANJ booklet)
BIANJ Educator Guide for Families (BIANJ booklet)
BIANJ Educator Guide for Nurses (BIANJ booklet)
TBI and NJ Special Education (BIANJ factsheet)
Accommodations and Strategies
Brain Injury Quick Guide for School Staff
Effective Teaching Strategies
Feeling Safe at School: How New Technologies Can Help
Integration of Neuropsychology in Educational Planning Following TBI
Planning Healthcare for Children with TBI in School
Return to Learn After Concussion
School Accommodations for Students with BI
SPAN Brochure: Related Services
TBI and Teens: Info for School Administrators
Teaching Strategies for Students with BI
Accommodations for Students with Disabilities
Therapies in School
Behavior / Communication Problems and School
Behavioral Challenges in Children: Linking School and Home
Handle With Care: School Integration: Addressing Behavior Needs of Children Following BI
Managing Challenging Behaviors in the Classroom
Evaluations and Assessments
A Parent's Guide to Neuropsych Evaluations
Neuropsych Assessment and Schools
Requesting an Independent Evaluation
What is a Functional Behavioral Assessment of my Child
What is needed for a TBI School Evaluation and who should evaluate?
IEP, 504, Special Education Code
Developing Your Child's IEP
Here's What You Need To Know Before Your Child's Next IEP Meeting
Parent's Guide to Assessing the IEP For Students With Brain Injury
Understanding ADA and Section 504
What are IDEA and Section 504?
Parent / Educator Collaboration and Conflict
Parental Rights in Special Education
Problem Solving with Your School District
SPAN Brochure: Your Child's Records
Special Education Mediation A Guide for Parents
Post-Secondary Info
College Funding for Students with Disabilities
Community Colleges and Students with Disabilities
Going the Distance: Pursuing Post-Secondary Education after a TBI
Learning Support Accommodations for College: What Parents Need to Know
Non-Degree Postsecondary Options For Individuals with Disabilities
Overview of Health Care Options for College Transitions
There are No IEPs in College
Young Adults with Brain Injury and College
Resources for Parents
SPAN Brochure: Overview of Services
School Nurses: A Valuable Resource Following BI
Transition Planning
Know Your Rights Transition Planning
Planning School Transitions for Students with BI
Preparing for Life After High School (BIANJ booklet)
School to Work: Moving from Adolescence to Adulthood
Transition Services: Bridge between Adolescence and Young Adulthood
Transition to Adult Healthcare (Boggs Center booklet)
Employment
Employer and Professional Info
Accommodations and Compliance for Employees with Brain Injury
Brain Injury Handbook: Intro to BI for Voc Rehab Professionals
Information gathering guide for job coaches
Job Accommodations for People with Brain Injury
Job Accommodations for People with Executive Functioning Deficits
Returning to Work after Brain Injury—A Strategy Guide for Job Coaches (BIANJ booklet)
Understanding Brain Injury—A Guide for Employers
Working Effectively With Employees Who Have Sustained A Brain Injury
Family and PWBI Info
Challenges to Working after Brain Injury and How to Overcome Them
Checklist for Thinking (or Rethinking) about Employment
Dos and Don'ts of Disclosure
Employee Rights in the Workplace
Employment After Traumatic Brain Injury
Entering or Re-entering the Workplace after Brain Injury
Job search process
Volunteering—Everybody Can Be Great
Services
NJ Work Ability: Health Coverage That Works With You
NJ Work Incentive Network Support (NJWINS)
Ticket to Work and Self-Sufficiency Program
Financial Assistance
Catastrophic Illness in Children Relief Fund
Childrens' Emergency Medical Fund
Disabled Childrens Relief Fund
Financial Assistance and Debt Crisis Intervention
Get Well, Spend Less - Patient Assistance Programs
Living Through A Layoff
Low Income Home Energy Assistance Program (LIHEAP)
NJ Pediatric Patients Charitable Trust Fund
NJ Shares
PAAD, Lifeline, HAAAD
Prescription Assistance Programs in New Jersey
Sources of Funding (BIANJ factsheet)
Housing
Easy Access Housing—Accessible Housing Checklist
Housing Information Sheet
Foreclosure Fast Facts from the NJ Housing and Mortgage Finance Agency
Housing and Mortgages for People with Disabilities
Predatory Lending Practices—Risk of Foreclosure
How to Choose Fact Sheets (Not in File Library)
Attorney Fact Sheet
Day Rehabilitation Facility Fact Sheet
Inpatient Rehabilitation Facility Fact Sheet
Long Term Residential Fact Sheet
Neurologist Fact Sheet
Neuropsychiatrist Fact Sheet
Neuropsychologist Fact Sheet
Nursing Home Fact Sheet
Outpatient Rehabilitation Fact Sheet
Primary Care Physician Fact Sheet
Hospitalization
Acute Brain Injury Guide (BIANJ booklet)
Charity Care Factsheet
Dealing With Doctors
In The Hospital
Post-Traumatic Amnesia
The First Few Days (Checklist for Success)
When Your Loved One is Hospitalized
Rehabilitation
Family Role in Rehabilitation
Guide to Selecting and Monitoring Rehabilitation Services
How You Can Help with Recovery: A Guide for Family and Friends
Inpatient Rehabilitation
Management of Behavioral Problems During Acute Rehab
Planning for Inpatient Rehab Services
Planning for Rehabilitation (Checklist for Success)
Preparing for Home
Rehabilitation Basics
Selecting a Rehabilitation Facility
The Role of the Social Worker in Discharge Planning (BIANJ factsheet)
Understanding the Rehabilitation Process (BIANJ factsheet)
Legal
Attorney-Client Partnership
Do We Need An Attorney?
Guide to Selecting Legal Representation for Brain Injury
Selecting a Neurolawyer
What Are an Attorney's Obligations When a Client Has Had a Brain Injury?
Brain Injury Litigation
Brain Injury Ligitation: A Guide for Individuals with TBI and Families
Closer Look: TBI and Personal Injury Litigation
Inpatient Care
Competency and Brain Injury Independent Medical Examination: Ask the Doctor Psychological Syndromes in TBI Ligitation Recovering Compensation for Pediatric TBI Role of Neuropsychologists in Brain Injury Ligitation
General Information
NJ Court Access for the Disabled Public Benefits in the Context of Divorce Understanding the ADA Welfare Application Appeal Rights Welfare Application Rights
Guardianship
Emancipation and Guardianship in NJ
Guardianship and Alternatives
Guardianship and Surrogacy for Persons with Brain Injury (GANJI)
Guardianship Association of NJ
Guardianship Services of NJ
Guardianship through the Division of Developmental Disabilities
Power of Attorney, Guardianship and Representative Payee
Healthcare
Appealing a Denial of Benefits from Managed Care
Avoid Insult to Brain Injury
Before COBRA Ends
Custodial Care—An Unforeseen Emergency for Patients with TBIs
Guide to Finding Health Insurance Coverage
Health Care Access for Immigrants and Refugees
Help I Am Uninsured
How to Discuss the Costs of Healthcare Treatments with Your Provider
Interpreting Your Explanation of Benefits
Living Wills and Health Care Proxies
LSNJ Health Care Access Project
Managing Benefits When Moving to New Jersey from Another State
NJ's Charity Care Program—Finding the Answers
Paying the Bills: Health Insurance, Disability Pay, and Attorneys
Planning for the Future: The Importance of Advance Directives
Second Opinions: Know Your Rights and Options
TBIs: Challenging HMO Guidelines—Are Patients Powerful or Powerless?
Your Guide to the Insurance Appeal Process
Legal Service Organizations
Community Health Law Project
Developmentally Disabled Offenders' Project (ARC of NJ)
Disability Rights of New Jersey
Free and Low Cost Legal Services and Advocate Services
Legal Services of NJ
Office of Civil Rights of NJ
Trusts and Future Planning
Five Things to Consider When Setting Up a Special Needs Trust
How Structured Settlements Protect Your Financial Future
Legal Considerations in Planning for Individuals with Disabilities
Special Needs Trusts to Safeguard Disability Benefits in Personal Injury and Divorce Settlements
Long Term Planning
20 Common Nursing Home Problems—And How to Resolve Them
Consumers' Guide to Medicaid Planning and Division of Assets
Hard Choice: Choosing Residential Care
Having the Conversation About Long Term Care
List of PLAN NJ Affiliated Professionals
Long-Term Placement Considerations
Nursing Homes
Planned Lifetime Assistance Network (PLAN/NJ)
Planning for the Future Starts Today
Residential Care Options
When Short-Term Rehab Turns Into A Long-Term Stay
Medicaid
LogistiCare Transportation
Medicaid in New Jersey Fact Sheet
Your Guide to Making Medicaid Managed Care Work for You (Boggs Center booklet)
What You Need to Know About Applying for Medical Assistance
When You Have Medicaid and Other Insurance
Medicare
Medicare (Booklet from SSA)
Medicare Beneficiaries Outreach and Assistance
SHIP—Statewide Health Insurance Program
Your Medicare Managed Care Grievance and Appeal Rights
Mental Health
Family Crisis Handbook
Mental Health Association of New Jersey
NAMI New Jersey
NJ Child Behavioral Health Services
Reaching Out to Your Local Crisis Center After a Brain Injury
Selected Listing of NJ Mental Health Resources
Using Community Mental Health Centers
What Families Need to Know About Community Mental Health Centers
Mild Brain Injury
Cervicogenic Post Concussion Disorder
Coping with Mild TBI: Finances
Headsmart Handbook: Understanding Concussions for Return to School
How Can Parents Educate Their Childrens' Coaches About Concussion?
Mild Head Injury and Posttraumatic Headache
Mild TBI Factsheet
Persistent Post-Concussive Syndrome
Physiological Post Concussion Disorder
Psychologists in Concussion Clinics
Recovering from Mild TBI: A Resource Guide
Repeated MBI - Myths and New Directions
Road to Rehab Series: Journey Towards Understanding—Concussion and Mild Brain Injury
Second Impact Syndrome
Sports Concussions
Vestibular and Ocular Issues in Concussion Assessment
Neuropsychology
Clinical Neuropsychology Guide for Patients and Families
Neuropsychological Assessment of ABI: Emphasis on Changes of Self-Definition and Experience
Neuropsychologist as Psychologist, (The)
Screening for Substance Abuse as Part of the Neuropsychological Assessment
The Specifics of Neuropsych Tests
Pediatrics
Adolescence
Double Trouble: Substance Abuse and TBI in Youth
Emerging Sexuality—Parents Guide
Legal Issues
Risk-Taking Behaviors in Adolescents with Brain Injury
Social Cognition and Judgment in Adolescents
Substance Abuse
Behavior
Breaking the Law—Parents Guide Diagnosing Pediatric Post-Injury Behavior Behavior after Brain Injury
Early Intervention
Family Rights in NJ's Early Intervention NJ's Early Intervention System FAQ
General Information
Augmentative Communication Building Social Skills—Parents Guide
Children and Brain Injury
Coma
Communication: How Communication Changes Over Time
Disability Pay and Health Insurance for Children
Helping Brothers and Sisters
Keeping Children Safe
Language and Living Skills—Parents Guide
Medication Management in a Child / Adolescent with Brain Injury
Meds After Brain Injury
Pediatric Neuropsychology
Promoting Your Family's Well-Being—Parents Guide
Reactions and Responses—Parents Guide
Resources for Parents of Children with Brain Injury
Setting Up The Home
Summer Recreation Activities for Children and Adolescents
Teaching Social Skills to Children with Brain Injury
The Early Days—Parents Guide
When Your Child Has a Brain Injury: Myths and Facts
Your Child's Development—Parents Guide
Professionals Helping Families
Helping Families Cope
Right to Know: Educating Parents with a Child Has a Brain Injury
Talking with Parents
Rehabilitation
Early Recovery Guidelines for Families Roles of the Family in the Ongoing Recovery of their Child When the Very Young Child is Injured
Shaken Baby Syndrome
National Information, Support, and Referral Service on Shaken Baby Syndrome
Shaken Baby Syndrome: The Facts and Hard Realities
Prevention
Falls and Traumatic Brain Injury: The Basics
Playground Safety for Your Child with Special Needs
Sports Injury Prevention—American Football
Sports Injury Prevention—Baseball and Softball
Sports Injury Prevention—Ice Hockey
Sports Injury Prevention—Soccer
Recreation
Accessible Facilities—NJ State Park Service
Recreation and Leisure Services for Individuals with Disabilities
Summer Recreational Activities for Children and Adolescents with Brain Injury
Therapeutic Riding Directory
Vacations for Persons with Disabilities
Very Special Arts of New Jersey
Cognitive and Functional Rehabilitation
Be Your Own Best Friend
Building Routines
Cognitive Exercises
Cognitive Rehabilitation: Help for Attention, Memory, and Other Problems with Thinking
Creative Therapy—Relevance
Denial of Cognitive Rehab Claim Overturned
Evidence-Based Cognitive Rehabilitation
Home Cognitive Stimulation Program
Insurance Coverage of Cognitive Rehabilitation
Memory Strategies After Brain Injury
Role of Processing Speed in Brain Injury Recovery
Emotional Aspects of Recovery
Adjusting to Traumatic Brain Injury—The Role of a "Sense" of Self After Brain Injury, Telling Your Story: A Journaling Workbook Emotional Stages of Recovery How To Tell Your Story How Well Will My Survivor Recover? Nurturing Your Sense of Self Positive Approach to Coping with Life after Brain Injury Self-Esteem After Brain Injury
General Information
Mapping the Way—Drug Therapy and Brain Injury Maximal Medical Improvement Neurotechnology for Brain Injury Post-Rehabilitation Recovery Physical Therapy Recovering from Brain Injury—A Continual Process The Post Rehab Slump When Will I Recover?
Self-Advocacy
Dealing Effectively with Your Doctor
Dealing with Doctors
How to Be Your Own Brain Injury Case Manager
How to Find What You Need
Rehabilitation
Seniors
Aging and Brain Injury
Aging and the Behavioral Problems of Brain Injury
Statewide Benefits for Older Persons (NJDHSS)
TBI and Older Adults
Sexuality
Adolescents with Brain Injury: Issues of Sexuality
Coping with Sexual Problems after TBI
Disruption of Sexuality Following a Head Injury
Sexual Changes
Social Security
Appeals Process
Benefits for Children
Figuring Out Social Security Benefits After a TBI
How We Decide if You Are Still Disabled
How Workers Compensation and Other Disability Payments May Affect Your Benefits
NJWINS Brochure
Reviewing Your Disability
Social Security Disability and SSI Claims: Your Need for Representation
Social Security Disability: Determination and Review Regarding TBI
What You Should Know Before You Apply for SSD Benefits
When a Representative Payee Manages Your Money
You May Be Able to Get SSI
Your Guide to the Disability Process
Your Right to Question the Decision to Stop Your Disability Benefits
Your Right to Representation
Spanish
Consequences of Brain Injury
Aphasia
Emotional Problems and Brain Injury
Fatigue and Brain Injury
Head Injuries
Personality Changes Following Acquired Brain Injury
General Information
Alcohol and Brain Injury
Brain Injury—Discharge
Brain Injury and Substance Abuse
Cerebral Hypoxia
Disability Rights New Jersey
Medicaid Managed Care (Boggs Center booklet)
One-Stop Career Center
Return to Work—A Personal Perspective
Right Hemisphere Lesions
Selecting a Neurolawyer
Social Security Information
Stroke
Traumatic Brain Injury Factsheet
What is a Coma?
What is a Support Group?
What You Should Know About Minor Head Injury
Pediatrics
Benefits for Children with Disabilities (Social Security Administration)
Concussion in Sports
New Jersey's Early Intervention System FAQ
Sports Concussion in High School—Facts for Coaches
Sports Concussion in High School—Facts for Parents
What is Shaken Baby Syndrome?
Prevention
BIAA Prevention Fact Sheets
Helmets for Children: A Guide for Parents
How to Prevent Brain Injury
Preventing Concussion
Rehabilitation
Guide to Selecting and Monitoring Brain Injury Rehabilitation Services
Journey Towards Recovery: A Guide for Families
Road to Rehab (entire booklet)
Road to Rehab, Part 1: Pathways to Comfort: Dealing with Pain & Brain Injury
Road to Rehab, Part 2: Highways to Healing: Post-Traumatic Headaches & Brain Injury
Road to Rehab, Part 3: Guideposts to Recognition: Cognition, Memory & Brain Injury
Road to Rehab, Part 4: Navigating The Curves: Behavior Changes & Brain Injury
Road to Rehab, Part 5: Crossing the Communication Bridge: Speech, Language & Brain Injury
Road to Rehab, Part 6: Mapping the Way: Drug Therapy & Brain Injury
Road to Rehab, Part 7: Traveling Toward Relief: Dealing with Spasticity & Brain Injury
Road to Rehab, Part 8: Journey Toward Understanding: Concussion & Mild Brain Injury
Special Education
Education Law Center Special Education Guide
Know Your Rights—Transition Planning
Mediation in Special Education—A Guide for Parents
Neuropsychological Assessment and Schools
NICHCY Factsheet on Brain Injury
Planning School Transitions for Students with TBI
Transition to Adult Healthcare (Boggs Center booklet)
Statistics (Not in File Library)
Brain Injury Fact Sheet (BIANJ factsheet)
TBI Incidence Fact Sheet (BIANJ factsheet)
Substance Abuse
Alcohol Use After TBI
Brain Injury / Addictive Disorders: 12-Step Workbook
Denial of Substance Abuse: Symptom of Brain Injury
Family Guide to Use of Alcohol and Other Substances after Brain Injury
Substance Abuse Issues after TBI
Substance Abuse Treatment Advisory: Treating Clients with TBI
Substance Abuse Treatment for People with Disabilities (Treatment Improvement Protocol)
Treating Substance Abuse in Individuals with TBI
User's Manual (Ohio Valley Center)
Transportation
NJ Access Link Passenger Guidelines
NJ Guide to Handicapped Parking
NJ MVC Medical Review Guidelines
NJ Transit: Guide to Accessible Services
People with Disabilities Find a Ride Online
Transportation Options for People with Brain Injury (BIANJ factsheet)
Veterans' Issues
Brain Injuries Can Range from Loss of Coordination to Loss of Self
Community Justice Center
Defense and Veterans Brain Injury Center
Disability Benefits for Wounded Warriors
Resources for Wounded Service Members and their Families
Understanding Post-Deployment Stress Symptoms
Veterans Health Care Benefits Overview
War on the Brain
</text>
|
[
{
"content": "<url>\nhttp://bianj.org/wp-content/uploads/2016/06/article-library-table-of-contents.pdf\n</url>\n<text>\nBrain Injury Alliance of New Jersey\n\nArticle Library\n\nVeterans' Issues\n\nAcquired Brain Injury Resources\n\nAlcohol Related Brain Injury\n\nWernicke-Korsakoff Syndrome\n\nAnoxia\n\nAnoxic Brain Injury\n\nAnoxic-Hypoxic Brain Injury (BIAQ)\n\nAnoxic Encephalopathy\n\nHypoxic-Anoxic Brain Injury\n\nBrain Tumor\n\nBrain Tumor Resources Coping with your Loved One's Brain Tumor Essential Guide to Brain Tumors Financial Assistance (American Brain Tumor Association) Life After Brain Tumor My Name is Buddy Understanding and Coping With Your Child's Brain Tumor\n\nStroke\n\nStroke (BIAQ)\n\nStroke Resources\n\nAlternative Treatments\n\nAlternative Medicines\n\nAnimal Assisted Therapy\n\nHippotherapy Lists\n\nNutritional Tips to Speed Recovery\n\nPets as Therapy\n\nRole of Mindfulness, Meditation and Prayer After Brain Injury\n\nService Dog Providers in New Jersey\n\nSound Medicine—Music Therapy\n\nWhy Aquatic Therapy\n\nAssistive Technology\n\nAssistive Technology and Special Education\n\nAssistive Technology Evaluations\n\nAssistive Technology for Individuals with Cognitive & Psychiatric Disabilities\n\nAssistive Technology for Individuals with Traumatic Brain Injury\n\nAssistive Technology for Students with Brain Injury\n\nAssistive Technology Resources in NJ\n\nCase Studies in Adaptive Technology for People with Brain Injury\n\nFamily Guide to Assistive Technology\n\nHome Modifications\n\nAcquired Brain Injury\n\nHow to Match a PWBI with Assistive Technology Supports\n\nLife-Changing iPad and iPhone Apps for PWBI\n\nLife-Changing Android Apps for PWBI\n\nVehicle Modifications\n\nCaregiver and Family Issues\n\nOther Family Issues\n\nChanges in Relationships for Families and Couples\n\nEmotional Problems Experienced by Families\n\nHolding a Family Meeting\n\nLetting Go- Steps to Independence\n\nMy Adult Child Has Brain Injury\n\nMy Friend or Extended Family Member Has Brain Injury\n\nParenting After Brain Injury\n\nSexuality is a Family Matter\n\nSupport Groups Can Make a Difference for the Entire Family\n\nThe Family and Medical Leave Act\n\nUnderstanding Family Issues\n\nYour Workplace Rights When an Immediate Family Member Suffers TBI\n\nSiblings and Children of PWBIs\n\nBrothers and Sisters: Brain Injury is a Family Affair\n\nCaring for Young Children\n\nHelping Brothers and Sisters\n\nHow to Talk to Children about Brain Injury\n\nI Know a Child Who Has a Family Member with Brain Injury\n\nRecovering from Head Injury: A Guide for Kids\n\nSiblings and Brain Injury\n\nSkills for Caregiving\n\nAdvocacy Tips for Family Caregivers\n\nCaring for Adults with Cognitive and Memory Impairments\n\nCoping Effectively with Loss and Change—A Guide for Families and Friends\n\nGuide to Improving Doctor / Caregiver Communications\n\nPaying the Bills (Checklist for Success)\n\nSpouses and Partners of PWBIs\n\nCouples: Hope and Intimacy After Brain Injury\n\nHealing Your Marriage After Brain Injury\n\nWell Spouse Foundation\n\nStress Management\n\nCaregiving and Ambigious Loss\n\nCaregiving and Depression\n\nCompassion Fatigue\n\nFocus on What You Can Control (Checklist for Success)\n\nMom to Mom Helpline Program\n\nStress Management Following Brain Injury: Strategies for Families & Caregivers Take Care of Yourself\n\nComa\n\nComa Guide for Caregivers\n\nComa or Reduced Level of Awareness?\n\nComa Stimulation\n\nFacts about the Vegetative and Minimally Conscious States After Brain Injury\n\nInteracting with Persons who are Confused and Agitated\n\nLocked-In Syndrome: Advances in Communication Spur Rehabilitation\n\nCommunity Reintegration\n\nBrain Injury, When the Call Comes: A Congregrational Guide (BIANJ booklet)\n\nDriving after Brain Injury: Issues, Obstacles, and Possibilities\n\nFriends and Families—Rebuilding Social Networks after BI\n\nHelping Your Family Member Live Independently\n\nHow and Where Can I Meet New Friends or People to Date?\n\nMaking Life Work: A Family Guide for Life at Home (BIANJ booklet)\n\nOvercoming Loneliness and Building Lasting Relationships\n\nTips for Successful Communication (BIANJ fact sheet)\n\nWhat Happens to Relationships after Brain Injury?\n\nWhat I Really Want is a Girlfriend: Meaningful Social Interaction after TBI\n\nWhat to Tell People About Your Injury\n\nWhen They Don't Believe You Have a Brain Injury\n\nCommunity Support Services\n\nCenters for Independent Living\n\nAtlantic / Cape May CIL\n\nBergen / Hudson CIL\n\nBurlington CIL\n\nCamden City CIL\n\nCamden / Gloucester CIL\n\nCape May / Cumberland / Salem CIL\n\nEssex / Passaic CIL\n\nHunterdon / Mercer CIL\n\nMiddlesex / Somerset / Union CIL\n\nMonmouth / Ocean CIL\n\nMorris / Sussex / Warren CIL\n\nNJ Statewide Independent Living Council\n\nHome Health and Personal Assistance\n\nHiring In-Home Help\n\nHome Care: A Family Caregiver's Guide\n\nMaking It Work With a Little Help\n\nNJ Home Care Member Directory (book)\n\nPersonal Assistance Services Program\n\nRespite—A Gift of Time\n\nRespite Providers / Lists\n\nStatewide Respite Care Program\n\nWhen Home Care Ends: A Family Caregiver's Guide\n\nSupported Living\n\nAssisted Living and Supportive Housing\n\nCommunity Care Options\n\nConsequences of Brain Injury\n\nBehavior- Anger and Aggression\n\nIrritability and Anger Neurological Illness and Anger Preventing and Managing Anger Responding to Angry Behavior\n\nBehavior- Depression and Anxiety\n\nAnxiety and Brain Injury\n\nDepression After Brain Injury\n\nDepression And Brain Injury\n\nBehavior- General\n\nBehavior Changes and Brain Injury\n\nBehavioral Challenges after Brain Injury (BIANJ booklet)\n\nDenial\n\nDisinhibited and Inappropriate Sexual Behavior\n\nEmotional Lability\n\nImpulsive Behavior\n\nLong-Term Psychosocial Problems\n\nMedication Non-Compliance\n\nMedications and Behavior\n\nNeuroanatomy of Behavior after Brain Injury\n\nStress and Brain Injury\n\nBehavior- Treatment\n\nBehavior Guidelines\n\nGiving Feedback About Behavior\n\nHow to Clean Up Stinking Thinking and Cope Better with Negative Emotions\n\nPositive Interactions after Bra<cursor_is_here>\n\nCognitive Fatigue\n\nEffects of Brain Injury on Sensory and Perceptual Skills\n\nImpaired Self Awareness Fatigue and Lack of Motivation Fatigue and Overload Insight and Self-Awareness Memory and Learning Motivation and Initiation Summary of Cognitive Effects of Brain Injury Topographic Disorientation Understanding Egocentricity\n\nHearing\n\nASL Interpreter Referral Service Assistive Listening Technology Loan Program Deafness and Hearing Loss Hearing Problems NJ Division of the Deaf and Hard of Hearing Recognizing and Evaluating Head Injury Associated Hearing Loss SPAN Directory of Resources for Deaf and Hard of Hearing Students\n\nOther Medical\n\nAnosmia\n\nDizziness\n\nBalance and Vestibular Issues\n\nDealing with Pain and Brain Injury\n\nGetting A Good Night's Sleep\n\nHeadaches after TBI\n\nImbalance: Ask the Doctor\n\nLong-Term Medical Problems\n\nPain Assessment in the Nonverbal Patient\n\nPost-Traumatic Headaches and Brain Injury (Road to Rehab Series)\n\nSensory Hypersensitivity\n\nSleep Disorders\n\nSpasticity Management (Road to Rehab Series)\n\nTBI and Associated Fatigue\n\nPsychiatric\n\nCan Traumatic Brain Injury Cause Psychiatric Disorders?\n\nNeurobehavioral Sequelae of TBI Evaluation and Treatment\n\nPanic Attacks\n\nPost-Traumatic Stress\n\nPsychiatric Problems after Brain Injury (\"Ask the Doctor\")\n\nPTSD—National Center for PTSD Information\n\nSuicide and Brain Injury\n\nSeizures\n\nA Closer Look: Seizures\n\nEpilepsy as a Consequence of Brain Injury\n\nMedical Issues: Seizures\n\nSpeech\n\nAphasia: When Speech is Lost\n\nCommunication Problems\n\nEducating Others About Slurred Speech\n\nQuestions about Speech and Communication after Brain Injury\n\nSocial Communication after TBI\n\nSpeech, Language and Brain Injury (Road to Rehab Series)\n\nStrategies to Make Your Speech Clearer\n\nVision\n\nCommission for the Blind and Visually Impaired\n\nVision and Rehabilitation after Brain Trauma\n\nVision is Our Dominant Sense\n\nVisual and Perceptual Problems After a Brain Injury\n\nVisual Disorders\n\nDDD\n\nDDD: An Overview of Services (COSAC) DDD Circular on Determination of Eligibility Obtaining Residential Services from DDD Options in Achieving Medicaid Eligibility\n\nEducation\n\nBIANJ Educator Guide for Educators (BIANJ booklet)\n\nBIANJ Educator Guide for Families (BIANJ booklet)\n\nBIANJ Educator Guide for Nurses (BIANJ booklet)\n\nTBI and NJ Special Education (BIANJ factsheet)\n\nAccommodations and Strategies\n\nBrain Injury Quick Guide for School Staff\n\nEffective Teaching Strategies\n\nFeeling Safe at School: How New Technologies Can Help\n\nIntegration of Neuropsychology in Educational Planning Following TBI\n\nPlanning Healthcare for Children with TBI in School\n\nReturn to Learn After Concussion\n\nSchool Accommodations for Students with BI\n\nSPAN Brochure: Related Services\n\nTBI and Teens: Info for School Administrators\n\nTeaching Strategies for Students with BI\n\nAccommodations for Students with Disabilities\n\nTherapies in School\n\nBehavior / Communication Problems and School\n\nBehavioral Challenges in Children: Linking School and Home\n\nHandle With Care: School Integration: Addressing Behavior Needs of Children Following BI\n\nManaging Challenging Behaviors in the Classroom\n\nEvaluations and Assessments\n\nA Parent's Guide to Neuropsych Evaluations\n\nNeuropsych Assessment and Schools\n\nRequesting an Independent Evaluation\n\nWhat is a Functional Behavioral Assessment of my Child\n\nWhat is needed for a TBI School Evaluation and who should evaluate?\n\nIEP, 504, Special Education Code\n\nDeveloping Your Child's IEP\n\nHere's What You Need To Know Before Your Child's Next IEP Meeting\n\nParent's Guide to Assessing the IEP For Students With Brain Injury\n\nUnderstanding ADA and Section 504\n\nWhat are IDEA and Section 504?\n\nParent / Educator Collaboration and Conflict\n\nParental Rights in Special Education\n\nProblem Solving with Your School District\n\nSPAN Brochure: Your Child's Records\n\nSpecial Education Mediation A Guide for Parents\n\nPost-Secondary Info\n\nCollege Funding for Students with Disabilities\n\nCommunity Colleges and Students with Disabilities\n\nGoing the Distance: Pursuing Post-Secondary Education after a TBI\n\nLearning Support Accommodations for College: What Parents Need to Know\n\nNon-Degree Postsecondary Options For Individuals with Disabilities\n\nOverview of Health Care Options for College Transitions\n\nThere are No IEPs in College\n\nYoung Adults with Brain Injury and College\n\nResources for Parents\n\nSPAN Brochure: Overview of Services\n\nSchool Nurses: A Valuable Resource Following BI\n\nTransition Planning\n\nKnow Your Rights Transition Planning\n\nPlanning School Transitions for Students with BI\n\nPreparing for Life After High School (BIANJ booklet)\n\nSchool to Work: Moving from Adolescence to Adulthood\n\nTransition Services: Bridge between Adolescence and Young Adulthood\n\nTransition to Adult Healthcare (Boggs Center booklet)\n\nEmployment\n\nEmployer and Professional Info\n\nAccommodations and Compliance for Employees with Brain Injury\n\nBrain Injury Handbook: Intro to BI for Voc Rehab Professionals\n\nInformation gathering guide for job coaches\n\nJob Accommodations for People with Brain Injury\n\nJob Accommodations for People with Executive Functioning Deficits\n\nReturning to Work after Brain Injury—A Strategy Guide for Job Coaches (BIANJ booklet)\n\nUnderstanding Brain Injury—A Guide for Employers\n\nWorking Effectively With Employees Who Have Sustained A Brain Injury\n\nFamily and PWBI Info\n\nChallenges to Working after Brain Injury and How to Overcome Them\n\nChecklist for Thinking (or Rethinking) about Employment\n\nDos and Don'ts of Disclosure\n\nEmployee Rights in the Workplace\n\nEmployment After Traumatic Brain Injury\n\nEntering or Re-entering the Workplace after Brain Injury\n\nJob search process\n\nVolunteering—Everybody Can Be Great\n\nServices\n\nNJ Work Ability: Health Coverage That Works With You\n\nNJ Work Incentive Network Support (NJWINS)\n\nTicket to Work and Self-Sufficiency Program\n\nFinancial Assistance\n\nCatastrophic Illness in Children Relief Fund\n\nChildrens' Emergency Medical Fund\n\nDisabled Childrens Relief Fund\n\nFinancial Assistance and Debt Crisis Intervention\n\nGet Well, Spend Less - Patient Assistance Programs\n\nLiving Through A Layoff\n\nLow Income Home Energy Assistance Program (LIHEAP)\n\nNJ Pediatric Patients Charitable Trust Fund\n\nNJ Shares\n\nPAAD, Lifeline, HAAAD\n\nPrescription Assistance Programs in New Jersey\n\nSources of Funding (BIANJ factsheet)\n\nHousing\n\nEasy Access Housing—Accessible Housing Checklist\n\nHousing Information Sheet\n\nForeclosure Fast Facts from the NJ Housing and Mortgage Finance Agency\n\nHousing and Mortgages for People with Disabilities\n\nPredatory Lending Practices—Risk of Foreclosure\n\nHow to Choose Fact Sheets (Not in File Library)\n\nAttorney Fact Sheet\n\nDay Rehabilitation Facility Fact Sheet\n\nInpatient Rehabilitation Facility Fact Sheet\n\nLong Term Residential Fact Sheet\n\nNeurologist Fact Sheet\n\nNeuropsychiatrist Fact Sheet\n\nNeuropsychologist Fact Sheet\n\nNursing Home Fact Sheet\n\nOutpatient Rehabilitation Fact Sheet\n\nPrimary Care Physician Fact Sheet\n\nHospitalization\n\nAcute Brain Injury Guide (BIANJ booklet)\n\nCharity Care Factsheet\n\nDealing With Doctors\n\nIn The Hospital\n\nPost-Traumatic Amnesia\n\nThe First Few Days (Checklist for Success)\n\nWhen Your Loved One is Hospitalized\n\nRehabilitation\n\nFamily Role in Rehabilitation\n\nGuide to Selecting and Monitoring Rehabilitation Services\n\nHow You Can Help with Recovery: A Guide for Family and Friends\n\nInpatient Rehabilitation\n\nManagement of Behavioral Problems During Acute Rehab\n\nPlanning for Inpatient Rehab Services\n\nPlanning for Rehabilitation (Checklist for Success)\n\nPreparing for Home\n\nRehabilitation Basics\n\nSelecting a Rehabilitation Facility\n\nThe Role of the Social Worker in Discharge Planning (BIANJ factsheet)\n\nUnderstanding the Rehabilitation Process (BIANJ factsheet)\n\nLegal\n\nAttorney-Client Partnership\n\nDo We Need An Attorney?\n\nGuide to Selecting Legal Representation for Brain Injury\n\nSelecting a Neurolawyer\n\nWhat Are an Attorney's Obligations When a Client Has Had a Brain Injury?\n\nBrain Injury Litigation\n\nBrain Injury Ligitation: A Guide for Individuals with TBI and Families\n\nCloser Look: TBI and Personal Injury Litigation\n\nInpatient Care\n\nCompetency and Brain Injury Independent Medical Examination: Ask the Doctor Psychological Syndromes in TBI Ligitation Recovering Compensation for Pediatric TBI Role of Neuropsychologists in Brain Injury Ligitation\n\nGeneral Information\n\nNJ Court Access for the Disabled Public Benefits in the Context of Divorce Understanding the ADA Welfare Application Appeal Rights Welfare Application Rights\n\nGuardianship\n\nEmancipation and Guardianship in NJ\n\nGuardianship and Alternatives\n\nGuardianship and Surrogacy for Persons with Brain Injury (GANJI)\n\nGuardianship Association of NJ\n\nGuardianship Services of NJ\n\nGuardianship through the Division of Developmental Disabilities\n\nPower of Attorney, Guardianship and Representative Payee\n\nHealthcare\n\nAppealing a Denial of Benefits from Managed Care\n\nAvoid Insult to Brain Injury\n\nBefore COBRA Ends\n\nCustodial Care—An Unforeseen Emergency for Patients with TBIs\n\nGuide to Finding Health Insurance Coverage\n\nHealth Care Access for Immigrants and Refugees\n\nHelp I Am Uninsured\n\nHow to Discuss the Costs of Healthcare Treatments with Your Provider\n\nInterpreting Your Explanation of Benefits\n\nLiving Wills and Health Care Proxies\n\nLSNJ Health Care Access Project\n\nManaging Benefits When Moving to New Jersey from Another State\n\nNJ's Charity Care Program—Finding the Answers\n\nPaying the Bills: Health Insurance, Disability Pay, and Attorneys\n\nPlanning for the Future: The Importance of Advance Directives\n\nSecond Opinions: Know Your Rights and Options\n\nTBIs: Challenging HMO Guidelines—Are Patients Powerful or Powerless?\n\nYour Guide to the Insurance Appeal Process\n\nLegal Service Organizations\n\nCommunity Health Law Project\n\nDevelopmentally Disabled Offenders' Project (ARC of NJ)\n\nDisability Rights of New Jersey\n\nFree and Low Cost Legal Services and Advocate Services\n\nLegal Services of NJ\n\nOffice of Civil Rights of NJ\n\nTrusts and Future Planning\n\nFive Things to Consider When Setting Up a Special Needs Trust\n\nHow Structured Settlements Protect Your Financial Future\n\nLegal Considerations in Planning for Individuals with Disabilities\n\nSpecial Needs Trusts to Safeguard Disability Benefits in Personal Injury and Divorce Settlements\n\nLong Term Planning\n\n20 Common Nursing Home Problems—And How to Resolve Them\n\nConsumers' Guide to Medicaid Planning and Division of Assets\n\nHard Choice: Choosing Residential Care\n\nHaving the Conversation About Long Term Care\n\nList of PLAN NJ Affiliated Professionals\n\nLong-Term Placement Considerations\n\nNursing Homes\n\nPlanned Lifetime Assistance Network (PLAN/NJ)\n\nPlanning for the Future Starts Today\n\nResidential Care Options\n\nWhen Short-Term Rehab Turns Into A Long-Term Stay\n\nMedicaid\n\nLogistiCare Transportation\n\nMedicaid in New Jersey Fact Sheet\n\nYour Guide to Making Medicaid Managed Care Work for You (Boggs Center booklet)\n\nWhat You Need to Know About Applying for Medical Assistance\n\nWhen You Have Medicaid and Other Insurance\n\nMedicare\n\nMedicare (Booklet from SSA)\n\nMedicare Beneficiaries Outreach and Assistance\n\nSHIP—Statewide Health Insurance Program\n\nYour Medicare Managed Care Grievance and Appeal Rights\n\nMental Health\n\nFamily Crisis Handbook\n\nMental Health Association of New Jersey\n\nNAMI New Jersey\n\nNJ Child Behavioral Health Services\n\nReaching Out to Your Local Crisis Center After a Brain Injury\n\nSelected Listing of NJ Mental Health Resources\n\nUsing Community Mental Health Centers\n\nWhat Families Need to Know About Community Mental Health Centers\n\nMild Brain Injury\n\nCervicogenic Post Concussion Disorder\n\nCoping with Mild TBI: Finances\n\nHeadsmart Handbook: Understanding Concussions for Return to School\n\nHow Can Parents Educate Their Childrens' Coaches About Concussion?\n\nMild Head Injury and Posttraumatic Headache\n\nMild TBI Factsheet\n\nPersistent Post-Concussive Syndrome\n\nPhysiological Post Concussion Disorder\n\nPsychologists in Concussion Clinics\n\nRecovering from Mild TBI: A Resource Guide\n\nRepeated MBI - Myths and New Directions\n\nRoad to Rehab Series: Journey Towards Understanding—Concussion and Mild Brain Injury\n\nSecond Impact Syndrome\n\nSports Concussions\n\nVestibular and Ocular Issues in Concussion Assessment\n\nNeuropsychology\n\nClinical Neuropsychology Guide for Patients and Families\n\nNeuropsychological Assessment of ABI: Emphasis on Changes of Self-Definition and Experience\n\nNeuropsychologist as Psychologist, (The)\n\nScreening for Substance Abuse as Part of the Neuropsychological Assessment\n\nThe Specifics of Neuropsych Tests\n\nPediatrics\n\nAdolescence\n\nDouble Trouble: Substance Abuse and TBI in Youth\n\nEmerging Sexuality—Parents Guide\n\nLegal Issues\n\nRisk-Taking Behaviors in Adolescents with Brain Injury\n\nSocial Cognition and Judgment in Adolescents\n\nSubstance Abuse\n\nBehavior\n\nBreaking the Law—Parents Guide Diagnosing Pediatric Post-Injury Behavior Behavior after Brain Injury\n\nEarly Intervention\n\nFamily Rights in NJ's Early Intervention NJ's Early Intervention System FAQ\n\nGeneral Information\n\nAugmentative Communication Building Social Skills—Parents Guide\n\nChildren and Brain Injury\n\nComa\n\nCommunication: How Communication Changes Over Time\n\nDisability Pay and Health Insurance for Children\n\nHelping Brothers and Sisters\n\nKeeping Children Safe\n\nLanguage and Living Skills—Parents Guide\n\nMedication Management in a Child / Adolescent with Brain Injury\n\nMeds After Brain Injury\n\nPediatric Neuropsychology\n\nPromoting Your Family's Well-Being—Parents Guide\n\nReactions and Responses—Parents Guide\n\nResources for Parents of Children with Brain Injury\n\nSetting Up The Home\n\nSummer Recreation Activities for Children and Adolescents\n\nTeaching Social Skills to Children with Brain Injury\n\nThe Early Days—Parents Guide\n\nWhen Your Child Has a Brain Injury: Myths and Facts\n\nYour Child's Development—Parents Guide\n\nProfessionals Helping Families\n\nHelping Families Cope\n\nRight to Know: Educating Parents with a Child Has a Brain Injury\n\nTalking with Parents\n\nRehabilitation\n\nEarly Recovery Guidelines for Families Roles of the Family in the Ongoing Recovery of their Child When the Very Young Child is Injured\n\nShaken Baby Syndrome\n\nNational Information, Support, and Referral Service on Shaken Baby Syndrome\n\nShaken Baby Syndrome: The Facts and Hard Realities\n\nPrevention\n\nFalls and Traumatic Brain Injury: The Basics\n\nPlayground Safety for Your Child with Special Needs\n\nSports Injury Prevention—American Football\n\nSports Injury Prevention—Baseball and Softball\n\nSports Injury Prevention—Ice Hockey\n\nSports Injury Prevention—Soccer\n\nRecreation\n\nAccessible Facilities—NJ State Park Service\n\nRecreation and Leisure Services for Individuals with Disabilities\n\nSummer Recreational Activities for Children and Adolescents with Brain Injury\n\nTherapeutic Riding Directory\n\nVacations for Persons with Disabilities\n\nVery Special Arts of New Jersey\n\nCognitive and Functional Rehabilitation\n\nBe Your Own Best Friend\n\nBuilding Routines\n\nCognitive Exercises\n\nCognitive Rehabilitation: Help for Attention, Memory, and Other Problems with Thinking\n\nCreative Therapy—Relevance\n\nDenial of Cognitive Rehab Claim Overturned\n\nEvidence-Based Cognitive Rehabilitation\n\nHome Cognitive Stimulation Program\n\nInsurance Coverage of Cognitive Rehabilitation\n\nMemory Strategies After Brain Injury\n\nRole of Processing Speed in Brain Injury Recovery\n\nEmotional Aspects of Recovery\n\nAdjusting to Traumatic Brain Injury—The Role of a \"Sense\" of Self After Brain Injury, Telling Your Story: A Journaling Workbook Emotional Stages of Recovery How To Tell Your Story How Well Will My Survivor Recover? Nurturing Your Sense of Self Positive Approach to Coping with Life after Brain Injury Self-Esteem After Brain Injury\n\nGeneral Information\n\nMapping the Way—Drug Therapy and Brain Injury Maximal Medical Improvement Neurotechnology for Brain Injury Post-Rehabilitation Recovery Physical Therapy Recovering from Brain Injury—A Continual Process The Post Rehab Slump When Will I Recover?\n\nSelf-Advocacy\n\nDealing Effectively with Your Doctor\n\nDealing with Doctors\n\nHow to Be Your Own Brain Injury Case Manager\n\nHow to Find What You Need\n\nRehabilitation\n\nSeniors\n\nAging and Brain Injury\n\nAging and the Behavioral Problems of Brain Injury\n\nStatewide Benefits for Older Persons (NJDHSS)\n\nTBI and Older Adults\n\nSexuality\n\nAdolescents with Brain Injury: Issues of Sexuality\n\nCoping with Sexual Problems after TBI\n\nDisruption of Sexuality Following a Head Injury\n\nSexual Changes\n\nSocial Security\n\nAppeals Process\n\nBenefits for Children\n\nFiguring Out Social Security Benefits After a TBI\n\nHow We Decide if You Are Still Disabled\n\nHow Workers Compensation and Other Disability Payments May Affect Your Benefits\n\nNJWINS Brochure\n\nReviewing Your Disability\n\nSocial Security Disability and SSI Claims: Your Need for Representation\n\nSocial Security Disability: Determination and Review Regarding TBI\n\nWhat You Should Know Before You Apply for SSD Benefits\n\nWhen a Representative Payee Manages Your Money\n\nYou May Be Able to Get SSI\n\nYour Guide to the Disability Process\n\nYour Right to Question the Decision to Stop Your Disability Benefits\n\nYour Right to Representation\n\nSpanish\n\nConsequences of Brain Injury\n\nAphasia\n\nEmotional Problems and Brain Injury\n\nFatigue and Brain Injury\n\nHead Injuries\n\nPersonality Changes Following Acquired Brain Injury\n\nGeneral Information\n\nAlcohol and Brain Injury\n\nBrain Injury—Discharge\n\nBrain Injury and Substance Abuse\n\nCerebral Hypoxia\n\nDisability Rights New Jersey\n\nMedicaid Managed Care (Boggs Center booklet)\n\nOne-Stop Career Center\n\nReturn to Work—A Personal Perspective\n\nRight Hemisphere Lesions\n\nSelecting a Neurolawyer\n\nSocial Security Information\n\nStroke\n\nTraumatic Brain Injury Factsheet\n\nWhat is a Coma?\n\nWhat is a Support Group?\n\nWhat You Should Know About Minor Head Injury\n\nPediatrics\n\nBenefits for Children with Disabilities (Social Security Administration)\n\nConcussion in Sports\n\nNew Jersey's Early Intervention System FAQ\n\nSports Concussion in High School—Facts for Coaches\n\nSports Concussion in High School—Facts for Parents\n\nWhat is Shaken Baby Syndrome?\n\nPrevention\n\nBIAA Prevention Fact Sheets\n\nHelmets for Children: A Guide for Parents\n\nHow to Prevent Brain Injury\n\nPreventing Concussion\n\nRehabilitation\n\nGuide to Selecting and Monitoring Brain Injury Rehabilitation Services\n\nJourney Towards Recovery: A Guide for Families\n\nRoad to Rehab (entire booklet)\n\nRoad to Rehab, Part 1: Pathways to Comfort: Dealing with Pain & Brain Injury\n\nRoad to Rehab, Part 2: Highways to Healing: Post-Traumatic Headaches & Brain Injury\n\nRoad to Rehab, Part 3: Guideposts to Recognition: Cognition, Memory & Brain Injury\n\nRoad to Rehab, Part 4: Navigating The Curves: Behavior Changes & Brain Injury\n\nRoad to Rehab, Part 5: Crossing the Communication Bridge: Speech, Language & Brain Injury\n\nRoad to Rehab, Part 6: Mapping the Way: Drug Therapy & Brain Injury\n\nRoad to Rehab, Part 7: Traveling Toward Relief: Dealing with Spasticity & Brain Injury\n\nRoad to Rehab, Part 8: Journey Toward Understanding: Concussion & Mild Brain Injury\n\nSpecial Education\n\nEducation Law Center Special Education Guide\n\nKnow Your Rights—Transition Planning\n\nMediation in Special Education—A Guide for Parents\n\nNeuropsychological Assessment and Schools\n\nNICHCY Factsheet on Brain Injury\n\nPlanning School Transitions for Students with TBI\n\nTransition to Adult Healthcare (Boggs Center booklet)\n\nStatistics (Not in File Library)\n\nBrain Injury Fact Sheet (BIANJ factsheet)\n\nTBI Incidence Fact Sheet (BIANJ factsheet)\n\nSubstance Abuse\n\nAlcohol Use After TBI\n\nBrain Injury / Addictive Disorders: 12-Step Workbook\n\nDenial of Substance Abuse: Symptom of Brain Injury\n\nFamily Guide to Use of Alcohol and Other Substances after Brain Injury\n\nSubstance Abuse Issues after TBI\n\nSubstance Abuse Treatment Advisory: Treating Clients with TBI\n\nSubstance Abuse Treatment for People with Disabilities (Treatment Improvement Protocol)\n\nTreating Substance Abuse in Individuals with TBI\n\nUser's Manual (Ohio Valley Center)\n\nTransportation\n\nNJ Access Link Passenger Guidelines\n\nNJ Guide to Handicapped Parking\n\nNJ MVC Medical Review Guidelines\n\nNJ Transit: Guide to Accessible Services\n\nPeople with Disabilities Find a Ride Online\n\nTransportation Options for People with Brain Injury (BIANJ factsheet)\n\nVeterans' Issues\n\nBrain Injuries Can Range from Loss of Coordination to Loss of Self\n\nCommunity Justice Center\n\nDefense and Veterans Brain Injury Center\n\nDisability Benefits for Wounded Warriors\n\nResources for Wounded Service Members and their Families\n\nUnderstanding Post-Deployment Stress Symptoms\n\nVeterans Health Care Benefits Overview\n\nWar on the Brain\n</text>\n",
"role": "user"
},
{
"content": "in Injury\n\nPositive Ways to Manage Behavior\n\nUnderstanding Your Emotions\n\nCognition / Memory\n\nAm I Nothing But What I Remember?",
"role": "assistant"
}
] |
```
CITY COUNCIL CITY OF NEW YORK ------------------------X TRANSCRIPT OF THE MINUTES of the STATED MEETING ------------------------X April 2, 2009 Start: 2:25 pm Recess: 3:37 pm HELD AT: Council Chambers City Hall B E F O R E: CHRISTINE C. QUINN SPEAKER COUNCIL MEMBERS: Council Member Maria del Carmen Arroyo Council Member Tony Avella Council Member Maria Baez Council Member Charles Barron Council Member Gale A. Brewer Council Member Leroy G. Comrie, Jr. Council Member Elizabeth Crowley Council Member Bill de Blasio Council Member Inez E. Dickens Council Member Erik Martin Dilan Council Member Mathieu Eugene Council Member Simcha Felder Council Member Julissa Ferreras Council Member Lewis A. Fidler Council Member Helen D. Foster Council Member Daniel R. Garodnick Council Member James F. Gennaro Council Member Alan J. Gerson
```
APPEARANCES
COUNCIL MEMBERS:
```
Council Member Eric N. Gioia Council Member Vincent Ignizio Council Member Robert Jackson Council Member Letitia James Council Member Melina R. Katz Council Member G. Oliver Koppell Council Member John C. Liu Council Member Melissa MarkViverito Council Member Miguel Martinez Council Member Darlene Mealy Council Member Rosie Mendez Council Member Kenneth Mitchell Council Member Michael C. Nelson Council Member James S. Oddo Council Member Annabel Palma Council Member Domenic M. Recchia, Jr. Council Member Diana Reyna Council Member Joel Rivera Council Member James Sanders, Jr. Council Member Larry B. Seabrook Council Member Helen Sears Council Member Kendall Stewart Council Member Eric Ulrich Council Member James Vacca Council Member Peter F. Vallone, Jr. Council Member Albert Vann Council Member David I. Weprin Council Member Thomas White, Jr. Council Member David Yassky
```
APPEARANCES [CONTINUED]
Christine C. Quinn Speaker
Sophomore Class Brooklyn Generation School
Reverend Charles Lewis
Invocation
Alix Pustilnik Governmental Affairs Division
Adira Siman Human Services Division
Julene Beckford
Counsel
Governmental Affairs Division
Jim Caras Office of the General Counsel
Damien Butvick
Counsel
Governmental Affairs Division
Danielle Castaldi-Micca, Community Outreach
Lyle Frank Committee Counsel Infrastructure Division
Patrick Mulvihill
Infrastructure Division
Nicole Ramsey Infrastructure Division
Danielle Avetto
Council Staff
APPEARANCES [CONTINUED]
Phillip Hom
Committee Counsel
All Council Staff not otherwise mentioned
Elizabeth Crowley
Council Member
Charles Barron
Council Member
Joyce Simmons
Council Member Barron
Chief of Staff
Monique Washington
Council Member Barron
Councilmatic Aide
Viola Plummer Chief of Staff Assemblywoman Inez Barron
Man Up, Inc. Developer of Gateway Estates II
Robert Jackson
Council Member
Miguel Martinez
Council Member
Family of Alex Felix
Melissa Mark-Viverito
Council Member
Inez Dickens
Council Member
Daniel R. Garodnick
Council Member
APPEARANCES [CONTINUED]
Reverend Doctor Johnny Ray Youngblood Supporter of Gateway Estates II
Reverend Brawley Supporter of Gateway Estates II
Sarah Brannon
Council Staff
Policy Unit
Helen D. Foster
Council Member
Robert Jackson
Council Member
Darlene Mealy
Council Member
Gale A. Brewer
Council Member
Erik Martin Dilan
Council Member
Inez E. Dickens
Council Member
25
COUNCIL MEMBER COMRIE: Here.
7
2
STATED MEETING
COMMITTEE CLERK: Crowley.
25
PUBLIC ADVOCATE GOTBAUM: So
17
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
clinics in the City and to make sure that doctors and nurses and health care professionals could come in and out of those women's health clinics to make sure women could access their legally right to reproductive health care.
Now a lot of us would like to think that the situations that caused the need for that bill in 1994 are gone and that there are no longer protestors outside of women's health clinics in our five Boroughs. But the sad truth is they are not gone. And on many streets, in front of many clinics, on many days of the week, protestors stand on the streets outside clinics; stand in front of the doors of those clinics; oftentimes making it impossible for those clinics to serve their patients. Protestors harass and intimidate women, sometimes scaring them away from going in and getting reproductive health care that they and their families have decided is the right course for their action for them and their families.
What we found is that the 1994 law, although well intentioned, after 15 years of experience with it has loopholes in it. This action today will close those loopholes and put a
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
law on the books in our five Boroughs that is actually usable and enforceable, that will allow women to access their legal right to reproductive health care.
So now once we pass this law, a clinic will be able to press charges and have someone arrested if they are disrupting access to their clinic--
[Applause]
SERGEANT AT ARMS: Quiet please, settle down.
SPEAKER QUINN: If Madam--if you could just hold the outbursts. Now after we pass our law, it will no longer be only the patient who can cause, call for people to be arrested or charges to be filed. Right now the law says only the woman who is going to be an abortion can have someone arrested or have charges filed against them. Think of that burden.
Someone who has decided to make this decision, which is a very difficult decision, they may not have shared that with others in their lives. They now are the only one who can press charges. They're going to have to go back to
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
court countless times. What this means is that before--up until now when we change this law, even if a police officer saw an individual breaking the law they couldn't take action unless the patient had asked them too.
Well with this law we're going to allow our police officers to be police officers in front of reproductive health clinics and take action when they see people breaking the law. This is the least that women deserve in our five Boroughs and the least that the doctors and nurses and professionals who run our clinics deserve in our five Boroughs. This is an important day to send a message that we will not allow people to threaten, harass or intimidate women or health care professionals.
Let me also say this bill allows anyone who wants to legally protest in a peaceful way, it allows them to express and use their First Amendment rights. We have taken great pains working with civil liberties groups and other-civil liberties groups and even some who oppose this bill, to make sure that no one's First Amendment rights are taken away. You can legally
25
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
urging the State to allow the City to have 50 more red light cameras. We have another Home Rule Message today, once again, making a statement that the City of New York believes that the State legislature should repeal the Urstadt Law and allow--
[Applause]
SPEAKER QUINN: --the City Council to be the legislative body that decides the rent laws for our City. We also have a Home Rule Message urging Albany to repeal Vacancy Decontrol. That erosion of tenant protections has caused the loss of countless tens of thousands of apartments in the City of New York. By repealing Vacancy Decontrol we will have the opportunity to recapture many of those apartments as affordable apartments in the City of New York.
I want to finally thank our Rules Committee Chair for moving an appointment through today to the Equal Employment Practices commission. And also Chairperson Diana Reyna. And also Chairperson Melinda Katz and the Land Use staff for the numerous items that they have worked on that we'll be voting on today. And that
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
the District that I represent, 1,100 seat high school in Maspeth. I believe that the high school proposal, the one that we're voting on today still needs work. As a Council Member it's been very difficult accepting and agreeing with the Department of Education. I'd like to thank the Speaker for her help during the past couple of weeks as I've worked on these difficulties with the Department of Education.
And while I do not agree with the Deputy Mayor Dennis Walcott, and the Department and their policies, moreover, their reluctance to give priority zoning to those who live closest to the school, I do thank the Deputy Mayor for his time and focus over the past couple of weeks. I'd like to also thank my colleagues in this body whose knowledge and support I'm so grateful for over the past couple of weeks.
I want to let you know that today I'm going to vote no on this proposal. Let me be clear. I want a school in Maspeth but I cannot agree with this plan. In an effort to alleviate traffic and transit concerns raised by the community I've asked the Department of Education
25
[Laughter]
25
25
career school and a community center for the
25
25
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
don't believe that those are mutually exclusive principles. Vigorous debate and passionate discourse are fundamental to our democracy but harassment, threats and physical confrontations are not protected forms of speech and indeed they undermine those cherished democratic values.
We cannot stand here in 2009 in New York City and allow individuals or groups to exceed the boundaries of lawful expression by physically blocking access to clinics or by intimidating those who seek their services. It makes it impossible for a clinic to function and impedes a legal right of the citizens of New York City.
Unfortunately current law does not adequately protect our reproductive health care facilities and those who work for or seek services from those facilities. So this law, 826A, in my view, is critically important to strengthen the prohibitions on interference with these important services. I want to thank the Speaker for her leadership on this as well as Planned Parenthood, the other advocacy groups and I encourage my colleagues to vote yes. Thank you.
STATED MEETING
STATED MEETING
25
ordered.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
siting of a school in her District.
I do want to encourage my members though to vote for this school. Queens, right now, has all of the schools in the northeast corridor are over 150% crowded and growing. We need to site this building as soon as possible to deal with the issues of zoning and local zoning for a school is a very difficult issue.
I want to congratulate Council Member Crowley on achieving an opportunity to make sure that community residents in her District do attend this school. I do want to caution that that can be--create a major problem for the people that need to attend schools outside of their District because of the desire to get into programs or desire to actually get out of schools that are in their community that are subsufficient.
I think that we need to make sure that as we deal with the public siting of schools in the future, one thing that we will be doing is sending a letter from the Queens Delegation to the Department of Education because they have severely underestimated the amount of seats needed in the
2
housing in New York City.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
to highlight the severity of what's happening, particularly in the Department of Education when it comes to school siting.
The lack of communication with communities, the lack of communication with parents and the lack of communication with elected officials of a particular area when the Department decides to site a school, it leads to these type of results where virtually sometimes communities are divided. Where all the information's are not being provided. And yet decisions are made by the Department before they're even brought to the communities.
And this is what happens when this type of system continues to operate. There needs to be more transparency. There needs to be more parental involvement, not only from the curriculum perspective but on the school siting aspect in our communities. I know that the Council Member worked diligently and hard to ensure she delivered for her community. However, on that particular item, I must vote--
SERGEANT AT ARMS: [Interposing]
Quiet please.
25
ordered.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
side. And this bill protects everyone's rights to peacefully demonstrate. Whether you are for the clinic and its services or you are against it, it gives you the right to stand out there and to peacefully express and demonstrate how you feel.
This does not take away anyone's Constitutional rights. And I also would like to state that these clinics are women's issues and to gynecological treatments and they also diagnose and we must not forget that. So I want to thank, because this bill is extraordinary, and it was really an honor for me to chair that hearing.
On Reso 1913 and 1031 I am voting yes but I need to make a statement. One to thank Councilwoman Crowley for her efforts on behalf of her District, but no school, and I have three of them in my District that are vibrant commercial areas, and no school should be built in a very dynamic commercial area. It does take away when there are holidays. It's a darkened area. It's darkened in the summer.
However, because we do need schools in Queens, I am voting yes, but I also urge that as we look at these sitings, that we look more and
25
Happy Birthday anyway, Melissa.
25
25
25
A little bit of background, a
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
couple of years ago, the Cypress Hills portion of my District was awarded a nice new $50 million school for the area that PS 65 will move into in September. The building that they're currently in which is a DOE facility, we hear now will be inhabited by a charter school in September.
And they get around the siting laws because the charter school is not--it its own entity in and of itself. With that, the charter school brings in their own children and they are going to being in approximately 300 children that are not from the Cypress Hills area.
So the result of the new school means a net loss or only a net gain of 300 seats as opposed to the 600 plus net gain in seats that the Cypress Hill Community was expecting. I'm outraged. My constituents are outraged. And I want to ask the Chair of the Education Committee to work with me on this and the appropriate members of the State legislature to pass the bills up in Albany. Thank you Madam Public Advocate. PUBLIC ADVOCATE GOTBAUM: Council
Member Dickens.
COUNCIL MEMBER DICKENS: Thank you
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Madam Public Advocate. I join with my colleague Council Member Dilan in supporting him on Reso 1898 because the State legislature needs to review and look at and make changes to the existing law as it relates to how charter schools are mandated. So I want to thank Council Member Dilan for bringing this to light and bringing this resolution out. And I wholeheartedly support him in this.
PUBLIC ADVOCATE GOTBAUM: Seeing
nobody else--oh wait a minute. I've got to read this. [chuckling] Sorry. All items on today's general order calendar were adopted by a vote of 48 in the affirmative, 0 negative, 0 abstentions with the exception of LU 1031 and Reso 1913 which was adopted by a vote of 38 in the affirmative, 10 negative, 0 abstentions; and Intro 826A which was adopted by a vote of 40 in the affirmative, 8 negative, 0 abstentions; and SLR 1, 44 in the affirmative, 4 negative, 0 abstentions; and SLR 2, 38 affirmative, 5 negative, 5 abstentions; and SL 3, 45 affirmative, 3 negative and 0 abstentions; and Preconsidered Reso 1896, 47 in the affirmative, 1 negative, 0 abstentions. Revised
CERTIFICATE
I, Laura L. Springate certify that the foregoing transcript is a true and accurate record of the proceedings. I further certify that I am not related to any of the parties to this action by blood or marriage, and that I am in no way interested in the outcome of this matter.
Signature __Laura L. Springate________
Date _____April 16, 2009____________
|
<urn:uuid:125b7cf3-0bf7-4374-a5c3-86551de8e920>
|
CC-MAIN-2024-18
|
https://legistar.council.nyc.gov/View.ashx?M=F&ID=679088&GUID=86C0CA16-320F-45DE-8A64-E0B92C235BBB
|
2024-04-14T22:51:53+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-18/subset=warc/part-00295-29538f81-5664-4df2-acb6-7d8ba3d2a1aa.c000.gz.parquet
| 328,083,815
| 4,004
|
eng_Latn
|
eng_Latn
| 0.724267
|
eng_Latn
| 0.99521
|
[
"kiu_Latn",
"kiu_Latn",
"eng_Latn",
"kiu_Latn",
"kiu_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
840,
1764,
2348,
2926,
3311,
3346,
3396,
3430,
3434,
4645,
5680,
6846,
6850,
7971,
9152,
9168,
9172,
9222,
9226,
9230,
10386,
10402,
10418,
10432,
11576,
11606,
12704,
12718,
13915,
13952,
13956,
13960,
13995,
15144,
16336,
16704
] |
```
CITY COUNCIL CITY OF NEW YORK ------------------------X TRANSCRIPT OF THE MINUTES of the STATED MEETING ------------------------X April 2, 2009 Start: 2:25 pm Recess: 3:37 pm HELD AT: Council Chambers City Hall B E F O R E: CHRISTINE C. QUINN SPEAKER COUNCIL MEMBERS: Council Member Maria del Carmen Arroyo Council Member Tony Avella Council Member Maria Baez Council Member Charles Barron Council Member Gale A. Brewer Council Member Leroy G. Comrie, Jr. Council Member Elizabeth Crowley Council Member Bill de Blasio Council Member Inez E. Dickens Council Member Erik Martin Dilan Council Member Mathieu Eugene Council Member Simcha Felder Council Member Julissa Ferreras Council Member Lewis A. Fidler Council Member Helen D. Foster Council Member Daniel R. Garodnick Council Member James F. Gennaro Council Member Alan J. Gerson
```
APPEARANCES
COUNCIL MEMBERS:
```
Council Member Eric N. Gioia Council Member Vincent Ignizio Council Member Robert Jackson Council Member Letitia James Council Member Melina R. Katz Council Member G. Oliver Koppell Council Member John C. Liu Council Member Melissa MarkViverito Council Member Miguel Martinez Council Member Darlene Mealy Council Member Rosie Mendez Council Member Kenneth Mitchell Council Member Michael C. Nelson Council Member James S. Oddo Council Member Annabel Palma Council Member Domenic M. Recchia, Jr. Council Member Diana Reyna Council Member Joel Rivera Council Member James Sanders, Jr. Council Member Larry B. Seabrook Council Member Helen Sears Council Member Kendall Stewart Council Member Eric Ulrich Council Member James Vacca Council Member Peter F. Vallone, Jr. Council Member Albert Vann Council Member David I. Weprin Council Member Thomas White, Jr. Council Member David Yassky
```
APPEARANCES [CONTINUED]
Christine C. Quinn Speaker
Sophomore Class Brooklyn Generation School
Reverend Charles Lewis
Invocation
Alix Pustilnik Governmental Affairs Division
Adira Siman Human Services Division
Julene Beckford
Counsel
Governmental Affairs Division
Jim Caras Office of the General Counsel
Damien Butvick
Counsel
Governmental Affairs Division
Danielle Castaldi-Micca, Community Outreach
Lyle Frank Committee Counsel Infrastructure Division
Patrick Mulvihill
Infrastructure Division
Nicole Ramsey Infrastructure Division
Danielle Avetto
Council Staff
APPEARANCES [CONTINUED]
Phillip Hom
Committee Counsel
All Council Staff not otherwise mentioned
Elizabeth Crowley
Council Member
Charles Barron
Council Member
Joyce Simmons
Council Member Barron
Chief of Staff
Monique Washington
Council Member Barron
Councilmatic Aide
Viola Plummer Chief of Staff Assemblywoman Inez Barron
Man Up, Inc. Developer of Gateway Estates II
Robert Jackson
Council Member
Miguel Martinez
Council Member
Family of Alex Felix
Melissa Mark-Viverito
Council Member
Inez Dickens
Council Member
Daniel R. Garodnick
Council Member
APPEARANCES [CONTINUED]
Reverend Doctor Johnny Ray Youngblood Supporter of Gateway Estates II
Reverend Brawley Supporter of Gateway Estates II
Sarah Brannon
Council Staff
Policy Unit
Helen D. Foster
Council Member
Robert Jackson
Council Member
Darlene Mealy
Council Member
Gale A. Brewer
Council Member
Erik Martin Dilan
Council Member
Inez E. Dickens
Council Member
25
COUNCIL MEMBER COMRIE: Here.
7
2
STATED MEETING
COMMITTEE CLERK: Crowley.
25
PUBLIC ADVOCATE GOTBAUM: So
17
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
clinics in the City and to make sure that doctors and nurses and health care professionals could come in and out of those women's health clinics to make sure women could access their legally right to reproductive health care.
Now a lot of us would like to think that the situations that caused the need for that bill in 1994 are gone and that there are no longer protestors outside of women's health clinics in our five Boroughs. But the sad truth is they are not gone. And on many streets, in front of many clinics, on many days of the week, protestors stand on the streets outside clinics; stand in front of the doors of those clinics; oftentimes making it impossible for those clinics to serve their patients. Protestors harass and intimidate women, sometimes scaring them away from going in and getting reproductive health care that they and their families have decided is the right course for their action for them and their families.
What we found is that the 1994 law, although well intentioned, after 15 years of experience with it has loopholes in it. This action today will close those loopholes and put a
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
law on the books in our five Boroughs that is actually usable and enforceable, that will allow women to access their legal right to reproductive health care.
So now once we pass this law, a clinic will be able to press charges and have someone arrested if they are disrupting access to their clinic--
[Applause]
SERGEANT AT ARMS: Quiet please, settle down.
SPEAKER QUINN: If Madam--if you could just hold the outbursts. Now after we pass our law, it will no longer be only the patient who can cause, call for people to be arrested or charges to be filed. Right now the law says only the woman who is going to be an abortion can have someone arrested or have charges filed against them. Think of that burden.
Someone who has decided to make this decision, which is a very difficult decision, they may not have shared that with others in their lives. They now are the only one who can press charges. They're going to have to go back to
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
court countless times. What this means is that before--up until now when we change this law, even if a police officer saw an individual breaking the law they couldn't take action unless the patient had asked them too.
Well with this law we're going to allow our police officers to be police officers in front of reproductive health clinics and take action when they see people breaking the law. This is the least that women deserve in our five Boroughs and the least that the doctors and nurses and professionals who run our clinics deserve in our five Boroughs. This is an important day to send a message that we will not allow people to threaten, harass or intimidate women or health care professionals.
Let me also say this bill allows anyone who wants to legally protest in a peaceful way, it allows them to express and use their First Amendment rights. We have taken great pains working with civil liberties groups and other-civil liberties groups and even some who oppose this bill, to make sure that no one's First Amendment rights are taken away. You can legally
25
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
urging the State to allow the City to have 50 more red light cameras. We have another Home Rule Message today, once again, making a statement that the City of New York believes that the State legislature should repeal the Urstadt Law and allow--
[Applause]
SPEAKER QUINN: --the City Council to be the legislative body that decides the rent laws for our City. We also have a Home Rule Message urging Albany to repeal Vacancy Decontrol. That erosion of tenant protections has caused the loss of countless tens of thousands of apartments in the City of New York. By repealing Vacancy Decontrol we will have the opportunity to recapture many of those apartments as affordable apartments in the City of New York.
I want to finally thank our Rules Committee Chair for moving an appointment through today to the Equal Employment Practices commission. And also Chairperson Diana Reyna. And also Chairperson Melinda Katz and the Land Use staff for the numerous items that they have worked on that we'll be voting on today. And that
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
the District that I represent, 1,100 seat high school in Maspeth. I believe that the high school proposal, the one that we're voting on today still needs work. As a Council Member it's been very difficult accepting and agreeing with the Department of Education. I'd like to thank the Speaker for her help during the past couple of weeks as I've worked on these difficulties with the Department of Education.
And while I do not agree with the Deputy Mayor Dennis Walcott, and the Department and their policies, moreover, their reluctance to give priority zoning to those who live closest to the school, I do thank the Deputy Mayor for his time and focus over the past couple of weeks. I'd like to also thank my colleagues in this body whose knowledge and support I'm so grateful for over the past couple of weeks.
I want to let you know that today I'm going to vote no on this proposal. Let me be clear. I want a school in Maspeth but I cannot agree with this plan. In an effort to alleviate traffic and transit concerns raised by the community I've asked the Department of Education
25
[Laughter]
25
25
career school and a community center for the
25
25
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
don't believe that those are mutually exclusive principles. Vigorous debate and passionate discourse are fundamental to our democracy but harassment, threats and physical confrontations are not protected forms of speech and indeed they undermine those cherished democratic values.
We cannot stand here in 2009 in New York City and allow individuals or groups to exceed the boundaries of lawful expression by physically blocking access to clinics or by intimidating those who seek their services. It makes it impossible for a clinic to function and impedes a legal right of the citizens of New York City.
Unfortunately current law does not adequately protect our reproductive health care facilities and those who work for or seek services from those facilities. So this law, 826A, in my view, is critically important to strengthen the prohibitions on interference with these important services. I want to thank the Speaker for her leadership on this as well as Planned Parenthood, the other advocacy groups and I encourage my colleagues to vote yes. Thank you.
STATED MEETING
STATED MEETING
25
ordered.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
siting of a school in her District.
I do want to encourage my members though to vote for this school. Queens, right now, has all of the schools in the northeast corridor are over 150% crowded and growing. We need to site this building as soon as possible to deal with the issues of zoning and local zoning for a school is a very difficult issue.
I want to congratulate Council Member Crowley on achieving an opportunity to make sure that community residents in her District do attend this school. I do want to caution that that can be--create a major problem for the people that need to attend schools outside of their District because of the desire to get into programs or desire to actually get out of schools that are in their community that are subsufficient.
I think that we need to make sure that as we deal with the public siting of schools in the future, one thing that we will be doing is sending a letter from the Queens Delegation to the Department of Education because they have severely underestimated the amount of seats needed in the
2
housing in New York City.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
to highlight the severity of what's happening, particularly in the Department of Education when it comes to school siting.
The lack of communication with communities, the lack of communication with parents and the lack of communication with elected officials of a particular area when the Department decides to site a school, it leads to these type of results where virtually sometimes communities are divided. Where all the information's are not being provided. And yet decisions are made by the Department before they're even brought to the communities.
And this is what happens when this type of system continues to operate. There needs to be more transparency. There needs to be more parental involvement, not only from the curriculum perspective but on the school siting aspect in our communities. I know that the Council Member worked diligently and hard to ensure she delivered for her community. However, on that particular item, I must vote--
SERGEANT AT ARMS: [Interposing]
Quiet please.
25
ordered.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
side. And this bill protects everyone's rights to peacefully demonstrate. Whether you are for the clinic and its services or you are against it, it gives you the right to stand out there and to peacefully express and demonstrate how you feel.
This does not take away anyone's Constitutional rights. And I also would like to state that these clinics are women's issues and to gynecological treatments and they also diagnose and we must not forget that. So I want to thank, because this bill is extraordinary, and it was really an honor for me to chair that hearing.
On Reso 1913 and 1031 I am voting yes but I need to make a statement. One to thank Councilwoman Crowley for her efforts on behalf of her District, but no school, and I have three of them in my District that are vibrant commercial areas, and no school should be built in a very dynamic commercial area. It does take away when there are holidays. It's a darkened area. It's darkened in the summer.
However, because we do need schools in Queens, I am voting yes, but I also urge that as we look at these sitings, that we look more and
25
Happy Birthday anyway, Melissa.
25
25
25
A little bit of background, a
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
couple of years ago, the Cypress Hills portion of my District was awarded a nice new $50 million school for the area that PS 65 will move into in September. The building that they're currently in which is a DOE facility, we hear now will be inhabited by a charter school in September.
And they get around the siting laws because the charter school is not--it its own entity in and of itself. With that, the charter school brings in their own children and they are going to being in approximately 300 children that are not from the Cypress Hills area.
So the result of the new school means a net loss or only a net gain of 300 seats as opposed to the 600 plus net gain in seats that the Cypress Hill Community was expecting. I'm outraged. My constituents are outraged. And I want to ask the Chair of the Education Committee to work with me on this and the appropriate members of the State legislature to pass the bills up in Albany. Thank you Madam Public Advocate. PUBLIC ADVOCATE GOTBAUM: Council
Member Dickens.
COUNCIL MEMBER DICKENS: Thank you
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Madam Public Advocate. I join with my colleague Council Member Dilan in supporting him on Reso 1898 because the State legislature needs to review and look at and make changes to the existing law as it relates to how charter schools are mandated. So I want to thank Council Member Dilan for bringing this to light and bringing this resolution out. And I wholeheartedly support him in this.
PUBLIC ADVOCATE GOTBAUM: Seeing
nobody else--oh wait a minute. I've got to read this. [chuckling] Sorry. All items on today's general order calendar were adopted by a vote of 48 in the affirmative, 0 negative, 0 abstentions with the exception of LU 1031 and Reso 1913 which was adopted by a vote of 38 in the affirmative, 10 negative, 0 abstentions; and Intro 826A which was adopted by a vote of 40 in the affirmative, 8 negative, 0 abstentions; and SLR 1, 44 in the affirmative, 4 negative, 0 abstentions; and SLR 2, 38 affirmative, 5 negative, 5 abstentions; and SL 3, 45 affirmative, 3 negative and 0 abstentions; and Preconsidered Reso 1896, 47 in the affirmative, 1 negative, 0 abstentions. Revised
CERTIFICATE
I, Laura L. Springate certify that the foregoing transcript is a true and accurate record of the proceedings. I further certify that I am
|
not related to any of the parties to this action by blood or marriage, and that I am in no way interested in the outcome of this matter.
|
Signature __Laura L. Springate________
Date _____April 16, 2009____________
| 16,489
|
end_of_word
|
am
|
remove_one_sentence
|
<url>
https://legistar.council.nyc.gov/View.ashx?M=F&ID=679088&GUID=86C0CA16-320F-45DE-8A64-E0B92C235BBB
</url>
<text>
```
CITY COUNCIL CITY OF NEW YORK ------------------------X TRANSCRIPT OF THE MINUTES of the STATED MEETING ------------------------X April 2, 2009 Start: 2:25 pm Recess: 3:37 pm HELD AT: Council Chambers City Hall B E F O R E: CHRISTINE C. QUINN SPEAKER COUNCIL MEMBERS: Council Member Maria del Carmen Arroyo Council Member Tony Avella Council Member Maria Baez Council Member Charles Barron Council Member Gale A. Brewer Council Member Leroy G. Comrie, Jr. Council Member Elizabeth Crowley Council Member Bill de Blasio Council Member Inez E. Dickens Council Member Erik Martin Dilan Council Member Mathieu Eugene Council Member Simcha Felder Council Member Julissa Ferreras Council Member Lewis A. Fidler Council Member Helen D. Foster Council Member Daniel R. Garodnick Council Member James F. Gennaro Council Member Alan J. Gerson
```
APPEARANCES
COUNCIL MEMBERS:
```
Council Member Eric N. Gioia Council Member Vincent Ignizio Council Member Robert Jackson Council Member Letitia James Council Member Melina R. Katz Council Member G. Oliver Koppell Council Member John C. Liu Council Member Melissa MarkViverito Council Member Miguel Martinez Council Member Darlene Mealy Council Member Rosie Mendez Council Member Kenneth Mitchell Council Member Michael C. Nelson Council Member James S. Oddo Council Member Annabel Palma Council Member Domenic M. Recchia, Jr. Council Member Diana Reyna Council Member Joel Rivera Council Member James Sanders, Jr. Council Member Larry B. Seabrook Council Member Helen Sears Council Member Kendall Stewart Council Member Eric Ulrich Council Member James Vacca Council Member Peter F. Vallone, Jr. Council Member Albert Vann Council Member David I. Weprin Council Member Thomas White, Jr. Council Member David Yassky
```
APPEARANCES [CONTINUED]
Christine C. Quinn Speaker
Sophomore Class Brooklyn Generation School
Reverend Charles Lewis
Invocation
Alix Pustilnik Governmental Affairs Division
Adira Siman Human Services Division
Julene Beckford
Counsel
Governmental Affairs Division
Jim Caras Office of the General Counsel
Damien Butvick
Counsel
Governmental Affairs Division
Danielle Castaldi-Micca, Community Outreach
Lyle Frank Committee Counsel Infrastructure Division
Patrick Mulvihill
Infrastructure Division
Nicole Ramsey Infrastructure Division
Danielle Avetto
Council Staff
APPEARANCES [CONTINUED]
Phillip Hom
Committee Counsel
All Council Staff not otherwise mentioned
Elizabeth Crowley
Council Member
Charles Barron
Council Member
Joyce Simmons
Council Member Barron
Chief of Staff
Monique Washington
Council Member Barron
Councilmatic Aide
Viola Plummer Chief of Staff Assemblywoman Inez Barron
Man Up, Inc. Developer of Gateway Estates II
Robert Jackson
Council Member
Miguel Martinez
Council Member
Family of Alex Felix
Melissa Mark-Viverito
Council Member
Inez Dickens
Council Member
Daniel R. Garodnick
Council Member
APPEARANCES [CONTINUED]
Reverend Doctor Johnny Ray Youngblood Supporter of Gateway Estates II
Reverend Brawley Supporter of Gateway Estates II
Sarah Brannon
Council Staff
Policy Unit
Helen D. Foster
Council Member
Robert Jackson
Council Member
Darlene Mealy
Council Member
Gale A. Brewer
Council Member
Erik Martin Dilan
Council Member
Inez E. Dickens
Council Member
25
COUNCIL MEMBER COMRIE: Here.
7
2
STATED MEETING
COMMITTEE CLERK: Crowley.
25
PUBLIC ADVOCATE GOTBAUM: So
17
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
clinics in the City and to make sure that doctors and nurses and health care professionals could come in and out of those women's health clinics to make sure women could access their legally right to reproductive health care.
Now a lot of us would like to think that the situations that caused the need for that bill in 1994 are gone and that there are no longer protestors outside of women's health clinics in our five Boroughs. But the sad truth is they are not gone. And on many streets, in front of many clinics, on many days of the week, protestors stand on the streets outside clinics; stand in front of the doors of those clinics; oftentimes making it impossible for those clinics to serve their patients. Protestors harass and intimidate women, sometimes scaring them away from going in and getting reproductive health care that they and their families have decided is the right course for their action for them and their families.
What we found is that the 1994 law, although well intentioned, after 15 years of experience with it has loopholes in it. This action today will close those loopholes and put a
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
law on the books in our five Boroughs that is actually usable and enforceable, that will allow women to access their legal right to reproductive health care.
So now once we pass this law, a clinic will be able to press charges and have someone arrested if they are disrupting access to their clinic--
[Applause]
SERGEANT AT ARMS: Quiet please, settle down.
SPEAKER QUINN: If Madam--if you could just hold the outbursts. Now after we pass our law, it will no longer be only the patient who can cause, call for people to be arrested or charges to be filed. Right now the law says only the woman who is going to be an abortion can have someone arrested or have charges filed against them. Think of that burden.
Someone who has decided to make this decision, which is a very difficult decision, they may not have shared that with others in their lives. They now are the only one who can press charges. They're going to have to go back to
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
court countless times. What this means is that before--up until now when we change this law, even if a police officer saw an individual breaking the law they couldn't take action unless the patient had asked them too.
Well with this law we're going to allow our police officers to be police officers in front of reproductive health clinics and take action when they see people breaking the law. This is the least that women deserve in our five Boroughs and the least that the doctors and nurses and professionals who run our clinics deserve in our five Boroughs. This is an important day to send a message that we will not allow people to threaten, harass or intimidate women or health care professionals.
Let me also say this bill allows anyone who wants to legally protest in a peaceful way, it allows them to express and use their First Amendment rights. We have taken great pains working with civil liberties groups and other-civil liberties groups and even some who oppose this bill, to make sure that no one's First Amendment rights are taken away. You can legally
25
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
urging the State to allow the City to have 50 more red light cameras. We have another Home Rule Message today, once again, making a statement that the City of New York believes that the State legislature should repeal the Urstadt Law and allow--
[Applause]
SPEAKER QUINN: --the City Council to be the legislative body that decides the rent laws for our City. We also have a Home Rule Message urging Albany to repeal Vacancy Decontrol. That erosion of tenant protections has caused the loss of countless tens of thousands of apartments in the City of New York. By repealing Vacancy Decontrol we will have the opportunity to recapture many of those apartments as affordable apartments in the City of New York.
I want to finally thank our Rules Committee Chair for moving an appointment through today to the Equal Employment Practices commission. And also Chairperson Diana Reyna. And also Chairperson Melinda Katz and the Land Use staff for the numerous items that they have worked on that we'll be voting on today. And that
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
the District that I represent, 1,100 seat high school in Maspeth. I believe that the high school proposal, the one that we're voting on today still needs work. As a Council Member it's been very difficult accepting and agreeing with the Department of Education. I'd like to thank the Speaker for her help during the past couple of weeks as I've worked on these difficulties with the Department of Education.
And while I do not agree with the Deputy Mayor Dennis Walcott, and the Department and their policies, moreover, their reluctance to give priority zoning to those who live closest to the school, I do thank the Deputy Mayor for his time and focus over the past couple of weeks. I'd like to also thank my colleagues in this body whose knowledge and support I'm so grateful for over the past couple of weeks.
I want to let you know that today I'm going to vote no on this proposal. Let me be clear. I want a school in Maspeth but I cannot agree with this plan. In an effort to alleviate traffic and transit concerns raised by the community I've asked the Department of Education
25
[Laughter]
25
25
career school and a community center for the
25
25
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
don't believe that those are mutually exclusive principles. Vigorous debate and passionate discourse are fundamental to our democracy but harassment, threats and physical confrontations are not protected forms of speech and indeed they undermine those cherished democratic values.
We cannot stand here in 2009 in New York City and allow individuals or groups to exceed the boundaries of lawful expression by physically blocking access to clinics or by intimidating those who seek their services. It makes it impossible for a clinic to function and impedes a legal right of the citizens of New York City.
Unfortunately current law does not adequately protect our reproductive health care facilities and those who work for or seek services from those facilities. So this law, 826A, in my view, is critically important to strengthen the prohibitions on interference with these important services. I want to thank the Speaker for her leadership on this as well as Planned Parenthood, the other advocacy groups and I encourage my colleagues to vote yes. Thank you.
STATED MEETING
STATED MEETING
25
ordered.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
siting of a school in her District.
I do want to encourage my members though to vote for this school. Queens, right now, has all of the schools in the northeast corridor are over 150% crowded and growing. We need to site this building as soon as possible to deal with the issues of zoning and local zoning for a school is a very difficult issue.
I want to congratulate Council Member Crowley on achieving an opportunity to make sure that community residents in her District do attend this school. I do want to caution that that can be--create a major problem for the people that need to attend schools outside of their District because of the desire to get into programs or desire to actually get out of schools that are in their community that are subsufficient.
I think that we need to make sure that as we deal with the public siting of schools in the future, one thing that we will be doing is sending a letter from the Queens Delegation to the Department of Education because they have severely underestimated the amount of seats needed in the
2
housing in New York City.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
to highlight the severity of what's happening, particularly in the Department of Education when it comes to school siting.
The lack of communication with communities, the lack of communication with parents and the lack of communication with elected officials of a particular area when the Department decides to site a school, it leads to these type of results where virtually sometimes communities are divided. Where all the information's are not being provided. And yet decisions are made by the Department before they're even brought to the communities.
And this is what happens when this type of system continues to operate. There needs to be more transparency. There needs to be more parental involvement, not only from the curriculum perspective but on the school siting aspect in our communities. I know that the Council Member worked diligently and hard to ensure she delivered for her community. However, on that particular item, I must vote--
SERGEANT AT ARMS: [Interposing]
Quiet please.
25
ordered.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
side. And this bill protects everyone's rights to peacefully demonstrate. Whether you are for the clinic and its services or you are against it, it gives you the right to stand out there and to peacefully express and demonstrate how you feel.
This does not take away anyone's Constitutional rights. And I also would like to state that these clinics are women's issues and to gynecological treatments and they also diagnose and we must not forget that. So I want to thank, because this bill is extraordinary, and it was really an honor for me to chair that hearing.
On Reso 1913 and 1031 I am voting yes but I need to make a statement. One to thank Councilwoman Crowley for her efforts on behalf of her District, but no school, and I have three of them in my District that are vibrant commercial areas, and no school should be built in a very dynamic commercial area. It does take away when there are holidays. It's a darkened area. It's darkened in the summer.
However, because we do need schools in Queens, I am voting yes, but I also urge that as we look at these sitings, that we look more and
25
Happy Birthday anyway, Melissa.
25
25
25
A little bit of background, a
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
couple of years ago, the Cypress Hills portion of my District was awarded a nice new $50 million school for the area that PS 65 will move into in September. The building that they're currently in which is a DOE facility, we hear now will be inhabited by a charter school in September.
And they get around the siting laws because the charter school is not--it its own entity in and of itself. With that, the charter school brings in their own children and they are going to being in approximately 300 children that are not from the Cypress Hills area.
So the result of the new school means a net loss or only a net gain of 300 seats as opposed to the 600 plus net gain in seats that the Cypress Hill Community was expecting. I'm outraged. My constituents are outraged. And I want to ask the Chair of the Education Committee to work with me on this and the appropriate members of the State legislature to pass the bills up in Albany. Thank you Madam Public Advocate. PUBLIC ADVOCATE GOTBAUM: Council
Member Dickens.
COUNCIL MEMBER DICKENS: Thank you
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Madam Public Advocate. I join with my colleague Council Member Dilan in supporting him on Reso 1898 because the State legislature needs to review and look at and make changes to the existing law as it relates to how charter schools are mandated. So I want to thank Council Member Dilan for bringing this to light and bringing this resolution out. And I wholeheartedly support him in this.
PUBLIC ADVOCATE GOTBAUM: Seeing
nobody else--oh wait a minute. I've got to read this. [chuckling] Sorry. All items on today's general order calendar were adopted by a vote of 48 in the affirmative, 0 negative, 0 abstentions with the exception of LU 1031 and Reso 1913 which was adopted by a vote of 38 in the affirmative, 10 negative, 0 abstentions; and Intro 826A which was adopted by a vote of 40 in the affirmative, 8 negative, 0 abstentions; and SLR 1, 44 in the affirmative, 4 negative, 0 abstentions; and SLR 2, 38 affirmative, 5 negative, 5 abstentions; and SL 3, 45 affirmative, 3 negative and 0 abstentions; and Preconsidered Reso 1896, 47 in the affirmative, 1 negative, 0 abstentions. Revised
CERTIFICATE
I, Laura L. Springate certify that the foregoing transcript is a true and accurate record of the proceedings. I further certify that I am<cursor_is_here>
Signature __Laura L. Springate________
Date _____April 16, 2009____________
</text>
|
[
{
"content": "<url>\nhttps://legistar.council.nyc.gov/View.ashx?M=F&ID=679088&GUID=86C0CA16-320F-45DE-8A64-E0B92C235BBB\n</url>\n<text>\n```\nCITY COUNCIL CITY OF NEW YORK ------------------------X TRANSCRIPT OF THE MINUTES of the STATED MEETING ------------------------X April 2, 2009 Start: 2:25 pm Recess: 3:37 pm HELD AT: Council Chambers City Hall B E F O R E: CHRISTINE C. QUINN SPEAKER COUNCIL MEMBERS: Council Member Maria del Carmen Arroyo Council Member Tony Avella Council Member Maria Baez Council Member Charles Barron Council Member Gale A. Brewer Council Member Leroy G. Comrie, Jr. Council Member Elizabeth Crowley Council Member Bill de Blasio Council Member Inez E. Dickens Council Member Erik Martin Dilan Council Member Mathieu Eugene Council Member Simcha Felder Council Member Julissa Ferreras Council Member Lewis A. Fidler Council Member Helen D. Foster Council Member Daniel R. Garodnick Council Member James F. Gennaro Council Member Alan J. Gerson\n```\n\nAPPEARANCES\n\nCOUNCIL MEMBERS:\n\n```\nCouncil Member Eric N. Gioia Council Member Vincent Ignizio Council Member Robert Jackson Council Member Letitia James Council Member Melina R. Katz Council Member G. Oliver Koppell Council Member John C. Liu Council Member Melissa MarkViverito Council Member Miguel Martinez Council Member Darlene Mealy Council Member Rosie Mendez Council Member Kenneth Mitchell Council Member Michael C. Nelson Council Member James S. Oddo Council Member Annabel Palma Council Member Domenic M. Recchia, Jr. Council Member Diana Reyna Council Member Joel Rivera Council Member James Sanders, Jr. Council Member Larry B. Seabrook Council Member Helen Sears Council Member Kendall Stewart Council Member Eric Ulrich Council Member James Vacca Council Member Peter F. Vallone, Jr. Council Member Albert Vann Council Member David I. Weprin Council Member Thomas White, Jr. Council Member David Yassky\n```\n\nAPPEARANCES [CONTINUED]\n\nChristine C. Quinn Speaker\n\nSophomore Class Brooklyn Generation School\n\nReverend Charles Lewis\n\nInvocation\n\nAlix Pustilnik Governmental Affairs Division\n\nAdira Siman Human Services Division\n\nJulene Beckford\n\nCounsel\n\nGovernmental Affairs Division\n\nJim Caras Office of the General Counsel\n\nDamien Butvick\n\nCounsel\n\nGovernmental Affairs Division\n\nDanielle Castaldi-Micca, Community Outreach\n\nLyle Frank Committee Counsel Infrastructure Division\n\nPatrick Mulvihill\n\nInfrastructure Division\n\nNicole Ramsey Infrastructure Division\n\nDanielle Avetto\n\nCouncil Staff\n\nAPPEARANCES [CONTINUED]\n\nPhillip Hom\n\nCommittee Counsel\n\nAll Council Staff not otherwise mentioned\n\nElizabeth Crowley\n\nCouncil Member\n\nCharles Barron\n\nCouncil Member\n\nJoyce Simmons\n\nCouncil Member Barron\n\nChief of Staff\n\nMonique Washington\n\nCouncil Member Barron\n\nCouncilmatic Aide\n\nViola Plummer Chief of Staff Assemblywoman Inez Barron\n\nMan Up, Inc. Developer of Gateway Estates II\n\nRobert Jackson\n\nCouncil Member\n\nMiguel Martinez\n\nCouncil Member\n\nFamily of Alex Felix\n\nMelissa Mark-Viverito\n\nCouncil Member\n\nInez Dickens\n\nCouncil Member\n\nDaniel R. Garodnick\n\nCouncil Member\n\nAPPEARANCES [CONTINUED]\n\nReverend Doctor Johnny Ray Youngblood Supporter of Gateway Estates II\n\nReverend Brawley Supporter of Gateway Estates II\n\nSarah Brannon\n\nCouncil Staff\n\nPolicy Unit\n\nHelen D. Foster\n\nCouncil Member\n\nRobert Jackson\n\nCouncil Member\n\nDarlene Mealy\n\nCouncil Member\n\nGale A. Brewer\n\nCouncil Member\n\nErik Martin Dilan\n\nCouncil Member\n\nInez E. Dickens\n\nCouncil Member\n\n25\n\nCOUNCIL MEMBER COMRIE: Here.\n\n7\n\n2\n\nSTATED MEETING\n\nCOMMITTEE CLERK: Crowley.\n\n25\n\nPUBLIC ADVOCATE GOTBAUM: So\n\n17\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nclinics in the City and to make sure that doctors and nurses and health care professionals could come in and out of those women's health clinics to make sure women could access their legally right to reproductive health care.\n\nNow a lot of us would like to think that the situations that caused the need for that bill in 1994 are gone and that there are no longer protestors outside of women's health clinics in our five Boroughs. But the sad truth is they are not gone. And on many streets, in front of many clinics, on many days of the week, protestors stand on the streets outside clinics; stand in front of the doors of those clinics; oftentimes making it impossible for those clinics to serve their patients. Protestors harass and intimidate women, sometimes scaring them away from going in and getting reproductive health care that they and their families have decided is the right course for their action for them and their families.\n\nWhat we found is that the 1994 law, although well intentioned, after 15 years of experience with it has loopholes in it. This action today will close those loopholes and put a\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nlaw on the books in our five Boroughs that is actually usable and enforceable, that will allow women to access their legal right to reproductive health care.\n\nSo now once we pass this law, a clinic will be able to press charges and have someone arrested if they are disrupting access to their clinic--\n\n[Applause]\n\nSERGEANT AT ARMS: Quiet please, settle down.\n\nSPEAKER QUINN: If Madam--if you could just hold the outbursts. Now after we pass our law, it will no longer be only the patient who can cause, call for people to be arrested or charges to be filed. Right now the law says only the woman who is going to be an abortion can have someone arrested or have charges filed against them. Think of that burden.\n\nSomeone who has decided to make this decision, which is a very difficult decision, they may not have shared that with others in their lives. They now are the only one who can press charges. They're going to have to go back to\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\ncourt countless times. What this means is that before--up until now when we change this law, even if a police officer saw an individual breaking the law they couldn't take action unless the patient had asked them too.\n\nWell with this law we're going to allow our police officers to be police officers in front of reproductive health clinics and take action when they see people breaking the law. This is the least that women deserve in our five Boroughs and the least that the doctors and nurses and professionals who run our clinics deserve in our five Boroughs. This is an important day to send a message that we will not allow people to threaten, harass or intimidate women or health care professionals.\n\nLet me also say this bill allows anyone who wants to legally protest in a peaceful way, it allows them to express and use their First Amendment rights. We have taken great pains working with civil liberties groups and other-civil liberties groups and even some who oppose this bill, to make sure that no one's First Amendment rights are taken away. You can legally\n\n25\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nurging the State to allow the City to have 50 more red light cameras. We have another Home Rule Message today, once again, making a statement that the City of New York believes that the State legislature should repeal the Urstadt Law and allow--\n\n[Applause]\n\nSPEAKER QUINN: --the City Council to be the legislative body that decides the rent laws for our City. We also have a Home Rule Message urging Albany to repeal Vacancy Decontrol. That erosion of tenant protections has caused the loss of countless tens of thousands of apartments in the City of New York. By repealing Vacancy Decontrol we will have the opportunity to recapture many of those apartments as affordable apartments in the City of New York.\n\nI want to finally thank our Rules Committee Chair for moving an appointment through today to the Equal Employment Practices commission. And also Chairperson Diana Reyna. And also Chairperson Melinda Katz and the Land Use staff for the numerous items that they have worked on that we'll be voting on today. And that\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nthe District that I represent, 1,100 seat high school in Maspeth. I believe that the high school proposal, the one that we're voting on today still needs work. As a Council Member it's been very difficult accepting and agreeing with the Department of Education. I'd like to thank the Speaker for her help during the past couple of weeks as I've worked on these difficulties with the Department of Education.\n\nAnd while I do not agree with the Deputy Mayor Dennis Walcott, and the Department and their policies, moreover, their reluctance to give priority zoning to those who live closest to the school, I do thank the Deputy Mayor for his time and focus over the past couple of weeks. I'd like to also thank my colleagues in this body whose knowledge and support I'm so grateful for over the past couple of weeks.\n\nI want to let you know that today I'm going to vote no on this proposal. Let me be clear. I want a school in Maspeth but I cannot agree with this plan. In an effort to alleviate traffic and transit concerns raised by the community I've asked the Department of Education\n\n25\n\n[Laughter]\n\n25\n\n25\n\ncareer school and a community center for the\n\n25\n\n25\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\ndon't believe that those are mutually exclusive principles. Vigorous debate and passionate discourse are fundamental to our democracy but harassment, threats and physical confrontations are not protected forms of speech and indeed they undermine those cherished democratic values.\n\nWe cannot stand here in 2009 in New York City and allow individuals or groups to exceed the boundaries of lawful expression by physically blocking access to clinics or by intimidating those who seek their services. It makes it impossible for a clinic to function and impedes a legal right of the citizens of New York City.\n\nUnfortunately current law does not adequately protect our reproductive health care facilities and those who work for or seek services from those facilities. So this law, 826A, in my view, is critically important to strengthen the prohibitions on interference with these important services. I want to thank the Speaker for her leadership on this as well as Planned Parenthood, the other advocacy groups and I encourage my colleagues to vote yes. Thank you.\n\nSTATED MEETING\n\nSTATED MEETING\n\n25\n\nordered.\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nsiting of a school in her District.\n\nI do want to encourage my members though to vote for this school. Queens, right now, has all of the schools in the northeast corridor are over 150% crowded and growing. We need to site this building as soon as possible to deal with the issues of zoning and local zoning for a school is a very difficult issue.\n\nI want to congratulate Council Member Crowley on achieving an opportunity to make sure that community residents in her District do attend this school. I do want to caution that that can be--create a major problem for the people that need to attend schools outside of their District because of the desire to get into programs or desire to actually get out of schools that are in their community that are subsufficient.\n\nI think that we need to make sure that as we deal with the public siting of schools in the future, one thing that we will be doing is sending a letter from the Queens Delegation to the Department of Education because they have severely underestimated the amount of seats needed in the\n\n2\n\nhousing in New York City.\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nto highlight the severity of what's happening, particularly in the Department of Education when it comes to school siting.\n\nThe lack of communication with communities, the lack of communication with parents and the lack of communication with elected officials of a particular area when the Department decides to site a school, it leads to these type of results where virtually sometimes communities are divided. Where all the information's are not being provided. And yet decisions are made by the Department before they're even brought to the communities.\n\nAnd this is what happens when this type of system continues to operate. There needs to be more transparency. There needs to be more parental involvement, not only from the curriculum perspective but on the school siting aspect in our communities. I know that the Council Member worked diligently and hard to ensure she delivered for her community. However, on that particular item, I must vote--\n\nSERGEANT AT ARMS: [Interposing]\n\nQuiet please.\n\n25\n\nordered.\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nside. And this bill protects everyone's rights to peacefully demonstrate. Whether you are for the clinic and its services or you are against it, it gives you the right to stand out there and to peacefully express and demonstrate how you feel.\n\nThis does not take away anyone's Constitutional rights. And I also would like to state that these clinics are women's issues and to gynecological treatments and they also diagnose and we must not forget that. So I want to thank, because this bill is extraordinary, and it was really an honor for me to chair that hearing.\n\nOn Reso 1913 and 1031 I am voting yes but I need to make a statement. One to thank Councilwoman Crowley for her efforts on behalf of her District, but no school, and I have three of them in my District that are vibrant commercial areas, and no school should be built in a very dynamic commercial area. It does take away when there are holidays. It's a darkened area. It's darkened in the summer.\n\nHowever, because we do need schools in Queens, I am voting yes, but I also urge that as we look at these sitings, that we look more and\n\n25\n\nHappy Birthday anyway, Melissa.\n\n25\n\n25\n\n25\n\nA little bit of background, a\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\ncouple of years ago, the Cypress Hills portion of my District was awarded a nice new $50 million school for the area that PS 65 will move into in September. The building that they're currently in which is a DOE facility, we hear now will be inhabited by a charter school in September.\n\nAnd they get around the siting laws because the charter school is not--it its own entity in and of itself. With that, the charter school brings in their own children and they are going to being in approximately 300 children that are not from the Cypress Hills area.\n\nSo the result of the new school means a net loss or only a net gain of 300 seats as opposed to the 600 plus net gain in seats that the Cypress Hill Community was expecting. I'm outraged. My constituents are outraged. And I want to ask the Chair of the Education Committee to work with me on this and the appropriate members of the State legislature to pass the bills up in Albany. Thank you Madam Public Advocate. PUBLIC ADVOCATE GOTBAUM: Council\n\nMember Dickens.\n\nCOUNCIL MEMBER DICKENS: Thank you\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nMadam Public Advocate. I join with my colleague Council Member Dilan in supporting him on Reso 1898 because the State legislature needs to review and look at and make changes to the existing law as it relates to how charter schools are mandated. So I want to thank Council Member Dilan for bringing this to light and bringing this resolution out. And I wholeheartedly support him in this.\n\nPUBLIC ADVOCATE GOTBAUM: Seeing\n\nnobody else--oh wait a minute. I've got to read this. [chuckling] Sorry. All items on today's general order calendar were adopted by a vote of 48 in the affirmative, 0 negative, 0 abstentions with the exception of LU 1031 and Reso 1913 which was adopted by a vote of 38 in the affirmative, 10 negative, 0 abstentions; and Intro 826A which was adopted by a vote of 40 in the affirmative, 8 negative, 0 abstentions; and SLR 1, 44 in the affirmative, 4 negative, 0 abstentions; and SLR 2, 38 affirmative, 5 negative, 5 abstentions; and SL 3, 45 affirmative, 3 negative and 0 abstentions; and Preconsidered Reso 1896, 47 in the affirmative, 1 negative, 0 abstentions. Revised\n\nCERTIFICATE\n\nI, Laura L. Springate certify that the foregoing transcript is a true and accurate record of the proceedings. I further certify that I am<cursor_is_here>\n\nSignature __Laura L. Springate________\n\nDate _____April 16, 2009____________\n</text>\n",
"role": "user"
},
{
"content": " not related to any of the parties to this action by blood or marriage, and that I am in no way interested in the outcome of this matter.",
"role": "assistant"
}
] |
THE ORDER OF THE EUCHARIST
¶ THE SERVICE OF LIGHT
The president and altar party gather in silence at the font carrying the unlit Paschal Candle.
President:
Dear friends in Christ, this is the most holy day when our Lord Jesus Christ passed from death to life, we gather with all the Church throughout the world in vigil and prayer. This is the Passover of Jesus Christ. Through light and word, through water, bread and wine we celebrate the new life that Christ shares with us.
The president traces a cross in the Paschal Candle and the Greek letters Alpha above and Omega below it.
President:
Christ, yesterday and today, the beginning and the end, Alpha and Omega, all time belongs to him, and all ages, to him be glory and power, through every age and for ever.
All:
Amen.
Five nail studs are inserted into the Candle, reminding us of the five wounds of Christ upon the Cross. As each is inserted the president says:
President: 1 By his holy 2 and glorious wounds 3 may Christ our Lord 4 guard us 5 and keep us.
The Paschal Candle is lit, while the following is said:
President: May the light of Christ, rising in glory, banish all darkness from our hearts and minds.
Those gathered begin to light their candles from the Paschal Candle. The president, carrying the Paschal Candle, raises it and sings:
President: The light of Christ.
All:
Thanks be to God.
The procession moves further into the building and then stops with the versicle and response repeated twice more. The Paschal Candle is placed in its stand in the sanctuary. The president then says:
President: Alleluia! Christ is risen.
All:
He is risen indeed. Alleluia!
The bells are rung joyfully and the following hymn is sung.
Opening Hymn
JESUS Christ is risen today, Alleluia!
Our triumphant holy day, Alleluia! Who did once, upon the cross, Alleluia! Suffer to redeem our loss, Alleluia!
Hymns of praise then let us sing, Alleluia! Unto Christ, our heavenly King, Alleluia! Who endured the cross and grave, Alleluia! Sinners to redeem and save, Alleluia!
But the pain which He endured, Alleluia! Our salvation have procured, Alleluia! Now above the sky He's king, Alleluia! Where the angels ever sing, Alleluia!
Lyra Davidica NEH 110
The Greeting
President: In the name of the Father, and of the Son, and of the Holy Spirit.
All:
Amen.
President: The Lord be with you.
All:
And also with you.
President: Alleluia, Christ is risen!
All:
He is risen indeed, alleluia!
Gloria in Excelsis
Glory to God in the highest, and peace to his people on earth. Lord God, heavenly King, almighty God and Father, we worship you, we give you thanks, we praise you for your glory. Lord Jesus Christ, only Son of the Father, Lord God, Lamb of God, you take away the sin of the world: have mercy on us; you are seated at the right hand of the Father: receive our prayer. For you alone are the Holy One, you alone are the Lord, you alone are the Most High, Jesus Christ, with the Holy Spirit, in the glory of God the Father. Amen.
The Collect - Remain standing
President:
Let us pray.
A brief moment of stillness is kept.
Lord of all life and power, who through the mighty resurrection of your Son overcame the old order of sin and death to make all things new in him: grant that we, being dead to sin and alive to you in Jesus Christ, may reign with him in glory; to whom with you and the Holy Spirit be praise and honour, glory and might, now and in all eternity.
Amen.
All:
¶ THE LITURGY OF THE WORD
First Reading – Acts 10:34-43 - Sit
Reader:
A reading from the Acts of the Apostles.
Then Peter began to speak to them: "I truly understand that God shows no partiality, but in every nation anyone who fears him and does what is right is acceptable to him. You know the message he sent to the people of Israel, preaching peace by Jesus Christ - he is Lord of all. That message spread throughout Judea, beginning in Galilee after the baptism that John announced: how God anointed Jesus of Nazareth with the Holy Spirit and with power; how he went about doing good and healing all who were oppressed by the devil, for God was with him. We are witnesses to all that he did both in Judea and in Jerusalem. They put him to death by hanging him on a tree; but God raised him on the third day and allowed him to appear, not to all the people but to us who were chosen by God as witnesses, and who ate and drank with him after he rose from the dead. He commanded us to preach to the people and to testify that he is the one ordained by God as judge of the living and the dead. All the prophets testify about him that everyone who believes in him receives forgiveness of sins through his name."
Reader: This is the word of the Lord.
All:
Thanks be to God.
Gospel Acclamation - Stand
Reader: Alleluia, alleluia, alleluia!
All:
Alleluia, alleluia, alleluia!
I am the first and the last, says the Lord, and the living one; I was dead, and behold I am alive for evermore.
All:
Alleluia, alleluia, alleluia!
Holy Gospel - John 20: 1-18
Priest:
The Lord be with you.
All:
And also with you.
Priest:
Hear the gospel of our Lord Jesus Christ according to John.
All:
Glory to you, O Lord.
Early on the first day of the week, while it was still dark, Mary Magdalene came to the tomb and saw that the stone had been removed from the tomb. So she ran and went to Simon Peter and the other disciple, the one whom Jesus loved, and said to them, "They have taken the Lord out of the tomb, and we do not know where they have laid him." Then Peter and the other disciple set out and went toward the tomb. The two were running together, but the other disciple outran Peter and reached the tomb first. He bent down to look in and saw the linen wrappings lying there, but he did not go in. Then Simon Peter came, following him, and went into the tomb. He saw the linen wrappings lying there, and the cloth that had been on Jesus' head, not lying with the linen wrappings but rolled up in a place by itself. Then the other disciple, who reached the tomb first, also went in, and he saw and believed; for as yet they did not understand the scripture, that he must rise from the dead. Then the disciples returned to their homes.
But Mary stood weeping outside the tomb. As she wept, she bent over to look into the tomb; and she saw two angels in white, sitting where the body of Jesus had been lying, one at the head and the other at the feet. They said to her, "Woman, why are you weeping?" She said to them, "They have taken away my Lord, and I do not know where they have laid him." When she had said this, she turned around and saw Jesus standing there, but she did not know that it was Jesus. Jesus said to her, "Woman, why are you weeping? Whom are you looking for?"
Supposing him to be the gardener, she said to him, "Sir, if you have carried him away, tell me where you have laid him, and I will take him away." Jesus said to her, "Mary!" She turned and said to him in Hebrew, "Rabbouni!" (which means Teacher). Jesus said to her, "Do not hold on to me, because I have not yet ascended to the Father. But go to my brothers and say to them, 'I am ascending to my Father and your Father, to my God and your God." Mary Magdalene went and announced to the disciples, "I have seen the Lord"; and she told them that he had said these things to her.
Priest:
This is the Gospel of the Lord.
All:
Praise to you, O Christ.
Sermon
A time of silent reflection follows.
¶ THE RENEWAL OF BAPTISMAL PROMISES
The president then addresses the congregation:
President: As we celebrate the resurrection of our Lord Jesus Christ from the dead we remember that, through the paschal mystery, we have died and been buried with him in baptism, so that we may rise with him to a new life within the family of his Church.
Now that we have completed our observance of Lent, we renew the promises made at our baptism.
President: Therefore I ask:
President: Do you reject the devil and all rebellion against God?
All:
I reject them.
President: Do you renounce the deceit and corruption of evil?
All:
I renounce them.
President: Do you repent of the sins that separate us from God and neighbour?
All:
I repent of them.
President: Do you turn to Christ as Saviour?
All:
I turn to Christ.
President: Do you submit to Christ as Lord?
All:
I submit to Christ.
President: Do you come to Christ, the way, the truth and the life?
All:
I come to Christ.
President: Brothers and sisters, I ask you to profess the faith of the Church.
President: Do you believe and trust in God the Father?
All:
I believe in God, the Father almighty, creator of heaven and earth.
President: Do you believe and trust in his Son Jesus Christ?
All:
I believe in Jesus Christ, his only Son, our Lord, who was conceived by the Holy Spirit, born of the Virgin Mary, suffered under Pontius Pilate, was crucified, died, and was buried; he descended to the dead. On the third day he rose again; he ascended into heaven, he is seated at the right hand of the Father, and he will come to judge the living and the dead.
President:
Do you believe and trust in the Holy Spirit?
All:
I believe in the Holy Spirit, the holy catholic Church, the communion of saints,
the forgiveness of sins,
the resurrection of the body, and the life everlasting. Amen.
The president sprinkles the people with the blessed water from the font, a reminder of the baptism we share.
President:
Almighty God,
we thank you for our fellowship in the household of faith with all those who have been baptised in your name.
Keep us faithful to our baptism,
and so make us ready for that day when the whole creation shall be made perfect in your Son, our Saviour Jesus Christ.
All:
Amen.
¶ THE LITURGY OF THE SACRAMENT
The Peace - Stand
President:
The risen Christ came and stood among his disciples and said, 'Peace be with you'. Then were they glad when the saw the Lord. Alleluia!
All:
President:
The peace of the Lord be always with you.
And also with you.
Let us offer one another a sign of Christ's peace.
Offertory Hymn
TO God be the glory, great things he has done! So loved he the world that he gave us his Son, Who yielded his life an atonement for sin, and opened the life-gate that all may go in.
Praise the Lord, praise the Lord! Let the earth hear his voice! Praise the Lord, praise the Lord! Let the people rejoice! O come to the Father through Jesus his Son; and give him the glory, great things he has done.
Oh, perfect redemption, the purchase of blood, to every believer the promise of God! The vilest offender who truly believes, that moment from Jesus a pardon receives.
Refrain
Great things he has taught us, great things he has done, and great our rejoicing through Jesus the Son, but purer, and higher, and greater will be our wonder, our rapture, when Jesus we see.
Refrain
Fanny Crosby CH 745
Preparation of the Table - Remain standing
President: Let us pray
Creator of all,
you wash away our sins,
you give us new birth by the Spirit, and redeem us in the blood of Christ.
As we celebrate the resurrection, renew your gift of life with us.
All:
Amen.
The Eucharistic Prayer - Remain standing
President: The Lord be with you
All:
and also with you.
President: Lift up your hearts.
All:
We lift them to the Lord.
President: Let us give thanks to the Lord our God.
All:
It is right to give thanks and praise.
The president praises God for his mighty acts and all respond.
All:
Holy, holy, holy Lord, God of power and might, heaven and earth are full of your glory. Hosanna in the highest. Blessed is he who comes in the name of the Lord. Hosanna in the highest.
The president recalls the Last Supper and calls upon the Holy Spirit.
President: Great is the mystery of faith:
All:
Christ has died:
Christ is risen:
Christ will come again.
The president concludes the prayer.
All:
Amen.
The Lord's Prayer
President:
Rejoicing in God's new creation, let us pray with confidence as our Saviour has taught us:
All:
Our Father, who art in heaven, hallowed be thy name. Thy kingdom come, thy will be done on earth, as it is in heaven. Give us this day our daily bread and forgive us our trespasses, as we forgive those who trespass against us. And lead us not into temptation, but deliver us from evil. For thine is the kingdom, the power and the glory, for ever and ever. Amen.
Breaking of the Bread
President: We break this bread to share in the body of Christ.
All:
Though we are many, we are one body, because we all share in one bread.
All:
Lamb of God, you take away the sin of the world: have mercy on us.
Lamb of God, you take away the sin of the world: have mercy on us.
Lamb of God, you take away the sin of the world: grant us peace.
Giving of Communion
President:
Behold the Lamb of God, behold him who takes away the sin of the world. Blessed are those who are called to his supper.
All:
Lord, I am not worthy to receive you, but only say the word, and I shall be healed.
Holy Communion is distributed from the chancel step. All who are baptised and ordinarily receive Holy Communion in their own church are welcome to receive here. Alternatively, you are invited to come forward for a blessing.
Hymns during Communion
THERE is a Redeemer, Jesus, God's own Son, precious Lamb of God, Messiah Holy One.
Thank you, O my Father, for giving us your Son, and leaving your Spirit 'til the work on earth is done.
Jesus my Redeemer, Name above all names, Precious Lamb of God, Messiah, O for sinners slain.
Refrain
When I stand in glory, I will see his face. And there I'll serve my King forever, In that Holy Place.
Refrain
NOW the green blade riseth from the buried grain, Wheat that in the dark earth many years has lain; Love lives again, that with the dead has been: Love is come again, like wheat that springeth green.
In the grave they laid him, Love whom we had slain, Thinking that never he would wake again, Laid in the earth like grain that sleeps unseen: Love is come again, like wheat that springeth green.
Forth he came at Easter, like the risen grain, He that for three days in the grave had lain; Quick from the dead my risen Lord is seen: Love is come again, like wheat that springeth green.
Melody Green - The Bridge 351
When our hearts are wintry, grieving, or in pain,
Thy touch can call us back to life again,
Fields of our hearts, that dead and bare have been:
Love is come again, like wheat that springeth green.
J.M.Crum NEH 115 (old French melody)
Prayer after Communion - Stand
President: God of life,
who for our redemption gave your only-begotten Son
to the death of the cross,
and by his glorious resurrection
have delivered us from the power of our enemy:
grant us so to die daily to sin,
that we may evermore live with him in the joy of his risen life;
through Jesus Christ our Lord.
All:
Amen.
Notices - Sit
¶ THE DISMISSAL
The Blessing - Stand
President: The Lord be with you.
All:
And also with you.
President:
God the Father, by whose love Christ was raised from the dead, open to you who believe the gates of everlasting life.
All:
Amen.
President:
God the Son, who in bursting from the grave has won a glorious victory, give you joy as you share the Easter faith.
All:
Amen.
President: empower you and fill you with Christ's peace.
God the Holy Spirit, who filled the disciples with the life of the risen Lord,
All:
Amen.
President:
And the blessing of God almighty, the Father, the Son and the Holy Spirit, be among you and remain with you always.
All:
Amen.
The Dismissal
President: Alleluia, Christ is risen!
All:
He is risen indeed, alleluia!
President:
With the risen life of Christ within you, go in the peace of Christ, Alleluia, alleluia.
All:
Thanks be to God, Alleluia, alleluia.
Recessional Hymn
THINE be the glory, risen, conquering Son, Endless is the victory thou o'er death hast won; Angels in bright raiment rolled the stone away, Kept the folded grave-clothes where thy body lay.
Thine be the glory, risen, conquering Son, Endless is the vict'ry thou o'er death hast won.
Lo, Jesus meets us, risen from the tomb; Lovingly he greets us, scatters fear and gloom; Let the Church with gladness hymns of triumph sing, For her Lord now liveth, death hath lost its sting:
Refrain
No more we doubt thee, glorious Prince of Life; Life is nought without thee: aid us in our strife, Make us more than conquerors through thy death-less love; Bring us safe through Jordan to thy home above:
Refrain
Richard Hoyle NEH 120
The Easter flowers in St Andrew's Church have been provided in loving memory of:
Harry Patterson
Rosemary Patterson
Heather Boersma
Hugh Reynolds
Pam Reynolds
Dilys Reynolds
Jeremy Hill
Victor Snaith
Eric Rowland
Joe Egemonye
Johnny Mbonu
Hugh Garnsworthy
Ruth Garnsworthy
George Tippett
Austin Moseley
Sylvia Moseley
Nola Hindley
Graham White
Gladys White
Albert White
Doris White
Eric White
Charlotte Dumashie
John Clucas
Annie Clucas
Allan Craven
Iain Gordon
Alan Exton
Rose Robson
Eileen 'Pat' Kingaby
Philip Reeks
Freddie Garwood
Mthr Anna Matthews
Stephen Dudley
Duncan Chapman
Elizabeth Ekenobi
Jacob Ekenobi
Christiana Esumai
Roselyn Esumai
Bimpe Salako
Olayiwola Salako
Adebayo Osifuwa
Henry Ike
Austin Alison
'I am the resurrection and the life. Those who believe in me, even though they die, will live, and everyone who lives and believes in me will never die'. (John 11:25)
Resurrection, Andrea Mantegna
|
<urn:uuid:5d388537-4e03-478a-8ede-9d8a1a10194b>
|
CC-MAIN-2024-18
|
https://www.alexandrapark.org/_files/ugd/f4f6b3_93db03ffb49a406494cd78e2c1b94278.pdf
|
2024-04-13T15:05:15+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-18/subset=warc/part-00153-29538f81-5664-4df2-acb6-7d8ba3d2a1aa.c000.gz.parquet
| 603,791,746
| 4,254
|
eng_Latn
|
eng_Latn
| 0.976342
|
eng_Latn
| 0.999008
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
1376,
2472,
3472,
5006,
7463,
9087,
10070,
10885,
11904,
13240,
14286,
15582,
16563,
17495,
17526
] |
THE ORDER OF THE EUCHARIST
¶ THE SERVICE OF LIGHT
The president and altar party gather in silence at the font carrying the unlit Paschal Candle.
President:
Dear friends in Christ, this is the most holy day when our Lord Jesus Christ passed from death to life, we gather with all the Church throughout the world in vigil and prayer. This is the Passover of Jesus Christ. Through light and word, through water, bread and wine we celebrate the new life that Christ shares with us.
The president traces a cross in the Paschal Candle and the Greek letters Alpha above and Omega below it.
President:
Christ, yesterday and today, the beginning and the end, Alpha and Omega, all time belongs to him, and all ages, to him be glory and power, through every age and for ever.
All:
Amen.
Five nail studs are inserted into the Candle, reminding us of the five wounds of Christ upon the Cross. As each is inserted the president says:
President: 1 By his holy 2 and glorious wounds 3 may Christ our Lord 4 guard us 5 and keep us.
The Paschal Candle is lit, while the following is said:
President: May the light of Christ, rising in glory, banish all darkness from our hearts and minds.
Those gathered begin to light their candles from the Paschal Candle. The president, carrying the Paschal Candle, raises it and sings:
President: The light of Christ.
All:
Thanks be to God.
The procession moves further into the building and then stops with the versicle and response repeated twice more. The Paschal Candle is placed in its stand in the sanctuary. The president then says:
President: Alleluia! Christ is risen.
All:
He is risen indeed. Alleluia!
The bells are rung joyfully and the following hymn is sung.
Opening Hymn
JESUS Christ is risen today, Alleluia!
Our triumphant holy day, Alleluia! Who did once, upon the cross, Alleluia! Suffer to redeem our loss, Alleluia!
Hymns of praise then let us sing, Alleluia! Unto Christ, our heavenly King, Alleluia! Who endured the cross and grave, Alleluia! Sinners to redeem and save, Alleluia!
But the pain which He endured, Alleluia! Our salvation have procured, Alleluia! Now above the sky He's king, Alleluia! Where the angels ever sing, Alleluia!
Lyra Davidica NEH 110
The Greeting
President: In the name of the Father, and of the Son, and of the Holy Spirit.
All:
Amen.
President: The Lord be with you.
All:
And also with you.
President: Alleluia, Christ is risen!
All:
He is risen indeed, alleluia!
Gloria in Excelsis
Glory to God in the highest, and peace to his people on earth. Lord God, heavenly King, almighty God and Father, we worship you, we give you thanks, we praise you for your glory. Lord Jesus Christ, only Son of the Father, Lord God, Lamb of God, you take away the sin of the world: have mercy on us; you are seated at the right hand of the Father: receive our prayer. For you alone are the Holy One, you alone are the Lord, you alone are the Most High, Jesus Christ, with the Holy Spirit, in the glory of God the Father. Amen.
The Collect - Remain standing
President:
Let us pray.
A brief moment of stillness is kept.
Lord of all life and power, who through the mighty resurrection of your Son overcame the old order of sin and death to make all things new in him: grant that we, being dead to sin and alive to you in Jesus Christ, may reign with him in glory; to whom with you and the Holy Spirit be praise and honour, glory and might, now and in all eternity.
Amen.
All:
¶ THE LITURGY OF THE WORD
First Reading – Acts 10:34-43 - Sit
Reader:
A reading from the Acts of the Apostles.
Then Peter began to speak to them: "I t
|
ruly understand that God shows no partiality, but in every nation anyone who fears him and does what is right is acceptable to him.
|
You know the message he sent to the people of Israel, preaching peace by Jesus Christ - he is Lord of all. That message spread throughout Judea, beginning in Galilee after the baptism that John announced: how God anointed Jesus of Nazareth with the Holy Spirit and with power; how he went about doing good and healing all who were oppressed by the devil, for God was with him. We are witnesses to all that he did both in Judea and in Jerusalem. They put him to death by hanging him on a tree; but God raised him on the third day and allowed him to appear, not to all the people but to us who were chosen by God as witnesses, and who ate and drank with him after he rose from the dead. He commanded us to preach to the people and to testify that he is the one ordained by God as judge of the living and the dead. All the prophets testify about him that everyone who believes in him receives forgiveness of sins through his name."
Reader: This is the word of the Lord.
All:
Thanks be to God.
Gospel Acclamation - Stand
Reader: Alleluia, alleluia, alleluia!
All:
Alleluia, alleluia, alleluia!
I am the first and the last, says the Lord, and the living one; I was dead, and behold I am alive for evermore.
All:
Alleluia, alleluia, alleluia!
Holy Gospel - John 20: 1-18
Priest:
The Lord be with you.
All:
And also with you.
Priest:
Hear the gospel of our Lord Jesus Christ according to John.
All:
Glory to you, O Lord.
Early on the first day of the week, while it was still dark, Mary Magdalene came to the tomb and saw that the stone had been removed from the tomb. So she ran and went to Simon Peter and the other disciple, the one whom Jesus loved, and said to them, "They have taken the Lord out of the tomb, and we do not know where they have laid him." Then Peter and the other disciple set out and went toward the tomb. The two were running together, but the other disciple outran Peter and reached the tomb first. He bent down to look in and saw the linen wrappings lying there, but he did not go in. Then Simon Peter came, following him, and went into the tomb. He saw the linen wrappings lying there, and the cloth that had been on Jesus' head, not lying with the linen wrappings but rolled up in a place by itself. Then the other disciple, who reached the tomb first, also went in, and he saw and believed; for as yet they did not understand the scripture, that he must rise from the dead. Then the disciples returned to their homes.
But Mary stood weeping outside the tomb. As she wept, she bent over to look into the tomb; and she saw two angels in white, sitting where the body of Jesus had been lying, one at the head and the other at the feet. They said to her, "Woman, why are you weeping?" She said to them, "They have taken away my Lord, and I do not know where they have laid him." When she had said this, she turned around and saw Jesus standing there, but she did not know that it was Jesus. Jesus said to her, "Woman, why are you weeping? Whom are you looking for?"
Supposing him to be the gardener, she said to him, "Sir, if you have carried him away, tell me where you have laid him, and I will take him away." Jesus said to her, "Mary!" She turned and said to him in Hebrew, "Rabbouni!" (which means Teacher). Jesus said to her, "Do not hold on to me, because I have not yet ascended to the Father. But go to my brothers and say to them, 'I am ascending to my Father and your Father, to my God and your God." Mary Magdalene went and announced to the disciples, "I have seen the Lord"; and she told them that he had said these things to her.
Priest:
This is the Gospel of the Lord.
All:
Praise to you, O Christ.
Sermon
A time of silent reflection follows.
¶ THE RENEWAL OF BAPTISMAL PROMISES
The president then addresses the congregation:
President: As we celebrate the resurrection of our Lord Jesus Christ from the dead we remember that, through the paschal mystery, we have died and been buried with him in baptism, so that we may rise with him to a new life within the family of his Church.
Now that we have completed our observance of Lent, we renew the promises made at our baptism.
President: Therefore I ask:
President: Do you reject the devil and all rebellion against God?
All:
I reject them.
President: Do you renounce the deceit and corruption of evil?
All:
I renounce them.
President: Do you repent of the sins that separate us from God and neighbour?
All:
I repent of them.
President: Do you turn to Christ as Saviour?
All:
I turn to Christ.
President: Do you submit to Christ as Lord?
All:
I submit to Christ.
President: Do you come to Christ, the way, the truth and the life?
All:
I come to Christ.
President: Brothers and sisters, I ask you to profess the faith of the Church.
President: Do you believe and trust in God the Father?
All:
I believe in God, the Father almighty, creator of heaven and earth.
President: Do you believe and trust in his Son Jesus Christ?
All:
I believe in Jesus Christ, his only Son, our Lord, who was conceived by the Holy Spirit, born of the Virgin Mary, suffered under Pontius Pilate, was crucified, died, and was buried; he descended to the dead. On the third day he rose again; he ascended into heaven, he is seated at the right hand of the Father, and he will come to judge the living and the dead.
President:
Do you believe and trust in the Holy Spirit?
All:
I believe in the Holy Spirit, the holy catholic Church, the communion of saints,
the forgiveness of sins,
the resurrection of the body, and the life everlasting. Amen.
The president sprinkles the people with the blessed water from the font, a reminder of the baptism we share.
President:
Almighty God,
we thank you for our fellowship in the household of faith with all those who have been baptised in your name.
Keep us faithful to our baptism,
and so make us ready for that day when the whole creation shall be made perfect in your Son, our Saviour Jesus Christ.
All:
Amen.
¶ THE LITURGY OF THE SACRAMENT
The Peace - Stand
President:
The risen Christ came and stood among his disciples and said, 'Peace be with you'. Then were they glad when the saw the Lord. Alleluia!
All:
President:
The peace of the Lord be always with you.
And also with you.
Let us offer one another a sign of Christ's peace.
Offertory Hymn
TO God be the glory, great things he has done! So loved he the world that he gave us his Son, Who yielded his life an atonement for sin, and opened the life-gate that all may go in.
Praise the Lord, praise the Lord! Let the earth hear his voice! Praise the Lord, praise the Lord! Let the people rejoice! O come to the Father through Jesus his Son; and give him the glory, great things he has done.
Oh, perfect redemption, the purchase of blood, to every believer the promise of God! The vilest offender who truly believes, that moment from Jesus a pardon receives.
Refrain
Great things he has taught us, great things he has done, and great our rejoicing through Jesus the Son, but purer, and higher, and greater will be our wonder, our rapture, when Jesus we see.
Refrain
Fanny Crosby CH 745
Preparation of the Table - Remain standing
President: Let us pray
Creator of all,
you wash away our sins,
you give us new birth by the Spirit, and redeem us in the blood of Christ.
As we celebrate the resurrection, renew your gift of life with us.
All:
Amen.
The Eucharistic Prayer - Remain standing
President: The Lord be with you
All:
and also with you.
President: Lift up your hearts.
All:
We lift them to the Lord.
President: Let us give thanks to the Lord our God.
All:
It is right to give thanks and praise.
The president praises God for his mighty acts and all respond.
All:
Holy, holy, holy Lord, God of power and might, heaven and earth are full of your glory. Hosanna in the highest. Blessed is he who comes in the name of the Lord. Hosanna in the highest.
The president recalls the Last Supper and calls upon the Holy Spirit.
President: Great is the mystery of faith:
All:
Christ has died:
Christ is risen:
Christ will come again.
The president concludes the prayer.
All:
Amen.
The Lord's Prayer
President:
Rejoicing in God's new creation, let us pray with confidence as our Saviour has taught us:
All:
Our Father, who art in heaven, hallowed be thy name. Thy kingdom come, thy will be done on earth, as it is in heaven. Give us this day our daily bread and forgive us our trespasses, as we forgive those who trespass against us. And lead us not into temptation, but deliver us from evil. For thine is the kingdom, the power and the glory, for ever and ever. Amen.
Breaking of the Bread
President: We break this bread to share in the body of Christ.
All:
Though we are many, we are one body, because we all share in one bread.
All:
Lamb of God, you take away the sin of the world: have mercy on us.
Lamb of God, you take away the sin of the world: have mercy on us.
Lamb of God, you take away the sin of the world: grant us peace.
Giving of Communion
President:
Behold the Lamb of God, behold him who takes away the sin of the world. Blessed are those who are called to his supper.
All:
Lord, I am not worthy to receive you, but only say the word, and I shall be healed.
Holy Communion is distributed from the chancel step. All who are baptised and ordinarily receive Holy Communion in their own church are welcome to receive here. Alternatively, you are invited to come forward for a blessing.
Hymns during Communion
THERE is a Redeemer, Jesus, God's own Son, precious Lamb of God, Messiah Holy One.
Thank you, O my Father, for giving us your Son, and leaving your Spirit 'til the work on earth is done.
Jesus my Redeemer, Name above all names, Precious Lamb of God, Messiah, O for sinners slain.
Refrain
When I stand in glory, I will see his face. And there I'll serve my King forever, In that Holy Place.
Refrain
NOW the green blade riseth from the buried grain, Wheat that in the dark earth many years has lain; Love lives again, that with the dead has been: Love is come again, like wheat that springeth green.
In the grave they laid him, Love whom we had slain, Thinking that never he would wake again, Laid in the earth like grain that sleeps unseen: Love is come again, like wheat that springeth green.
Forth he came at Easter, like the risen grain, He that for three days in the grave had lain; Quick from the dead my risen Lord is seen: Love is come again, like wheat that springeth green.
Melody Green - The Bridge 351
When our hearts are wintry, grieving, or in pain,
Thy touch can call us back to life again,
Fields of our hearts, that dead and bare have been:
Love is come again, like wheat that springeth green.
J.M.Crum NEH 115 (old French melody)
Prayer after Communion - Stand
President: God of life,
who for our redemption gave your only-begotten Son
to the death of the cross,
and by his glorious resurrection
have delivered us from the power of our enemy:
grant us so to die daily to sin,
that we may evermore live with him in the joy of his risen life;
through Jesus Christ our Lord.
All:
Amen.
Notices - Sit
¶ THE DISMISSAL
The Blessing - Stand
President: The Lord be with you.
All:
And also with you.
President:
God the Father, by whose love Christ was raised from the dead, open to you who believe the gates of everlasting life.
All:
Amen.
President:
God the Son, who in bursting from the grave has won a glorious victory, give you joy as you share the Easter faith.
All:
Amen.
President: empower you and fill you with Christ's peace.
God the Holy Spirit, who filled the disciples with the life of the risen Lord,
All:
Amen.
President:
And the blessing of God almighty, the Father, the Son and the Holy Spirit, be among you and remain with you always.
All:
Amen.
The Dismissal
President: Alleluia, Christ is risen!
All:
He is risen indeed, alleluia!
President:
With the risen life of Christ within you, go in the peace of Christ, Alleluia, alleluia.
All:
Thanks be to God, Alleluia, alleluia.
Recessional Hymn
THINE be the glory, risen, conquering Son, Endless is the victory thou o'er death hast won; Angels in bright raiment rolled the stone away, Kept the folded grave-clothes where thy body lay.
Thine be the glory, risen, conquering Son, Endless is the vict'ry thou o'er death hast won.
Lo, Jesus meets us, risen from the tomb; Lovingly he greets us, scatters fear and gloom; Let the Church with gladness hymns of triumph sing, For her Lord now liveth, death hath lost its sting:
Refrain
No more we doubt thee, glorious Prince of Life; Life is nought without thee: aid us in our strife, Make us more than conquerors through thy death-less love; Bring us safe through Jordan to thy home above:
Refrain
Richard Hoyle NEH 120
The Easter flowers in St Andrew's Church have been provided in loving memory of:
Harry Patterson
Rosemary Patterson
Heather Boersma
Hugh Reynolds
Pam Reynolds
Dilys Reynolds
Jeremy Hill
Victor Snaith
Eric Rowland
Joe Egemonye
Johnny Mbonu
Hugh Garnsworthy
Ruth Garnsworthy
George Tippett
Austin Moseley
Sylvia Moseley
Nola Hindley
Graham White
Gladys White
Albert White
Doris White
Eric White
Charlotte Dumashie
John Clucas
Annie Clucas
Allan Craven
Iain Gordon
Alan Exton
Rose Robson
Eileen 'Pat' Kingaby
Philip Reeks
Freddie Garwood
Mthr Anna Matthews
Stephen Dudley
Duncan Chapman
Elizabeth Ekenobi
Jacob Ekenobi
Christiana Esumai
Roselyn Esumai
Bimpe Salako
Olayiwola Salako
Adebayo Osifuwa
Henry Ike
Austin Alison
'I am the resurrection and the life. Those who believe in me, even though they die, will live, and everyone who lives and believes in me will never die'. (John 11:25)
Resurrection, Andrea Mantegna
| 3,628
|
inside_word
|
truly
|
remove_one_sentence
|
<url>
https://www.alexandrapark.org/_files/ugd/f4f6b3_93db03ffb49a406494cd78e2c1b94278.pdf
</url>
<text>
THE ORDER OF THE EUCHARIST
¶ THE SERVICE OF LIGHT
The president and altar party gather in silence at the font carrying the unlit Paschal Candle.
President:
Dear friends in Christ, this is the most holy day when our Lord Jesus Christ passed from death to life, we gather with all the Church throughout the world in vigil and prayer. This is the Passover of Jesus Christ. Through light and word, through water, bread and wine we celebrate the new life that Christ shares with us.
The president traces a cross in the Paschal Candle and the Greek letters Alpha above and Omega below it.
President:
Christ, yesterday and today, the beginning and the end, Alpha and Omega, all time belongs to him, and all ages, to him be glory and power, through every age and for ever.
All:
Amen.
Five nail studs are inserted into the Candle, reminding us of the five wounds of Christ upon the Cross. As each is inserted the president says:
President: 1 By his holy 2 and glorious wounds 3 may Christ our Lord 4 guard us 5 and keep us.
The Paschal Candle is lit, while the following is said:
President: May the light of Christ, rising in glory, banish all darkness from our hearts and minds.
Those gathered begin to light their candles from the Paschal Candle. The president, carrying the Paschal Candle, raises it and sings:
President: The light of Christ.
All:
Thanks be to God.
The procession moves further into the building and then stops with the versicle and response repeated twice more. The Paschal Candle is placed in its stand in the sanctuary. The president then says:
President: Alleluia! Christ is risen.
All:
He is risen indeed. Alleluia!
The bells are rung joyfully and the following hymn is sung.
Opening Hymn
JESUS Christ is risen today, Alleluia!
Our triumphant holy day, Alleluia! Who did once, upon the cross, Alleluia! Suffer to redeem our loss, Alleluia!
Hymns of praise then let us sing, Alleluia! Unto Christ, our heavenly King, Alleluia! Who endured the cross and grave, Alleluia! Sinners to redeem and save, Alleluia!
But the pain which He endured, Alleluia! Our salvation have procured, Alleluia! Now above the sky He's king, Alleluia! Where the angels ever sing, Alleluia!
Lyra Davidica NEH 110
The Greeting
President: In the name of the Father, and of the Son, and of the Holy Spirit.
All:
Amen.
President: The Lord be with you.
All:
And also with you.
President: Alleluia, Christ is risen!
All:
He is risen indeed, alleluia!
Gloria in Excelsis
Glory to God in the highest, and peace to his people on earth. Lord God, heavenly King, almighty God and Father, we worship you, we give you thanks, we praise you for your glory. Lord Jesus Christ, only Son of the Father, Lord God, Lamb of God, you take away the sin of the world: have mercy on us; you are seated at the right hand of the Father: receive our prayer. For you alone are the Holy One, you alone are the Lord, you alone are the Most High, Jesus Christ, with the Holy Spirit, in the glory of God the Father. Amen.
The Collect - Remain standing
President:
Let us pray.
A brief moment of stillness is kept.
Lord of all life and power, who through the mighty resurrection of your Son overcame the old order of sin and death to make all things new in him: grant that we, being dead to sin and alive to you in Jesus Christ, may reign with him in glory; to whom with you and the Holy Spirit be praise and honour, glory and might, now and in all eternity.
Amen.
All:
¶ THE LITURGY OF THE WORD
First Reading – Acts 10:34-43 - Sit
Reader:
A reading from the Acts of the Apostles.
Then Peter began to speak to them: "I t<cursor_is_here> You know the message he sent to the people of Israel, preaching peace by Jesus Christ - he is Lord of all. That message spread throughout Judea, beginning in Galilee after the baptism that John announced: how God anointed Jesus of Nazareth with the Holy Spirit and with power; how he went about doing good and healing all who were oppressed by the devil, for God was with him. We are witnesses to all that he did both in Judea and in Jerusalem. They put him to death by hanging him on a tree; but God raised him on the third day and allowed him to appear, not to all the people but to us who were chosen by God as witnesses, and who ate and drank with him after he rose from the dead. He commanded us to preach to the people and to testify that he is the one ordained by God as judge of the living and the dead. All the prophets testify about him that everyone who believes in him receives forgiveness of sins through his name."
Reader: This is the word of the Lord.
All:
Thanks be to God.
Gospel Acclamation - Stand
Reader: Alleluia, alleluia, alleluia!
All:
Alleluia, alleluia, alleluia!
I am the first and the last, says the Lord, and the living one; I was dead, and behold I am alive for evermore.
All:
Alleluia, alleluia, alleluia!
Holy Gospel - John 20: 1-18
Priest:
The Lord be with you.
All:
And also with you.
Priest:
Hear the gospel of our Lord Jesus Christ according to John.
All:
Glory to you, O Lord.
Early on the first day of the week, while it was still dark, Mary Magdalene came to the tomb and saw that the stone had been removed from the tomb. So she ran and went to Simon Peter and the other disciple, the one whom Jesus loved, and said to them, "They have taken the Lord out of the tomb, and we do not know where they have laid him." Then Peter and the other disciple set out and went toward the tomb. The two were running together, but the other disciple outran Peter and reached the tomb first. He bent down to look in and saw the linen wrappings lying there, but he did not go in. Then Simon Peter came, following him, and went into the tomb. He saw the linen wrappings lying there, and the cloth that had been on Jesus' head, not lying with the linen wrappings but rolled up in a place by itself. Then the other disciple, who reached the tomb first, also went in, and he saw and believed; for as yet they did not understand the scripture, that he must rise from the dead. Then the disciples returned to their homes.
But Mary stood weeping outside the tomb. As she wept, she bent over to look into the tomb; and she saw two angels in white, sitting where the body of Jesus had been lying, one at the head and the other at the feet. They said to her, "Woman, why are you weeping?" She said to them, "They have taken away my Lord, and I do not know where they have laid him." When she had said this, she turned around and saw Jesus standing there, but she did not know that it was Jesus. Jesus said to her, "Woman, why are you weeping? Whom are you looking for?"
Supposing him to be the gardener, she said to him, "Sir, if you have carried him away, tell me where you have laid him, and I will take him away." Jesus said to her, "Mary!" She turned and said to him in Hebrew, "Rabbouni!" (which means Teacher). Jesus said to her, "Do not hold on to me, because I have not yet ascended to the Father. But go to my brothers and say to them, 'I am ascending to my Father and your Father, to my God and your God." Mary Magdalene went and announced to the disciples, "I have seen the Lord"; and she told them that he had said these things to her.
Priest:
This is the Gospel of the Lord.
All:
Praise to you, O Christ.
Sermon
A time of silent reflection follows.
¶ THE RENEWAL OF BAPTISMAL PROMISES
The president then addresses the congregation:
President: As we celebrate the resurrection of our Lord Jesus Christ from the dead we remember that, through the paschal mystery, we have died and been buried with him in baptism, so that we may rise with him to a new life within the family of his Church.
Now that we have completed our observance of Lent, we renew the promises made at our baptism.
President: Therefore I ask:
President: Do you reject the devil and all rebellion against God?
All:
I reject them.
President: Do you renounce the deceit and corruption of evil?
All:
I renounce them.
President: Do you repent of the sins that separate us from God and neighbour?
All:
I repent of them.
President: Do you turn to Christ as Saviour?
All:
I turn to Christ.
President: Do you submit to Christ as Lord?
All:
I submit to Christ.
President: Do you come to Christ, the way, the truth and the life?
All:
I come to Christ.
President: Brothers and sisters, I ask you to profess the faith of the Church.
President: Do you believe and trust in God the Father?
All:
I believe in God, the Father almighty, creator of heaven and earth.
President: Do you believe and trust in his Son Jesus Christ?
All:
I believe in Jesus Christ, his only Son, our Lord, who was conceived by the Holy Spirit, born of the Virgin Mary, suffered under Pontius Pilate, was crucified, died, and was buried; he descended to the dead. On the third day he rose again; he ascended into heaven, he is seated at the right hand of the Father, and he will come to judge the living and the dead.
President:
Do you believe and trust in the Holy Spirit?
All:
I believe in the Holy Spirit, the holy catholic Church, the communion of saints,
the forgiveness of sins,
the resurrection of the body, and the life everlasting. Amen.
The president sprinkles the people with the blessed water from the font, a reminder of the baptism we share.
President:
Almighty God,
we thank you for our fellowship in the household of faith with all those who have been baptised in your name.
Keep us faithful to our baptism,
and so make us ready for that day when the whole creation shall be made perfect in your Son, our Saviour Jesus Christ.
All:
Amen.
¶ THE LITURGY OF THE SACRAMENT
The Peace - Stand
President:
The risen Christ came and stood among his disciples and said, 'Peace be with you'. Then were they glad when the saw the Lord. Alleluia!
All:
President:
The peace of the Lord be always with you.
And also with you.
Let us offer one another a sign of Christ's peace.
Offertory Hymn
TO God be the glory, great things he has done! So loved he the world that he gave us his Son, Who yielded his life an atonement for sin, and opened the life-gate that all may go in.
Praise the Lord, praise the Lord! Let the earth hear his voice! Praise the Lord, praise the Lord! Let the people rejoice! O come to the Father through Jesus his Son; and give him the glory, great things he has done.
Oh, perfect redemption, the purchase of blood, to every believer the promise of God! The vilest offender who truly believes, that moment from Jesus a pardon receives.
Refrain
Great things he has taught us, great things he has done, and great our rejoicing through Jesus the Son, but purer, and higher, and greater will be our wonder, our rapture, when Jesus we see.
Refrain
Fanny Crosby CH 745
Preparation of the Table - Remain standing
President: Let us pray
Creator of all,
you wash away our sins,
you give us new birth by the Spirit, and redeem us in the blood of Christ.
As we celebrate the resurrection, renew your gift of life with us.
All:
Amen.
The Eucharistic Prayer - Remain standing
President: The Lord be with you
All:
and also with you.
President: Lift up your hearts.
All:
We lift them to the Lord.
President: Let us give thanks to the Lord our God.
All:
It is right to give thanks and praise.
The president praises God for his mighty acts and all respond.
All:
Holy, holy, holy Lord, God of power and might, heaven and earth are full of your glory. Hosanna in the highest. Blessed is he who comes in the name of the Lord. Hosanna in the highest.
The president recalls the Last Supper and calls upon the Holy Spirit.
President: Great is the mystery of faith:
All:
Christ has died:
Christ is risen:
Christ will come again.
The president concludes the prayer.
All:
Amen.
The Lord's Prayer
President:
Rejoicing in God's new creation, let us pray with confidence as our Saviour has taught us:
All:
Our Father, who art in heaven, hallowed be thy name. Thy kingdom come, thy will be done on earth, as it is in heaven. Give us this day our daily bread and forgive us our trespasses, as we forgive those who trespass against us. And lead us not into temptation, but deliver us from evil. For thine is the kingdom, the power and the glory, for ever and ever. Amen.
Breaking of the Bread
President: We break this bread to share in the body of Christ.
All:
Though we are many, we are one body, because we all share in one bread.
All:
Lamb of God, you take away the sin of the world: have mercy on us.
Lamb of God, you take away the sin of the world: have mercy on us.
Lamb of God, you take away the sin of the world: grant us peace.
Giving of Communion
President:
Behold the Lamb of God, behold him who takes away the sin of the world. Blessed are those who are called to his supper.
All:
Lord, I am not worthy to receive you, but only say the word, and I shall be healed.
Holy Communion is distributed from the chancel step. All who are baptised and ordinarily receive Holy Communion in their own church are welcome to receive here. Alternatively, you are invited to come forward for a blessing.
Hymns during Communion
THERE is a Redeemer, Jesus, God's own Son, precious Lamb of God, Messiah Holy One.
Thank you, O my Father, for giving us your Son, and leaving your Spirit 'til the work on earth is done.
Jesus my Redeemer, Name above all names, Precious Lamb of God, Messiah, O for sinners slain.
Refrain
When I stand in glory, I will see his face. And there I'll serve my King forever, In that Holy Place.
Refrain
NOW the green blade riseth from the buried grain, Wheat that in the dark earth many years has lain; Love lives again, that with the dead has been: Love is come again, like wheat that springeth green.
In the grave they laid him, Love whom we had slain, Thinking that never he would wake again, Laid in the earth like grain that sleeps unseen: Love is come again, like wheat that springeth green.
Forth he came at Easter, like the risen grain, He that for three days in the grave had lain; Quick from the dead my risen Lord is seen: Love is come again, like wheat that springeth green.
Melody Green - The Bridge 351
When our hearts are wintry, grieving, or in pain,
Thy touch can call us back to life again,
Fields of our hearts, that dead and bare have been:
Love is come again, like wheat that springeth green.
J.M.Crum NEH 115 (old French melody)
Prayer after Communion - Stand
President: God of life,
who for our redemption gave your only-begotten Son
to the death of the cross,
and by his glorious resurrection
have delivered us from the power of our enemy:
grant us so to die daily to sin,
that we may evermore live with him in the joy of his risen life;
through Jesus Christ our Lord.
All:
Amen.
Notices - Sit
¶ THE DISMISSAL
The Blessing - Stand
President: The Lord be with you.
All:
And also with you.
President:
God the Father, by whose love Christ was raised from the dead, open to you who believe the gates of everlasting life.
All:
Amen.
President:
God the Son, who in bursting from the grave has won a glorious victory, give you joy as you share the Easter faith.
All:
Amen.
President: empower you and fill you with Christ's peace.
God the Holy Spirit, who filled the disciples with the life of the risen Lord,
All:
Amen.
President:
And the blessing of God almighty, the Father, the Son and the Holy Spirit, be among you and remain with you always.
All:
Amen.
The Dismissal
President: Alleluia, Christ is risen!
All:
He is risen indeed, alleluia!
President:
With the risen life of Christ within you, go in the peace of Christ, Alleluia, alleluia.
All:
Thanks be to God, Alleluia, alleluia.
Recessional Hymn
THINE be the glory, risen, conquering Son, Endless is the victory thou o'er death hast won; Angels in bright raiment rolled the stone away, Kept the folded grave-clothes where thy body lay.
Thine be the glory, risen, conquering Son, Endless is the vict'ry thou o'er death hast won.
Lo, Jesus meets us, risen from the tomb; Lovingly he greets us, scatters fear and gloom; Let the Church with gladness hymns of triumph sing, For her Lord now liveth, death hath lost its sting:
Refrain
No more we doubt thee, glorious Prince of Life; Life is nought without thee: aid us in our strife, Make us more than conquerors through thy death-less love; Bring us safe through Jordan to thy home above:
Refrain
Richard Hoyle NEH 120
The Easter flowers in St Andrew's Church have been provided in loving memory of:
Harry Patterson
Rosemary Patterson
Heather Boersma
Hugh Reynolds
Pam Reynolds
Dilys Reynolds
Jeremy Hill
Victor Snaith
Eric Rowland
Joe Egemonye
Johnny Mbonu
Hugh Garnsworthy
Ruth Garnsworthy
George Tippett
Austin Moseley
Sylvia Moseley
Nola Hindley
Graham White
Gladys White
Albert White
Doris White
Eric White
Charlotte Dumashie
John Clucas
Annie Clucas
Allan Craven
Iain Gordon
Alan Exton
Rose Robson
Eileen 'Pat' Kingaby
Philip Reeks
Freddie Garwood
Mthr Anna Matthews
Stephen Dudley
Duncan Chapman
Elizabeth Ekenobi
Jacob Ekenobi
Christiana Esumai
Roselyn Esumai
Bimpe Salako
Olayiwola Salako
Adebayo Osifuwa
Henry Ike
Austin Alison
'I am the resurrection and the life. Those who believe in me, even though they die, will live, and everyone who lives and believes in me will never die'. (John 11:25)
Resurrection, Andrea Mantegna
</text>
|
[
{
"content": "<url>\nhttps://www.alexandrapark.org/_files/ugd/f4f6b3_93db03ffb49a406494cd78e2c1b94278.pdf\n</url>\n<text>\nTHE ORDER OF THE EUCHARIST\n\n¶ THE SERVICE OF LIGHT\n\nThe president and altar party gather in silence at the font carrying the unlit Paschal Candle.\n\nPresident:\n\nDear friends in Christ, this is the most holy day when our Lord Jesus Christ passed from death to life, we gather with all the Church throughout the world in vigil and prayer. This is the Passover of Jesus Christ. Through light and word, through water, bread and wine we celebrate the new life that Christ shares with us.\n\nThe president traces a cross in the Paschal Candle and the Greek letters Alpha above and Omega below it.\n\nPresident:\n\nChrist, yesterday and today, the beginning and the end, Alpha and Omega, all time belongs to him, and all ages, to him be glory and power, through every age and for ever.\n\nAll:\n\nAmen.\n\nFive nail studs are inserted into the Candle, reminding us of the five wounds of Christ upon the Cross. As each is inserted the president says:\n\nPresident: 1 By his holy 2 and glorious wounds 3 may Christ our Lord 4 guard us 5 and keep us.\n\nThe Paschal Candle is lit, while the following is said:\n\nPresident: May the light of Christ, rising in glory, banish all darkness from our hearts and minds.\n\nThose gathered begin to light their candles from the Paschal Candle. The president, carrying the Paschal Candle, raises it and sings:\n\nPresident: The light of Christ.\n\nAll:\n\nThanks be to God.\n\nThe procession moves further into the building and then stops with the versicle and response repeated twice more. The Paschal Candle is placed in its stand in the sanctuary. The president then says:\n\nPresident: Alleluia! Christ is risen.\n\nAll:\n\nHe is risen indeed. Alleluia!\n\nThe bells are rung joyfully and the following hymn is sung.\n\nOpening Hymn\n\nJESUS Christ is risen today, Alleluia!\n\nOur triumphant holy day, Alleluia! Who did once, upon the cross, Alleluia! Suffer to redeem our loss, Alleluia!\n\nHymns of praise then let us sing, Alleluia! Unto Christ, our heavenly King, Alleluia! Who endured the cross and grave, Alleluia! Sinners to redeem and save, Alleluia!\n\nBut the pain which He endured, Alleluia! Our salvation have procured, Alleluia! Now above the sky He's king, Alleluia! Where the angels ever sing, Alleluia!\n\nLyra Davidica NEH 110\n\nThe Greeting\n\nPresident: In the name of the Father, and of the Son, and of the Holy Spirit.\n\nAll:\n\nAmen.\n\nPresident: The Lord be with you.\n\nAll:\n\nAnd also with you.\n\nPresident: Alleluia, Christ is risen!\n\nAll:\n\nHe is risen indeed, alleluia!\n\nGloria in Excelsis\n\nGlory to God in the highest, and peace to his people on earth. Lord God, heavenly King, almighty God and Father, we worship you, we give you thanks, we praise you for your glory. Lord Jesus Christ, only Son of the Father, Lord God, Lamb of God, you take away the sin of the world: have mercy on us; you are seated at the right hand of the Father: receive our prayer. For you alone are the Holy One, you alone are the Lord, you alone are the Most High, Jesus Christ, with the Holy Spirit, in the glory of God the Father. Amen.\n\nThe Collect - Remain standing\n\nPresident:\n\nLet us pray.\n\nA brief moment of stillness is kept.\n\nLord of all life and power, who through the mighty resurrection of your Son overcame the old order of sin and death to make all things new in him: grant that we, being dead to sin and alive to you in Jesus Christ, may reign with him in glory; to whom with you and the Holy Spirit be praise and honour, glory and might, now and in all eternity.\n\nAmen.\n\nAll:\n\n¶ THE LITURGY OF THE WORD\n\nFirst Reading – Acts 10:34-43 - Sit\n\nReader:\n\nA reading from the Acts of the Apostles.\n\nThen Peter began to speak to them: \"I t<cursor_is_here> You know the message he sent to the people of Israel, preaching peace by Jesus Christ - he is Lord of all. That message spread throughout Judea, beginning in Galilee after the baptism that John announced: how God anointed Jesus of Nazareth with the Holy Spirit and with power; how he went about doing good and healing all who were oppressed by the devil, for God was with him. We are witnesses to all that he did both in Judea and in Jerusalem. They put him to death by hanging him on a tree; but God raised him on the third day and allowed him to appear, not to all the people but to us who were chosen by God as witnesses, and who ate and drank with him after he rose from the dead. He commanded us to preach to the people and to testify that he is the one ordained by God as judge of the living and the dead. All the prophets testify about him that everyone who believes in him receives forgiveness of sins through his name.\"\n\nReader: This is the word of the Lord.\n\nAll:\n\nThanks be to God.\n\nGospel Acclamation - Stand\n\nReader: Alleluia, alleluia, alleluia!\n\nAll:\n\nAlleluia, alleluia, alleluia!\n\nI am the first and the last, says the Lord, and the living one; I was dead, and behold I am alive for evermore.\n\nAll:\n\nAlleluia, alleluia, alleluia!\n\nHoly Gospel - John 20: 1-18\n\nPriest:\n\nThe Lord be with you.\n\nAll:\n\nAnd also with you.\n\nPriest:\n\nHear the gospel of our Lord Jesus Christ according to John.\n\nAll:\n\nGlory to you, O Lord.\n\nEarly on the first day of the week, while it was still dark, Mary Magdalene came to the tomb and saw that the stone had been removed from the tomb. So she ran and went to Simon Peter and the other disciple, the one whom Jesus loved, and said to them, \"They have taken the Lord out of the tomb, and we do not know where they have laid him.\" Then Peter and the other disciple set out and went toward the tomb. The two were running together, but the other disciple outran Peter and reached the tomb first. He bent down to look in and saw the linen wrappings lying there, but he did not go in. Then Simon Peter came, following him, and went into the tomb. He saw the linen wrappings lying there, and the cloth that had been on Jesus' head, not lying with the linen wrappings but rolled up in a place by itself. Then the other disciple, who reached the tomb first, also went in, and he saw and believed; for as yet they did not understand the scripture, that he must rise from the dead. Then the disciples returned to their homes.\n\nBut Mary stood weeping outside the tomb. As she wept, she bent over to look into the tomb; and she saw two angels in white, sitting where the body of Jesus had been lying, one at the head and the other at the feet. They said to her, \"Woman, why are you weeping?\" She said to them, \"They have taken away my Lord, and I do not know where they have laid him.\" When she had said this, she turned around and saw Jesus standing there, but she did not know that it was Jesus. Jesus said to her, \"Woman, why are you weeping? Whom are you looking for?\"\n\nSupposing him to be the gardener, she said to him, \"Sir, if you have carried him away, tell me where you have laid him, and I will take him away.\" Jesus said to her, \"Mary!\" She turned and said to him in Hebrew, \"Rabbouni!\" (which means Teacher). Jesus said to her, \"Do not hold on to me, because I have not yet ascended to the Father. But go to my brothers and say to them, 'I am ascending to my Father and your Father, to my God and your God.\" Mary Magdalene went and announced to the disciples, \"I have seen the Lord\"; and she told them that he had said these things to her.\n\nPriest:\n\nThis is the Gospel of the Lord.\n\nAll:\n\nPraise to you, O Christ.\n\nSermon\n\nA time of silent reflection follows.\n\n¶ THE RENEWAL OF BAPTISMAL PROMISES\n\nThe president then addresses the congregation:\n\nPresident: As we celebrate the resurrection of our Lord Jesus Christ from the dead we remember that, through the paschal mystery, we have died and been buried with him in baptism, so that we may rise with him to a new life within the family of his Church.\n\nNow that we have completed our observance of Lent, we renew the promises made at our baptism.\n\nPresident: Therefore I ask:\n\nPresident: Do you reject the devil and all rebellion against God?\n\nAll:\n\nI reject them.\n\nPresident: Do you renounce the deceit and corruption of evil?\n\nAll:\n\nI renounce them.\n\nPresident: Do you repent of the sins that separate us from God and neighbour?\n\nAll:\n\nI repent of them.\n\nPresident: Do you turn to Christ as Saviour?\n\nAll:\n\nI turn to Christ.\n\nPresident: Do you submit to Christ as Lord?\n\nAll:\n\nI submit to Christ.\n\nPresident: Do you come to Christ, the way, the truth and the life?\n\nAll:\n\nI come to Christ.\n\nPresident: Brothers and sisters, I ask you to profess the faith of the Church.\n\nPresident: Do you believe and trust in God the Father?\n\nAll:\n\nI believe in God, the Father almighty, creator of heaven and earth.\n\nPresident: Do you believe and trust in his Son Jesus Christ?\n\nAll:\n\nI believe in Jesus Christ, his only Son, our Lord, who was conceived by the Holy Spirit, born of the Virgin Mary, suffered under Pontius Pilate, was crucified, died, and was buried; he descended to the dead. On the third day he rose again; he ascended into heaven, he is seated at the right hand of the Father, and he will come to judge the living and the dead.\n\nPresident:\n\nDo you believe and trust in the Holy Spirit?\n\nAll:\n\nI believe in the Holy Spirit, the holy catholic Church, the communion of saints,\n\nthe forgiveness of sins,\n\nthe resurrection of the body, and the life everlasting. Amen.\n\nThe president sprinkles the people with the blessed water from the font, a reminder of the baptism we share.\n\nPresident:\n\nAlmighty God,\n\nwe thank you for our fellowship in the household of faith with all those who have been baptised in your name.\n\nKeep us faithful to our baptism,\n\nand so make us ready for that day when the whole creation shall be made perfect in your Son, our Saviour Jesus Christ.\n\nAll:\n\nAmen.\n\n¶ THE LITURGY OF THE SACRAMENT\n\nThe Peace - Stand\n\nPresident:\n\nThe risen Christ came and stood among his disciples and said, 'Peace be with you'. Then were they glad when the saw the Lord. Alleluia!\n\nAll:\n\nPresident:\n\nThe peace of the Lord be always with you.\n\nAnd also with you.\n\nLet us offer one another a sign of Christ's peace.\n\nOffertory Hymn\n\nTO God be the glory, great things he has done! So loved he the world that he gave us his Son, Who yielded his life an atonement for sin, and opened the life-gate that all may go in.\n\nPraise the Lord, praise the Lord! Let the earth hear his voice! Praise the Lord, praise the Lord! Let the people rejoice! O come to the Father through Jesus his Son; and give him the glory, great things he has done.\n\nOh, perfect redemption, the purchase of blood, to every believer the promise of God! The vilest offender who truly believes, that moment from Jesus a pardon receives.\n\nRefrain\n\nGreat things he has taught us, great things he has done, and great our rejoicing through Jesus the Son, but purer, and higher, and greater will be our wonder, our rapture, when Jesus we see.\n\nRefrain\n\nFanny Crosby CH 745\n\nPreparation of the Table - Remain standing\n\nPresident: Let us pray\n\nCreator of all,\n\nyou wash away our sins,\n\nyou give us new birth by the Spirit, and redeem us in the blood of Christ.\n\nAs we celebrate the resurrection, renew your gift of life with us.\n\nAll:\n\nAmen.\n\nThe Eucharistic Prayer - Remain standing\n\nPresident: The Lord be with you\n\nAll:\n\nand also with you.\n\nPresident: Lift up your hearts.\n\nAll:\n\nWe lift them to the Lord.\n\nPresident: Let us give thanks to the Lord our God.\n\nAll:\n\nIt is right to give thanks and praise.\n\nThe president praises God for his mighty acts and all respond.\n\nAll:\n\nHoly, holy, holy Lord, God of power and might, heaven and earth are full of your glory. Hosanna in the highest. Blessed is he who comes in the name of the Lord. Hosanna in the highest.\n\nThe president recalls the Last Supper and calls upon the Holy Spirit.\n\nPresident: Great is the mystery of faith:\n\nAll:\n\nChrist has died:\n\nChrist is risen:\n\nChrist will come again.\n\nThe president concludes the prayer.\n\nAll:\n\nAmen.\n\nThe Lord's Prayer\n\nPresident:\n\nRejoicing in God's new creation, let us pray with confidence as our Saviour has taught us:\n\nAll:\n\nOur Father, who art in heaven, hallowed be thy name. Thy kingdom come, thy will be done on earth, as it is in heaven. Give us this day our daily bread and forgive us our trespasses, as we forgive those who trespass against us. And lead us not into temptation, but deliver us from evil. For thine is the kingdom, the power and the glory, for ever and ever. Amen.\n\nBreaking of the Bread\n\nPresident: We break this bread to share in the body of Christ.\n\nAll:\n\nThough we are many, we are one body, because we all share in one bread.\n\nAll:\n\nLamb of God, you take away the sin of the world: have mercy on us.\n\nLamb of God, you take away the sin of the world: have mercy on us.\n\nLamb of God, you take away the sin of the world: grant us peace.\n\nGiving of Communion\n\nPresident:\n\nBehold the Lamb of God, behold him who takes away the sin of the world. Blessed are those who are called to his supper.\n\nAll:\n\nLord, I am not worthy to receive you, but only say the word, and I shall be healed.\n\nHoly Communion is distributed from the chancel step. All who are baptised and ordinarily receive Holy Communion in their own church are welcome to receive here. Alternatively, you are invited to come forward for a blessing.\n\nHymns during Communion\n\nTHERE is a Redeemer, Jesus, God's own Son, precious Lamb of God, Messiah Holy One.\n\nThank you, O my Father, for giving us your Son, and leaving your Spirit 'til the work on earth is done.\n\nJesus my Redeemer, Name above all names, Precious Lamb of God, Messiah, O for sinners slain.\n\nRefrain\n\nWhen I stand in glory, I will see his face. And there I'll serve my King forever, In that Holy Place.\n\nRefrain\n\nNOW the green blade riseth from the buried grain, Wheat that in the dark earth many years has lain; Love lives again, that with the dead has been: Love is come again, like wheat that springeth green.\n\nIn the grave they laid him, Love whom we had slain, Thinking that never he would wake again, Laid in the earth like grain that sleeps unseen: Love is come again, like wheat that springeth green.\n\nForth he came at Easter, like the risen grain, He that for three days in the grave had lain; Quick from the dead my risen Lord is seen: Love is come again, like wheat that springeth green.\n\nMelody Green - The Bridge 351\n\nWhen our hearts are wintry, grieving, or in pain,\n\nThy touch can call us back to life again,\n\nFields of our hearts, that dead and bare have been:\n\nLove is come again, like wheat that springeth green.\n\nJ.M.Crum NEH 115 (old French melody)\n\nPrayer after Communion - Stand\n\nPresident: God of life,\n\nwho for our redemption gave your only-begotten Son\n\nto the death of the cross,\n\nand by his glorious resurrection\n\nhave delivered us from the power of our enemy:\n\ngrant us so to die daily to sin,\n\nthat we may evermore live with him in the joy of his risen life;\n\nthrough Jesus Christ our Lord.\n\nAll:\n\nAmen.\n\nNotices - Sit\n\n¶ THE DISMISSAL\n\nThe Blessing - Stand\n\nPresident: The Lord be with you.\n\nAll:\n\nAnd also with you.\n\nPresident:\n\nGod the Father, by whose love Christ was raised from the dead, open to you who believe the gates of everlasting life.\n\nAll:\n\nAmen.\n\nPresident:\n\nGod the Son, who in bursting from the grave has won a glorious victory, give you joy as you share the Easter faith.\n\nAll:\n\nAmen.\n\nPresident: empower you and fill you with Christ's peace.\n\nGod the Holy Spirit, who filled the disciples with the life of the risen Lord,\n\nAll:\n\nAmen.\n\nPresident:\n\nAnd the blessing of God almighty, the Father, the Son and the Holy Spirit, be among you and remain with you always.\n\nAll:\n\nAmen.\n\nThe Dismissal\n\nPresident: Alleluia, Christ is risen!\n\nAll:\n\nHe is risen indeed, alleluia!\n\nPresident:\n\nWith the risen life of Christ within you, go in the peace of Christ, Alleluia, alleluia.\n\nAll:\n\nThanks be to God, Alleluia, alleluia.\n\nRecessional Hymn\n\nTHINE be the glory, risen, conquering Son, Endless is the victory thou o'er death hast won; Angels in bright raiment rolled the stone away, Kept the folded grave-clothes where thy body lay.\n\nThine be the glory, risen, conquering Son, Endless is the vict'ry thou o'er death hast won.\n\nLo, Jesus meets us, risen from the tomb; Lovingly he greets us, scatters fear and gloom; Let the Church with gladness hymns of triumph sing, For her Lord now liveth, death hath lost its sting:\n\nRefrain\n\nNo more we doubt thee, glorious Prince of Life; Life is nought without thee: aid us in our strife, Make us more than conquerors through thy death-less love; Bring us safe through Jordan to thy home above:\n\nRefrain\n\nRichard Hoyle NEH 120\n\nThe Easter flowers in St Andrew's Church have been provided in loving memory of:\n\nHarry Patterson\n\nRosemary Patterson\n\nHeather Boersma\n\nHugh Reynolds\n\nPam Reynolds\n\nDilys Reynolds\n\nJeremy Hill\n\nVictor Snaith\n\nEric Rowland\n\nJoe Egemonye\n\nJohnny Mbonu\n\nHugh Garnsworthy\n\nRuth Garnsworthy\n\nGeorge Tippett\n\nAustin Moseley\n\nSylvia Moseley\n\nNola Hindley\n\nGraham White\n\nGladys White\n\nAlbert White\n\nDoris White\n\nEric White\n\nCharlotte Dumashie\n\nJohn Clucas\n\nAnnie Clucas\n\nAllan Craven\n\nIain Gordon\n\nAlan Exton\n\nRose Robson\n\nEileen 'Pat' Kingaby\n\nPhilip Reeks\n\nFreddie Garwood\n\nMthr Anna Matthews\n\nStephen Dudley\n\nDuncan Chapman\n\nElizabeth Ekenobi\n\nJacob Ekenobi\n\nChristiana Esumai\n\nRoselyn Esumai\n\nBimpe Salako\n\nOlayiwola Salako\n\nAdebayo Osifuwa\n\nHenry Ike\n\nAustin Alison\n\n'I am the resurrection and the life. Those who believe in me, even though they die, will live, and everyone who lives and believes in me will never die'. (John 11:25)\n\nResurrection, Andrea Mantegna\n</text>\n",
"role": "user"
},
{
"content": "ruly understand that God shows no partiality, but in every nation anyone who fears him and does what is right is acceptable to him.",
"role": "assistant"
}
] |
Supplementary Online Content
KC M, Fan J, Hyslop T, et al. Relative burden of cancer and noncancer mortality among long-term survivors of breast, prostate, and colorectal cancer in the US. JAMA Netw Open. 2023;6(7):e2323115. doi:10.1001/jamanetworkopen.2023.23115
eTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts
eTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)
eTable 3. Estimates From LASSO for Breast Cancer Cohort, Prostate Cancer Cohort, and Colon Cancer Cohort
eFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer
eFigure 2. Cumulative Mortality for Patients With Breast, Prostate, Colon, and Rectal Cancer Who Were Categorized as Intermediate Risk
eMethods.
This supplementary material has been provided by the authors to give readers additional information about their work.
eTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts
| Breast Cancer Cohort | | | |
|---|---|---|---|
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 9210 | 24.02 |
| 2 | Other Cause of Death | 7073 | 18.44 |
| 3 | Alzheimers (ICD-9 and 10 only) | 2727 | 7.11 |
| 4 | Cerebrovascular Diseases | 2522 | 6.58 |
| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 2474 | 6.45 |
| 6 | Lung and Bronchus | 1894 | 4.94 |
| 7 | Accidents and Adverse Effects | 1025 | 2.67 |
| 8 | Diabetes Mellitus | 978 | 2.55 |
| 9 | Pneumonia and Influenza | 976 | 2.55 |
| 10 | Pancreas | 738 | 1.92 |
| Prostate Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 1758 | 24.49 |
| 2 | Other Cause of Death | 1156 | 16.1 |
| 3 | Lung and Bronchus | 455 | 6.34 |
| 4 | Chronic Obstructive Pulmonary Disease and Allied Cond | 441 | 6.14 |
| 5 | Cerebrovascular Diseases | 343 | 4.78 |
| 6 | Alzheimers (ICD-9 and 10 only) | 249 | 3.47 |
| 7 | Accidents and Adverse Effects | 243 | 3.38 |
| 8 | Diabetes Mellitus | 210 | 2.93 |
| 9 | Pancreas | 195 | 2.72 |
| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 144 | 2.01 |
| Colon Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 6690 | 28.96 |
| 2 | Other Cause of Death | 3751 | 16.24 |
| 3 | Alzheimers (ICD-9 and 10 only) | 1561 | 6.76 |
| 4 | Cerebrovascular Diseases | 1460 | 6.32 |
| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 1406 | 6.09 |
| 6 | Lung and Bronchus | 956 | 4.14 |
| 7 | Diabetes Mellitus | 835 | 3.61 |
| 8 | Pneumonia and Influenza | 666 | 2.88 |
| 9 | Accidents and Adverse Effects | 596 | 2.58 |
| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 576 | 2.49 |
| Rectal Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 1710 | 27.51 |
| 2 | Other Cause of Death | 979 | 15.75 |
| 3 | Chronic Obstructive Pulmonary Disease and Allied Cond | 391 | 6.29 |
| 4 | | 351 | 5.65 |
|---|---|---|---|
| 5 | Lung and Bronchus | 348 | 5.6 |
| 6 | Alzheimers (ICD-9 and 10 only) | 296 | 4.76 |
| 7 | Diabetes Mellitus | 219 | 3.52 |
| 8 | Accidents and Adverse Effects | 169 | 2.72 |
| 9 | Pneumonia and Influenza | 154 | 2.48 |
| | Nephritis, Nephrotic Syndrome and Nephrosis | 150 | 2.41 |
eTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)
| Race/ethnicity | Income | | | | |
|---|---|---|---|---|---|
| | Overall | < $40,000 | $40,000 - $54,999 | $55,000 - $69,999 | $70,000+ |
| NH- white | 446058 (71.06) | 16555 (3.71) | 83625 (18.75) | 163063 (36.56) | 182815 (40.98) |
| NH-Black | 64117 (10.21) | 5006(7.81) | 16376 (25.54) | 26102 (40.71) | 16633 (25.94) |
| NH-Asian | 50719 (8.08) | 88 (0.17) | 1472 (2.90) | 17862 (35.22) | 31297 (61.71) |
| Hispanic | 64200 (10.23) | 630 (0.98) | 8840 (13.77) | 33173 (51.67) | 21557 (33.58) |
| NH-American Indian | 2608 (0.42) | 214 (8.21) | 750 (28.76) | 901 (34.55) | 743 (28.49) |
Note: There was an association between race/ethnicity and income (p-value<0.01).
| Race/ethnicity | | |
|---|---|---|
| | Overall | Non-metropolitan |
| NH-White | 446058 (71.06) | 61383 (13.76) |
| NH-Black | 64117 (10.21) | 5779 (9.01) |
| NH-Asian | 50719 (8.08) | 1700 (3.35) |
| Hispanic | 64200 (10.23) | 2349 (3.66) |
| NH-American Indian | 2608 (0.42) | 584 (22.39) |
Note: There was an association between race/ethnicity and residence (p-value<0.01).
eTable 3a. Estimates From LASSO for Breast Cancer Cohort
| Breast specific mortality | | Non-breast specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Stage III | 1.537251072 | Age: 65+ | 2.699201705 |
| Stage II | 0.720426478 | Age: 60-64 | 1.439952426 |
| Grade III | 0.684887731 | Age: 55-59 | 0.988162494 |
| Grade II | 0.534389507 | Stage III | 0.636884153 |
| Age: 65+ | 0.465242924 | Age: 50 to 54 | 0.567543968 |
| ER Positive | 0.460846144 | Stage II | 0.275906812 |
| Node positive | 0.32159283 | Income: <$40,000 | 0.268716028 |
| Race: NH Black | 0.272865599 | Race: NH American Indian | 0.231050449 |
| Income: <$40,000 | 0.210125129 | Income: $40,000-$54,999 | 0.169862759 |
| Income: $40,000-$54,999 | 0.151766213 | Race: NH Black | 0.162013621 |
| Race: NH American Indian | 0.109816262 | Grade III | 0.063483896 |
| Income: $55,000-$69,999 | 0.106816932 | Income: $55,000-$69,999 | 0.029468223 |
| Age: 60-64 | 0.090598634 | Grade II | 0.021965937 |
| Race: Hispanic | 0.081964288 | Laterality: left | -0.003487806 |
| Age: 55-59 | 0.04018637 | PR Positive | -0.016875338 |
| Laterality: left | 0.029488998 | Diagnosis year2005 | -0.022470294 |
| Received chemotherapy | 0 | Metropolitan | -0.022943673 |
| Metropolitan | 0 | ER Positive | -0.02684002 |
| Age: 50 to 54 | -0.047973637 | Diagnosis year2004 | -0.027342957 |
| Received radiation | -0.113938681 | Node positive | -0.032457425 |
| PR Positive | -0.12279612 | Diagnosis year2006 | -0.05338106 |
| Diagnosis year2004 | -0.132400159 | Diagnosis year2007 | -0.053936603 |
| Race: NH Asian | -0.13352793 | Diagnosis year2009 | -0.098477185 |
| Diagnosis year2006 | -0.165020348 | Diagnosis year2008 | -0.102628064 |
| Diagnosis year2005 | -0.182476773 | Diagnosis year2010 | -0.1055015 |
| Diagnosis year2011 | -0.216875428 | Race: Hispanic | -0.128755726 |
| Diagnosis year2008 | -0.220891581 | Diagnosis year2011 | -0.147772815 |
| Diagnosis year2007 | -0.230069019 | Diagnosis year2012 | -0.189877755 |
| Diagnosis year2010 | -0.260495116 | Diagnosis year2013 | -0.195374001 |
| Diagnosis year2009 | -0.288913878 | Diagnosis year2014 | -0.229486158 |
| Diagnosis year2012 | -0.314935441 | Received radiation | -0.288273589 |
| Diagnosis year2014 | -0.336115864 | Race: NH Asian | -0.308808776 |
| Diagnosis year2013 | -0.354917735 | Received chemotherapy | -0.522345065 |
eTable 3b. Estimates From LASSO for Prostate Cancer Cohort
| Prostate specific mortality | | Non-prostate specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Gleason score >=8 | 2.034374852 | Age: 65+ | 1.974076105 |
| PSA >20 ng/ml | 0.992756164 | Age: 60-64 | 1.085337557 |
| Gleason score 7 | 0.959798764 | Age: 55-59 | 0.785334807 |
| Received chemotherapy | 0.842982458 | Gleason score >=8 | 0.593229466 |
| Age: 65+ | 0.786030325 | PSA >20 ng/ml | 0.48315396 |
| Diagnosis year2005 | 0.576025911 | Income: <$40,000 | 0.472943656 |
| PSA 10-20 ng/ml | 0.555856856 | Age: 50 to 54 | 0.40508499 |
| Diagnosis year2007 | 0.512294762 | PSA 10-20 ng/ml | 0.37328792 |
| Diagnosis year2006 | 0.46865235 | Income: $40,000-$54,999 | 0.308611712 |
| Race: NH American Indian | 0.301474953 | Gleason score 7 | 0.307532718 |
| Age: 60-64 | 0.299958217 | Diagnosis year2008 | 0.160165023 |
| Age: 55-59 | 0.229695509 | Race: NH Black | 0.158281607 |
| Stage III | 0.194229898 | Diagnosis year2009 | 0.139001752 |
| Income: <$40,000 | 0.178404795 | Income: $55,000-$69,999 | 0.085547563 |
| Income: $55,000-$69,999 | 0.109471677 | Diagnosis year2006 | 0.056766055 |
| Diagnosis year2008 | 0.09756749 | Diagnosis year2007 | 0.023847414 |
| Race: NH Black | 0.078537701 | Received chemotherapy | 0 |
| Age: 50 to 54 | 0.017222436 | Metropolitan | 0 |
| Income: $40,000-$54,999 | 0.000509206 | Diagnosis year2010 | -0.067855622 |
| Metropolitan | 0 | Diagnosis year2011 | -0.083717596 |
| Race: Hispanic | -0.017384104 | Diagnosis year2012 | -0.096460298 |
| Stage II | -0.22066363 | Race: Hispanic | -0.134747387 |
| Diagnosis year2009 | -0.284852766 | Diagnosis year2013 | -0.203359358 |
| Race: NH Asian | -0.45112247 | Diagnosis year2005 | -0.234171545 |
| Diagnosis year2012 | -0.675802517 | Stage II | -0.241639917 |
| Diagnosis year2010 | -0.696123364 | Race: NH Asian | -0.245438383 |
| Diagnosis year2014 | -0.715420816 | Diagnosis year2014 | -0.271951938 |
| Diagnosis year2011 | -0.723133848 | Race: NH American Indian | -0.448841961 |
| Diagnosis year2013 | -0.794248077 | Stage III | -0.58350858 |
eTable 3c. Estimates From LASSO for Colon Cancer Cohort
| Predictors | Coefficients | Predictors | Coefficients |
|---|---|---|---|
| Stage III | 1.09926 | Age: 65+ | 2.47594 |
| Received radiation | 0.678782 | Age: 60-64 | 1.2866 |
| Stage II | 0.655247 | Age: 55-59 | 0.921194 |
| Age: 65+ | 0.50581 | Age: 50 to 54 | 0.447659 |
| Sex: Male | 0.23722 | Stage III | 0.230464 |
| Race: NH Black | 0.230035 | Received radiation | 0.220824 |
| Age: 60-64 | 0.162085 | Stage II | 0.176699 |
| Race: NH American Indian | 0.138695 | Grade III | 0.158286 |
| Received chemotherapy | 0.112574 | Income: $40,000-$54,999 | 0.104611 |
| Grade II | 0.102515 | Sex: Male | 0.103692 |
| Age: 55-59 | 0.0861353 | Grade II | 0.0495799 |
| Race: Hispanic | 0.0774006 | Income: <$40,000 | 0.0406025 |
| Age: 50 to 54 | 0.00120698 | Income: $55,000-$69,999 | 0.0155148 |
| Income: <$40,000 | 0 | Metropolitan | 0 |
| Income: $40,000-$54,999 | 0 | Diagnosis year2004 | 0 |
| Income: $55,000-$69,999 | 0 | Diagnosis year2005 | 0 |
| Diagnosis year2004 | 0 | Diagnosis year2006 | 0 |
| Diagnosis year2005 | 0 | Diagnosis year2007 | 0 |
| Diagnosis year2006 | 0 | Diagnosis year2008 | 0 |
| Diagnosis year2007 | 0 | Diagnosis year2009 | 0 |
| Diagnosis year2008 | 0 | Diagnosis year2010 | 0 |
| Diagnosis year2009 | 0 | Diagnosis year2011 | 0 |
| Diagnosis year2010 | 0 | Diagnosis year2012 | 0 |
| Diagnosis year2011 | 0 | Diagnosis year2013 | 0 |
| Diagnosis year2012 | 0 | Diagnosis year2014 | 0 |
| Diagnosis year2013 | 0 | Node positive | 0 |
| Diagnosis year2014 | 0 | Race: NH Black | -0.0777145 |
| Node positive | 0 | Race: NH American Indian | -0.201365 |
| Grade III | -0.00244543 | Race: Hispanic | -0.220277 |
| Race: NH Asian | -0.0678746 | Race: NH Asian | -0.379185 |
eTable 3d. Estimates From LASSO for Colon Cancer Cohort
| Rectal Specific Mortality | | Non-rectal specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Stage III | 0.767787428 | Age: 65+ | 2.489941 |
| Age: 65+ | 0.489828926 | Age: 60-64 | 1.440028 |
| Race: NH American Indian | 0.440062967 | Age: 55-59 | 1.027247 |
| Stage II | 0.405510409 | Age: 50 to 54 | 0.58245 |
| Race: NH Black | 0.276920301 | Stage II | 0.22218 |
| Received radiation | 0.248965583 | Income: $40,000-$54,999 | 0.185543 |
| Income: <$40,000 | 0.233499737 | Stage III | 0.173978 |
| Age: 60-64 | 0.201605727 | Race: NH American Indian | 0.159218 |
| Sex: Male | 0.157909355 | Sex: Male | 0.153263 |
| Income: $55,000-$69,999 | 0.145678625 | Income: <$40,000 | 0.145227 |
| Income: $40,000-$54,999 | 0.145542349 | Income: $55,000-$69,999 | 0.067393 |
| Grade III | 0.136721223 | Received radiation | 0 |
| Race: Hispanic | 0.132288965 | Metropolitan | 0 |
| Grade II | 0.113521841 | Diagnosis year2004 | 0 |
| Received chemotherapy | 0.08699774 | Diagnosis year2005 | 0 |
| Age: 55-59 | 0.050525555 | Diagnosis year2006 | 0 |
| Age: 50 to 54 | 0.026208036 | Diagnosis year2007 | 0 |
| Diagnosis year2010 | 0.024210606 | Diagnosis year2008 | 0 |
| Node positive | 0 | Diagnosis year2009 | 0 |
| Diagnosis year2004 | -0.003333617 | Diagnosis year2010 | 0 |
| Race: NH Asian | -0.017040191 | Diagnosis year2011 | 0 |
| Metropolitan | -0.018932207 | Diagnosis year2012 | 0 |
| Diagnosis year2006 | -0.053334985 | Diagnosis year2013 | 0 |
| Diagnosis year2009 | -0.061803173 | Diagnosis year2014 | 0 |
| Diagnosis year2007 | -0.080438055 | Node positive | 0 |
| Diagnosis year2005 | -0.089145029 | Grade II | 0 |
| Diagnosis year2013 | -0.098261766 | Grade III | 0 |
| Diagnosis year2011 | -0.10421356 | Race: NH Black | -0.03386 |
| Diagnosis year2014 | -0.131655872 | Race: Hispanic | -0.18415 |
| Diagnosis year2012 | -0.1339987 | Received chemotherapy | -0.30955 |
| Diagnosis year2008 | -0.18215978 | Race: NH Asian | -0.36205 |
eFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer
0.18
0.16
0.14
0.12
0.10
0.08
0.06
0.04
0.02
0.00
5
Rectal cancer mortality (high-risk group)
6
7
8
Patients at risk
Follow-up (years)
15510 13197 11370
Rectal cancer-specific mortality
9
10
9605 8156 6767
Non-rectal cancer specific mortality
eMethods.
Exclusion of patients with missing information on demographic or clinical factors
In our study, we excluded patients with missing information on demographic or clinical factors as well as those with missing follow-up time. This exclusion was necessary due to the nature of our study's goal, which is to accurately stratify patients into three risk categories: low, intermediate, and high-risk. To achieve this, it was crucial to have complete information on all variables included in the model.
Additionally, we employed LASSO regularization to select important variables and mitigate the risk of model overfitting. This regularization techniques requires non-missing values to perform the selection process effectively.
About 32% of patients were excluded due to missing demographic or clinical information or missing follow-up time. Notably, a significant portion of the excluded patients (77%) were prostate cancer patients. This high proportion is attributed to the limited availability of Gleason scores in the SEER database.
|
<urn:uuid:4d0dd2e2-3d9e-4b32-8252-52fc2a6e4a9f>
|
CC-MAIN-2023-50
|
https://jdc.jefferson.edu/cgi/viewcontent.cgi?filename=0&article=1106&context=kimmelccfp&type=additional
|
2023-12-04T23:52:03+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-50/subset=warc/part-00135-e565b809-b335-4c1d-90fd-54a9a2b7113d.c000.gz.parquet
| 377,058,235
| 5,193
|
eng_Latn
|
eng_Latn
| 0.876201
|
eng_Latn
| 0.983487
|
[
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
926,
2989,
3319,
4466,
6870,
9023,
10787,
12843,
12969,
13287,
14333
] |
Supplementary Online Content
KC M, Fan J, Hyslop T, et al. Relative burden of cancer and noncancer mortality among long-term survivors of breast, prostate, and colorectal cancer in the US. JAMA Netw Open. 2023;6(7):e2323115. doi:10.1001/jamanetworkopen.2023.23115
eTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts
eTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)
eTable 3. Estimates From LASSO for Breast Cancer Cohort, Prostate Cancer Cohort, and Colon Cancer Cohort
eFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer
eFigure 2. Cumulative Mortality for Patients With Breast, Prostate, Colon, and Rectal Cancer Who Were Categorized as Intermediate Risk
eMethods.
This supplementary material has been provided by the authors to give readers additional information about their work.
eTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts
| Breast Cancer Cohort | | | |
|---|---|---|---|
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 9210 | 24.02 |
| 2 | Other Cause of Death | 7073 | 18.44 |
| 3 | Alzheimers (ICD-9 and 10 only) | 2727 | 7.11 |
| 4 | Cerebrovascular Diseases | 2522 | 6.58 |
| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 2474 | 6.45 |
| 6 | Lung and Bronchus | 1894 | 4.94 |
| 7 | Accidents and Adverse Effects | 1025 | 2.67 |
| 8 | Diabetes Mellitus | 978 | 2.55 |
| 9 | Pneumonia and Influenza | 976 | 2.55 |
| 10 | Pancreas | 738 | 1.92 |
| Prostate Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 1758 | 24.49 |
| 2 | Other Cause of Death | 1156 | 16.1 |
| 3 | Lung and Bronchus | 455 | 6.34 |
| 4 | Chronic Obstructive Pulmonary Disease and Allied Cond | 441 | 6.14 |
| 5 | Cerebrovascular Diseases | 343 | 4.78 |
| 6
|
| Alzheimers (ICD-9 and 10 only) | 249 | 3.
|
47 |
| 7 | Accidents and Adverse Effects | 243 | 3.38 |
| 8 | Diabetes Mellitus | 210 | 2.93 |
| 9 | Pancreas | 195 | 2.72 |
| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 144 | 2.01 |
| Colon Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 6690 | 28.96 |
| 2 | Other Cause of Death | 3751 | 16.24 |
| 3 | Alzheimers (ICD-9 and 10 only) | 1561 | 6.76 |
| 4 | Cerebrovascular Diseases | 1460 | 6.32 |
| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 1406 | 6.09 |
| 6 | Lung and Bronchus | 956 | 4.14 |
| 7 | Diabetes Mellitus | 835 | 3.61 |
| 8 | Pneumonia and Influenza | 666 | 2.88 |
| 9 | Accidents and Adverse Effects | 596 | 2.58 |
| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 576 | 2.49 |
| Rectal Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 1710 | 27.51 |
| 2 | Other Cause of Death | 979 | 15.75 |
| 3 | Chronic Obstructive Pulmonary Disease and Allied Cond | 391 | 6.29 |
| 4 | | 351 | 5.65 |
|---|---|---|---|
| 5 | Lung and Bronchus | 348 | 5.6 |
| 6 | Alzheimers (ICD-9 and 10 only) | 296 | 4.76 |
| 7 | Diabetes Mellitus | 219 | 3.52 |
| 8 | Accidents and Adverse Effects | 169 | 2.72 |
| 9 | Pneumonia and Influenza | 154 | 2.48 |
| | Nephritis, Nephrotic Syndrome and Nephrosis | 150 | 2.41 |
eTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)
| Race/ethnicity | Income | | | | |
|---|---|---|---|---|---|
| | Overall | < $40,000 | $40,000 - $54,999 | $55,000 - $69,999 | $70,000+ |
| NH- white | 446058 (71.06) | 16555 (3.71) | 83625 (18.75) | 163063 (36.56) | 182815 (40.98) |
| NH-Black | 64117 (10.21) | 5006(7.81) | 16376 (25.54) | 26102 (40.71) | 16633 (25.94) |
| NH-Asian | 50719 (8.08) | 88 (0.17) | 1472 (2.90) | 17862 (35.22) | 31297 (61.71) |
| Hispanic | 64200 (10.23) | 630 (0.98) | 8840 (13.77) | 33173 (51.67) | 21557 (33.58) |
| NH-American Indian | 2608 (0.42) | 214 (8.21) | 750 (28.76) | 901 (34.55) | 743 (28.49) |
Note: There was an association between race/ethnicity and income (p-value<0.01).
| Race/ethnicity | | |
|---|---|---|
| | Overall | Non-metropolitan |
| NH-White | 446058 (71.06) | 61383 (13.76) |
| NH-Black | 64117 (10.21) | 5779 (9.01) |
| NH-Asian | 50719 (8.08) | 1700 (3.35) |
| Hispanic | 64200 (10.23) | 2349 (3.66) |
| NH-American Indian | 2608 (0.42) | 584 (22.39) |
Note: There was an association between race/ethnicity and residence (p-value<0.01).
eTable 3a. Estimates From LASSO for Breast Cancer Cohort
| Breast specific mortality | | Non-breast specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Stage III | 1.537251072 | Age: 65+ | 2.699201705 |
| Stage II | 0.720426478 | Age: 60-64 | 1.439952426 |
| Grade III | 0.684887731 | Age: 55-59 | 0.988162494 |
| Grade II | 0.534389507 | Stage III | 0.636884153 |
| Age: 65+ | 0.465242924 | Age: 50 to 54 | 0.567543968 |
| ER Positive | 0.460846144 | Stage II | 0.275906812 |
| Node positive | 0.32159283 | Income: <$40,000 | 0.268716028 |
| Race: NH Black | 0.272865599 | Race: NH American Indian | 0.231050449 |
| Income: <$40,000 | 0.210125129 | Income: $40,000-$54,999 | 0.169862759 |
| Income: $40,000-$54,999 | 0.151766213 | Race: NH Black | 0.162013621 |
| Race: NH American Indian | 0.109816262 | Grade III | 0.063483896 |
| Income: $55,000-$69,999 | 0.106816932 | Income: $55,000-$69,999 | 0.029468223 |
| Age: 60-64 | 0.090598634 | Grade II | 0.021965937 |
| Race: Hispanic | 0.081964288 | Laterality: left | -0.003487806 |
| Age: 55-59 | 0.04018637 | PR Positive | -0.016875338 |
| Laterality: left | 0.029488998 | Diagnosis year2005 | -0.022470294 |
| Received chemotherapy | 0 | Metropolitan | -0.022943673 |
| Metropolitan | 0 | ER Positive | -0.02684002 |
| Age: 50 to 54 | -0.047973637 | Diagnosis year2004 | -0.027342957 |
| Received radiation | -0.113938681 | Node positive | -0.032457425 |
| PR Positive | -0.12279612 | Diagnosis year2006 | -0.05338106 |
| Diagnosis year2004 | -0.132400159 | Diagnosis year2007 | -0.053936603 |
| Race: NH Asian | -0.13352793 | Diagnosis year2009 | -0.098477185 |
| Diagnosis year2006 | -0.165020348 | Diagnosis year2008 | -0.102628064 |
| Diagnosis year2005 | -0.182476773 | Diagnosis year2010 | -0.1055015 |
| Diagnosis year2011 | -0.216875428 | Race: Hispanic | -0.128755726 |
| Diagnosis year2008 | -0.220891581 | Diagnosis year2011 | -0.147772815 |
| Diagnosis year2007 | -0.230069019 | Diagnosis year2012 | -0.189877755 |
| Diagnosis year2010 | -0.260495116 | Diagnosis year2013 | -0.195374001 |
| Diagnosis year2009 | -0.288913878 | Diagnosis year2014 | -0.229486158 |
| Diagnosis year2012 | -0.314935441 | Received radiation | -0.288273589 |
| Diagnosis year2014 | -0.336115864 | Race: NH Asian | -0.308808776 |
| Diagnosis year2013 | -0.354917735 | Received chemotherapy | -0.522345065 |
eTable 3b. Estimates From LASSO for Prostate Cancer Cohort
| Prostate specific mortality | | Non-prostate specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Gleason score >=8 | 2.034374852 | Age: 65+ | 1.974076105 |
| PSA >20 ng/ml | 0.992756164 | Age: 60-64 | 1.085337557 |
| Gleason score 7 | 0.959798764 | Age: 55-59 | 0.785334807 |
| Received chemotherapy | 0.842982458 | Gleason score >=8 | 0.593229466 |
| Age: 65+ | 0.786030325 | PSA >20 ng/ml | 0.48315396 |
| Diagnosis year2005 | 0.576025911 | Income: <$40,000 | 0.472943656 |
| PSA 10-20 ng/ml | 0.555856856 | Age: 50 to 54 | 0.40508499 |
| Diagnosis year2007 | 0.512294762 | PSA 10-20 ng/ml | 0.37328792 |
| Diagnosis year2006 | 0.46865235 | Income: $40,000-$54,999 | 0.308611712 |
| Race: NH American Indian | 0.301474953 | Gleason score 7 | 0.307532718 |
| Age: 60-64 | 0.299958217 | Diagnosis year2008 | 0.160165023 |
| Age: 55-59 | 0.229695509 | Race: NH Black | 0.158281607 |
| Stage III | 0.194229898 | Diagnosis year2009 | 0.139001752 |
| Income: <$40,000 | 0.178404795 | Income: $55,000-$69,999 | 0.085547563 |
| Income: $55,000-$69,999 | 0.109471677 | Diagnosis year2006 | 0.056766055 |
| Diagnosis year2008 | 0.09756749 | Diagnosis year2007 | 0.023847414 |
| Race: NH Black | 0.078537701 | Received chemotherapy | 0 |
| Age: 50 to 54 | 0.017222436 | Metropolitan | 0 |
| Income: $40,000-$54,999 | 0.000509206 | Diagnosis year2010 | -0.067855622 |
| Metropolitan | 0 | Diagnosis year2011 | -0.083717596 |
| Race: Hispanic | -0.017384104 | Diagnosis year2012 | -0.096460298 |
| Stage II | -0.22066363 | Race: Hispanic | -0.134747387 |
| Diagnosis year2009 | -0.284852766 | Diagnosis year2013 | -0.203359358 |
| Race: NH Asian | -0.45112247 | Diagnosis year2005 | -0.234171545 |
| Diagnosis year2012 | -0.675802517 | Stage II | -0.241639917 |
| Diagnosis year2010 | -0.696123364 | Race: NH Asian | -0.245438383 |
| Diagnosis year2014 | -0.715420816 | Diagnosis year2014 | -0.271951938 |
| Diagnosis year2011 | -0.723133848 | Race: NH American Indian | -0.448841961 |
| Diagnosis year2013 | -0.794248077 | Stage III | -0.58350858 |
eTable 3c. Estimates From LASSO for Colon Cancer Cohort
| Predictors | Coefficients | Predictors | Coefficients |
|---|---|---|---|
| Stage III | 1.09926 | Age: 65+ | 2.47594 |
| Received radiation | 0.678782 | Age: 60-64 | 1.2866 |
| Stage II | 0.655247 | Age: 55-59 | 0.921194 |
| Age: 65+ | 0.50581 | Age: 50 to 54 | 0.447659 |
| Sex: Male | 0.23722 | Stage III | 0.230464 |
| Race: NH Black | 0.230035 | Received radiation | 0.220824 |
| Age: 60-64 | 0.162085 | Stage II | 0.176699 |
| Race: NH American Indian | 0.138695 | Grade III | 0.158286 |
| Received chemotherapy | 0.112574 | Income: $40,000-$54,999 | 0.104611 |
| Grade II | 0.102515 | Sex: Male | 0.103692 |
| Age: 55-59 | 0.0861353 | Grade II | 0.0495799 |
| Race: Hispanic | 0.0774006 | Income: <$40,000 | 0.0406025 |
| Age: 50 to 54 | 0.00120698 | Income: $55,000-$69,999 | 0.0155148 |
| Income: <$40,000 | 0 | Metropolitan | 0 |
| Income: $40,000-$54,999 | 0 | Diagnosis year2004 | 0 |
| Income: $55,000-$69,999 | 0 | Diagnosis year2005 | 0 |
| Diagnosis year2004 | 0 | Diagnosis year2006 | 0 |
| Diagnosis year2005 | 0 | Diagnosis year2007 | 0 |
| Diagnosis year2006 | 0 | Diagnosis year2008 | 0 |
| Diagnosis year2007 | 0 | Diagnosis year2009 | 0 |
| Diagnosis year2008 | 0 | Diagnosis year2010 | 0 |
| Diagnosis year2009 | 0 | Diagnosis year2011 | 0 |
| Diagnosis year2010 | 0 | Diagnosis year2012 | 0 |
| Diagnosis year2011 | 0 | Diagnosis year2013 | 0 |
| Diagnosis year2012 | 0 | Diagnosis year2014 | 0 |
| Diagnosis year2013 | 0 | Node positive | 0 |
| Diagnosis year2014 | 0 | Race: NH Black | -0.0777145 |
| Node positive | 0 | Race: NH American Indian | -0.201365 |
| Grade III | -0.00244543 | Race: Hispanic | -0.220277 |
| Race: NH Asian | -0.0678746 | Race: NH Asian | -0.379185 |
eTable 3d. Estimates From LASSO for Colon Cancer Cohort
| Rectal Specific Mortality | | Non-rectal specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Stage III | 0.767787428 | Age: 65+ | 2.489941 |
| Age: 65+ | 0.489828926 | Age: 60-64 | 1.440028 |
| Race: NH American Indian | 0.440062967 | Age: 55-59 | 1.027247 |
| Stage II | 0.405510409 | Age: 50 to 54 | 0.58245 |
| Race: NH Black | 0.276920301 | Stage II | 0.22218 |
| Received radiation | 0.248965583 | Income: $40,000-$54,999 | 0.185543 |
| Income: <$40,000 | 0.233499737 | Stage III | 0.173978 |
| Age: 60-64 | 0.201605727 | Race: NH American Indian | 0.159218 |
| Sex: Male | 0.157909355 | Sex: Male | 0.153263 |
| Income: $55,000-$69,999 | 0.145678625 | Income: <$40,000 | 0.145227 |
| Income: $40,000-$54,999 | 0.145542349 | Income: $55,000-$69,999 | 0.067393 |
| Grade III | 0.136721223 | Received radiation | 0 |
| Race: Hispanic | 0.132288965 | Metropolitan | 0 |
| Grade II | 0.113521841 | Diagnosis year2004 | 0 |
| Received chemotherapy | 0.08699774 | Diagnosis year2005 | 0 |
| Age: 55-59 | 0.050525555 | Diagnosis year2006 | 0 |
| Age: 50 to 54 | 0.026208036 | Diagnosis year2007 | 0 |
| Diagnosis year2010 | 0.024210606 | Diagnosis year2008 | 0 |
| Node positive | 0 | Diagnosis year2009 | 0 |
| Diagnosis year2004 | -0.003333617 | Diagnosis year2010 | 0 |
| Race: NH Asian | -0.017040191 | Diagnosis year2011 | 0 |
| Metropolitan | -0.018932207 | Diagnosis year2012 | 0 |
| Diagnosis year2006 | -0.053334985 | Diagnosis year2013 | 0 |
| Diagnosis year2009 | -0.061803173 | Diagnosis year2014 | 0 |
| Diagnosis year2007 | -0.080438055 | Node positive | 0 |
| Diagnosis year2005 | -0.089145029 | Grade II | 0 |
| Diagnosis year2013 | -0.098261766 | Grade III | 0 |
| Diagnosis year2011 | -0.10421356 | Race: NH Black | -0.03386 |
| Diagnosis year2014 | -0.131655872 | Race: Hispanic | -0.18415 |
| Diagnosis year2012 | -0.1339987 | Received chemotherapy | -0.30955 |
| Diagnosis year2008 | -0.18215978 | Race: NH Asian | -0.36205 |
eFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer
0.18
0.16
0.14
0.12
0.10
0.08
0.06
0.04
0.02
0.00
5
Rectal cancer mortality (high-risk group)
6
7
8
Patients at risk
Follow-up (years)
15510 13197 11370
Rectal cancer-specific mortality
9
10
9605 8156 6767
Non-rectal cancer specific mortality
eMethods.
Exclusion of patients with missing information on demographic or clinical factors
In our study, we excluded patients with missing information on demographic or clinical factors as well as those with missing follow-up time. This exclusion was necessary due to the nature of our study's goal, which is to accurately stratify patients into three risk categories: low, intermediate, and high-risk. To achieve this, it was crucial to have complete information on all variables included in the model.
Additionally, we employed LASSO regularization to select important variables and mitigate the risk of model overfitting. This regularization techniques requires non-missing values to perform the selection process effectively.
About 32% of patients were excluded due to missing demographic or clinical information or missing follow-up time. Notably, a significant portion of the excluded patients (77%) were prostate cancer patients. This high proportion is attributed to the limited availability of Gleason scores in the SEER database.
| 1,923
|
inside_word
|
|
|
remove_one_sentence
|
<url>
https://jdc.jefferson.edu/cgi/viewcontent.cgi?filename=0&article=1106&context=kimmelccfp&type=additional
</url>
<text>
Supplementary Online Content
KC M, Fan J, Hyslop T, et al. Relative burden of cancer and noncancer mortality among long-term survivors of breast, prostate, and colorectal cancer in the US. JAMA Netw Open. 2023;6(7):e2323115. doi:10.1001/jamanetworkopen.2023.23115
eTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts
eTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)
eTable 3. Estimates From LASSO for Breast Cancer Cohort, Prostate Cancer Cohort, and Colon Cancer Cohort
eFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer
eFigure 2. Cumulative Mortality for Patients With Breast, Prostate, Colon, and Rectal Cancer Who Were Categorized as Intermediate Risk
eMethods.
This supplementary material has been provided by the authors to give readers additional information about their work.
eTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts
| Breast Cancer Cohort | | | |
|---|---|---|---|
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 9210 | 24.02 |
| 2 | Other Cause of Death | 7073 | 18.44 |
| 3 | Alzheimers (ICD-9 and 10 only) | 2727 | 7.11 |
| 4 | Cerebrovascular Diseases | 2522 | 6.58 |
| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 2474 | 6.45 |
| 6 | Lung and Bronchus | 1894 | 4.94 |
| 7 | Accidents and Adverse Effects | 1025 | 2.67 |
| 8 | Diabetes Mellitus | 978 | 2.55 |
| 9 | Pneumonia and Influenza | 976 | 2.55 |
| 10 | Pancreas | 738 | 1.92 |
| Prostate Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 1758 | 24.49 |
| 2 | Other Cause of Death | 1156 | 16.1 |
| 3 | Lung and Bronchus | 455 | 6.34 |
| 4 | Chronic Obstructive Pulmonary Disease and Allied Cond | 441 | 6.14 |
| 5 | Cerebrovascular Diseases | 343 | 4.78 |
| 6 <cursor_is_here>47 |
| 7 | Accidents and Adverse Effects | 243 | 3.38 |
| 8 | Diabetes Mellitus | 210 | 2.93 |
| 9 | Pancreas | 195 | 2.72 |
| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 144 | 2.01 |
| Colon Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 6690 | 28.96 |
| 2 | Other Cause of Death | 3751 | 16.24 |
| 3 | Alzheimers (ICD-9 and 10 only) | 1561 | 6.76 |
| 4 | Cerebrovascular Diseases | 1460 | 6.32 |
| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 1406 | 6.09 |
| 6 | Lung and Bronchus | 956 | 4.14 |
| 7 | Diabetes Mellitus | 835 | 3.61 |
| 8 | Pneumonia and Influenza | 666 | 2.88 |
| 9 | Accidents and Adverse Effects | 596 | 2.58 |
| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 576 | 2.49 |
| Rectal Cancer Cohort | | | |
| SN | Non-cancer specific causes of death | N | % |
| 1 | Diseases of Heart | 1710 | 27.51 |
| 2 | Other Cause of Death | 979 | 15.75 |
| 3 | Chronic Obstructive Pulmonary Disease and Allied Cond | 391 | 6.29 |
| 4 | | 351 | 5.65 |
|---|---|---|---|
| 5 | Lung and Bronchus | 348 | 5.6 |
| 6 | Alzheimers (ICD-9 and 10 only) | 296 | 4.76 |
| 7 | Diabetes Mellitus | 219 | 3.52 |
| 8 | Accidents and Adverse Effects | 169 | 2.72 |
| 9 | Pneumonia and Influenza | 154 | 2.48 |
| | Nephritis, Nephrotic Syndrome and Nephrosis | 150 | 2.41 |
eTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)
| Race/ethnicity | Income | | | | |
|---|---|---|---|---|---|
| | Overall | < $40,000 | $40,000 - $54,999 | $55,000 - $69,999 | $70,000+ |
| NH- white | 446058 (71.06) | 16555 (3.71) | 83625 (18.75) | 163063 (36.56) | 182815 (40.98) |
| NH-Black | 64117 (10.21) | 5006(7.81) | 16376 (25.54) | 26102 (40.71) | 16633 (25.94) |
| NH-Asian | 50719 (8.08) | 88 (0.17) | 1472 (2.90) | 17862 (35.22) | 31297 (61.71) |
| Hispanic | 64200 (10.23) | 630 (0.98) | 8840 (13.77) | 33173 (51.67) | 21557 (33.58) |
| NH-American Indian | 2608 (0.42) | 214 (8.21) | 750 (28.76) | 901 (34.55) | 743 (28.49) |
Note: There was an association between race/ethnicity and income (p-value<0.01).
| Race/ethnicity | | |
|---|---|---|
| | Overall | Non-metropolitan |
| NH-White | 446058 (71.06) | 61383 (13.76) |
| NH-Black | 64117 (10.21) | 5779 (9.01) |
| NH-Asian | 50719 (8.08) | 1700 (3.35) |
| Hispanic | 64200 (10.23) | 2349 (3.66) |
| NH-American Indian | 2608 (0.42) | 584 (22.39) |
Note: There was an association between race/ethnicity and residence (p-value<0.01).
eTable 3a. Estimates From LASSO for Breast Cancer Cohort
| Breast specific mortality | | Non-breast specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Stage III | 1.537251072 | Age: 65+ | 2.699201705 |
| Stage II | 0.720426478 | Age: 60-64 | 1.439952426 |
| Grade III | 0.684887731 | Age: 55-59 | 0.988162494 |
| Grade II | 0.534389507 | Stage III | 0.636884153 |
| Age: 65+ | 0.465242924 | Age: 50 to 54 | 0.567543968 |
| ER Positive | 0.460846144 | Stage II | 0.275906812 |
| Node positive | 0.32159283 | Income: <$40,000 | 0.268716028 |
| Race: NH Black | 0.272865599 | Race: NH American Indian | 0.231050449 |
| Income: <$40,000 | 0.210125129 | Income: $40,000-$54,999 | 0.169862759 |
| Income: $40,000-$54,999 | 0.151766213 | Race: NH Black | 0.162013621 |
| Race: NH American Indian | 0.109816262 | Grade III | 0.063483896 |
| Income: $55,000-$69,999 | 0.106816932 | Income: $55,000-$69,999 | 0.029468223 |
| Age: 60-64 | 0.090598634 | Grade II | 0.021965937 |
| Race: Hispanic | 0.081964288 | Laterality: left | -0.003487806 |
| Age: 55-59 | 0.04018637 | PR Positive | -0.016875338 |
| Laterality: left | 0.029488998 | Diagnosis year2005 | -0.022470294 |
| Received chemotherapy | 0 | Metropolitan | -0.022943673 |
| Metropolitan | 0 | ER Positive | -0.02684002 |
| Age: 50 to 54 | -0.047973637 | Diagnosis year2004 | -0.027342957 |
| Received radiation | -0.113938681 | Node positive | -0.032457425 |
| PR Positive | -0.12279612 | Diagnosis year2006 | -0.05338106 |
| Diagnosis year2004 | -0.132400159 | Diagnosis year2007 | -0.053936603 |
| Race: NH Asian | -0.13352793 | Diagnosis year2009 | -0.098477185 |
| Diagnosis year2006 | -0.165020348 | Diagnosis year2008 | -0.102628064 |
| Diagnosis year2005 | -0.182476773 | Diagnosis year2010 | -0.1055015 |
| Diagnosis year2011 | -0.216875428 | Race: Hispanic | -0.128755726 |
| Diagnosis year2008 | -0.220891581 | Diagnosis year2011 | -0.147772815 |
| Diagnosis year2007 | -0.230069019 | Diagnosis year2012 | -0.189877755 |
| Diagnosis year2010 | -0.260495116 | Diagnosis year2013 | -0.195374001 |
| Diagnosis year2009 | -0.288913878 | Diagnosis year2014 | -0.229486158 |
| Diagnosis year2012 | -0.314935441 | Received radiation | -0.288273589 |
| Diagnosis year2014 | -0.336115864 | Race: NH Asian | -0.308808776 |
| Diagnosis year2013 | -0.354917735 | Received chemotherapy | -0.522345065 |
eTable 3b. Estimates From LASSO for Prostate Cancer Cohort
| Prostate specific mortality | | Non-prostate specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Gleason score >=8 | 2.034374852 | Age: 65+ | 1.974076105 |
| PSA >20 ng/ml | 0.992756164 | Age: 60-64 | 1.085337557 |
| Gleason score 7 | 0.959798764 | Age: 55-59 | 0.785334807 |
| Received chemotherapy | 0.842982458 | Gleason score >=8 | 0.593229466 |
| Age: 65+ | 0.786030325 | PSA >20 ng/ml | 0.48315396 |
| Diagnosis year2005 | 0.576025911 | Income: <$40,000 | 0.472943656 |
| PSA 10-20 ng/ml | 0.555856856 | Age: 50 to 54 | 0.40508499 |
| Diagnosis year2007 | 0.512294762 | PSA 10-20 ng/ml | 0.37328792 |
| Diagnosis year2006 | 0.46865235 | Income: $40,000-$54,999 | 0.308611712 |
| Race: NH American Indian | 0.301474953 | Gleason score 7 | 0.307532718 |
| Age: 60-64 | 0.299958217 | Diagnosis year2008 | 0.160165023 |
| Age: 55-59 | 0.229695509 | Race: NH Black | 0.158281607 |
| Stage III | 0.194229898 | Diagnosis year2009 | 0.139001752 |
| Income: <$40,000 | 0.178404795 | Income: $55,000-$69,999 | 0.085547563 |
| Income: $55,000-$69,999 | 0.109471677 | Diagnosis year2006 | 0.056766055 |
| Diagnosis year2008 | 0.09756749 | Diagnosis year2007 | 0.023847414 |
| Race: NH Black | 0.078537701 | Received chemotherapy | 0 |
| Age: 50 to 54 | 0.017222436 | Metropolitan | 0 |
| Income: $40,000-$54,999 | 0.000509206 | Diagnosis year2010 | -0.067855622 |
| Metropolitan | 0 | Diagnosis year2011 | -0.083717596 |
| Race: Hispanic | -0.017384104 | Diagnosis year2012 | -0.096460298 |
| Stage II | -0.22066363 | Race: Hispanic | -0.134747387 |
| Diagnosis year2009 | -0.284852766 | Diagnosis year2013 | -0.203359358 |
| Race: NH Asian | -0.45112247 | Diagnosis year2005 | -0.234171545 |
| Diagnosis year2012 | -0.675802517 | Stage II | -0.241639917 |
| Diagnosis year2010 | -0.696123364 | Race: NH Asian | -0.245438383 |
| Diagnosis year2014 | -0.715420816 | Diagnosis year2014 | -0.271951938 |
| Diagnosis year2011 | -0.723133848 | Race: NH American Indian | -0.448841961 |
| Diagnosis year2013 | -0.794248077 | Stage III | -0.58350858 |
eTable 3c. Estimates From LASSO for Colon Cancer Cohort
| Predictors | Coefficients | Predictors | Coefficients |
|---|---|---|---|
| Stage III | 1.09926 | Age: 65+ | 2.47594 |
| Received radiation | 0.678782 | Age: 60-64 | 1.2866 |
| Stage II | 0.655247 | Age: 55-59 | 0.921194 |
| Age: 65+ | 0.50581 | Age: 50 to 54 | 0.447659 |
| Sex: Male | 0.23722 | Stage III | 0.230464 |
| Race: NH Black | 0.230035 | Received radiation | 0.220824 |
| Age: 60-64 | 0.162085 | Stage II | 0.176699 |
| Race: NH American Indian | 0.138695 | Grade III | 0.158286 |
| Received chemotherapy | 0.112574 | Income: $40,000-$54,999 | 0.104611 |
| Grade II | 0.102515 | Sex: Male | 0.103692 |
| Age: 55-59 | 0.0861353 | Grade II | 0.0495799 |
| Race: Hispanic | 0.0774006 | Income: <$40,000 | 0.0406025 |
| Age: 50 to 54 | 0.00120698 | Income: $55,000-$69,999 | 0.0155148 |
| Income: <$40,000 | 0 | Metropolitan | 0 |
| Income: $40,000-$54,999 | 0 | Diagnosis year2004 | 0 |
| Income: $55,000-$69,999 | 0 | Diagnosis year2005 | 0 |
| Diagnosis year2004 | 0 | Diagnosis year2006 | 0 |
| Diagnosis year2005 | 0 | Diagnosis year2007 | 0 |
| Diagnosis year2006 | 0 | Diagnosis year2008 | 0 |
| Diagnosis year2007 | 0 | Diagnosis year2009 | 0 |
| Diagnosis year2008 | 0 | Diagnosis year2010 | 0 |
| Diagnosis year2009 | 0 | Diagnosis year2011 | 0 |
| Diagnosis year2010 | 0 | Diagnosis year2012 | 0 |
| Diagnosis year2011 | 0 | Diagnosis year2013 | 0 |
| Diagnosis year2012 | 0 | Diagnosis year2014 | 0 |
| Diagnosis year2013 | 0 | Node positive | 0 |
| Diagnosis year2014 | 0 | Race: NH Black | -0.0777145 |
| Node positive | 0 | Race: NH American Indian | -0.201365 |
| Grade III | -0.00244543 | Race: Hispanic | -0.220277 |
| Race: NH Asian | -0.0678746 | Race: NH Asian | -0.379185 |
eTable 3d. Estimates From LASSO for Colon Cancer Cohort
| Rectal Specific Mortality | | Non-rectal specific mortality | |
|---|---|---|---|
| Predictors | Coefficients | Predictors | Coefficients |
| Stage III | 0.767787428 | Age: 65+ | 2.489941 |
| Age: 65+ | 0.489828926 | Age: 60-64 | 1.440028 |
| Race: NH American Indian | 0.440062967 | Age: 55-59 | 1.027247 |
| Stage II | 0.405510409 | Age: 50 to 54 | 0.58245 |
| Race: NH Black | 0.276920301 | Stage II | 0.22218 |
| Received radiation | 0.248965583 | Income: $40,000-$54,999 | 0.185543 |
| Income: <$40,000 | 0.233499737 | Stage III | 0.173978 |
| Age: 60-64 | 0.201605727 | Race: NH American Indian | 0.159218 |
| Sex: Male | 0.157909355 | Sex: Male | 0.153263 |
| Income: $55,000-$69,999 | 0.145678625 | Income: <$40,000 | 0.145227 |
| Income: $40,000-$54,999 | 0.145542349 | Income: $55,000-$69,999 | 0.067393 |
| Grade III | 0.136721223 | Received radiation | 0 |
| Race: Hispanic | 0.132288965 | Metropolitan | 0 |
| Grade II | 0.113521841 | Diagnosis year2004 | 0 |
| Received chemotherapy | 0.08699774 | Diagnosis year2005 | 0 |
| Age: 55-59 | 0.050525555 | Diagnosis year2006 | 0 |
| Age: 50 to 54 | 0.026208036 | Diagnosis year2007 | 0 |
| Diagnosis year2010 | 0.024210606 | Diagnosis year2008 | 0 |
| Node positive | 0 | Diagnosis year2009 | 0 |
| Diagnosis year2004 | -0.003333617 | Diagnosis year2010 | 0 |
| Race: NH Asian | -0.017040191 | Diagnosis year2011 | 0 |
| Metropolitan | -0.018932207 | Diagnosis year2012 | 0 |
| Diagnosis year2006 | -0.053334985 | Diagnosis year2013 | 0 |
| Diagnosis year2009 | -0.061803173 | Diagnosis year2014 | 0 |
| Diagnosis year2007 | -0.080438055 | Node positive | 0 |
| Diagnosis year2005 | -0.089145029 | Grade II | 0 |
| Diagnosis year2013 | -0.098261766 | Grade III | 0 |
| Diagnosis year2011 | -0.10421356 | Race: NH Black | -0.03386 |
| Diagnosis year2014 | -0.131655872 | Race: Hispanic | -0.18415 |
| Diagnosis year2012 | -0.1339987 | Received chemotherapy | -0.30955 |
| Diagnosis year2008 | -0.18215978 | Race: NH Asian | -0.36205 |
eFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer
0.18
0.16
0.14
0.12
0.10
0.08
0.06
0.04
0.02
0.00
5
Rectal cancer mortality (high-risk group)
6
7
8
Patients at risk
Follow-up (years)
15510 13197 11370
Rectal cancer-specific mortality
9
10
9605 8156 6767
Non-rectal cancer specific mortality
eMethods.
Exclusion of patients with missing information on demographic or clinical factors
In our study, we excluded patients with missing information on demographic or clinical factors as well as those with missing follow-up time. This exclusion was necessary due to the nature of our study's goal, which is to accurately stratify patients into three risk categories: low, intermediate, and high-risk. To achieve this, it was crucial to have complete information on all variables included in the model.
Additionally, we employed LASSO regularization to select important variables and mitigate the risk of model overfitting. This regularization techniques requires non-missing values to perform the selection process effectively.
About 32% of patients were excluded due to missing demographic or clinical information or missing follow-up time. Notably, a significant portion of the excluded patients (77%) were prostate cancer patients. This high proportion is attributed to the limited availability of Gleason scores in the SEER database.
</text>
|
[
{
"content": "<url>\nhttps://jdc.jefferson.edu/cgi/viewcontent.cgi?filename=0&article=1106&context=kimmelccfp&type=additional\n</url>\n<text>\nSupplementary Online Content\n\nKC M, Fan J, Hyslop T, et al. Relative burden of cancer and noncancer mortality among long-term survivors of breast, prostate, and colorectal cancer in the US. JAMA Netw Open. 2023;6(7):e2323115. doi:10.1001/jamanetworkopen.2023.23115\n\neTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts\neTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)\neTable 3. Estimates From LASSO for Breast Cancer Cohort, Prostate Cancer Cohort, and Colon Cancer Cohort\neFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer\neFigure 2. Cumulative Mortality for Patients With Breast, Prostate, Colon, and Rectal Cancer Who Were Categorized as Intermediate Risk\n\neMethods.\n\nThis supplementary material has been provided by the authors to give readers additional information about their work.\n\neTable 1. Frequency Distribution of Noncancer Causes of Death in the Cancer Cohorts\n\n| Breast Cancer Cohort | | | |\n|---|---|---|---|\n| SN | Non-cancer specific causes of death | N | % |\n| 1 | Diseases of Heart | 9210 | 24.02 |\n| 2 | Other Cause of Death | 7073 | 18.44 |\n| 3 | Alzheimers (ICD-9 and 10 only) | 2727 | 7.11 |\n| 4 | Cerebrovascular Diseases | 2522 | 6.58 |\n| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 2474 | 6.45 |\n| 6 | Lung and Bronchus | 1894 | 4.94 |\n| 7 | Accidents and Adverse Effects | 1025 | 2.67 |\n| 8 | Diabetes Mellitus | 978 | 2.55 |\n| 9 | Pneumonia and Influenza | 976 | 2.55 |\n| 10 | Pancreas | 738 | 1.92 |\n| Prostate Cancer Cohort | | | |\n| SN | Non-cancer specific causes of death | N | % |\n| 1 | Diseases of Heart | 1758 | 24.49 |\n| 2 | Other Cause of Death | 1156 | 16.1 |\n| 3 | Lung and Bronchus | 455 | 6.34 |\n| 4 | Chronic Obstructive Pulmonary Disease and Allied Cond | 441 | 6.14 |\n| 5 | Cerebrovascular Diseases | 343 | 4.78 |\n| 6 <cursor_is_here>47 |\n| 7 | Accidents and Adverse Effects | 243 | 3.38 |\n| 8 | Diabetes Mellitus | 210 | 2.93 |\n| 9 | Pancreas | 195 | 2.72 |\n| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 144 | 2.01 |\n| Colon Cancer Cohort | | | |\n| SN | Non-cancer specific causes of death | N | % |\n| 1 | Diseases of Heart | 6690 | 28.96 |\n| 2 | Other Cause of Death | 3751 | 16.24 |\n| 3 | Alzheimers (ICD-9 and 10 only) | 1561 | 6.76 |\n| 4 | Cerebrovascular Diseases | 1460 | 6.32 |\n| 5 | Chronic Obstructive Pulmonary Disease and Allied Cond | 1406 | 6.09 |\n| 6 | Lung and Bronchus | 956 | 4.14 |\n| 7 | Diabetes Mellitus | 835 | 3.61 |\n| 8 | Pneumonia and Influenza | 666 | 2.88 |\n| 9 | Accidents and Adverse Effects | 596 | 2.58 |\n| 10 | Nephritis, Nephrotic Syndrome and Nephrosis | 576 | 2.49 |\n| Rectal Cancer Cohort | | | |\n| SN | Non-cancer specific causes of death | N | % |\n| 1 | Diseases of Heart | 1710 | 27.51 |\n| 2 | Other Cause of Death | 979 | 15.75 |\n| 3 | Chronic Obstructive Pulmonary Disease and Allied Cond | 391 | 6.29 |\n\n| 4 | | 351 | 5.65 |\n|---|---|---|---|\n| 5 | Lung and Bronchus | 348 | 5.6 |\n| 6 | Alzheimers (ICD-9 and 10 only) | 296 | 4.76 |\n| 7 | Diabetes Mellitus | 219 | 3.52 |\n| 8 | Accidents and Adverse Effects | 169 | 2.72 |\n| 9 | Pneumonia and Influenza | 154 | 2.48 |\n| | Nephritis, Nephrotic Syndrome and Nephrosis | 150 | 2.41 |\n\neTable 2. Crosstabulations of Race vs Income and Race vs Residence (Metropolitan)\n\n| Race/ethnicity | Income | | | | |\n|---|---|---|---|---|---|\n| | Overall | < $40,000 | $40,000 - $54,999 | $55,000 - $69,999 | $70,000+ |\n| NH- white | 446058 (71.06) | 16555 (3.71) | 83625 (18.75) | 163063 (36.56) | 182815 (40.98) |\n| NH-Black | 64117 (10.21) | 5006(7.81) | 16376 (25.54) | 26102 (40.71) | 16633 (25.94) |\n| NH-Asian | 50719 (8.08) | 88 (0.17) | 1472 (2.90) | 17862 (35.22) | 31297 (61.71) |\n| Hispanic | 64200 (10.23) | 630 (0.98) | 8840 (13.77) | 33173 (51.67) | 21557 (33.58) |\n| NH-American Indian | 2608 (0.42) | 214 (8.21) | 750 (28.76) | 901 (34.55) | 743 (28.49) |\n\nNote: There was an association between race/ethnicity and income (p-value<0.01).\n\n| Race/ethnicity | | |\n|---|---|---|\n| | Overall | Non-metropolitan |\n| NH-White | 446058 (71.06) | 61383 (13.76) |\n| NH-Black | 64117 (10.21) | 5779 (9.01) |\n| NH-Asian | 50719 (8.08) | 1700 (3.35) |\n| Hispanic | 64200 (10.23) | 2349 (3.66) |\n| NH-American Indian | 2608 (0.42) | 584 (22.39) |\n\nNote: There was an association between race/ethnicity and residence (p-value<0.01).\n\neTable 3a. Estimates From LASSO for Breast Cancer Cohort\n\n| Breast specific mortality | | Non-breast specific mortality | |\n|---|---|---|---|\n| Predictors | Coefficients | Predictors | Coefficients |\n| Stage III | 1.537251072 | Age: 65+ | 2.699201705 |\n| Stage II | 0.720426478 | Age: 60-64 | 1.439952426 |\n| Grade III | 0.684887731 | Age: 55-59 | 0.988162494 |\n| Grade II | 0.534389507 | Stage III | 0.636884153 |\n| Age: 65+ | 0.465242924 | Age: 50 to 54 | 0.567543968 |\n| ER Positive | 0.460846144 | Stage II | 0.275906812 |\n| Node positive | 0.32159283 | Income: <$40,000 | 0.268716028 |\n| Race: NH Black | 0.272865599 | Race: NH American Indian | 0.231050449 |\n| Income: <$40,000 | 0.210125129 | Income: $40,000-$54,999 | 0.169862759 |\n| Income: $40,000-$54,999 | 0.151766213 | Race: NH Black | 0.162013621 |\n| Race: NH American Indian | 0.109816262 | Grade III | 0.063483896 |\n| Income: $55,000-$69,999 | 0.106816932 | Income: $55,000-$69,999 | 0.029468223 |\n| Age: 60-64 | 0.090598634 | Grade II | 0.021965937 |\n| Race: Hispanic | 0.081964288 | Laterality: left | -0.003487806 |\n| Age: 55-59 | 0.04018637 | PR Positive | -0.016875338 |\n| Laterality: left | 0.029488998 | Diagnosis year2005 | -0.022470294 |\n| Received chemotherapy | 0 | Metropolitan | -0.022943673 |\n| Metropolitan | 0 | ER Positive | -0.02684002 |\n| Age: 50 to 54 | -0.047973637 | Diagnosis year2004 | -0.027342957 |\n| Received radiation | -0.113938681 | Node positive | -0.032457425 |\n| PR Positive | -0.12279612 | Diagnosis year2006 | -0.05338106 |\n| Diagnosis year2004 | -0.132400159 | Diagnosis year2007 | -0.053936603 |\n| Race: NH Asian | -0.13352793 | Diagnosis year2009 | -0.098477185 |\n| Diagnosis year2006 | -0.165020348 | Diagnosis year2008 | -0.102628064 |\n| Diagnosis year2005 | -0.182476773 | Diagnosis year2010 | -0.1055015 |\n| Diagnosis year2011 | -0.216875428 | Race: Hispanic | -0.128755726 |\n| Diagnosis year2008 | -0.220891581 | Diagnosis year2011 | -0.147772815 |\n| Diagnosis year2007 | -0.230069019 | Diagnosis year2012 | -0.189877755 |\n| Diagnosis year2010 | -0.260495116 | Diagnosis year2013 | -0.195374001 |\n| Diagnosis year2009 | -0.288913878 | Diagnosis year2014 | -0.229486158 |\n| Diagnosis year2012 | -0.314935441 | Received radiation | -0.288273589 |\n| Diagnosis year2014 | -0.336115864 | Race: NH Asian | -0.308808776 |\n| Diagnosis year2013 | -0.354917735 | Received chemotherapy | -0.522345065 |\n\neTable 3b. Estimates From LASSO for Prostate Cancer Cohort\n\n| Prostate specific mortality | | Non-prostate specific mortality | |\n|---|---|---|---|\n| Predictors | Coefficients | Predictors | Coefficients |\n| Gleason score >=8 | 2.034374852 | Age: 65+ | 1.974076105 |\n| PSA >20 ng/ml | 0.992756164 | Age: 60-64 | 1.085337557 |\n| Gleason score 7 | 0.959798764 | Age: 55-59 | 0.785334807 |\n| Received chemotherapy | 0.842982458 | Gleason score >=8 | 0.593229466 |\n| Age: 65+ | 0.786030325 | PSA >20 ng/ml | 0.48315396 |\n| Diagnosis year2005 | 0.576025911 | Income: <$40,000 | 0.472943656 |\n| PSA 10-20 ng/ml | 0.555856856 | Age: 50 to 54 | 0.40508499 |\n| Diagnosis year2007 | 0.512294762 | PSA 10-20 ng/ml | 0.37328792 |\n| Diagnosis year2006 | 0.46865235 | Income: $40,000-$54,999 | 0.308611712 |\n| Race: NH American Indian | 0.301474953 | Gleason score 7 | 0.307532718 |\n| Age: 60-64 | 0.299958217 | Diagnosis year2008 | 0.160165023 |\n| Age: 55-59 | 0.229695509 | Race: NH Black | 0.158281607 |\n| Stage III | 0.194229898 | Diagnosis year2009 | 0.139001752 |\n| Income: <$40,000 | 0.178404795 | Income: $55,000-$69,999 | 0.085547563 |\n| Income: $55,000-$69,999 | 0.109471677 | Diagnosis year2006 | 0.056766055 |\n| Diagnosis year2008 | 0.09756749 | Diagnosis year2007 | 0.023847414 |\n| Race: NH Black | 0.078537701 | Received chemotherapy | 0 |\n| Age: 50 to 54 | 0.017222436 | Metropolitan | 0 |\n| Income: $40,000-$54,999 | 0.000509206 | Diagnosis year2010 | -0.067855622 |\n| Metropolitan | 0 | Diagnosis year2011 | -0.083717596 |\n| Race: Hispanic | -0.017384104 | Diagnosis year2012 | -0.096460298 |\n| Stage II | -0.22066363 | Race: Hispanic | -0.134747387 |\n| Diagnosis year2009 | -0.284852766 | Diagnosis year2013 | -0.203359358 |\n| Race: NH Asian | -0.45112247 | Diagnosis year2005 | -0.234171545 |\n| Diagnosis year2012 | -0.675802517 | Stage II | -0.241639917 |\n| Diagnosis year2010 | -0.696123364 | Race: NH Asian | -0.245438383 |\n| Diagnosis year2014 | -0.715420816 | Diagnosis year2014 | -0.271951938 |\n| Diagnosis year2011 | -0.723133848 | Race: NH American Indian | -0.448841961 |\n| Diagnosis year2013 | -0.794248077 | Stage III | -0.58350858 |\n\neTable 3c. Estimates From LASSO for Colon Cancer Cohort\n\n| Predictors | Coefficients | Predictors | Coefficients |\n|---|---|---|---|\n| Stage III | 1.09926 | Age: 65+ | 2.47594 |\n| Received radiation | 0.678782 | Age: 60-64 | 1.2866 |\n| Stage II | 0.655247 | Age: 55-59 | 0.921194 |\n| Age: 65+ | 0.50581 | Age: 50 to 54 | 0.447659 |\n| Sex: Male | 0.23722 | Stage III | 0.230464 |\n| Race: NH Black | 0.230035 | Received radiation | 0.220824 |\n| Age: 60-64 | 0.162085 | Stage II | 0.176699 |\n| Race: NH American Indian | 0.138695 | Grade III | 0.158286 |\n| Received chemotherapy | 0.112574 | Income: $40,000-$54,999 | 0.104611 |\n| Grade II | 0.102515 | Sex: Male | 0.103692 |\n| Age: 55-59 | 0.0861353 | Grade II | 0.0495799 |\n| Race: Hispanic | 0.0774006 | Income: <$40,000 | 0.0406025 |\n| Age: 50 to 54 | 0.00120698 | Income: $55,000-$69,999 | 0.0155148 |\n| Income: <$40,000 | 0 | Metropolitan | 0 |\n| Income: $40,000-$54,999 | 0 | Diagnosis year2004 | 0 |\n| Income: $55,000-$69,999 | 0 | Diagnosis year2005 | 0 |\n| Diagnosis year2004 | 0 | Diagnosis year2006 | 0 |\n| Diagnosis year2005 | 0 | Diagnosis year2007 | 0 |\n| Diagnosis year2006 | 0 | Diagnosis year2008 | 0 |\n| Diagnosis year2007 | 0 | Diagnosis year2009 | 0 |\n| Diagnosis year2008 | 0 | Diagnosis year2010 | 0 |\n| Diagnosis year2009 | 0 | Diagnosis year2011 | 0 |\n| Diagnosis year2010 | 0 | Diagnosis year2012 | 0 |\n| Diagnosis year2011 | 0 | Diagnosis year2013 | 0 |\n| Diagnosis year2012 | 0 | Diagnosis year2014 | 0 |\n| Diagnosis year2013 | 0 | Node positive | 0 |\n| Diagnosis year2014 | 0 | Race: NH Black | -0.0777145 |\n| Node positive | 0 | Race: NH American Indian | -0.201365 |\n| Grade III | -0.00244543 | Race: Hispanic | -0.220277 |\n| Race: NH Asian | -0.0678746 | Race: NH Asian | -0.379185 |\n\neTable 3d. Estimates From LASSO for Colon Cancer Cohort\n\n| Rectal Specific Mortality | | Non-rectal specific mortality | |\n|---|---|---|---|\n| Predictors | Coefficients | Predictors | Coefficients |\n| Stage III | 0.767787428 | Age: 65+ | 2.489941 |\n| Age: 65+ | 0.489828926 | Age: 60-64 | 1.440028 |\n| Race: NH American Indian | 0.440062967 | Age: 55-59 | 1.027247 |\n| Stage II | 0.405510409 | Age: 50 to 54 | 0.58245 |\n| Race: NH Black | 0.276920301 | Stage II | 0.22218 |\n| Received radiation | 0.248965583 | Income: $40,000-$54,999 | 0.185543 |\n| Income: <$40,000 | 0.233499737 | Stage III | 0.173978 |\n| Age: 60-64 | 0.201605727 | Race: NH American Indian | 0.159218 |\n| Sex: Male | 0.157909355 | Sex: Male | 0.153263 |\n| Income: $55,000-$69,999 | 0.145678625 | Income: <$40,000 | 0.145227 |\n| Income: $40,000-$54,999 | 0.145542349 | Income: $55,000-$69,999 | 0.067393 |\n| Grade III | 0.136721223 | Received radiation | 0 |\n| Race: Hispanic | 0.132288965 | Metropolitan | 0 |\n| Grade II | 0.113521841 | Diagnosis year2004 | 0 |\n| Received chemotherapy | 0.08699774 | Diagnosis year2005 | 0 |\n| Age: 55-59 | 0.050525555 | Diagnosis year2006 | 0 |\n| Age: 50 to 54 | 0.026208036 | Diagnosis year2007 | 0 |\n| Diagnosis year2010 | 0.024210606 | Diagnosis year2008 | 0 |\n| Node positive | 0 | Diagnosis year2009 | 0 |\n| Diagnosis year2004 | -0.003333617 | Diagnosis year2010 | 0 |\n| Race: NH Asian | -0.017040191 | Diagnosis year2011 | 0 |\n| Metropolitan | -0.018932207 | Diagnosis year2012 | 0 |\n| Diagnosis year2006 | -0.053334985 | Diagnosis year2013 | 0 |\n| Diagnosis year2009 | -0.061803173 | Diagnosis year2014 | 0 |\n| Diagnosis year2007 | -0.080438055 | Node positive | 0 |\n| Diagnosis year2005 | -0.089145029 | Grade II | 0 |\n| Diagnosis year2013 | -0.098261766 | Grade III | 0 |\n| Diagnosis year2011 | -0.10421356 | Race: NH Black | -0.03386 |\n| Diagnosis year2014 | -0.131655872 | Race: Hispanic | -0.18415 |\n| Diagnosis year2012 | -0.1339987 | Received chemotherapy | -0.30955 |\n| Diagnosis year2008 | -0.18215978 | Race: NH Asian | -0.36205 |\n\neFigure 1. Survival Time Ratio of Noncancer Specific Mortality Among Patients With Breast, Prostate, Colon and Rectal Cancer\n\n0.18\n\n0.16\n\n0.14\n\n0.12\n\n0.10\n\n0.08\n\n0.06\n\n0.04\n\n0.02\n\n0.00\n\n5\n\nRectal cancer mortality (high-risk group)\n\n6\n\n7\n\n8\n\nPatients at risk\n\nFollow-up (years)\n\n15510 13197 11370\n\nRectal cancer-specific mortality\n\n9\n\n10\n\n9605 8156 6767\n\nNon-rectal cancer specific mortality\n\neMethods.\n\nExclusion of patients with missing information on demographic or clinical factors\n\nIn our study, we excluded patients with missing information on demographic or clinical factors as well as those with missing follow-up time. This exclusion was necessary due to the nature of our study's goal, which is to accurately stratify patients into three risk categories: low, intermediate, and high-risk. To achieve this, it was crucial to have complete information on all variables included in the model.\n\nAdditionally, we employed LASSO regularization to select important variables and mitigate the risk of model overfitting. This regularization techniques requires non-missing values to perform the selection process effectively.\n\nAbout 32% of patients were excluded due to missing demographic or clinical information or missing follow-up time. Notably, a significant portion of the excluded patients (77%) were prostate cancer patients. This high proportion is attributed to the limited availability of Gleason scores in the SEER database.\n</text>\n",
"role": "user"
},
{
"content": "| Alzheimers (ICD-9 and 10 only) | 249 | 3.",
"role": "assistant"
}
] |
Review
Prevention of Diabetic Foot Ulcers at Primary Care Level
Josephine Priyadarshini, RN; Seham Abdi, RN; Azza Metwaly, RN; Badria AL Lenjawi, MD; Janelle San Jose, RN; Hashim Mohamed, MD *
Weill Cornell Medicine-Qatar, Doha, Qatar
*Corresponding author
Hashim Mohamed, MD
Associate Professor, Weill Cornell Medicine-Qatar, Doha, Qatar; E-mail: [email protected]
Article information
Received: January 9 th , 2018; Revised: January 30 th , 2018; Accepted: February 6 th , 2018; Published: February 6 th , 2018
Cite this article
Priyadarshini J, Abdi S, Metwaly A, AL Lenjawi B, Jose JS, Mohamed H. Prevention of diabetic foot ulcers at primary care level. Dermatol Open J. 2018; 3(1): 4-9. doi: 10.17140/DRMTOJ-3-129
ABSTRACT
Diabetic foot ulcer (DFT) prevention is best achieved at primary care level and should begin with education, appropriate protective footwear, glycaemic control and regular screening for loss of protective sensation. In the west, specialized diabetic or podiatry clinics may assess and quantify neuropathy with many tools including monofilaments, biothesiometry, corneal confocal microscopy and nerve conduction studies. Vascular assessment can be done via measuring ankle-brachial index, duplex ultrasound studies and toe pressure. Other foot assessment may include measuring plantar foot pressure using computerized dynamic foot studies (computerized insole sensor system). The ability to stratify patients based on risks is carried out on the basis of a thorough medical and surgical history in conjunction with these measurements thereby allowing clinicians to determine the type of intervention. Effective strategies for foot ulceration prevention include educating patients, their families, and healthcare workers about adequate foot care and regular foot examinations along with optimal glycaemic control and smoking cessation. Other effective clinical interventions may include, foot hygiene, debridement of calluses, management of foot deformities which may at times require prophylactic foot surgery. Counseling patients regarding daily proper footwear and hygiene should be stressed during each clinic visit. Educating, screening and managing patients with diabetic foot ulceration and or complications is an essential primary healthcare strategy to prevent unnecessary morbidity and mortality related to diabetic foot. An integrated (interdisciplinary) approach including, family physicians with special interest in the diabetic foot, diabetic educators, nurses and family members is a vital component in this regard.
Keywords
Diabetic foot ulcer (DFU); Neuropathy; Glycaemic control.
INTRODUCTION
Diabetic foot ulcer (DFT) is the most common and neglected complications of diabetes. The risk of death for those with foot ulcers is 12.1 per 100 person-years of follow-up compared with 5.1 in those without foot ulcers. 1 Similarly, the risk for amputation in patients with diabetes is 15 times greater than for the nondiabetic population and the majority of amputations are preceded by DFU. 2 It is documented that subjects with foot ulcers have a poor quality of life and nearly 15% of all diabetics will develop foot ulcers. It is also estimated that 15% of all diabetics who get admitted to hospital do so mainly due to foot problems. 3
putation related to diabetes exceeds $350 million annually. 4 However diabetic foot ulcer is preventable by appropriate education, evidence-based counseling and preventative strategy.
PREVENTION AND TREATMENT OF NEUROPATHY
In the US, direct hospital costs for the treatment of diabetic foot infections exceeds $200 million per year and that for am-
Neuropathy is the main cause that gives rise to diabetic foot ulcer especially the insensate foot. Patients might not be aware of it in the early stages, as they might not feel the pain. 5 Furthermore, neuropathic wound does not heal fast as it is not protected by pain sensation. Optimal glycaemic control can reduce the incidence of neuropathy and thereby foot ulcer. 6 Foot deformities, on the other hand, can also cause foot ulcers because of the abnormal pressure. 7
In diabetes, deformity due to Charcot neuroarthropathy
Copyright 2018 by Mohamed H. This is an open-access article distributed under Creative Commons Attribution 4.0 International License (CC BY 4.0), which allows to copy, redistribute, remix, transform, and reproduce in any medium or format, even commercially, provided the original work is properly cited. cc
4
PUBLISHERS
is increasingly recognized. 8 It is very important to prevent deformity in diabetic subjects by the use of adequate footwear. Similarly, acute Charcot neuroarthropathy should be aggressively treated to maintain the normal architecture of the foot. 8 There has been no controlled trial on surgical correction of deformity in the prevention of ulcers but it is worth considering. Recently, surgery to lengthen the Achilles tendon has been shown to be useful in the prevention of ulceration of metatarsal heads. 9 If there is recurrence of ulceration over a bony prominence or on an abnormal weight-bearing part, surgical correction may be indicated.
Key Interventions
* Regular follow-up and surveillance for diabetic retinopathy for adults with diabetes is required and early laser treatment for those identified with retinopathy is vital.
* Patients having microalbuminuria should be treated with angiotensin converting enzyme (ACE) inhibitors and their rate of progression to diabetic nephropathy.
* Strict blood pressure and blood glucose control in people with diabetic nephropathy can reduce the rate of deterioration in their renal function, as well as their risk of cardiovascular disease.
Specific Foot Care Advice Given to Patients with High-Risk Feet in Order to Prevent DFU
* Wash your feet daily with mild soaps and keep it moisturized.
* Avoid walking barefoot indoors.
* Inspect your feet daily.
* Contact your doctor or podiatrist if there is redness or swelling or a minor cut.
* Wear well-fitting shoes which should offer enough room to move your toes freely.
* If needed wear special shoes if you have been supplied with them.
* Never self-treat your own corn or callus. Consult a doctor instead.
* Avoid using a hot water bottle.
* Wear woolen socks in bed if needed.
General Advice Necessary to Help you Protect your Feet (Figure 1)
Foot Examination
1. Check your feet daily because some people may not feel injury if the nerves in their feet are not working properly.
2. So, you should look for:
* Red spots.
* Cuts.
* Blisters.
* Wet or white areas in between the toes.
* Sores.
* Any skin change.
* You should use a mirror to see the bottom of your feet.
Figure 1. General Steps to Examine the Diabetic Feet
3. If you see thickened skin area (callus) consult your doctor because it means the pressure in that area is high; therefore, you need a special insert or shoe to relieve the pressure and your doctor may want to remove the callus.
4. If your feet feel cold don't use hot water bottle because you may burn your feet without even feeling it.
How Can I Take Care of my Feet?
1. Wash your feet daily using warm water (test it by your elbow), a mild soap and dry using a towel especially the areas between your toes.
2. Do not soak your feet because this will dry out the skin and do not use whirlpool – water if you suffer from cold feet but rather wear socks made of cotton and wool to keep your feet warm.
3. Use a moisturizer (10% urea cream) because dry skin cracks and if this happens it can lead to infection and ulcer formation.
4. Dry up between your toes after washing your feet.
5. Cutting your nails regularly once a week is usually enough but if your nails are thick; don't attempt to cut them because you may injure yourself. Your doctor can help you by using a special scissor. Nails should be cut across and not in a semicircular fashion and use a nail clipper instead of scissor & do not cut nails too close to the skin.
FOOTWEAR CARE
1. Never walk barefoot even inside the house, socks should be worn (cotton) all the time to keep skin moist and shoes must also be worn, to avoid injury to your feet.
2. Check your shoes before you wear them because you may find foreign bodies such pieces of stones inside.
PUBLISHERS
3. Wear socks which are made of cotton or wool.
4. Shoes should be round in the front, made of leather top or canvas to let your feet breath. Remember, that you should buy shoes at the end of the day because feet swell up as the day goes on. Remember that if shoes are comfortable, when your feet are swollen at night they will be comfortable all day.
5. Avoid high heels shoes which may put extra pressure on the bottom of your feet.
6. If you want to exercise you need to wear soft tennis shoes and check your feet before and after exercise.
7. Sandals should not be worn nor should you wear nylon socks.
Consult your doctor: Consult your doctor before buying a new pair of shoes and if you do, you need to wear it 1 hour daily initially until it softens up slowly over several days
1. Let your healthcare provider check your feet on a yearly basis at least, but if you are suffering from one of the following you need to be checked more often:
A. Suffering from numbness or pins and needles in your feet.
B. Burning sensation in your feet.
C. Pain in your feet or back of your leg.
D. Cold sensation in your feet.
2. If you have abnormal looking toes.
Skin care: To help you have moist skin you need to
1. Use a moisturizer such as 10% urea cream or Lanolin.
2. Avoid barrier creams and ointments such as Vaseline because it will not moisturize your feet.
3. Avoid applying a moisturizer in between your toes.
4. Avoid Henna because it will dry your skin & cause the skin to crack.
If you see any of the following changes in the nail please consult your doctor (Figure 2).
Similarly, if you see the following changes in your skin please consult your doctor (Figure 3).
PUBLISHERS
Things you need to take care of:
1. Keep your blood sugar under control since this will help in preventing complications and speeds up healing. This can be an achieved by eating a healthy and balanced diet, exercise and proper medical follow-up.
2. Avoid smoking.
3. Have a regular follow-up with your doctor regarding foot care.
4. Report any change in your skin no matter how trivial it may look.
PREVENTION AND TREATMENT OF PERIPHERAL
VASCULAR DISEASE
The lack of blood supply or ischemia is one of the major reasons for diabetic foot ulcers and thereafter amputations. Atherosclerotic lesions are more diffuse and distal in diabetics. 10 The risk of vascular diseases in diabetics can be reduced, by lifestyle modifications including daily exercise and avoiding smoking. Many drugs are out in the market promoted as being useful in the prevention of DFU and peripheral vascular disease; however, adequate controlled trials supporting these claims are lacking. Despite this, an argument for the use of aspirin, clopidogrel, statins, fibrates, ACE inhibitors and folic acid in diabetics can be made in the light of these pieces of evidence. 11-14 On the other hand, agents such as naftidrofuryl and cilostazol, although helpful in controlling symptoms of intermittent claudication, have not found widespread use in diabetics with peripheral vascular disease as there is paucity of data on prevention of DFU or amputation. 15,16 If a leg is fully ischaemic, vascular surgery could improve the blood supply. 17
GLYCAEMIC CONTROL
Normal glucose level is the first line of defense against chronic complications of diabetes. Optimal glycaemic control may prevent the development of neuropathy. Intensive blood glucose control reduced the development of neuropathy by 40% in patients with type II diabetes 18 and by about 60% in patients with type 1 diabetes. 19 Raised HbA1c has also been associated with DFU, amputations and peripheral vascular disease. Therefore, it is very important to optimize glycaemic control to prevent DFU in the long run.
REGULAR PODIATRY
Podiatry services are essential in the prevention and treatment of DFU. 20 Patients should avoid self-treating corns and calluses and
6
should avoid nail clippings especially if there is retinopathy or the nails are thick, dystrophic along with the history of the peripheral vascular disease. If a callus or corn is present it ultimately leads to unnecessary shear forces and results in high pressure in the foot. 21 At each visit, it's the clinician utmost responsibility to examine the foot and also reinforce foot care education. Prescription footwear is of paramount importance, as it prevents pressure sores and ulcers. A shoe that allows free movement of toes is a way of identifying rightly fitting shoes.
Patients with low or medium risk of ulceration should be advised to buy good quality shoes but those with high risk and in subjects who already developed DFU, custom-made prescription footwear should be prescribed as these have been shown to prevent recurrences of DFU. 22 Orthotists are of great help in designing appropriate footwear especially when there is a severe foot deformity. 23 Patients should be advised to ensure that shoes are in a good state of repair and check for any foreign objects before they are worn.
FOOT CARE EDUCATION
The patient should be taught about foot care. The patient or their care taker should examine the feet at least once a day if needed with the help of a mirror to look into the under surface. A proper foot care education program has been shown to reduce the risk of ulceration. 24,25 Patients usually become more receptive to medical advice after first ulceration, so a thorough counseling with the physician or podiatrist or specialist nurse should be arranged to discuss foot care.
DETECTION OF HIGH-RISK FEET WITH SCREENING
Screening programs are available in various parts of the world. It's better to screen patients in 3 months after diagnosing patients with diabetes. All diabetic subjects should be offered a comprehensive foot-screening program. The patients are classified into high, medium and low-risk categories by the screening clinician depending upon previous foot ulcers, neuropathy, ischemia, deformity, smoking habit, and vision. If the patients are high or medium risk, they are screened annually by the podiatrist, but patients with low-risk feet are screened by their diabetes care provider and can be referred to podiatrist if their risk status changes.
GENERAL PATIENT EDUCATION
There has not been any study to specifically look into various lifestyles and the development of DFU. In view of available knowledge based on the general population, the following changes can be advocated.
Smoking
Smoking increases the morbidity and mortality of people with diabetes. Epidemiological studies revealed that diabetic subjects who smoke may have an increased risk of foot complications. All patients should be encouraged to stop smoking.
PUBLISHERS
Diet
Maintenance of adequate and balanced diet is the main treatment for diabetes to improve glycaemic control. Obesity should be prevented. These subjects should be actively encouraged to lose weight if they are obese. This will not only improve the diabetes control but will also reduce the pressure on the foot. Similarly, a low-fat diet is important to reduce cardiovascular disease. 26
Exercise
Exercise is the cornerstone and prevents peripheral neuropathy. Exercise or activity is beneficial for people with diabetes. Physiotherapy can correct the gait abnormality and possibly prevent the development of DFU. 27
Alcohol
Excessive intake of alcohol has been associated with the development of diabetic neuropathy. 28 On the other hand, moderate consumption has been shown to improve diabetes control and mortality in general population including diabetic subjects. 29 Men should drink no more than 21 units and women no more than 14 units each week.
CONCLUSION
It is essential to screen diabetic patients to identify those at risk for foot ulceration. Prevention of diabetic foot ulcer is best achieved through effective health education 30 and evidence-based counseling to the patient and family, early identification, regular assessment and proper foot examination. Specialized clinics such as podiatric clinic use advanced foot assessment methods to determine the type of clinical intervention which proves beneficial for diabetic patients.
CONFLICTS OF INTEREST
The authors declare that they have no conflicts of interest.
REFERENCES
1. Chammas NK, Hill RLR, Edmonds ME. Increased mortality in diabetic foot ulcer patients: the significance of ulcer type. J Diabetes Res. 2016; (2016): 2879809. doi: 10.1155/2016/2879809
2. Goweda R, Shatla M, Alzaidi A, et al. Assessment of Knowledge and practices of diabetic patients regarding diabetic foot care, in Makkah, Saudi Arabia. Journal of Family Medicine and Health Care. 2017; 3(1): 17-22. doi: 10.11648/j.jfmhc.20170301.14
3. Kassem A, Alsenbasy M, Nagaah A. Risk factors for diabetic foot: Upper Egypt experience. World Academy of Science, Engineering and Technology, International Science Index, Psychological and Behavioral Sciences. 2015; 9(12): 469.
4. Pecoraro RE. The non-healing diabetic ulcer – a major cause for
limb loss. In: Barbul A, Caldwell MD, et al., eds. Clinical and Experimental Approaches to Dermal and Epidermal Repair: Normal and Chronic Wounds. New York, USA: Wiley-Liss; 1991: 27-43.
5. Alexiadou K, Doupis J. Management of diabetic foot ulcers.Diabetes Therapy. 2012; 3(1): 4. doi: 10.1007/s13300-012-0004-9
6. Wu SC, Driver VR, Wrobel JS, Armstrong DG. Foot ulcers in the diabetic patient, prevention and treatment. Vasc Health Risk Manag. 2007; 3(1): 65-76.
7. Yazdanpanah L, Nasiri M, Adarvishi S. Literature review on the management of diabetic foot ulcer. World J Diabetes. 6(1): 37-53. doi: 10.4239/wjd.v6.i1.37
8. Ferreira RC, Gonçalez DH, Fonseca Filho JM, Costa MT, Santin RAL. Mid-foot charcot arthropathy in diabetic patients: complication of an epidemic disease. Revista Brasileira de Ortopedia. 2012; 47(5): 616-625. doi: 10.1590/S0102-36162012000500013
9. Yazdanpanah L, Nasiri M, Adarvishi S. Literature review on the management of diabetic foot ulcer.World J Diabetes. 2015; 6(1): 3753. doi: 10.4239/wjd.v6.i1.37
10. He C, Yang J, Li Y, et al. Comparison of lower extremity atherosclerosis in diabetic and non-diabetic patients using multidetector computed tomography.BMC Cardiovascular Disorders. 2014; 14: 125. doi: 10.1186/1471-2261-14-125
11. Jung JH, Tantry US, Gurbel PA, Jeong YH. Current antiplatelet treatment strategy in patients with diabetes mellitus.Diabetes Metab J. 2015; 39(2): 95-113. doi: 10.4093/dmj.2015.39.2.95
12. PL Detail-Document. Does my patient with diabetes need an aspirin, statin, ACE inhibitor, or ARB? Pharmacist's Letter 2012; 28(11): 281101.
13. Yusuf S, Sleight P, Pogue J, et al; The Heart Outcomes Prevention Evaluation Study Investigators. Effects of an angiotensinconverting-enzyme inhibitor, ramipril, on cardiovascular events in high-risk patients. N Engl J Med. 2000; 342: 145-153. doi: 10.1056/ NEJM200001203420301
14. Robins SJ, Rubins HB, Faas FH, et al. Insulin resistance and cardiovascular events with low HDL cholesterol: The Veterans Affairs HDL Intervention Trial (VA-HIT). Diabetes Care. 2003; 26: 1513-1517. doi: 10.2337/diacare.26.5.1513
15. Squires H, Simpson E, Meng Y, et al. A systematic review and economic evaluation of cilostazol, naftidrofuryl oxalate, pentoxifylline and inositol nicotinate for the treatment of intermittent claudication in people with peripheral arterial disease. Health Technol Assess. 2011; 15(40): 1-210. doi: 10.3310/hta15400
16. Rendell M, Cariski AT, Hittel N, Zhang P. Cilostazol treatment of claudication in diabetic patients. Curr Med Res Opin. 2002; 18:
PUBLISHERS
479-487.
17. Yazdanpanah L, Nasiri M, Adarvishi S. Literature review on the management of diabetic foot ulcer.World J Diabetes. 2015; 6(1): 37-53. doi: 10.4239/wjd.v6.i1.37
18. UK Prospective diabetes study (UKPDS) group. Intensive blood-glucose control with sulphonylureas or insulin compared with conventional treatment and risk of complications in Rathur & Rajbhandari 61patients with type 2 diabetes (UKPDS 33). Lancet 1998; 352: 837-853. doi: 10.1016/S0140-6736(98)07019-6
19. The Diabetes Control and Complication Trial Research Group (DCCT). The diabetes control and complications research group. The effect of intensive treatment of diabetes on the development and progression of long-term complication in insulin-dependent diabetes mellitus. N Eng J Med. 1993; 329: 977-986.
20. Barshes NR, Sigireddi M, Wrobel JS, et al. The system of care for the diabetic foot: objectives, outcomes, and opportunities.Diabet Foot Ankle. 2013; 4. doi: 10.3402/dfa.v4i0.21847
21. Amemiya A, Noguchi H, Oe M, et al. Comparison of gait features between feet with callus or corns and normal feet using motion sensors in people with diabetes and people without diabetes. J Diabetes Sci Technol. 2016; 10(2): 614-615. doi: 10.1177/1932296815616135
22. Bus SA, Waaijman R, Arts M, et al. Effect of custom-made footwear on foot ulcer recurrence in diabetes: A multicenter randomized controlled trial. Diabetes Care. 2013; 36(12): 4109-4116. doi: 10.2337/dc13-0996
23. Waaijman R, Keukenkamp R, de Haart M, et al. Adherence to wearing prescription custom-made footwear in patients with diabetes at high risk for plantar foot ulceration.Diabetes Care. 2013; 36(6): 1613-1618. doi: 10.2337/dc12-1330
24. Wu SC, Driver VR, Wrobel JS, Armstrong DG. Foot ulcers in the diabetic patient, prevention and treatment.Vascular Health and Risk Management. 2007; 3(1): 65-76.
25. Yazdanpanah L, Nasiri M, Adarvishi S. Literature review on the management of diabetic foot ulcer.World J Diabetes. 2015; 6(1): 37-53. doi: 10.4239/wjd.v6.i1.37
26. Eilat-Adar S, Sinai T, Yosefy C, Henkin Y. Nutritional recommendations for cardiovascular disease prevention.Nutrients, 2013; 5(9): 3646-3683. doi: 10.3390/nu5093646
27. Turan Y, Ertugrul BM, Lipsky BA, Bayraktar K. Does physical therapy and rehabilitation improve outcomes for diabetic foot ulcers?World J Exp Med. 2015; 5(2): 130-139. doi: 10.5493/wjem. v5.i2.130
8
28. Kastenbauer T, Sauseng S, Sokol G, Auinger M, Irsigler K. A prospective study of predictors for foot ulceration in type 2 diabetes. J Am Podiatry Med Assoc. 2001; 91: 343-350.
29. Meyer KA, Conigrave KM, Chu NF, et al. Alcohol consumption patterns and HbA1c, C-peptide and insulin concentrations in
PUBLISHERS
men. J Am Coll Nutr. 2014; 22: 185-194.
30. Mohamed H. Evidence Based Counseling for Health Care Professionals. Saarbrücken, Germany: LAP LAMBERT Academic Publishing; 2017.
|
<urn:uuid:ce7df491-763a-4915-814e-2ae6545a0a36>
|
CC-MAIN-2022-40
|
https://orthofeet.shoes/wp-content/uploads/2021/03/prevention_of_diabetic_foot_ulcers_at_pr.pdf
|
2022-10-02T07:26:23+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-40/subset=warc/part-00181-26160df0-1827-4787-a515-95ecaa2c9688.c000.gz.parquet
| 502,445,883
| 5,533
|
eng_Latn
|
eng_Latn
| 0.794279
|
eng_Latn
| 0.991488
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
4501,
8281,
12181,
17273,
22240,
22731
] |
Review
Prevention of Diabetic Foot Ulcers at Primary Care Level
Josephine Priyadarshini, RN; Seham Abdi, RN; Azza Metwaly, RN; Badria AL Lenjawi, MD; Janelle San Jose, RN; Hashim Mohamed, MD *
Weill Cornell Medicine-Qatar, Doha, Qatar
*Corresponding author
Hashim Mohamed, MD
Associate Professor, Weill Cornell Medicine-Qatar, Doha, Qatar; E-mail: [email protected]
Article information
Received: January 9 th , 2018; Revised: January 30 th , 2018; Accepted: February 6 th , 2018; Published: February 6 th , 2018
Cite this article
Priyadarshini J, Abdi S, Metwaly A, AL Lenjawi B, Jose JS, Mohamed H. Prevention of diabetic foot ulcers at primary care level. Dermatol Open J. 2018; 3(1): 4-9. doi: 10.17140/DRMTOJ-3-129
ABSTRACT
Diabetic foot ulcer (DFT) prevention is best achieved at primary care level and should begin with education, appropriate protective footwear, glycaemic cont
|
rol and regular screening for loss of protective sensation.
| 898
|
inside_word
|
control
|
remove_all
|
<url>
https://orthofeet.shoes/wp-content/uploads/2021/03/prevention_of_diabetic_foot_ulcers_at_pr.pdf
</url>
<text>
Review
Prevention of Diabetic Foot Ulcers at Primary Care Level
Josephine Priyadarshini, RN; Seham Abdi, RN; Azza Metwaly, RN; Badria AL Lenjawi, MD; Janelle San Jose, RN; Hashim Mohamed, MD *
Weill Cornell Medicine-Qatar, Doha, Qatar
*Corresponding author
Hashim Mohamed, MD
Associate Professor, Weill Cornell Medicine-Qatar, Doha, Qatar; E-mail: [email protected]
Article information
Received: January 9 th , 2018; Revised: January 30 th , 2018; Accepted: February 6 th , 2018; Published: February 6 th , 2018
Cite this article
Priyadarshini J, Abdi S, Metwaly A, AL Lenjawi B, Jose JS, Mohamed H. Prevention of diabetic foot ulcers at primary care level. Dermatol Open J. 2018; 3(1): 4-9. doi: 10.17140/DRMTOJ-3-129
ABSTRACT
Diabetic foot ulcer (DFT) prevention is best achieved at primary care level and should begin with education, appropriate protective footwear, glycaemic cont<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://orthofeet.shoes/wp-content/uploads/2021/03/prevention_of_diabetic_foot_ulcers_at_pr.pdf\n</url>\n<text>\nReview\n\nPrevention of Diabetic Foot Ulcers at Primary Care Level\n\nJosephine Priyadarshini, RN; Seham Abdi, RN; Azza Metwaly, RN; Badria AL Lenjawi, MD; Janelle San Jose, RN; Hashim Mohamed, MD *\n\nWeill Cornell Medicine-Qatar, Doha, Qatar\n\n*Corresponding author\n\nHashim Mohamed, MD\n\nAssociate Professor, Weill Cornell Medicine-Qatar, Doha, Qatar; E-mail: [email protected]\n\nArticle information\n\nReceived: January 9 th , 2018; Revised: January 30 th , 2018; Accepted: February 6 th , 2018; Published: February 6 th , 2018\n\nCite this article\n\nPriyadarshini J, Abdi S, Metwaly A, AL Lenjawi B, Jose JS, Mohamed H. Prevention of diabetic foot ulcers at primary care level. Dermatol Open J. 2018; 3(1): 4-9. doi: 10.17140/DRMTOJ-3-129\n\nABSTRACT\n\nDiabetic foot ulcer (DFT) prevention is best achieved at primary care level and should begin with education, appropriate protective footwear, glycaemic cont<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "rol and regular screening for loss of protective sensation.",
"role": "assistant"
}
] |
|
WHSAA Nordic State Championship OFFICIAL RESULTS
| | Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time |
|---|---|---|---|---|---|---|---|---|---|
| Girls VAR | 1 | 13 | Kate | Brigham | Girls VAR | JHHS | 10:03:13.3 | 10:22:32.6 | 0:19:19.2 |
| | 2 | 19 | Natalie | O'Brien | Girls VAR | JHHS | 10:04:45.0 | 10:24:11.6 | 0:19:26.5 |
| | 3 | 24 | Kaylynn | Sandall | Girls VAR | LVHS | 10:05:58.5 | 10:25:32.9 | 0:19:34.4 |
| | 4 | 31 | Abigail | Whitman | Girls VAR | LHS | 10:07:44.2 | 10:27:19.7 | 0:19:35.5 |
| | 5 | 18 | Maria | Anderson | Girls VAR | LVHS | 10:04:29.1 | 10:24:17.9 | 0:19:48.9 |
| | 6 | 11 | Veuathier | Samanha | Girls VAR | KWHS | 10:02:45.2 | 10:22:49.0 | 0:20:03.8 |
| | 7 | 6 | Sydney | Wilmot | Girls VAR | JHHS | 10:01:27.8 | 10:21:52.2 | 0:20:24.3 |
| | 8 | 39 | Hazel | Womack | Girls VAR | LVHS | 10:09:43.3 | 10:30:09.0 | 0:20:25.6 |
| | 9 | 12 | Kate | Wilmot | Girls VAR | LVHS | 10:02:59.6 | 10:23:32.8 | 0:20:33.2 |
| | 10 | 32 | Hailie | Wilhelm | Girls VAR | NCHS | 10:07:58.7 | 10:28:39.5 | 0:20:40.8 |
| | 11 | 25 | Birch | Klomparens | Girls VAR | JHHS | 10:06:14.6 | 10:26:56.1 | 0:20:41.5 |
| | 12 | 15 | Lu | Elder | Girls VAR | NCHS | 10:03:43.0 | 10:24:35.2 | 0:20:52.2 |
| | 13 | 34 | Ursula | Anderson | Girls VAR | LVHS | 10:08:27.6 | 10:29:21.9 | 0:20:54.3 |
| | 14 | 8 | Madyson | Willis | Girls VAR | NCHS | 10:01:58.3 | 10:22:54.5 | 0:20:56.2 |
| | 15 | 29 | Shayla | Babits | Girls VAR | LVHS | 10:07:13.8 | 10:28:21.6 | 0:21:07.8 |
| | 16 | 27 | Kiana | Hiser | Girls VAR | NCHS | 10:06:45.1 | 10:27:54.0 | 0:21:09.0 |
| | 17 | 21 | Isabella | Brown | Girls VAR | NCHS | 10:05:15.1 | 10:26:29.7 | 0:21:14.5 |
| | 18 | 55 | Kyra | Simonson | Girls VAR | LVHS | 10:13:43.0 | 10:35:09.9 | 0:21:27.0 |
| | 19 | 44 | Brianna | Rich | Girls VAR | LVHS | 10:10:58.3 | 10:32:43.7 | 0:21:45.4 |
| | 20 | 35 | KC | MacLeod | Girls VAR | JHHS | 10:08:43.1 | 10:30:32.0 | 0:21:48.8 |
| | 21 | 5 | Magdalena | Escudero-Kane | Girls VAR | LVHS | 10:01:15.3 | 10:23:08.1 | 0:21:52.8 |
| | 22 | 49 | Annica | Peacock | Girls VAR | JHHS | 10:12:13.2 | 10:34:08.1 | 0:21:54.9 |
| | 23 | 52 | Rebecca | Whiting | Girls VAR | LVHS | 10:12:57.5 | 10:34:54.3 | 0:21:56.8 |
| | 24 | 30 | Parker | Smith | Girls VAR | JHHS | 10:07:28.7 | 10:29:34.3 | 0:22:05.6 |
| | 25 | 37 | Olivia | DeVore | Girls VAR | NCHS | 10:09:13.4 | 10:31:22.7 | 0:22:09.3 |
| | 26 | 1 | Brianna | Hiser | Girls VAR | NCHS | 10:00:15.4 | 10:22:26.3 | 0:22:10.9 |
| | 27 | 40 | Chloe | Stines | Girls VAR | JHHS | 10:09:59.0 | 10:32:41.8 | 0:22:42.7 |
| | 28 | 45 | Dori | Sinclair | Girls VAR | JHHS | 10:11:13.2 | 10:34:17.9 | 0:23:04.7 |
| | 29 | 36 | Isabel | Naschold | Girls VAR | LHS | 10:08:58.2 | 10:32:03.0 | 0:23:04.8 |
| | 30 | 14 | Kieran | Burns | Girls VAR | LHS | 10:03:28.0 | 10:26:34.8 | 0:23:06.7 |
| | 31 | 22 | Aurora | Looney | Girls VAR | PHS | 10:05:30.5 | 10:28:50.1 | 0:23:19.6 |
| | 32 | 26 | Alyssa | Dale | Girls VAR | LHS | 10:06:28.2 | 10:29:50.3 | 0:23:22.1 |
| | 33 | 17 | Rachel | Katzmann | Girls VAR | KWHS | 10:04:14.7 | 10:27:39.8 | 0:23:25.1 |
| | 34 | 33 | Hadlee | Hollinger | Girls VAR | KWHS | 10:08:14.8 | 10:31:51.7 | 0:23:36.9 |
| | 35 | 20 | Ali | Magleky | Girls VAR | LHS | 10:05:00.5 | 10:29:04.1 | 0:24:03.6 |
| Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time | Time Back |
|---|---|---|---|---|---|---|---|---|---|
| 36 | 16 | Claire | Hayward | Girls VAR | PHS | 10:03:59.6 | 10:28:05.9 | 0:24:06.3 | 0:04:47.1 |
| 37 | 42 | Hailey | Willis | Girls VAR | NCHS | 10:10:28.7 | 10:34:39.2 | 0:24:10.5 | 0:04:51.3 |
| 38 | 60 | Emma | Gist | Girls VAR | LVHS | 10:14:58.4 | 10:39:11.9 | 0:24:13.5 | 0:04:54.3 |
| 39 | 23 | Mariah | Heuer | Girls VAR | KWHS | 10:05:44.9 | 10:30:03.0 | 0:24:18.1 | 0:04:58.8 |
| 40 | 4 | Ella | Reed | Girls VAR | KWHS | 10:01:00.2 | 10:25:29.7 | 0:24:29.5 | 0:05:10.2 |
| 41 | 53 | Finley | Miller | Girls VAR | JHHS | 10:13:13.4 | 10:38:03.9 | 0:24:50.5 | 0:05:31.3 |
| 42 | 71 | Samantha | Dunbar | Girls VAR | LVHS | 10:17:43.4 | 10:42:39.5 | 0:24:56.2 | 0:05:36.9 |
| 43 | 41 | Sadie | Smith | Girls VAR | LHS | 10:10:13.2 | 10:35:11.9 | 0:24:58.7 | 0:05:39.5 |
| 44 | 66 | Anne | Baron | Girls VAR | LVHS | 10:16:28.2 | 10:41:29.1 | 0:25:01.0 | 0:05:41.7 |
| 45 | 58 | Jessica | White | Girls VAR | LVHS | 10:14:28.5 | 10:39:39.2 | 0:25:10.7 | 0:05:51.4 |
| 46 | 68 | Celeste | Helpingstine | Girls VAR | LVHS | 10:16:58.3 | 10:42:12.6 | 0:25:14.3 | 0:05:55.1 |
| 47 | 9 | Lexie | Goodrich | Girls VAR | PHS | 10:02:14.7 | 10:27:37.3 | 0:25:22.6 | 0:06:03.4 |
| 48 | 50 | Aspen | Decker | Girls VAR | LHS | 10:12:28.2 | 10:37:58.9 | 0:25:30.7 | 0:06:11.4 |
| 49 | 38 | Belle | McClellan | Girls VAR | KWHS | 10:09:27.7 | 10:35:01.5 | 0:25:33.8 | 0:06:14.6 |
| 50 | 54 | Sydney | Holles | Girls VAR | LHS | 10:13:28.1 | 10:39:27.8 | 0:25:59.7 | 0:06:40.5 |
| 51 | 61 | Clara | McGee | Girls VAR | JHHS | 10:15:13.7 | 10:41:13.9 | 0:26:00.2 | 0:06:41.0 |
| 52 | 46 | Katie | Kvenild | Girls VAR | LHS | 10:11:28.0 | 10:37:29.5 | 0:26:01.5 | 0:06:42.2 |
| 53 | 51 | Kami | Fehringer | Girls VAR | KWHS | 10:12:43.2 | 10:38:53.0 | 0:26:09.8 | 0:06:50.6 |
| 54 | 47 | Sierra | Altland | Girls VAR | KWHS | 10:11:42.9 | 10:38:02.1 | 0:26:19.1 | 0:06:59.9 |
| 55 | 28 | Brianna | Warner | Girls VAR | KWHS | 10:07:00.4 | 10:33:23.4 | 0:26:23.0 | 0:07:03.8 |
| 56 | 43 | Serina | Perry | Girls VAR | KWHS | 10:10:43.6 | 10:37:20.2 | 0:26:36.6 | 0:07:17.4 |
| 57 | 72 | Rebecca | Brough | Girls VAR | LVHS | 10:17:57.9 | 10:44:44.2 | 0:26:46.3 | 0:07:27.1 |
| 58 | 59 | Rachael | Harrower | Girls VAR | JHHS | 10:14:43.5 | 10:41:47.2 | 0:27:03.7 | 0:07:44.5 |
| 59 | 62 | Jessica | Baron | Girls VAR | LVHS | 10:15:28.1 | 10:42:32.5 | 0:27:04.4 | 0:07:45.2 |
| 60 | 63 | Heather | Budge | Girls VAR | JHHS | 10:15:43.3 | 10:43:06.0 | 0:27:22.6 | 0:08:03.4 |
| 61 | 64 | Sierra | Firth | Girls VAR | LVHS | 10:15:58.5 | 10:43:40.8 | 0:27:42.3 | 0:08:23.0 |
| 62 | 65 | Arielle | D'Arge | Girls VAR | JHHS | 10:16:13.2 | 10:44:26.9 | 0:28:13.7 | 0:08:54.5 |
| 63 | 10 | Hayley | Pearson-Horner | Girls VAR | CHS | 10:02:29.3 | 10:31:29.9 | 0:29:00.6 | 0:09:41.4 |
| 64 | 2 | Sadie | Siefkes | Girls VAR | PHS | 10:00:30.4 | 10:29:46.7 | 0:29:16.3 | 0:09:57.0 |
| 65 | 73 | Theresa | Bautz | Girls VAR | LVHS | 10:18:13.1 | 10:47:46.1 | 0:29:33.1 | 0:10:13.8 |
| 66 | 67 | Maria | Mahood | Girls VAR | JHHS | 10:16:43.1 | 10:47:54.7 | 0:31:11.7 | 0:11:52.4 |
| 67 | 3 | Sabrina | Stowell | Girls VAR | CHS | 10:00:46.4 | 10:31:58.2 | 0:31:11.9 | 0:11:52.6 |
| 68 | 57 | Bailey | Boulter | Girls VAR | LHS | 10:14:16.1 | 10:48:22.2 | 0:34:06.0 | 0:14:46.8 |
| 69 | 48 | Marlee | Jones | Girls VAR | LVHS | 10:11:58.7 | 10:46:13.8 | 0:34:15.1 | 0:14:55.8 |
| 70 | 69 | Madi | Dunne | Girls VAR | JHHS | 10:17:12.9 | 10:51:47.3 | 0:34:34.3 | 0:15:15.1 |
WHSAA Nordic State Championship OFFICIAL RESULTS Pahaska Ski Trails
| Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time | Time Back |
|---|---|---|---|---|---|---|---|---|---|
| 71 | 7 | Toni | Hamann | Girls VAR | LHS | 10:01:45.8 | 10:58:35.2 | 0:56:49.4 | 0:37:30.2 |
| | | Olivia | Weenig | Girls VAR | JHHS | | | | |
|
<urn:uuid:ff6cce91-fdc5-4e05-88a2-1047c27c369f>
|
CC-MAIN-2021-04
|
https://wyopreps.townsquaredigital.com/wyopreps/Skiing%20Results/Girls%205k%20Freestyle%20Final%20Results%20-%20WHSAA%20State%20Nordic%202-28-2020.pdf
|
2021-01-21T23:10:33+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-04/subset=warc/part-00152-364a895c-5e5c-46bb-846e-75ec7de82b3b.c000.gz.parquet
| 1,065,295,372
| 3,881
|
eng_Latn
|
eng_Latn
| 0.436512
|
eng_Latn
| 0.312226
|
[
"unknown",
"unknown",
"eng_Latn"
] | false
|
rolmOCR
|
[
3347,
6957,
7329
] |
WHSAA Nordic State Championship OFFICIAL RESULTS
| | Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time |
|---|---|---|---|---|---|---|---|---|---|
| Girls VAR | 1 | 13 | Kate | Brigham | Girls VAR | JHHS | 10:03:13.3 | 10:22:32.6 | 0:19:19.2 |
| | 2 | 19 | Natalie | O'Brien | Girls VAR | JHHS | 10:04:45.0 | 10:24:11.6 | 0:19:26.5 |
| | 3 | 24 | Kaylynn | Sandall | Girls VAR | LVHS | 10:05:58.5 | 10:25:32.9 | 0:19:34.4 |
| | 4 | 31 | Abigail | Whitman | Girls VAR | LHS | 10:07:44.2 | 10:27:19.7 | 0:19:35.5 |
| | 5 | 18 | Maria | Anderson | Girls VAR | LVHS | 10:04:29.1 | 10:24:17.9 | 0:19:48.9 |
| | 6 | 11 | Veuathier | Samanha | Girls VAR | KWHS | 10:02:45.2 | 10:22:49.0 | 0:20:03.8 |
| | 7 | 6 | Sydney | Wilmot | Girls VAR | JHHS | 10:01:27.8 | 10:21:52.2 | 0:20:24.3 |
| | 8 | 39 | Hazel | Womack | Girls VAR | LVHS | 10:09:43.3 | 10:30:09.0 | 0:20:25.6 |
| | 9 | 12 | Kate | Wilmot | Girls VAR | LVHS | 10:02:59.6 | 10:23:32.8 | 0:20:33.2 |
| | 10 | 32 | Hailie | Wilhelm | Girls VAR | NCHS | 10:07:58.7 | 10:28:39.5 | 0:20:40.8 |
| | 11 | 25 | Birch | Klomparens | Girls VAR | JHHS | 10:06:14.6 | 10:26:56.1 | 0:20:41.5 |
| | 12 | 15 | Lu | Elder | Girls VAR | NCHS | 10:03:43.0 | 10:24:35.2 | 0:20:52.2 |
| | 13 | 34 | Ursula | Anderson | Girls VAR | LVHS | 10:08:27.6 | 10:29:21.9 | 0:20:54.3 |
| | 14 | 8 | Madyson | Willis | Girls VAR | NCHS | 10:01:58.3 | 10:22:54.5 | 0:20:56.2 |
| | 15 | 29 | Shayla | Babits | Girls VAR | LVHS | 10:07:13.8 | 10:28:21.6 | 0:21:07.8 |
| | 16 | 27 | Kiana | Hiser | Girls VAR | NCHS | 10:06:45.1 | 10:27:54.0 | 0:21:09.0 |
| | 17 | 21 | Isabella | Brown | Girls VAR | NCHS | 10:05:15.1 | 10:26:29.7 | 0:21:14.5 |
| | 18 | 55 | Kyra | Simonson | Girls VAR | LVHS | 10:13:43.0 | 10:35:09.9 | 0:21:27.0 |
| | 19 | 44 | Brianna | Rich | Girls VAR | LVHS | 10:10:58.3 | 10:32:43.7 | 0:21:45.4 |
| | 20 | 35 | KC | MacLeod | Girls VAR | JHHS | 10:08:43.1 | 10:30:32.0 | 0:21:48.8 |
| | 21 | 5 | Magdalena | Escudero-Kane | Girls VAR | LVHS | 10:01:15.3 | 10:23:08.1 | 0:21:52.8 |
| | 22 | 49 | Annica | Peacock | Girls VAR | JHHS | 10:12:13.2 | 10:34:08.1 | 0:21:54.9 |
| | 23 | 52 | Rebecca | Whiting | Girls VAR | LVHS | 10:12:57.5 | 10:34:54.3 | 0:21:56.8 |
| | 24 | 30 | Parker | Smith | Girls VAR | JHHS | 10:07:28.7 | 10:29:34.3 | 0:22:05.6 |
| | 25 | 37 | Olivia | DeVore | Girls VAR | NCHS | 10:09:13.4 | 10:31:22.7 | 0:22:09.3 |
| | 26 | 1 | Brianna | Hiser | Girls VAR | NCHS | 10:00:15.4 | 10:22:26.3 | 0:22:10.9 |
| | 27 | 40 | Chloe | Stines | Girls VAR | JHHS | 10:09:59.0 | 10:32:41.8 | 0:22:42.7 |
| | 28 | 45 | Dori | Sinclair | Girls VAR | JHHS | 10:11:13.2 | 10:34:17.9 | 0:23:04.7 |
| | 29 | 36 | Isabel | Naschold | Girls VAR | LHS | 10:08:58.2 | 10:32:03.0 | 0:23:04.8 |
| | 30 | 14 | Kieran | Burns | Girls VAR | LHS | 10:03:28.0 | 10:26:34.8 | 0:23:06.7 |
| | 31 | 22 | Aurora | Looney | Girls VAR | PHS | 10:05:30.5 | 10:28:50.1 | 0:23:19.6 |
| | 32 | 26 | Alyssa | Dale | Girls VAR | LHS | 10:06:28.2 | 10:29:50.3 | 0:23:22.1 |
| | 33 | 17 | Rachel | Katzmann | Girls VAR | KWHS | 10:04:14.7 | 10:27:39.8 | 0:23:25.1 |
| | 34 | 33 | Hadlee | Hollinger | Girls VAR | KWHS | 10:08:14.8 | 10:31:51.7 | 0:23:36.9 |
| | 35 | 20 | Ali | Magleky | Girls VAR | LHS | 10:05:00.5 | 10:29:04.1 | 0:24:03.6 |
| Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time | Time Back |
|---|---|---|---|---|---|---|---|---|---|
| 36 | 16 | Claire | Hayward | Girls VAR | PHS | 10:03:59.6 | 10:28:05.9 | 0:24:06.3 | 0:04:47.1 |
| 37 | 42 | Hailey | Willis | Girls VAR | NCHS | 10:10:28.7 | 10:34:39.2 | 0:24:10.5 | 0:04:51.3 |
| 38 | 60 | Emma | Gist | Girls VAR | LVHS | 10:14:58.4 | 10:39:11.9 | 0:24:13.5 | 0:04:54.3 |
| 39 | 23 | Mariah | Heuer | Girls VAR | KWHS | 10:05:44.9 | 10:30:03.0 | 0:24:18.1 | 0:04:58.8 |
| 40 | 4 | Ella | Reed | Girls VAR | KWHS | 10:01:00.2 | 10:25:29.7 | 0:24:29.5 | 0:05:10.2 |
| 41 | 53 | Finley | Miller | Girls VAR | JHHS | 10:13:13.4 | 10:38:03.9 | 0:24:50.5 | 0:05:31.3 |
| 42 | 71 | Samantha | Dunbar | Girls VAR | LVHS | 10:17:43.4 | 10:42:39.5 | 0:24:56.2 | 0:05:36.9 |
| 43 | 41 | Sadie | Smith | Girls VAR | LHS | 10:10:13.2 | 10:35:11.9 | 0:24:58.7 | 0:05:39.5 |
| 44 | 66 | Anne | Baron | Girls VAR | LVHS | 10:16:28.2 | 10:41:29.1 | 0:25:01.0 | 0:05:41.7 |
| 45 | 58 | Jessica | White | Girls VAR | LVHS | 10:14:28.5 | 10:39:39.2 | 0:25:10.7 | 0:05:51.4 |
| 46 | 68 | Celeste | Helpingstine | Girls VAR | LVHS | 10:16:58.3 | 10:42:12.6 | 0:25:14.3 | 0:05:55.1 |
| 47 | 9 | Lexie | Goodrich | Girls VAR | PHS | 10:02:14.7 | 10:27:37.3 | 0:25:22.6 | 0:06:03.4 |
| 48 | 50 | Aspen | Decker | Girls VAR | LHS | 10:12:28.2 | 10:37:58.9 | 0:25:30.7 | 0:06:11.4 |
| 49 | 38 | Belle | McClellan | Girls VAR | KWHS | 10:09:27.7 | 10:35:01.5 | 0:25:33.8 | 0:06:14.6 |
| 50 | 54 | Sydney | Holles | Girls VAR | LHS | 10:13:28.1 | 10:39:27.8 | 0:25:59.7 | 0:06:40.5 |
| 51 | 61 | Clara | McGee | Girls VAR | JHHS | 10:15:13.7 | 10:41:13.9 | 0:26:00.2 | 0:06:41.0 |
| 52 | 46 | Katie | Kvenild | Girls VAR | LHS | 10:11:28.0 | 10:37:29.5 | 0:26:01.5 | 0:06:42.2 |
| 53 | 51 | Kami | Fehringer | Girls VAR | KWHS | 10:12:43.2 | 10:38:53.0 | 0:26:09.8 | 0:06:50.6 |
| 54 | 47 | Sierra | Altland | Girls VAR | KWHS | 10:11:42.9 | 10:38:02.1 | 0:26:19.1 | 0:06:59.9 |
| 55 | 28 | Brianna | Warner | Girls VAR | KWHS | 10:07:00.4 | 10:33:23.4 | 0:26:23.0 | 0:07:03.8 |
| 56 | 43 | Serina | Perry | Girls VAR | KWHS | 10:10:43.6 | 10:37:20.2 | 0:26:36.6 | 0:07:17.4 |
| 57 | 72 | Rebecca | Brough | Girls VAR | LVHS | 10:17:57.9 | 10:44:44.2 | 0:26:46.3 | 0:07:27.1 |
| 58 | 59 | Rachael
|
| Harrower | Girls VAR | JHHS | 10:14:43.
| 5,688
|
inside_word
|
|
|
remove_all
|
<url>
https://wyopreps.townsquaredigital.com/wyopreps/Skiing%20Results/Girls%205k%20Freestyle%20Final%20Results%20-%20WHSAA%20State%20Nordic%202-28-2020.pdf
</url>
<text>
WHSAA Nordic State Championship OFFICIAL RESULTS
| | Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time |
|---|---|---|---|---|---|---|---|---|---|
| Girls VAR | 1 | 13 | Kate | Brigham | Girls VAR | JHHS | 10:03:13.3 | 10:22:32.6 | 0:19:19.2 |
| | 2 | 19 | Natalie | O'Brien | Girls VAR | JHHS | 10:04:45.0 | 10:24:11.6 | 0:19:26.5 |
| | 3 | 24 | Kaylynn | Sandall | Girls VAR | LVHS | 10:05:58.5 | 10:25:32.9 | 0:19:34.4 |
| | 4 | 31 | Abigail | Whitman | Girls VAR | LHS | 10:07:44.2 | 10:27:19.7 | 0:19:35.5 |
| | 5 | 18 | Maria | Anderson | Girls VAR | LVHS | 10:04:29.1 | 10:24:17.9 | 0:19:48.9 |
| | 6 | 11 | Veuathier | Samanha | Girls VAR | KWHS | 10:02:45.2 | 10:22:49.0 | 0:20:03.8 |
| | 7 | 6 | Sydney | Wilmot | Girls VAR | JHHS | 10:01:27.8 | 10:21:52.2 | 0:20:24.3 |
| | 8 | 39 | Hazel | Womack | Girls VAR | LVHS | 10:09:43.3 | 10:30:09.0 | 0:20:25.6 |
| | 9 | 12 | Kate | Wilmot | Girls VAR | LVHS | 10:02:59.6 | 10:23:32.8 | 0:20:33.2 |
| | 10 | 32 | Hailie | Wilhelm | Girls VAR | NCHS | 10:07:58.7 | 10:28:39.5 | 0:20:40.8 |
| | 11 | 25 | Birch | Klomparens | Girls VAR | JHHS | 10:06:14.6 | 10:26:56.1 | 0:20:41.5 |
| | 12 | 15 | Lu | Elder | Girls VAR | NCHS | 10:03:43.0 | 10:24:35.2 | 0:20:52.2 |
| | 13 | 34 | Ursula | Anderson | Girls VAR | LVHS | 10:08:27.6 | 10:29:21.9 | 0:20:54.3 |
| | 14 | 8 | Madyson | Willis | Girls VAR | NCHS | 10:01:58.3 | 10:22:54.5 | 0:20:56.2 |
| | 15 | 29 | Shayla | Babits | Girls VAR | LVHS | 10:07:13.8 | 10:28:21.6 | 0:21:07.8 |
| | 16 | 27 | Kiana | Hiser | Girls VAR | NCHS | 10:06:45.1 | 10:27:54.0 | 0:21:09.0 |
| | 17 | 21 | Isabella | Brown | Girls VAR | NCHS | 10:05:15.1 | 10:26:29.7 | 0:21:14.5 |
| | 18 | 55 | Kyra | Simonson | Girls VAR | LVHS | 10:13:43.0 | 10:35:09.9 | 0:21:27.0 |
| | 19 | 44 | Brianna | Rich | Girls VAR | LVHS | 10:10:58.3 | 10:32:43.7 | 0:21:45.4 |
| | 20 | 35 | KC | MacLeod | Girls VAR | JHHS | 10:08:43.1 | 10:30:32.0 | 0:21:48.8 |
| | 21 | 5 | Magdalena | Escudero-Kane | Girls VAR | LVHS | 10:01:15.3 | 10:23:08.1 | 0:21:52.8 |
| | 22 | 49 | Annica | Peacock | Girls VAR | JHHS | 10:12:13.2 | 10:34:08.1 | 0:21:54.9 |
| | 23 | 52 | Rebecca | Whiting | Girls VAR | LVHS | 10:12:57.5 | 10:34:54.3 | 0:21:56.8 |
| | 24 | 30 | Parker | Smith | Girls VAR | JHHS | 10:07:28.7 | 10:29:34.3 | 0:22:05.6 |
| | 25 | 37 | Olivia | DeVore | Girls VAR | NCHS | 10:09:13.4 | 10:31:22.7 | 0:22:09.3 |
| | 26 | 1 | Brianna | Hiser | Girls VAR | NCHS | 10:00:15.4 | 10:22:26.3 | 0:22:10.9 |
| | 27 | 40 | Chloe | Stines | Girls VAR | JHHS | 10:09:59.0 | 10:32:41.8 | 0:22:42.7 |
| | 28 | 45 | Dori | Sinclair | Girls VAR | JHHS | 10:11:13.2 | 10:34:17.9 | 0:23:04.7 |
| | 29 | 36 | Isabel | Naschold | Girls VAR | LHS | 10:08:58.2 | 10:32:03.0 | 0:23:04.8 |
| | 30 | 14 | Kieran | Burns | Girls VAR | LHS | 10:03:28.0 | 10:26:34.8 | 0:23:06.7 |
| | 31 | 22 | Aurora | Looney | Girls VAR | PHS | 10:05:30.5 | 10:28:50.1 | 0:23:19.6 |
| | 32 | 26 | Alyssa | Dale | Girls VAR | LHS | 10:06:28.2 | 10:29:50.3 | 0:23:22.1 |
| | 33 | 17 | Rachel | Katzmann | Girls VAR | KWHS | 10:04:14.7 | 10:27:39.8 | 0:23:25.1 |
| | 34 | 33 | Hadlee | Hollinger | Girls VAR | KWHS | 10:08:14.8 | 10:31:51.7 | 0:23:36.9 |
| | 35 | 20 | Ali | Magleky | Girls VAR | LHS | 10:05:00.5 | 10:29:04.1 | 0:24:03.6 |
| Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time | Time Back |
|---|---|---|---|---|---|---|---|---|---|
| 36 | 16 | Claire | Hayward | Girls VAR | PHS | 10:03:59.6 | 10:28:05.9 | 0:24:06.3 | 0:04:47.1 |
| 37 | 42 | Hailey | Willis | Girls VAR | NCHS | 10:10:28.7 | 10:34:39.2 | 0:24:10.5 | 0:04:51.3 |
| 38 | 60 | Emma | Gist | Girls VAR | LVHS | 10:14:58.4 | 10:39:11.9 | 0:24:13.5 | 0:04:54.3 |
| 39 | 23 | Mariah | Heuer | Girls VAR | KWHS | 10:05:44.9 | 10:30:03.0 | 0:24:18.1 | 0:04:58.8 |
| 40 | 4 | Ella | Reed | Girls VAR | KWHS | 10:01:00.2 | 10:25:29.7 | 0:24:29.5 | 0:05:10.2 |
| 41 | 53 | Finley | Miller | Girls VAR | JHHS | 10:13:13.4 | 10:38:03.9 | 0:24:50.5 | 0:05:31.3 |
| 42 | 71 | Samantha | Dunbar | Girls VAR | LVHS | 10:17:43.4 | 10:42:39.5 | 0:24:56.2 | 0:05:36.9 |
| 43 | 41 | Sadie | Smith | Girls VAR | LHS | 10:10:13.2 | 10:35:11.9 | 0:24:58.7 | 0:05:39.5 |
| 44 | 66 | Anne | Baron | Girls VAR | LVHS | 10:16:28.2 | 10:41:29.1 | 0:25:01.0 | 0:05:41.7 |
| 45 | 58 | Jessica | White | Girls VAR | LVHS | 10:14:28.5 | 10:39:39.2 | 0:25:10.7 | 0:05:51.4 |
| 46 | 68 | Celeste | Helpingstine | Girls VAR | LVHS | 10:16:58.3 | 10:42:12.6 | 0:25:14.3 | 0:05:55.1 |
| 47 | 9 | Lexie | Goodrich | Girls VAR | PHS | 10:02:14.7 | 10:27:37.3 | 0:25:22.6 | 0:06:03.4 |
| 48 | 50 | Aspen | Decker | Girls VAR | LHS | 10:12:28.2 | 10:37:58.9 | 0:25:30.7 | 0:06:11.4 |
| 49 | 38 | Belle | McClellan | Girls VAR | KWHS | 10:09:27.7 | 10:35:01.5 | 0:25:33.8 | 0:06:14.6 |
| 50 | 54 | Sydney | Holles | Girls VAR | LHS | 10:13:28.1 | 10:39:27.8 | 0:25:59.7 | 0:06:40.5 |
| 51 | 61 | Clara | McGee | Girls VAR | JHHS | 10:15:13.7 | 10:41:13.9 | 0:26:00.2 | 0:06:41.0 |
| 52 | 46 | Katie | Kvenild | Girls VAR | LHS | 10:11:28.0 | 10:37:29.5 | 0:26:01.5 | 0:06:42.2 |
| 53 | 51 | Kami | Fehringer | Girls VAR | KWHS | 10:12:43.2 | 10:38:53.0 | 0:26:09.8 | 0:06:50.6 |
| 54 | 47 | Sierra | Altland | Girls VAR | KWHS | 10:11:42.9 | 10:38:02.1 | 0:26:19.1 | 0:06:59.9 |
| 55 | 28 | Brianna | Warner | Girls VAR | KWHS | 10:07:00.4 | 10:33:23.4 | 0:26:23.0 | 0:07:03.8 |
| 56 | 43 | Serina | Perry | Girls VAR | KWHS | 10:10:43.6 | 10:37:20.2 | 0:26:36.6 | 0:07:17.4 |
| 57 | 72 | Rebecca | Brough | Girls VAR | LVHS | 10:17:57.9 | 10:44:44.2 | 0:26:46.3 | 0:07:27.1 |
| 58 | 59 | Rachael <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://wyopreps.townsquaredigital.com/wyopreps/Skiing%20Results/Girls%205k%20Freestyle%20Final%20Results%20-%20WHSAA%20State%20Nordic%202-28-2020.pdf\n</url>\n<text>\nWHSAA Nordic State Championship OFFICIAL RESULTS\n\n| | Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time |\n|---|---|---|---|---|---|---|---|---|---|\n| Girls VAR | 1 | 13 | Kate | Brigham | Girls VAR | JHHS | 10:03:13.3 | 10:22:32.6 | 0:19:19.2 |\n| | 2 | 19 | Natalie | O'Brien | Girls VAR | JHHS | 10:04:45.0 | 10:24:11.6 | 0:19:26.5 |\n| | 3 | 24 | Kaylynn | Sandall | Girls VAR | LVHS | 10:05:58.5 | 10:25:32.9 | 0:19:34.4 |\n| | 4 | 31 | Abigail | Whitman | Girls VAR | LHS | 10:07:44.2 | 10:27:19.7 | 0:19:35.5 |\n| | 5 | 18 | Maria | Anderson | Girls VAR | LVHS | 10:04:29.1 | 10:24:17.9 | 0:19:48.9 |\n| | 6 | 11 | Veuathier | Samanha | Girls VAR | KWHS | 10:02:45.2 | 10:22:49.0 | 0:20:03.8 |\n| | 7 | 6 | Sydney | Wilmot | Girls VAR | JHHS | 10:01:27.8 | 10:21:52.2 | 0:20:24.3 |\n| | 8 | 39 | Hazel | Womack | Girls VAR | LVHS | 10:09:43.3 | 10:30:09.0 | 0:20:25.6 |\n| | 9 | 12 | Kate | Wilmot | Girls VAR | LVHS | 10:02:59.6 | 10:23:32.8 | 0:20:33.2 |\n| | 10 | 32 | Hailie | Wilhelm | Girls VAR | NCHS | 10:07:58.7 | 10:28:39.5 | 0:20:40.8 |\n| | 11 | 25 | Birch | Klomparens | Girls VAR | JHHS | 10:06:14.6 | 10:26:56.1 | 0:20:41.5 |\n| | 12 | 15 | Lu | Elder | Girls VAR | NCHS | 10:03:43.0 | 10:24:35.2 | 0:20:52.2 |\n| | 13 | 34 | Ursula | Anderson | Girls VAR | LVHS | 10:08:27.6 | 10:29:21.9 | 0:20:54.3 |\n| | 14 | 8 | Madyson | Willis | Girls VAR | NCHS | 10:01:58.3 | 10:22:54.5 | 0:20:56.2 |\n| | 15 | 29 | Shayla | Babits | Girls VAR | LVHS | 10:07:13.8 | 10:28:21.6 | 0:21:07.8 |\n| | 16 | 27 | Kiana | Hiser | Girls VAR | NCHS | 10:06:45.1 | 10:27:54.0 | 0:21:09.0 |\n| | 17 | 21 | Isabella | Brown | Girls VAR | NCHS | 10:05:15.1 | 10:26:29.7 | 0:21:14.5 |\n| | 18 | 55 | Kyra | Simonson | Girls VAR | LVHS | 10:13:43.0 | 10:35:09.9 | 0:21:27.0 |\n| | 19 | 44 | Brianna | Rich | Girls VAR | LVHS | 10:10:58.3 | 10:32:43.7 | 0:21:45.4 |\n| | 20 | 35 | KC | MacLeod | Girls VAR | JHHS | 10:08:43.1 | 10:30:32.0 | 0:21:48.8 |\n| | 21 | 5 | Magdalena | Escudero-Kane | Girls VAR | LVHS | 10:01:15.3 | 10:23:08.1 | 0:21:52.8 |\n| | 22 | 49 | Annica | Peacock | Girls VAR | JHHS | 10:12:13.2 | 10:34:08.1 | 0:21:54.9 |\n| | 23 | 52 | Rebecca | Whiting | Girls VAR | LVHS | 10:12:57.5 | 10:34:54.3 | 0:21:56.8 |\n| | 24 | 30 | Parker | Smith | Girls VAR | JHHS | 10:07:28.7 | 10:29:34.3 | 0:22:05.6 |\n| | 25 | 37 | Olivia | DeVore | Girls VAR | NCHS | 10:09:13.4 | 10:31:22.7 | 0:22:09.3 |\n| | 26 | 1 | Brianna | Hiser | Girls VAR | NCHS | 10:00:15.4 | 10:22:26.3 | 0:22:10.9 |\n| | 27 | 40 | Chloe | Stines | Girls VAR | JHHS | 10:09:59.0 | 10:32:41.8 | 0:22:42.7 |\n| | 28 | 45 | Dori | Sinclair | Girls VAR | JHHS | 10:11:13.2 | 10:34:17.9 | 0:23:04.7 |\n| | 29 | 36 | Isabel | Naschold | Girls VAR | LHS | 10:08:58.2 | 10:32:03.0 | 0:23:04.8 |\n| | 30 | 14 | Kieran | Burns | Girls VAR | LHS | 10:03:28.0 | 10:26:34.8 | 0:23:06.7 |\n| | 31 | 22 | Aurora | Looney | Girls VAR | PHS | 10:05:30.5 | 10:28:50.1 | 0:23:19.6 |\n| | 32 | 26 | Alyssa | Dale | Girls VAR | LHS | 10:06:28.2 | 10:29:50.3 | 0:23:22.1 |\n| | 33 | 17 | Rachel | Katzmann | Girls VAR | KWHS | 10:04:14.7 | 10:27:39.8 | 0:23:25.1 |\n| | 34 | 33 | Hadlee | Hollinger | Girls VAR | KWHS | 10:08:14.8 | 10:31:51.7 | 0:23:36.9 |\n| | 35 | 20 | Ali | Magleky | Girls VAR | LHS | 10:05:00.5 | 10:29:04.1 | 0:24:03.6 |\n\n| Place | Bib | First Name | Last Name | Class | Team | Run1 Start | Run1 Finish | Total Time | Time Back |\n|---|---|---|---|---|---|---|---|---|---|\n| 36 | 16 | Claire | Hayward | Girls VAR | PHS | 10:03:59.6 | 10:28:05.9 | 0:24:06.3 | 0:04:47.1 |\n| 37 | 42 | Hailey | Willis | Girls VAR | NCHS | 10:10:28.7 | 10:34:39.2 | 0:24:10.5 | 0:04:51.3 |\n| 38 | 60 | Emma | Gist | Girls VAR | LVHS | 10:14:58.4 | 10:39:11.9 | 0:24:13.5 | 0:04:54.3 |\n| 39 | 23 | Mariah | Heuer | Girls VAR | KWHS | 10:05:44.9 | 10:30:03.0 | 0:24:18.1 | 0:04:58.8 |\n| 40 | 4 | Ella | Reed | Girls VAR | KWHS | 10:01:00.2 | 10:25:29.7 | 0:24:29.5 | 0:05:10.2 |\n| 41 | 53 | Finley | Miller | Girls VAR | JHHS | 10:13:13.4 | 10:38:03.9 | 0:24:50.5 | 0:05:31.3 |\n| 42 | 71 | Samantha | Dunbar | Girls VAR | LVHS | 10:17:43.4 | 10:42:39.5 | 0:24:56.2 | 0:05:36.9 |\n| 43 | 41 | Sadie | Smith | Girls VAR | LHS | 10:10:13.2 | 10:35:11.9 | 0:24:58.7 | 0:05:39.5 |\n| 44 | 66 | Anne | Baron | Girls VAR | LVHS | 10:16:28.2 | 10:41:29.1 | 0:25:01.0 | 0:05:41.7 |\n| 45 | 58 | Jessica | White | Girls VAR | LVHS | 10:14:28.5 | 10:39:39.2 | 0:25:10.7 | 0:05:51.4 |\n| 46 | 68 | Celeste | Helpingstine | Girls VAR | LVHS | 10:16:58.3 | 10:42:12.6 | 0:25:14.3 | 0:05:55.1 |\n| 47 | 9 | Lexie | Goodrich | Girls VAR | PHS | 10:02:14.7 | 10:27:37.3 | 0:25:22.6 | 0:06:03.4 |\n| 48 | 50 | Aspen | Decker | Girls VAR | LHS | 10:12:28.2 | 10:37:58.9 | 0:25:30.7 | 0:06:11.4 |\n| 49 | 38 | Belle | McClellan | Girls VAR | KWHS | 10:09:27.7 | 10:35:01.5 | 0:25:33.8 | 0:06:14.6 |\n| 50 | 54 | Sydney | Holles | Girls VAR | LHS | 10:13:28.1 | 10:39:27.8 | 0:25:59.7 | 0:06:40.5 |\n| 51 | 61 | Clara | McGee | Girls VAR | JHHS | 10:15:13.7 | 10:41:13.9 | 0:26:00.2 | 0:06:41.0 |\n| 52 | 46 | Katie | Kvenild | Girls VAR | LHS | 10:11:28.0 | 10:37:29.5 | 0:26:01.5 | 0:06:42.2 |\n| 53 | 51 | Kami | Fehringer | Girls VAR | KWHS | 10:12:43.2 | 10:38:53.0 | 0:26:09.8 | 0:06:50.6 |\n| 54 | 47 | Sierra | Altland | Girls VAR | KWHS | 10:11:42.9 | 10:38:02.1 | 0:26:19.1 | 0:06:59.9 |\n| 55 | 28 | Brianna | Warner | Girls VAR | KWHS | 10:07:00.4 | 10:33:23.4 | 0:26:23.0 | 0:07:03.8 |\n| 56 | 43 | Serina | Perry | Girls VAR | KWHS | 10:10:43.6 | 10:37:20.2 | 0:26:36.6 | 0:07:17.4 |\n| 57 | 72 | Rebecca | Brough | Girls VAR | LVHS | 10:17:57.9 | 10:44:44.2 | 0:26:46.3 | 0:07:27.1 |\n| 58 | 59 | Rachael <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "| Harrower | Girls VAR | JHHS | 10:14:43.",
"role": "assistant"
}
] |
|
Diversity Resources
The following list was compiled to provide child welfare practitioners & trainers with a list of resources and learning opportunities that focus on diversity issues and specific populations. This list is by no means exhaustive. Rather, it provides a variety of resources intended to raise awareness and promote critical thinking about cultural issues common to child welfare practice. The list contains resources, including tools for effective practice, from the Ohio Child Welfare Training Program (OCWTP) and other websites.
Resources
* Bridging Refugee Youth & Children's Services (BRYCS), 2005. Culturally Competent Practice with Latino Children and Families. Available at: http://www.brycs.org/_cs_upload/documents/2930_1.pdf Designed especially for child welfare workers, this curriculum offers a systems of care model with cultural norms of many Latino families taken into account.
* Bridging Refugee Youth & Children's Services (BRYCS), 1993. MultiCultural Guidelines for Assessing Family Strengths and Risk Factors in Child Protective Services. Available at http://www.brycs.org/_cs_upload/documents/2979_1.pdf These guidelines provide a framework for caseworkers to identify family strengths that can be proactively tapped into to mitigate the factors that put children at risk.
* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Serving Foreign-Born Foster Children: A Resource for Meeting the Special Needs of Refugee Children and Youth. Available at http://www.brycs.org/_cs_upload/documents/2598_1.pdf This document includes background information and practical tips on how to approach and be an advocate for refugee and generally foreign-born children in foster care.
* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Strengthening Services for Refugee Parents: Guidelines and Resources. Available at http://www.brycs.org/_cs_upload/documents/1863_1.pdf This manual offers some common themes and practical approaches for planning and maintaining services for refugee parents.
* Center for Advanced Studies in Child Welfare, University of Minnesota. (2010). Resources on Child Welfare & Cultural Diversity. Available at: http://www.cehd.umn.edu/ssw/cascw/PracResources/CulturalDiversity/de fault.asp
* Child Welfare Information Gateway. (2008). Culturally Responsive Child Welfare Practice with Latino Children and Families: A Child Welfare Staff Training Model. Available at: http://www.childwelfare.gov/management/funding/funding_sources/sitevis its/latino.cfm#page=summary - a field-initiated training project for effective child welfare practice with Latino children and families.
* Child Welfare Information Gateway. (2003). Cultural Sensitivity Training for Community Service Providers Working With Hispanic Adoptive Families: A Prototype Curriculum for Development of Cultural Sensitivity Toward Hispanic Families. Available at: http://library.childwelfare.gov/cwig/ws/library/docs/gateway/Record?rpp= 10&upp=0&m=1&w=+NATIVE%28%27recno%3D44133%27%29&r=1 This training curriculum offers handouts and overheads to train adoption workers to improve practice with adoptive families within the Hispanic population of New Mexico.
* Child Welfare league of America. (2003). Children of color in the child welfare system: Overview, vision, and proposed action steps. Retrieved: June 24, 2010. Available at: http://www.cwla.org/programs/culture/disproportionatestatement.pdf This document confirms and acknowledges the fact that the disproportionality of children of color in the child welfare system exists and is concerning, and that also presents a commitment and proposed plan to address it.
* Fong, R. (2001). Balancing Family-Centered Services and Child WellBeing: Exploring Issues in Policy, Practice, Theory, and Research. In: Walton, E. Sandau-Beckler, P. Mannes, M. (Eds.), Cultural Competency in Providing Family-Centered Services (pp. 55-68). Columbia University Press, New York, NY. This chapter highlights the essence of culturally competent practice when working with diverse populations. It offers a framework to social work practitioners for making culturally responsive
assessments and developing strategies of intervention based on the "person-in-family-in community" (PFC) model.
* Fontes, Lisa Aronson. (2005). Child Abuse and Culture: Working with Diverse Families. New York: Guilford Press. This book offers strategies to make child welfare professionals and programs more effective in their work with families from diverse backgrounds and cultures.
* Fontes, Lisa Aronson. (2008). Interviewing Clients Across Cultures. New York: Guilford Press Weaving cultural issues throughout, this book provides guidance on all aspects of preparing for, conducting, and documenting interviews with client, including children and families in child welfare. A related audiocassette, Interviewing Immigrant Children and Families, offers excellent related content for practice and is available for order at http://www.amazon.com/Interviewing-Immigrant-ChildrenMaltreatment-Audiocassette/dp/076192115X.
* Marts, Eric J., Lee, Eun-Kyoung, McRoy, Ruth, and McCrowskey, Jacqueline. (2008). Point of Engagement: Reducing Disproportionality and Improving Child and Family Outcomes, Child Welfare: 87:335-358. Available at: http://www.mcnellie.com/525/readings/martsetal.pdf This article addresses issues of disproportionality and presents an innovative service delivery model of family engagement intended to reduce the number of children coming into care.
* Miller, Oronde, Gaston, Rebecca J. (2003). A Model of Culture-Centered Child Welfare Practice, Child Welfare: 82, 235-250. Available at: http://eric.ed.gov/ERICWebPortal/search/detailmini.jsp?_nfpb=true&_&ER ICExtSearch_SearchValue_0=EJ671929&ERICExtSearch_SearchType_0= no&accno=EJ671929 Presenting an Afro-centric perspective, this article presents a framework for culture-centered child welfare practice, including child-family-system interactions, service provision, recruitment and retention of homes, and culturally responsive legislation).
* Ontai, Lenna L., Mastergeorge, Anne M. (2006). Culture and Parenting: A Guide for Delivering Parenting Curriculums to Diverse Families. Retrieved: June 18, 2010. Available at:
http://ucce.ucdavis.edu/files/filelibrary/5264/20355.pdf
This article helps practitioners evaluate the cultural sensitivity of the programs and services they offer to families and to provide guidance on creating culturally sensitive parenting programs.
* Rycus, J.S., and Hughes, R.C., (1998). Field Guide to Child Welfare Volume II, Washington, D.C.: Child Welfare League of America This four volume resource textbook contains comprehensive information about fundamental competencies in child welfare practice. Volume II, Chapter 5, addresses content on culture and diversity (now available in a searchable web-based format. An overview of the field guide, with the option for five-day online access and/or an online subscription, is available at http://www.ihs-trainet.com/CWTraining/fieldguide.htm.
* U.S. Department of Health and Human Services, ACF, Children's Bureau. MEPA Guide Available at: http://www.acf.hhs.gov/programs/cb/pubs/mepa94/mepachp2.htm This guide contains the provisions to the Multiethnic Placement Act of 1994 - as Amended by the Interethnic Adoption Provisions of 1996.
* Wah, Mun Lee, (2008). Becoming Culturally Competent is a Journey. Retrieved: June 17, 2010. Available at: http://www.ffta.org/publications/focus_archives/2008_summer.pdf This ways for family members to become culturally aware of their foster children.
Tools
* Annie E. Casey Foundation. Race Matters Toolkit. Retrieved: June 18, 2010. Available at: http://www.kidscount.org/kcnetwork/resources/RaceMattersToolkit.htm This toolkit helps advocates mobilize resources for vulnerable populations of color in order to reduce racial disparities/disproportionality and promote racial equity.
* Bullard, Lloyd. (2006).The Friends CWLA Competence Self-Assessment Tool. Available at: www.friendsnrc.org/download/bullard.pps. This PowerPoint explains key concepts pertaining to culture and organizational cultural competence and how they impact diverse workforces and client populations.
* Child Welfare League of America. GLBTQ Knowledge Assessment Tool. Available at: http://www.cwla.org/programs/culture/glbtqknowledge.htm This tool assess levels of knowledge and understanding about Lesbian, Gay, Bisexual, Transgender, and Questioning (LGBTQ) youth.
* FRIENDS: National Resource Center for Community-Based Child Abuse Prevention. Available at:
http://www.friendsnrc.org/CBCAP/priority/culture.htm
The homepage for this national organization helps states become more culturally competent in their work with children and families by listing
resources and access to online tools that will foster an understanding, appreciation, and knowledge of diverse
populations.
* Ohio Child Welfare Training Program. Diversity Maps. Available at: http://www.ocwtp.net/Diversity%20Maps.html These maps provide the OCWTP with a better understanding of Ohio's diversity throughout its eight regions of the state.
Online Learning Opportunities
* Bridging Refugee Youth & Children's Services (BRYCS). Child Abuse Issues with Refugee Populations (Webinar) – Available at: http://www.brycs.org/askBRYCS/webinars.cfm Presented by acclaimed cultural expert Lisa Aronson Fontes, this webinar addresses some of the challenges and points to consider when child welfare professionals are faced with the task of ruling in or ruling out abuse and neglect in refugee and/or foreign-born families.
* Casey Family Programs. Knowing Who You Are – Available at: http://www.casey.org/Resources/Initiatives/KnowingWhoYouAre/video.htm This training tool presents the perspectives of youth in care about why race and ethnicity matter and the importance of integrating racial and ethnic identity into child welfare practice. Also available on DVD (See DVD section) child welfare professionals, and foster parents.
* Essential Learning. Cultural Diversity - This course gives an overview of various components of cultural competence, along with concrete examples of how they apply to providing services mental health and other services to children and families. If you are a supervisor, caseworker or caregiver with an Ohio Public Children Services Agency you may be eligible to take this course for free by contacting your RTC. Otherwise, you can pay for this course by going to CEQuick at: http://www.cequick.com/myeln/individual/default.asp
* Essential Learning. Valuing Diversity in the Workplace This course introduces key concepts around diversity, its value and potential impact in the workplace, and ways to establish an inclusive climate at work for people from diverse backgrounds. If you are a supervisor, caseworker or caregiver with an Ohio Public Children Services Agency you may be eligible to take this course for free by contacting your RTC. Otherwise, you can pay for this course by going to CEQuick at: http://www.cequick.com/myeln/individual/default.asp
* Gamble-Skogmo Chair, University of Minnesota, School of Social Work. Evidence-Based PracticeCultural Diversity – Available at http://www.cehd.umn.edu/ssw/G-S/EBP-CC_Modules/index.html This self-learning tutorial is designed to take the learner from key concepts around culture and diversity issues to application of these issues into culturally responsive best practice
* University of Michigan, School of Social Work. Cultural Issues Training – Available at:
http://www.ssw.umich.edu/public/currentProjects/tpcws/culturalIssues/ This training helps child welfare professionals understand the legal issues and policy framework that guides practice in the child welfare system regarding race, color, and national origin, and offers best practice tools and resources as applied to cultural responsiveness
* National Indian Child Welfare Association (NICWA). ICWA Online Training Course – Available at: www.nicwa.org - a web-based training on the Indian Child Welfare Act (ICWA) of 1978. This training, developed by the National Indian Child Welfare Association (NICWA), presents key provisions of ICWA in comprehensive, non-legal language. Contact your RTC to see if you are eligible to take this course for free.
DVDs
* Casey Family Programs. Knowing Who You Are – Available to order as DVD and/or to view for free online at http://www.casey.org/Resources/Initiatives/KnowingWhoYouAre/video.htm This training tool presents the perspectives of youth in care, child welfare professionals, and foster parents about why race and ethnicity matter and the importance of integrating racial and ethnic identity into child welfare practice
* New Your State Citizens' Coalition for Children. Struggle for Identity: Issues in Transracial Adoption and A Conversation 10 Years Later – Available to order as DVD at http://nysccc.org/about-us/programs/nyscccvideos/struggle-for-identity/ - a forty-minute DVD in two parts and Designed to inform adoptive and foster parents about the needs of their children of a different race or ethnicity. Part I features a cast of young adult adoptees who candidly share their personal stories about their transracial/transcultural adoption experiences. Part II features two members of the original cast who discuss in straight-forward language their life-long journeys as transracial adoptees.
National Child Welfare-Related Organizations whose websites provide additional information, resources, and/or tools relevant to issues of culture and diversity:
* Bridging Refugee Youth & Children's Services (BRYCS): http://www.brycs.org
* Casey Family Programs: http://www.casey.org
* Child Welfare Information Gateway (combined National Clearing House on Abuse and Neglect and the National Adoption Information Clearinghouse): http://www.childwelfare.gov
* National Indian Welfare Association: http://www.nicwa.org
* National Resource Center for Family-Centered Practice and Permanency Planning http://www.hunter.cuny.edu/socwork/nrcfcpp/
* Child Welfare League of America: http://cwla.org/
* Evan B. Donaldson Adoption Institute http://www.adoptioninstitute.org
* NASW: http://naswdc.org
Note: There is an additional list of cultural resources on this website that has been identified for trainers, but that in some cases may also be useful for child
welfare practitioners. That list is available at:
http://www.ocwtp.net/PDFs/Culture%20and%20Diversity%20Resources.pdf (Some overlap in recommended resources for trainers and practitioners may be observed.)
|
<urn:uuid:d952c6cc-9ea5-4534-84d7-1b09c629ce65>
|
CC-MAIN-2019-09
|
http://ocwtp.com/PDFs/Culture%20and%20Diversity%20Resources.pdf
|
2019-02-18T18:54:51Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247487624.32/warc/CC-MAIN-20190218175932-20190218201932-00158.warc.gz
| 211,693,682
| 3,091
|
eng_Latn
|
eng_Latn
| 0.960352
|
eng_Latn
| 0.96888
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2038,
4149,
6506,
8232,
10565,
12317,
14373,
14582
] |
Diversity Resources
The following list was compiled to provide child welfare practitioners & trainers with a list of resources and learning opportunities that focus on diversity issues and specific populations. This list is by no means exhaustive. Rather, it provides a variety of resources intended to raise awareness and promote critical thinking about cultural issues common to child welfare practice. The list contains resources, including tools for effective practice, from the Ohio Child Welfare Training Program (OCWTP) and other websites.
Resources
* Bridging Refugee Youth & Children's Services (BRYCS), 2005. Culturally Competent Practice with Latino Children and Families. Available at: http://www.brycs.org/_cs_upload/documents/2930_1.pdf Designed especially for child welfare workers, this curriculum offers a systems of care model with cultural norms of many Latino families taken into account.
* Bridging Refugee Youth & Children's Services (BRYCS), 1993. MultiCultural Guidelines for Assessing Family Strengths and Risk Factors in Child Protective Services. Available at http://www.brycs.org/_cs_upload/documents/2979_1.pdf These guidelines provide a framework for caseworkers to identify family strengths that can be proactively tapped into to mitigate the factors that put children at risk.
* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Serving Foreign-Born Foster Children: A Resource for Meeting the Special Needs of Refugee Children and Youth. Available at http://www.brycs.org/_cs_upload/documents/2598_1.pdf This document includes background information and practical tips on how to approach and be an advocate for refugee and generally foreign-born children in foster care.
* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Strengthening Services for Refugee Parents: Guidelines and Resources. Available at http://www.brycs.org/_cs_upload/documents/1863_1.pdf This manual offers some common themes and practical approaches for planning and maintaining services for refugee parents.
* Center for Advanced Studies in Child Welfare, University of Minnesota. (2010). Resources on Child Welfare & Cultural Diversity. Available at: http://www.cehd.umn.edu/ssw/cascw/PracResources/CulturalDiversity/de fault.asp
* Child Welfare Information Gateway. (2008). Culturally Responsive Child Welfare Practice with Latino Children and Families: A Child Welfare Staff Training Model. Available at: http://www.childwelfare.gov/management/funding/funding_sources/sitevis its/latino.cfm#page=summary - a field-initiated training project for effective child welfare practice with Latino children and families.
* Child Welfare Information Gateway. (2003). Cultural Sensitivity Training for Community Service Providers Working With Hispanic Adoptive Families: A Prototype Curriculum for Development of Cultural Sensitivity Toward Hispanic Families. Available at: http://library.childwelfare.gov/cwig/ws/library/docs/gateway/Record?rpp= 10&upp=0&m=1&w=+NATIVE%28%27recno%3D44133%27%29&r=1 This training curriculum offers handouts and overheads to train adoption workers to improve practice with adoptive families within the Hispanic population of New Mexico.
* Child Welfare league of America. (2003). Children of color in the child welfare system: Overview, vision, and proposed action steps. Retrieved: June 24, 2010. Available at: http://www.cwla.org/programs/culture/disproportionatestatement.pdf This document confirms and acknowledges the fact that the disproportionality of children of color in the child welfare system exists and is concerning, and that also presents a commitment and proposed plan to address it.
* Fong, R. (2001). Balancing Family-Centered Services and Child WellBeing: Exploring Issues in Policy, Practice, Theory, and Research. In: Walton, E. Sandau-Beckler, P. Mannes, M. (Eds.), Cultural Competency in Providing Family-Centered Services (pp. 55-68). Columbia University Press, New York, NY. This chapter highlights the essence of culturally competent practice when working with diverse populations. It offers a framework to social work practitioners for making culturally responsive
assessments and developing strategies of intervention based on the "person-in-family-in community" (PFC) model.
* Fontes, Lisa Aronson. (2005). Child Abuse and Culture: Working with Diverse Families. New York: Gui
|
lford Press.
| 4,365
|
inside_word
|
Guilford
|
remove_all
|
<url>
http://ocwtp.com/PDFs/Culture%20and%20Diversity%20Resources.pdf
</url>
<text>
Diversity Resources
The following list was compiled to provide child welfare practitioners & trainers with a list of resources and learning opportunities that focus on diversity issues and specific populations. This list is by no means exhaustive. Rather, it provides a variety of resources intended to raise awareness and promote critical thinking about cultural issues common to child welfare practice. The list contains resources, including tools for effective practice, from the Ohio Child Welfare Training Program (OCWTP) and other websites.
Resources
* Bridging Refugee Youth & Children's Services (BRYCS), 2005. Culturally Competent Practice with Latino Children and Families. Available at: http://www.brycs.org/_cs_upload/documents/2930_1.pdf Designed especially for child welfare workers, this curriculum offers a systems of care model with cultural norms of many Latino families taken into account.
* Bridging Refugee Youth & Children's Services (BRYCS), 1993. MultiCultural Guidelines for Assessing Family Strengths and Risk Factors in Child Protective Services. Available at http://www.brycs.org/_cs_upload/documents/2979_1.pdf These guidelines provide a framework for caseworkers to identify family strengths that can be proactively tapped into to mitigate the factors that put children at risk.
* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Serving Foreign-Born Foster Children: A Resource for Meeting the Special Needs of Refugee Children and Youth. Available at http://www.brycs.org/_cs_upload/documents/2598_1.pdf This document includes background information and practical tips on how to approach and be an advocate for refugee and generally foreign-born children in foster care.
* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Strengthening Services for Refugee Parents: Guidelines and Resources. Available at http://www.brycs.org/_cs_upload/documents/1863_1.pdf This manual offers some common themes and practical approaches for planning and maintaining services for refugee parents.
* Center for Advanced Studies in Child Welfare, University of Minnesota. (2010). Resources on Child Welfare & Cultural Diversity. Available at: http://www.cehd.umn.edu/ssw/cascw/PracResources/CulturalDiversity/de fault.asp
* Child Welfare Information Gateway. (2008). Culturally Responsive Child Welfare Practice with Latino Children and Families: A Child Welfare Staff Training Model. Available at: http://www.childwelfare.gov/management/funding/funding_sources/sitevis its/latino.cfm#page=summary - a field-initiated training project for effective child welfare practice with Latino children and families.
* Child Welfare Information Gateway. (2003). Cultural Sensitivity Training for Community Service Providers Working With Hispanic Adoptive Families: A Prototype Curriculum for Development of Cultural Sensitivity Toward Hispanic Families. Available at: http://library.childwelfare.gov/cwig/ws/library/docs/gateway/Record?rpp= 10&upp=0&m=1&w=+NATIVE%28%27recno%3D44133%27%29&r=1 This training curriculum offers handouts and overheads to train adoption workers to improve practice with adoptive families within the Hispanic population of New Mexico.
* Child Welfare league of America. (2003). Children of color in the child welfare system: Overview, vision, and proposed action steps. Retrieved: June 24, 2010. Available at: http://www.cwla.org/programs/culture/disproportionatestatement.pdf This document confirms and acknowledges the fact that the disproportionality of children of color in the child welfare system exists and is concerning, and that also presents a commitment and proposed plan to address it.
* Fong, R. (2001). Balancing Family-Centered Services and Child WellBeing: Exploring Issues in Policy, Practice, Theory, and Research. In: Walton, E. Sandau-Beckler, P. Mannes, M. (Eds.), Cultural Competency in Providing Family-Centered Services (pp. 55-68). Columbia University Press, New York, NY. This chapter highlights the essence of culturally competent practice when working with diverse populations. It offers a framework to social work practitioners for making culturally responsive
assessments and developing strategies of intervention based on the "person-in-family-in community" (PFC) model.
* Fontes, Lisa Aronson. (2005). Child Abuse and Culture: Working with Diverse Families. New York: Gui<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://ocwtp.com/PDFs/Culture%20and%20Diversity%20Resources.pdf\n</url>\n<text>\nDiversity Resources\n\nThe following list was compiled to provide child welfare practitioners & trainers with a list of resources and learning opportunities that focus on diversity issues and specific populations. This list is by no means exhaustive. Rather, it provides a variety of resources intended to raise awareness and promote critical thinking about cultural issues common to child welfare practice. The list contains resources, including tools for effective practice, from the Ohio Child Welfare Training Program (OCWTP) and other websites.\n\nResources\n\n* Bridging Refugee Youth & Children's Services (BRYCS), 2005. Culturally Competent Practice with Latino Children and Families. Available at: http://www.brycs.org/_cs_upload/documents/2930_1.pdf Designed especially for child welfare workers, this curriculum offers a systems of care model with cultural norms of many Latino families taken into account.\n* Bridging Refugee Youth & Children's Services (BRYCS), 1993. MultiCultural Guidelines for Assessing Family Strengths and Risk Factors in Child Protective Services. Available at http://www.brycs.org/_cs_upload/documents/2979_1.pdf These guidelines provide a framework for caseworkers to identify family strengths that can be proactively tapped into to mitigate the factors that put children at risk.\n* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Serving Foreign-Born Foster Children: A Resource for Meeting the Special Needs of Refugee Children and Youth. Available at http://www.brycs.org/_cs_upload/documents/2598_1.pdf This document includes background information and practical tips on how to approach and be an advocate for refugee and generally foreign-born children in foster care.\n* Bridging Refugee Youth & Children's Services (BRYCS), 2003. Strengthening Services for Refugee Parents: Guidelines and Resources. Available at http://www.brycs.org/_cs_upload/documents/1863_1.pdf This manual offers some common themes and practical approaches for planning and maintaining services for refugee parents.\n\n* Center for Advanced Studies in Child Welfare, University of Minnesota. (2010). Resources on Child Welfare & Cultural Diversity. Available at: http://www.cehd.umn.edu/ssw/cascw/PracResources/CulturalDiversity/de fault.asp\n* Child Welfare Information Gateway. (2008). Culturally Responsive Child Welfare Practice with Latino Children and Families: A Child Welfare Staff Training Model. Available at: http://www.childwelfare.gov/management/funding/funding_sources/sitevis its/latino.cfm#page=summary - a field-initiated training project for effective child welfare practice with Latino children and families.\n* Child Welfare Information Gateway. (2003). Cultural Sensitivity Training for Community Service Providers Working With Hispanic Adoptive Families: A Prototype Curriculum for Development of Cultural Sensitivity Toward Hispanic Families. Available at: http://library.childwelfare.gov/cwig/ws/library/docs/gateway/Record?rpp= 10&upp=0&m=1&w=+NATIVE%28%27recno%3D44133%27%29&r=1 This training curriculum offers handouts and overheads to train adoption workers to improve practice with adoptive families within the Hispanic population of New Mexico.\n* Child Welfare league of America. (2003). Children of color in the child welfare system: Overview, vision, and proposed action steps. Retrieved: June 24, 2010. Available at: http://www.cwla.org/programs/culture/disproportionatestatement.pdf This document confirms and acknowledges the fact that the disproportionality of children of color in the child welfare system exists and is concerning, and that also presents a commitment and proposed plan to address it.\n* Fong, R. (2001). Balancing Family-Centered Services and Child WellBeing: Exploring Issues in Policy, Practice, Theory, and Research. In: Walton, E. Sandau-Beckler, P. Mannes, M. (Eds.), Cultural Competency in Providing Family-Centered Services (pp. 55-68). Columbia University Press, New York, NY. This chapter highlights the essence of culturally competent practice when working with diverse populations. It offers a framework to social work practitioners for making culturally responsive\n\nassessments and developing strategies of intervention based on the \"person-in-family-in community\" (PFC) model.\n\n* Fontes, Lisa Aronson. (2005). Child Abuse and Culture: Working with Diverse Families. New York: Gui<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "lford Press.",
"role": "assistant"
}
] |
|
Karen L. Wallace
2127 E. 29 St.
Des Moines, Iowa 50317
EDUCATION
University of Iowa, Iowa City, Iowa
M.A., Library and Information Science, December 1994
- Inducted into Beta Phi Mu
- Passed comprehensive examination with distinction
B.A., Religion, with highest distinction, May 1993
- Studied on exchange at the University of Lancaster, England (1991–92)
- Awarded Sonia Sands Award for Excellence in Judaic Studies and Overall Academic Achievement, Ernest R. Johnson Memorial Prize, Sigma Kappa Scholarship Award (fall 1989, spring 1990, fall 1991), University of Iowa Foundation Honors Award, University of Iowa Presidential Scholarship, University of Iowa Freshman Honors Scholarship, and National Merit Finalist
- Inducted into Phi Beta Kappa, Order of Omega, and Phi Eta Sigma
EXPERIENCE
Drake University Law Library, Des Moines, Iowa
Circulation/Reference Librarian July 2000–present; Instructor of Librarianship, July 2000–May 2003; Assistant Professor of Librarianship, June 2003–May 2004; Associate Professor of Librarianship, June 2004–May 2006; Professor of Librarianship, June 2006–present.
- InstructionProvide instruction to individuals, classes, and other groups, including Drake Law Review and Drake Journal of Agricultural Law. Helped design and continually modify instructional techniques for seminar courses and undergraduate law-related courses, significantly increasing library's presence in the classroom and cocurriculars. Co-taught 2-credit Information Literacy course fall 2009 and fall 2010. Co-created Advanced Legal Research: Iowa Law course, taught spring semesters of 2011–14 and J-Term 2016. Create and maintain instructional research guides (see http://libguides.law.drake.edu/prf.php?account_id=2207).
- Public ServicesAssist faculty, students and other patrons with reference questions, research needs, and general library usage. Collaboratively manage operation of Information Desk. Supervise and evaluate full-time Access Services Associate and, through May 2015, full-time Circulation Administration Assistant. Help train and supervise approximately five part-time student desk supervisors. Manage circulation operations, including system settings as Ex Libris Alma certified administrator. Promote library to its various constituencies. Through Aug. 2020, oversaw use of study and conference rooms.
- Stack MaintenanceEnsure order, completeness, and currency of collection of over 400,000 volumes. Help supervise two to five part-time student shelvers. Oversee reserve operations.
- Administration−Actively participate in forming library policies and procedures. Active participant in strategic planning (chair 2002 Law Library Strategic Planning Committee; member 2003-04 Law School Strategic Planning Committee; member 2019–present ongoing planning committee, chair, 2019 execution subcommittee; member, 2004–05 and 2010–12 Law School Self-Study Committees). Served on ILS migration committees (2001–02 from DRA to Sirsi and 2015-16 from Sirsi to ExLibris) and Law Library tenure committees (2007–17, 2020–21; chair, 2014–15 and 2016–17).
American Judicature Society, Des Moines, Iowa
Researcher, March 2004–September 2004; March 2005–Dec. 2009
Wrote and updated the sections of the National Jury Center Web site linked under "Juror Orientation." Performed additional research, as needed. Suggested and located relevant content for other sections of the site. Helped edit the entire site for its initial launch. The site won the CivicMind Award (November 2004) for improving education about the legal system and enhancing civic participation.
Des Plaines Public Library
, Des Plaines, Illinois
Head of Community Services, January 1999–June 2000
515-262-2713
[email protected]
- Management and staff servicesLed department operations, including Mobile Library service, disability services, community outreach, employee orientation, and volunteer program; hired, trained, supervised, and evaluated staff of four; prepared special departmental budget requests; actively participated in library management team that made and implemented library-wide policies and other decisions; organized and led the staff fun committee (for stress reduction and team building).
- Community servicesSelected, evaluated, and maintained literacy and Mobile Library collections; oversaw $26,500 budget; served on the Oakton Community College Literacy Coalition and the Des Plaines Healthy Community Partnership; wrote and implemented two successful state grants for assistive technology and literacy materials; scheduled and promoted Mobile Library stops and events; assisted patrons on the Mobile Library and, on a substitute-basis, at the reference desk; promoted and provided services and referrals for patrons with disabilities; represented the library at select community events; prepared and presented youth storytimes outside the library.
Received superior performance evaluations, emphasizing dedication, thoroughness, initiative, and abilities to manage change and solve problems.
Park Ridge Public Library, Park Ridge, Illinois
Outreach Librarian, January 1995vDecember 1998
- Outreach servicesCoordinated annual community open house, which drew 60–80 exhibitors and 300–400 attendees per year; coordinated Mobile Library service and promotion; provided services, assistive technologies, and referrals for patrons with visual, physical and auditory impairments; created and presented programs for community groups and nursing home residents; led book discussions outside of the library.
- Volunteer servicesSupervised volunteer program and 29 departmental volunteers; expanded program and increased volunteers from 21 to 65.
- Adult servicesAssisted patrons in Reader Services department with information needs and in searching the Internet, catalog, and CD-ROMs; provided active and passive reader's advisory services; selected, maintained, and promoted large print and adult literacy collections; led discussion groups; served on the library's technology committee, a city work group to improve interdepartmental relations, a multi-city literacy coalition led by Oakton Community College and several ad hoc committees.
Consistently received superior performance evaluations, emphasizing a strong service-orientation, ability to work well with co-workers and patrons, innovative thinking, and adaptability.
University of Iowa, School of Library and Information Science, Iowa City, Iowa
Research and teaching assistant, May 1993–December 1994
Organized and conducted literature searches; edited manuscripts; identified relevant course topics, located and screened readings, and prepared list of resources for new adult services class; taught PageMaker
Reference worker, August 1992–December 1992 and August 1994–December 1994 Answered bibliographic verification and reference questions generated through statewide network
Undergraduate Scholar Assistant, August 1992–May 1993
Performed online and print literature searches; gathered, evaluated, and organized information
University of Iowa Hospitals and Clinics, Patients' Library, Iowa City, Iowa
Volunteer, May 1994–August 1994
Wrote collection development policy; helped staff library; weeded the young adult collection
PUBLICATIONS
Books
Legal Analysis and Writing: An Active-Learning Approach and accompanying teacher's manual. Wolters Kluwer, 2020. (with Danielle Shelton and Melissa Weresh).
Iowa Legal Research and accompanying teacher's manual. 2d. Carolina Academic Press, 2016. (with John Edwards & Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 4th eBook ed., LexisNexis 2015 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 3d eBook ed., LexisNexis 2014 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 2d eBook ed., LexisNexis 2014 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, eBook ed., LexisNexis 2013 (with Melissa Weresh).
Iowa Legal Research and accompanying teacher's manual. Carolina Academic Press, 2011. (with John Edwards, Sara Lowe & Melissa Weresh).
The Responsive Public Library: How to Develop and Market a Winning Collection. 2d. Englewood, CO: Libraries Unlimited, 2002. (with Sharon L. Baker)
Journal Articles
"Assessing the Effectiveness of Single-Session Legal Research Skill Instruction through Pre- and PostTesting: A Case Study," Law Library Journal, 107, no.1 (Winter 2015): 57–78. (with Rebecca Lutkenhaus). (Publication is refereed.)
"Does the Past Predict the Future?: An Empirical Analysis of Recent Iowa Supreme Court Use of Legislative History as a Window into Statutory Construction in Iowa," 63 Drake L. Rev 239 (2015). (Cited by the Iowa Supreme Court in Brakke v. Iowa Department of Natural Resources 897 N.W.2d 522 (2017) and Doe v. State, 943 N.W.2d 608, 616 (Iowa 2020).)
"HeinOnline and Law Review Citation Patterns," Law Library Journal, 103, no. 1 (Winter 2011): 55–70. (with M. Sara Lowe). (Publication is refereed.)
"Creating an Effective New Employee Orientation Program," Library Leadership and Management 23, no. 4 (Fall 2009): 168–76. (Publication is refereed.)
"Marketing Mindset: Focusing on the Customer from Technical Services to Circulation." Feliciter 53, no. 3 (2007): 126–29.
"Beyond the Newsletter: Concrete Guidelines and Innovative Ideas for Effective Promotion." Public Libraries 43, no. 3 (May/June 2004): 177–181.
Newsletter Articles
"Message from the President," MAALL Markings, 28, no. 4 (Sept. 2019): 3–4.
"Message from the President," MAALL Markings, 28, no. 3 (June 2019): 5–6.
"Message from the President,"
MAALL Markings
, 28, no. 2 (March 2019): 8–9.
"Engage, Explore, Breathe, Act, and Have Fun While You're at It," MAALL Markings, 28, no. 1 (Dec. 2018): 1–3.
"Message from the President," MAALL Markings, 28, no. 1 (Dec. 2018): 14.
"Message from the Vice-President," MAALL Markings, 27, no. 4 (Sept. 2018): 11.
"Message from the Vice-President," MAALL Markings, 27, no. 3 (June 2018): 9–10.
"Message from the Vice-President," MAALL Markings, 27, no. 2 (March 2018): 8–9.
"Somebody Pinch Me," MAALL Markings, 23, no. 2 (March 2014): 4–5.
"Hiring with Less Stress and More Success: Tips from the Field," MAALL Markings, 21, no. 3 (June 2012): 1, 6–11.
Online Tutorials
Using the Iowa Legislature Website. 18-part video series embedded in the Iowa legislature website, published 2018–19. Complete series at https://www.youtube.com/playlist?list=PLr2LKOJxsQug6GJ8xuBQ2xLF0BIrPLaZt (with Emily Kramer).
Iowa Primary Resources. CALI, originally published May 2011, revised August 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/8995 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).
Iowa Secondary Sources. CALI, originally published May 2011, revised September 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/9015 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).
Evaluating Web Sites. CALI, revised June 2019. https://www.cali.org/lesson/817 (building off prior work of Susan Llano, Erin Murphy, and Michelle Cosby).
Legal Research 101: The Tools of the Trade. CALI, revised June 2019. https://www.cali.org/lesson/568 (building off prior work of Sheri H. Lewis).
Reference Works
"Iowa" in State Online Legal Information. American Association of Law Libraries, 2017 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.
"Iowa" in State Online Legal Information. American Association of Law Libraries, 2016 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.
"Iowa" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.
"Nebraska" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.
"Iowa" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.
"Nebraska" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.
PRESENTATIONS AND POSTER SESSIONS
- "Work in the Time of COVID-19: Shift Happens," Mid-America Association of Law Libraries Virtual Meeting, October 15, 2020 (with Sandy Placzek, Allison Reeve Davis, and Sarah Kammer).
- "Answering the Call for Wellness in the Legal Profession," American Association of Law Libraries (AALL) Annual Conference, July 14–16, 2019, Washington, D.C.
- "Strategically Responding to the Call to Improve Mental Health in the Legal Profession," Mid-America Association of Law Libraries Annual Meeting, October 12, 2018, Memphis, TN.
- "Challenging Conventional Wisdom: Using Empirical Research to Help Yourself and Others," MidAmerica Association of Law Libraries Annual Meeting, October 13, 2018, Memphis, TN (with Stefanie Pearlman).
- "It's Hard to Collaborate with Your Foot on My Throat," Mid-America Association of Law Libraries, Law Librarians Association of Wisconsin, Michigan Association of Law Libraries, Minnesota
Association of Law Libraries, and Chicago Association of Law Libraries Joint Annual Meeting. Oct. 19, 2017, Milwaukee, WI (with Rebecca Lutkenhaus).
- "LibGuides Best Practices," Mid-America Association of Law Libraries Annual Meeting, October 14, 2016, Oklahoma City, OK (with Susan Boland, Pam Crawford, Erika Cohn, and Corie Dugas).
- "Legal Research Using the Iowa General Assembly Website," Drake University Continuing Legal Education webcast, July 13, 2017 (with Rebecca Lutkenhaus).
- "Affective Legal Research: Connecting Emotions with the Research Process," Mid-America Association of Law Libraries Annual Meeting, October 18, 2013, Omaha, NE.
- "Why Can't We Have Them at Hello? Overcoming Obstacles to Library Orientation for New Attorneys and Law Faculty Members." Mid-America Association of Law Libraries Annual Meeting, November 3, 2011, Lawrence, KS (with Deborah Grimm).
- "Interdisciplinary Citations in Law Review Articles: Implications for Librarians, Law Students, & Library Collections," July 21–24, 2012. American Association of Law Libraries (AALL) Annual Conference, Boston, MA (with M. Sara Lowe).
- "What if You Don't Have a Whole Semester?" Mid-America Association of Law Libraries Annual Meeting, October 15, 2010, Iowa City, IA (with M. Sara Lowe).
- "Congratulations! You've Hired Someone. Now What?" Drake Excellence in Learning presentation, April 23, 2008, Des Moines, IA.
- "Finding Legal Information." Drake Excellence in Learning presentation, Oct. 21, 2009 and Feb. 25, 2010, Des Moines, IA (with Sue Lerdal).
- "Congratulations! You've Hired Someone. Now What?" Mid-America Association of Law Libraries Annual Meeting, November 2, 2007, Lincoln, NE.
- "Congratulations! You've Hired Someone. Now What?" Drake Excellence in Learning presentation, February 15, 2007, Des Moines, IA.
- "At the Top of the Rise: Government Web Sites That Have Met the Challenge." American Association of Law Libraries presentation, July 15, 2007, New Orleans, LA (with Terrye Conroy, Warren Rees, Jane Edwards, and Joan Shear) (Also served as program coordinator and moderator).
- "New Employee Orientation." Special Libraries across the Metro meeting presentation, January 16, 2007, Des Moines, IA.
- "Basic Legal Reference." Central Iowa Library Service Area continuing education three-credit course, November 10, 2005, Des Moines, IA (with Sue Lerdal and Cheryl Gritton).
- "The Visible Librarian." Special Libraries across the Metro meeting presentation, April 12, 2006, Des Moines, IA.
- "Marketing Safari." LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Oct. 22, 2004, Orland Park, IL.
- "Legal Ease." Central Iowa Library Alliance meeting, April 20, 2004, Des Moines, IA.
- "Collection Development in the Responsive Library." (Presented at two sessions). Delaware Library Association 2003 Annual Conference, May 16, Wilmington, DE.
- "Promotional Principles and Practices." Central Iowa Library Alliance meeting, April 29, 2003, Urbandale, IA (with Jan Kaiser).
- "Out of the Building, but Not Out to Lunch," 2000 Reaching Forward Conference of Library Assistants, April 14, Rosemont, IL (with Karolyn Nance).
- "Just the FAQs: Answers to Your Most Frequently Asked Legal Research Questions," Iowa Library Association—Association of College and Research Libraries section 2002 Spring Conference, April 19, Newton, IA (with David Hanson and Rebecca Lutkenhaus).
- "Original Programming for Seniors." LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Feb. 27, 1998, Western Springs, IL.
PROFESSIONAL PARTICIPATION, SERVICE, AND RECOGNITION
- 2019–20 Friend of the Law Review, awarded by the members of the Drake Law Review
- 2013–14 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law
- 2013–14 Friend of the Law Review, awarded by the members of the Drake Law Review
- 2008–09 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law
- American Association of Law Libraries, Member, 2000–present. Legal Information Services to the Public Special Interest Section, Member, 2001–present. Foreign, Comparative, and International Law Special Interest Section, Member, 2001–2016. Access to Electronic Legal Information Committee, Member, July 2005–July 2007.
- 2006–07 Friend of the Law Review, awarded by the members of the Drake Law Review
- Mid-America Association of Law Libraries, Member, 2000–present. Executive Board Member: Immediate Past President, 2019–20; President, 2018–19; Vice-President/President-Elect, 2017–18; Member-at-Large, 2007–09. Vision Planning Task Force, Chair, 2019–20. 2004 Annual Meeting Local Arrangements Committee Co-Chair, 2003–04. Newsletter Committee, News from Other Chapters coeditor, 2006–09. Membership Committee, Chair, 2009–14. Grants Committee, Member, 2004–08. Nominations Committee, Member, 2001–03, 2008–09; Chair, 2001–02, 2008–09, 2019–20. Education Committee, 2016–18, Chair 2017–18.
- LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and ProgrammingBoard member, 1995–96, 1997–2000; Secretary, 1998–2000. Organized and led ad hoc committee that created an original programming resource guide for interlibrary resource sharing, 1998– 99.
- Special Libraries across the Metro, Steering committee member, 2005–07.
- North Suburban Library System Diversity Committee, Member, 1999–2000
- Leadership Institute at Snowbird, one of 32 nationally selected participants, July 30–Aug. 4, 1998, Snowbird, Utah.
- American Library Association, Member, 1994–2000.
UNIVERSITY AND COMMUNITY SERVICE
- Editor of Drake Law School's two site evaluation questionnaires and school narrative for American Bar Association re-accreditation visit and Association of American Law Schools membership review, 2020–21.
- Drake Law School Assessment Committee, 2015–18
- Drake Law School Mental Health Awareness Task Force, 2016–19
- Drake Law School ad hoc Career Development/Alumni Committee, 2014
- Drake Alma Migration Team, 2015–16
- Drake Law School Curriculum Committee, 2013–14, 2019–20.
- Drake Law School ad hoc committee that prepared Drake's winning application for the ABA's E. Smythe Gambrell Professionalism Award, 2008
- Drake Law School Self-Study and American Bar Association Site Visit Committee, 2004–05, 2010–11
- Drake Law School Strategic Planning Committee, 2003–04
- Phi Beta Kappa, Gamma chapter of Iowa (Drake University), Secretary, 2006–07, 2008–12, 2016–18, 2019–present; Vice President, 2018–19; de facto President, May 2017–Oct. 2017; selection committee member, 2006–12, 2014–15, 2016–2020; chair, subcommittee on member selection, 2017–18 (updated and documented selection criteria and chapter procedures; facilitated committee information sharing and digitized files)
- Drake Law School United Way Campaign Ambassador, 2017
- Drake University Honorary Degree & Drake Medal Committee, 2008–10, chair 2009–10 (committee rewrote procedures during my tenure as chair)
- Drake University Hearing Panel, 2004–06
- Drake National Alumni Scholarship Program Selection Committee, 2004, 2005, 2010, 2017.
- Drake Board of Tellers, 2002–03
- Drake "Bucks or Books" Book Drive Committee Chair, 2002
- Cowles Library Marketing Committee, spring semester 2003
- National Library Week Planning Committee Co-Chair, 2001–05, member 2006
- Library Collaboration Committee, March 2001–August 2001
- Grand View Lutheran Church, Staff Support Committee, member, 2005–07
- Des Moines Public Schools, Middle School Advisory Committee, 2014–15; school volunteer, 2005–07, 2008–10, 2014–20
|
<urn:uuid:daba4734-69ec-433a-ae56-941d94d85b20>
|
CC-MAIN-2021-43
|
https://www.drake.edu/media/collegesschools/law/docs/profiles/Karen-Wallace-cv-2021.pdf
|
2021-10-17T16:18:49+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00252-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 912,367,758
| 5,115
|
eng_Latn
|
eng_Latn
| 0.777057
|
eng_Latn
| 0.897565
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3743,
7551,
10301,
13348,
16999,
20434,
21036
] |
Karen L. Wallace
2127 E. 29 St.
Des Moines, Iowa 50317
EDUCATION
University of Iowa, Iowa City, Iowa
M.A., Library and Information Science, December 1994
- Inducted into Beta Phi Mu
- Passed comprehensive examination with distinction
B.A., Religion, with highest distinction, May 1993
- Studied on exchange at the University of Lancaster, England (1991–92)
- Awarded Sonia Sands Award for Excellence in Judaic Studies and Overall Academic Achievement, Ernest R. Johnson Memorial Prize, Sigma Kappa Scholarship Award (fall 1989, spring 1990, fall 1991), University of Iowa Foundation Honors Award, University of Iowa Presidential Scholarship, University of Iowa Freshman Honors Scholarship, and National Merit Finalist
- Inducted into Phi Beta Kappa, Order of Omega, and Phi Eta Sigma
EXPERIENCE
Drake University Law Library, Des Moines, Iowa
Circulation/Reference Librarian July 2000–present; Instructor of Librarianship, July 2000–May 2003; Assistant Professor of Librarianship, June 2003–May 2004; Associate Professor of Librarianship, June 2004–May 2006; Professor of Librarianship, June 2006–present.
- InstructionProvide instruction to individuals, classes, and other groups, including Drake Law Review and Drake Journal of Agricultural Law. Helped design and continually modify instructional techniques for seminar courses and undergraduate law-related courses, significantly increasing library's presence in the classroom and cocurriculars. Co-taught 2-credit Information Literacy course fall 2009 and fall 2010. Co-created Advanced Legal Research: Iowa Law course, taught spring semesters of 2011–14 and J-Term 2016. Create and maintain instructional research guides (see http://libguides.law.drake.edu/prf.php?account_id=2207).
- Public ServicesAssist faculty, students and other patrons with reference questions, research needs, and general library usage. Collaboratively manage operation of Information Desk. Supervise and evaluate full-time Access Services Associate and, through May 2015, full-time Circulation Administration Assistant. Help train and supervise approximately five part-time student desk supervisors. Manage circulation operations, including system settings as Ex Libris Alma certified administrator. Promote library to its various constituencies. Through Aug. 2020, oversaw use of study and conference rooms.
- Stack MaintenanceEnsure order, completeness, and currency of collection of over 400,000 volumes. Help supervise two to five part-time student shelvers. Oversee reserve operations.
- Administration−Actively participate in forming library policies and procedures. Active participant in strategic planning (chair 2002 Law Library Strategic Planning Committee; member 2003-04 Law School Strategic Planning Committee; member 2019–present ongoing planning committee, chair, 2019 execution subcommittee; member, 2004–05 and 2010–12 Law School Self-Study Committees). Served on ILS migration committees (2001–02 from DRA to Sirsi and 2015-16 from Sirsi to ExLibris) and Law Library tenure committees (2007–17, 2020–21; chair, 2014–15 and 2016–17).
American Judicature Society, Des Moines, Iowa
Researcher, March 2004–September 2004; March 2005–Dec. 2009
Wrote and updated the sections of the National Jury Center Web site linked under "Juror Orientation." Performed additional research, as needed. Suggested and located relevant content for other sections of the site. Helped edit the entire site for its initial launch. The site won the CivicMind Award (November 2004) for improving education about the legal system and enhancing civic participation.
Des Plaines Public Library
, Des Plaines, Illinois
Head of Community Services, January 1999–June 2000
515-262-2713
[email protected]
- Management and staff servicesLed department operations, including Mobile Library service, disability services, community outreach, employee orientation, and volunteer program; hired, trained, supervised, and evaluated staff of four; prepared special departmental budget requests; actively participated in library management team that made and implemented library-wide policies and other decisions; organized and led the staff fun committee (for stress reduction and team building).
- Community servicesSelected, evaluated, and maintained literacy and Mobile Library collections; oversaw $26,500 budget; served on the Oakton Community College Literacy Coalition and the Des Plaines Healthy Community Partnership; wrote and implemented two successful state grants for assistive technology and literacy materials; scheduled and promoted Mobile Library stops and events; assisted patrons on the Mobile Library and, on a substitute-basis, at the reference desk; promoted and provided services and referrals for patrons with disabilities; represented the library at select community events; prepared and presented youth storytimes outside the library.
Received superior performance evaluations, emphasizing dedication, thoroughness, initiative, and abilities to manage change and solve problems.
Park Ridge Public Library, Park Ridge, Illinois
Outreach Librarian, January 1995vDecember 1998
- Outreach servicesCoordinated annual community open house, which drew 60–80 exhibitors and 300–400 attendees per year; coordinated Mobile Library service and promotion; provided services, assistive technologies, and referrals for patrons with visual, physical and auditory impairments; created and presented programs for community groups and nursing home residents; led book discussions outside of the library.
- Volunteer servicesSupervised volunteer program and 29 departmental volunteers; expanded program and increased volunteers from 21 to 65.
- Adult servicesAssisted patrons in Reader Services department with information needs and in searching the Internet, catalog, and CD-ROMs; provided active and passive reader's advisory services; selected, maintained, and promoted large print and adult literacy collections; led discussion groups; served on the library's technology committee, a city work group to improve interdepartmental relations, a multi-city literacy coalition led by Oakton Community College and several ad hoc committees.
Consistently received superior performance evaluations, emphasizing a strong service-orientation, ability to work well with co-workers and patrons, innovative thinking, and adaptability.
University of Iowa, School of Library and Information Science, Iowa City, Iowa
Research and teaching assistant, May 1993–December 1994
Organized and conducted literature searches; edited manuscripts; identified relevant course topics, located and screened readings, and prepared list of resources for new adult services class; taught PageMaker
Reference worker, August 1992–December 1992 and August 1994–December 1994 Answered bibliographic verification and reference questions generated through statewide network
Undergraduate Scholar Assistant, August 1992–May 1993
Performed online and print literature searches; gathered, evaluated, and organized information
University of Iowa Hospitals and Clinics, Patients' Library, Iowa City, Iowa
Volunteer, May 1994–August 1994
Wrote collection development policy; helped staff library; weeded the young adult collection
PUBLICATIONS
Books
Legal Analysis and Writing: An Active-Learning Approach and accompanying teacher's manual. Wolters Kluwer, 2020. (with Danielle Shelton and Melissa Weresh).
Iowa Legal Research and accompanying teacher's manual. 2d. Carolina Academic Press, 2016. (with John Edwards & Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 4th eBook ed., LexisNexis 2015 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 3d eBook ed., LexisNexis 2014 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 2d eBook ed., LexisNexis 2014 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, eBook ed., LexisNexis 2013 (with Melissa Weresh).
Iowa Legal Research and accompanying teacher's manual. Carolina Academic Press, 2011. (with John Edwards, Sara Lowe & Melissa Weresh).
The Responsive Public Library: How to Develop and Market a Winning Collection. 2d. Englewood, CO: Libraries Unlimited, 2002. (with Sharon L. Baker)
Journal Articles
"Assessing the Effectiveness of Single-Session Legal Research Skill Instruction through Pre- and PostTesting: A Case Study," Law Library Journal, 107, no.1 (Winter 2015): 57–78. (with Rebecca Lutkenhaus). (Publication is refereed.)
"Does the Past Predict the Future?: An Empirical Analysis of Recent Iowa Supreme Court Use of Legislative History as a Window into Statutory Construction in Iowa," 63 Drake L. Rev 239 (2015). (Cited by the Iowa Supreme Court in Brakke v. Iowa Department of Natural Resources 897 N.W.2d 522 (2017) and Doe v. State, 943 N.W.2d 608, 616 (Iowa 2020).)
"HeinOnline and Law Review Citation Patterns," Law Library Journal, 103, no. 1 (Winter 2011): 55–70. (with M. Sara Lowe). (Publication is refereed.)
"Creating an Effective New Employee Orientation Program," Library Leadership and Management 23, no. 4 (Fall 2009): 168–76. (Publication is refereed.)
"Marketing Mindset: Focusing on the Customer from Technical Services to Circulation." Feliciter 53, no. 3 (2007): 126–29.
"Beyond the Newsletter: Concrete Guidelines and Innovative Ideas for Effective Promotion." Public Libraries 43, no. 3 (May/June 2004): 177–181.
Newsletter Articles
"Message from the President," MAALL Markings, 28, no. 4 (Sept. 2019): 3–4.
"Message from the President," MAALL Markings, 28, no. 3 (June 2019): 5–6.
"Message from the President,"
MAALL Markings
, 28, no. 2 (March 2019): 8–9.
"Engage, Explore, Breathe, Act, and Have Fun While You're at It," MAALL Markings, 28, no. 1 (Dec. 2018): 1–3.
"Message from the President," MAALL Markings, 28, no. 1 (Dec. 2018): 14.
"Message from the Vice-President," MAALL Markings, 27, no. 4 (Sept. 2018): 11.
"Message from the Vice-President," MAALL Markings, 27, no. 3 (June 2018): 9–10.
"Message from the Vice-President," MAALL Markings, 27, no. 2 (March 2018): 8–9.
"Somebody Pinch Me," MAALL Markings, 23, no. 2 (March 2014): 4–5.
"Hiring with Less Stress and More Success: Tips from the Field," MAALL Markings, 21, no. 3 (June 2012): 1, 6–11.
Online Tutorials
Using the Iowa Legislature Website. 18-part video series embedded in the Iowa legislature website, published 2018–19. Complete series at https://www.youtube.com/playlist?list=PLr2LKOJxsQug6GJ8xuBQ2xLF0BIrPLaZt (with Emily Kramer).
Iowa Primary Resources. CALI, originally published May 2011, revised August 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/8995 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).
Iowa Secondary Sources. CALI, originally published May 2011, revised September 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/9015 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).
Evaluating Web Sites. CALI, revised June 2019. https://www.cali.org/lesson/817 (building off prior work of Susan Llano, Erin Murphy, and Michelle Cosby).
Legal Research 101: The Tools of the Trade. CALI, revised June 2019. https://www.cali.org/lesson/568 (building off prior work of Sheri H. Lewis).
Reference Works
"Iowa" in State Online Legal Information. American Association of Law Libraries, 2017 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.
"Iowa" in State Online Legal Information. American Association of Law Libraries, 2016 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.
"Iowa" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.
"Nebraska" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.
"Iowa" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.
"Nebraska" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.
PRESENTATIONS AND POSTER SESSIONS
- "Work in the Time of COVID-19: Shift Happens," Mid-America Association of Law Libraries Virtual Meeting, October 15, 2020 (with Sandy Placzek, Allison Reeve Davis, and Sarah Kammer).
- "Answering the Call for Wellness in the Legal Profession," American Association of Law Libraries (AALL) Annual Conference, July 14–16, 2019, Washington, D.C.
- "Strategically Responding to the Call to Improve Mental Health in the Legal Profession," Mid-America Association of Law Libraries Annual Meeting, October 12, 2018, Memphis, TN.
- "Challenging Conventional Wisdom: Using Empirical Research to Help Yourself and Others," MidAmerica Association of Law Libraries Annual Meeting, October 13, 2018, Memphis, TN (with Stefanie Pearlman).
- "It's Hard to Collaborate with Your Foot on My Throat," Mid-America Association of Law Libraries, Law Librarians Association of Wisconsin, Michigan Association of Law Libraries, Minnesota
Association of Law Libraries, and Chicago Association of Law Libraries Joint Annual Meeting. Oct. 19, 2017, Milwaukee, WI (with Rebecca Lutkenhaus).
- "LibGuides Best Practices," Mid-America Association of Law Libraries Annual Meeting, October 14, 2016, Oklahoma City, OK (with Susan Boland, Pam Crawford, Erika Cohn, and Corie Dugas).
- "Legal Research Using the Iowa General Assembly Website," Drake University Continuing Legal Education webcast, July 13, 2017 (with Rebecca Lutkenhaus).
- "Affective Legal Research: Connecting Emotions with the Research Process," Mid-America Association of Law Libraries Annual Meeting, October 18, 2013, Omaha, NE.
- "Why Can't We Have Them at Hello? Overcoming Obstacles to Library Orientation for New Attorneys and Law Faculty Members." Mid-America Association of Law Libraries Annual Meeting, November 3, 2011, Lawrence, KS (with Deborah Grimm).
- "Interdisciplinary Citations in Law Review Articles: Implications for Librarians, Law Students, & Library Collections," July 21–24, 2012. American Association of Law Libraries (AALL) Annual Conference, Boston, MA (with M. Sara Lowe).
- "What if You Don't Have a Whole Semester?" Mid-America Association of Law Libraries Annual Meeting, October 15, 2010, Iowa City, IA (with M. Sara Lowe).
- "Congratulations! You've Hired Someone. Now What?" Drake Excellence in Learning presentation, April 23, 2008, Des Moines, IA.
- "Finding Legal Information." Drake Excellence in Learning presentation, Oct. 21, 2009 and Feb. 25, 2010, Des Moines, IA (with Sue Lerdal).
- "Congratulations! You've Hired Someone. Now What?" Mid-America Association of Law Libraries Annual Meeting, November 2, 2007, Lincoln, NE.
- "Congratulations! You've Hired Someone. Now What?" Drake Excellence in Learning presentation, February 15, 2007, Des Moines, IA.
- "At the Top of the Rise: Government Web Sites That Have Met the Challenge." American Association of Law Libraries presentation, July 15, 2007, New Orleans, LA (with Terrye Conroy, Warren Rees, Jane Edwards, and Joan Shear) (Also served as program coordinator and moderator).
- "New Employee Orientation." Special Libraries across the Metro meeting presentation, January 16, 2007, Des Moines, IA.
- "Basic Legal Reference." Central Iowa Library Service Area continuing education three-credit course, November 10, 2005, Des Moines, IA (with Sue Lerdal and Cheryl Gritton).
- "The Visible Librarian." Special Libraries across the Metro meeting presentation, April 12, 2006, Des Moines, IA.
- "Marketing Safari." LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Oct. 22, 2004, Orland Park, IL.
- "Legal Ease." Central Iowa Library Alliance meeting, April 20, 2004, Des Moines, IA.
- "Collection Development in the Responsive Library." (Presented at two sessions). Delaware Library Association 2003 Annual Conference, May 16, Wilmington, DE.
- "Promotional Principles and Practices." Central Iowa Library Alliance meeting, April 29, 2003, Urbandale, IA (with Jan Kaiser).
- "Out of the Building, but Not Out to Lunch," 2000 Reaching Forward Conference of Library Assistants, April 14, Rosemont, IL (with Karolyn Nance).
- "Just the FAQs: Answers to Your Most Frequently Asked Legal Research Questions," Iowa Library Association—Association of College and Research Libraries section 2002 Spring Conference, April 19, Newton, IA (with David Hanson and Rebecca Lutkenhaus).
- "Original Programming for Seniors." LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Feb. 27, 1998, Western Springs, IL.
PROFESSIONAL PARTICIPATION, SERVICE, AND RECOGNITION
- 2019–20 Friend of the Law Review, awarded by the members of the Drake Law Review
- 2013–14 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law
- 2013–14 Friend of the Law Review, awarded by the members of the Drake Law Review
- 2008–09 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law
- American Association of Law Libraries, Member, 2000–present. Legal Information Services to the Public Special Interest Section, Member, 2001–present. Foreign, Comparative, and International Law Special Interest Section, Member, 2001–2016. Access to Electronic Legal Information Committee, Member, July 2005–July 2007.
- 2006–07 Friend of the Law Review, awarded by the members of the Drake Law Review
- Mid-America Association of Law Libraries, Member, 2000–present. Executive Board Member: Immediate Past President, 2019–20; President, 2018–19; Vice-President/President-Elect, 2017–18; Member-at-Large, 2007–09. Vision Planning Task Force, Chair, 2019–20. 2004 Annual Meeting Local Arrangements Committee Co-Chair, 2003–04. Newsletter Committee, News from Other Chapters coeditor, 2006–09. Membership Committee, Chair, 2009–14. Grants Committee, Member, 2004–08. Nominations Committee, Member, 2001–03, 2008–09; Chair, 2001–02, 2008–09, 2019–20. Education Committee, 2016–18, Chair 2017–18.
- LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and ProgrammingBoard member, 1995–96, 1997–2000; Secretary, 1998–2000. Organized and led ad hoc committee that created an original programming resource guide for interlibrary resource sharing, 1998– 99.
- Special Libraries across the Metro, Steering committee member, 2005–07.
- North Suburban Library System Diversity Committee, Member, 1999–2000
- Leadership Institute at Snowbird, one of 32 nationally selected participants, July 30–Aug.
|
4, 1998, Snowbird, Utah.
|
- American Library Association, Member, 1994–2000.
UNIVERSITY AND COMMUNITY SERVICE
- Editor of Drake Law School's two site evaluation questionnaires and school narrative for American Bar Association re-accreditation visit and Association of American Law Schools membership review, 2020–21.
- Drake Law School Assessment Committee, 2015–18
- Drake Law School Mental Health Awareness Task Force, 2016–19
- Drake Law School ad hoc Career Development/Alumni Committee, 2014
- Drake Alma Migration Team, 2015–16
- Drake Law School Curriculum Committee, 2013–14, 2019–20.
- Drake Law School ad hoc committee that prepared Drake's winning application for the ABA's E. Smythe Gambrell Professionalism Award, 2008
- Drake Law School Self-Study and American Bar Association Site Visit Committee, 2004–05, 2010–11
- Drake Law School Strategic Planning Committee, 2003–04
- Phi Beta Kappa, Gamma chapter of Iowa (Drake University), Secretary, 2006–07, 2008–12, 2016–18, 2019–present; Vice President, 2018–19; de facto President, May 2017–Oct. 2017; selection committee member, 2006–12, 2014–15, 2016–2020; chair, subcommittee on member selection, 2017–18 (updated and documented selection criteria and chapter procedures; facilitated committee information sharing and digitized files)
- Drake Law School United Way Campaign Ambassador, 2017
- Drake University Honorary Degree & Drake Medal Committee, 2008–10, chair 2009–10 (committee rewrote procedures during my tenure as chair)
- Drake University Hearing Panel, 2004–06
- Drake National Alumni Scholarship Program Selection Committee, 2004, 2005, 2010, 2017.
- Drake Board of Tellers, 2002–03
- Drake "Bucks or Books" Book Drive Committee Chair, 2002
- Cowles Library Marketing Committee, spring semester 2003
- National Library Week Planning Committee Co-Chair, 2001–05, member 2006
- Library Collaboration Committee, March 2001–August 2001
- Grand View Lutheran Church, Staff Support Committee, member, 2005–07
- Des Moines Public Schools, Middle School Advisory Committee, 2014–15; school volunteer, 2005–07, 2008–10, 2014–20
| 18,945
|
inside_word
|
4,
|
remove_one_sentence
|
<url>
https://www.drake.edu/media/collegesschools/law/docs/profiles/Karen-Wallace-cv-2021.pdf
</url>
<text>
Karen L. Wallace
2127 E. 29 St.
Des Moines, Iowa 50317
EDUCATION
University of Iowa, Iowa City, Iowa
M.A., Library and Information Science, December 1994
- Inducted into Beta Phi Mu
- Passed comprehensive examination with distinction
B.A., Religion, with highest distinction, May 1993
- Studied on exchange at the University of Lancaster, England (1991–92)
- Awarded Sonia Sands Award for Excellence in Judaic Studies and Overall Academic Achievement, Ernest R. Johnson Memorial Prize, Sigma Kappa Scholarship Award (fall 1989, spring 1990, fall 1991), University of Iowa Foundation Honors Award, University of Iowa Presidential Scholarship, University of Iowa Freshman Honors Scholarship, and National Merit Finalist
- Inducted into Phi Beta Kappa, Order of Omega, and Phi Eta Sigma
EXPERIENCE
Drake University Law Library, Des Moines, Iowa
Circulation/Reference Librarian July 2000–present; Instructor of Librarianship, July 2000–May 2003; Assistant Professor of Librarianship, June 2003–May 2004; Associate Professor of Librarianship, June 2004–May 2006; Professor of Librarianship, June 2006–present.
- InstructionProvide instruction to individuals, classes, and other groups, including Drake Law Review and Drake Journal of Agricultural Law. Helped design and continually modify instructional techniques for seminar courses and undergraduate law-related courses, significantly increasing library's presence in the classroom and cocurriculars. Co-taught 2-credit Information Literacy course fall 2009 and fall 2010. Co-created Advanced Legal Research: Iowa Law course, taught spring semesters of 2011–14 and J-Term 2016. Create and maintain instructional research guides (see http://libguides.law.drake.edu/prf.php?account_id=2207).
- Public ServicesAssist faculty, students and other patrons with reference questions, research needs, and general library usage. Collaboratively manage operation of Information Desk. Supervise and evaluate full-time Access Services Associate and, through May 2015, full-time Circulation Administration Assistant. Help train and supervise approximately five part-time student desk supervisors. Manage circulation operations, including system settings as Ex Libris Alma certified administrator. Promote library to its various constituencies. Through Aug. 2020, oversaw use of study and conference rooms.
- Stack MaintenanceEnsure order, completeness, and currency of collection of over 400,000 volumes. Help supervise two to five part-time student shelvers. Oversee reserve operations.
- Administration−Actively participate in forming library policies and procedures. Active participant in strategic planning (chair 2002 Law Library Strategic Planning Committee; member 2003-04 Law School Strategic Planning Committee; member 2019–present ongoing planning committee, chair, 2019 execution subcommittee; member, 2004–05 and 2010–12 Law School Self-Study Committees). Served on ILS migration committees (2001–02 from DRA to Sirsi and 2015-16 from Sirsi to ExLibris) and Law Library tenure committees (2007–17, 2020–21; chair, 2014–15 and 2016–17).
American Judicature Society, Des Moines, Iowa
Researcher, March 2004–September 2004; March 2005–Dec. 2009
Wrote and updated the sections of the National Jury Center Web site linked under "Juror Orientation." Performed additional research, as needed. Suggested and located relevant content for other sections of the site. Helped edit the entire site for its initial launch. The site won the CivicMind Award (November 2004) for improving education about the legal system and enhancing civic participation.
Des Plaines Public Library
, Des Plaines, Illinois
Head of Community Services, January 1999–June 2000
515-262-2713
[email protected]
- Management and staff servicesLed department operations, including Mobile Library service, disability services, community outreach, employee orientation, and volunteer program; hired, trained, supervised, and evaluated staff of four; prepared special departmental budget requests; actively participated in library management team that made and implemented library-wide policies and other decisions; organized and led the staff fun committee (for stress reduction and team building).
- Community servicesSelected, evaluated, and maintained literacy and Mobile Library collections; oversaw $26,500 budget; served on the Oakton Community College Literacy Coalition and the Des Plaines Healthy Community Partnership; wrote and implemented two successful state grants for assistive technology and literacy materials; scheduled and promoted Mobile Library stops and events; assisted patrons on the Mobile Library and, on a substitute-basis, at the reference desk; promoted and provided services and referrals for patrons with disabilities; represented the library at select community events; prepared and presented youth storytimes outside the library.
Received superior performance evaluations, emphasizing dedication, thoroughness, initiative, and abilities to manage change and solve problems.
Park Ridge Public Library, Park Ridge, Illinois
Outreach Librarian, January 1995vDecember 1998
- Outreach servicesCoordinated annual community open house, which drew 60–80 exhibitors and 300–400 attendees per year; coordinated Mobile Library service and promotion; provided services, assistive technologies, and referrals for patrons with visual, physical and auditory impairments; created and presented programs for community groups and nursing home residents; led book discussions outside of the library.
- Volunteer servicesSupervised volunteer program and 29 departmental volunteers; expanded program and increased volunteers from 21 to 65.
- Adult servicesAssisted patrons in Reader Services department with information needs and in searching the Internet, catalog, and CD-ROMs; provided active and passive reader's advisory services; selected, maintained, and promoted large print and adult literacy collections; led discussion groups; served on the library's technology committee, a city work group to improve interdepartmental relations, a multi-city literacy coalition led by Oakton Community College and several ad hoc committees.
Consistently received superior performance evaluations, emphasizing a strong service-orientation, ability to work well with co-workers and patrons, innovative thinking, and adaptability.
University of Iowa, School of Library and Information Science, Iowa City, Iowa
Research and teaching assistant, May 1993–December 1994
Organized and conducted literature searches; edited manuscripts; identified relevant course topics, located and screened readings, and prepared list of resources for new adult services class; taught PageMaker
Reference worker, August 1992–December 1992 and August 1994–December 1994 Answered bibliographic verification and reference questions generated through statewide network
Undergraduate Scholar Assistant, August 1992–May 1993
Performed online and print literature searches; gathered, evaluated, and organized information
University of Iowa Hospitals and Clinics, Patients' Library, Iowa City, Iowa
Volunteer, May 1994–August 1994
Wrote collection development policy; helped staff library; weeded the young adult collection
PUBLICATIONS
Books
Legal Analysis and Writing: An Active-Learning Approach and accompanying teacher's manual. Wolters Kluwer, 2020. (with Danielle Shelton and Melissa Weresh).
Iowa Legal Research and accompanying teacher's manual. 2d. Carolina Academic Press, 2016. (with John Edwards & Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 4th eBook ed., LexisNexis 2015 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 3d eBook ed., LexisNexis 2014 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 2d eBook ed., LexisNexis 2014 (with Melissa Weresh).
Legal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, eBook ed., LexisNexis 2013 (with Melissa Weresh).
Iowa Legal Research and accompanying teacher's manual. Carolina Academic Press, 2011. (with John Edwards, Sara Lowe & Melissa Weresh).
The Responsive Public Library: How to Develop and Market a Winning Collection. 2d. Englewood, CO: Libraries Unlimited, 2002. (with Sharon L. Baker)
Journal Articles
"Assessing the Effectiveness of Single-Session Legal Research Skill Instruction through Pre- and PostTesting: A Case Study," Law Library Journal, 107, no.1 (Winter 2015): 57–78. (with Rebecca Lutkenhaus). (Publication is refereed.)
"Does the Past Predict the Future?: An Empirical Analysis of Recent Iowa Supreme Court Use of Legislative History as a Window into Statutory Construction in Iowa," 63 Drake L. Rev 239 (2015). (Cited by the Iowa Supreme Court in Brakke v. Iowa Department of Natural Resources 897 N.W.2d 522 (2017) and Doe v. State, 943 N.W.2d 608, 616 (Iowa 2020).)
"HeinOnline and Law Review Citation Patterns," Law Library Journal, 103, no. 1 (Winter 2011): 55–70. (with M. Sara Lowe). (Publication is refereed.)
"Creating an Effective New Employee Orientation Program," Library Leadership and Management 23, no. 4 (Fall 2009): 168–76. (Publication is refereed.)
"Marketing Mindset: Focusing on the Customer from Technical Services to Circulation." Feliciter 53, no. 3 (2007): 126–29.
"Beyond the Newsletter: Concrete Guidelines and Innovative Ideas for Effective Promotion." Public Libraries 43, no. 3 (May/June 2004): 177–181.
Newsletter Articles
"Message from the President," MAALL Markings, 28, no. 4 (Sept. 2019): 3–4.
"Message from the President," MAALL Markings, 28, no. 3 (June 2019): 5–6.
"Message from the President,"
MAALL Markings
, 28, no. 2 (March 2019): 8–9.
"Engage, Explore, Breathe, Act, and Have Fun While You're at It," MAALL Markings, 28, no. 1 (Dec. 2018): 1–3.
"Message from the President," MAALL Markings, 28, no. 1 (Dec. 2018): 14.
"Message from the Vice-President," MAALL Markings, 27, no. 4 (Sept. 2018): 11.
"Message from the Vice-President," MAALL Markings, 27, no. 3 (June 2018): 9–10.
"Message from the Vice-President," MAALL Markings, 27, no. 2 (March 2018): 8–9.
"Somebody Pinch Me," MAALL Markings, 23, no. 2 (March 2014): 4–5.
"Hiring with Less Stress and More Success: Tips from the Field," MAALL Markings, 21, no. 3 (June 2012): 1, 6–11.
Online Tutorials
Using the Iowa Legislature Website. 18-part video series embedded in the Iowa legislature website, published 2018–19. Complete series at https://www.youtube.com/playlist?list=PLr2LKOJxsQug6GJ8xuBQ2xLF0BIrPLaZt (with Emily Kramer).
Iowa Primary Resources. CALI, originally published May 2011, revised August 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/8995 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).
Iowa Secondary Sources. CALI, originally published May 2011, revised September 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/9015 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).
Evaluating Web Sites. CALI, revised June 2019. https://www.cali.org/lesson/817 (building off prior work of Susan Llano, Erin Murphy, and Michelle Cosby).
Legal Research 101: The Tools of the Trade. CALI, revised June 2019. https://www.cali.org/lesson/568 (building off prior work of Sheri H. Lewis).
Reference Works
"Iowa" in State Online Legal Information. American Association of Law Libraries, 2017 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.
"Iowa" in State Online Legal Information. American Association of Law Libraries, 2016 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.
"Iowa" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.
"Nebraska" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.
"Iowa" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.
"Nebraska" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.
PRESENTATIONS AND POSTER SESSIONS
- "Work in the Time of COVID-19: Shift Happens," Mid-America Association of Law Libraries Virtual Meeting, October 15, 2020 (with Sandy Placzek, Allison Reeve Davis, and Sarah Kammer).
- "Answering the Call for Wellness in the Legal Profession," American Association of Law Libraries (AALL) Annual Conference, July 14–16, 2019, Washington, D.C.
- "Strategically Responding to the Call to Improve Mental Health in the Legal Profession," Mid-America Association of Law Libraries Annual Meeting, October 12, 2018, Memphis, TN.
- "Challenging Conventional Wisdom: Using Empirical Research to Help Yourself and Others," MidAmerica Association of Law Libraries Annual Meeting, October 13, 2018, Memphis, TN (with Stefanie Pearlman).
- "It's Hard to Collaborate with Your Foot on My Throat," Mid-America Association of Law Libraries, Law Librarians Association of Wisconsin, Michigan Association of Law Libraries, Minnesota
Association of Law Libraries, and Chicago Association of Law Libraries Joint Annual Meeting. Oct. 19, 2017, Milwaukee, WI (with Rebecca Lutkenhaus).
- "LibGuides Best Practices," Mid-America Association of Law Libraries Annual Meeting, October 14, 2016, Oklahoma City, OK (with Susan Boland, Pam Crawford, Erika Cohn, and Corie Dugas).
- "Legal Research Using the Iowa General Assembly Website," Drake University Continuing Legal Education webcast, July 13, 2017 (with Rebecca Lutkenhaus).
- "Affective Legal Research: Connecting Emotions with the Research Process," Mid-America Association of Law Libraries Annual Meeting, October 18, 2013, Omaha, NE.
- "Why Can't We Have Them at Hello? Overcoming Obstacles to Library Orientation for New Attorneys and Law Faculty Members." Mid-America Association of Law Libraries Annual Meeting, November 3, 2011, Lawrence, KS (with Deborah Grimm).
- "Interdisciplinary Citations in Law Review Articles: Implications for Librarians, Law Students, & Library Collections," July 21–24, 2012. American Association of Law Libraries (AALL) Annual Conference, Boston, MA (with M. Sara Lowe).
- "What if You Don't Have a Whole Semester?" Mid-America Association of Law Libraries Annual Meeting, October 15, 2010, Iowa City, IA (with M. Sara Lowe).
- "Congratulations! You've Hired Someone. Now What?" Drake Excellence in Learning presentation, April 23, 2008, Des Moines, IA.
- "Finding Legal Information." Drake Excellence in Learning presentation, Oct. 21, 2009 and Feb. 25, 2010, Des Moines, IA (with Sue Lerdal).
- "Congratulations! You've Hired Someone. Now What?" Mid-America Association of Law Libraries Annual Meeting, November 2, 2007, Lincoln, NE.
- "Congratulations! You've Hired Someone. Now What?" Drake Excellence in Learning presentation, February 15, 2007, Des Moines, IA.
- "At the Top of the Rise: Government Web Sites That Have Met the Challenge." American Association of Law Libraries presentation, July 15, 2007, New Orleans, LA (with Terrye Conroy, Warren Rees, Jane Edwards, and Joan Shear) (Also served as program coordinator and moderator).
- "New Employee Orientation." Special Libraries across the Metro meeting presentation, January 16, 2007, Des Moines, IA.
- "Basic Legal Reference." Central Iowa Library Service Area continuing education three-credit course, November 10, 2005, Des Moines, IA (with Sue Lerdal and Cheryl Gritton).
- "The Visible Librarian." Special Libraries across the Metro meeting presentation, April 12, 2006, Des Moines, IA.
- "Marketing Safari." LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Oct. 22, 2004, Orland Park, IL.
- "Legal Ease." Central Iowa Library Alliance meeting, April 20, 2004, Des Moines, IA.
- "Collection Development in the Responsive Library." (Presented at two sessions). Delaware Library Association 2003 Annual Conference, May 16, Wilmington, DE.
- "Promotional Principles and Practices." Central Iowa Library Alliance meeting, April 29, 2003, Urbandale, IA (with Jan Kaiser).
- "Out of the Building, but Not Out to Lunch," 2000 Reaching Forward Conference of Library Assistants, April 14, Rosemont, IL (with Karolyn Nance).
- "Just the FAQs: Answers to Your Most Frequently Asked Legal Research Questions," Iowa Library Association—Association of College and Research Libraries section 2002 Spring Conference, April 19, Newton, IA (with David Hanson and Rebecca Lutkenhaus).
- "Original Programming for Seniors." LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Feb. 27, 1998, Western Springs, IL.
PROFESSIONAL PARTICIPATION, SERVICE, AND RECOGNITION
- 2019–20 Friend of the Law Review, awarded by the members of the Drake Law Review
- 2013–14 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law
- 2013–14 Friend of the Law Review, awarded by the members of the Drake Law Review
- 2008–09 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law
- American Association of Law Libraries, Member, 2000–present. Legal Information Services to the Public Special Interest Section, Member, 2001–present. Foreign, Comparative, and International Law Special Interest Section, Member, 2001–2016. Access to Electronic Legal Information Committee, Member, July 2005–July 2007.
- 2006–07 Friend of the Law Review, awarded by the members of the Drake Law Review
- Mid-America Association of Law Libraries, Member, 2000–present. Executive Board Member: Immediate Past President, 2019–20; President, 2018–19; Vice-President/President-Elect, 2017–18; Member-at-Large, 2007–09. Vision Planning Task Force, Chair, 2019–20. 2004 Annual Meeting Local Arrangements Committee Co-Chair, 2003–04. Newsletter Committee, News from Other Chapters coeditor, 2006–09. Membership Committee, Chair, 2009–14. Grants Committee, Member, 2004–08. Nominations Committee, Member, 2001–03, 2008–09; Chair, 2001–02, 2008–09, 2019–20. Education Committee, 2016–18, Chair 2017–18.
- LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and ProgrammingBoard member, 1995–96, 1997–2000; Secretary, 1998–2000. Organized and led ad hoc committee that created an original programming resource guide for interlibrary resource sharing, 1998– 99.
- Special Libraries across the Metro, Steering committee member, 2005–07.
- North Suburban Library System Diversity Committee, Member, 1999–2000
- Leadership Institute at Snowbird, one of 32 nationally selected participants, July 30–Aug. <cursor_is_here>
- American Library Association, Member, 1994–2000.
UNIVERSITY AND COMMUNITY SERVICE
- Editor of Drake Law School's two site evaluation questionnaires and school narrative for American Bar Association re-accreditation visit and Association of American Law Schools membership review, 2020–21.
- Drake Law School Assessment Committee, 2015–18
- Drake Law School Mental Health Awareness Task Force, 2016–19
- Drake Law School ad hoc Career Development/Alumni Committee, 2014
- Drake Alma Migration Team, 2015–16
- Drake Law School Curriculum Committee, 2013–14, 2019–20.
- Drake Law School ad hoc committee that prepared Drake's winning application for the ABA's E. Smythe Gambrell Professionalism Award, 2008
- Drake Law School Self-Study and American Bar Association Site Visit Committee, 2004–05, 2010–11
- Drake Law School Strategic Planning Committee, 2003–04
- Phi Beta Kappa, Gamma chapter of Iowa (Drake University), Secretary, 2006–07, 2008–12, 2016–18, 2019–present; Vice President, 2018–19; de facto President, May 2017–Oct. 2017; selection committee member, 2006–12, 2014–15, 2016–2020; chair, subcommittee on member selection, 2017–18 (updated and documented selection criteria and chapter procedures; facilitated committee information sharing and digitized files)
- Drake Law School United Way Campaign Ambassador, 2017
- Drake University Honorary Degree & Drake Medal Committee, 2008–10, chair 2009–10 (committee rewrote procedures during my tenure as chair)
- Drake University Hearing Panel, 2004–06
- Drake National Alumni Scholarship Program Selection Committee, 2004, 2005, 2010, 2017.
- Drake Board of Tellers, 2002–03
- Drake "Bucks or Books" Book Drive Committee Chair, 2002
- Cowles Library Marketing Committee, spring semester 2003
- National Library Week Planning Committee Co-Chair, 2001–05, member 2006
- Library Collaboration Committee, March 2001–August 2001
- Grand View Lutheran Church, Staff Support Committee, member, 2005–07
- Des Moines Public Schools, Middle School Advisory Committee, 2014–15; school volunteer, 2005–07, 2008–10, 2014–20
</text>
|
[
{
"content": "<url>\nhttps://www.drake.edu/media/collegesschools/law/docs/profiles/Karen-Wallace-cv-2021.pdf\n</url>\n<text>\nKaren L. Wallace\n\n2127 E. 29 St.\n\nDes Moines, Iowa 50317\n\nEDUCATION\n\nUniversity of Iowa, Iowa City, Iowa\n\nM.A., Library and Information Science, December 1994\n\n- Inducted into Beta Phi Mu\n- Passed comprehensive examination with distinction\n\nB.A., Religion, with highest distinction, May 1993\n\n- Studied on exchange at the University of Lancaster, England (1991–92)\n- Awarded Sonia Sands Award for Excellence in Judaic Studies and Overall Academic Achievement, Ernest R. Johnson Memorial Prize, Sigma Kappa Scholarship Award (fall 1989, spring 1990, fall 1991), University of Iowa Foundation Honors Award, University of Iowa Presidential Scholarship, University of Iowa Freshman Honors Scholarship, and National Merit Finalist\n- Inducted into Phi Beta Kappa, Order of Omega, and Phi Eta Sigma\n\nEXPERIENCE\n\nDrake University Law Library, Des Moines, Iowa\n\nCirculation/Reference Librarian July 2000–present; Instructor of Librarianship, July 2000–May 2003; Assistant Professor of Librarianship, June 2003–May 2004; Associate Professor of Librarianship, June 2004–May 2006; Professor of Librarianship, June 2006–present.\n\n- InstructionProvide instruction to individuals, classes, and other groups, including Drake Law Review and Drake Journal of Agricultural Law. Helped design and continually modify instructional techniques for seminar courses and undergraduate law-related courses, significantly increasing library's presence in the classroom and cocurriculars. Co-taught 2-credit Information Literacy course fall 2009 and fall 2010. Co-created Advanced Legal Research: Iowa Law course, taught spring semesters of 2011–14 and J-Term 2016. Create and maintain instructional research guides (see http://libguides.law.drake.edu/prf.php?account_id=2207).\n- Public ServicesAssist faculty, students and other patrons with reference questions, research needs, and general library usage. Collaboratively manage operation of Information Desk. Supervise and evaluate full-time Access Services Associate and, through May 2015, full-time Circulation Administration Assistant. Help train and supervise approximately five part-time student desk supervisors. Manage circulation operations, including system settings as Ex Libris Alma certified administrator. Promote library to its various constituencies. Through Aug. 2020, oversaw use of study and conference rooms.\n- Stack MaintenanceEnsure order, completeness, and currency of collection of over 400,000 volumes. Help supervise two to five part-time student shelvers. Oversee reserve operations.\n- Administration−Actively participate in forming library policies and procedures. Active participant in strategic planning (chair 2002 Law Library Strategic Planning Committee; member 2003-04 Law School Strategic Planning Committee; member 2019–present ongoing planning committee, chair, 2019 execution subcommittee; member, 2004–05 and 2010–12 Law School Self-Study Committees). Served on ILS migration committees (2001–02 from DRA to Sirsi and 2015-16 from Sirsi to ExLibris) and Law Library tenure committees (2007–17, 2020–21; chair, 2014–15 and 2016–17).\n\nAmerican Judicature Society, Des Moines, Iowa\n\nResearcher, March 2004–September 2004; March 2005–Dec. 2009\n\nWrote and updated the sections of the National Jury Center Web site linked under \"Juror Orientation.\" Performed additional research, as needed. Suggested and located relevant content for other sections of the site. Helped edit the entire site for its initial launch. The site won the CivicMind Award (November 2004) for improving education about the legal system and enhancing civic participation.\n\nDes Plaines Public Library\n\n, Des Plaines, Illinois\n\nHead of Community Services, January 1999–June 2000\n\n515-262-2713\n\[email protected]\n\n- Management and staff servicesLed department operations, including Mobile Library service, disability services, community outreach, employee orientation, and volunteer program; hired, trained, supervised, and evaluated staff of four; prepared special departmental budget requests; actively participated in library management team that made and implemented library-wide policies and other decisions; organized and led the staff fun committee (for stress reduction and team building).\n- Community servicesSelected, evaluated, and maintained literacy and Mobile Library collections; oversaw $26,500 budget; served on the Oakton Community College Literacy Coalition and the Des Plaines Healthy Community Partnership; wrote and implemented two successful state grants for assistive technology and literacy materials; scheduled and promoted Mobile Library stops and events; assisted patrons on the Mobile Library and, on a substitute-basis, at the reference desk; promoted and provided services and referrals for patrons with disabilities; represented the library at select community events; prepared and presented youth storytimes outside the library.\n\nReceived superior performance evaluations, emphasizing dedication, thoroughness, initiative, and abilities to manage change and solve problems.\n\nPark Ridge Public Library, Park Ridge, Illinois\n\nOutreach Librarian, January 1995vDecember 1998\n\n- Outreach servicesCoordinated annual community open house, which drew 60–80 exhibitors and 300–400 attendees per year; coordinated Mobile Library service and promotion; provided services, assistive technologies, and referrals for patrons with visual, physical and auditory impairments; created and presented programs for community groups and nursing home residents; led book discussions outside of the library.\n- Volunteer servicesSupervised volunteer program and 29 departmental volunteers; expanded program and increased volunteers from 21 to 65.\n- Adult servicesAssisted patrons in Reader Services department with information needs and in searching the Internet, catalog, and CD-ROMs; provided active and passive reader's advisory services; selected, maintained, and promoted large print and adult literacy collections; led discussion groups; served on the library's technology committee, a city work group to improve interdepartmental relations, a multi-city literacy coalition led by Oakton Community College and several ad hoc committees.\n\nConsistently received superior performance evaluations, emphasizing a strong service-orientation, ability to work well with co-workers and patrons, innovative thinking, and adaptability.\n\nUniversity of Iowa, School of Library and Information Science, Iowa City, Iowa\n\nResearch and teaching assistant, May 1993–December 1994\n\nOrganized and conducted literature searches; edited manuscripts; identified relevant course topics, located and screened readings, and prepared list of resources for new adult services class; taught PageMaker\n\nReference worker, August 1992–December 1992 and August 1994–December 1994 Answered bibliographic verification and reference questions generated through statewide network\n\nUndergraduate Scholar Assistant, August 1992–May 1993\n\nPerformed online and print literature searches; gathered, evaluated, and organized information\n\nUniversity of Iowa Hospitals and Clinics, Patients' Library, Iowa City, Iowa\n\nVolunteer, May 1994–August 1994\n\nWrote collection development policy; helped staff library; weeded the young adult collection\n\nPUBLICATIONS\n\nBooks\n\nLegal Analysis and Writing: An Active-Learning Approach and accompanying teacher's manual. Wolters Kluwer, 2020. (with Danielle Shelton and Melissa Weresh).\n\nIowa Legal Research and accompanying teacher's manual. 2d. Carolina Academic Press, 2016. (with John Edwards & Melissa Weresh).\n\nLegal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 4th eBook ed., LexisNexis 2015 (with Melissa Weresh).\n\nLegal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 3d eBook ed., LexisNexis 2014 (with Melissa Weresh).\n\nLegal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, 2d eBook ed., LexisNexis 2014 (with Melissa Weresh).\n\nLegal Research Supplement: Exercises on Lexis Advance. Student and teacher versions, eBook ed., LexisNexis 2013 (with Melissa Weresh).\n\nIowa Legal Research and accompanying teacher's manual. Carolina Academic Press, 2011. (with John Edwards, Sara Lowe & Melissa Weresh).\n\nThe Responsive Public Library: How to Develop and Market a Winning Collection. 2d. Englewood, CO: Libraries Unlimited, 2002. (with Sharon L. Baker)\n\nJournal Articles\n\n\"Assessing the Effectiveness of Single-Session Legal Research Skill Instruction through Pre- and PostTesting: A Case Study,\" Law Library Journal, 107, no.1 (Winter 2015): 57–78. (with Rebecca Lutkenhaus). (Publication is refereed.)\n\n\"Does the Past Predict the Future?: An Empirical Analysis of Recent Iowa Supreme Court Use of Legislative History as a Window into Statutory Construction in Iowa,\" 63 Drake L. Rev 239 (2015). (Cited by the Iowa Supreme Court in Brakke v. Iowa Department of Natural Resources 897 N.W.2d 522 (2017) and Doe v. State, 943 N.W.2d 608, 616 (Iowa 2020).)\n\n\"HeinOnline and Law Review Citation Patterns,\" Law Library Journal, 103, no. 1 (Winter 2011): 55–70. (with M. Sara Lowe). (Publication is refereed.)\n\n\"Creating an Effective New Employee Orientation Program,\" Library Leadership and Management 23, no. 4 (Fall 2009): 168–76. (Publication is refereed.)\n\n\"Marketing Mindset: Focusing on the Customer from Technical Services to Circulation.\" Feliciter 53, no. 3 (2007): 126–29.\n\n\"Beyond the Newsletter: Concrete Guidelines and Innovative Ideas for Effective Promotion.\" Public Libraries 43, no. 3 (May/June 2004): 177–181.\n\nNewsletter Articles\n\n\"Message from the President,\" MAALL Markings, 28, no. 4 (Sept. 2019): 3–4.\n\n\"Message from the President,\" MAALL Markings, 28, no. 3 (June 2019): 5–6.\n\n\"Message from the President,\"\n\nMAALL Markings\n\n, 28, no. 2 (March 2019): 8–9.\n\n\"Engage, Explore, Breathe, Act, and Have Fun While You're at It,\" MAALL Markings, 28, no. 1 (Dec. 2018): 1–3.\n\"Message from the President,\" MAALL Markings, 28, no. 1 (Dec. 2018): 14.\n\"Message from the Vice-President,\" MAALL Markings, 27, no. 4 (Sept. 2018): 11.\n\"Message from the Vice-President,\" MAALL Markings, 27, no. 3 (June 2018): 9–10.\n\"Message from the Vice-President,\" MAALL Markings, 27, no. 2 (March 2018): 8–9.\n\n\"Somebody Pinch Me,\" MAALL Markings, 23, no. 2 (March 2014): 4–5.\n\n\"Hiring with Less Stress and More Success: Tips from the Field,\" MAALL Markings, 21, no. 3 (June 2012): 1, 6–11.\n\nOnline Tutorials\n\nUsing the Iowa Legislature Website. 18-part video series embedded in the Iowa legislature website, published 2018–19. Complete series at https://www.youtube.com/playlist?list=PLr2LKOJxsQug6GJ8xuBQ2xLF0BIrPLaZt (with Emily Kramer).\n\nIowa Primary Resources. CALI, originally published May 2011, revised August 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/8995 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).\n\nIowa Secondary Sources. CALI, originally published May 2011, revised September 2014, Jan. 2018; June 2019. http://www.cali.org/lesson/9015 (with John D. Edwards, M. Sara Lowe, and Melissa H. Weresh).\n\nEvaluating Web Sites. CALI, revised June 2019. https://www.cali.org/lesson/817 (building off prior work of Susan Llano, Erin Murphy, and Michelle Cosby).\n\nLegal Research 101: The Tools of the Trade. CALI, revised June 2019. https://www.cali.org/lesson/568 (building off prior work of Sheri H. Lewis).\n\nReference Works\n\n\"Iowa\" in State Online Legal Information. American Association of Law Libraries, 2017 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.\n\n\"Iowa\" in State Online Legal Information. American Association of Law Libraries, 2016 edition. Latest version available at http://community.aallnet.org/digitalaccesstolegalinformationcommittee/stateonlinelegalinformation/iowa.\n\n\"Iowa\" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.\n\n\"Nebraska\" in Update to State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2010.\n\n\"Iowa\" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.\n\n\"Nebraska\" in State-by-State Report on Authentication of Online Legal Resources. Chicago: American Association of Law Libraries, 2007.\n\nPRESENTATIONS AND POSTER SESSIONS\n\n- \"Work in the Time of COVID-19: Shift Happens,\" Mid-America Association of Law Libraries Virtual Meeting, October 15, 2020 (with Sandy Placzek, Allison Reeve Davis, and Sarah Kammer).\n- \"Answering the Call for Wellness in the Legal Profession,\" American Association of Law Libraries (AALL) Annual Conference, July 14–16, 2019, Washington, D.C.\n- \"Strategically Responding to the Call to Improve Mental Health in the Legal Profession,\" Mid-America Association of Law Libraries Annual Meeting, October 12, 2018, Memphis, TN.\n- \"Challenging Conventional Wisdom: Using Empirical Research to Help Yourself and Others,\" MidAmerica Association of Law Libraries Annual Meeting, October 13, 2018, Memphis, TN (with Stefanie Pearlman).\n- \"It's Hard to Collaborate with Your Foot on My Throat,\" Mid-America Association of Law Libraries, Law Librarians Association of Wisconsin, Michigan Association of Law Libraries, Minnesota\n\nAssociation of Law Libraries, and Chicago Association of Law Libraries Joint Annual Meeting. Oct. 19, 2017, Milwaukee, WI (with Rebecca Lutkenhaus).\n- \"LibGuides Best Practices,\" Mid-America Association of Law Libraries Annual Meeting, October 14, 2016, Oklahoma City, OK (with Susan Boland, Pam Crawford, Erika Cohn, and Corie Dugas).\n- \"Legal Research Using the Iowa General Assembly Website,\" Drake University Continuing Legal Education webcast, July 13, 2017 (with Rebecca Lutkenhaus).\n- \"Affective Legal Research: Connecting Emotions with the Research Process,\" Mid-America Association of Law Libraries Annual Meeting, October 18, 2013, Omaha, NE.\n- \"Why Can't We Have Them at Hello? Overcoming Obstacles to Library Orientation for New Attorneys and Law Faculty Members.\" Mid-America Association of Law Libraries Annual Meeting, November 3, 2011, Lawrence, KS (with Deborah Grimm).\n- \"Interdisciplinary Citations in Law Review Articles: Implications for Librarians, Law Students, & Library Collections,\" July 21–24, 2012. American Association of Law Libraries (AALL) Annual Conference, Boston, MA (with M. Sara Lowe).\n- \"What if You Don't Have a Whole Semester?\" Mid-America Association of Law Libraries Annual Meeting, October 15, 2010, Iowa City, IA (with M. Sara Lowe).\n- \"Congratulations! You've Hired Someone. Now What?\" Drake Excellence in Learning presentation, April 23, 2008, Des Moines, IA.\n- \"Finding Legal Information.\" Drake Excellence in Learning presentation, Oct. 21, 2009 and Feb. 25, 2010, Des Moines, IA (with Sue Lerdal).\n- \"Congratulations! You've Hired Someone. Now What?\" Mid-America Association of Law Libraries Annual Meeting, November 2, 2007, Lincoln, NE.\n- \"Congratulations! You've Hired Someone. Now What?\" Drake Excellence in Learning presentation, February 15, 2007, Des Moines, IA.\n- \"At the Top of the Rise: Government Web Sites That Have Met the Challenge.\" American Association of Law Libraries presentation, July 15, 2007, New Orleans, LA (with Terrye Conroy, Warren Rees, Jane Edwards, and Joan Shear) (Also served as program coordinator and moderator).\n- \"New Employee Orientation.\" Special Libraries across the Metro meeting presentation, January 16, 2007, Des Moines, IA.\n- \"Basic Legal Reference.\" Central Iowa Library Service Area continuing education three-credit course, November 10, 2005, Des Moines, IA (with Sue Lerdal and Cheryl Gritton).\n- \"The Visible Librarian.\" Special Libraries across the Metro meeting presentation, April 12, 2006, Des Moines, IA.\n- \"Marketing Safari.\" LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Oct. 22, 2004, Orland Park, IL.\n- \"Legal Ease.\" Central Iowa Library Alliance meeting, April 20, 2004, Des Moines, IA.\n- \"Collection Development in the Responsive Library.\" (Presented at two sessions). Delaware Library Association 2003 Annual Conference, May 16, Wilmington, DE.\n- \"Promotional Principles and Practices.\" Central Iowa Library Alliance meeting, April 29, 2003, Urbandale, IA (with Jan Kaiser).\n- \"Out of the Building, but Not Out to Lunch,\" 2000 Reaching Forward Conference of Library Assistants, April 14, Rosemont, IL (with Karolyn Nance).\n- \"Just the FAQs: Answers to Your Most Frequently Asked Legal Research Questions,\" Iowa Library Association—Association of College and Research Libraries section 2002 Spring Conference, April 19, Newton, IA (with David Hanson and Rebecca Lutkenhaus).\n- \"Original Programming for Seniors.\" LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and Programming section seminar, Feb. 27, 1998, Western Springs, IL.\n\nPROFESSIONAL PARTICIPATION, SERVICE, AND RECOGNITION\n\n- 2019–20 Friend of the Law Review, awarded by the members of the Drake Law Review\n- 2013–14 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law\n- 2013–14 Friend of the Law Review, awarded by the members of the Drake Law Review\n- 2008–09 Friend of the Journal, awarded by the members of the Drake Journal of Agricultural Law\n- American Association of Law Libraries, Member, 2000–present. Legal Information Services to the Public Special Interest Section, Member, 2001–present. Foreign, Comparative, and International Law Special Interest Section, Member, 2001–2016. Access to Electronic Legal Information Committee, Member, July 2005–July 2007.\n- 2006–07 Friend of the Law Review, awarded by the members of the Drake Law Review\n- Mid-America Association of Law Libraries, Member, 2000–present. Executive Board Member: Immediate Past President, 2019–20; President, 2018–19; Vice-President/President-Elect, 2017–18; Member-at-Large, 2007–09. Vision Planning Task Force, Chair, 2019–20. 2004 Annual Meeting Local Arrangements Committee Co-Chair, 2003–04. Newsletter Committee, News from Other Chapters coeditor, 2006–09. Membership Committee, Chair, 2009–14. Grants Committee, Member, 2004–08. Nominations Committee, Member, 2001–03, 2008–09; Chair, 2001–02, 2008–09, 2019–20. Education Committee, 2016–18, Chair 2017–18.\n- LACONI (Library Administrators' Conference of Northern Illinois)-Outreach, Promotion, and ProgrammingBoard member, 1995–96, 1997–2000; Secretary, 1998–2000. Organized and led ad hoc committee that created an original programming resource guide for interlibrary resource sharing, 1998– 99.\n- Special Libraries across the Metro, Steering committee member, 2005–07.\n- North Suburban Library System Diversity Committee, Member, 1999–2000\n- Leadership Institute at Snowbird, one of 32 nationally selected participants, July 30–Aug. <cursor_is_here>\n- American Library Association, Member, 1994–2000.\n\nUNIVERSITY AND COMMUNITY SERVICE\n\n- Editor of Drake Law School's two site evaluation questionnaires and school narrative for American Bar Association re-accreditation visit and Association of American Law Schools membership review, 2020–21.\n- Drake Law School Assessment Committee, 2015–18\n- Drake Law School Mental Health Awareness Task Force, 2016–19\n- Drake Law School ad hoc Career Development/Alumni Committee, 2014\n- Drake Alma Migration Team, 2015–16\n- Drake Law School Curriculum Committee, 2013–14, 2019–20.\n- Drake Law School ad hoc committee that prepared Drake's winning application for the ABA's E. Smythe Gambrell Professionalism Award, 2008\n- Drake Law School Self-Study and American Bar Association Site Visit Committee, 2004–05, 2010–11\n- Drake Law School Strategic Planning Committee, 2003–04\n- Phi Beta Kappa, Gamma chapter of Iowa (Drake University), Secretary, 2006–07, 2008–12, 2016–18, 2019–present; Vice President, 2018–19; de facto President, May 2017–Oct. 2017; selection committee member, 2006–12, 2014–15, 2016–2020; chair, subcommittee on member selection, 2017–18 (updated and documented selection criteria and chapter procedures; facilitated committee information sharing and digitized files)\n- Drake Law School United Way Campaign Ambassador, 2017\n- Drake University Honorary Degree & Drake Medal Committee, 2008–10, chair 2009–10 (committee rewrote procedures during my tenure as chair)\n\n- Drake University Hearing Panel, 2004–06\n- Drake National Alumni Scholarship Program Selection Committee, 2004, 2005, 2010, 2017.\n- Drake Board of Tellers, 2002–03\n- Drake \"Bucks or Books\" Book Drive Committee Chair, 2002\n- Cowles Library Marketing Committee, spring semester 2003\n- National Library Week Planning Committee Co-Chair, 2001–05, member 2006\n- Library Collaboration Committee, March 2001–August 2001\n- Grand View Lutheran Church, Staff Support Committee, member, 2005–07\n- Des Moines Public Schools, Middle School Advisory Committee, 2014–15; school volunteer, 2005–07, 2008–10, 2014–20\n</text>\n",
"role": "user"
},
{
"content": "4, 1998, Snowbird, Utah.",
"role": "assistant"
}
] |
Lead Me Holy Spirit Prayer Study Guide Free Pdf Books
[EBOOK] Lead Me Holy Spirit Prayer Study Guide PDF Book is the book you are looking for, by download PDF Lead Me Holy Spirit Prayer Study Guide book you are also motivated to search from other sources
[EPUB] Mcqs Of Research - Id.spcultura.prefeitura.sp.gov.br
[EPUB] Mcqs Of Research Methodology Pdf Wmwikis From Romance To Mystery To Drama, This Website Is A Good Source For All Sorts Of Free E-books. When You're Making A Selection, You Can Go Through Reviews And Ratings For Each Book. If You're Looking For A Wide Variety Of Books In Various Categories, Check Out This Site. Interpreting Engineering Drawings 7th Edition Spados, Lead Me Holy Spirit ... Aug 23th, 2020
Empowered Coaching: Drawing Out The Best In Those You Lead Practice Of Coaching Are Clearly Illustrated And Lived Out In The Biblical Narrative. While This Particular Skill Set May Have Been First Introduced And Refined In The
Corporate World, This Paper Will Identify How Coaching Can Be Incorporated As A Leadership Skill In The Church With A Reliance On The Holy Spirit And A Helpful Expression Of Pastoral Care And Personal Development. As It Relates ... Aug 5th, 2020
Fourth Sunday Of Easter 2 May 2020
Fourth Sunday Of Easter . 2 May 2020. Collect Almighty Ever-living God, Lead Us To A Share In The Joys Of Heaven, So That The Humble Flock May Reach Where The Brave Shepherd Has Gone Before. Who Lives And Reigns With You In The Unity Of The Holy Spirit, One God, For Ever And Ever. Amen. Readings And Commentaries Apr 5th, 2020
Service Of Worship
Service Of Worship Trinity Sunday May 30, 2010 Eleven O'clock In The Morning Trinity Sunday Is The First Of The Many Sundays Of Ordinary Time That Follow Pentecost And Eventually Lead Up To Advent. Today We Celebrate The Doctrine Of The Holy Trinity—God As Father, Son, And Holy Spirit. We Celebrate The Holiness Of The Triune God, And Seek To Know How That Holiness Should Take Shape Among ...
The Spirit Realm - Clover Sites
Flee From Your Presence? If I Ascend To Heaven, Heaven You Are There ! If I Make My Bed In Sheol, You Are Sheol There ! If I Take The Wings Of The Morning And Dwell In The Uttermost Parts Of The Sea, Even There Uttermost Parts Of The Sea Your Hand Shall Lead Me , And Your Right Hand Shall Hold Me.' WHO Is The Holy Spirit C. He's GOD 1. As Eternal (Hebrews 9:14) 2. As Omnipotent/Creator ... Apr 10th, 2020
KEY: D Lead Sheet Holy Spirit - Discover Grace
Holy Spirit - Lead Sheet - 2 Of 2 KEY: D. Title: Holy Spirit Author: Katie Torwalt And Bryan Torwalt Subject: Jesus Culture - Live From New York Created Date: 6/4/2015 10:58:20 AM ... Jul 13th, 2020
LYFAMO IL H Y C L A O T H OL I C S C
And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. Hail Mary, Full Of Grace. Our Lord Is With Thee. Blessed Art Thou Among Women, And Blessed Is The
Fruit Of Thy Womb, Jesus. Holy Mary, Mother Of God, Pray For Us Sinners, Now And At The Hour Of Our Death. Amen. Glory Be Glory Be To The Father, And To The Son, And To The Holy Spirit. As It Was In The Beginning, Is Now, And Ever ... Mar 1th, 2020
St. Mary Called To Be Caring And Confident Our Learning ...
Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. WK 4 Hail Mary Full Of Grace, The Lord Is With Thee. Lessed Are Thou Among Women And Blessed Is The Fruit Of Thy Womb Jesus. Holy Mary Mother Of God, Pray For Us Sinners Now And At The Hour Of Our Death. Amen. Glory Be To The Father And To The Son And To The Holy Spirit. As It Was In The Beginning ... Jun 12th, 2020
Spiritual Leadership - Lead With Grace
11-Prayer And Leadership (1Tim 2:1) Jesus Often Withdrew To Lonely Places To Pray (Luke 5:16). Praying In The Spirit Means To Pray About The Things That Are In The Realm Of The Holy Spirit And To Pray In The Power And Energy Of The Spirit (Eph 6:18). Our Capacity To Know God's Will Is The Basis For All Prayers Of Faith (Rom
8:26-27). To Gain God's Ear, We Must Believe He Answers Us (Heb 11 ... Feb 12th, 2020
SEALED - LifeTeen.com For Catholic Youth
The Youth Minister Will List The Seven Gifts Of The Holy Spirit And Then The Teens Will Chose One Of The Seven Gifts Of The Holy Spirit They Want To Learn More About. Have At Least One Core Member Lead Each Discussion. Spend A Few Minutes Explaining Each Gift And Give The Teens An Opportunity To Ask And Answer Questions. See CCC 1831 For More Information On Each Gift. Close The Small Group ... Aug 14th, 2020
Queering The Trinity - WordPress.com
Some Who Embrace The Trinity Would Agree That Trinitarian Theology Can Be Seen As Rather Complicated And Confusing. According To Christian Dogma, The Trinity Is The Unity Of Father, Son, And Holy Spirit As Three Persons In One.5 Looking Through The Christian Bible, I Never Saw The Word "Trinity" And This Further Lead To My Confusion About How There Was Only One God , But Was Made Up Of ... Feb 2th, 2020
Empowered To Witness - Campbell UMC
Empowered To Witness By The Holy Spirit, We Will Discover, As The Early Church Did, That God Will Lead Us Farther And Farther Out. For As We Know From The Events Of This Week, Our Country Is A Country Thirsting For The Life-giving Message Of The Gospel. We Will Go, And We Must Go. And We Will Find That, As We Witness, As We Go Forward Despite Setbacks, Despite Great Persecutions, Embodying The ... Jan 19th, 2020
Wisdom And The Kingdom Of God
Of Goods In The Light Of The Holy Spirit. A Wise Person Sees The Value Of The Kingdom Of God And Gives Everything To Place Himself Under God's Rule. Wisdom Is To Make That Kingdom The Ultimate Value And The Highest Principle Of Discernment, To Be Ruled By God Rather Than Any Worldly Power. Allowing Ourselves To Be Ruled By God Will Lead To Life, While Choosing Any Other Ruler Will Lead To ... Jan 12th, 2020
June 20-21, 2020
Renew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways To The Glory Of Your Holy Name. Amen. P Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, And By His Authority, I Therefore Forgive You All Your Sins In The Name Of The Father And Of The T Son And Of The Holy Spirit ... Jan 5th, 2020
Chapter 4 Study Guide For Content Mastery Answer Key
El Highlander Inmortal Toy Industry Statistics Facts Statista Holt Mcdougal Eastern World Edition Grade 6 Juegos De Buscar Objetos Juega A Juegos En L Nea Gratis Lead Sheet 327 Holy Spirit Thou Art Welcome Mining Of Massive Datasets Exercise Solutions Anti Mucus Diet How To Know What To Eat And What To Avoid Maths Links Homework 8c Answers Oprah Winfrey What I Know For Sure Ebook Njatc Motor ... Jun 27th, 2020
Intercession Prayer Manual - Wiki.ctsnet.org
Intercession Prayer Manual *FREE* Intercession Prayer Manual Intercessory Prayer Harvestime SUGGESTIONS FOR GROUP STUDY FIRST MEETING Opening Open With
Prayer And Introductions Get Acquainted And Register The Students Establish Group Procedures Determine Who Will Lead The Meetings The Time Place And Dates For The Sessions Praise And Worship Invite The Presence Of The Holy Spirit Into Your ... Oct 14th, 2020
Morning Prayer For The Feast Of The Sacred Heart
CD "As One Voice" Book 1. Psalm 23 (alternate Sides) Antiphon The Love Of God Has Been Poured Into Our Hearts By The Holy Spirit Who Has Been Given To Us. Voice(s) 1 My God, You Are My Shepherd; There Is Nothing I Shall Want. Fresh And Green Are The Pastures Where You Give Me Repose. Near Restful Waters You Lead Me To Revive My Drooping Spirit. Aug 5th, 2020
SECOND BAPTIST CHURCH
At Second Baptist Church, Our Goal Is The Same In Every Area Of Ministry. From The Nursery To Senior Adults, We Exist To Make Disciples – To Lead People To Jesus Christ And Help Them Grow In Their Relationship With Him. It Is Our Goal To Present The Gospel To Others In Order To See The Holy Spirit Change Lives! No Matter Which Campus You Attend, As Part Of The Team You Will Experience The ... Apr
Just One More Thing Holy Spirit Jonathan Cleveland
And Lead Us Not Into Temptation, But Deliver Us From The Evil One.' Visual Reflection (Visio Divina)* Holy Spirit By Sabina Kiss Song For Reflection Build Your Kingdom Here By Rend Collective *Visio Divina – A Thoughtful And Slow Way Of Contemplating A Visual Prompt Like A Piece Of Art, Photograph Or Image Jul 27th, 2020
Pentecost Liturgy In The Name Of The Father, And Of The ...
That [s The Eagle, The King Of The Birds, _ Said His Neighbour. He Belongs To The Sky. We Belong To The Earth---were Chickens. So, The Eagle Lived And Died A Chicken, For That [s What He Thought He Was. Often, We Lead Lives Without Realizing The Power Of The Holy Spirit Inherent In Us. We Are ... Apr 9th, 2020
Revelation's Source Of Spiritual Power
2 Timothy 1:7 God Hasn't Given Us A Spirit Of Fear, But Of Power, Of Love, And Of A Sound Mind. Romans 8:14 As We Allow The Holy Spirit To Lead Us, We Become Sons
And Daughters Of God. Galatians 6:8 "He Who Sows To The Spirit Will Of The Spirit Reap Everlasting Life." Romans 8:11 We Need Not Fear Death, For Jesus, Through The Power Of The Holy Spirit, Will Resurrect His Faithful People ... Sep 24th, 2020
Rain Down (Alvin Slaughter) Holy Spirit Rain Down.
Holy Spirit Rain Down, Rain Down Let Your Power Fall Let Your Voice Be Heard Come And Change Our Hearts As We Stand On Your Word. Holy Spirit Rain Down. (To Top: Chorus/All) Lead/Solo No Eye Has Seen No Ear Has Heard No Mind Can Know What God Has In Store. So Open Up Heaven, Open It Wide, Over Your Church, And Over Our Lives. (Chorus/All) Lead/Solo Let Your Power Fall Let Your Voice Be Heard ... Nov 25th, 2020
(SATB) Holy Spirit Rain Down Key: F
Piano-Vocal Holy Spirit Rain Down - Page 6 Of 8 (SATB) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 4/28/2015 7:18:20 AM ... Apr 27th, 2020
Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal
Lead Sheet Holy Spirit Rain Down - Page 2 Of 2 (SAT) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 5/20/2014 8:22:11 PM ... May 12th, 2020
News From Christ Community United Methodist Church
Lot Owners And Anyone Interested In The Cemetery Are Urged To Attend. If You Have Any Questions, Please Contact Jerry Maurer.-3- Uganda Mission News The Uganda 2018 Team Will Leave For Africa On June 25th. We Covet Your Prayers For Safety For The Team, For Health, For Unity Of The Team Members, For Boldness In Sharing Christ, For The Holy Spirit To Lead And Direct Our Every Move And ... Nov 14th, 2020
PRAYER OF THE FAITHFUL 5th Sunday Of Easter A
PRAYER OF THE FAITHFUL 5th Sunday Of Easter A . PRIEST: God Is Love And Commands Us To Live In That Same Love. Let Us Turn To Him And Pray For The Strength To Live As The Lord Teaches: READER: For Francis Our Pope, That He Will Be Blessed With The Gifts Of The Holy Spirit And So Lead The Church In The Ways Of The Lord. (pause) Lord In Your Mercy . READER: For The Church, That It May Truly
ABC Jesus Loves Me Lego Christmas Activity Workbook Page 2
Lego Christmas Tree There Isn't A Day Go By That Our Children Don't Play With Legos. Using This Love, I Created A Lego Hristmas Tree To Help Our Kiddos Learn About Jesus. As Only The Holy Spirit Could Lead, The Christmas Tree Ended Up With 25 Pieces. Exactly What Was Needed To Add A Lego A Day. Sep 1th, 2020
Our Lady Of Mercy Church - D2y1pz2y630308.cloudfront.net
Our Lady Of Mercy Parish Is A Catholic Community That Worships God The Father, The Son And The Holy Spirit, ... Light Guiding Us Through The Murky Waters Of Change – He Who Alone Can Lead Our Parish Forward On The Path Of Christian Discipleship Towards The Kingdom Of Heaven! And So, Just Like John's Two Disciples From The Above Passage From Luke, May We Wait Patiently And With Hope-ful ... May 16th, 2020
Th Sunday After Pentecost
Renew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways
To The Glory Of Your Holy Name. Amen. P: Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, I Assure You That All Of Your Sins Are Forgiven In The Name Of The Father And Of The Son And Of The Holy Spirit. C: Amen. 3 ... Sep 22th, 2020
Initiation Into Hermetics - Timothy-c6160.firebaseapp.com
By Franz Bardon Initiation Into Hermetics By Franz Bardon Self-initiation Into The Holy Mysteries With The Need Of A Guru Or Master. Initiation Into Hermetics Provides Step By Step Instruction In The Form Of Practical Exercises. These Exercises Lead To The Development Of Body, Soul And Spirit. The Result Of The Practical Exercises Is The Development Of Occult Abilities Which Can Be Of Benefit ... Sep 14th, 2020
15 Minutes Alone With God - Harvest House
The 15-minute Concept Works! You Just Have To Be Will-ing To Give It A Try. Fifteen Minutes A Day For 21 Days And You Are On Your Way To Devotions Every Day. Allow God To Hold Your Hand And Lead You Today To Many Quiet Times With Him. The
Only Hope To The Busy Woman's Cry Is God Almighty Himself! God The Father God The Son And God The Holy Spirit I Love You All. May The Lord Touch Each Quiet ... Nov 6th, 2020
Download Kindle # Raising The Runes: A Shamanic Journey ...
In Raising The Runes, Readers Learn To Choose A Rune, Call In Spirit Guides, Do A Chant Of Protection And Li@ The Veil Between Realms Of Conscious Perception. As You Read The Stories Of The Runes, Keep An Open Mind And Let The Source Of The Runes Flow Through You. Odin, The Great Father, Will Lead You To Write Your Own Holy Book, And Show You A Better Way To Live. Each Man Or Woman S Runic ... May 18th, 2020
GOODBYE MESSIANIC JUDAISM!
Back In 1983, After Seminary At Oral Roberts University, Where I Learned That The Law Was 'done Away With', The Holy Spirit Challenged My View Of The Law Of Moses. Finding Out About Messianic Judaism, I Thought It Was The Vehicle That The Spirit Of Yeshua Would Use To Lead Both Jew And Gentile Into Torah Observance. In Fact It Was, In Spite Of Itself. Many Have Come Out Of ... Feb 18th, 2020
J. Legge The Changing Role Of Foreign Workers In China
The Changing Role Of Foreign Workers In China One Of The Three, A Young, White, Western Woman, Has, In The Past 18 Months, Been Used By The Holy Spirit To Lead 26 Chinese High Schoolers To Faith In Christ And Is Establishing Them In A Church In A Place Which Previously Had No Functional Body. A Chinese National Who Heard This Story Aug 19th, 2020
Our Lives Are Formed By Word And Sacra- Ment, And We ...
Mary's Story Embodies The Human And Divine; The Every-day And The Holy. Yet, That's What Our Lives Embody As Well, The Every-day And The Holy, When We Give Ourselves Over To God And Let The Spirit In To Lead And To Guide. The Holy Is Not Only Here With Us But Within Us. Remember The Words Of Baptism, The Seed Of Faith Planted Within Us To Grow Nov 20th, 2020
I Want To Be Follow This Simple Process And A Soul Winner ...
The Holy Spirit Will Lead Me To Lost Sinners And Help Me Get Them Saved. ! I Mu Stflw H Eproc A W Ay Echtim.! I Must Always Think And Remember To Ask Someone,
"Have You Ever Been Saved?" I Want To Be A Soul Winner Here's How I !must ! I Must Pray That The Lord Will Burden My Heart For Lost Souls. The Lord Will Make Me A Soul Winner. Jul 1th, 2020
The Lord S Prayer New Bulgaria Trip W
10. Verse 13 Sealed With Holy Spirit 11. Verse 14 Guaranteed Inheritance Evelyn Cowdery Good About Myself. I Realize That I Must Be Deceived, As I Know There Are Areas I Must Not Be Tending Per-fectly. I Often Pray From Psalm 139, "Let Me See Any Wicked Way In Me, And Lead Me In The Way Everlasting!" I Can Often Tell What's Happening In My Life, Based On What God Brings To My Mind In ... Nov 21th, 2020
May 26, 2013 The Most Holy Trinity HOLY WISDOM
May 26, 2013 The Most Holy Trinity HOLY WISDOM Today We Celebrate The Trinity's Work For Our Salvation. God The Father Is The Beginning. The Work Continues With The Sending Of The Son, Jesus, The Christ, Who Lives Among Us As The Way, The Truth, And The Life. Then The Spirit Of Truth Comes To Lead Us To The Complete Truth. Out Of Love, God Sanctifies Us In His Family. Holy Wisdom Delights In ... Sep
Courtcase For The Cleansing Of Your Generational Bloodline ...
Christ And The Fire Of The Holy Spirit. Make This Canopy Sound-, Sight- And Projectionproof For All Demons, All Powers Of Darkness And For All Their Servants. Cleanse The Canopy With The Blood Of The Lord Jesus And Fill It With Your Presence. Thank You For The Angels That You Have Given To Us To Protect And Help Us. Holy Spirit, Lead Us In This Court Session. B. Step Into The Heavenly ... Nov 7th, 2020
Explaining God's Salvation Plan To Kids
Salvation Plan To Kids. If You Have Any Other Questions Please Email Us At [email protected]. We Would Love To Help! It Is The Holy Spirit's Job To Convict Us Of Our Sin And Lead Us To Christ. It's A Great Privilege When God Allows Us To Be Part Of The Process In Others! If You Have A Child Who's Expressed An Interest In God's Salvation Plan, You Can Use These Key Thoughts To Equip You ... Sep 5th, 2020
Basic Catholic Prayers
Basic Catholic Prayers Sign Of The Cross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father . Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come, Thy Will Be Done, On Earth As It . Is In Heaven. Give Us This Day Our Daily Bread And Forgive Us Our Trespasses, As We Forgive Those Who . Trespass Against Us And Lead Us Not Into Temptation, But ... Mar 24th, 2020
MANIFESTATIONS OF THE SOUL SOUL POWER
Most Curses From Mankind Receive Their Power From The "latent Power Of Man's Soul". This, "inner Soul Power", Is To Be Lead By The Spirit Of Man, When It Isn't, Many Strange Things Can Occur. This Power Is Only To Be Directed By The Holy Spirit, Through Man's Spirit, Or It Is Dangerous. In Days Of Old, The Biblical Prophets And Other Great Leaders, Proclaimed Curses With The ... Oct 8th, 2020
HISTORY OF REDEMPTION - Welcome | BLBi
Spirit, Not Only That "He Would Lead You Into All Truth," But He Also Said, "He Shall Show You Things To Come" (cf. John 16:13). And The Holy Spirit Is The One That Has Given The Apocalypse, The Revelation Of Jesus Christ. It Is The Inspired Word Of
God, Given By The Holy Spirit. So The Holy Spirit Did Come And Lead Us Into All Truth, Primarily In The Epistles. But Now He Is Showing Us ... Oct 1th, 2020
Prayers & Hymns - WordPress.com
ASI ATHOLI PRAYERS Sign Of The Ross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come; Thy Will Be Done On Earth As It Is In Heaven. Give Us This Day Our Daily Bread; And Forgive Us Our Trespasses As We Forgive Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us ... Oct 9th, 2020
INTERNATIONAL CENTRAL GOSPEL CHURCH King's Temple
Rev Dr. Mensa Otabil, Asking God To Protect Him And His Family. · Pray For The Holy Spirit To Continually Lead And Guide Him And Also ?ll Him With Divine Ideas For The Future. · Pray For The Presbytery And The General Church Council Of ICGC, That Their Decision-making And Policy-making Will Always Be In?uenced By The Leading Of The Holy Spirit. · Pray For All Local Church Councils In ... Sep 17th, 2020
THE BALLINCOLLIG PARISHIONER
Had Been Stoned To Death And Saul Of Tarsus Had Begun His Persecution Of Christians. In Today's Reading, Peter's First Letter, We Are Advised To Be Prepared To Explain What Our Faith Is About And Why We Continue To Be People Of Hope. But Whatever Words We Use, It Is In The Way We Lead Our Lives That We Are Judged. As Bishop Gasparini Observed, "It Is Christ Through The Holy Spirit Who ... Oct 18th, 2020
MARS UP CHURCH - Nebula.wsimg.com
Through The Holy Spirit, To Lead Mars UP Into The Future. First And Foremost, My Sincere Thanks To Session For Hiring Me. I Suspect They Are As Anxious For Me To Begin My Work As I Am! I Have Been Impressed With Their Devotion, Commitment, And Love For Mars UP Church – Continue To Pray For Them And Their Leadership. Second (and Probably Just As Important), My Sincere Thanks And Appreciation ... Mar 22th, 2020
The Methodist Church Of Southern Africa And Homosexuality ... DEWCOM (2003:6) Notes The Third Approach To Scripture As Seeing The Bible As A
Living Document In The Life Of The Church, Which Is Enlivened By The Activity Of The Holy Spirit, Who Comes To Interpret The Words Of Scripture And So Lead The Church Into All Truth.4 The Entrenched Assumptions And Traditional Interpretations Are Challenged And The Church Is 1 DEWCOM(2003:4) 2 DEWCOM (2003:5). 3 ... Jun 6th, 2020
Lead Me, Holy Spirit Prayer & Study Guide
This Prayer And Study Guide Is Designed To Help You Have A Closer Relationship With God, Receive All That Jesus Has For You, ... Holy Spirit (from Now On Referred To As "the Book") And Your Bible. I Have Used The New King James Version Here, But You Can Use Any Trans - Lation You Like. It Would Be Good To Have A Small Notebook Or Journal With You So You Can Write Down Whatever God Speaks ... Nov 12th, 2020
There is a lot of books, user manual, or guidebook that related to Lead Me Holy
Powered by TCPDF (www.tcpdf.org)
Spirit Prayer Study Guide PDF in the link below:
SearchBook[NC80]
|
<urn:uuid:c2fcfab3-9e9e-48f2-8d3d-396a388173bd>
|
CC-MAIN-2020-50
|
http://liftszervizkft.hu/lead-me-holy-spirit-prayer-study-guide.pdf
|
2020-11-27T07:55:24+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-50/subset=warc/part-00010-8431e8c9-c763-4c27-b286-ba1dd7e2631e.c000.gz.parquet
| 52,576,468
| 5,520
|
eng_Latn
|
eng_Latn
| 0.84085
|
eng_Latn
| 0.861593
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
957,
1985,
2877,
3970,
4958,
5873,
6955,
8051,
9005,
10026,
11129,
12076,
13167,
14240,
15289,
16378,
17320,
18461,
19523,
20552,
21420,
21522
] |
Lead Me Holy Spirit Prayer Study Guide Free Pdf Books
[EBOOK] Lead Me Holy Spirit Prayer Study Guide PDF Book is the book you are looking for, by download PDF Lead Me Holy Spirit Prayer Study Guide book you are also motivated to search from other sources
[EPUB] Mcqs Of Research - Id.spcultura.prefeitura.sp.gov.br
[EPUB] Mcqs Of Research Methodology Pdf Wmwikis From Romance To Mystery To Drama, This Website Is A Good Source For All Sorts Of Free E-books. When You're Making A Selection, You Can Go Through Reviews And Ratings For Each Book. If You're Looking For A Wide Variety Of Books In Various Categories, Check Out This Site. Interpreting Engineering Drawings 7th Edition Spados, Lead Me Holy Spirit ... Aug 23th, 2020
Empowered Coaching: Drawing Out The Best In Those You Lead Practice Of Coaching Are Clearly Illustrated And Lived Out In The Biblical Narrative. While This Particular Skill Set May Have Been First Introduced And Refined In The
Corporate World, This Paper Will Identify How Coaching Can Be Incorporated As A Leadership Skill In The Church With A Reliance On The Holy Spirit And A Helpful Expression Of Pastoral Care And Personal Development. As It Relates ... Aug 5th, 2020
Fourth Sunday Of Easter 2 May 2020
Fourth Sunday Of Easter . 2 May 2020. Collect Almighty Ever-living God, Lead Us To A Share In The Joys Of Heaven, So That The Humble Flock May Reach Where The Brave Shepherd Has Gone Before. Who Lives And Reigns With You In The Unity Of The Holy Spirit, One God, For Ever And Ever. Amen. Readings And Commentaries Apr 5th, 2020
Service Of Worship
Service Of Worship Trinity Sunday May 30, 2010 Eleven O'clock In The Morning Trinity Sunday Is The First Of The Many Sundays Of Ordinary Time That Follow Pentecost And Eventually Lead Up To Advent. Today We Celebrate The Doctrine Of The Holy Trinity—God As Father, Son, And Holy Spirit. We Celebrate The Holiness Of The Triune God, And Seek To Know How That Holiness Should Take Shape Among ...
The Spirit Realm - Clover Sites
Flee From Your Presence? If I Ascend To Heaven, Heaven You Are There ! If I Make My Bed In Sheol, You Are Sheol There ! If I Take The Wings Of The Morning And Dwell In The Uttermost Parts Of The Sea, Even There Uttermost Parts Of The Sea Your Hand Shall Lead Me , And Your Right Hand Shall Hold Me.' WHO Is The Holy Spirit C. He's GOD 1. As Eternal (Hebrews 9:14) 2. As Omnipotent/Creator ... Apr 10th, 2020
KEY: D Lead Sheet Holy Spirit - Discover Grace
Holy Spirit - Lead Sheet - 2 Of 2 KEY: D. Title: Holy Spirit Author: Katie Torwalt And Bryan Torwalt Subject: Jesus Culture - Live From New York Created Date: 6/4/2015 10:58:20 AM ... Jul 13th, 2020
LYFAMO IL H Y C L A O T H OL I C S C
And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. Hail Mary, Full Of Grace. Our Lord Is With Thee. Blessed Art Thou Among Women, And Blessed Is The
Fruit Of Thy Womb, Jesus. Holy Mary, Mother Of God, Pray For Us Sinners, Now And At The Hour Of Our Death. Amen. Glory Be Glory Be To The Father, And To The Son, And To The Holy Spirit. As It Was In The Beginning, Is Now, And Ever ... Mar 1th, 2020
St. Mary Called To Be Caring And Confident Our Learning ...
Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. WK 4 Hail Mary Full Of Grace, The Lord Is With Thee. Lessed Are Thou Among Women And Blessed Is The Fruit Of Thy Womb Jesus. Holy Mary Mother Of God, Pray For Us Sinners Now And At The Hour Of Our Death. Amen. Glory Be To The Father And To The Son And To The Holy Spirit. As It Was In The Beginning ... Jun 12th, 2020
Spiritual Leadership - Lead With Grace
11-Prayer And Leadership (1Tim 2:1) Jesus Often Withdrew To Lonely Places To Pray (Luke 5:16). Praying In The Spirit Means To Pray About The Things That Are In The Realm Of The Holy Spirit And To Pray In The Power And Energy Of The Spirit (Eph 6:18). Our Capacity To Know God's Will Is The Basis For All Prayers Of Faith (Rom
8:26-27). To Gain God's Ear, We Must Believe He Answers Us (Heb 11 ... Feb 12th, 2020
SEALED - LifeTeen.com For Catholic Youth
The Youth Minister Will List The Seven Gifts Of The Holy Spirit And Then The Teens Will Chose One Of The Seven Gifts Of The Holy Spirit They Want To Learn More About. Have At Least One Core Member Lead Each Discussion. Spend A Few Minutes Explaining Each Gift And Give The Teens An Opportunity To Ask And Answer Questions. See CCC 1831 For More Information On Each Gift. Close The Small Group ... Aug 14th, 2020
Queering The Trinity - WordPress.com
Some Who Embrace The Trinity Would Agree That Trinitarian Theology Can Be Seen As Rather Complicated And Confusing. According To Christian Dogma, The Trinity Is The Unity Of Father, Son, And Holy Spirit As Three Persons In One.5 Looking Through The Christian Bible, I Never Saw The Word "Trinity" And This Further Lead To My Confusion About How There Was Only One God , But Was Made Up Of ... Feb 2th, 2020
Empowered To Witness - Campbell UMC
Empowered To Witness By The Holy Spirit, We Will Discover, As The Early Church Did, That God Will Lead Us Farther And Farther Out. For As We Know From The Events Of This Week, Our Country Is A Country Thirsting For The Life-giving Message Of The Gospel. We Will Go, And We Must Go. And We Will Find That, As We Witness, As We Go Forward Despite Setbacks, Despite Great Persecutions, Embodying The ... Jan 19th, 2020
Wisdom And The Kingdom Of God
Of Goods In The Light Of The Holy Spirit. A Wise Person Sees The Value Of The Kingdom Of God And Gives Everything To Place Himself Under God's Rule. Wisdom Is To Make That Kingdom The Ultimate Value And The Highest Principle Of Discernment, To Be Ruled By God Rather Than Any Worldly Power. Allowing Ourselves To Be Ruled By God Will Lead To Life, While Choosing Any Other Ruler Will Lead To ... Jan 12th, 2020
June 20-21, 2020
Renew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways To The Glory Of Your Holy Name. Amen. P Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, And By His Authority, I Therefore Forgive You All Your Sins In The Name Of The Father And Of The T Son And Of The Holy Spirit ... Jan 5th, 2020
Chapter 4 Study Guide For Content Mastery Answer Key
El Highlander Inmortal Toy Industry Statistics Facts Statista Holt Mcdougal Eastern World Edition Grade 6 Juegos De Buscar Objetos Juega A Juegos En L Nea Gratis Lead Sheet 327 Holy Spirit Thou Art Welcome Mining Of Massive Datasets Exercise Solutions Anti Mucus Diet How To Know What To Eat And What To Avoid Maths Links Homework 8c Answers Oprah Winfrey What I Know For Sure Ebook Njatc Motor ... Jun 27th, 2020
Intercession Prayer Manual - Wiki.ctsnet.org
Intercession Prayer Manual *FREE* Intercession Prayer Manual Intercessory Prayer Harvestime SUGGESTIONS FOR GROUP STUDY FIRST MEETING Opening Open With
Prayer And Introductions Get Acquainted And Register The Students Establish Group Procedures Determine Who Will Lead The Meetings The Time Place And Dates For The Sessions Praise And Worship Invite The Presence Of The Holy Spirit Into Your ... Oct 14th, 2020
Morning Prayer For The Feast Of The Sacred Heart
CD "As One Voice" Book 1. Psalm 23 (alternate Sides) Antiphon The Love Of God Has Been Poured Into Our Hearts By The Holy Spirit Who Has Been Given To Us. Voice(s) 1 My God, You Are My Shepherd; There Is Nothing I Shall Want. Fresh And Green Are The Pastures Where You Give Me Repose. Near Restful Waters You Lead Me To Revive My Drooping Spirit. Aug 5th, 2020
SECOND BAPTIST CHURCH
At Second Baptist Church, Our Goal Is The Same In Every Area Of Ministry. From The Nursery To Senior Adults, We Exist To Make Disciples – To Lead People To Jesus Christ And Help Them Grow In Their Relationship With Him. It Is Our Goal To Present The Gospel To Others In Order To See The Holy Spirit Change Lives! No Matter Which Campus You Attend, As Part Of The Team You Will Experience The ... Apr
Just One More Thing Holy Spirit Jonathan Cleveland
And Lead Us Not Into Temptation, But Deliver Us From The Evil One.' Visual Reflection (Visio Divina)* Holy Spirit By Sabina Kiss Song For Reflection Build Your Kingdom Here By Rend Collective *Visio Divina – A Thoughtful And Slow Way Of Contemplating A Visual Prompt Like A Piece Of Art, Photograph Or Image Jul 27th, 2020
Pentecost Liturgy In The Name Of The Father, And Of The ...
That [s The Eagle, The King Of The Birds, _ Said His Neighbour. He Belongs To The Sky. We Belong To The Earth---were Chickens. So, The Eagle Lived And Died A Chicken, For That [s What He Thought He Was. Often, We Lead Lives Without Realizing The Power Of The Holy Spirit Inherent In Us. We Are ... Apr 9th, 2020
Revelation's Source Of Spiritual Power
2 Timothy 1:7 God Hasn't Given Us A Spirit Of Fear, But Of Power, Of Love, And Of A Sound Mind. Romans 8:14 As We Allow The Holy Spirit To Lead Us, We Become Sons
And Daughters Of God. Galatians 6:8 "He Who Sows To The Spirit Will Of The Spirit Reap Everlasting Life." Romans 8:11 We Need Not Fear Death, For Jesus, Through The Power Of The Holy Spirit, Will Resurrect His Faithful People ... Sep 24th, 2020
Rain Down (Alvin Slaughter) Holy Spirit Rain Down.
Holy Spirit Rain Down, Rain Down Let Your Power Fall Let Your Voice Be Heard Come And Change Our Hearts As We Stand On Your Word. Holy Spirit Rain Down. (To Top: Chorus/All) Lead/Solo No Eye Has Seen No Ear Has Heard No Mind Can Know What God Has In Store. So Open Up Heaven, Open It Wide, Over Your Church, And Over Our Lives. (Chorus/All) Lead/Solo Let Your Power Fall Let Your Voice Be Heard ... Nov 25th, 2020
(SATB) Holy Spirit Rain Down Key: F
Piano-Vocal Holy Spirit Rain Down - Page 6 Of 8 (SATB) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 4/28/2015 7:18:20 AM ... Apr 27th, 2020
Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal
Lead Sheet Holy Spirit Rain Down - Page 2 Of 2 (SAT) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 5/20/2014 8:22:11 PM ... May 12th, 2020
News From Christ Community United Methodist Church
Lot Owners And Anyone Interested In The Cemetery Are Urged To Attend. If You Have Any Questions, Please Contact Jerry Maurer.-3- Uganda Mission News The Uganda 2018 Team Will Leave For Africa On June 25th. We Covet Your Prayers For Safety For The Team, For Health, For Unity Of The Team Members, For Boldness In Sharing Christ, For The Holy Spirit To Lead And Direct Our Every Move And ... Nov 14th, 2020
PRAYER OF THE FAITHFUL 5th Sunday Of Easter A
PRAYER OF THE FAITHFUL 5th Sunday Of Easter A . PRIEST: God Is Love And Commands Us To Live In That Same Love. Let Us Turn To Him And Pray For The Strength To Live As The Lord Teaches: READER: For Francis Our Pope, That He Will Be Blessed With The Gifts Of The Holy Spirit And So Lead The Church In The Ways Of The Lord. (pause) Lord In Your Mercy . READER: For The Church, That It May Truly
ABC Jesus Loves Me Lego Christmas Activity Workbook Page 2
Lego Christmas Tree There Isn't A Day Go By That Our Children Don't Play With Legos. Using This Love, I Created A Lego Hristmas Tree To Help Our Kiddos Learn About Jesus. As Only The Holy Spirit Could Lead, The Christmas Tree Ended Up With 25 Pieces. Exactly What Was Needed To Add A Lego A Day. Sep 1th, 2020
Our Lady Of Mercy Church - D2y1pz2y630308.cloudfront.net
Our Lady Of Mercy Parish Is A Catholic Community That Worships God The Father, The Son And The Holy Spirit, ... Light Guiding Us Through The Murky Waters Of Change – He Who Alone Can Lead Our Parish Forward On The Path Of Christian Discipleship Towards The Kingdom Of Heaven! And So, Just Like John's Two Disciples From The Above Passage From Luke, May We Wait Patiently And With Hope-ful ... May 16th, 2020
Th Sunday After Pentecost
Renew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways
To The Glory Of Your Holy Name. Amen. P: Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, I Assure You That All Of Your Sins Are Forgiven In The Name Of The Father And Of The Son And Of The Holy Spirit. C: Amen. 3 ... Sep 22th, 2020
Initiation Into Hermetics - Timothy-c6160.firebaseapp.com
By Franz Bardon Initiation Into Hermetics By Franz Bardon Self-initiation Into The Holy Mysteries With The Need Of A Guru Or Master. Initiation Into Hermetics Provides Step By Step Instruction In The Form Of Practical Exercises. These Exercises Lead To The Development Of Body, Soul And Spirit. The Result Of The Practical Exercises Is The Development Of Occult Abilities Which Can Be Of Benefit ... Sep 14th, 2020
15 Minutes Alone With God - Harvest House
The 15-minute Concept Works! You Just Have To Be Will-ing To Give It A Try. Fifteen Minutes A Day For 21 Days And You Are On Your Way To Devotions Every Day. Allow God To Hold Your Hand And Lead You Today To Many Quiet Times With Him. The
Only Hope To The Busy Woman's Cry Is God Almighty Himself! God The Father God The Son And God The Holy Spirit I Love You All. May The Lord Touch Each Quiet ... Nov 6th, 2020
Download Kindle # Raising The Runes: A Shamanic Journey ...
In Raising The Runes, Readers Learn To Choose A Rune, Call In Spirit Guides, Do A Chant Of Protection And Li@ The Veil Between Realms Of Conscious Perception. As You Read The Stories Of The Runes, Keep An Open Mind And Let The Source Of The Runes Flow Through You. Odin, The Great Father, Will Lead You To Write Your Own Holy Book, And Show You A Better Way To Live. Each Man Or Woman S Runic ... May 18th, 2020
GOODBYE MESSIANIC JUDAISM!
Back In 1983, After Seminary At Oral Roberts University, Where I Learned That The Law Was 'done Away With', The Holy Spirit Challenged My View Of The Law Of Moses. Finding Out About Messianic Judaism, I Thought It Was The Vehicle That The Spirit Of Yeshua Would Use To Lead Both Jew And Gentile Into Torah Observance. In Fact It Was, In Spite Of Itself. Many Have Come Out Of ... Feb 18th, 2020
J. Legge The Changing Role Of Foreign Workers In China
The Changing Role Of Foreign Workers In China One Of The Three, A Young, White, Western Woman, Has, In The Past 18 Months, Been Used By The Holy Spirit To Lead 26 Chinese High Schoolers To Faith In Christ And Is Establishing Them In A Church In A Place Which Previously Had No F
|
unctional Body.
|
A Chinese National Who Heard This Story Aug 19th, 2020
Our Lives Are Formed By Word And Sacra- Ment, And We ...
Mary's Story Embodies The Human And Divine; The Every-day And The Holy. Yet, That's What Our Lives Embody As Well, The Every-day And The Holy, When We Give Ourselves Over To God And Let The Spirit In To Lead And To Guide. The Holy Is Not Only Here With Us But Within Us. Remember The Words Of Baptism, The Seed Of Faith Planted Within Us To Grow Nov 20th, 2020
I Want To Be Follow This Simple Process And A Soul Winner ...
The Holy Spirit Will Lead Me To Lost Sinners And Help Me Get Them Saved. ! I Mu Stflw H Eproc A W Ay Echtim.! I Must Always Think And Remember To Ask Someone,
"Have You Ever Been Saved?" I Want To Be A Soul Winner Here's How I !must ! I Must Pray That The Lord Will Burden My Heart For Lost Souls. The Lord Will Make Me A Soul Winner. Jul 1th, 2020
The Lord S Prayer New Bulgaria Trip W
10. Verse 13 Sealed With Holy Spirit 11. Verse 14 Guaranteed Inheritance Evelyn Cowdery Good About Myself. I Realize That I Must Be Deceived, As I Know There Are Areas I Must Not Be Tending Per-fectly. I Often Pray From Psalm 139, "Let Me See Any Wicked Way In Me, And Lead Me In The Way Everlasting!" I Can Often Tell What's Happening In My Life, Based On What God Brings To My Mind In ... Nov 21th, 2020
May 26, 2013 The Most Holy Trinity HOLY WISDOM
May 26, 2013 The Most Holy Trinity HOLY WISDOM Today We Celebrate The Trinity's Work For Our Salvation. God The Father Is The Beginning. The Work Continues With The Sending Of The Son, Jesus, The Christ, Who Lives Among Us As The Way, The Truth, And The Life. Then The Spirit Of Truth Comes To Lead Us To The Complete Truth. Out Of Love, God Sanctifies Us In His Family. Holy Wisdom Delights In ... Sep
Courtcase For The Cleansing Of Your Generational Bloodline ...
Christ And The Fire Of The Holy Spirit. Make This Canopy Sound-, Sight- And Projectionproof For All Demons, All Powers Of Darkness And For All Their Servants. Cleanse The Canopy With The Blood Of The Lord Jesus And Fill It With Your Presence. Thank You For The Angels That You Have Given To Us To Protect And Help Us. Holy Spirit, Lead Us In This Court Session. B. Step Into The Heavenly ... Nov 7th, 2020
Explaining God's Salvation Plan To Kids
Salvation Plan To Kids. If You Have Any Other Questions Please Email Us At [email protected]. We Would Love To Help! It Is The Holy Spirit's Job To Convict Us Of Our Sin And Lead Us To Christ. It's A Great Privilege When God Allows Us To Be Part Of The Process In Others! If You Have A Child Who's Expressed An Interest In God's Salvation Plan, You Can Use These Key Thoughts To Equip You ... Sep 5th, 2020
Basic Catholic Prayers
Basic Catholic Prayers Sign Of The Cross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father . Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come, Thy Will Be Done, On Earth As It . Is In Heaven. Give Us This Day Our Daily Bread And Forgive Us Our Trespasses, As We Forgive Those Who . Trespass Against Us And Lead Us Not Into Temptation, But ... Mar 24th, 2020
MANIFESTATIONS OF THE SOUL SOUL POWER
Most Curses From Mankind Receive Their Power From The "latent Power Of Man's Soul". This, "inner Soul Power", Is To Be Lead By The Spirit Of Man, When It Isn't, Many Strange Things Can Occur. This Power Is Only To Be Directed By The Holy Spirit, Through Man's Spirit, Or It Is Dangerous. In Days Of Old, The Biblical Prophets And Other Great Leaders, Proclaimed Curses With The ... Oct 8th, 2020
HISTORY OF REDEMPTION - Welcome | BLBi
Spirit, Not Only That "He Would Lead You Into All Truth," But He Also Said, "He Shall Show You Things To Come" (cf. John 16:13). And The Holy Spirit Is The One That Has Given The Apocalypse, The Revelation Of Jesus Christ. It Is The Inspired Word Of
God, Given By The Holy Spirit. So The Holy Spirit Did Come And Lead Us Into All Truth, Primarily In The Epistles. But Now He Is Showing Us ... Oct 1th, 2020
Prayers & Hymns - WordPress.com
ASI ATHOLI PRAYERS Sign Of The Ross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come; Thy Will Be Done On Earth As It Is In Heaven. Give Us This Day Our Daily Bread; And Forgive Us Our Trespasses As We Forgive Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us ... Oct 9th, 2020
INTERNATIONAL CENTRAL GOSPEL CHURCH King's Temple
Rev Dr. Mensa Otabil, Asking God To Protect Him And His Family. · Pray For The Holy Spirit To Continually Lead And Guide Him And Also ?ll Him With Divine Ideas For The Future. · Pray For The Presbytery And The General Church Council Of ICGC, That Their Decision-making And Policy-making Will Always Be In?uenced By The Leading Of The Holy Spirit. · Pray For All Local Church Councils In ... Sep 17th, 2020
THE BALLINCOLLIG PARISHIONER
Had Been Stoned To Death And Saul Of Tarsus Had Begun His Persecution Of Christians. In Today's Reading, Peter's First Letter, We Are Advised To Be Prepared To Explain What Our Faith Is About And Why We Continue To Be People Of Hope. But Whatever Words We Use, It Is In The Way We Lead Our Lives That We Are Judged. As Bishop Gasparini Observed, "It Is Christ Through The Holy Spirit Who ... Oct 18th, 2020
MARS UP CHURCH - Nebula.wsimg.com
Through The Holy Spirit, To Lead Mars UP Into The Future. First And Foremost, My Sincere Thanks To Session For Hiring Me. I Suspect They Are As Anxious For Me To Begin My Work As I Am! I Have Been Impressed With Their Devotion, Commitment, And Love For Mars UP Church – Continue To Pray For Them And Their Leadership. Second (and Probably Just As Important), My Sincere Thanks And Appreciation ... Mar 22th, 2020
The Methodist Church Of Southern Africa And Homosexuality ... DEWCOM (2003:6) Notes The Third Approach To Scripture As Seeing The Bible As A
Living Document In The Life Of The Church, Which Is Enlivened By The Activity Of The Holy Spirit, Who Comes To Interpret The Words Of Scripture And So Lead The Church Into All Truth.4 The Entrenched Assumptions And Traditional Interpretations Are Challenged And The Church Is 1 DEWCOM(2003:4) 2 DEWCOM (2003:5). 3 ... Jun 6th, 2020
Lead Me, Holy Spirit Prayer & Study Guide
This Prayer And Study Guide Is Designed To Help You Have A Closer Relationship With God, Receive All That Jesus Has For You, ... Holy Spirit (from Now On Referred To As "the Book") And Your Bible. I Have Used The New King James Version Here, But You Can Use Any Trans - Lation You Like. It Would Be Good To Have A Small Notebook Or Journal With You So You Can Write Down Whatever God Speaks ... Nov 12th, 2020
There is a lot of books, user manual, or guidebook that related to Lead Me Holy
Powered by TCPDF (www.tcpdf.org)
Spirit Prayer Study Guide PDF in the link below:
SearchBook[NC80]
| 14,576
|
inside_word
|
Functional
|
remove_one_sentence
|
<url>
http://liftszervizkft.hu/lead-me-holy-spirit-prayer-study-guide.pdf
</url>
<text>
Lead Me Holy Spirit Prayer Study Guide Free Pdf Books
[EBOOK] Lead Me Holy Spirit Prayer Study Guide PDF Book is the book you are looking for, by download PDF Lead Me Holy Spirit Prayer Study Guide book you are also motivated to search from other sources
[EPUB] Mcqs Of Research - Id.spcultura.prefeitura.sp.gov.br
[EPUB] Mcqs Of Research Methodology Pdf Wmwikis From Romance To Mystery To Drama, This Website Is A Good Source For All Sorts Of Free E-books. When You're Making A Selection, You Can Go Through Reviews And Ratings For Each Book. If You're Looking For A Wide Variety Of Books In Various Categories, Check Out This Site. Interpreting Engineering Drawings 7th Edition Spados, Lead Me Holy Spirit ... Aug 23th, 2020
Empowered Coaching: Drawing Out The Best In Those You Lead Practice Of Coaching Are Clearly Illustrated And Lived Out In The Biblical Narrative. While This Particular Skill Set May Have Been First Introduced And Refined In The
Corporate World, This Paper Will Identify How Coaching Can Be Incorporated As A Leadership Skill In The Church With A Reliance On The Holy Spirit And A Helpful Expression Of Pastoral Care And Personal Development. As It Relates ... Aug 5th, 2020
Fourth Sunday Of Easter 2 May 2020
Fourth Sunday Of Easter . 2 May 2020. Collect Almighty Ever-living God, Lead Us To A Share In The Joys Of Heaven, So That The Humble Flock May Reach Where The Brave Shepherd Has Gone Before. Who Lives And Reigns With You In The Unity Of The Holy Spirit, One God, For Ever And Ever. Amen. Readings And Commentaries Apr 5th, 2020
Service Of Worship
Service Of Worship Trinity Sunday May 30, 2010 Eleven O'clock In The Morning Trinity Sunday Is The First Of The Many Sundays Of Ordinary Time That Follow Pentecost And Eventually Lead Up To Advent. Today We Celebrate The Doctrine Of The Holy Trinity—God As Father, Son, And Holy Spirit. We Celebrate The Holiness Of The Triune God, And Seek To Know How That Holiness Should Take Shape Among ...
The Spirit Realm - Clover Sites
Flee From Your Presence? If I Ascend To Heaven, Heaven You Are There ! If I Make My Bed In Sheol, You Are Sheol There ! If I Take The Wings Of The Morning And Dwell In The Uttermost Parts Of The Sea, Even There Uttermost Parts Of The Sea Your Hand Shall Lead Me , And Your Right Hand Shall Hold Me.' WHO Is The Holy Spirit C. He's GOD 1. As Eternal (Hebrews 9:14) 2. As Omnipotent/Creator ... Apr 10th, 2020
KEY: D Lead Sheet Holy Spirit - Discover Grace
Holy Spirit - Lead Sheet - 2 Of 2 KEY: D. Title: Holy Spirit Author: Katie Torwalt And Bryan Torwalt Subject: Jesus Culture - Live From New York Created Date: 6/4/2015 10:58:20 AM ... Jul 13th, 2020
LYFAMO IL H Y C L A O T H OL I C S C
And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. Hail Mary, Full Of Grace. Our Lord Is With Thee. Blessed Art Thou Among Women, And Blessed Is The
Fruit Of Thy Womb, Jesus. Holy Mary, Mother Of God, Pray For Us Sinners, Now And At The Hour Of Our Death. Amen. Glory Be Glory Be To The Father, And To The Son, And To The Holy Spirit. As It Was In The Beginning, Is Now, And Ever ... Mar 1th, 2020
St. Mary Called To Be Caring And Confident Our Learning ...
Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. WK 4 Hail Mary Full Of Grace, The Lord Is With Thee. Lessed Are Thou Among Women And Blessed Is The Fruit Of Thy Womb Jesus. Holy Mary Mother Of God, Pray For Us Sinners Now And At The Hour Of Our Death. Amen. Glory Be To The Father And To The Son And To The Holy Spirit. As It Was In The Beginning ... Jun 12th, 2020
Spiritual Leadership - Lead With Grace
11-Prayer And Leadership (1Tim 2:1) Jesus Often Withdrew To Lonely Places To Pray (Luke 5:16). Praying In The Spirit Means To Pray About The Things That Are In The Realm Of The Holy Spirit And To Pray In The Power And Energy Of The Spirit (Eph 6:18). Our Capacity To Know God's Will Is The Basis For All Prayers Of Faith (Rom
8:26-27). To Gain God's Ear, We Must Believe He Answers Us (Heb 11 ... Feb 12th, 2020
SEALED - LifeTeen.com For Catholic Youth
The Youth Minister Will List The Seven Gifts Of The Holy Spirit And Then The Teens Will Chose One Of The Seven Gifts Of The Holy Spirit They Want To Learn More About. Have At Least One Core Member Lead Each Discussion. Spend A Few Minutes Explaining Each Gift And Give The Teens An Opportunity To Ask And Answer Questions. See CCC 1831 For More Information On Each Gift. Close The Small Group ... Aug 14th, 2020
Queering The Trinity - WordPress.com
Some Who Embrace The Trinity Would Agree That Trinitarian Theology Can Be Seen As Rather Complicated And Confusing. According To Christian Dogma, The Trinity Is The Unity Of Father, Son, And Holy Spirit As Three Persons In One.5 Looking Through The Christian Bible, I Never Saw The Word "Trinity" And This Further Lead To My Confusion About How There Was Only One God , But Was Made Up Of ... Feb 2th, 2020
Empowered To Witness - Campbell UMC
Empowered To Witness By The Holy Spirit, We Will Discover, As The Early Church Did, That God Will Lead Us Farther And Farther Out. For As We Know From The Events Of This Week, Our Country Is A Country Thirsting For The Life-giving Message Of The Gospel. We Will Go, And We Must Go. And We Will Find That, As We Witness, As We Go Forward Despite Setbacks, Despite Great Persecutions, Embodying The ... Jan 19th, 2020
Wisdom And The Kingdom Of God
Of Goods In The Light Of The Holy Spirit. A Wise Person Sees The Value Of The Kingdom Of God And Gives Everything To Place Himself Under God's Rule. Wisdom Is To Make That Kingdom The Ultimate Value And The Highest Principle Of Discernment, To Be Ruled By God Rather Than Any Worldly Power. Allowing Ourselves To Be Ruled By God Will Lead To Life, While Choosing Any Other Ruler Will Lead To ... Jan 12th, 2020
June 20-21, 2020
Renew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways To The Glory Of Your Holy Name. Amen. P Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, And By His Authority, I Therefore Forgive You All Your Sins In The Name Of The Father And Of The T Son And Of The Holy Spirit ... Jan 5th, 2020
Chapter 4 Study Guide For Content Mastery Answer Key
El Highlander Inmortal Toy Industry Statistics Facts Statista Holt Mcdougal Eastern World Edition Grade 6 Juegos De Buscar Objetos Juega A Juegos En L Nea Gratis Lead Sheet 327 Holy Spirit Thou Art Welcome Mining Of Massive Datasets Exercise Solutions Anti Mucus Diet How To Know What To Eat And What To Avoid Maths Links Homework 8c Answers Oprah Winfrey What I Know For Sure Ebook Njatc Motor ... Jun 27th, 2020
Intercession Prayer Manual - Wiki.ctsnet.org
Intercession Prayer Manual *FREE* Intercession Prayer Manual Intercessory Prayer Harvestime SUGGESTIONS FOR GROUP STUDY FIRST MEETING Opening Open With
Prayer And Introductions Get Acquainted And Register The Students Establish Group Procedures Determine Who Will Lead The Meetings The Time Place And Dates For The Sessions Praise And Worship Invite The Presence Of The Holy Spirit Into Your ... Oct 14th, 2020
Morning Prayer For The Feast Of The Sacred Heart
CD "As One Voice" Book 1. Psalm 23 (alternate Sides) Antiphon The Love Of God Has Been Poured Into Our Hearts By The Holy Spirit Who Has Been Given To Us. Voice(s) 1 My God, You Are My Shepherd; There Is Nothing I Shall Want. Fresh And Green Are The Pastures Where You Give Me Repose. Near Restful Waters You Lead Me To Revive My Drooping Spirit. Aug 5th, 2020
SECOND BAPTIST CHURCH
At Second Baptist Church, Our Goal Is The Same In Every Area Of Ministry. From The Nursery To Senior Adults, We Exist To Make Disciples – To Lead People To Jesus Christ And Help Them Grow In Their Relationship With Him. It Is Our Goal To Present The Gospel To Others In Order To See The Holy Spirit Change Lives! No Matter Which Campus You Attend, As Part Of The Team You Will Experience The ... Apr
Just One More Thing Holy Spirit Jonathan Cleveland
And Lead Us Not Into Temptation, But Deliver Us From The Evil One.' Visual Reflection (Visio Divina)* Holy Spirit By Sabina Kiss Song For Reflection Build Your Kingdom Here By Rend Collective *Visio Divina – A Thoughtful And Slow Way Of Contemplating A Visual Prompt Like A Piece Of Art, Photograph Or Image Jul 27th, 2020
Pentecost Liturgy In The Name Of The Father, And Of The ...
That [s The Eagle, The King Of The Birds, _ Said His Neighbour. He Belongs To The Sky. We Belong To The Earth---were Chickens. So, The Eagle Lived And Died A Chicken, For That [s What He Thought He Was. Often, We Lead Lives Without Realizing The Power Of The Holy Spirit Inherent In Us. We Are ... Apr 9th, 2020
Revelation's Source Of Spiritual Power
2 Timothy 1:7 God Hasn't Given Us A Spirit Of Fear, But Of Power, Of Love, And Of A Sound Mind. Romans 8:14 As We Allow The Holy Spirit To Lead Us, We Become Sons
And Daughters Of God. Galatians 6:8 "He Who Sows To The Spirit Will Of The Spirit Reap Everlasting Life." Romans 8:11 We Need Not Fear Death, For Jesus, Through The Power Of The Holy Spirit, Will Resurrect His Faithful People ... Sep 24th, 2020
Rain Down (Alvin Slaughter) Holy Spirit Rain Down.
Holy Spirit Rain Down, Rain Down Let Your Power Fall Let Your Voice Be Heard Come And Change Our Hearts As We Stand On Your Word. Holy Spirit Rain Down. (To Top: Chorus/All) Lead/Solo No Eye Has Seen No Ear Has Heard No Mind Can Know What God Has In Store. So Open Up Heaven, Open It Wide, Over Your Church, And Over Our Lives. (Chorus/All) Lead/Solo Let Your Power Fall Let Your Voice Be Heard ... Nov 25th, 2020
(SATB) Holy Spirit Rain Down Key: F
Piano-Vocal Holy Spirit Rain Down - Page 6 Of 8 (SATB) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 4/28/2015 7:18:20 AM ... Apr 27th, 2020
Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal
Lead Sheet Holy Spirit Rain Down - Page 2 Of 2 (SAT) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 5/20/2014 8:22:11 PM ... May 12th, 2020
News From Christ Community United Methodist Church
Lot Owners And Anyone Interested In The Cemetery Are Urged To Attend. If You Have Any Questions, Please Contact Jerry Maurer.-3- Uganda Mission News The Uganda 2018 Team Will Leave For Africa On June 25th. We Covet Your Prayers For Safety For The Team, For Health, For Unity Of The Team Members, For Boldness In Sharing Christ, For The Holy Spirit To Lead And Direct Our Every Move And ... Nov 14th, 2020
PRAYER OF THE FAITHFUL 5th Sunday Of Easter A
PRAYER OF THE FAITHFUL 5th Sunday Of Easter A . PRIEST: God Is Love And Commands Us To Live In That Same Love. Let Us Turn To Him And Pray For The Strength To Live As The Lord Teaches: READER: For Francis Our Pope, That He Will Be Blessed With The Gifts Of The Holy Spirit And So Lead The Church In The Ways Of The Lord. (pause) Lord In Your Mercy . READER: For The Church, That It May Truly
ABC Jesus Loves Me Lego Christmas Activity Workbook Page 2
Lego Christmas Tree There Isn't A Day Go By That Our Children Don't Play With Legos. Using This Love, I Created A Lego Hristmas Tree To Help Our Kiddos Learn About Jesus. As Only The Holy Spirit Could Lead, The Christmas Tree Ended Up With 25 Pieces. Exactly What Was Needed To Add A Lego A Day. Sep 1th, 2020
Our Lady Of Mercy Church - D2y1pz2y630308.cloudfront.net
Our Lady Of Mercy Parish Is A Catholic Community That Worships God The Father, The Son And The Holy Spirit, ... Light Guiding Us Through The Murky Waters Of Change – He Who Alone Can Lead Our Parish Forward On The Path Of Christian Discipleship Towards The Kingdom Of Heaven! And So, Just Like John's Two Disciples From The Above Passage From Luke, May We Wait Patiently And With Hope-ful ... May 16th, 2020
Th Sunday After Pentecost
Renew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways
To The Glory Of Your Holy Name. Amen. P: Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, I Assure You That All Of Your Sins Are Forgiven In The Name Of The Father And Of The Son And Of The Holy Spirit. C: Amen. 3 ... Sep 22th, 2020
Initiation Into Hermetics - Timothy-c6160.firebaseapp.com
By Franz Bardon Initiation Into Hermetics By Franz Bardon Self-initiation Into The Holy Mysteries With The Need Of A Guru Or Master. Initiation Into Hermetics Provides Step By Step Instruction In The Form Of Practical Exercises. These Exercises Lead To The Development Of Body, Soul And Spirit. The Result Of The Practical Exercises Is The Development Of Occult Abilities Which Can Be Of Benefit ... Sep 14th, 2020
15 Minutes Alone With God - Harvest House
The 15-minute Concept Works! You Just Have To Be Will-ing To Give It A Try. Fifteen Minutes A Day For 21 Days And You Are On Your Way To Devotions Every Day. Allow God To Hold Your Hand And Lead You Today To Many Quiet Times With Him. The
Only Hope To The Busy Woman's Cry Is God Almighty Himself! God The Father God The Son And God The Holy Spirit I Love You All. May The Lord Touch Each Quiet ... Nov 6th, 2020
Download Kindle # Raising The Runes: A Shamanic Journey ...
In Raising The Runes, Readers Learn To Choose A Rune, Call In Spirit Guides, Do A Chant Of Protection And Li@ The Veil Between Realms Of Conscious Perception. As You Read The Stories Of The Runes, Keep An Open Mind And Let The Source Of The Runes Flow Through You. Odin, The Great Father, Will Lead You To Write Your Own Holy Book, And Show You A Better Way To Live. Each Man Or Woman S Runic ... May 18th, 2020
GOODBYE MESSIANIC JUDAISM!
Back In 1983, After Seminary At Oral Roberts University, Where I Learned That The Law Was 'done Away With', The Holy Spirit Challenged My View Of The Law Of Moses. Finding Out About Messianic Judaism, I Thought It Was The Vehicle That The Spirit Of Yeshua Would Use To Lead Both Jew And Gentile Into Torah Observance. In Fact It Was, In Spite Of Itself. Many Have Come Out Of ... Feb 18th, 2020
J. Legge The Changing Role Of Foreign Workers In China
The Changing Role Of Foreign Workers In China One Of The Three, A Young, White, Western Woman, Has, In The Past 18 Months, Been Used By The Holy Spirit To Lead 26 Chinese High Schoolers To Faith In Christ And Is Establishing Them In A Church In A Place Which Previously Had No F<cursor_is_here> A Chinese National Who Heard This Story Aug 19th, 2020
Our Lives Are Formed By Word And Sacra- Ment, And We ...
Mary's Story Embodies The Human And Divine; The Every-day And The Holy. Yet, That's What Our Lives Embody As Well, The Every-day And The Holy, When We Give Ourselves Over To God And Let The Spirit In To Lead And To Guide. The Holy Is Not Only Here With Us But Within Us. Remember The Words Of Baptism, The Seed Of Faith Planted Within Us To Grow Nov 20th, 2020
I Want To Be Follow This Simple Process And A Soul Winner ...
The Holy Spirit Will Lead Me To Lost Sinners And Help Me Get Them Saved. ! I Mu Stflw H Eproc A W Ay Echtim.! I Must Always Think And Remember To Ask Someone,
"Have You Ever Been Saved?" I Want To Be A Soul Winner Here's How I !must ! I Must Pray That The Lord Will Burden My Heart For Lost Souls. The Lord Will Make Me A Soul Winner. Jul 1th, 2020
The Lord S Prayer New Bulgaria Trip W
10. Verse 13 Sealed With Holy Spirit 11. Verse 14 Guaranteed Inheritance Evelyn Cowdery Good About Myself. I Realize That I Must Be Deceived, As I Know There Are Areas I Must Not Be Tending Per-fectly. I Often Pray From Psalm 139, "Let Me See Any Wicked Way In Me, And Lead Me In The Way Everlasting!" I Can Often Tell What's Happening In My Life, Based On What God Brings To My Mind In ... Nov 21th, 2020
May 26, 2013 The Most Holy Trinity HOLY WISDOM
May 26, 2013 The Most Holy Trinity HOLY WISDOM Today We Celebrate The Trinity's Work For Our Salvation. God The Father Is The Beginning. The Work Continues With The Sending Of The Son, Jesus, The Christ, Who Lives Among Us As The Way, The Truth, And The Life. Then The Spirit Of Truth Comes To Lead Us To The Complete Truth. Out Of Love, God Sanctifies Us In His Family. Holy Wisdom Delights In ... Sep
Courtcase For The Cleansing Of Your Generational Bloodline ...
Christ And The Fire Of The Holy Spirit. Make This Canopy Sound-, Sight- And Projectionproof For All Demons, All Powers Of Darkness And For All Their Servants. Cleanse The Canopy With The Blood Of The Lord Jesus And Fill It With Your Presence. Thank You For The Angels That You Have Given To Us To Protect And Help Us. Holy Spirit, Lead Us In This Court Session. B. Step Into The Heavenly ... Nov 7th, 2020
Explaining God's Salvation Plan To Kids
Salvation Plan To Kids. If You Have Any Other Questions Please Email Us At [email protected]. We Would Love To Help! It Is The Holy Spirit's Job To Convict Us Of Our Sin And Lead Us To Christ. It's A Great Privilege When God Allows Us To Be Part Of The Process In Others! If You Have A Child Who's Expressed An Interest In God's Salvation Plan, You Can Use These Key Thoughts To Equip You ... Sep 5th, 2020
Basic Catholic Prayers
Basic Catholic Prayers Sign Of The Cross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father . Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come, Thy Will Be Done, On Earth As It . Is In Heaven. Give Us This Day Our Daily Bread And Forgive Us Our Trespasses, As We Forgive Those Who . Trespass Against Us And Lead Us Not Into Temptation, But ... Mar 24th, 2020
MANIFESTATIONS OF THE SOUL SOUL POWER
Most Curses From Mankind Receive Their Power From The "latent Power Of Man's Soul". This, "inner Soul Power", Is To Be Lead By The Spirit Of Man, When It Isn't, Many Strange Things Can Occur. This Power Is Only To Be Directed By The Holy Spirit, Through Man's Spirit, Or It Is Dangerous. In Days Of Old, The Biblical Prophets And Other Great Leaders, Proclaimed Curses With The ... Oct 8th, 2020
HISTORY OF REDEMPTION - Welcome | BLBi
Spirit, Not Only That "He Would Lead You Into All Truth," But He Also Said, "He Shall Show You Things To Come" (cf. John 16:13). And The Holy Spirit Is The One That Has Given The Apocalypse, The Revelation Of Jesus Christ. It Is The Inspired Word Of
God, Given By The Holy Spirit. So The Holy Spirit Did Come And Lead Us Into All Truth, Primarily In The Epistles. But Now He Is Showing Us ... Oct 1th, 2020
Prayers & Hymns - WordPress.com
ASI ATHOLI PRAYERS Sign Of The Ross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come; Thy Will Be Done On Earth As It Is In Heaven. Give Us This Day Our Daily Bread; And Forgive Us Our Trespasses As We Forgive Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us ... Oct 9th, 2020
INTERNATIONAL CENTRAL GOSPEL CHURCH King's Temple
Rev Dr. Mensa Otabil, Asking God To Protect Him And His Family. · Pray For The Holy Spirit To Continually Lead And Guide Him And Also ?ll Him With Divine Ideas For The Future. · Pray For The Presbytery And The General Church Council Of ICGC, That Their Decision-making And Policy-making Will Always Be In?uenced By The Leading Of The Holy Spirit. · Pray For All Local Church Councils In ... Sep 17th, 2020
THE BALLINCOLLIG PARISHIONER
Had Been Stoned To Death And Saul Of Tarsus Had Begun His Persecution Of Christians. In Today's Reading, Peter's First Letter, We Are Advised To Be Prepared To Explain What Our Faith Is About And Why We Continue To Be People Of Hope. But Whatever Words We Use, It Is In The Way We Lead Our Lives That We Are Judged. As Bishop Gasparini Observed, "It Is Christ Through The Holy Spirit Who ... Oct 18th, 2020
MARS UP CHURCH - Nebula.wsimg.com
Through The Holy Spirit, To Lead Mars UP Into The Future. First And Foremost, My Sincere Thanks To Session For Hiring Me. I Suspect They Are As Anxious For Me To Begin My Work As I Am! I Have Been Impressed With Their Devotion, Commitment, And Love For Mars UP Church – Continue To Pray For Them And Their Leadership. Second (and Probably Just As Important), My Sincere Thanks And Appreciation ... Mar 22th, 2020
The Methodist Church Of Southern Africa And Homosexuality ... DEWCOM (2003:6) Notes The Third Approach To Scripture As Seeing The Bible As A
Living Document In The Life Of The Church, Which Is Enlivened By The Activity Of The Holy Spirit, Who Comes To Interpret The Words Of Scripture And So Lead The Church Into All Truth.4 The Entrenched Assumptions And Traditional Interpretations Are Challenged And The Church Is 1 DEWCOM(2003:4) 2 DEWCOM (2003:5). 3 ... Jun 6th, 2020
Lead Me, Holy Spirit Prayer & Study Guide
This Prayer And Study Guide Is Designed To Help You Have A Closer Relationship With God, Receive All That Jesus Has For You, ... Holy Spirit (from Now On Referred To As "the Book") And Your Bible. I Have Used The New King James Version Here, But You Can Use Any Trans - Lation You Like. It Would Be Good To Have A Small Notebook Or Journal With You So You Can Write Down Whatever God Speaks ... Nov 12th, 2020
There is a lot of books, user manual, or guidebook that related to Lead Me Holy
Powered by TCPDF (www.tcpdf.org)
Spirit Prayer Study Guide PDF in the link below:
SearchBook[NC80]
</text>
|
[
{
"content": "<url>\nhttp://liftszervizkft.hu/lead-me-holy-spirit-prayer-study-guide.pdf\n</url>\n<text>\nLead Me Holy Spirit Prayer Study Guide Free Pdf Books\n\n[EBOOK] Lead Me Holy Spirit Prayer Study Guide PDF Book is the book you are looking for, by download PDF Lead Me Holy Spirit Prayer Study Guide book you are also motivated to search from other sources\n\n[EPUB] Mcqs Of Research - Id.spcultura.prefeitura.sp.gov.br\n\n[EPUB] Mcqs Of Research Methodology Pdf Wmwikis From Romance To Mystery To Drama, This Website Is A Good Source For All Sorts Of Free E-books. When You're Making A Selection, You Can Go Through Reviews And Ratings For Each Book. If You're Looking For A Wide Variety Of Books In Various Categories, Check Out This Site. Interpreting Engineering Drawings 7th Edition Spados, Lead Me Holy Spirit ... Aug 23th, 2020\n\nEmpowered Coaching: Drawing Out The Best In Those You Lead Practice Of Coaching Are Clearly Illustrated And Lived Out In The Biblical Narrative. While This Particular Skill Set May Have Been First Introduced And Refined In The\n\nCorporate World, This Paper Will Identify How Coaching Can Be Incorporated As A Leadership Skill In The Church With A Reliance On The Holy Spirit And A Helpful Expression Of Pastoral Care And Personal Development. As It Relates ... Aug 5th, 2020\n\nFourth Sunday Of Easter 2 May 2020\n\nFourth Sunday Of Easter . 2 May 2020. Collect Almighty Ever-living God, Lead Us To A Share In The Joys Of Heaven, So That The Humble Flock May Reach Where The Brave Shepherd Has Gone Before. Who Lives And Reigns With You In The Unity Of The Holy Spirit, One God, For Ever And Ever. Amen. Readings And Commentaries Apr 5th, 2020\n\nService Of Worship\n\nService Of Worship Trinity Sunday May 30, 2010 Eleven O'clock In The Morning Trinity Sunday Is The First Of The Many Sundays Of Ordinary Time That Follow Pentecost And Eventually Lead Up To Advent. Today We Celebrate The Doctrine Of The Holy Trinity—God As Father, Son, And Holy Spirit. We Celebrate The Holiness Of The Triune God, And Seek To Know How That Holiness Should Take Shape Among ...\n\nThe Spirit Realm - Clover Sites\n\nFlee From Your Presence? If I Ascend To Heaven, Heaven You Are There ! If I Make My Bed In Sheol, You Are Sheol There ! If I Take The Wings Of The Morning And Dwell In The Uttermost Parts Of The Sea, Even There Uttermost Parts Of The Sea Your Hand Shall Lead Me , And Your Right Hand Shall Hold Me.' WHO Is The Holy Spirit C. He's GOD 1. As Eternal (Hebrews 9:14) 2. As Omnipotent/Creator ... Apr 10th, 2020\n\nKEY: D Lead Sheet Holy Spirit - Discover Grace\n\nHoly Spirit - Lead Sheet - 2 Of 2 KEY: D. Title: Holy Spirit Author: Katie Torwalt And Bryan Torwalt Subject: Jesus Culture - Live From New York Created Date: 6/4/2015 10:58:20 AM ... Jul 13th, 2020\n\nLYFAMO IL H Y C L A O T H OL I C S C\n\nAnd Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. Hail Mary, Full Of Grace. Our Lord Is With Thee. Blessed Art Thou Among Women, And Blessed Is The\n\nFruit Of Thy Womb, Jesus. Holy Mary, Mother Of God, Pray For Us Sinners, Now And At The Hour Of Our Death. Amen. Glory Be Glory Be To The Father, And To The Son, And To The Holy Spirit. As It Was In The Beginning, Is Now, And Ever ... Mar 1th, 2020\n\nSt. Mary Called To Be Caring And Confident Our Learning ...\n\nThose Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us From Evil. Amen. WK 4 Hail Mary Full Of Grace, The Lord Is With Thee. Lessed Are Thou Among Women And Blessed Is The Fruit Of Thy Womb Jesus. Holy Mary Mother Of God, Pray For Us Sinners Now And At The Hour Of Our Death. Amen. Glory Be To The Father And To The Son And To The Holy Spirit. As It Was In The Beginning ... Jun 12th, 2020\n\nSpiritual Leadership - Lead With Grace\n\n11-Prayer And Leadership (1Tim 2:1) Jesus Often Withdrew To Lonely Places To Pray (Luke 5:16). Praying In The Spirit Means To Pray About The Things That Are In The Realm Of The Holy Spirit And To Pray In The Power And Energy Of The Spirit (Eph 6:18). Our Capacity To Know God's Will Is The Basis For All Prayers Of Faith (Rom\n\n8:26-27). To Gain God's Ear, We Must Believe He Answers Us (Heb 11 ... Feb 12th, 2020\n\nSEALED - LifeTeen.com For Catholic Youth\n\nThe Youth Minister Will List The Seven Gifts Of The Holy Spirit And Then The Teens Will Chose One Of The Seven Gifts Of The Holy Spirit They Want To Learn More About. Have At Least One Core Member Lead Each Discussion. Spend A Few Minutes Explaining Each Gift And Give The Teens An Opportunity To Ask And Answer Questions. See CCC 1831 For More Information On Each Gift. Close The Small Group ... Aug 14th, 2020\n\nQueering The Trinity - WordPress.com\n\nSome Who Embrace The Trinity Would Agree That Trinitarian Theology Can Be Seen As Rather Complicated And Confusing. According To Christian Dogma, The Trinity Is The Unity Of Father, Son, And Holy Spirit As Three Persons In One.5 Looking Through The Christian Bible, I Never Saw The Word \"Trinity\" And This Further Lead To My Confusion About How There Was Only One God , But Was Made Up Of ... Feb 2th, 2020\n\nEmpowered To Witness - Campbell UMC\n\nEmpowered To Witness By The Holy Spirit, We Will Discover, As The Early Church Did, That God Will Lead Us Farther And Farther Out. For As We Know From The Events Of This Week, Our Country Is A Country Thirsting For The Life-giving Message Of The Gospel. We Will Go, And We Must Go. And We Will Find That, As We Witness, As We Go Forward Despite Setbacks, Despite Great Persecutions, Embodying The ... Jan 19th, 2020\n\nWisdom And The Kingdom Of God\n\nOf Goods In The Light Of The Holy Spirit. A Wise Person Sees The Value Of The Kingdom Of God And Gives Everything To Place Himself Under God's Rule. Wisdom Is To Make That Kingdom The Ultimate Value And The Highest Principle Of Discernment, To Be Ruled By God Rather Than Any Worldly Power. Allowing Ourselves To Be Ruled By God Will Lead To Life, While Choosing Any Other Ruler Will Lead To ... Jan 12th, 2020\n\nJune 20-21, 2020\n\nRenew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways To The Glory Of Your Holy Name. Amen. P Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, And By His Authority, I Therefore Forgive You All Your Sins In The Name Of The Father And Of The T Son And Of The Holy Spirit ... Jan 5th, 2020\n\nChapter 4 Study Guide For Content Mastery Answer Key\n\nEl Highlander Inmortal Toy Industry Statistics Facts Statista Holt Mcdougal Eastern World Edition Grade 6 Juegos De Buscar Objetos Juega A Juegos En L Nea Gratis Lead Sheet 327 Holy Spirit Thou Art Welcome Mining Of Massive Datasets Exercise Solutions Anti Mucus Diet How To Know What To Eat And What To Avoid Maths Links Homework 8c Answers Oprah Winfrey What I Know For Sure Ebook Njatc Motor ... Jun 27th, 2020\n\nIntercession Prayer Manual - Wiki.ctsnet.org\n\nIntercession Prayer Manual *FREE* Intercession Prayer Manual Intercessory Prayer Harvestime SUGGESTIONS FOR GROUP STUDY FIRST MEETING Opening Open With\n\nPrayer And Introductions Get Acquainted And Register The Students Establish Group Procedures Determine Who Will Lead The Meetings The Time Place And Dates For The Sessions Praise And Worship Invite The Presence Of The Holy Spirit Into Your ... Oct 14th, 2020\n\nMorning Prayer For The Feast Of The Sacred Heart\n\nCD \"As One Voice\" Book 1. Psalm 23 (alternate Sides) Antiphon The Love Of God Has Been Poured Into Our Hearts By The Holy Spirit Who Has Been Given To Us. Voice(s) 1 My God, You Are My Shepherd; There Is Nothing I Shall Want. Fresh And Green Are The Pastures Where You Give Me Repose. Near Restful Waters You Lead Me To Revive My Drooping Spirit. Aug 5th, 2020\n\nSECOND BAPTIST CHURCH\n\nAt Second Baptist Church, Our Goal Is The Same In Every Area Of Ministry. From The Nursery To Senior Adults, We Exist To Make Disciples – To Lead People To Jesus Christ And Help Them Grow In Their Relationship With Him. It Is Our Goal To Present The Gospel To Others In Order To See The Holy Spirit Change Lives! No Matter Which Campus You Attend, As Part Of The Team You Will Experience The ... Apr\n\nJust One More Thing Holy Spirit Jonathan Cleveland\n\nAnd Lead Us Not Into Temptation, But Deliver Us From The Evil One.' Visual Reflection (Visio Divina)* Holy Spirit By Sabina Kiss Song For Reflection Build Your Kingdom Here By Rend Collective *Visio Divina – A Thoughtful And Slow Way Of Contemplating A Visual Prompt Like A Piece Of Art, Photograph Or Image Jul 27th, 2020\n\nPentecost Liturgy In The Name Of The Father, And Of The ...\n\nThat [s The Eagle, The King Of The Birds, _ Said His Neighbour. He Belongs To The Sky. We Belong To The Earth---were Chickens. So, The Eagle Lived And Died A Chicken, For That [s What He Thought He Was. Often, We Lead Lives Without Realizing The Power Of The Holy Spirit Inherent In Us. We Are ... Apr 9th, 2020\n\nRevelation's Source Of Spiritual Power\n\n2 Timothy 1:7 God Hasn't Given Us A Spirit Of Fear, But Of Power, Of Love, And Of A Sound Mind. Romans 8:14 As We Allow The Holy Spirit To Lead Us, We Become Sons\n\nAnd Daughters Of God. Galatians 6:8 \"He Who Sows To The Spirit Will Of The Spirit Reap Everlasting Life.\" Romans 8:11 We Need Not Fear Death, For Jesus, Through The Power Of The Holy Spirit, Will Resurrect His Faithful People ... Sep 24th, 2020\n\nRain Down (Alvin Slaughter) Holy Spirit Rain Down.\n\nHoly Spirit Rain Down, Rain Down Let Your Power Fall Let Your Voice Be Heard Come And Change Our Hearts As We Stand On Your Word. Holy Spirit Rain Down. (To Top: Chorus/All) Lead/Solo No Eye Has Seen No Ear Has Heard No Mind Can Know What God Has In Store. So Open Up Heaven, Open It Wide, Over Your Church, And Over Our Lives. (Chorus/All) Lead/Solo Let Your Power Fall Let Your Voice Be Heard ... Nov 25th, 2020\n\n(SATB) Holy Spirit Rain Down Key: F\n\nPiano-Vocal Holy Spirit Rain Down - Page 6 Of 8 (SATB) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 4/28/2015 7:18:20 AM ... Apr 27th, 2020\n\nHoly Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal\n\nLead Sheet Holy Spirit Rain Down - Page 2 Of 2 (SAT) Key: F. Title: Holy Spirit Rain Down (Hillsong Church) Lead Sheet Piano Vocal Author: Jim Molina Created Date: 5/20/2014 8:22:11 PM ... May 12th, 2020\n\nNews From Christ Community United Methodist Church\n\nLot Owners And Anyone Interested In The Cemetery Are Urged To Attend. If You Have Any Questions, Please Contact Jerry Maurer.-3- Uganda Mission News The Uganda 2018 Team Will Leave For Africa On June 25th. We Covet Your Prayers For Safety For The Team, For Health, For Unity Of The Team Members, For Boldness In Sharing Christ, For The Holy Spirit To Lead And Direct Our Every Move And ... Nov 14th, 2020\n\nPRAYER OF THE FAITHFUL 5th Sunday Of Easter A\n\nPRAYER OF THE FAITHFUL 5th Sunday Of Easter A . PRIEST: God Is Love And Commands Us To Live In That Same Love. Let Us Turn To Him And Pray For The Strength To Live As The Lord Teaches: READER: For Francis Our Pope, That He Will Be Blessed With The Gifts Of The Holy Spirit And So Lead The Church In The Ways Of The Lord. (pause) Lord In Your Mercy . READER: For The Church, That It May Truly\n\nABC Jesus Loves Me Lego Christmas Activity Workbook Page 2\n\nLego Christmas Tree There Isn't A Day Go By That Our Children Don't Play With Legos. Using This Love, I Created A Lego Hristmas Tree To Help Our Kiddos Learn About Jesus. As Only The Holy Spirit Could Lead, The Christmas Tree Ended Up With 25 Pieces. Exactly What Was Needed To Add A Lego A Day. Sep 1th, 2020\n\nOur Lady Of Mercy Church - D2y1pz2y630308.cloudfront.net\n\nOur Lady Of Mercy Parish Is A Catholic Community That Worships God The Father, The Son And The Holy Spirit, ... Light Guiding Us Through The Murky Waters Of Change – He Who Alone Can Lead Our Parish Forward On The Path Of Christian Discipleship Towards The Kingdom Of Heaven! And So, Just Like John's Two Disciples From The Above Passage From Luke, May We Wait Patiently And With Hope-ful ... May 16th, 2020\n\nTh Sunday After Pentecost\n\nRenew Us, And Lead Us, So That We May Delight In Your Will And Walk In Your Ways\n\nTo The Glory Of Your Holy Name. Amen. P: Almighty God In His Mercy Has Given His Son To Die For You And For His Sake Forgives You All Your Sins. As A Called And Ordained Servant Of Christ, I Assure You That All Of Your Sins Are Forgiven In The Name Of The Father And Of The Son And Of The Holy Spirit. C: Amen. 3 ... Sep 22th, 2020\n\nInitiation Into Hermetics - Timothy-c6160.firebaseapp.com\n\nBy Franz Bardon Initiation Into Hermetics By Franz Bardon Self-initiation Into The Holy Mysteries With The Need Of A Guru Or Master. Initiation Into Hermetics Provides Step By Step Instruction In The Form Of Practical Exercises. These Exercises Lead To The Development Of Body, Soul And Spirit. The Result Of The Practical Exercises Is The Development Of Occult Abilities Which Can Be Of Benefit ... Sep 14th, 2020\n\n15 Minutes Alone With God - Harvest House\n\nThe 15-minute Concept Works! You Just Have To Be Will-ing To Give It A Try. Fifteen Minutes A Day For 21 Days And You Are On Your Way To Devotions Every Day. Allow God To Hold Your Hand And Lead You Today To Many Quiet Times With Him. The\n\nOnly Hope To The Busy Woman's Cry Is God Almighty Himself! God The Father God The Son And God The Holy Spirit I Love You All. May The Lord Touch Each Quiet ... Nov 6th, 2020\n\nDownload Kindle # Raising The Runes: A Shamanic Journey ...\n\nIn Raising The Runes, Readers Learn To Choose A Rune, Call In Spirit Guides, Do A Chant Of Protection And Li@ The Veil Between Realms Of Conscious Perception. As You Read The Stories Of The Runes, Keep An Open Mind And Let The Source Of The Runes Flow Through You. Odin, The Great Father, Will Lead You To Write Your Own Holy Book, And Show You A Better Way To Live. Each Man Or Woman S Runic ... May 18th, 2020\n\nGOODBYE MESSIANIC JUDAISM!\n\nBack In 1983, After Seminary At Oral Roberts University, Where I Learned That The Law Was 'done Away With', The Holy Spirit Challenged My View Of The Law Of Moses. Finding Out About Messianic Judaism, I Thought It Was The Vehicle That The Spirit Of Yeshua Would Use To Lead Both Jew And Gentile Into Torah Observance. In Fact It Was, In Spite Of Itself. Many Have Come Out Of ... Feb 18th, 2020\n\nJ. Legge The Changing Role Of Foreign Workers In China\n\nThe Changing Role Of Foreign Workers In China One Of The Three, A Young, White, Western Woman, Has, In The Past 18 Months, Been Used By The Holy Spirit To Lead 26 Chinese High Schoolers To Faith In Christ And Is Establishing Them In A Church In A Place Which Previously Had No F<cursor_is_here> A Chinese National Who Heard This Story Aug 19th, 2020\n\nOur Lives Are Formed By Word And Sacra- Ment, And We ...\n\nMary's Story Embodies The Human And Divine; The Every-day And The Holy. Yet, That's What Our Lives Embody As Well, The Every-day And The Holy, When We Give Ourselves Over To God And Let The Spirit In To Lead And To Guide. The Holy Is Not Only Here With Us But Within Us. Remember The Words Of Baptism, The Seed Of Faith Planted Within Us To Grow Nov 20th, 2020\n\nI Want To Be Follow This Simple Process And A Soul Winner ...\n\nThe Holy Spirit Will Lead Me To Lost Sinners And Help Me Get Them Saved. ! I Mu Stflw H Eproc A W Ay Echtim.! I Must Always Think And Remember To Ask Someone,\n\n\"Have You Ever Been Saved?\" I Want To Be A Soul Winner Here's How I !must ! I Must Pray That The Lord Will Burden My Heart For Lost Souls. The Lord Will Make Me A Soul Winner. Jul 1th, 2020\n\nThe Lord S Prayer New Bulgaria Trip W\n\n10. Verse 13 Sealed With Holy Spirit 11. Verse 14 Guaranteed Inheritance Evelyn Cowdery Good About Myself. I Realize That I Must Be Deceived, As I Know There Are Areas I Must Not Be Tending Per-fectly. I Often Pray From Psalm 139, \"Let Me See Any Wicked Way In Me, And Lead Me In The Way Everlasting!\" I Can Often Tell What's Happening In My Life, Based On What God Brings To My Mind In ... Nov 21th, 2020\n\nMay 26, 2013 The Most Holy Trinity HOLY WISDOM\n\nMay 26, 2013 The Most Holy Trinity HOLY WISDOM Today We Celebrate The Trinity's Work For Our Salvation. God The Father Is The Beginning. The Work Continues With The Sending Of The Son, Jesus, The Christ, Who Lives Among Us As The Way, The Truth, And The Life. Then The Spirit Of Truth Comes To Lead Us To The Complete Truth. Out Of Love, God Sanctifies Us In His Family. Holy Wisdom Delights In ... Sep\n\nCourtcase For The Cleansing Of Your Generational Bloodline ...\n\nChrist And The Fire Of The Holy Spirit. Make This Canopy Sound-, Sight- And Projectionproof For All Demons, All Powers Of Darkness And For All Their Servants. Cleanse The Canopy With The Blood Of The Lord Jesus And Fill It With Your Presence. Thank You For The Angels That You Have Given To Us To Protect And Help Us. Holy Spirit, Lead Us In This Court Session. B. Step Into The Heavenly ... Nov 7th, 2020\n\nExplaining God's Salvation Plan To Kids\n\nSalvation Plan To Kids. If You Have Any Other Questions Please Email Us At [email protected]. We Would Love To Help! It Is The Holy Spirit's Job To Convict Us Of Our Sin And Lead Us To Christ. It's A Great Privilege When God Allows Us To Be Part Of The Process In Others! If You Have A Child Who's Expressed An Interest In God's Salvation Plan, You Can Use These Key Thoughts To Equip You ... Sep 5th, 2020\n\nBasic Catholic Prayers\n\nBasic Catholic Prayers Sign Of The Cross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father . Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come, Thy Will Be Done, On Earth As It . Is In Heaven. Give Us This Day Our Daily Bread And Forgive Us Our Trespasses, As We Forgive Those Who . Trespass Against Us And Lead Us Not Into Temptation, But ... Mar 24th, 2020\n\nMANIFESTATIONS OF THE SOUL SOUL POWER\n\nMost Curses From Mankind Receive Their Power From The \"latent Power Of Man's Soul\". This, \"inner Soul Power\", Is To Be Lead By The Spirit Of Man, When It Isn't, Many Strange Things Can Occur. This Power Is Only To Be Directed By The Holy Spirit, Through Man's Spirit, Or It Is Dangerous. In Days Of Old, The Biblical Prophets And Other Great Leaders, Proclaimed Curses With The ... Oct 8th, 2020\n\nHISTORY OF REDEMPTION - Welcome | BLBi\n\nSpirit, Not Only That \"He Would Lead You Into All Truth,\" But He Also Said, \"He Shall Show You Things To Come\" (cf. John 16:13). And The Holy Spirit Is The One That Has Given The Apocalypse, The Revelation Of Jesus Christ. It Is The Inspired Word Of\n\nGod, Given By The Holy Spirit. So The Holy Spirit Did Come And Lead Us Into All Truth, Primarily In The Epistles. But Now He Is Showing Us ... Oct 1th, 2020\n\nPrayers & Hymns - WordPress.com\n\nASI ATHOLI PRAYERS Sign Of The Ross In The Name Of The Father, And Of The Son, And Of The Holy Spirit. Amen. Our Father Our Father, Who Art In Heaven, Hallowed Be Thy Name; Thy Kingdom Come; Thy Will Be Done On Earth As It Is In Heaven. Give Us This Day Our Daily Bread; And Forgive Us Our Trespasses As We Forgive Those Who Trespass Against Us; And Lead Us Not Into Temptation, But Deliver Us ... Oct 9th, 2020\n\nINTERNATIONAL CENTRAL GOSPEL CHURCH King's Temple\n\nRev Dr. Mensa Otabil, Asking God To Protect Him And His Family. · Pray For The Holy Spirit To Continually Lead And Guide Him And Also ?ll Him With Divine Ideas For The Future. · Pray For The Presbytery And The General Church Council Of ICGC, That Their Decision-making And Policy-making Will Always Be In?uenced By The Leading Of The Holy Spirit. · Pray For All Local Church Councils In ... Sep 17th, 2020\n\nTHE BALLINCOLLIG PARISHIONER\n\nHad Been Stoned To Death And Saul Of Tarsus Had Begun His Persecution Of Christians. In Today's Reading, Peter's First Letter, We Are Advised To Be Prepared To Explain What Our Faith Is About And Why We Continue To Be People Of Hope. But Whatever Words We Use, It Is In The Way We Lead Our Lives That We Are Judged. As Bishop Gasparini Observed, \"It Is Christ Through The Holy Spirit Who ... Oct 18th, 2020\n\nMARS UP CHURCH - Nebula.wsimg.com\n\nThrough The Holy Spirit, To Lead Mars UP Into The Future. First And Foremost, My Sincere Thanks To Session For Hiring Me. I Suspect They Are As Anxious For Me To Begin My Work As I Am! I Have Been Impressed With Their Devotion, Commitment, And Love For Mars UP Church – Continue To Pray For Them And Their Leadership. Second (and Probably Just As Important), My Sincere Thanks And Appreciation ... Mar 22th, 2020\n\nThe Methodist Church Of Southern Africa And Homosexuality ... DEWCOM (2003:6) Notes The Third Approach To Scripture As Seeing The Bible As A\n\nLiving Document In The Life Of The Church, Which Is Enlivened By The Activity Of The Holy Spirit, Who Comes To Interpret The Words Of Scripture And So Lead The Church Into All Truth.4 The Entrenched Assumptions And Traditional Interpretations Are Challenged And The Church Is 1 DEWCOM(2003:4) 2 DEWCOM (2003:5). 3 ... Jun 6th, 2020\n\nLead Me, Holy Spirit Prayer & Study Guide\n\nThis Prayer And Study Guide Is Designed To Help You Have A Closer Relationship With God, Receive All That Jesus Has For You, ... Holy Spirit (from Now On Referred To As \"the Book\") And Your Bible. I Have Used The New King James Version Here, But You Can Use Any Trans - Lation You Like. It Would Be Good To Have A Small Notebook Or Journal With You So You Can Write Down Whatever God Speaks ... Nov 12th, 2020\n\nThere is a lot of books, user manual, or guidebook that related to Lead Me Holy\n\nPowered by TCPDF (www.tcpdf.org)\n\nSpirit Prayer Study Guide PDF in the link below:\n\nSearchBook[NC80]\n</text>\n",
"role": "user"
},
{
"content": "unctional Body.",
"role": "assistant"
}
] |
ACCESS
Quarterly Guide
Spring 2020
ROSELLE PUBLIC LIBRARY DISTRICT
80 YEARS
of LIBRARY SERVICE
MARCH • APRIL • MAY
FRIENDS of the
ROSELLE PUBLIC LIBRARY
ANNUAL SPRING BOOK SALE
Saturday, April 4 • 9:30 a.m. - 3:30 p.m.
Sunday, April 5 • 1:00 - 4:00 p.m.
Consider donating your gently used books to the Annual Spring Book Sale. Drop off donations during operating hours. Please call ahead if donating large quantities.
The Roselle Public Library District is proud to commemorate 80 years of library service! Throughout 2020, we will be celebrating this milestone with special programs and an after hours event in April.
80th ANNIVERSARY SHOWCASE
Friday, April 24 • 5:30 - 8:30 p.m.
Help the Roselle Public Library commemorate its long-standing service to the community of Roselle! Take an in-depth look through history and the present day, then envision what the next 80 years may hold for the Library.
• While touring the Library, listen to a performance by long-time resident of Roselle, Jim Bartholomew. His vocal style blends the soulful stylings of Motown and Memphis as well as the gritty sounds of Cajun New Orleans, Blue Chicago, and heartfelt Roots and Americana music.
• Recognize our volunteers! The Roselle Public Library has always benefitted from the support of our volunteers. Join us in honoring all those who contributed in the past year.
• Take part in activities and receive giveaways!
• Enjoy light refreshments.
Celebrate NATIONAL LIBRARY WEEK
APRIL 19-25, 2020
Libraries are communities where all are welcome – no matter your age, interests, or background, the Library is a space where you belong. You can explore new passions and discover who you are through your library's varied array of free materials, programs, and services.
Visit the Roselle Public Library today!
Activities & Events All Week Long @ Your Library!
BOOK LOVERS’ DAY
Wednesday, April 22 • 12:00-2:00 p.m.
Roselle card holders, come celebrate Book Lovers’ Day during National Library Week. Please join us for a light luncheon and a round-table discussion of books you have especially enjoyed this year. The adult services staff will also talk about an assortment of books they have loved reading in the last 12 months.
You may register for this event online, in person or over the phone.
A ticket is required for this event so please come to the Reference Desk to pick it up. Space is limited and this event fills up fast!
LITTLE WING
INTERACTIVE MUSIC PROGRAM
Monday, March 30 • 10:00-10:45 a.m.
The School of Rock in Schaumburg will be visiting the Roselle Public Library to do a special musical activity event that will help children ages 3-4 explore rhythm, tempo, pitch, and form.
Registration is required and begins Monday, March 16.
WEEKLY STORYTIME
March 10 - April 16.
Registration begins February 24.
TODDLER TALES
Tuesdays • 10:00-10:30 a.m.
20-35 months (with parent)
TOTS & TYKES
Tuesdays • 11:30 a.m.-12:00 p.m.
6-19 months (with parent)
PRESCHOOL
Wednesdays • 10:00-10:30 a.m.
3-5 years
* We are pleased to welcome guest presenters from Kids Plus Pediatric Dentistry on March 11!
TOTIME
Tuesdays: April 21 & 28
11:30 a.m.-12:00 p.m.
Parents play with their tots in the Storytime Room. Play with your baby while socializing with other parents and tots. Tots must be 6-20 months, accompanied by a parent or guardian.
No registration necessary.
DROP-IN STORYTIME
March 10 - April 16.
No registration necessary.
PRESCHOOL
Tuesdays • 1:00-1:30 p.m.
3-5 years
FAMILY
Tuesdays • 6:30-7:00 p.m.
All ages / Parent
MORNING
Thursdays • 10:30-11:00 a.m.
All ages / Parent
POP ART: HANDS
Thursday, March 26 • 6:30-7:30 p.m.
Grades 3-5. Do you like optical illusions? Magic tricks? Make your hand pop with this 3D art technique of drawing, tracing, and coloring. Your finished product will trick and amaze your peers! Art supplies will be provided. Registration begins March 16.
POETRY HUNT
Thursday, April 9 • 6:30-7:30 p.m.
Grades 3-5. April is National Poetry Month and what better way to celebrate than with a scavenger hunt? Come solve rhyming riddles and find objects throughout the department! You will create poems out of the objects you find. Registration begins March 30.
GARDEN DAY
ALL ABOUT OWLS
Saturday, April 25 • 1:00-3:00 p.m.
Adults and children, kindergarten-3rd grade. Curious about owls and the role they play in our ecosystem? Join us for a family-friendly presentation from Wings & Talons featuring a live owl. Afterwards, children and adults will each complete different age-appropriate crafts and activities focused on owls. Registration is required. Registration begins March 23.
CAPTURE THIS! SPRING EDITION
Thursday, May 7 • 6:00-7:00 p.m.
Grades 3-5. Do you enjoy taking photos and want to practice some photography skills? Come join us as we learn the key elements to taking a photo and then venture outside to test them out! Capture the elements of spring using your newfound skills. You’ll be able to print out your photo during the program and take it with you when you leave. No materials needed. Outside photos will be dependent on weather. Registration begins April 27.
BOOKS & POPCORN
Mondays: March 9 & April 6 • 6:30-7:30 p.m.
Students in grades 2-5 discuss selected titles. Delicious popcorn provided! On the day registration opens, kids may pick up a copy of the chosen title to read before the discussion. Copies of the books will be available at the "Ask Me" Desk.
MARCH 9
Goofballs:
The Crazy Case of Missing Thunder
by Tony Abbot
Registration begins February 17.
APRIL 6
Ranger in Time:
Rescue on the Oregon Trail
by Kate Messner
Registration begins March 16.
BOOKS & COOKS
Mondays OR Wednesdays • 4:00-4:45 p.m.
Kids in kindergarten-2nd grade are invited to join us for a story and a make-your-own snack activity. Read different stories featuring fun foods and then assemble your own delicious treat! Please choose either a Monday or Wednesday session for each month.
Ice Cream Shaking
Monday, March 23 OR
Wednesday, March 25
Registration begins March 9.
Worms in Dirt
Monday, April 27 OR
Wednesday, April 29
Registration begins April 13.
MARIO MADNESS
Wednesdays, March 4, April 1 & May 6 • 6:00-7:00 p.m.
Ages 6-11. Drop in on the first Wednesday of the month for Mario Kart Wii. Play and cheer on your friends! Snacks will be provided.
LEGO® MANIA
Mondays, March 2 & 30; Friday, April 10; Saturday, May 9 • 12:00-2:00 p.m.
Attention LEGO® brick lovers ages 4-12! Drop by the Roselle Public Library on a day off of school, bring a friend, and let your imagination flow. LEGO® bricks will be provided. Finished creations will be displayed in Youth Services. No registration necessary.
3D PRINTING
ADVANCED 3D PRINTING
Wednesdays, March 11 & 18 • 5:30-6:30 p.m.
Attendance required for both sessions of this class.
Grades 4-5. This 2-week class is only open to students who have completed a Beginning 3D Printing class. At the end of the 2-week class, keep the object you designed. Registration begins March 2.
BEGINNING 3D PRINTING
Thursdays, April 23 & 30 • 6:30-7:30 p.m.
Attendance required for both sessions of this class.
Grades 4-5. Learn how to design and create objects using a 3D printer! At the end of the 2-week class, keep the object you designed.
Registration begins April 13.
KREATIVE KIDS
Thursdays: March 19 & April 16 • 4:30-5:15 p.m.
This monthly program for students in kindergarten-2nd grade features story sharing and facts. Kids then do a craft and/or science project based on the topic.
Myths and Legends
March 19
Registration begins March 9.
Change the World!
April 16
Registration begins April 6.
CRAFTERNOON
Saturday, March 14 & Thursday, April 2 • 2:00-4:00 p.m.
Drop by Youth Services for an afternoon of crafting!
Try your hand at a variety of make-and-take crafts.
Bring the whole family.
Children ages 5 & under will need assistance from an adult or caregiver.
Outer Space
Saturday, March 14
Spring Break
Thursday, April 2
GAME DAY SATURDAY
Saturday, April 11 • 2:00-4:00 p.m.
Drop by the Library with a friend for some fun with board games! Several popular board games will be available in the Youth Services department.
Children ages 5 & under will need assistance from an adult or caregiver.
TECH TOYS ARE BACK!
Monday, March 23 • 4:00-5:00 p.m.
Turn any object into an internet-connected device. Create or prototype smart home inventions and control them over the Internet using LittleBits® Smart Home Kit.
Register online, by phone, or at the Library.
TEEN CLUBS
TAB TEEN ADVISORY BOARD
Tuesday, March 3 • 4:00-5:00 p.m.
Meeting once every quarter. Help plan cool programs, meet new friends, and munch on snacks. No registration required. Drop-ins welcome.
ANIME CLUB
Wednesdays: March 11, April 8 & May 13 • 4:30-6:00 p.m.
Get together with other teens once a month to watch and talk about ANIME and look at new MANGA.
No registration required. Drop-ins welcome.
3D PRINTING CLUB
Wednesdays: March 4, April 1 & May 6 • 5:00-6:00 p.m.
Hang out with other teens and design 3D objects for printing on our 3D printer. No registration required. Drop-ins welcome.
TEEN WRITERS WORKSHOP: HOW TO WRITE UNFORGETTABLE VILLAINS
Monday, April 20 • 4:00-5:00 p.m.
We’ll look at some classic villains and see what makes them tick. Then we’ll use professional writing techniques to create our own unique villains. Mwah-ha-ha!
Register online, by phone, or at the Library.
HOW TO DRAW IN 3D
Monday, May 11 • 4:00-5:00 p.m.
Learn how to apply the basics of perspective to make your drawings pop off the page.
Register online, by phone, or at the Library.
VolunTeen = Teen Volunteer
Looking for a way to fulfill service hours for school, honor society or another organization? Here's your chance! The Teen Scene runs 3 VolunTeen Sessions a year. The current session runs through April. Too busy during the school year? No problem! Join the Summer VolunTeen Session instead, running from June through early August! To become a VolunTeen, fill out an application, available at the Library’s Reference and Adult Services Desks, or the Youth Services Desk. Get in soon, as there are a limited number of VolunTeen spaces to be filled!
SUMMER VOLUNTEEN TRAINING SESSION
Wednesday, May 20 OR Wednesday, May 27 • 4:00-5:00 p.m.
Become a VolunTeen this summer and help out at the Library! Pick up an application starting May 1, and register for a training session.
Summer participants are required to attend ONE VolunTeen Training Session, regardless of past volunteer work.
GREAT MAGAZINE GIVEAWAY!
Friday & Saturday • March 27 & 28
Try some new magazines for free!
Take some for your family, friends and neighbors!
Located in Community Room B. While supplies last!
Join us for a fun-filled day celebrating comic books and graphic novels. Visit with local artist Serena Guerra and make your own comics, check out the cosplayers, and more!
Free comic books for all ages, while supplies last.
No registration required.
KNOW YOUR MUSLIM NEIGHBOR, PART II
Tuesday, March 10 • 7:00-8:30 p.m.
Dr. Isaac Gold of the Islamic Society of Midwest (ISOM) returns to present a cultural exploration of the daily life of Muslims in America. A Q&A session will follow the presentation.
ISLAMIC ART
Saturday, March 21 • 3:00-4:30 p.m.
Islamic art reflects the beliefs, culture, and traditions of Islam and typically has focused on calligraphy and interlacing patterns, rather than on representation of figures. Artist and lecturer Mustafa Tahran discusses the history of the visual arts of the Muslim world and provides live demonstrations.
3D PRINTING FOR ADULTS
Monday, March 30 • 6:00-7:30 p.m. OR Monday, May 18 • 3:00-4:30 p.m.
This hands-on introductory session will get you started with 3D printing. We’ll review basic terminology and concepts, and create our first 3D object for printing. Presented by Staff. Registration required. (Limit of 7 people.)
UNDERSTANDING WILLS, TRUSTS & POWERS OF ATTORNEY
Wednesday, April 15 • 7:00-8:30 p.m.
Attorney John Pankau guides you through the basics of wills, trusts and powers of attorney. John will discuss the importance of estate planning and give real life examples of what to do and what not to do.
CANNABIS AN EDUCATIONAL INTRODUCTION
Monday, April 20 • 7:00-8:00 p.m.
A town hall style seminar providing an introduction and a history of cannabis. The information will be provided with a balanced approach. There will be a 20 minute Q & A session at the end of the seminar.
SEARCHING FOR SOUTH AMERICA
Sunday, April 26 • 2:00-3:00 p.m.
“Mindful Vagabond” Brian Michalski spent over a year in South America, trekking the Inca Trail, navigating pristine Patagonia, and exploring the Amazon rainforest, while also volunteering, taking Spanish classes, and earning his English teaching certificate along the way. Michalski will enthrall you with the stories of his adventures and misadventures in this challenging but magnificent continent.
MOVIE MUSIC ROMANCE
Tuesday, May 12 • 7:00-8:30 p.m.
Join John LeGear for a magical stroll down memory lane as he showcases some of the most sensational musical numbers in the history of cinema, including performances by Fred Astaire, Ginger Rogers, Eleanor Powell, Elvis, Madonna, Lily James, Emmy Rossum, and The Blues Brothers. You’ll come away with a song in your heart and a spring in your step as you journey through the last 80 years of American movie magic.
YOUTH LIT PICKS BOOK CLUB
Tuesdays, March 17, April 21 & May 19 • 4:30-5:15 p.m.
Drop in for a lively book discussion of the Rebecca Caudill and Abraham Lincoln nominees.
See our Goodreads group for current selections.
ADULT BOOK DISCUSSION
Tuesdays • 7:00-8:00 p.m., in the Conference Room of the Library
New members are always welcome. Stop by and pick up a copy of the book. Discussions last for an hour and we always find something to talk about, exchange ideas, and read books that we might not have otherwise investigated. Copies of the book available a month prior to the discussion at the Reference Desk.
MARCH 17
The Girl He Used to Know
Tracey Garvis Graves
APRIL 21
The Next Person You Meet in Heaven
Mitch Albom
MAY 19
This Tender Land
William Kent Krueger
SPRINGTIME SESSION
GRANDPARENTS GOT GAME!
Wednesday, April 1 • 1:30-3:00 p.m.
Grandparents and Grand-friends get in the springtime spirit with their grandchildren at this drop-in program. This session features a special craft, activities, a snack, and board games to play.
CHESS AT THE LIBRARY
Thursdays @ 6:45-8:45 p.m.
COMPETITIVE CHESS CLUB
March 5 & 19, April 9 & 30,
May 7 & 21
Features one USCF-rated game.
CASUAL CHESS MEETUP
March 12 & 26, April 2, 16 & 23,
May 14 & 28
All ages and skill levels are welcome.
Children under the age of fourteen must be accompanied by a parent at all times.
More information, such as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.*211.
KNITTING CIRCLE AT THE LIBRARY
Saturdays (Alternating) • 1:00-3:00 p.m.
Meet every other Saturday afternoon in the Library’s conference room.
More information, such as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.*211.
Knitters and those who crochet are invited to bring their own projects to the meetings or work on several community service projects. New members are welcome!
SERVICE FOR HOMEBOUND PATRONS
Library District residents who are homebound due to illness or disability with no one to pick up materials for them may qualify to receive monthly library delivery service. If you or someone you know would like to receive this service, please call the Reference Desk at (630) 529-1641 ext.*211 for further information.
SHORT STORY DISPENSER
The Roselle Public Library District is excited to debut its recently acquired short story dispenser! Visitors can find the machine located on the first floor, across from the front Circulation Desk and can select stories for children, young adults, and the general audience.
This acquisition is made possible thanks to an anonymous benefactor, who donated the funds for the dispenser to the Roselle Library Foundation in late 2019.
MUSICAL SUNDAYS
Performances held in the main atrium of the Library.
JOE MONAHAN
March 1 • 1:30-3:00 p.m.
Celebrate St. Patrick’s Day with singer and guitarist Joe Monahan. A native Chicagoan, Joe has played in and around Chicago for over 15 years. Join us for a concert of your favorite Irish tunes!
CHICAGO COSSACKS
April 19 • 1:30-3:00 p.m.
The Chicago Cossacks has been entertaining people of the Greater Chicago area and beyond since 1993. Hear their blend of Russian and Ukrainian folk music, alongside other styles, performed on traditional instruments.
CORNER BOYS
May 17 • 1:30-3:00 p.m.
Not your typical acoustic cover band, the Corner Boys’ playlist runs from Lyle Lovett to Michael Jackson to the wonderful Kris Nichols. Join us as Dave Kunzweiler, Paul Hilderbrand, and Michael Rothstein, aka Corner Boys, bring their lifelong passion for music to the Library.
Freegal® is a free music service from your library. All you need is your library card number and a PIN. Freegal offers access to about 15 million songs including Sony Music’s catalog of legendary artists, and over 40,000 music videos. In total the collection is comprised of music from over 40,000 labels with music that originates in over 100 countries. There is no software to download, and there are no digital rights management (DRM) restrictions. Patrons can access Freegal through the link on our website or by visiting freegalmusic.com.
What Is the Census?
As mandated by the U.S. Constitution, the census is a once-every-decade count of everyone living in the country. When we know how many people live in our community, organizations and businesses are better equipped to evaluate the services and programs needed, such as libraries, clinics, schools, and roads. It also determines how seats in Congress are distributed among the 50 states. In March of 2020, the U.S. Census Bureau will send every household an invitation to complete a simple questionnaire about who lives at your address on April 1st. You will have the opportunity to respond online, by phone, or by mail, and federal law keeps those responses safe and secure.
Your Library And the Census.
The 2020 Census is unique in that it is the first census where online response is being promoted as the preferred method to complete the questionnaire. Throughout the self-response period (ending on July 31st) public computers with a secure connection will be available at the Library. Staff will be available to assist and answer any questions that you may have.
The 2020 Census responses inform how the following programs are funded every year.
- **Community Support**
- Section 8 Housing Assistance Payment Programs
- **Family Services**
- Child Abuse and Neglect State Grants
- **Education**
- Head Start
- **Food Assistance**
- Supplemental Nutrition Assistance Program (SNAP)
- **Employment**
- Unemployment Insurance
- **Healthcare**
- Medical Assistance Program (Medicaid)
- **Entrepreneurship**
- Small Business Development Centers
- **Infrastructure**
- Highway Planning and Construction
- **Environment**
- State Wildlife Grants
- **Public Safety**
- Assistance to Firefighters Grant
Everyone counts. Make sure Roselle receives a complete count!
Census 2020 data determines the amount of funding that the Roselle Public Library District will receive throughout the next decade. For every resident, the Library will receive $1.25 annually from the Illinois State Library’s Per Capita Grant.
CENSUS DAY PARTY ■ APRIL 1, 2020
Celebrate At The Roselle Public Library!
April 1st is Census Day, a key reference date for the 2020 Census. When completing the census, you will include everyone living in your home on April 1, 2020. Census Day will be celebrated with events across the country.
- Join the Roselle Public Library on Census Day to celebrate our community and enjoy refreshments and fun activities for the entire family all day long.
- Library staff will be available to help with completing the Census 2020 questionnaire online.
- Look for more information on the Roselle Public Library District’s website.
- Brought to you by the Roselle Public Library District and the Village of Roselle Complete Count Committee.
The 2020 Census is easy. The questions are simple.
Responses to census questions provide a snapshot of the nation. Census results affect your voice in government, how much funding your community receives, and how the community of Roselle will plan for the future.
When you fill out the census, you help:
- Determine how many seats Illinois gets in Congress.
- Inform how more than $675 billion in federal funding is distributed to states and communities each year.
- Create jobs, provide housing, prepare for emergencies, and build schools, roads and hospitals.
LIBRARY HOURS:
Monday - Thursday 9:30 a.m.-9:00 p.m.
Friday & Saturday 9:30 a.m.-5:00 p.m.
Sunday 1:00-5:00 p.m.
LIBRARY CLOSED:
EASTER Sunday, April 12
MEMORIAL DAY Sunday, May 24
Monday, May 25
BOARD OF TRUSTEES
President Thomas Piorkowski
Vice President Sue Ellen Eichholz
Treasurer Sue Harold
Secretary Len Baumgart
Trustees Kory Atkinson
Terrell Barnes
Priscilla Spencer
LIBRARY STAFF
ADMINISTRATION
Executive Director Samantha Johnson
Business Manager Debbie Green
DEPARTMENT MANAGERS
Youth Services Kristen Lawson
Adult Services Maureen Garzaro
Technical Services Lynn Dennis
Circulation Christy Snyders
NEWSLETTER
Designer/Editor Jason Kepler
The Board meets the second Wednesday of every month in the Library’s Conference Room at 7:00 p.m. The public is invited.
|
26c81b6f-e665-4c37-8774-0f7871cadaf2
|
CC-MAIN-2020-50
|
https://www.rosellepld.org/Document%20Center/About/Stay%20Informed/Access/Access_202003_Spring.pdf
|
2020-11-30T10:48:14+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-50/subset=warc/part-00139-8431e8c9-c763-4c27-b286-ba1dd7e2631e.c000.gz.parquet
| 817,932,723
| 5,381
|
eng_Latn
|
eng_Latn
| 0.937293
|
eng_Latn
| 0.996325
|
[
"kiu_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
118,
1445,
2434,
3600,
5136,
6680,
8231,
9587,
10951,
12456,
14170,
16191,
17618,
19369,
20975,
21754
] |
ACCESS
Quarterly Guide
Spring 2020
ROSELLE PUBLIC LIBRARY DISTRICT
80 YEARS
of LIBRARY SERVICE
MARCH • APRIL • MAY
FRIENDS of the
ROSELLE PUBLIC LIBRARY
ANNUAL SPRING BOOK SALE
Saturday, April 4 • 9:30 a.m. - 3:30 p.m.
Sunday, April 5 • 1:00 - 4:00 p.m.
Consider donating your gently used books to the Annual Spring Book Sale. Drop off donations during operating hours. Please call ahead if donating large quantities.
The Roselle Public Library District is proud to commemorate 80 years of library service! Throughout 2020, we will be celebrating this milestone with special programs and an after hours event in April.
80th ANNIVERSARY SHOWCASE
Friday, April 24 • 5:30 - 8:30 p.m.
Help the Roselle Public Library commemorate its long-standing service to the community of Roselle! Take an in-depth look through history and the present day, then envision what the next 80 years may hold for the Library.
• While touring the Library, listen to a performance by long-time resident of Roselle, Jim Bartholomew. His vocal style blends the soulful stylings of Motown and Memphis as well as the gritty sounds of Cajun New Orleans, Blue Chicago, and heartfelt Roots and Americana music.
• Recognize our volunteers! The Roselle Public Library has always benefitted from the support of our volunteers. Join us in honoring all those who contributed in the past year.
• Take part in activities and receive giveaways!
• Enjoy light refreshments.
Celebrate NATIONAL LIBRARY WEEK
APRIL 19-25, 2020
Libraries are communities where all are welcome – no matter your age, interests, or background, the Library is a space where you belong. You can explore new passions and discover who you are through your library's varied array of free materials, programs, and services.
Visit the Roselle Public Library today!
Activities & Events All Week Long @ Your Library!
BOOK LOVERS’ DAY
Wednesday, April 22 • 12:00-2:00 p.m.
Roselle card holders, come celebrate Book Lovers’ Day during National Library Week. Please join us for a light luncheon and a round-table discussion of books you have especially enjoyed this year. The adult services staff will also talk about an assortment of books they have loved reading in the last 12 months.
You may register for this event online, in person or over the phone.
A ticket is required for this event so please come to the Reference Desk to pick it up. Space is limited and this event fills up fast!
LITTLE WING
INTERACTIVE MUSIC PROGRAM
Monday, March 30 • 10:00-10:45 a.m.
The School of Rock in Schaumburg will be visiting the Roselle Public Library to do a special musical activity event that will help children ages 3-4 explore rhythm, tempo, pitch, and form.
Registration is required and begins Monday, March 16.
WEEKLY STORYTIME
March 10 - April 16.
Registration begins February 24.
TODDLER TALES
Tuesdays • 10:00-10:30 a.m.
20-35 months (with parent)
TOTS & TYKES
Tuesdays • 11:30 a.m.-12:00 p.m.
6-19 months (with parent)
PRESCHOOL
Wednesdays • 10:00-10:30 a.m.
3-5 years
* We are pleased to welcome guest presenters from Kids Plus Pediatric Dentistry on March 11!
TOTIME
Tuesdays: April 21 & 28
11:30 a.m.-12:00 p.m.
Parents play with their tots in the Storytime Room. Play with your baby while socializing with other parents and tots. Tots must be 6-20 months, accompanied by a parent or guardian.
No registration necessary.
DROP-IN STORYTIME
March 10 - April 16.
No registration necessary.
PRESCHOOL
Tuesdays • 1:00-1:30 p.m.
3-5 years
FAMILY
Tuesdays • 6:30-7:00 p.m.
All ages / Parent
MORNING
Thursdays • 10:30-11:00 a.m.
All ages / Parent
POP ART: HANDS
Thursday, March 26 • 6:30-7:30 p.m.
Grades 3-5. Do you like optical illusions? Magic tricks? Make your hand pop with this 3D art technique of drawing, tracing, and coloring. Your finished product will trick and amaze your peers! Art supplies will be provided. Registration begins March 16.
POETRY HUNT
Thursday, April 9 • 6:30-7:30 p.m.
Grades 3-5. April is National Poetry Month and what better way to celebrate than with a scavenger hunt? Come solve rhyming riddles and find objects throughout the department! You will create poems out of the objects you find. Registration begins March 30.
GARDEN DAY
ALL ABOUT OWLS
Saturday, April 25 • 1:00-3:00 p.m.
Adults and children, kindergarten-3rd grade. Curious about owls and the role they play in our ecosystem? Join us for a family-friendly presentation from Wings & Talons featuring a live owl. Afterwards, children and adults will each complete different age-appropriate crafts and activities focused on owls. Registration is required. Registration begins March 23.
CAPTURE THIS! SPRING EDITION
Thursday, May 7 • 6:00-7:00 p.m.
Grades 3-5. Do you enjoy taking photos and want to practice some photography skills? Come join us as we learn the key elements to taking a photo and then venture outside to test them out! Capture the elements of spring using your newfound skills. You’ll be able to print out your photo during the program and take it with you when you leave. No materials needed. Outside photos will be dependent on weather. Registration begins April 27.
BOOKS & POPCORN
Mondays: March 9 & April 6 • 6:30-7:30 p.m.
Students in grades 2-5 discuss selected titles. Delicious popcorn provided! On the day registration opens, kids may pick up a copy of the chosen title to read before the discussion. Copies of the books will be available at the "Ask Me" Desk.
MARCH 9
Goofballs:
The Crazy Case of Missing Thunder
by Tony Abbot
Registration begins February 17.
APRIL 6
Ranger in Time:
Rescue on the Oregon Trail
by Kate Messner
Registration begins March 16.
BOOKS & COOKS
Mondays OR Wednesdays • 4:00-4:45 p.m.
Kids in kindergarten-2nd grade are invited to join us for a story and a make-your-own snack activity. Read different stories featuring fun foods and then assemble your own delicious treat! Please choose either a Monday or Wednesday session for each month.
Ice Cream Shaking
Monday, March 23 OR
Wednesday, March 25
Registration begins March 9.
Worms in Dirt
Monday, April 27 OR
Wednesday, April 29
Registration begins April 13.
MARIO MADNESS
Wednesdays, March 4, April 1 & May 6 • 6:00-7:00 p.m.
Ages 6-11. Drop in on the first Wednesday of the month for Mario Kart Wii. Play and cheer on your friends! Snacks will be provided.
LEGO® MANIA
Mondays, March 2 & 30; Friday, April 10; Saturday, May 9 • 12:00-2:00 p.m.
Attention LEGO® brick lovers ages 4-12! Drop by the Roselle Public Library on a day off of school, bring a friend, and let your imagination flow. LEGO® bricks will be provided. Finished creations will be displayed in Youth Services. No registration necessary.
3D PRINTING
ADVANCED 3D PRINTING
Wednesdays, March 11 & 18 • 5:30-6:30 p.m.
Attendance required for both sessions of this class.
Grades 4-5. This 2-week class is only open to students who have completed a Beginning 3D Printing class. At the end of the 2-week class, keep the object you designed. Registration begins March 2.
BEGINNING 3D PRINTING
Thursdays, April 23 & 30 • 6:30-7:30 p.m.
Attendance required for both sessions of this class.
Grades 4-5. Learn how to design and create objects using a 3D printer! At the end of the 2-week class, keep the object you designed.
Registration begins April 13.
KREATIVE KIDS
Thursdays: March 19 & April 16 • 4:30-5:15 p.m.
This monthly program for students in kindergarten-2nd grade features story sharing and facts. Kids then do a craft and/or science project based on the topic.
Myths and Legends
March 19
Registration begins March 9.
Change the World!
April 16
Registration begins April 6.
CRAFTERNOON
Saturday, March 14 & Thursday, April 2 • 2:00-4:00 p.m.
Drop by Youth Services for an afternoon of crafting!
Try your hand at a variety of make-and-take crafts.
Bring the whole family.
Children ages 5 & under will need assistance from an adult or caregiver.
Outer Space
Saturday, March 14
Spring Break
Thursday, April 2
GAME DAY SATURDAY
Saturday, April 11 • 2:00-4:00 p.m.
Drop by the Library with a friend for some fun with board games! Several popular board games will be available in the Youth Services department.
Children ages 5 & under will need assistance from an adult or caregiver.
TECH TOYS ARE BACK!
Monday, March 23 • 4:00-5:00 p.m.
Turn any object into an internet-connected device. Create or prototype smart home inventions and control them over the Internet using LittleBits® Smart Home Kit.
Register online, by phone, or at the Library.
TEEN CLUBS
TAB TEEN ADVISORY BOARD
Tuesday, March 3 • 4:00-5:00 p.m.
Meeting once every quarter. Help plan cool programs, meet new friends, and munch on snacks. No registration required. Drop-ins welcome.
ANIME CLUB
Wednesdays: March 11, April 8 & May 13 • 4:30-6:00 p.m.
Get together with other teens once a month to watch and talk about ANIME and look at new MANGA.
No registration required. Drop-ins welcome.
3D PRINTING CLUB
Wednesdays: March 4, April 1 & May 6 • 5:00-6:00 p.m.
Hang out with other teens and design 3D objects for printing on our 3D printer. No registration required. Drop-ins welcome.
TEEN WRITERS WORKSHOP: HOW TO WRITE UNFORGETTABLE VILLAINS
Monday, April 20 • 4:00-5:00 p.m.
We’ll look at some classic villains and see what makes them tick. Then we’ll use professional writing techniques to create our own unique villains. Mwah-ha-ha!
Register online, by phone, or at the Library.
HOW TO DRAW IN 3D
Monday, May 11 • 4:00-5:00 p.m.
Learn how to apply the basics of perspective to make your drawings pop off the page.
Register online, by phone, or at the Library.
VolunTeen = Teen Volunteer
Looking for a way to fulfill service hours for school, honor society or another organization? Here's your chance! The Teen Scene runs 3 VolunTeen Sessions a year. The current session runs through April. Too busy during the school year? No problem! Join the Summer VolunTeen Session instead, running from June through early August! To become a VolunTeen, fill out an application, available at the Library’s Reference and Adult Services Desks, or the Youth Services Desk. Get in soon, as there are a limited number of VolunTeen spaces to be filled!
SUMMER VOLUNTEEN TRAINING SESSION
Wednesday, May 20 OR Wednesday, May 27 • 4:00-5:00 p.m.
Become a VolunTeen this summer and help out at the Library! Pick up an application starting May 1, and register for a training session.
Summer participants are required to attend ONE VolunTeen Training Session, regardless of past volunteer work.
GREAT MAGAZINE GIVEAWAY!
Friday & Saturday • March 27 & 28
Try some new magazines for free!
Take some for your family, friends and neighbors!
Located in Community Room B. While supplies last!
Join us for a fun-filled day celebrating comic books and graphic novels. Visit with local artist Serena Guerra and make your own comics, check out the cosplayers, and more!
Free comic books for all ages, while supplies last.
No registration required.
KNOW YOUR MUSLIM NEIGHBOR, PART II
Tuesday, March 10 • 7:00-8:30 p.m.
Dr. Isaac Gold of the Islamic Society of Midwest (ISOM) returns to present a cultural exploration of the daily life of Muslims in America. A Q&A session will follow the presentation.
ISLAMIC ART
Saturday, March 21 • 3:00-4:30 p.m.
Islamic art reflects the beliefs, culture, and traditions of Islam and typically has focused on calligraphy and interlacing patterns, rather than on representation of figures. Artist and lecturer Mustafa Tahran discusses the history of the visual arts of the Muslim world and provides live demonstrations.
3D PRINTING FOR ADULTS
Monday, March 30 • 6:00-7:30 p.m. OR Monday, May 18 • 3:00-4:30 p.m.
This hands-on introductory session will get you started with 3D printing. We’ll review basic terminology and concepts, and create our first 3D object for printing. Presented by Staff. Registration required. (Limit of 7 people.)
UNDERSTANDING WILLS, TRUSTS & POWERS OF ATTORNEY
Wednesday, April 15 • 7:00-8:30 p.m.
Attorney John Pankau guides you through the basics of wills, trusts and powers of attorney. John will discuss the importance of estate planning and give real life examples of what to do and what not to do.
CANNABIS AN EDUCATIONAL INTRODUCTION
Monday, April 20 • 7:00-8:00 p.m.
A town hall style seminar providing an introduction and a history of cannabis. The information will be provided with a balanced approach. There will be a 20 minute Q & A session at the end of the seminar.
SEARCHING FOR SOUTH AMERICA
Sunday, April 26 • 2:00-3:00 p.m.
“Mindful Vagabond” Brian Michalski spent over a year in South America, trekking the Inca Trail, navigating pristine Patagonia, and exploring the Amazon rainforest, while also volunteering, taking Spanish classes, and earning his English teaching certificate along the way. Michalski will enthrall you with the stories of his adventures and misadventures in this challenging but magnificent continent.
MOVIE MUSIC ROMANCE
Tuesday, May 12 • 7:00-8:30 p.m.
Join John LeGear for a magical stroll down memory lane as he showcases some of the most sensational musical numbers in the history of cinema, including performances by Fred Astaire, Ginger Rogers, Eleanor Powell, Elvis, Madonna, Lily James, Emmy Rossum, and The Blues Brothers. You’ll come away with a song in your heart and a spring in your step as you journey through the last 80 years of American movie magic.
YOUTH LIT PICKS BOOK CLUB
Tuesdays, March 17, April 21 & May 19 • 4:30-5:15 p.m.
Drop in for a lively book discussion of the Rebecca Caudill and Abraham Lincoln nominees.
See our Goodreads group for current selections.
ADULT BOOK DISCUSSION
Tuesdays • 7:00-8:00 p.m., in the Conference Room of the Library
New members are always welcome. Stop by and pick up a copy of the book. Discussions last for an hour and we always find something to talk about, exchange ideas, and read books that we might not have otherwise investigated. Copies of the book available a month prior to the discussion at the Reference Desk.
MARCH 17
The Girl He Used to Know
Tracey Garvis Graves
APRIL 21
The Next Person You Meet in Heaven
Mitch Albom
MAY 19
This Tender Land
William Kent Krueger
SPRINGTIME SESSION
GRANDPARENTS GOT GAME!
Wednesday, April 1 • 1:30-3:00 p.m.
Grandparents and Grand-friends get in the springtime spirit with their grandchildren at this drop-in program. This session features a special craft, activities, a snack, and board games to play.
CHESS AT THE LIBRARY
Thursdays @ 6:45-8:45 p.m.
COMPETITIVE CHESS CLUB
March 5 & 19, April 9 & 30,
May 7 & 21
Features one USCF-rated game.
CASUAL CHESS MEETUP
March 12 & 26, April 2, 16 & 23,
May 14 & 28
All ages and skill levels are welcome.
Children under the age of fourteen must be accompanied by a parent at all times.
More information, such
|
as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.
|
*211.
KNITTING CIRCLE AT THE LIBRARY
Saturdays (Alternating) • 1:00-3:00 p.m.
Meet every other Saturday afternoon in the Library’s conference room.
More information, such as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.*211.
Knitters and those who crochet are invited to bring their own projects to the meetings or work on several community service projects. New members are welcome!
SERVICE FOR HOMEBOUND PATRONS
Library District residents who are homebound due to illness or disability with no one to pick up materials for them may qualify to receive monthly library delivery service. If you or someone you know would like to receive this service, please call the Reference Desk at (630) 529-1641 ext.*211 for further information.
SHORT STORY DISPENSER
The Roselle Public Library District is excited to debut its recently acquired short story dispenser! Visitors can find the machine located on the first floor, across from the front Circulation Desk and can select stories for children, young adults, and the general audience.
This acquisition is made possible thanks to an anonymous benefactor, who donated the funds for the dispenser to the Roselle Library Foundation in late 2019.
MUSICAL SUNDAYS
Performances held in the main atrium of the Library.
JOE MONAHAN
March 1 • 1:30-3:00 p.m.
Celebrate St. Patrick’s Day with singer and guitarist Joe Monahan. A native Chicagoan, Joe has played in and around Chicago for over 15 years. Join us for a concert of your favorite Irish tunes!
CHICAGO COSSACKS
April 19 • 1:30-3:00 p.m.
The Chicago Cossacks has been entertaining people of the Greater Chicago area and beyond since 1993. Hear their blend of Russian and Ukrainian folk music, alongside other styles, performed on traditional instruments.
CORNER BOYS
May 17 • 1:30-3:00 p.m.
Not your typical acoustic cover band, the Corner Boys’ playlist runs from Lyle Lovett to Michael Jackson to the wonderful Kris Nichols. Join us as Dave Kunzweiler, Paul Hilderbrand, and Michael Rothstein, aka Corner Boys, bring their lifelong passion for music to the Library.
Freegal® is a free music service from your library. All you need is your library card number and a PIN. Freegal offers access to about 15 million songs including Sony Music’s catalog of legendary artists, and over 40,000 music videos. In total the collection is comprised of music from over 40,000 labels with music that originates in over 100 countries. There is no software to download, and there are no digital rights management (DRM) restrictions. Patrons can access Freegal through the link on our website or by visiting freegalmusic.com.
What Is the Census?
As mandated by the U.S. Constitution, the census is a once-every-decade count of everyone living in the country. When we know how many people live in our community, organizations and businesses are better equipped to evaluate the services and programs needed, such as libraries, clinics, schools, and roads. It also determines how seats in Congress are distributed among the 50 states. In March of 2020, the U.S. Census Bureau will send every household an invitation to complete a simple questionnaire about who lives at your address on April 1st. You will have the opportunity to respond online, by phone, or by mail, and federal law keeps those responses safe and secure.
Your Library And the Census.
The 2020 Census is unique in that it is the first census where online response is being promoted as the preferred method to complete the questionnaire. Throughout the self-response period (ending on July 31st) public computers with a secure connection will be available at the Library. Staff will be available to assist and answer any questions that you may have.
The 2020 Census responses inform how the following programs are funded every year.
- **Community Support**
- Section 8 Housing Assistance Payment Programs
- **Family Services**
- Child Abuse and Neglect State Grants
- **Education**
- Head Start
- **Food Assistance**
- Supplemental Nutrition Assistance Program (SNAP)
- **Employment**
- Unemployment Insurance
- **Healthcare**
- Medical Assistance Program (Medicaid)
- **Entrepreneurship**
- Small Business Development Centers
- **Infrastructure**
- Highway Planning and Construction
- **Environment**
- State Wildlife Grants
- **Public Safety**
- Assistance to Firefighters Grant
Everyone counts. Make sure Roselle receives a complete count!
Census 2020 data determines the amount of funding that the Roselle Public Library District will receive throughout the next decade. For every resident, the Library will receive $1.25 annually from the Illinois State Library’s Per Capita Grant.
CENSUS DAY PARTY ■ APRIL 1, 2020
Celebrate At The Roselle Public Library!
April 1st is Census Day, a key reference date for the 2020 Census. When completing the census, you will include everyone living in your home on April 1, 2020. Census Day will be celebrated with events across the country.
- Join the Roselle Public Library on Census Day to celebrate our community and enjoy refreshments and fun activities for the entire family all day long.
- Library staff will be available to help with completing the Census 2020 questionnaire online.
- Look for more information on the Roselle Public Library District’s website.
- Brought to you by the Roselle Public Library District and the Village of Roselle Complete Count Committee.
The 2020 Census is easy. The questions are simple.
Responses to census questions provide a snapshot of the nation. Census results affect your voice in government, how much funding your community receives, and how the community of Roselle will plan for the future.
When you fill out the census, you help:
- Determine how many seats Illinois gets in Congress.
- Inform how more than $675 billion in federal funding is distributed to states and communities each year.
- Create jobs, provide housing, prepare for emergencies, and build schools, roads and hospitals.
LIBRARY HOURS:
Monday - Thursday 9:30 a.m.-9:00 p.m.
Friday & Saturday 9:30 a.m.-5:00 p.m.
Sunday 1:00-5:00 p.m.
LIBRARY CLOSED:
EASTER Sunday, April 12
MEMORIAL DAY Sunday, May 24
Monday, May 25
BOARD OF TRUSTEES
President Thomas Piorkowski
Vice President Sue Ellen Eichholz
Treasurer Sue Harold
Secretary Len Baumgart
Trustees Kory Atkinson
Terrell Barnes
Priscilla Spencer
LIBRARY STAFF
ADMINISTRATION
Executive Director Samantha Johnson
Business Manager Debbie Green
DEPARTMENT MANAGERS
Youth Services Kristen Lawson
Adult Services Maureen Garzaro
Technical Services Lynn Dennis
Circulation Christy Snyders
NEWSLETTER
Designer/Editor Jason Kepler
The Board meets the second Wednesday of every month in the Library’s Conference Room at 7:00 p.m. The public is invited.
| 14,797
|
inside_word
|
as
|
remove_one_sentence
|
<url>
https://www.rosellepld.org/Document%20Center/About/Stay%20Informed/Access/Access_202003_Spring.pdf
</url>
<text>
ACCESS
Quarterly Guide
Spring 2020
ROSELLE PUBLIC LIBRARY DISTRICT
80 YEARS
of LIBRARY SERVICE
MARCH • APRIL • MAY
FRIENDS of the
ROSELLE PUBLIC LIBRARY
ANNUAL SPRING BOOK SALE
Saturday, April 4 • 9:30 a.m. - 3:30 p.m.
Sunday, April 5 • 1:00 - 4:00 p.m.
Consider donating your gently used books to the Annual Spring Book Sale. Drop off donations during operating hours. Please call ahead if donating large quantities.
The Roselle Public Library District is proud to commemorate 80 years of library service! Throughout 2020, we will be celebrating this milestone with special programs and an after hours event in April.
80th ANNIVERSARY SHOWCASE
Friday, April 24 • 5:30 - 8:30 p.m.
Help the Roselle Public Library commemorate its long-standing service to the community of Roselle! Take an in-depth look through history and the present day, then envision what the next 80 years may hold for the Library.
• While touring the Library, listen to a performance by long-time resident of Roselle, Jim Bartholomew. His vocal style blends the soulful stylings of Motown and Memphis as well as the gritty sounds of Cajun New Orleans, Blue Chicago, and heartfelt Roots and Americana music.
• Recognize our volunteers! The Roselle Public Library has always benefitted from the support of our volunteers. Join us in honoring all those who contributed in the past year.
• Take part in activities and receive giveaways!
• Enjoy light refreshments.
Celebrate NATIONAL LIBRARY WEEK
APRIL 19-25, 2020
Libraries are communities where all are welcome – no matter your age, interests, or background, the Library is a space where you belong. You can explore new passions and discover who you are through your library's varied array of free materials, programs, and services.
Visit the Roselle Public Library today!
Activities & Events All Week Long @ Your Library!
BOOK LOVERS’ DAY
Wednesday, April 22 • 12:00-2:00 p.m.
Roselle card holders, come celebrate Book Lovers’ Day during National Library Week. Please join us for a light luncheon and a round-table discussion of books you have especially enjoyed this year. The adult services staff will also talk about an assortment of books they have loved reading in the last 12 months.
You may register for this event online, in person or over the phone.
A ticket is required for this event so please come to the Reference Desk to pick it up. Space is limited and this event fills up fast!
LITTLE WING
INTERACTIVE MUSIC PROGRAM
Monday, March 30 • 10:00-10:45 a.m.
The School of Rock in Schaumburg will be visiting the Roselle Public Library to do a special musical activity event that will help children ages 3-4 explore rhythm, tempo, pitch, and form.
Registration is required and begins Monday, March 16.
WEEKLY STORYTIME
March 10 - April 16.
Registration begins February 24.
TODDLER TALES
Tuesdays • 10:00-10:30 a.m.
20-35 months (with parent)
TOTS & TYKES
Tuesdays • 11:30 a.m.-12:00 p.m.
6-19 months (with parent)
PRESCHOOL
Wednesdays • 10:00-10:30 a.m.
3-5 years
* We are pleased to welcome guest presenters from Kids Plus Pediatric Dentistry on March 11!
TOTIME
Tuesdays: April 21 & 28
11:30 a.m.-12:00 p.m.
Parents play with their tots in the Storytime Room. Play with your baby while socializing with other parents and tots. Tots must be 6-20 months, accompanied by a parent or guardian.
No registration necessary.
DROP-IN STORYTIME
March 10 - April 16.
No registration necessary.
PRESCHOOL
Tuesdays • 1:00-1:30 p.m.
3-5 years
FAMILY
Tuesdays • 6:30-7:00 p.m.
All ages / Parent
MORNING
Thursdays • 10:30-11:00 a.m.
All ages / Parent
POP ART: HANDS
Thursday, March 26 • 6:30-7:30 p.m.
Grades 3-5. Do you like optical illusions? Magic tricks? Make your hand pop with this 3D art technique of drawing, tracing, and coloring. Your finished product will trick and amaze your peers! Art supplies will be provided. Registration begins March 16.
POETRY HUNT
Thursday, April 9 • 6:30-7:30 p.m.
Grades 3-5. April is National Poetry Month and what better way to celebrate than with a scavenger hunt? Come solve rhyming riddles and find objects throughout the department! You will create poems out of the objects you find. Registration begins March 30.
GARDEN DAY
ALL ABOUT OWLS
Saturday, April 25 • 1:00-3:00 p.m.
Adults and children, kindergarten-3rd grade. Curious about owls and the role they play in our ecosystem? Join us for a family-friendly presentation from Wings & Talons featuring a live owl. Afterwards, children and adults will each complete different age-appropriate crafts and activities focused on owls. Registration is required. Registration begins March 23.
CAPTURE THIS! SPRING EDITION
Thursday, May 7 • 6:00-7:00 p.m.
Grades 3-5. Do you enjoy taking photos and want to practice some photography skills? Come join us as we learn the key elements to taking a photo and then venture outside to test them out! Capture the elements of spring using your newfound skills. You’ll be able to print out your photo during the program and take it with you when you leave. No materials needed. Outside photos will be dependent on weather. Registration begins April 27.
BOOKS & POPCORN
Mondays: March 9 & April 6 • 6:30-7:30 p.m.
Students in grades 2-5 discuss selected titles. Delicious popcorn provided! On the day registration opens, kids may pick up a copy of the chosen title to read before the discussion. Copies of the books will be available at the "Ask Me" Desk.
MARCH 9
Goofballs:
The Crazy Case of Missing Thunder
by Tony Abbot
Registration begins February 17.
APRIL 6
Ranger in Time:
Rescue on the Oregon Trail
by Kate Messner
Registration begins March 16.
BOOKS & COOKS
Mondays OR Wednesdays • 4:00-4:45 p.m.
Kids in kindergarten-2nd grade are invited to join us for a story and a make-your-own snack activity. Read different stories featuring fun foods and then assemble your own delicious treat! Please choose either a Monday or Wednesday session for each month.
Ice Cream Shaking
Monday, March 23 OR
Wednesday, March 25
Registration begins March 9.
Worms in Dirt
Monday, April 27 OR
Wednesday, April 29
Registration begins April 13.
MARIO MADNESS
Wednesdays, March 4, April 1 & May 6 • 6:00-7:00 p.m.
Ages 6-11. Drop in on the first Wednesday of the month for Mario Kart Wii. Play and cheer on your friends! Snacks will be provided.
LEGO® MANIA
Mondays, March 2 & 30; Friday, April 10; Saturday, May 9 • 12:00-2:00 p.m.
Attention LEGO® brick lovers ages 4-12! Drop by the Roselle Public Library on a day off of school, bring a friend, and let your imagination flow. LEGO® bricks will be provided. Finished creations will be displayed in Youth Services. No registration necessary.
3D PRINTING
ADVANCED 3D PRINTING
Wednesdays, March 11 & 18 • 5:30-6:30 p.m.
Attendance required for both sessions of this class.
Grades 4-5. This 2-week class is only open to students who have completed a Beginning 3D Printing class. At the end of the 2-week class, keep the object you designed. Registration begins March 2.
BEGINNING 3D PRINTING
Thursdays, April 23 & 30 • 6:30-7:30 p.m.
Attendance required for both sessions of this class.
Grades 4-5. Learn how to design and create objects using a 3D printer! At the end of the 2-week class, keep the object you designed.
Registration begins April 13.
KREATIVE KIDS
Thursdays: March 19 & April 16 • 4:30-5:15 p.m.
This monthly program for students in kindergarten-2nd grade features story sharing and facts. Kids then do a craft and/or science project based on the topic.
Myths and Legends
March 19
Registration begins March 9.
Change the World!
April 16
Registration begins April 6.
CRAFTERNOON
Saturday, March 14 & Thursday, April 2 • 2:00-4:00 p.m.
Drop by Youth Services for an afternoon of crafting!
Try your hand at a variety of make-and-take crafts.
Bring the whole family.
Children ages 5 & under will need assistance from an adult or caregiver.
Outer Space
Saturday, March 14
Spring Break
Thursday, April 2
GAME DAY SATURDAY
Saturday, April 11 • 2:00-4:00 p.m.
Drop by the Library with a friend for some fun with board games! Several popular board games will be available in the Youth Services department.
Children ages 5 & under will need assistance from an adult or caregiver.
TECH TOYS ARE BACK!
Monday, March 23 • 4:00-5:00 p.m.
Turn any object into an internet-connected device. Create or prototype smart home inventions and control them over the Internet using LittleBits® Smart Home Kit.
Register online, by phone, or at the Library.
TEEN CLUBS
TAB TEEN ADVISORY BOARD
Tuesday, March 3 • 4:00-5:00 p.m.
Meeting once every quarter. Help plan cool programs, meet new friends, and munch on snacks. No registration required. Drop-ins welcome.
ANIME CLUB
Wednesdays: March 11, April 8 & May 13 • 4:30-6:00 p.m.
Get together with other teens once a month to watch and talk about ANIME and look at new MANGA.
No registration required. Drop-ins welcome.
3D PRINTING CLUB
Wednesdays: March 4, April 1 & May 6 • 5:00-6:00 p.m.
Hang out with other teens and design 3D objects for printing on our 3D printer. No registration required. Drop-ins welcome.
TEEN WRITERS WORKSHOP: HOW TO WRITE UNFORGETTABLE VILLAINS
Monday, April 20 • 4:00-5:00 p.m.
We’ll look at some classic villains and see what makes them tick. Then we’ll use professional writing techniques to create our own unique villains. Mwah-ha-ha!
Register online, by phone, or at the Library.
HOW TO DRAW IN 3D
Monday, May 11 • 4:00-5:00 p.m.
Learn how to apply the basics of perspective to make your drawings pop off the page.
Register online, by phone, or at the Library.
VolunTeen = Teen Volunteer
Looking for a way to fulfill service hours for school, honor society or another organization? Here's your chance! The Teen Scene runs 3 VolunTeen Sessions a year. The current session runs through April. Too busy during the school year? No problem! Join the Summer VolunTeen Session instead, running from June through early August! To become a VolunTeen, fill out an application, available at the Library’s Reference and Adult Services Desks, or the Youth Services Desk. Get in soon, as there are a limited number of VolunTeen spaces to be filled!
SUMMER VOLUNTEEN TRAINING SESSION
Wednesday, May 20 OR Wednesday, May 27 • 4:00-5:00 p.m.
Become a VolunTeen this summer and help out at the Library! Pick up an application starting May 1, and register for a training session.
Summer participants are required to attend ONE VolunTeen Training Session, regardless of past volunteer work.
GREAT MAGAZINE GIVEAWAY!
Friday & Saturday • March 27 & 28
Try some new magazines for free!
Take some for your family, friends and neighbors!
Located in Community Room B. While supplies last!
Join us for a fun-filled day celebrating comic books and graphic novels. Visit with local artist Serena Guerra and make your own comics, check out the cosplayers, and more!
Free comic books for all ages, while supplies last.
No registration required.
KNOW YOUR MUSLIM NEIGHBOR, PART II
Tuesday, March 10 • 7:00-8:30 p.m.
Dr. Isaac Gold of the Islamic Society of Midwest (ISOM) returns to present a cultural exploration of the daily life of Muslims in America. A Q&A session will follow the presentation.
ISLAMIC ART
Saturday, March 21 • 3:00-4:30 p.m.
Islamic art reflects the beliefs, culture, and traditions of Islam and typically has focused on calligraphy and interlacing patterns, rather than on representation of figures. Artist and lecturer Mustafa Tahran discusses the history of the visual arts of the Muslim world and provides live demonstrations.
3D PRINTING FOR ADULTS
Monday, March 30 • 6:00-7:30 p.m. OR Monday, May 18 • 3:00-4:30 p.m.
This hands-on introductory session will get you started with 3D printing. We’ll review basic terminology and concepts, and create our first 3D object for printing. Presented by Staff. Registration required. (Limit of 7 people.)
UNDERSTANDING WILLS, TRUSTS & POWERS OF ATTORNEY
Wednesday, April 15 • 7:00-8:30 p.m.
Attorney John Pankau guides you through the basics of wills, trusts and powers of attorney. John will discuss the importance of estate planning and give real life examples of what to do and what not to do.
CANNABIS AN EDUCATIONAL INTRODUCTION
Monday, April 20 • 7:00-8:00 p.m.
A town hall style seminar providing an introduction and a history of cannabis. The information will be provided with a balanced approach. There will be a 20 minute Q & A session at the end of the seminar.
SEARCHING FOR SOUTH AMERICA
Sunday, April 26 • 2:00-3:00 p.m.
“Mindful Vagabond” Brian Michalski spent over a year in South America, trekking the Inca Trail, navigating pristine Patagonia, and exploring the Amazon rainforest, while also volunteering, taking Spanish classes, and earning his English teaching certificate along the way. Michalski will enthrall you with the stories of his adventures and misadventures in this challenging but magnificent continent.
MOVIE MUSIC ROMANCE
Tuesday, May 12 • 7:00-8:30 p.m.
Join John LeGear for a magical stroll down memory lane as he showcases some of the most sensational musical numbers in the history of cinema, including performances by Fred Astaire, Ginger Rogers, Eleanor Powell, Elvis, Madonna, Lily James, Emmy Rossum, and The Blues Brothers. You’ll come away with a song in your heart and a spring in your step as you journey through the last 80 years of American movie magic.
YOUTH LIT PICKS BOOK CLUB
Tuesdays, March 17, April 21 & May 19 • 4:30-5:15 p.m.
Drop in for a lively book discussion of the Rebecca Caudill and Abraham Lincoln nominees.
See our Goodreads group for current selections.
ADULT BOOK DISCUSSION
Tuesdays • 7:00-8:00 p.m., in the Conference Room of the Library
New members are always welcome. Stop by and pick up a copy of the book. Discussions last for an hour and we always find something to talk about, exchange ideas, and read books that we might not have otherwise investigated. Copies of the book available a month prior to the discussion at the Reference Desk.
MARCH 17
The Girl He Used to Know
Tracey Garvis Graves
APRIL 21
The Next Person You Meet in Heaven
Mitch Albom
MAY 19
This Tender Land
William Kent Krueger
SPRINGTIME SESSION
GRANDPARENTS GOT GAME!
Wednesday, April 1 • 1:30-3:00 p.m.
Grandparents and Grand-friends get in the springtime spirit with their grandchildren at this drop-in program. This session features a special craft, activities, a snack, and board games to play.
CHESS AT THE LIBRARY
Thursdays @ 6:45-8:45 p.m.
COMPETITIVE CHESS CLUB
March 5 & 19, April 9 & 30,
May 7 & 21
Features one USCF-rated game.
CASUAL CHESS MEETUP
March 12 & 26, April 2, 16 & 23,
May 14 & 28
All ages and skill levels are welcome.
Children under the age of fourteen must be accompanied by a parent at all times.
More information, such <cursor_is_here>*211.
KNITTING CIRCLE AT THE LIBRARY
Saturdays (Alternating) • 1:00-3:00 p.m.
Meet every other Saturday afternoon in the Library’s conference room.
More information, such as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.*211.
Knitters and those who crochet are invited to bring their own projects to the meetings or work on several community service projects. New members are welcome!
SERVICE FOR HOMEBOUND PATRONS
Library District residents who are homebound due to illness or disability with no one to pick up materials for them may qualify to receive monthly library delivery service. If you or someone you know would like to receive this service, please call the Reference Desk at (630) 529-1641 ext.*211 for further information.
SHORT STORY DISPENSER
The Roselle Public Library District is excited to debut its recently acquired short story dispenser! Visitors can find the machine located on the first floor, across from the front Circulation Desk and can select stories for children, young adults, and the general audience.
This acquisition is made possible thanks to an anonymous benefactor, who donated the funds for the dispenser to the Roselle Library Foundation in late 2019.
MUSICAL SUNDAYS
Performances held in the main atrium of the Library.
JOE MONAHAN
March 1 • 1:30-3:00 p.m.
Celebrate St. Patrick’s Day with singer and guitarist Joe Monahan. A native Chicagoan, Joe has played in and around Chicago for over 15 years. Join us for a concert of your favorite Irish tunes!
CHICAGO COSSACKS
April 19 • 1:30-3:00 p.m.
The Chicago Cossacks has been entertaining people of the Greater Chicago area and beyond since 1993. Hear their blend of Russian and Ukrainian folk music, alongside other styles, performed on traditional instruments.
CORNER BOYS
May 17 • 1:30-3:00 p.m.
Not your typical acoustic cover band, the Corner Boys’ playlist runs from Lyle Lovett to Michael Jackson to the wonderful Kris Nichols. Join us as Dave Kunzweiler, Paul Hilderbrand, and Michael Rothstein, aka Corner Boys, bring their lifelong passion for music to the Library.
Freegal® is a free music service from your library. All you need is your library card number and a PIN. Freegal offers access to about 15 million songs including Sony Music’s catalog of legendary artists, and over 40,000 music videos. In total the collection is comprised of music from over 40,000 labels with music that originates in over 100 countries. There is no software to download, and there are no digital rights management (DRM) restrictions. Patrons can access Freegal through the link on our website or by visiting freegalmusic.com.
What Is the Census?
As mandated by the U.S. Constitution, the census is a once-every-decade count of everyone living in the country. When we know how many people live in our community, organizations and businesses are better equipped to evaluate the services and programs needed, such as libraries, clinics, schools, and roads. It also determines how seats in Congress are distributed among the 50 states. In March of 2020, the U.S. Census Bureau will send every household an invitation to complete a simple questionnaire about who lives at your address on April 1st. You will have the opportunity to respond online, by phone, or by mail, and federal law keeps those responses safe and secure.
Your Library And the Census.
The 2020 Census is unique in that it is the first census where online response is being promoted as the preferred method to complete the questionnaire. Throughout the self-response period (ending on July 31st) public computers with a secure connection will be available at the Library. Staff will be available to assist and answer any questions that you may have.
The 2020 Census responses inform how the following programs are funded every year.
- **Community Support**
- Section 8 Housing Assistance Payment Programs
- **Family Services**
- Child Abuse and Neglect State Grants
- **Education**
- Head Start
- **Food Assistance**
- Supplemental Nutrition Assistance Program (SNAP)
- **Employment**
- Unemployment Insurance
- **Healthcare**
- Medical Assistance Program (Medicaid)
- **Entrepreneurship**
- Small Business Development Centers
- **Infrastructure**
- Highway Planning and Construction
- **Environment**
- State Wildlife Grants
- **Public Safety**
- Assistance to Firefighters Grant
Everyone counts. Make sure Roselle receives a complete count!
Census 2020 data determines the amount of funding that the Roselle Public Library District will receive throughout the next decade. For every resident, the Library will receive $1.25 annually from the Illinois State Library’s Per Capita Grant.
CENSUS DAY PARTY ■ APRIL 1, 2020
Celebrate At The Roselle Public Library!
April 1st is Census Day, a key reference date for the 2020 Census. When completing the census, you will include everyone living in your home on April 1, 2020. Census Day will be celebrated with events across the country.
- Join the Roselle Public Library on Census Day to celebrate our community and enjoy refreshments and fun activities for the entire family all day long.
- Library staff will be available to help with completing the Census 2020 questionnaire online.
- Look for more information on the Roselle Public Library District’s website.
- Brought to you by the Roselle Public Library District and the Village of Roselle Complete Count Committee.
The 2020 Census is easy. The questions are simple.
Responses to census questions provide a snapshot of the nation. Census results affect your voice in government, how much funding your community receives, and how the community of Roselle will plan for the future.
When you fill out the census, you help:
- Determine how many seats Illinois gets in Congress.
- Inform how more than $675 billion in federal funding is distributed to states and communities each year.
- Create jobs, provide housing, prepare for emergencies, and build schools, roads and hospitals.
LIBRARY HOURS:
Monday - Thursday 9:30 a.m.-9:00 p.m.
Friday & Saturday 9:30 a.m.-5:00 p.m.
Sunday 1:00-5:00 p.m.
LIBRARY CLOSED:
EASTER Sunday, April 12
MEMORIAL DAY Sunday, May 24
Monday, May 25
BOARD OF TRUSTEES
President Thomas Piorkowski
Vice President Sue Ellen Eichholz
Treasurer Sue Harold
Secretary Len Baumgart
Trustees Kory Atkinson
Terrell Barnes
Priscilla Spencer
LIBRARY STAFF
ADMINISTRATION
Executive Director Samantha Johnson
Business Manager Debbie Green
DEPARTMENT MANAGERS
Youth Services Kristen Lawson
Adult Services Maureen Garzaro
Technical Services Lynn Dennis
Circulation Christy Snyders
NEWSLETTER
Designer/Editor Jason Kepler
The Board meets the second Wednesday of every month in the Library’s Conference Room at 7:00 p.m. The public is invited.
</text>
|
[
{
"content": "<url>\nhttps://www.rosellepld.org/Document%20Center/About/Stay%20Informed/Access/Access_202003_Spring.pdf\n</url>\n<text>\nACCESS\nQuarterly Guide\n\nSpring 2020\n\nROSELLE PUBLIC LIBRARY DISTRICT\n\n80 YEARS\nof LIBRARY SERVICE\n\nMARCH • APRIL • MAY\n\nFRIENDS of the\nROSELLE PUBLIC LIBRARY\nANNUAL SPRING BOOK SALE\n\nSaturday, April 4 • 9:30 a.m. - 3:30 p.m.\nSunday, April 5 • 1:00 - 4:00 p.m.\n\nConsider donating your gently used books to the Annual Spring Book Sale. Drop off donations during operating hours. Please call ahead if donating large quantities.\n\nThe Roselle Public Library District is proud to commemorate 80 years of library service! Throughout 2020, we will be celebrating this milestone with special programs and an after hours event in April.\n\n80th ANNIVERSARY SHOWCASE\nFriday, April 24 • 5:30 - 8:30 p.m.\n\nHelp the Roselle Public Library commemorate its long-standing service to the community of Roselle! Take an in-depth look through history and the present day, then envision what the next 80 years may hold for the Library.\n\n• While touring the Library, listen to a performance by long-time resident of Roselle, Jim Bartholomew. His vocal style blends the soulful stylings of Motown and Memphis as well as the gritty sounds of Cajun New Orleans, Blue Chicago, and heartfelt Roots and Americana music.\n\n• Recognize our volunteers! The Roselle Public Library has always benefitted from the support of our volunteers. Join us in honoring all those who contributed in the past year.\n\n• Take part in activities and receive giveaways!\n\n• Enjoy light refreshments.\n\nCelebrate NATIONAL LIBRARY WEEK\nAPRIL 19-25, 2020\n\nLibraries are communities where all are welcome – no matter your age, interests, or background, the Library is a space where you belong. You can explore new passions and discover who you are through your library's varied array of free materials, programs, and services.\n\nVisit the Roselle Public Library today!\n\nActivities & Events All Week Long @ Your Library!\n\nBOOK LOVERS’ DAY\nWednesday, April 22 • 12:00-2:00 p.m.\n\nRoselle card holders, come celebrate Book Lovers’ Day during National Library Week. Please join us for a light luncheon and a round-table discussion of books you have especially enjoyed this year. The adult services staff will also talk about an assortment of books they have loved reading in the last 12 months.\n\nYou may register for this event online, in person or over the phone.\nA ticket is required for this event so please come to the Reference Desk to pick it up. Space is limited and this event fills up fast!\n\nLITTLE WING\nINTERACTIVE MUSIC PROGRAM\nMonday, March 30 • 10:00-10:45 a.m.\n\nThe School of Rock in Schaumburg will be visiting the Roselle Public Library to do a special musical activity event that will help children ages 3-4 explore rhythm, tempo, pitch, and form.\n\nRegistration is required and begins Monday, March 16.\n\nWEEKLY STORYTIME\nMarch 10 - April 16.\nRegistration begins February 24.\n\nTODDLER TALES\nTuesdays • 10:00-10:30 a.m.\n20-35 months (with parent)\n\nTOTS & TYKES\nTuesdays • 11:30 a.m.-12:00 p.m.\n6-19 months (with parent)\n\nPRESCHOOL\nWednesdays • 10:00-10:30 a.m.\n3-5 years\n\n* We are pleased to welcome guest presenters from Kids Plus Pediatric Dentistry on March 11!\n\nTOTIME\nTuesdays: April 21 & 28\n11:30 a.m.-12:00 p.m.\nParents play with their tots in the Storytime Room. Play with your baby while socializing with other parents and tots. Tots must be 6-20 months, accompanied by a parent or guardian.\n\nNo registration necessary.\n\nDROP-IN STORYTIME\nMarch 10 - April 16.\nNo registration necessary.\n\nPRESCHOOL\nTuesdays • 1:00-1:30 p.m.\n3-5 years\n\nFAMILY\nTuesdays • 6:30-7:00 p.m.\nAll ages / Parent\n\nMORNING\nThursdays • 10:30-11:00 a.m.\nAll ages / Parent\n\nPOP ART: HANDS\nThursday, March 26 • 6:30-7:30 p.m.\nGrades 3-5. Do you like optical illusions? Magic tricks? Make your hand pop with this 3D art technique of drawing, tracing, and coloring. Your finished product will trick and amaze your peers! Art supplies will be provided. Registration begins March 16.\n\nPOETRY HUNT\nThursday, April 9 • 6:30-7:30 p.m.\nGrades 3-5. April is National Poetry Month and what better way to celebrate than with a scavenger hunt? Come solve rhyming riddles and find objects throughout the department! You will create poems out of the objects you find. Registration begins March 30.\n\nGARDEN DAY\nALL ABOUT OWLS\nSaturday, April 25 • 1:00-3:00 p.m.\nAdults and children, kindergarten-3rd grade. Curious about owls and the role they play in our ecosystem? Join us for a family-friendly presentation from Wings & Talons featuring a live owl. Afterwards, children and adults will each complete different age-appropriate crafts and activities focused on owls. Registration is required. Registration begins March 23.\n\nCAPTURE THIS! SPRING EDITION\nThursday, May 7 • 6:00-7:00 p.m.\nGrades 3-5. Do you enjoy taking photos and want to practice some photography skills? Come join us as we learn the key elements to taking a photo and then venture outside to test them out! Capture the elements of spring using your newfound skills. You’ll be able to print out your photo during the program and take it with you when you leave. No materials needed. Outside photos will be dependent on weather. Registration begins April 27.\n\nBOOKS & POPCORN\n\nMondays: March 9 & April 6 • 6:30-7:30 p.m.\n\nStudents in grades 2-5 discuss selected titles. Delicious popcorn provided! On the day registration opens, kids may pick up a copy of the chosen title to read before the discussion. Copies of the books will be available at the \"Ask Me\" Desk.\n\nMARCH 9\nGoofballs:\nThe Crazy Case of Missing Thunder\nby Tony Abbot\n\nRegistration begins February 17.\n\nAPRIL 6\nRanger in Time:\nRescue on the Oregon Trail\nby Kate Messner\n\nRegistration begins March 16.\n\nBOOKS & COOKS\n\nMondays OR Wednesdays • 4:00-4:45 p.m.\n\nKids in kindergarten-2nd grade are invited to join us for a story and a make-your-own snack activity. Read different stories featuring fun foods and then assemble your own delicious treat! Please choose either a Monday or Wednesday session for each month.\n\nIce Cream Shaking\nMonday, March 23 OR\nWednesday, March 25\nRegistration begins March 9.\n\nWorms in Dirt\nMonday, April 27 OR\nWednesday, April 29\nRegistration begins April 13.\n\nMARIO MADNESS\n\nWednesdays, March 4, April 1 & May 6 • 6:00-7:00 p.m.\n\nAges 6-11. Drop in on the first Wednesday of the month for Mario Kart Wii. Play and cheer on your friends! Snacks will be provided.\n\nLEGO® MANIA\n\nMondays, March 2 & 30; Friday, April 10; Saturday, May 9 • 12:00-2:00 p.m.\n\nAttention LEGO® brick lovers ages 4-12! Drop by the Roselle Public Library on a day off of school, bring a friend, and let your imagination flow. LEGO® bricks will be provided. Finished creations will be displayed in Youth Services. No registration necessary.\n\n3D PRINTING\n\nADVANCED 3D PRINTING\nWednesdays, March 11 & 18 • 5:30-6:30 p.m.\nAttendance required for both sessions of this class.\nGrades 4-5. This 2-week class is only open to students who have completed a Beginning 3D Printing class. At the end of the 2-week class, keep the object you designed. Registration begins March 2.\n\nBEGINNING 3D PRINTING\nThursdays, April 23 & 30 • 6:30-7:30 p.m.\nAttendance required for both sessions of this class.\nGrades 4-5. Learn how to design and create objects using a 3D printer! At the end of the 2-week class, keep the object you designed.\nRegistration begins April 13.\n\nKREATIVE KIDS\nThursdays: March 19 & April 16 • 4:30-5:15 p.m.\nThis monthly program for students in kindergarten-2nd grade features story sharing and facts. Kids then do a craft and/or science project based on the topic.\n\nMyths and Legends\nMarch 19\nRegistration begins March 9.\n\nChange the World!\nApril 16\nRegistration begins April 6.\n\nCRAFTERNOON\nSaturday, March 14 & Thursday, April 2 • 2:00-4:00 p.m.\nDrop by Youth Services for an afternoon of crafting!\nTry your hand at a variety of make-and-take crafts.\nBring the whole family.\nChildren ages 5 & under will need assistance from an adult or caregiver.\n\nOuter Space\nSaturday, March 14\n\nSpring Break\nThursday, April 2\n\nGAME DAY SATURDAY\nSaturday, April 11 • 2:00-4:00 p.m.\nDrop by the Library with a friend for some fun with board games! Several popular board games will be available in the Youth Services department.\nChildren ages 5 & under will need assistance from an adult or caregiver.\n\nTECH TOYS ARE BACK!\nMonday, March 23 • 4:00-5:00 p.m.\nTurn any object into an internet-connected device. Create or prototype smart home inventions and control them over the Internet using LittleBits® Smart Home Kit.\nRegister online, by phone, or at the Library.\n\nTEEN CLUBS\n\nTAB TEEN ADVISORY BOARD\nTuesday, March 3 • 4:00-5:00 p.m.\nMeeting once every quarter. Help plan cool programs, meet new friends, and munch on snacks. No registration required. Drop-ins welcome.\n\nANIME CLUB\nWednesdays: March 11, April 8 & May 13 • 4:30-6:00 p.m.\nGet together with other teens once a month to watch and talk about ANIME and look at new MANGA.\nNo registration required. Drop-ins welcome.\n\n3D PRINTING CLUB\nWednesdays: March 4, April 1 & May 6 • 5:00-6:00 p.m.\nHang out with other teens and design 3D objects for printing on our 3D printer. No registration required. Drop-ins welcome.\n\nTEEN WRITERS WORKSHOP: HOW TO WRITE UNFORGETTABLE VILLAINS\nMonday, April 20 • 4:00-5:00 p.m.\nWe’ll look at some classic villains and see what makes them tick. Then we’ll use professional writing techniques to create our own unique villains. Mwah-ha-ha!\nRegister online, by phone, or at the Library.\n\nHOW TO DRAW IN 3D\nMonday, May 11 • 4:00-5:00 p.m.\nLearn how to apply the basics of perspective to make your drawings pop off the page.\nRegister online, by phone, or at the Library.\n\nVolunTeen = Teen Volunteer\n\nLooking for a way to fulfill service hours for school, honor society or another organization? Here's your chance! The Teen Scene runs 3 VolunTeen Sessions a year. The current session runs through April. Too busy during the school year? No problem! Join the Summer VolunTeen Session instead, running from June through early August! To become a VolunTeen, fill out an application, available at the Library’s Reference and Adult Services Desks, or the Youth Services Desk. Get in soon, as there are a limited number of VolunTeen spaces to be filled!\n\nSUMMER VOLUNTEEN TRAINING SESSION\n\nWednesday, May 20 OR Wednesday, May 27 • 4:00-5:00 p.m.\n\nBecome a VolunTeen this summer and help out at the Library! Pick up an application starting May 1, and register for a training session.\n\nSummer participants are required to attend ONE VolunTeen Training Session, regardless of past volunteer work.\n\nGREAT MAGAZINE GIVEAWAY!\n\nFriday & Saturday • March 27 & 28\n\nTry some new magazines for free!\nTake some for your family, friends and neighbors!\nLocated in Community Room B. While supplies last!\n\nJoin us for a fun-filled day celebrating comic books and graphic novels. Visit with local artist Serena Guerra and make your own comics, check out the cosplayers, and more!\n\nFree comic books for all ages, while supplies last.\nNo registration required.\n\nKNOW YOUR MUSLIM NEIGHBOR, PART II\nTuesday, March 10 • 7:00-8:30 p.m.\n\nDr. Isaac Gold of the Islamic Society of Midwest (ISOM) returns to present a cultural exploration of the daily life of Muslims in America. A Q&A session will follow the presentation.\n\nISLAMIC ART\nSaturday, March 21 • 3:00-4:30 p.m.\n\nIslamic art reflects the beliefs, culture, and traditions of Islam and typically has focused on calligraphy and interlacing patterns, rather than on representation of figures. Artist and lecturer Mustafa Tahran discusses the history of the visual arts of the Muslim world and provides live demonstrations.\n\n3D PRINTING FOR ADULTS\nMonday, March 30 • 6:00-7:30 p.m. OR Monday, May 18 • 3:00-4:30 p.m.\n\nThis hands-on introductory session will get you started with 3D printing. We’ll review basic terminology and concepts, and create our first 3D object for printing. Presented by Staff. Registration required. (Limit of 7 people.)\n\nUNDERSTANDING WILLS, TRUSTS & POWERS OF ATTORNEY\nWednesday, April 15 • 7:00-8:30 p.m.\n\nAttorney John Pankau guides you through the basics of wills, trusts and powers of attorney. John will discuss the importance of estate planning and give real life examples of what to do and what not to do.\n\nCANNABIS AN EDUCATIONAL INTRODUCTION\nMonday, April 20 • 7:00-8:00 p.m.\n\nA town hall style seminar providing an introduction and a history of cannabis. The information will be provided with a balanced approach. There will be a 20 minute Q & A session at the end of the seminar.\n\nSEARCHING FOR SOUTH AMERICA\n\nSunday, April 26 • 2:00-3:00 p.m.\n\n“Mindful Vagabond” Brian Michalski spent over a year in South America, trekking the Inca Trail, navigating pristine Patagonia, and exploring the Amazon rainforest, while also volunteering, taking Spanish classes, and earning his English teaching certificate along the way. Michalski will enthrall you with the stories of his adventures and misadventures in this challenging but magnificent continent.\n\nMOVIE MUSIC ROMANCE\n\nTuesday, May 12 • 7:00-8:30 p.m.\n\nJoin John LeGear for a magical stroll down memory lane as he showcases some of the most sensational musical numbers in the history of cinema, including performances by Fred Astaire, Ginger Rogers, Eleanor Powell, Elvis, Madonna, Lily James, Emmy Rossum, and The Blues Brothers. You’ll come away with a song in your heart and a spring in your step as you journey through the last 80 years of American movie magic.\n\nYOUTH LIT PICKS BOOK CLUB\n\nTuesdays, March 17, April 21 & May 19 • 4:30-5:15 p.m.\n\nDrop in for a lively book discussion of the Rebecca Caudill and Abraham Lincoln nominees.\n\nSee our Goodreads group for current selections.\n\nADULT BOOK DISCUSSION\n\nTuesdays • 7:00-8:00 p.m., in the Conference Room of the Library\n\nNew members are always welcome. Stop by and pick up a copy of the book. Discussions last for an hour and we always find something to talk about, exchange ideas, and read books that we might not have otherwise investigated. Copies of the book available a month prior to the discussion at the Reference Desk.\n\nMARCH 17\nThe Girl He Used to Know\nTracey Garvis Graves\n\nAPRIL 21\nThe Next Person You Meet in Heaven\nMitch Albom\n\nMAY 19\nThis Tender Land\nWilliam Kent Krueger\n\nSPRINGTIME SESSION\nGRANDPARENTS GOT GAME!\nWednesday, April 1 • 1:30-3:00 p.m.\nGrandparents and Grand-friends get in the springtime spirit with their grandchildren at this drop-in program. This session features a special craft, activities, a snack, and board games to play.\n\nCHESS AT THE LIBRARY\nThursdays @ 6:45-8:45 p.m.\n\nCOMPETITIVE CHESS CLUB\nMarch 5 & 19, April 9 & 30,\nMay 7 & 21\nFeatures one USCF-rated game.\n\nCASUAL CHESS MEETUP\nMarch 12 & 26, April 2, 16 & 23,\nMay 14 & 28\nAll ages and skill levels are welcome.\n\nChildren under the age of fourteen must be accompanied by a parent at all times.\nMore information, such <cursor_is_here>*211.\n\nKNITTING CIRCLE AT THE LIBRARY\nSaturdays (Alternating) • 1:00-3:00 p.m.\nMeet every other Saturday afternoon in the Library’s conference room.\nMore information, such as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.*211.\nKnitters and those who crochet are invited to bring their own projects to the meetings or work on several community service projects. New members are welcome!\n\nSERVICE FOR HOMEBOUND PATRONS\nLibrary District residents who are homebound due to illness or disability with no one to pick up materials for them may qualify to receive monthly library delivery service. If you or someone you know would like to receive this service, please call the Reference Desk at (630) 529-1641 ext.*211 for further information.\n\nSHORT STORY DISPENSER\nThe Roselle Public Library District is excited to debut its recently acquired short story dispenser! Visitors can find the machine located on the first floor, across from the front Circulation Desk and can select stories for children, young adults, and the general audience.\n\nThis acquisition is made possible thanks to an anonymous benefactor, who donated the funds for the dispenser to the Roselle Library Foundation in late 2019.\n\nMUSICAL SUNDAYS\n\nPerformances held in the main atrium of the Library.\n\nJOE MONAHAN\n\nMarch 1 • 1:30-3:00 p.m.\nCelebrate St. Patrick’s Day with singer and guitarist Joe Monahan. A native Chicagoan, Joe has played in and around Chicago for over 15 years. Join us for a concert of your favorite Irish tunes!\n\nCHICAGO COSSACKS\n\nApril 19 • 1:30-3:00 p.m.\nThe Chicago Cossacks has been entertaining people of the Greater Chicago area and beyond since 1993. Hear their blend of Russian and Ukrainian folk music, alongside other styles, performed on traditional instruments.\n\nCORNER BOYS\n\nMay 17 • 1:30-3:00 p.m.\nNot your typical acoustic cover band, the Corner Boys’ playlist runs from Lyle Lovett to Michael Jackson to the wonderful Kris Nichols. Join us as Dave Kunzweiler, Paul Hilderbrand, and Michael Rothstein, aka Corner Boys, bring their lifelong passion for music to the Library.\n\nFreegal® is a free music service from your library. All you need is your library card number and a PIN. Freegal offers access to about 15 million songs including Sony Music’s catalog of legendary artists, and over 40,000 music videos. In total the collection is comprised of music from over 40,000 labels with music that originates in over 100 countries. There is no software to download, and there are no digital rights management (DRM) restrictions. Patrons can access Freegal through the link on our website or by visiting freegalmusic.com.\n\nWhat Is the Census?\nAs mandated by the U.S. Constitution, the census is a once-every-decade count of everyone living in the country. When we know how many people live in our community, organizations and businesses are better equipped to evaluate the services and programs needed, such as libraries, clinics, schools, and roads. It also determines how seats in Congress are distributed among the 50 states. In March of 2020, the U.S. Census Bureau will send every household an invitation to complete a simple questionnaire about who lives at your address on April 1st. You will have the opportunity to respond online, by phone, or by mail, and federal law keeps those responses safe and secure.\n\nYour Library And the Census.\nThe 2020 Census is unique in that it is the first census where online response is being promoted as the preferred method to complete the questionnaire. Throughout the self-response period (ending on July 31st) public computers with a secure connection will be available at the Library. Staff will be available to assist and answer any questions that you may have.\n\nThe 2020 Census responses inform how the following programs are funded every year.\n\n- **Community Support**\n - Section 8 Housing Assistance Payment Programs\n\n- **Family Services**\n - Child Abuse and Neglect State Grants\n\n- **Education**\n - Head Start\n\n- **Food Assistance**\n - Supplemental Nutrition Assistance Program (SNAP)\n\n- **Employment**\n - Unemployment Insurance\n\n- **Healthcare**\n - Medical Assistance Program (Medicaid)\n\n- **Entrepreneurship**\n - Small Business Development Centers\n\n- **Infrastructure**\n - Highway Planning and Construction\n\n- **Environment**\n - State Wildlife Grants\n\n- **Public Safety**\n - Assistance to Firefighters Grant\n\nEveryone counts. Make sure Roselle receives a complete count!\nCensus 2020 data determines the amount of funding that the Roselle Public Library District will receive throughout the next decade. For every resident, the Library will receive $1.25 annually from the Illinois State Library’s Per Capita Grant.\n\nCENSUS DAY PARTY ■ APRIL 1, 2020\nCelebrate At The Roselle Public Library!\n\nApril 1st is Census Day, a key reference date for the 2020 Census. When completing the census, you will include everyone living in your home on April 1, 2020. Census Day will be celebrated with events across the country.\n\n- Join the Roselle Public Library on Census Day to celebrate our community and enjoy refreshments and fun activities for the entire family all day long.\n- Library staff will be available to help with completing the Census 2020 questionnaire online.\n- Look for more information on the Roselle Public Library District’s website.\n- Brought to you by the Roselle Public Library District and the Village of Roselle Complete Count Committee.\n\nThe 2020 Census is easy. The questions are simple.\nResponses to census questions provide a snapshot of the nation. Census results affect your voice in government, how much funding your community receives, and how the community of Roselle will plan for the future.\n\nWhen you fill out the census, you help:\n\n- Determine how many seats Illinois gets in Congress.\n- Inform how more than $675 billion in federal funding is distributed to states and communities each year.\n- Create jobs, provide housing, prepare for emergencies, and build schools, roads and hospitals.\n\nLIBRARY HOURS:\nMonday - Thursday 9:30 a.m.-9:00 p.m.\nFriday & Saturday 9:30 a.m.-5:00 p.m.\nSunday 1:00-5:00 p.m.\n\nLIBRARY CLOSED:\nEASTER Sunday, April 12\nMEMORIAL DAY Sunday, May 24\nMonday, May 25\n\nBOARD OF TRUSTEES\nPresident Thomas Piorkowski\nVice President Sue Ellen Eichholz\nTreasurer Sue Harold\nSecretary Len Baumgart\nTrustees Kory Atkinson\nTerrell Barnes\nPriscilla Spencer\n\nLIBRARY STAFF\nADMINISTRATION\nExecutive Director Samantha Johnson\nBusiness Manager Debbie Green\n\nDEPARTMENT MANAGERS\nYouth Services Kristen Lawson\nAdult Services Maureen Garzaro\nTechnical Services Lynn Dennis\nCirculation Christy Snyders\n\nNEWSLETTER\nDesigner/Editor Jason Kepler\n\nThe Board meets the second Wednesday of every month in the Library’s Conference Room at 7:00 p.m. The public is invited.\n</text>\n",
"role": "user"
},
{
"content": "as specific meeting dates, can be found online on the Library event calendar or call the Reference Desk at (630) 529-1641 ext.",
"role": "assistant"
}
] |
NCSR and HL7 HL7 Australia
Brisbane, May 2019
Dr Vincent McCauley MB BS (Hons), Ph.D, FACHI Telstra Health Chief Medical Officer, Chief Medical Information Officer
Page 1
| eHealth safetyHL7 V2 safety and quality Nov 2018
©
Copyright Telstra
Page 2
Declaration of additional interests
Professor Digital Health, Flinders University
Fellow, Australian College of Health Informatics (FACHI)
Director, McCauley Software Pty Ltd
Member External expert advisory committee, Black Dog Institute, NSW
Member National Pathology Accreditation Advisory Committee (NPAAC)
Chair, IHE Australia
Board member IHE International
Co-Chair HL7 International Service Oriented Architecture (SOA) Working Group
Delegate and nominated Australian standards expert ISO TC215
Member HL7 Australia and Health Informatics Society of Australia (HISA)
Member PITUS and HL7 V2 messaging work groups
| Footer text
©
Copyright Telstra
Clinical Messaging – Safety and quality principles
Positive and Negative acknowledgement of message delivery
Unambiguous data definitions and coding
Unambiguous patient/provider identification
Security of transport
Detection of missing and duplicate messages
Support for workflow
Page 3
Messaging safety and quality, RCPA Nov 2018
Page 4
HL7 V2 message Acknowledgements
Every message sent requires an acknowledgement from the receiver
Acknowledgements reference the unique ID of the sent message
Acknowledgement can be positive (Ack) or Negative (Nak)
Negative acknowledgements contain information about the HL7 Segments and fields that are in error
Single level (Original) or two-level (Enhanced) acknowledgment supported
| Messaging safety and quality, RCPA Nov 2018
HL7 V2 Message Acknowledgement - 2
Acknowledgment is determined by received message type (MSH-9) and received Message header acknowledgement flags (MSH-15,16)
MSH-9 – message type determines type of acknowledgement required
MSH-15 – Accept acknowledgement type
MSH-16 – Application acknowledgement type
Values for Both – Always (AL), Never (NE), Error (ER), Success (SU)
If both MSH-15 and 16 are not valued
=> Equivalent to MSH-15 = NE and MSH-16 = AL
Page 5
| Footer text
=> Original mode acknowledgement = single level Application acknowledgement
Page 6
HL7 V2 Acknowledgement message types
A receive acknowledgement message is only sent if twolevel (enhanced) acknowledgement is in use
Message Acknowledgement in the NCSR
NCSR always sends back two-level acknowledgements
NCSR expects single-level (application) acknowledgment to sent message
LAB (upload result): ORU => NCSR NCSR => LAB ACK (gateway/receive) msg validation including patient/provider ACK (application)
LAB (request history): ORM => NCSR NCSR => LAB ACK (gateway/receive) msg validation including patient/provider ORR (application) NCSR => LAB ORU (history as observation) LAB => NCSR ACK
Page 7
Page 8
Safe HL7 V2 Acknowledgement processing
Every message sent must have a corresponding acknowledgement response received and processed
Negative acknowledgements (NAK) must have appropriate escalation. Automatic re-try is rarely appropriate except when timeout
Systems must detect missing acknowledgments
Timeouts must have a sanity threshold which results in escalation.
Acknowledgement failures are a common cause of clinical incidents
Document information flow
Page 9
Pause ….
Who is directing the traffic?
NCSR - HL7 Requesting Cervical Participant History Process
HL7 Message Transport
```
Secure VPN from each pathology Laboratory to NCSR Separate links for upload and download Transactions: From Laboratory Result Upload – ORU History Request – ORM Acknowledgments – ACK, ORR From NCSR History return – ORU Acknowledgements - ACK
```
Safe usage of clinical identifiers
All well designed software systems have unique internal entity identifiers Exchange of information is either trust based, exchange based or a hybrid of these
Trust based:
[x] Strong mutually agreed identifier(s) maintained by a trusted third-party e.g. government, with known governance as well as methodology for resolving issues
Exchange based
[x] Receiver matches received data to local identifier and transmits receivers identifier AND senders identifier back to sender
[x] Information supplied with sender's local identifier and sufficient additional information to permit matching to receiver's data.
[x] Both sender and receiver identifiers are included in all future exchanges.
[x] This is supported by HL7 but not always mandated – implementation guides must mandate.
[x] Requires mutual unique identifiers labelled with assigning authority
[x] NCSR assigns an NCSR patient identifier transmitted in all messages to labs.
NCSR identifiers
Patient
Laboratory assigned patient identifier
NCSR assigned patient identifier
IHI
DVA number
Medicare number with IRN
Patient name
Sex
DOB
Address
Provider
Medicare Provider number
HPI-I
Laboratory
NATA number
Matching limitations
* All matching algorithms will have an associated false positive match rate and false negative match rate
* The overall false matching rate is dependent on the matching algorithm AND the underlying statistical distribution of the match data.
* Many applications can tolerate either false negative or false positives better
o Patient matching often set to minimise false positives e.g. "exact matching"
o Use of DNA matches in criminal cases favours false negatives over false positives
False negatives result in creation of duplicate patients requiring later merge
False positives result in "intertwined" patient records
Choose your poison
* Due to the statistical nature of matching:
o As false positive matches decrease, false negative matches will increase
o As false negative matches decrease, false positive matches will increase
o Optimise total false match rate or the ratio of false negative to positive but not both
o "You can mix them anyway you like but they will never leave"
Terminology – safety and quality
* Terminology determines the quality of Information that can be exchanged
* Semantic interoperability requires agreed terminology between exchange partners
SNOMED – Systematic NOmenclature for MEDicine
o Originally developed by the American College of Pathologists
o Deeply hierarchical covering most medical domains
o Now managed by SNOMED International – an SDO
o Available only under licence (NOT free but have Australian National licence paid for by Federal Dept of Health)
o Distributed by ADHA as monthly updates – downloadable text files and through the National Terminology Service (FHIR interface)
o ADHA holds Australian national SNOMED licence
o Large – millions of terms
o Defines a system of logical operators on SNOMED Terms = SNOMED expressions
o Can be challenging to implement and use, due to size and complexity
o Agreed coding system in Australia for diagnosis, disease, Pathology orders. Also supports symptoms.
o Australian Medicines Terminology (AMT) derived from SNOMED
o Complex procedure to add new terms
o Tools – Free CSIRO Snapper and Shrimp – lookup and mapping
LOINC – Logical Observation Identifiers for Names and Codes
o Developed, managed and distributed by the Regenstrief Institute (USA)
o Each code contains values from 6 axes
o See www.loinc.org
i. Component- what is measured, evaluated, or observed (example: urea,...)
iii. Time aspect- interval of time over which the observation or measurement was made
ii. Kind of property- characteristics of what is measured, such as length, mass, volume, time stamp and so on
iv. System- context or specimen type within which the observation was made (example: blood, urine,...)
vi. Type of method- procedure used to make the measurement or observation
v. Type of scale- the scale of measure. The scale may be quantitative, ordinal, nominal or narrative
o Free and available for web download or using JSON/FHIR API
o Australian agreed terminology for Pathology results
o Relatively easy to add new terms
o Clinical LOINC – codes for disease, diagnosis , symptoms etc
o Free RELMA tool for LOINC mapping
o Comparatively simple to implement
Examples of HL7 V2 terminology usage
PID-8 1 IS O 0001 00111 Sex
Table for terminology (Appendix A)
LOINC and SNOMED Codes:
Page 19
Terminology Mapping
* Mapping is required when two or more systems use different code sets
* Mapping can be very simple e.g. sex –
o AIHW = [1,2,3,4,5,9]
o HL7 = [F, M, U, O]
Or
* complex e.g. LOINC to SNOMED potentially involving millions of terms
o So far >6.5K LOINC terms mapped to SNOMED here
* Mapping is almost never 1:1 – see sex above
* Mapping tables are rarely complete
* Mapping tables may not be commutative –
o MBS to LOINC code is 1:n
o pathology LOINC code to MBS is n:1
* Mapping tables may not be transitive
e.g. PBS => AMT => TGA then TGA => PBS may not produce the original PBS code
Terminology Mapping - continued
Terminology and Mapping Clinical Governance is the key to clinical safety
o How often is it updated?
o Who is responsible for maintenance and new versions? – terminologies and maps
o How are updates distributed and changes communicated?
o What quality measures are in place? – completeness, audit, independent review, expertise
o How are updates and map maintenance resourced
o Are the limitations of the map understood by all parties?
o Are the rules for dealing with unmapped values well defined?
There is an ISO TC215 standard on clinical mapping quality measures.
Page 21
NCSR example messages – Histopath upload
```
MSH|^~\&|LABSYS|GI^9999^AUSNATA|NCSR|NCSR|20170717222327+1000||ORU^R01|GI.36.20170717.27521235|P|2.4^AUS&Australia&ISO31661|||AL|AL|AUS|8859/1|en^English^ISO639 PID|1||125^^^LAB^MR~49502908701^^^AUSHIC^MC~8003608833353907^^^AUSHIC^NI||KENNEDY^DOT^^^^^L||19990319|F|||271 GILBERT PL^^DENISTONE^NSW^2114^^H PV1|1|O|OP^^^^^^^^outpatient|R||||4445758F^GLADMIN^BOB^^^Dr^^^AUSHICPR ORC|RE||1100002-1^GI^9999^AUSNATA||CM OBR|1||1100002-1^GI^9999^AUSNATA|252416005^Histology Cancer Narrative^SCT|||20160714093000+1000|||4445758F^GLADMIN^BOB^^^Dr^^^AUSHICPR||||20160714113000+1000||4445758F^GLADMIN^BOB^^^Dr^^^AU SHICPR||||LN=1100002||20170717222327+1000||LAB|F||^^^20160714000000+1000^^R^^ROUTINE|||||0626518F&DOCTOR&PAUL&&&Dr&&&AUSHICPR OBX|1|CE|72135-7^Diagnosis^LN|1.1|site 1 code^description^SCT||||||F OBX|2|CE|72135-7^Diagnosis^LN|1.1.1|procedure 1 code^description^SCT||||||F OBX|3|CE|72135-7^Diagnosis^LN|184.108.40.206|finding 1 code 1^description^SCT||||||F OBX|4|CE|72135-7^Diagnosis^LN|220.127.116.11|finding 1 code 2^description^SCT||||||F OBX|5|CE|72135-7^Diagnosis^LN|1.2|site 2 code^description^SCT||||||F OBX|6|CE|72135-7^Diagnosis^LN|1.2.1|procedure 1 code^description^SCT||||||F OBX|7|CE|72135-7^Diagnosis^LN|18.104.22.168|finding 1 code^description^SCT||||||F OBX|8|CE|72135-7^Diagnosis^LN|22.214.171.124|finding 2 code^description^SCT||||||F OBX|9|CE|72135-7^Diagnosis^LN|126.96.36.199|finding 3 code^description^SCT||||||F OBX|10|CE|72135-7^Diagnosis^LN|1.3|site 3 code^description^SCT||||||F OBX|11|CE|72135-7^Diagnosis^LN|1.3.1|procedure 1 code^description^SCT||||||F OBX|12|CE|72135-7^Diagnosis^LN|188.8.131.52|finding 1 code^description^SCT||||||F
```
NCSR Example messages History request
MSH|^~\&|LIS|Pathology Lab^9999^AUSNATA|NCSR|NCSR|20170524110726+1000||ORM^O01|XX0524222406 6-1191|P|2.4^AUS&Australia&ISO3166-1|||AL|AL|AUS|8859/1
PID|1||999006^^^LAB^MR~50696976461^^^AUSHIC^MC||YUMYUMRS^CAROLEF^^ ^MS^^L||19750117|F||9|222 LONSDALE ST^^MELBOURNE^VIC^3000^^M||0491570156
ORC|NW|00004428-1^Pathology Lab^9999^AUSNATA|||||^^^2005||20160916220216+1000||||||20160916220216+1000|4 10513005^In thepast^SCT
OBR|1|00004428-1^Pathology Lab^9999^AUSNATA||^*|||||||G|||||||||LN=00004428||||LAB
NCSR Example messages – History response – no history found
MSH|^~\&|NCSR|NCSR|LIS|Pathology Lab^9999^AUSNATA|20170524110726+1000||ORU^R01|XX052422240661191|P|2.4^AUS&Australia&ISO3166-1|||AL|NE|AUS|8859/1
PID|||999006^^^LAB^MR~50696976461^^^AUSHIC^MC||YUMYUMRS^CAROLEF^^^
MS^^L||19750117|F|||222 LONSDALE ST^^MELBOURNE^VIC^3000^^M||0491570156
ORC|OK|00004428-1^Pathology Lab^9999^AUSNATA||1
OBR|1|1100002-1^GI^9999^AUSNATA||5491000179105^Medical record summary^SCT|||||||||No previous history found|
NCSR Example messges – History response with history
```
MSH|^~\&|NCSR|NCSR|LIS|Pathology Lab^9999^AUSNATA|20170524110726+1000||ORU^R01|XX052422240661191|P|2.4^AUS&Australia&ISO3166-1|||AL|NE|AUS|8859/1 PID|||999006^^^LAB^MR~50696976461^^^AUSHIC^MC||YUMYUMRS^CAROLEF^^^MS^^L||19750117|F|||222 LONSDALE ST^^MELBOURNE^VIC^3000^^M||0491570156 ORC|OK|00004428-1^Pathology Lab^9999^AUSNATA||1 OBR|1|00004428-1^Pathology Lab^9999^AUSNATA||35904009^ Human papillomavirus DNA detection ^SCT|||20160714093000+1000|||||||20160714113000+1000||||||LN=1100002||20170717222327+1000||LAB|F OBX|1|CE|53903-1^HPV COLL METHOD^LN||A1^Practitioner-collected sample||||||F OBX|2|CE|19763-2^HPV Spec Site^LN||B1^Cervical||||||F OBX|3|CE|67098-4^HPV Reason^LN||C1^Primary screening HPV test||||||F OBX|4|CE|77379-6^HPV test result 1 - onc^LN|1|DU^Unsatisfactory||||||F OBX|5|CE|8262-8^HPV Test Type^LN||E1.1^Qiagen Hybrid Capture II||||||F OBX|6|CE|20430-5^HPV Test Sample^LN||F1^PreservCyt Solution||||||F OBX|7|CE|19774-9^NCSR program^LN||HPV^HPV renewal program||||||F OBX|8|FT|TXT^Display format in text^AUSPDI||\.br\ HPV Collection Method Practitioner-collected sample\.br\ HPV Spec Site Cervical\.br\ Reason for HPV Test Primary screening HPV test\.br\ HPV test Result 1 Unsatisfactory\.br\ HPV Test Type Qiagen Hybrid Capture II\.br\ HPV Test Sample PreservCyt Solution\.br\ NCSR program HPV renewal program\.br\ NCSR Risk U\.br\ NCSR SI Num 17\.br\ NCSR Test Case SYS CRV-2.1.8u2\.br\ NCSR Test Description Under age\.br\^||||||F ORC|OK|00004428-1^Pathology Lab^9999^AUSNATA||2 OBR|1|00004428-1^Pathology Lab^9999^AUSNATA||417036008^Liquid based cervical cytology screening^SCT|||20160714093000+1000|||||||20160714113000+1000||||||LN=1100002||20170717222327+1000||LAB|F OBX|1|CE|19771-5^Specimen type^LN||A2^Liquid Based specimen||||||F OBX|2|CE|19763-2^Specimen Site^LN||B1^Conventional Cervical||||||F OBX|3|CE|67098-4^Reason for test^LN||C1^Reflex LBC cytology after detection of oncogenic HPV in primary screening H||||||F OBX|4|CE|19762-4^Result S^LN||SU^Unsatisfactory for evaluation, for example, poor cellularity, poor preserva||||||F OBX|5|CE|19765-7^Result E^LN||E1^Endocervical component present. No abnormality or only reactive changes.||||||F OBX|6|CE|19766-5^Result O^LN||O5^Possible high-grade lesion - non-cervical||||||F OBX|7|CE|19774-9^NCSR program^LN||HPV^HPV renewal program||||||F OBX|8|FT|TXT^Display format in text^AUSPDI||\.br\ Specimen type \H\Liquid Based specimen\N\\.br\ Specimen Site \H\Conventional Cervical\N\\.br\ Reason for test \H\Reflex LBC cytology after detection of oncogenic HPV in primary screening H\N\\.br\ Result S \H\Unsatisfactory for evaluation, for example, poor cellularity, poor preserva\N\\.br\ Result E Endocervical component present. No abnormality or only reactive changes.\.br\ Result O \H\Possible high-grade lesion - non-cervical\N\\.br\ NCSR program HPV renewal program\.br\^||||||F ORC|OK|00004428-1^Pathology Lab^9999^AUSNATA||3 OBR|1|00004428-1^Pathology Lab^9999^AUSNATA||252416005^Histology Cancer Narrative^SCT|||201307051230+1000|||||||||||||||||SP OBX|1|FT|22637-3^Pathology report final diagnosis Narrative^LN||CONCLUSION: CERVICAL BIOPSY: CIN2 & 3, HPV changes.||||||F
```
Thank you
| Messaging safety and quality, RCPA Nov 2018
©
Copyright Telstra
|
<urn:uuid:abe1ecc8-c816-44ac-be35-33c6f416db3e>
|
CC-MAIN-2020-40
|
https://www.rcpa.edu.au/getattachment/74b7a5b5-d15c-4725-b193-2aea4d046e2c/McCauley-NCSR-and-HL7.aspx
|
2020-09-28T19:17:01+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00034-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 966,928,769
| 4,718
|
eng_Latn
|
eng_Latn
| 0.532034
|
eng_Latn
| 0.507499
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"pol_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"nld_Latn",
"fin_Latn",
"eng_Latn",
"nld_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
249,
927,
1262,
1704,
2268,
2411,
2895,
3371,
3389,
3420,
3480,
3754,
4726,
4974,
5989,
6180,
7117,
8145,
8282,
8890,
9503,
11182,
11725,
12232,
15460,
15540
] |
NCSR and HL7 HL
|
7 Australia
Brisbane, May 2019
Dr Vincent McCauley MB BS (Hons), Ph.
| 15
|
inside_word
|
HL7
|
remove_all
|
<url>
https://www.rcpa.edu.au/getattachment/74b7a5b5-d15c-4725-b193-2aea4d046e2c/McCauley-NCSR-and-HL7.aspx
</url>
<text>
NCSR and HL7 HL<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.rcpa.edu.au/getattachment/74b7a5b5-d15c-4725-b193-2aea4d046e2c/McCauley-NCSR-and-HL7.aspx\n</url>\n<text>\nNCSR and HL7 HL<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "7 Australia\n\nBrisbane, May 2019\n\nDr Vincent McCauley MB BS (Hons), Ph.",
"role": "assistant"
}
] |
|
School forms asthma program through partnership
By Nadine Stinger, Staff Writer
Kingsburg Recorder Sept. 12, 2006
One in every seven children in California is affected by asthma. With this statistic in mind, Rafer Johnson Junior High has partnered with statewide organizations to raise a flag to promote air quality awareness in its school and community.
In accordance with the American Lung Association of Central California and the San Joaquin Valley Air Pollution Control District, Rafer Johnson and other Valley schools are taking part in the school-based agenda, the Air Quality Flag Program.
Under the program, Rafer Johnson's students search the Internet daily for air conditions, and then hang the colored flag that marks the air quality for that day.
A green flag indicates that the air in the area is expected to be good, and a yellow flag signifies moderate air quality. On a yellow day, children who have severe levels of asthma or other pulmonary conditions are advised to be careful when participating in physical activities outside, especially if they find it hard to breath, start wheezing or feel like they are getting sick.
An orange flag means that the air quality is unhealthy for sensitive groups. Students with asthma and other lung or heart conditions should reduce how long and how hard they play outside. A red flag is a warning sign that air quality is unhealthy for everyone. On such a day, all students' outdoor activities are limited.
Sally Robinson, learning coordinator at Rafer Johnson, spoke highly of the program and the student involvement that it calls for.
"We want our kids, particularly our asthma kids, to get involved and say to themselves, 'You know what, I need to be more careful with how hard I am playing because the air may be bad,'" she said.
According to Robinson, Rafer Johnson has its share of asthmatic students who cannot part with their inhalers, and the school is trying to do something to make life easier for these medically atrisk students.
Eighth-grade student Whitney Snider, who has asthma and keeps an inhaler in the school's office, said she is excited about the program.
"It's good because now I'll see the flag and know when the air is unhealthy, and I can stay inside," she said.
Whitney said she does not have a severe case of asthma, but she gets short of breath when the air quality is bad and when she plays really hard at physical education.
Robinson stressed the importance of teaching students about air quality and air pollution, especially since we live here in the Central Valley.
Informational posters on air quality are placed in every classroom, and teachers will talk to their students about the impact of air pollution on health, teach them preventive methods and remind them to pay attention to the flags. Under the program, teachers attended a workshop. The idea is that these teachers will educate their students on the things they learned.
But the program is not geared only toward educating the students. Parent involvement and awareness are pivotal, Robinson said. Parents and guardians will receive a detailed packet explaining the program, its goals and parent participation. The American Lung Association of
Central California also provides parent group training in English and Spanish. Other district schools are getting ready for the program that Rafer Johnson started last week.
For more information on the program or to set up parent group training call 800-LUNG-USA.
Today is 11th Spare the Air Day of season
Michael Cabanatuan, staff writer
S.F. Chronicle, Tuesday, September 12, 2006
Bay Area air quality officials have called a Spare the Air Day for today -- the 11th of the season.
With meteorologists forecasting unhealthy air, particularly in the area stretching from Concord to Livermore, the air district is urging commuters to take public transportation. Cars are the biggest source of ground-level ozone, or smog.
Air quality officials also urge people to postpone painting, staining, disinfecting or working in the yard with gasoline-powered equipment, to curtail the use of aerosol products and to refuel cars after dusk.
But commuters will have to pay for their rides, because the free-transit program covered only the first six Spare the Air Days.
Tuesday is a Spare-the-Air Day (but no free rides)
Tri-Valley Herald, Tuesday, Sept. 12, 2006
Rising temperatures and expected unhealthy smog levels prompted the Bay Area Air Quality Management District to declare Tuesday a Spare the Air Day, urging residents to take transit to work and avoid using polluting equipment and chemicals.
Tuesday will be the summer's 11th such day, and unlike the first six days, will not involve free transit rides. The budget for free bus, rail and ferry rides ran out on July 21.
The warmer temperatures, combined with stagnant air, are expected to foster the creation of ground-level ozone from auto exhaust and other pollutants, such as the volatile organic compounds commonly found in paints, household cleaners and hair spray. Air officials also urge residents to avoid yard work with gasoline-powered equipment, especially during morning hours.
Supervisors weigh air pollution fee proposal
Dana M. Nichols
Stockton Record, Tuesday, Sept. 12, 2006
SAN ANDREAS - Calaveras County supervisors are divided over whether to continue a taxpayer subsidy to farmers and other large property owners who cause air pollution by burning brush and other plant debris.
The county-run Air Pollution Control District spends about $19,500 a year to monitor and regulate smoke pollution from about 1,600 properties larger than 5 acres. County staffers are proposing to charge the owners of each of those properties a $12 annual fee to cover the cost of tracking the smoke and timing burns to minimize the impact on residents.
But county supervisors holding a study session on the matter Monday failed to give a clear signal on whether they want to end the subsidy. Supervisors Victoria Erickson and Tom Tryon said they oppose the proposed fee.
Supervisors Merita Callaway and Bill Claudino said they would support the fee.
Supervisor Steve Wilensky said he would not take a public position on the matter until he was able to consult with the county's legal counsel.
Wilensky, who operates an apple orchard, said he applies for the burn permits himself and therefore might have a conflict of interest should he weigh in on the matter.
Tryon, the other member of the board who earns his living through agriculture, running a ranch near Angels Camp, offered no explanation for his opposition to the fee and did not express any concern that he might have a conflict of interest on the issue.
The Calaveras County Farm Bureau opposed the proposed fee.
"I know $12 is not a lot to argue over, but it's another fee," said Steve Kafka, president of the bureau and a forester with Sierra Pacific Industries. Kafka said he also fears that a new fee would discourage property owners from acting to reduce fire hazards.
Brian Moss, director of the county's Environmental Management Agency, said he sympathized with agriculture's need to control costs but said it doesn't make sense to give some property owners a break on air pollution control costs while charging others.
Many of those who would pay the fee live on rural lots larger than 5 acres but do not actively farm or raise cattle.
Callaway asked whether charging all property owners a $12 fee accurately reflected the cost of scheduling the burns and monitoring the pollution on different sizes of property.
Lakhmir Grewal, head of the Calaveras County Air Pollution Control District, said some very large burns to reduce the fuel load in forests, commonly known as controlled burns, are much more expensive for the district to plan and monitor.
He said that is because such controlled burns require detailed plans to prevent damage to human health and to manage the fire, and the district must review those plans. "Some of those permits are costing thousands of dollars" in district staff time, he said.
He said some counties charge air pollution fees of more than $1,000 for property owners who do large controlled burns.
The proposal Grewal and Moss brought to supervisors, however, would charge a flat $12 whether a property owner simply burned brush piles near a home on a 10-acre lot or needed to do a 300acre controlled burn on forestland.
Wilensky asked Grewal and Moss if they thought imposing a fee might simply drive some property owners to go ahead and burn without getting the required air pollution permit.
Moss said no. He said property owners already drive to the district office to get the required free permits, and the inconvenience of driving to the office is a greater barrier than a $12 fee. Also, he noted that people who burn illegally without a permit can pay substantial penalties.
Grewal said that recently a farmer had been fined $1,000 for an illegal orchard burn, and a developer been fined $5,000 for an illegal burn.
Legislation affecting business
By Jake Henshaw
Visalia Times-Delta, Monday, Sept. 11, 2006
They still had hopes of passing a few modest bills in August in the Capitol, but for the most part California businesses are playing defense as the Legislature wraps up its work for the year.
They are trying to defeat proposals to increase the minimum wage, impose emission caps to control global warming, boost benefits for permanently disabled workers and force big businesses to provide health care for its employees.
"As usual, at the end of the session, it comes down to that," Vince Sollitto, spokesman for the California Chamber of Commerce, said of the effort to defeat measures that businesses fear will hurt job creation and competitiveness.
Michael Shaw, assistant state director for the National Federation of Independent Business, said his group is pushing a couple of bills to aid small businesses by requiring a state study of the cost of regulations on them and setting up a state Web site linking state agencies that regulate them.
Businesses appear to have already lost battles to reinstitute a tax credit for the purchase of manufacturing equipment and the four-day workweek for interested workers without overtime pay. They now face a tough battle against any minimum wage increase because the governor supports a $1 boost while Democrats and unions generally agree with the governor but also want automatic future increases indexed to inflation.
Democrats also are pushing for revisions for workers' compensation. Changes have cut premiums 50 percent, but injured workers claim it also has cut benefits for permanently disabled workers 50 percent. The bill is still being finalized.
The Legislature was scheduled to end its regular session for the year Aug. 31.
Bills favored by business
* AB2330, Assemblyman Juan Arambula, D-Fresno: Requires the state to study the cost of regulations on small businesses.
* SB1436, Sen. Liz Figueroa, D-Sunol: Directs the state to set up an Internet link to all state agencies that have a significant role in regulating small businesses.
Bills opposed by business
* AB1835, Assemblywoman Sally Lieber, D-Mountain View: Increases increase the minimum wage from the current $6.75 to $7.75 in two steps over two years. It then would automatically provide for future increases indexed to the rate of inflation.
* SB1162, Sen. Gil Cedillo, D-Los Angeles: Increases the minimum wage from the current $6.75 to $7.75 in two steps. The initial increase would come within 60 days of the bill being signed, versus AB 1835, which authorizes the first step on July 1, 2007. Future increases also would be indexed to the rate of inflation.
Air quality
* AB32, Assembly Speaker Fabian Nunez, D-Los Angeles and Assemblywoman Fran Pavley, DAgoura Hills: Requires state officials to set a cap on greenhouse gas emissions and monitor their prevalence.
* SB1205, Sen. Martha Escutia, D-Whittier: Increases penalties for pollution from sources other than motor vehicles from $1,000 to a range of $10,000 up to $100,000 with the fines deposited in a new Children's Breathing Rights Fund, for which uses would be established later.
* AB1101, Assemblywoman Jenny Oropeza, D-Long Beach: Gives ports, airports and rail yards that attract large numbers of diesel-powered vehicles the power to reduce diesel emissions.
* SB1252, Sen. Dean Florez, D-Shafter: Authorizes a penalty of up to $25,000, in addition to other existing penalties, for emissions of particulates that violate federal air quality standards.
* SB1368, Senate leader Don Perata, D-Oakland: Establishes a greenhouse gas emissions performance standard for public and private utilities.
Resources
* SB 646, Sen. Sheila Kuehl, D-Santa Monica: Tightens up the procedures for farm and timber companies to get waivers from the operating rules for discharging into public water, which include obtaining permits. The bill also would impose a fee for waivers.
* AB 2641, Assemblyman Joe Coto, D-San Jose: Requires developers who discover Indian burial grounds to consult with likely tribal descendants regarding appropriate preservation.
Health
* SB1379, Senate leader Don Perata, D-Oakland, and Sen. Deborah Ortiz, D-Sacramento: Creates the nation's first biomonitoring program to assess chemical contamination of the general public to aid public health planning.
* SB1414, Sen. Carole Migden, D-San Francisco: Requires companies with 10,000 or more workers to spend an amount equal to 8 percent of their payroll on health insurance or pay that amount to Medi-Cal.
Legal issues
* SB1489, Sen. Denise Ducheny, D-San Diego: Authorizes the California attorney general to recover attorneys' fees and costs when he wins cases enforcing laws on such issues as the environment, civil rights, consumer fraud, corporate responsibility and gambling with the goal of making such actions self-funding.
* SB1737, Sen. Liz Figueroa, D-Sunol: Sets timelines and other rules for consumer rebates.
Report links global warming, storms
Keay Davidson, Chronicle Science Writer S.F. Chronicle, Tuesday, September 12, 2006
Scientists say they have found what could be the key to ending a yearlong debate about what is making hurricanes more violent and common -- evidence that human-caused global warming is heating the ocean and providing more fuel for the world's deadliest storms.
For the past 13 months, researchers have debated whether humanity is to blame for a surge in hurricanes since the mid-1990s or whether the increased activity is merely a natural cycle that occurs every several decades.
Employing 80 computer simulations, scientists from Lawrence Livermore National Laboratory and other institutions concluded that there is only one answer: that the burning of fossil fuels, which warms the climate, is also heating the oceans.
Humans, Ben Santer, the report's lead author, told The Chronicle, are making hurricanes globally more violent "and violent hurricanes more common" -- at least, in the latter case, in the northern Atlantic Ocean. The findings were published Monday in the latest issue of the Proceedings of the National Academy of Sciences.
Hurricanes are born from tropical storms fueled by rising warm, moist air in the tropics. The Earth's rotation puts a spin on the storms, causing them to suck in more and more warm, moist air -- thus making them bigger and more ferocious.
In that regard, the report says, since 1906, sea-surface temperatures have warmed by between one-third and two-thirds of a degree Celsius -- or between 0.6 and 1.2 degrees Fahrenheit -- in the tropical parts of the Atlantic and Pacific oceans, which are hurricane breeding grounds.
Critics of the theory that greenhouse gases are making hurricanes worse remained unconvinced by the latest research.
Chris Landsea, a top hurricane expert, praised the Proceedings paper as a worthwhile contribution to science, but said the authors failed to persuasively counter earlier objections -that warmer seas would have negligible impact on hurricane activity.
Landsea, science and operations officer at the U.S. National Hurricane Center in Miami, noted that modern satellite observations have made hurricanes easier to detect and analyze, and that could foster the impression of long-term trends in hurricane frequency or violence that are, in fact, illusory. The surge in hurricane activity since the mid-1990s is just the latest wave in repeating cycles of hurricane activity, he said.
Philip Klotzbach, a hurricane forecaster at Colorado State University, said that "sea-surface temperatures have certainly warmed over the past century, and ... there is probably a humaninduced (global warming) component." But his own research indicates "there has been very little change in global hurricane activity over the past 20 years, where the data is most reliable."
Researchers report in the Proceedings paper an 84 percent chance that at least two-thirds of the rise in ocean temperatures in these so-called hurricane breeding grounds is caused by human activities -- and primarily by the production of greenhouse gases.
Tom Wigley, one of the world's top climate modelers and a co-author of the paper, said in a teleconference last week that the scientists tried to figure out what caused the oceans to warm by running many different computer models based on possible single causes. Those causes ranged from human production of greenhouse gases to natural variations in solar intensity.
Wigley said that when the researchers reviewed the results, they found that only one model was best able to explain changing ocean temperatures, and it pointed to greenhouse gases in the atmosphere. The most infamous greenhouse gas is carbon dioxide, a product of human burning of fossil fuels in cars and factories.
Wigley estimated the odds as smaller than 1 percent that ocean warming could be blamed on random fluctuations in hurricane activity, as some scientists suggest.
The debate among scientists was triggered in August 2005, a few weeks before Hurricane Katrina struck New Orleans, when hurricane expert Kerry Emanuel of MIT wrote an article for the journal Nature proposing that since the 1970s, ocean warming had made hurricanes about 50 percent more intense in the Atlantic and Pacific oceans.
Later, two scientific teams, both at Georgia Tech, estimated that warmer sea-surface temperatures were boosting both hurricane intensity and the number of the two worst types of hurricanes, known as Category 4 and Category 5 storms.
Nineteen scientists from 10 institutions were involved in the Proceedings paper. In addition to Lawrence Livermore, other U.S. institutions included Lawrence Berkeley National Laboratory, the National Center for Atmospheric Research, NASA, UC Merced, Scripps Institution of Oceanography in La Jolla (San Diego County), and the National Oceanic and Atmospheric Administration.
Santer's co-authors included six Livermore colleagues -- Peter J. Gleckler, Krishna AchutaRao, Jim Boyle, Mike Fiorino, Steve Klein and Karl Taylor -- and 12 other researchers from elsewhere in the United States and from Germany and England.
Assuming that warmer water equals more bad hurricanes, scary times could be ahead for inhabitants of hurricane-prone regions.
That's because "the models that we've used to understand the causes of (ocean warming) in these hurricane formation regions predict that the oceans are going to get a lot warmer over the 21st century," Santer said in a statement. "That causes some concern."
How hurricanes form in the Atlantic Ocean
Hurricanes are born in far western Africa, where modest windstorms known as tropical disturbances pick up moisture from the warm sea and begin to whirl. As atmospheric pressures drop, tropical depressions form with wind speeds up to 38 mph. As they speed westward they become tropical storms, lashing the ocean with sheets of rain and winds blowing up to 70 mph or more, finally building into hurricanes with winds exceeding 100 mph. -- Tropical disturbance -Tropical depression -- Tropical storm -- Hurricane Source: NOAA, The New York Times Joe Shoulak / The Chronicle
Dogs may aggravate the symptoms of asthmatic children
Tri-Valley Herald, Sunday, Sept. 10, 2006
THE shedding and chewing of shoes may be the least of the family dog's transgressions.
Asthmatic children who lived with dogs coughed more, produced more phlegm and had more bronchial responses to air pollutants than those with no pets, or those who lived only with cats, according to research that appeared last week in Environmental Health Perspectives.
Dr. Rob McConnell, a professor of preventive medicine at the Keck School of Medicine of the University of Southern California and the study's lead author, speculated that the increased asthmatic response of children with dogs is due to higher levels of endotoxin — a part of the cell wall of certain bacteria commonly found in dirt. Endotoxins are known to produce inflammation of the lungs and can be tracked in by dogs from outside.
But McConnell cautioned that there might be other explanations for the study's findings. Children with dogs, for example, might be more likely to play outside and thus be more exposed to air pollution. "It may have nothing to do with the dog," he said.
So don't take any hasty, pet-related actions.
"I think that if a child has asthma, they should have a pediatrician with a knowledge of asthma following them," he said. "Any decision should be based on a case-by-case basis."
Healthy vending (really)
You've worked through lunch again because the phone won't stop ringing, the e-mails won't stop flying and your major report has to be done today.
The next thing you know you're staring at a bank of vending machines to find something quick to eat. This situation, or others where the only option is a meal from a machine, doesn't have to be a sad scenario. But it depends on the selection available when playing this version of "the slots."
Vending machines aren't exactly synonymous with fine food or good nutrition, but the overall bad rap isn't fair, says Alan Plaisted of Atlanta-based vending company Southern Refreshment Services.
"Vending gets such a bad rap all the time as unhealthy. People don't expect to be satisfied, so there's image improvement we need to do," he says.
First came the simple changes such as more granola bars next to candy bars and bottled water next to soft drinks. But — just like in any business — what the consumer buys is what will appear for sale. Aramark, one of the big national players in vending, will fill machines with fresh salads, hard-boiled eggs, carrot sticks, yogurt, cubes of cheese and fresh fruit.
"We understand that people work a lot of hours, and the average lunch today is less than 36 minutes. We have to provide what makes employees happy," says Aramark's Brian Zaslow.
So don't despair if you have to use the vending machines for your lunch. There's much more than soda and chips to choose from.
Jackie Clark, of the National Automatic Merchandising Association says, "Because of technological advances in the machines, we can offer a wider array of products, even machines that cook hot foods like grilled chicken or pasta." NAMA has its own Balanced for Life campaign to help vending companies develop healthier choices.
For example, Aramark launched a Just4U healthy vending program with foods that are lower in fat and calories and beverages that include water or 100 percent fruit juices.
If you want healthier snacks, there's usually a number posted on the vending machine. If not, you'll just have to hope the person stocking the machines will notice that healthy snacks are selling better and will, therefore, increase those options.
Homework rules
How far should you go to control the homework habits of your children? William Stixrud, a Silver Spring, Md., neuropsychologist specializing in child and adolescent learning issues, offers parents this advice:
- Model behavior early. Young children and pre-teens tend to be more receptive to demonstrations of good habits and more willing to abide by parental restrictions. Set clear study rules (no IM'ing, watching TV, listening to music) while studying. Teach kids as soon as they get their first homework assignment that dividing their attention can affect how well they learn.
- Set the environment. It's up to you to see that your children have a quiet place to study, away from distractions and with adequate space for books and papers. It doesn't have to be a separate bedroom — the dining room could suffice — as long as other members of the household are respectful.
- Back off as they get older. There may be no piece of advice that tests parents more than this one. Get used to it. Too much parental oversight and interference can trigger a rebellion in teens. Better to take a deep breath and express confidence in a teen's ability to make positive study choices — even if they don't match yours.
- Engage them. Have an open discussion with your child about study-time distractions and seek his or her perspective on the matter. Parents can help kids test the effects of multitasking on learning by designing a rating scale to measure their level of focus and how much they remember under different study conditions.
- Respect them. There is no one surefire strategy to promote learning. It is important to allow students to figure out what strategies work best for them.
Less boozy booze?
The liquor, beer and wine that Americans drink today is less intoxicating than the alcohol they drank in the 1950s, according to an analysis in Alcoholism: Clinical and Experimental Research.
In 2002 beer was the most-favored alcoholic beverage, making up 60 percent of alcohol consumed. In 1950, 80 percent of liquor sold was in the "whiskey" class (straight, bonded, blended, etc.). In 1950 the alcohol content of wine sold in the United States averaged 16.75 percent; by 2002 that figure was 11.45 percent. In 1950 the alcohol content of beer averaged 5.02 percent; it was 4.65 percent in 2002. The data come from the Alcohol Research Group, a nonprofit funded by the National Institute on Alcohol Abuse and Alcoholism.
L.A. Times correction, Tuesday, Sept. 12, 2006:
FOR THE RECORD
Power plants: An article in the California section Friday about a South Coast Air Quality Management District plan to allow builders of new power plants to buy air pollution credits incorrectly stated that under an open-market credit program normally used by commercial power plants, they would have to pay for the credits annually. In fact, they would have to pay only once.
Fresno Bee editorial, Tuesday, Sept. 12, 2006:
UC Merced goes green
Campus seeks to be a leader in environment-friendly operations.
The University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.
The campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.
he goal is to win the U.S. Green Building Council's "silver standard," a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met. The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.
Buildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.
The commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.
It doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.
It's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.
The University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.
The campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.
The goal is to win the U.S. Green Building Council's "silver standard," a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met.
The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.
Buildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.
The commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.
It doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.
It's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.
Capital Press Ag Weekly Editorial Fri. Sept. 8, 2006:
Clearing air isn't all about global warming
California is leading the nation in legislation to regulate greenhouse gas pollutants, which has some industries in the state - including agriculture - nervous. It could also be a sign of things to come for the rest of the West Coast and the nation.
Some are touting the bill to impose a cap on carbon dioxide and greenhouse gases, and reduce them 25 percent by 2020, as an effort to counter global warming.
Critics, like Alan Caruba, of the Caruba Organization in South Orange, N.J., say it will be bad for business in California and is unnecessary because global warming is not actually happening.
"California is about to commit eco-suicide and wants the rest of the nation to join it," Caruba writes in a Sept. 4 column on AXcessNews.com. "The business and industry that will flee the Golden State is incalculable. The danger of these anti-energy policies to the future of the nation is beyond comprehension."
Caruba goes on to say that the claims, like those made by U.S. Sen. Dianne Feinstein, D-Calif., in an interview with the San Francisco Chronicle, that there is scientific consensus that global warming is happening now is "a very big lie."
Caruba says: "Far from any consensus, there is a growing body of scientific evidence that utterly disputes and debunks the claims made for global warming."
He also says: "There is no need for the control of greenhouse gas emissions."
What Caruba seems to ignore is that California has some serious air quality problems across wide swaths of the state, including the Los Angeles Basin, Inland Empire and San Joaquin Valley and Bay Area.
Even if Caruba and other global warming skeptics are correct, the fact remains that conditions in California are ideal to create smog in California. Abundant sunshine reacts with particles in the air to form smog that gets trapped in the valleys nestled between large mountain ranges.
Global warming or not, California's air is all-too-often unhealthy in far too many parts of the state.
Fortunately for California agriculture and industry, Gov. Arnold Schwarzenegger was able to negotiate some safety valves in the legislation.
It includes a provision for trading emissions credits that will allow producers of greenhouse gases - who are also producers of energy, products and jobs that help fuel the state economy - to continue to do business. That option could also provide a valuable incentive for business to reduce emissions to benefit their companies economically.
Caruba is correct to be concerned that this legislation is just a first successful volley in a fight to pass similar legislation at the federal level. As Caruba noted, Feinstein recently touted a plan to fight global warming with legislation she says she will introduce in the next Congressional session that has similarities to the California legislation.
It would also not be surprising to see other states, like Washington and Oregon, where the climate change mantra is also resonating to follow California's lead to control emissions even further.
California has the political clout, and population numbers, to make automakers pay heed to emissions restrictions on cars that smaller states can't pull off alone.
As to whether the new emission standards will do anything to slow climate change, that's a question still open to debate. But this will clear the air a bit more in smog-prone areas of the state.
|
<urn:uuid:67038ec8-d45b-4b8f-9626-30c8ef984b95>
|
CC-MAIN-2023-50
|
https://valleyair.org/recent_news/News_Clippings/2006/In%20the%20News%2009-12-06.pdf
|
2023-12-04T22:44:34+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-50/subset=warc/part-00013-e565b809-b335-4c1d-90fd-54a9a2b7113d.c000.gz.parquet
| 678,714,834
| 6,846
|
eng_Latn
|
eng_Latn
| 0.998854
|
eng_Latn
| 0.999089
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3213,
6056,
9024,
12713,
15700,
19166,
22719,
26222,
29164,
32227,
33732
] |
School forms asthma program through partnership
By Nadine Stinger, Staff Writer
Kingsburg Recorder Sept. 12, 2006
One in every seven children in California is affected by asthma. With this statistic in mind, Rafer Johnson Junior High has partnered with statewide organizations to raise a flag to promote air quality awareness in its school and community.
In accordance with the American Lung Association of Central California and the San Joaquin Valley Air Pollution Control District, Rafer Johnson and other Valley schools are taking part in the school-based agenda, the Air Quality Flag Program.
Under the program, Rafer Johnson's students search the Internet daily for air conditions, and then hang the colored flag that marks the air quality for that day.
A green flag indicates that the air in the area is expected to be good, and a yellow flag signifies moderate air quality. On a yellow day, children who have severe levels of asthma or other pulmonary conditions are advised to be careful when participating in physical activities outside, especially if they find it hard to breath, start wheezing or feel like they are getting sick.
An orange flag means that the air quality is unhealthy for sensitive groups. Students with asthma and other lung or heart conditions should reduce how long and how hard they play outside. A red flag is a warning sign that air quality is unhealthy for everyone. On such a day, all students' outdoor activities are limited.
Sally Robinson, learning coordinator at Rafer Johnson, spoke highly of the program and the student involvement that it calls for.
"We want our kids, particularly our asthma kids, to get involved and say to themselves, 'You know what, I need to be more careful with how hard I am playing because the air may be bad,'" she said.
According to Robinson, Rafer Johnson has its share of asthmatic students who cannot part with their inhalers, and the school is trying to do something to make life easier for these medically atrisk students.
Eighth-grade student Whitney Snider, who has asthma and keeps an inhaler in the school's office, said she is excited about the program.
"It's good because now I'll see the flag and know when the air is unhealthy, and I can stay inside," she said.
Whitney said she does not have a severe case of asthma, but she gets short of breath when the air quality is bad and when she plays really hard at physical education.
Robinson stressed the importance of teaching students about air quality and air pollution, especially since we live here in the Central Valley.
Informational posters on air quality are placed in every classroom, and teachers will talk to their students about the impact of air pollution on health, teach them preventive methods and remind them to pay attention to the flags. Under the program, teachers attended a workshop. The idea is that these teachers will educate their students on the things they learned.
But the program is not geared only toward educating the students. Parent involvement and awareness are pivotal, Robinson said. Parents and guardians will receive a detailed packet explaining the program, its goals and parent participation. The American Lung Association of
Central California also provides parent group training in English and Spanish. Other district schools are getting ready for the program that Rafer Johnson started last week.
For more information on the program or to set up parent group training call 800-LUNG-USA.
Today is 11th Spare the Air Day of season
Michael Cabanatuan, staff writer
S.F. Chronicle, Tuesday, September 12, 2006
Bay Area air quality officials have called a Spare the Air Day for today -- the 11th of the season.
With meteorologists forecasting unhealthy air, particularly in the area stretching from Concord to Livermore, the air district is urging commuters to take public transportation. Cars are the biggest source of ground-level ozone, or smog.
Air quality officials also urge people to postpone painting, staining, disinfecting or working in the yard with gasoline-powered equipment, to curtail the use of aerosol products and to refuel cars after dusk.
But commuters will have to pay for their rides, because the free-transit program covered only the first six Spare the Air Days.
Tuesday is a Spare-the-Air Day (but no free rides)
Tri-Valley Herald, Tuesday, Sept. 12, 2006
Rising temperatures and expected unhealthy smog levels prompted the Bay Area Air Quality Management District to declare Tuesday a Spare the Air Day, urging residents to take transit to work and avoid using polluting equipment and chemicals.
Tuesday will be the summer's 11th such day, and unlike the first six days, will not involve free transit rides. The budget for free bus, rail and ferry rides ran out on July 21.
The warmer temperatures, combined with stagnant air, are expected to foster the creation of ground-level ozone from auto exhaust and other pollutants, such as the volatile organic compounds commonly found in paints, household cleaners and hair spray. Air officials also urge residents to avoid yard work with gasoline-powered equipment, especially during morning hours.
Supervisors weigh air pollution fee proposal
Dana M. Nichols
Stockton Record, Tuesday, Sept. 12, 2006
SAN ANDREAS - Calaveras County supervisors are divided over whether to continue a taxpayer subsidy to farmers and other large property owners who cause air pollution by burning brush and other plant debris.
The county-run Air Pollution Control District spends about $19,500 a year to monitor and regulate smoke pollution from about 1,600 properties larger than 5 acres. County staffers are proposing to charge the owners of each of those properties a $12 annual fee to cover the cost of tracking the smoke and timing burns to minimize the impact on residents.
But county supervisors holding a study session on the matter Monday failed to give a clear signal on whether they want to end the subsidy. Supervisors Victoria Erickson and Tom Tryon said they oppose the proposed fee.
Supervisors Merita Callaway and Bill Claudino said they would support the fee.
Supervisor Steve Wilensky said he would not take a public position on the matter until he was able to consult with the county's legal counsel.
Wilensky, who operates an apple orchard, said he applies for the burn permits himself and therefore might have a conflict of interest should he weigh in on the matter.
Tryon, the other member of the board who earns his living through agriculture, running a ranch near Angels Camp, offered no explanation for his opposition to the fee and did not express any concern that he might have a conflict of interest on the issue.
The Calaveras County Farm Bureau opposed the proposed fee.
"I know $12 is not a lot to argue over, but it's another fee," said Steve Kafka, president of the bureau and a forester with Sierra Pacific Industries. Kafka said he also fears that a new fee would discourage property owners from acting to reduce fire hazards.
Brian Moss, director of the county's Environmental Management Agency, said he sympathized with agriculture's need to control costs but said it doesn't make sense to give some property owners a break on air pollution control costs while charging others.
Many of those who would pay the fee live on rural lots larger than 5 acres but do not actively farm or raise cattle.
Callaway asked whether charging all property owners a $12 fee accurately reflected the cost of scheduling the burns and monitoring the pollution on different sizes of property.
Lakhmir Grewal, head of the Calaveras County Air Pollution Control District, said some very large burns to reduce the fuel load in forests, commonly known as controlled burns, are much more expensive for the district to plan and monitor.
He said that is because such controlled burns require detailed plans to prevent damage to human health and to manage the fire, and the district must review those plans. "Some of those permits are costing thousands of dollars" in district staff time, he said.
He said some counties charge air pollution fees of more than $1,000 for property owners who do large controlled burns.
The proposal Grewal and Moss brought to supervisors, however, would charge a flat $12 whether a property owner simply burned brush piles near a home on a 10-acre lot or needed to do a 300acre controlled burn on forestland.
Wilensky asked Grewal and Moss if they thought imposing a fee might simply drive some property owners to go ahead and burn without getting the required air pollution permit.
Moss said no. He said property owners already drive to the district office to get the required free permits, and the inconvenience of driving to the office is a greater barrier than a $12 fee. Also, he noted that people who burn illegally without a permit can pay substantial penalties.
Grewal said that recently a farmer had been fined $1,000 for an illegal orchard burn, and a developer been fined $5,000 for an illegal burn.
Legislation affecting business
By Jake Henshaw
Visalia Times-Delta, Monday, Sept. 11, 2006
They still had hopes of passing a few modest bills in August in the Capitol, but for the most part California businesses are playing defense as the Legislature wraps up its work for the year.
They are trying to defeat proposals to increase the minimum wage, impose emission caps to control global warming, boost benefits for permanently disabled workers and force big businesses to provide health care for its employees.
"As usual, at the end of the session, it comes down to that," Vince Sollitto, spokesman for the California Chamber of Commerce, said of the effort to defeat measures that businesses fear will hurt job creation and competitiveness.
Michael Shaw, assistant state director for the National Federation of Independent Business, said his group is pushing a couple of bills to aid small businesses by requiring a state study of the cost of regulations on them and setting up a state Web site linking state agencies that regulate them.
Businesses appear to have already lost battles to reinstitute a tax credit for the purchase of manufacturing equipment and the four-day workweek for interested workers without overtime pay. They now face a tough battle against any minimum wage increase because the governor supports a $1 boost while Democrats and unions generally agree with the governor but also want automatic future increases indexed to inflation.
Democrats also are pushing for revisions for workers' compensation. Changes have cut premiums 50 percent, but injured workers claim it also has cut benefits for permanently disabled workers 50 percent. The bill is still being finalized.
The Legislature was scheduled to end its regular session for the year Aug. 31.
Bills favored by business
* AB2330, Assemblyman Juan Arambula, D-Fresno: Requires the state to study the cost of regulations on small businesses.
* SB1436, Sen. Liz Figueroa, D-Sunol: Directs the state to set up an Internet link to all state agencies that have a significant role in regulating small businesses.
Bills opposed by business
* AB1835, Assemblywoman Sally Lieber, D-Mountain View: Increases increase the minimum wage from the current $6.75 to $7.75 in two steps over two years. It then would automatically provide for future increases indexed to the rate of inflation.
* SB1162, Sen. Gil Cedillo, D-Los Angeles: Increases the minimum wage from the current $6.75 to $7.75 in two steps. The initial increase would come within 60 days of the bill being signed, versus AB 1835, which authorizes the first step on July 1, 2007. Future increases also would be indexed to the rate of inflation.
Air quality
* AB32, Assembly Speaker Fabian Nunez, D-Los Angeles and Assemblywoman Fran Pavley, DAgoura Hills: Requires state officials to set a cap on greenhouse gas emissions and monitor their prevalence.
* SB1205, Sen. Martha Escutia, D-Whittier: Increases penalties for pollution from sources other than motor vehicles from $1,000 to a range of $10,000 up to $100,000 with the fines deposited in a new Children's Breathing Rights Fund, for which uses would be established later.
* AB1101, Assemblywoman Jenny Oropeza, D-Long Beach: Gives ports, airports and rail yards that attract large numbers of diesel-powered vehicles the power to reduce diesel emissions.
* SB1252, Sen. Dean Florez, D-Shafter: Authorizes a penalty of up to $25,000, in addition to other existing penalties, for emissions of particulates that violate federal air quality standards.
* SB1368, Senate leader Don Perata, D-Oakland: Establishes a greenhouse gas emissions performance standard for public and private utilities.
Resources
* SB 646, Sen. Sheila Kuehl, D-Santa Monica: Tightens up the procedures for farm and timber companies to get waivers from the operating rules for discharging into public water, which include obtaining permits. The bill also would impose a fee for waivers.
* AB 2641, Assemblyman Joe Coto, D-San Jose: Requires developers who discover Indian burial grounds to consult with likely tribal descendants regarding appropriate preservation.
Health
* SB1379, Senate leader Don Perata, D-Oakland, and Sen. Deborah Ortiz, D-Sacramento: Creates the nation's first biomonitoring program to assess chemical contamination of the general public to aid public health planning.
* SB1414, Sen. Carole Migden, D-San Francisco: Requires companies with 10,000 or more workers to spend an amount equal to 8 percent of their payroll on health insurance or pay that amount to Medi-Cal.
Legal issues
* SB1489, Sen. Denise Ducheny, D-San Diego: Authorizes the California attorney general to recover attorneys' fees and costs when he wins cases enforcing laws on such issues as the environment, civil rights, consumer fraud, corporate responsibility and gambling with the goal of making such actions self-funding.
* SB1737, Sen. Liz Figueroa, D-Sunol: Sets timelines and other rules for consumer rebates.
Report links global warming, storms
Keay Davidson, Chronicle Science Writer S.F. Chronicle, Tuesday, September 12, 2006
Scientists say they have found what could be the key to ending a yearlong debate about what is making hurricanes more violent and common -- evidence that human-caused global warming is heating the ocean and providing more fuel for the world's deadliest storms.
For the past 13 months, researchers have debated whether humanity is to blame for a surge in hurricanes since the mid-1990s or whether the increased activity is merely a natural cycle that occurs every several decades.
Employing 80 computer simulations, scientists from Lawrence Livermore National Laboratory and other institutions concluded that there is only one answer: that the burning of fossil fuels, which warms the climate, is also heating the oceans.
Humans, Ben Santer, the report's lead author, told The Chronicle, are making hurricanes globally more violent "and violent hurricanes more common" -- at least, in the latter case, in the northern Atlantic Ocean. The findings were published Monday in the latest issue of the Proceedings of the National Academy of Sciences.
Hurricanes are born from tropical storms fueled by rising warm, moist air in the tropics. The Earth's rotation puts a spin on the storms, causing them to suck in more and more warm, moist air -- thus making them bigger and more ferocious.
In that regard, the report says, since 1906, sea-surface temperatures have warmed by between one-third and two-thirds of a degree Celsius -- or between 0.6 and 1.2 degrees Fahrenheit -- in the tropical parts of the Atlantic and Pacific oceans, which are hurricane breeding grounds.
Critics of the theory that greenhouse gases are making hurricanes worse remained unconvinced by the latest research.
Chris Landsea, a top hurricane expert, praised the Proceedings paper as a worthwhile contribution to science, but said the authors failed to persuasively counter earlier objections -that warmer seas would have negligible impact on hurricane activity.
Landsea, science and operations officer at the U.S. National Hurricane Center in Miami, noted that modern satellite observations have made hurricanes easier to detect and analyze, and that could foster the impression of long-term trends in hurricane frequency or violence that are, in fact, illusory. The surge in hurricane activity since the mid-1990s is just the latest wave in repeating cycles of hurricane activity, he said.
Philip Klotzbach, a hurricane forecaster at Colorado State University, said that "sea-surface temperatures have certainly warmed over the past century, and ... there is probably a humaninduced (global warming) component." But his own research indicates "there has been very little change in global hurricane activity over the past 20 years, where the data is most reliable."
Researchers report in the Proceedings paper an 84 percent chance that at least two-thirds of the rise in ocean temperatures in these so-called hurricane breeding grounds is caused by human activities -- and primarily by the production of greenhouse gases.
Tom Wigley, one of the world's top climate modelers and a co-author of the paper, said in a teleconference last week that the scientists tried to figure out what caused the oceans to warm by running many different computer models based on possible single causes. Those causes ranged from human production of greenhouse gases to natural variations in solar intensity.
Wigley said that when the researchers reviewed the results, they found that only one model was best able to explain changing ocean temperatures, and it pointed to greenhouse gases in the atmosphere. The most infamous greenhouse gas is carbon dioxide, a product of human burning of fossil fuels in cars and factories.
Wigley estimated the odds as smaller than 1 percent that ocean warming could be blamed on random fluctuations in hurricane activity, as some scientists suggest.
The debate among scientists was triggered in August 2005, a few weeks before Hurricane Katrina struck New Orleans, when hurricane expert Kerry Emanuel of MIT wrote an article for the journal Nature proposing that since the 1970s, ocean warming had made hurricanes about 50 percent more intense in the Atlantic and Pacific oceans.
Later, two scientific teams, both at Georgia Tech, estimated that warmer sea-surface temperatures were boosting both hurricane intensity and the number of the two worst types of hurricanes, known as Category 4 and Category 5 storms.
Nineteen scientists from 10 institutions were involved in the Proceedings paper. In addition to Lawrence Livermore, other U.S. institutions included Lawrence Berkeley National Laboratory, the National Center for Atmospheric Research, NASA, UC Merced, Scripps Institution of Oceanography in La Jolla (San Diego County), and the National Oceanic and Atmospheric Administration.
Santer's co-authors included six Livermore colleagues -- Peter J. Gleckler, Krishna AchutaRao, Jim Boyle, Mike Fiorino, Steve Klein and Karl Taylor -- and 12 other researchers from elsewhere in the United States and from Germany and England.
Assuming that warmer water equals more bad hurricanes, scary times could be ahead for inhabitants of hurricane-prone regions.
That's because "the models that we've used to understand the causes of (ocean warming) in these hurricane formation regions predict that the oceans are going to get a lot warmer over the 21st century," Santer said in a statement. "That causes some concern."
How hurricanes form in the Atlantic Ocean
Hurricanes are born in far western Africa, where modest windstorms known as tropical disturbances pick up moisture from the warm sea and begin to whirl. As atmospheric pressures drop, tropical depressions form with wind speeds up to 38 mph. As they speed westward they become tropical storms, lashing the ocean with sheets of rain and winds blowing up to 70 mph or more, finally building into hurricanes with winds exceeding 100 mph. -- Tropical disturbance -Tropical depression -- Tropical storm -- Hurricane Source: NOAA, The New York Times Joe Shoulak / The Chronicle
Dogs may aggravate the symptoms of asthmatic children
Tri-Valley Herald, Sunday, Sept. 10, 2006
THE shedding and chewing of shoes may be the least of the family dog's transgressions.
Asthmatic children who lived with dogs coughed more, produced more phlegm and had more bronchial responses to air pollutants than those with no pets, or those who lived only with cats, according to research that appeared last week in Environmental Health Perspectives.
Dr. Rob McConnell, a professor of preventive medicine at the Keck School of Medicine of the University of Southern California and the study's lead author, speculated that the increased asthmatic response of children with dogs is due to higher levels of endotoxin — a part of the cell wall of certain bacteria commonly found in dirt. Endotoxins are known to produce inflammation of the lungs and can be tracked in by dogs from outside.
But McConnell cautioned that there might be other explanations for the study's findings. Children with dogs, for example, might be more likely to play outside and thus be more exposed to air pollution. "It may have nothing to do with the dog," he said.
So don't take any hasty, pet-related actions.
"I think that if a child has asthma, they should have a pediatrician with a knowledge of asthma following them," he said. "Any decision should be based on a case-by-case basis."
Healthy vending (really)
You've worked through lunch again because the phone won't stop ringing, the e-mails won't stop flying and your major report has to be done today.
The next thing you know you're staring at a bank of vending machines to find something quick to eat. This situation, or others where the only option is a meal from a machine, doesn't have to be a sad scenario. But it depends on the selection available when playing this version of "the slots."
Vending machines aren't exactly synonymous with fine food or good nutrition, but the overall bad rap isn't fair, says Alan Plaisted of Atlanta-based vending company Southern Refreshment Services.
"Vending gets such a bad rap all the time as unhealthy. People don't expect to be satisfied, so there's image improvement we need to do," he says.
First came the simple changes such as more granola bars next to candy bars and bottled water next to soft drinks. But — just like in any business — what the consumer buys is what will appear for sale. Aramark, one of the big national players in vending, will fill machines with fresh salads, hard-boiled eggs, carrot sticks, yogurt, cubes of cheese and fresh fruit.
"We understand that people work a lot of hours, and the average lunch today is less than 36 minutes. We have to provide what makes employees happy," says Aramark's Brian Zaslow.
So don't despair if you have to use the vending machines for your lunch. There's much more than soda and chips to choose from.
Jackie Clark, of the National Automatic Merchandising Association says, "Because of technological advances in the machines, we can offer a wider array of products, even machines that cook hot foods like grilled chicken or pasta." NAMA has its own Balanced for Life campaign to help vending companies develop healthier choices.
For example, Aramark launched a Just4U healthy vending program with foods that are lower in fat and calories and beverages that include water or 100 percent fruit juices.
If you want healthier snacks, there's usually a number posted on the vending machine. If not, you'll just have to hope the person stocking the machines will notice that healthy snacks are selling better and will, therefore, increase those options.
Homework rules
How far should you go to control the homework habits of your children? William Stixrud, a Silver Spring, Md., neuropsychologist specializing in child and adolescent learning issues, offers parents this advice:
- Model behavior early. Young children and pre-teens tend to be more receptive to demonstrations of good habits and more willing to abide by parental restrictions. Set clear study rules (no IM'ing, watching TV, listening to music) while studying. Teach kids as soon as they get their first homework assignment that dividing their attention can affect how well they learn.
- Set the environment. It's up to you to see that your children have a quiet place to study, away from distractions and with adequate space for books and papers. It doesn't have to be a separate bedroom — the dining room could suffice — as long as other members of the household are respectful.
- Back off as they get older. There may be no piece of advice that tests parents more than this one. Get used to it. Too much parental oversight and interference can trigger a rebellion in teens. Better to take a deep breath and express confidence in a teen's ability to make positive study choices — even if they don't match yours.
- Engage them. Have an open discussion with your child about study-time distractions and seek his or her perspective on the matter. Parents can help kids test the effects of multitasking on learning by designing a rating scale to measure their level of focus and how much they remember under different study conditions.
- Respect them. There is no one surefire strategy to promote learning. It is important to allow students to figure out what strategies work best for them.
Less boozy booze?
The liquor, beer and wine that Americans drink today is less intoxicating than the alcohol they drank in the 1950s, according to an analysis in Alcoholism: Clinical and Experimental Research.
In 2002 beer was the most-favored alcoholic beverage, making up 60 percent of alcohol consumed. In 1950, 80 percent of liquor sold was in the "whiskey" class (straight, bonded, blended, etc.). In 1950 the alcohol content of wine sold in the United States averaged 16.75 percent; by 2002 that figure was 11.45 percent. In 1950 the alcohol content of beer averaged 5.02 percent; it was 4.65 percent in 2002. The data come from the Alcohol Research Group, a nonprofit funded by the National Institute on Alcohol Abuse and Alcoholism.
L.A. Times correction, Tuesday, Sept. 12, 2006:
FOR THE RECORD
Power plants: An article in the California section Friday about a South Coast Air Quality Management District plan to allow builders of new power plants to buy air pollution credits incorrectly stated that under an open-market credit program normally used by commercial power plants, they would have to pay for the credits annually. In fact, they would have to pay only once.
Fresno Bee editorial, Tuesday, Sept. 12, 2006:
UC Merced goes green
Campus seeks to be a leader in environment-friendly operations.
The University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.
The campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.
he goal is to win the U.S. Green Building Council's "silver standard," a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met. The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.
Buildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.
The commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.
It doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.
It's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.
The University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.
The campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.
The goal is to win the U.S. Green Building Council's "silver standard," a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met.
The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.
Buildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.
The commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.
It doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.
It's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.
Capital Press Ag Weekly Editorial Fri. Sept. 8, 2006:
Clearing air isn't all about global warming
California is leading the nation in legislation to regulate greenhouse gas pollutants, which has some industries in the state - including agriculture - nervous. It could also be a sign of things to come for the rest of the West Coast and the nation.
Some are touting the bill to impose a cap on carbon dioxide and greenhouse gases, and reduce them 25 percent by 2020, as an effort to counter global warming.
Critics, like Alan Caruba, of the Caruba Organization in South Orange, N.J., say it will be bad for business in California and is unnecessary because global warming is not actually happening.
"California is about to commit eco-suicide and wants the rest of the nation to join it," Caruba writes in a Sept. 4 column on AXcessNews.com. "The business and industry that will flee the Golden State is incalculable. The danger of these anti-energy policies to the future of the nation is beyond comprehension."
Caruba goes on to say that the claims, like those made by U.S. Sen. Dianne Feinstein, D-Calif., in an interview with the San Francisco Chronicle, that there is scientific consensus that global warming is happening now is "a very big lie."
Caruba says: "Far from any consensus, there is a growing body of scientific evidence that utterly disputes and debunks the claims made for global warming."
He also says: "There is no need for the control of greenhouse gas emissions."
What Caruba seems to ignore is that California has some serious air quality problems across wide swaths of the state, including the Los Angeles Basin, Inland Empire and San Joaquin Valley and Bay Area.
Even if Caruba and other global warming skeptics are correct, the fact remains that conditions in California are ideal to create smog in California. Abundant sunshine reacts with particles in the air to form smog that gets trapped in the valleys nestled between large mountain ranges.
Global warming or not, California's air is all-too-often unhealthy in far too many parts of the state.
Fortunately for California agriculture and industry, Gov. Arnold Schwarzenegger was able to negotiate some safety valves in the legislation.
It includes
|
a provision for trading emissions credits that will allow producers of greenhouse gases - who are also producers of energy, products and jobs that help fuel the state economy - to continue to do business.
|
That option could also provide a valuable incentive for business to reduce emissions to benefit their companies economically.
Caruba is correct to be concerned that this legislation is just a first successful volley in a fight to pass similar legislation at the federal level. As Caruba noted, Feinstein recently touted a plan to fight global warming with legislation she says she will introduce in the next Congressional session that has similarities to the California legislation.
It would also not be surprising to see other states, like Washington and Oregon, where the climate change mantra is also resonating to follow California's lead to control emissions even further.
California has the political clout, and population numbers, to make automakers pay heed to emissions restrictions on cars that smaller states can't pull off alone.
As to whether the new emission standards will do anything to slow climate change, that's a question still open to debate. But this will clear the air a bit more in smog-prone areas of the state.
| 32,487
|
inside_word
|
a
|
remove_one_sentence
|
<url>
https://valleyair.org/recent_news/News_Clippings/2006/In%20the%20News%2009-12-06.pdf
</url>
<text>
School forms asthma program through partnership
By Nadine Stinger, Staff Writer
Kingsburg Recorder Sept. 12, 2006
One in every seven children in California is affected by asthma. With this statistic in mind, Rafer Johnson Junior High has partnered with statewide organizations to raise a flag to promote air quality awareness in its school and community.
In accordance with the American Lung Association of Central California and the San Joaquin Valley Air Pollution Control District, Rafer Johnson and other Valley schools are taking part in the school-based agenda, the Air Quality Flag Program.
Under the program, Rafer Johnson's students search the Internet daily for air conditions, and then hang the colored flag that marks the air quality for that day.
A green flag indicates that the air in the area is expected to be good, and a yellow flag signifies moderate air quality. On a yellow day, children who have severe levels of asthma or other pulmonary conditions are advised to be careful when participating in physical activities outside, especially if they find it hard to breath, start wheezing or feel like they are getting sick.
An orange flag means that the air quality is unhealthy for sensitive groups. Students with asthma and other lung or heart conditions should reduce how long and how hard they play outside. A red flag is a warning sign that air quality is unhealthy for everyone. On such a day, all students' outdoor activities are limited.
Sally Robinson, learning coordinator at Rafer Johnson, spoke highly of the program and the student involvement that it calls for.
"We want our kids, particularly our asthma kids, to get involved and say to themselves, 'You know what, I need to be more careful with how hard I am playing because the air may be bad,'" she said.
According to Robinson, Rafer Johnson has its share of asthmatic students who cannot part with their inhalers, and the school is trying to do something to make life easier for these medically atrisk students.
Eighth-grade student Whitney Snider, who has asthma and keeps an inhaler in the school's office, said she is excited about the program.
"It's good because now I'll see the flag and know when the air is unhealthy, and I can stay inside," she said.
Whitney said she does not have a severe case of asthma, but she gets short of breath when the air quality is bad and when she plays really hard at physical education.
Robinson stressed the importance of teaching students about air quality and air pollution, especially since we live here in the Central Valley.
Informational posters on air quality are placed in every classroom, and teachers will talk to their students about the impact of air pollution on health, teach them preventive methods and remind them to pay attention to the flags. Under the program, teachers attended a workshop. The idea is that these teachers will educate their students on the things they learned.
But the program is not geared only toward educating the students. Parent involvement and awareness are pivotal, Robinson said. Parents and guardians will receive a detailed packet explaining the program, its goals and parent participation. The American Lung Association of
Central California also provides parent group training in English and Spanish. Other district schools are getting ready for the program that Rafer Johnson started last week.
For more information on the program or to set up parent group training call 800-LUNG-USA.
Today is 11th Spare the Air Day of season
Michael Cabanatuan, staff writer
S.F. Chronicle, Tuesday, September 12, 2006
Bay Area air quality officials have called a Spare the Air Day for today -- the 11th of the season.
With meteorologists forecasting unhealthy air, particularly in the area stretching from Concord to Livermore, the air district is urging commuters to take public transportation. Cars are the biggest source of ground-level ozone, or smog.
Air quality officials also urge people to postpone painting, staining, disinfecting or working in the yard with gasoline-powered equipment, to curtail the use of aerosol products and to refuel cars after dusk.
But commuters will have to pay for their rides, because the free-transit program covered only the first six Spare the Air Days.
Tuesday is a Spare-the-Air Day (but no free rides)
Tri-Valley Herald, Tuesday, Sept. 12, 2006
Rising temperatures and expected unhealthy smog levels prompted the Bay Area Air Quality Management District to declare Tuesday a Spare the Air Day, urging residents to take transit to work and avoid using polluting equipment and chemicals.
Tuesday will be the summer's 11th such day, and unlike the first six days, will not involve free transit rides. The budget for free bus, rail and ferry rides ran out on July 21.
The warmer temperatures, combined with stagnant air, are expected to foster the creation of ground-level ozone from auto exhaust and other pollutants, such as the volatile organic compounds commonly found in paints, household cleaners and hair spray. Air officials also urge residents to avoid yard work with gasoline-powered equipment, especially during morning hours.
Supervisors weigh air pollution fee proposal
Dana M. Nichols
Stockton Record, Tuesday, Sept. 12, 2006
SAN ANDREAS - Calaveras County supervisors are divided over whether to continue a taxpayer subsidy to farmers and other large property owners who cause air pollution by burning brush and other plant debris.
The county-run Air Pollution Control District spends about $19,500 a year to monitor and regulate smoke pollution from about 1,600 properties larger than 5 acres. County staffers are proposing to charge the owners of each of those properties a $12 annual fee to cover the cost of tracking the smoke and timing burns to minimize the impact on residents.
But county supervisors holding a study session on the matter Monday failed to give a clear signal on whether they want to end the subsidy. Supervisors Victoria Erickson and Tom Tryon said they oppose the proposed fee.
Supervisors Merita Callaway and Bill Claudino said they would support the fee.
Supervisor Steve Wilensky said he would not take a public position on the matter until he was able to consult with the county's legal counsel.
Wilensky, who operates an apple orchard, said he applies for the burn permits himself and therefore might have a conflict of interest should he weigh in on the matter.
Tryon, the other member of the board who earns his living through agriculture, running a ranch near Angels Camp, offered no explanation for his opposition to the fee and did not express any concern that he might have a conflict of interest on the issue.
The Calaveras County Farm Bureau opposed the proposed fee.
"I know $12 is not a lot to argue over, but it's another fee," said Steve Kafka, president of the bureau and a forester with Sierra Pacific Industries. Kafka said he also fears that a new fee would discourage property owners from acting to reduce fire hazards.
Brian Moss, director of the county's Environmental Management Agency, said he sympathized with agriculture's need to control costs but said it doesn't make sense to give some property owners a break on air pollution control costs while charging others.
Many of those who would pay the fee live on rural lots larger than 5 acres but do not actively farm or raise cattle.
Callaway asked whether charging all property owners a $12 fee accurately reflected the cost of scheduling the burns and monitoring the pollution on different sizes of property.
Lakhmir Grewal, head of the Calaveras County Air Pollution Control District, said some very large burns to reduce the fuel load in forests, commonly known as controlled burns, are much more expensive for the district to plan and monitor.
He said that is because such controlled burns require detailed plans to prevent damage to human health and to manage the fire, and the district must review those plans. "Some of those permits are costing thousands of dollars" in district staff time, he said.
He said some counties charge air pollution fees of more than $1,000 for property owners who do large controlled burns.
The proposal Grewal and Moss brought to supervisors, however, would charge a flat $12 whether a property owner simply burned brush piles near a home on a 10-acre lot or needed to do a 300acre controlled burn on forestland.
Wilensky asked Grewal and Moss if they thought imposing a fee might simply drive some property owners to go ahead and burn without getting the required air pollution permit.
Moss said no. He said property owners already drive to the district office to get the required free permits, and the inconvenience of driving to the office is a greater barrier than a $12 fee. Also, he noted that people who burn illegally without a permit can pay substantial penalties.
Grewal said that recently a farmer had been fined $1,000 for an illegal orchard burn, and a developer been fined $5,000 for an illegal burn.
Legislation affecting business
By Jake Henshaw
Visalia Times-Delta, Monday, Sept. 11, 2006
They still had hopes of passing a few modest bills in August in the Capitol, but for the most part California businesses are playing defense as the Legislature wraps up its work for the year.
They are trying to defeat proposals to increase the minimum wage, impose emission caps to control global warming, boost benefits for permanently disabled workers and force big businesses to provide health care for its employees.
"As usual, at the end of the session, it comes down to that," Vince Sollitto, spokesman for the California Chamber of Commerce, said of the effort to defeat measures that businesses fear will hurt job creation and competitiveness.
Michael Shaw, assistant state director for the National Federation of Independent Business, said his group is pushing a couple of bills to aid small businesses by requiring a state study of the cost of regulations on them and setting up a state Web site linking state agencies that regulate them.
Businesses appear to have already lost battles to reinstitute a tax credit for the purchase of manufacturing equipment and the four-day workweek for interested workers without overtime pay. They now face a tough battle against any minimum wage increase because the governor supports a $1 boost while Democrats and unions generally agree with the governor but also want automatic future increases indexed to inflation.
Democrats also are pushing for revisions for workers' compensation. Changes have cut premiums 50 percent, but injured workers claim it also has cut benefits for permanently disabled workers 50 percent. The bill is still being finalized.
The Legislature was scheduled to end its regular session for the year Aug. 31.
Bills favored by business
* AB2330, Assemblyman Juan Arambula, D-Fresno: Requires the state to study the cost of regulations on small businesses.
* SB1436, Sen. Liz Figueroa, D-Sunol: Directs the state to set up an Internet link to all state agencies that have a significant role in regulating small businesses.
Bills opposed by business
* AB1835, Assemblywoman Sally Lieber, D-Mountain View: Increases increase the minimum wage from the current $6.75 to $7.75 in two steps over two years. It then would automatically provide for future increases indexed to the rate of inflation.
* SB1162, Sen. Gil Cedillo, D-Los Angeles: Increases the minimum wage from the current $6.75 to $7.75 in two steps. The initial increase would come within 60 days of the bill being signed, versus AB 1835, which authorizes the first step on July 1, 2007. Future increases also would be indexed to the rate of inflation.
Air quality
* AB32, Assembly Speaker Fabian Nunez, D-Los Angeles and Assemblywoman Fran Pavley, DAgoura Hills: Requires state officials to set a cap on greenhouse gas emissions and monitor their prevalence.
* SB1205, Sen. Martha Escutia, D-Whittier: Increases penalties for pollution from sources other than motor vehicles from $1,000 to a range of $10,000 up to $100,000 with the fines deposited in a new Children's Breathing Rights Fund, for which uses would be established later.
* AB1101, Assemblywoman Jenny Oropeza, D-Long Beach: Gives ports, airports and rail yards that attract large numbers of diesel-powered vehicles the power to reduce diesel emissions.
* SB1252, Sen. Dean Florez, D-Shafter: Authorizes a penalty of up to $25,000, in addition to other existing penalties, for emissions of particulates that violate federal air quality standards.
* SB1368, Senate leader Don Perata, D-Oakland: Establishes a greenhouse gas emissions performance standard for public and private utilities.
Resources
* SB 646, Sen. Sheila Kuehl, D-Santa Monica: Tightens up the procedures for farm and timber companies to get waivers from the operating rules for discharging into public water, which include obtaining permits. The bill also would impose a fee for waivers.
* AB 2641, Assemblyman Joe Coto, D-San Jose: Requires developers who discover Indian burial grounds to consult with likely tribal descendants regarding appropriate preservation.
Health
* SB1379, Senate leader Don Perata, D-Oakland, and Sen. Deborah Ortiz, D-Sacramento: Creates the nation's first biomonitoring program to assess chemical contamination of the general public to aid public health planning.
* SB1414, Sen. Carole Migden, D-San Francisco: Requires companies with 10,000 or more workers to spend an amount equal to 8 percent of their payroll on health insurance or pay that amount to Medi-Cal.
Legal issues
* SB1489, Sen. Denise Ducheny, D-San Diego: Authorizes the California attorney general to recover attorneys' fees and costs when he wins cases enforcing laws on such issues as the environment, civil rights, consumer fraud, corporate responsibility and gambling with the goal of making such actions self-funding.
* SB1737, Sen. Liz Figueroa, D-Sunol: Sets timelines and other rules for consumer rebates.
Report links global warming, storms
Keay Davidson, Chronicle Science Writer S.F. Chronicle, Tuesday, September 12, 2006
Scientists say they have found what could be the key to ending a yearlong debate about what is making hurricanes more violent and common -- evidence that human-caused global warming is heating the ocean and providing more fuel for the world's deadliest storms.
For the past 13 months, researchers have debated whether humanity is to blame for a surge in hurricanes since the mid-1990s or whether the increased activity is merely a natural cycle that occurs every several decades.
Employing 80 computer simulations, scientists from Lawrence Livermore National Laboratory and other institutions concluded that there is only one answer: that the burning of fossil fuels, which warms the climate, is also heating the oceans.
Humans, Ben Santer, the report's lead author, told The Chronicle, are making hurricanes globally more violent "and violent hurricanes more common" -- at least, in the latter case, in the northern Atlantic Ocean. The findings were published Monday in the latest issue of the Proceedings of the National Academy of Sciences.
Hurricanes are born from tropical storms fueled by rising warm, moist air in the tropics. The Earth's rotation puts a spin on the storms, causing them to suck in more and more warm, moist air -- thus making them bigger and more ferocious.
In that regard, the report says, since 1906, sea-surface temperatures have warmed by between one-third and two-thirds of a degree Celsius -- or between 0.6 and 1.2 degrees Fahrenheit -- in the tropical parts of the Atlantic and Pacific oceans, which are hurricane breeding grounds.
Critics of the theory that greenhouse gases are making hurricanes worse remained unconvinced by the latest research.
Chris Landsea, a top hurricane expert, praised the Proceedings paper as a worthwhile contribution to science, but said the authors failed to persuasively counter earlier objections -that warmer seas would have negligible impact on hurricane activity.
Landsea, science and operations officer at the U.S. National Hurricane Center in Miami, noted that modern satellite observations have made hurricanes easier to detect and analyze, and that could foster the impression of long-term trends in hurricane frequency or violence that are, in fact, illusory. The surge in hurricane activity since the mid-1990s is just the latest wave in repeating cycles of hurricane activity, he said.
Philip Klotzbach, a hurricane forecaster at Colorado State University, said that "sea-surface temperatures have certainly warmed over the past century, and ... there is probably a humaninduced (global warming) component." But his own research indicates "there has been very little change in global hurricane activity over the past 20 years, where the data is most reliable."
Researchers report in the Proceedings paper an 84 percent chance that at least two-thirds of the rise in ocean temperatures in these so-called hurricane breeding grounds is caused by human activities -- and primarily by the production of greenhouse gases.
Tom Wigley, one of the world's top climate modelers and a co-author of the paper, said in a teleconference last week that the scientists tried to figure out what caused the oceans to warm by running many different computer models based on possible single causes. Those causes ranged from human production of greenhouse gases to natural variations in solar intensity.
Wigley said that when the researchers reviewed the results, they found that only one model was best able to explain changing ocean temperatures, and it pointed to greenhouse gases in the atmosphere. The most infamous greenhouse gas is carbon dioxide, a product of human burning of fossil fuels in cars and factories.
Wigley estimated the odds as smaller than 1 percent that ocean warming could be blamed on random fluctuations in hurricane activity, as some scientists suggest.
The debate among scientists was triggered in August 2005, a few weeks before Hurricane Katrina struck New Orleans, when hurricane expert Kerry Emanuel of MIT wrote an article for the journal Nature proposing that since the 1970s, ocean warming had made hurricanes about 50 percent more intense in the Atlantic and Pacific oceans.
Later, two scientific teams, both at Georgia Tech, estimated that warmer sea-surface temperatures were boosting both hurricane intensity and the number of the two worst types of hurricanes, known as Category 4 and Category 5 storms.
Nineteen scientists from 10 institutions were involved in the Proceedings paper. In addition to Lawrence Livermore, other U.S. institutions included Lawrence Berkeley National Laboratory, the National Center for Atmospheric Research, NASA, UC Merced, Scripps Institution of Oceanography in La Jolla (San Diego County), and the National Oceanic and Atmospheric Administration.
Santer's co-authors included six Livermore colleagues -- Peter J. Gleckler, Krishna AchutaRao, Jim Boyle, Mike Fiorino, Steve Klein and Karl Taylor -- and 12 other researchers from elsewhere in the United States and from Germany and England.
Assuming that warmer water equals more bad hurricanes, scary times could be ahead for inhabitants of hurricane-prone regions.
That's because "the models that we've used to understand the causes of (ocean warming) in these hurricane formation regions predict that the oceans are going to get a lot warmer over the 21st century," Santer said in a statement. "That causes some concern."
How hurricanes form in the Atlantic Ocean
Hurricanes are born in far western Africa, where modest windstorms known as tropical disturbances pick up moisture from the warm sea and begin to whirl. As atmospheric pressures drop, tropical depressions form with wind speeds up to 38 mph. As they speed westward they become tropical storms, lashing the ocean with sheets of rain and winds blowing up to 70 mph or more, finally building into hurricanes with winds exceeding 100 mph. -- Tropical disturbance -Tropical depression -- Tropical storm -- Hurricane Source: NOAA, The New York Times Joe Shoulak / The Chronicle
Dogs may aggravate the symptoms of asthmatic children
Tri-Valley Herald, Sunday, Sept. 10, 2006
THE shedding and chewing of shoes may be the least of the family dog's transgressions.
Asthmatic children who lived with dogs coughed more, produced more phlegm and had more bronchial responses to air pollutants than those with no pets, or those who lived only with cats, according to research that appeared last week in Environmental Health Perspectives.
Dr. Rob McConnell, a professor of preventive medicine at the Keck School of Medicine of the University of Southern California and the study's lead author, speculated that the increased asthmatic response of children with dogs is due to higher levels of endotoxin — a part of the cell wall of certain bacteria commonly found in dirt. Endotoxins are known to produce inflammation of the lungs and can be tracked in by dogs from outside.
But McConnell cautioned that there might be other explanations for the study's findings. Children with dogs, for example, might be more likely to play outside and thus be more exposed to air pollution. "It may have nothing to do with the dog," he said.
So don't take any hasty, pet-related actions.
"I think that if a child has asthma, they should have a pediatrician with a knowledge of asthma following them," he said. "Any decision should be based on a case-by-case basis."
Healthy vending (really)
You've worked through lunch again because the phone won't stop ringing, the e-mails won't stop flying and your major report has to be done today.
The next thing you know you're staring at a bank of vending machines to find something quick to eat. This situation, or others where the only option is a meal from a machine, doesn't have to be a sad scenario. But it depends on the selection available when playing this version of "the slots."
Vending machines aren't exactly synonymous with fine food or good nutrition, but the overall bad rap isn't fair, says Alan Plaisted of Atlanta-based vending company Southern Refreshment Services.
"Vending gets such a bad rap all the time as unhealthy. People don't expect to be satisfied, so there's image improvement we need to do," he says.
First came the simple changes such as more granola bars next to candy bars and bottled water next to soft drinks. But — just like in any business — what the consumer buys is what will appear for sale. Aramark, one of the big national players in vending, will fill machines with fresh salads, hard-boiled eggs, carrot sticks, yogurt, cubes of cheese and fresh fruit.
"We understand that people work a lot of hours, and the average lunch today is less than 36 minutes. We have to provide what makes employees happy," says Aramark's Brian Zaslow.
So don't despair if you have to use the vending machines for your lunch. There's much more than soda and chips to choose from.
Jackie Clark, of the National Automatic Merchandising Association says, "Because of technological advances in the machines, we can offer a wider array of products, even machines that cook hot foods like grilled chicken or pasta." NAMA has its own Balanced for Life campaign to help vending companies develop healthier choices.
For example, Aramark launched a Just4U healthy vending program with foods that are lower in fat and calories and beverages that include water or 100 percent fruit juices.
If you want healthier snacks, there's usually a number posted on the vending machine. If not, you'll just have to hope the person stocking the machines will notice that healthy snacks are selling better and will, therefore, increase those options.
Homework rules
How far should you go to control the homework habits of your children? William Stixrud, a Silver Spring, Md., neuropsychologist specializing in child and adolescent learning issues, offers parents this advice:
- Model behavior early. Young children and pre-teens tend to be more receptive to demonstrations of good habits and more willing to abide by parental restrictions. Set clear study rules (no IM'ing, watching TV, listening to music) while studying. Teach kids as soon as they get their first homework assignment that dividing their attention can affect how well they learn.
- Set the environment. It's up to you to see that your children have a quiet place to study, away from distractions and with adequate space for books and papers. It doesn't have to be a separate bedroom — the dining room could suffice — as long as other members of the household are respectful.
- Back off as they get older. There may be no piece of advice that tests parents more than this one. Get used to it. Too much parental oversight and interference can trigger a rebellion in teens. Better to take a deep breath and express confidence in a teen's ability to make positive study choices — even if they don't match yours.
- Engage them. Have an open discussion with your child about study-time distractions and seek his or her perspective on the matter. Parents can help kids test the effects of multitasking on learning by designing a rating scale to measure their level of focus and how much they remember under different study conditions.
- Respect them. There is no one surefire strategy to promote learning. It is important to allow students to figure out what strategies work best for them.
Less boozy booze?
The liquor, beer and wine that Americans drink today is less intoxicating than the alcohol they drank in the 1950s, according to an analysis in Alcoholism: Clinical and Experimental Research.
In 2002 beer was the most-favored alcoholic beverage, making up 60 percent of alcohol consumed. In 1950, 80 percent of liquor sold was in the "whiskey" class (straight, bonded, blended, etc.). In 1950 the alcohol content of wine sold in the United States averaged 16.75 percent; by 2002 that figure was 11.45 percent. In 1950 the alcohol content of beer averaged 5.02 percent; it was 4.65 percent in 2002. The data come from the Alcohol Research Group, a nonprofit funded by the National Institute on Alcohol Abuse and Alcoholism.
L.A. Times correction, Tuesday, Sept. 12, 2006:
FOR THE RECORD
Power plants: An article in the California section Friday about a South Coast Air Quality Management District plan to allow builders of new power plants to buy air pollution credits incorrectly stated that under an open-market credit program normally used by commercial power plants, they would have to pay for the credits annually. In fact, they would have to pay only once.
Fresno Bee editorial, Tuesday, Sept. 12, 2006:
UC Merced goes green
Campus seeks to be a leader in environment-friendly operations.
The University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.
The campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.
he goal is to win the U.S. Green Building Council's "silver standard," a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met. The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.
Buildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.
The commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.
It doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.
It's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.
The University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.
The campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.
The goal is to win the U.S. Green Building Council's "silver standard," a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met.
The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.
Buildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.
The commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.
It doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.
It's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.
Capital Press Ag Weekly Editorial Fri. Sept. 8, 2006:
Clearing air isn't all about global warming
California is leading the nation in legislation to regulate greenhouse gas pollutants, which has some industries in the state - including agriculture - nervous. It could also be a sign of things to come for the rest of the West Coast and the nation.
Some are touting the bill to impose a cap on carbon dioxide and greenhouse gases, and reduce them 25 percent by 2020, as an effort to counter global warming.
Critics, like Alan Caruba, of the Caruba Organization in South Orange, N.J., say it will be bad for business in California and is unnecessary because global warming is not actually happening.
"California is about to commit eco-suicide and wants the rest of the nation to join it," Caruba writes in a Sept. 4 column on AXcessNews.com. "The business and industry that will flee the Golden State is incalculable. The danger of these anti-energy policies to the future of the nation is beyond comprehension."
Caruba goes on to say that the claims, like those made by U.S. Sen. Dianne Feinstein, D-Calif., in an interview with the San Francisco Chronicle, that there is scientific consensus that global warming is happening now is "a very big lie."
Caruba says: "Far from any consensus, there is a growing body of scientific evidence that utterly disputes and debunks the claims made for global warming."
He also says: "There is no need for the control of greenhouse gas emissions."
What Caruba seems to ignore is that California has some serious air quality problems across wide swaths of the state, including the Los Angeles Basin, Inland Empire and San Joaquin Valley and Bay Area.
Even if Caruba and other global warming skeptics are correct, the fact remains that conditions in California are ideal to create smog in California. Abundant sunshine reacts with particles in the air to form smog that gets trapped in the valleys nestled between large mountain ranges.
Global warming or not, California's air is all-too-often unhealthy in far too many parts of the state.
Fortunately for California agriculture and industry, Gov. Arnold Schwarzenegger was able to negotiate some safety valves in the legislation.
It includes <cursor_is_here> That option could also provide a valuable incentive for business to reduce emissions to benefit their companies economically.
Caruba is correct to be concerned that this legislation is just a first successful volley in a fight to pass similar legislation at the federal level. As Caruba noted, Feinstein recently touted a plan to fight global warming with legislation she says she will introduce in the next Congressional session that has similarities to the California legislation.
It would also not be surprising to see other states, like Washington and Oregon, where the climate change mantra is also resonating to follow California's lead to control emissions even further.
California has the political clout, and population numbers, to make automakers pay heed to emissions restrictions on cars that smaller states can't pull off alone.
As to whether the new emission standards will do anything to slow climate change, that's a question still open to debate. But this will clear the air a bit more in smog-prone areas of the state.
</text>
|
[
{
"content": "<url>\nhttps://valleyair.org/recent_news/News_Clippings/2006/In%20the%20News%2009-12-06.pdf\n</url>\n<text>\nSchool forms asthma program through partnership\n\nBy Nadine Stinger, Staff Writer\n\nKingsburg Recorder Sept. 12, 2006\n\nOne in every seven children in California is affected by asthma. With this statistic in mind, Rafer Johnson Junior High has partnered with statewide organizations to raise a flag to promote air quality awareness in its school and community.\n\nIn accordance with the American Lung Association of Central California and the San Joaquin Valley Air Pollution Control District, Rafer Johnson and other Valley schools are taking part in the school-based agenda, the Air Quality Flag Program.\n\nUnder the program, Rafer Johnson's students search the Internet daily for air conditions, and then hang the colored flag that marks the air quality for that day.\n\nA green flag indicates that the air in the area is expected to be good, and a yellow flag signifies moderate air quality. On a yellow day, children who have severe levels of asthma or other pulmonary conditions are advised to be careful when participating in physical activities outside, especially if they find it hard to breath, start wheezing or feel like they are getting sick.\n\nAn orange flag means that the air quality is unhealthy for sensitive groups. Students with asthma and other lung or heart conditions should reduce how long and how hard they play outside. A red flag is a warning sign that air quality is unhealthy for everyone. On such a day, all students' outdoor activities are limited.\n\nSally Robinson, learning coordinator at Rafer Johnson, spoke highly of the program and the student involvement that it calls for.\n\n\"We want our kids, particularly our asthma kids, to get involved and say to themselves, 'You know what, I need to be more careful with how hard I am playing because the air may be bad,'\" she said.\n\nAccording to Robinson, Rafer Johnson has its share of asthmatic students who cannot part with their inhalers, and the school is trying to do something to make life easier for these medically atrisk students.\n\nEighth-grade student Whitney Snider, who has asthma and keeps an inhaler in the school's office, said she is excited about the program.\n\n\"It's good because now I'll see the flag and know when the air is unhealthy, and I can stay inside,\" she said.\n\nWhitney said she does not have a severe case of asthma, but she gets short of breath when the air quality is bad and when she plays really hard at physical education.\n\nRobinson stressed the importance of teaching students about air quality and air pollution, especially since we live here in the Central Valley.\n\nInformational posters on air quality are placed in every classroom, and teachers will talk to their students about the impact of air pollution on health, teach them preventive methods and remind them to pay attention to the flags. Under the program, teachers attended a workshop. The idea is that these teachers will educate their students on the things they learned.\n\nBut the program is not geared only toward educating the students. Parent involvement and awareness are pivotal, Robinson said. Parents and guardians will receive a detailed packet explaining the program, its goals and parent participation. The American Lung Association of\n\nCentral California also provides parent group training in English and Spanish. Other district schools are getting ready for the program that Rafer Johnson started last week.\n\nFor more information on the program or to set up parent group training call 800-LUNG-USA.\n\nToday is 11th Spare the Air Day of season\n\nMichael Cabanatuan, staff writer\n\nS.F. Chronicle, Tuesday, September 12, 2006\n\nBay Area air quality officials have called a Spare the Air Day for today -- the 11th of the season.\n\nWith meteorologists forecasting unhealthy air, particularly in the area stretching from Concord to Livermore, the air district is urging commuters to take public transportation. Cars are the biggest source of ground-level ozone, or smog.\n\nAir quality officials also urge people to postpone painting, staining, disinfecting or working in the yard with gasoline-powered equipment, to curtail the use of aerosol products and to refuel cars after dusk.\n\nBut commuters will have to pay for their rides, because the free-transit program covered only the first six Spare the Air Days.\n\nTuesday is a Spare-the-Air Day (but no free rides)\n\nTri-Valley Herald, Tuesday, Sept. 12, 2006\n\nRising temperatures and expected unhealthy smog levels prompted the Bay Area Air Quality Management District to declare Tuesday a Spare the Air Day, urging residents to take transit to work and avoid using polluting equipment and chemicals.\n\nTuesday will be the summer's 11th such day, and unlike the first six days, will not involve free transit rides. The budget for free bus, rail and ferry rides ran out on July 21.\n\nThe warmer temperatures, combined with stagnant air, are expected to foster the creation of ground-level ozone from auto exhaust and other pollutants, such as the volatile organic compounds commonly found in paints, household cleaners and hair spray. Air officials also urge residents to avoid yard work with gasoline-powered equipment, especially during morning hours.\n\nSupervisors weigh air pollution fee proposal\n\nDana M. Nichols\n\nStockton Record, Tuesday, Sept. 12, 2006\n\nSAN ANDREAS - Calaveras County supervisors are divided over whether to continue a taxpayer subsidy to farmers and other large property owners who cause air pollution by burning brush and other plant debris.\n\nThe county-run Air Pollution Control District spends about $19,500 a year to monitor and regulate smoke pollution from about 1,600 properties larger than 5 acres. County staffers are proposing to charge the owners of each of those properties a $12 annual fee to cover the cost of tracking the smoke and timing burns to minimize the impact on residents.\n\nBut county supervisors holding a study session on the matter Monday failed to give a clear signal on whether they want to end the subsidy. Supervisors Victoria Erickson and Tom Tryon said they oppose the proposed fee.\n\nSupervisors Merita Callaway and Bill Claudino said they would support the fee.\n\nSupervisor Steve Wilensky said he would not take a public position on the matter until he was able to consult with the county's legal counsel.\n\nWilensky, who operates an apple orchard, said he applies for the burn permits himself and therefore might have a conflict of interest should he weigh in on the matter.\n\nTryon, the other member of the board who earns his living through agriculture, running a ranch near Angels Camp, offered no explanation for his opposition to the fee and did not express any concern that he might have a conflict of interest on the issue.\n\nThe Calaveras County Farm Bureau opposed the proposed fee.\n\n\"I know $12 is not a lot to argue over, but it's another fee,\" said Steve Kafka, president of the bureau and a forester with Sierra Pacific Industries. Kafka said he also fears that a new fee would discourage property owners from acting to reduce fire hazards.\n\nBrian Moss, director of the county's Environmental Management Agency, said he sympathized with agriculture's need to control costs but said it doesn't make sense to give some property owners a break on air pollution control costs while charging others.\n\nMany of those who would pay the fee live on rural lots larger than 5 acres but do not actively farm or raise cattle.\n\nCallaway asked whether charging all property owners a $12 fee accurately reflected the cost of scheduling the burns and monitoring the pollution on different sizes of property.\n\nLakhmir Grewal, head of the Calaveras County Air Pollution Control District, said some very large burns to reduce the fuel load in forests, commonly known as controlled burns, are much more expensive for the district to plan and monitor.\n\nHe said that is because such controlled burns require detailed plans to prevent damage to human health and to manage the fire, and the district must review those plans. \"Some of those permits are costing thousands of dollars\" in district staff time, he said.\n\nHe said some counties charge air pollution fees of more than $1,000 for property owners who do large controlled burns.\n\nThe proposal Grewal and Moss brought to supervisors, however, would charge a flat $12 whether a property owner simply burned brush piles near a home on a 10-acre lot or needed to do a 300acre controlled burn on forestland.\n\nWilensky asked Grewal and Moss if they thought imposing a fee might simply drive some property owners to go ahead and burn without getting the required air pollution permit.\n\nMoss said no. He said property owners already drive to the district office to get the required free permits, and the inconvenience of driving to the office is a greater barrier than a $12 fee. Also, he noted that people who burn illegally without a permit can pay substantial penalties.\n\nGrewal said that recently a farmer had been fined $1,000 for an illegal orchard burn, and a developer been fined $5,000 for an illegal burn.\n\nLegislation affecting business\n\nBy Jake Henshaw\n\nVisalia Times-Delta, Monday, Sept. 11, 2006\n\nThey still had hopes of passing a few modest bills in August in the Capitol, but for the most part California businesses are playing defense as the Legislature wraps up its work for the year.\n\nThey are trying to defeat proposals to increase the minimum wage, impose emission caps to control global warming, boost benefits for permanently disabled workers and force big businesses to provide health care for its employees.\n\n\"As usual, at the end of the session, it comes down to that,\" Vince Sollitto, spokesman for the California Chamber of Commerce, said of the effort to defeat measures that businesses fear will hurt job creation and competitiveness.\n\nMichael Shaw, assistant state director for the National Federation of Independent Business, said his group is pushing a couple of bills to aid small businesses by requiring a state study of the cost of regulations on them and setting up a state Web site linking state agencies that regulate them.\n\nBusinesses appear to have already lost battles to reinstitute a tax credit for the purchase of manufacturing equipment and the four-day workweek for interested workers without overtime pay. They now face a tough battle against any minimum wage increase because the governor supports a $1 boost while Democrats and unions generally agree with the governor but also want automatic future increases indexed to inflation.\n\nDemocrats also are pushing for revisions for workers' compensation. Changes have cut premiums 50 percent, but injured workers claim it also has cut benefits for permanently disabled workers 50 percent. The bill is still being finalized.\n\nThe Legislature was scheduled to end its regular session for the year Aug. 31.\n\nBills favored by business\n\n* AB2330, Assemblyman Juan Arambula, D-Fresno: Requires the state to study the cost of regulations on small businesses.\n* SB1436, Sen. Liz Figueroa, D-Sunol: Directs the state to set up an Internet link to all state agencies that have a significant role in regulating small businesses.\n\nBills opposed by business\n\n* AB1835, Assemblywoman Sally Lieber, D-Mountain View: Increases increase the minimum wage from the current $6.75 to $7.75 in two steps over two years. It then would automatically provide for future increases indexed to the rate of inflation.\n* SB1162, Sen. Gil Cedillo, D-Los Angeles: Increases the minimum wage from the current $6.75 to $7.75 in two steps. The initial increase would come within 60 days of the bill being signed, versus AB 1835, which authorizes the first step on July 1, 2007. Future increases also would be indexed to the rate of inflation.\n\nAir quality\n\n* AB32, Assembly Speaker Fabian Nunez, D-Los Angeles and Assemblywoman Fran Pavley, DAgoura Hills: Requires state officials to set a cap on greenhouse gas emissions and monitor their prevalence.\n* SB1205, Sen. Martha Escutia, D-Whittier: Increases penalties for pollution from sources other than motor vehicles from $1,000 to a range of $10,000 up to $100,000 with the fines deposited in a new Children's Breathing Rights Fund, for which uses would be established later.\n* AB1101, Assemblywoman Jenny Oropeza, D-Long Beach: Gives ports, airports and rail yards that attract large numbers of diesel-powered vehicles the power to reduce diesel emissions.\n* SB1252, Sen. Dean Florez, D-Shafter: Authorizes a penalty of up to $25,000, in addition to other existing penalties, for emissions of particulates that violate federal air quality standards.\n* SB1368, Senate leader Don Perata, D-Oakland: Establishes a greenhouse gas emissions performance standard for public and private utilities.\n\nResources\n\n* SB 646, Sen. Sheila Kuehl, D-Santa Monica: Tightens up the procedures for farm and timber companies to get waivers from the operating rules for discharging into public water, which include obtaining permits. The bill also would impose a fee for waivers.\n* AB 2641, Assemblyman Joe Coto, D-San Jose: Requires developers who discover Indian burial grounds to consult with likely tribal descendants regarding appropriate preservation.\n\nHealth\n\n* SB1379, Senate leader Don Perata, D-Oakland, and Sen. Deborah Ortiz, D-Sacramento: Creates the nation's first biomonitoring program to assess chemical contamination of the general public to aid public health planning.\n* SB1414, Sen. Carole Migden, D-San Francisco: Requires companies with 10,000 or more workers to spend an amount equal to 8 percent of their payroll on health insurance or pay that amount to Medi-Cal.\n\nLegal issues\n\n* SB1489, Sen. Denise Ducheny, D-San Diego: Authorizes the California attorney general to recover attorneys' fees and costs when he wins cases enforcing laws on such issues as the environment, civil rights, consumer fraud, corporate responsibility and gambling with the goal of making such actions self-funding.\n* SB1737, Sen. Liz Figueroa, D-Sunol: Sets timelines and other rules for consumer rebates.\n\nReport links global warming, storms\n\nKeay Davidson, Chronicle Science Writer S.F. Chronicle, Tuesday, September 12, 2006\n\nScientists say they have found what could be the key to ending a yearlong debate about what is making hurricanes more violent and common -- evidence that human-caused global warming is heating the ocean and providing more fuel for the world's deadliest storms.\n\nFor the past 13 months, researchers have debated whether humanity is to blame for a surge in hurricanes since the mid-1990s or whether the increased activity is merely a natural cycle that occurs every several decades.\n\nEmploying 80 computer simulations, scientists from Lawrence Livermore National Laboratory and other institutions concluded that there is only one answer: that the burning of fossil fuels, which warms the climate, is also heating the oceans.\n\nHumans, Ben Santer, the report's lead author, told The Chronicle, are making hurricanes globally more violent \"and violent hurricanes more common\" -- at least, in the latter case, in the northern Atlantic Ocean. The findings were published Monday in the latest issue of the Proceedings of the National Academy of Sciences.\n\nHurricanes are born from tropical storms fueled by rising warm, moist air in the tropics. The Earth's rotation puts a spin on the storms, causing them to suck in more and more warm, moist air -- thus making them bigger and more ferocious.\n\nIn that regard, the report says, since 1906, sea-surface temperatures have warmed by between one-third and two-thirds of a degree Celsius -- or between 0.6 and 1.2 degrees Fahrenheit -- in the tropical parts of the Atlantic and Pacific oceans, which are hurricane breeding grounds.\n\nCritics of the theory that greenhouse gases are making hurricanes worse remained unconvinced by the latest research.\n\nChris Landsea, a top hurricane expert, praised the Proceedings paper as a worthwhile contribution to science, but said the authors failed to persuasively counter earlier objections -that warmer seas would have negligible impact on hurricane activity.\n\nLandsea, science and operations officer at the U.S. National Hurricane Center in Miami, noted that modern satellite observations have made hurricanes easier to detect and analyze, and that could foster the impression of long-term trends in hurricane frequency or violence that are, in fact, illusory. The surge in hurricane activity since the mid-1990s is just the latest wave in repeating cycles of hurricane activity, he said.\n\nPhilip Klotzbach, a hurricane forecaster at Colorado State University, said that \"sea-surface temperatures have certainly warmed over the past century, and ... there is probably a humaninduced (global warming) component.\" But his own research indicates \"there has been very little change in global hurricane activity over the past 20 years, where the data is most reliable.\"\n\nResearchers report in the Proceedings paper an 84 percent chance that at least two-thirds of the rise in ocean temperatures in these so-called hurricane breeding grounds is caused by human activities -- and primarily by the production of greenhouse gases.\n\nTom Wigley, one of the world's top climate modelers and a co-author of the paper, said in a teleconference last week that the scientists tried to figure out what caused the oceans to warm by running many different computer models based on possible single causes. Those causes ranged from human production of greenhouse gases to natural variations in solar intensity.\n\nWigley said that when the researchers reviewed the results, they found that only one model was best able to explain changing ocean temperatures, and it pointed to greenhouse gases in the atmosphere. The most infamous greenhouse gas is carbon dioxide, a product of human burning of fossil fuels in cars and factories.\n\nWigley estimated the odds as smaller than 1 percent that ocean warming could be blamed on random fluctuations in hurricane activity, as some scientists suggest.\n\nThe debate among scientists was triggered in August 2005, a few weeks before Hurricane Katrina struck New Orleans, when hurricane expert Kerry Emanuel of MIT wrote an article for the journal Nature proposing that since the 1970s, ocean warming had made hurricanes about 50 percent more intense in the Atlantic and Pacific oceans.\n\nLater, two scientific teams, both at Georgia Tech, estimated that warmer sea-surface temperatures were boosting both hurricane intensity and the number of the two worst types of hurricanes, known as Category 4 and Category 5 storms.\n\nNineteen scientists from 10 institutions were involved in the Proceedings paper. In addition to Lawrence Livermore, other U.S. institutions included Lawrence Berkeley National Laboratory, the National Center for Atmospheric Research, NASA, UC Merced, Scripps Institution of Oceanography in La Jolla (San Diego County), and the National Oceanic and Atmospheric Administration.\n\nSanter's co-authors included six Livermore colleagues -- Peter J. Gleckler, Krishna AchutaRao, Jim Boyle, Mike Fiorino, Steve Klein and Karl Taylor -- and 12 other researchers from elsewhere in the United States and from Germany and England.\n\nAssuming that warmer water equals more bad hurricanes, scary times could be ahead for inhabitants of hurricane-prone regions.\n\nThat's because \"the models that we've used to understand the causes of (ocean warming) in these hurricane formation regions predict that the oceans are going to get a lot warmer over the 21st century,\" Santer said in a statement. \"That causes some concern.\"\n\nHow hurricanes form in the Atlantic Ocean\n\nHurricanes are born in far western Africa, where modest windstorms known as tropical disturbances pick up moisture from the warm sea and begin to whirl. As atmospheric pressures drop, tropical depressions form with wind speeds up to 38 mph. As they speed westward they become tropical storms, lashing the ocean with sheets of rain and winds blowing up to 70 mph or more, finally building into hurricanes with winds exceeding 100 mph. -- Tropical disturbance -Tropical depression -- Tropical storm -- Hurricane Source: NOAA, The New York Times Joe Shoulak / The Chronicle\n\nDogs may aggravate the symptoms of asthmatic children\n\nTri-Valley Herald, Sunday, Sept. 10, 2006\n\nTHE shedding and chewing of shoes may be the least of the family dog's transgressions.\n\nAsthmatic children who lived with dogs coughed more, produced more phlegm and had more bronchial responses to air pollutants than those with no pets, or those who lived only with cats, according to research that appeared last week in Environmental Health Perspectives.\n\nDr. Rob McConnell, a professor of preventive medicine at the Keck School of Medicine of the University of Southern California and the study's lead author, speculated that the increased asthmatic response of children with dogs is due to higher levels of endotoxin — a part of the cell wall of certain bacteria commonly found in dirt. Endotoxins are known to produce inflammation of the lungs and can be tracked in by dogs from outside.\n\nBut McConnell cautioned that there might be other explanations for the study's findings. Children with dogs, for example, might be more likely to play outside and thus be more exposed to air pollution. \"It may have nothing to do with the dog,\" he said.\n\nSo don't take any hasty, pet-related actions.\n\n\"I think that if a child has asthma, they should have a pediatrician with a knowledge of asthma following them,\" he said. \"Any decision should be based on a case-by-case basis.\"\n\nHealthy vending (really)\n\nYou've worked through lunch again because the phone won't stop ringing, the e-mails won't stop flying and your major report has to be done today.\n\nThe next thing you know you're staring at a bank of vending machines to find something quick to eat. This situation, or others where the only option is a meal from a machine, doesn't have to be a sad scenario. But it depends on the selection available when playing this version of \"the slots.\"\n\nVending machines aren't exactly synonymous with fine food or good nutrition, but the overall bad rap isn't fair, says Alan Plaisted of Atlanta-based vending company Southern Refreshment Services.\n\n\"Vending gets such a bad rap all the time as unhealthy. People don't expect to be satisfied, so there's image improvement we need to do,\" he says.\n\nFirst came the simple changes such as more granola bars next to candy bars and bottled water next to soft drinks. But — just like in any business — what the consumer buys is what will appear for sale. Aramark, one of the big national players in vending, will fill machines with fresh salads, hard-boiled eggs, carrot sticks, yogurt, cubes of cheese and fresh fruit.\n\n\"We understand that people work a lot of hours, and the average lunch today is less than 36 minutes. We have to provide what makes employees happy,\" says Aramark's Brian Zaslow.\n\nSo don't despair if you have to use the vending machines for your lunch. There's much more than soda and chips to choose from.\n\nJackie Clark, of the National Automatic Merchandising Association says, \"Because of technological advances in the machines, we can offer a wider array of products, even machines that cook hot foods like grilled chicken or pasta.\" NAMA has its own Balanced for Life campaign to help vending companies develop healthier choices.\n\nFor example, Aramark launched a Just4U healthy vending program with foods that are lower in fat and calories and beverages that include water or 100 percent fruit juices.\n\nIf you want healthier snacks, there's usually a number posted on the vending machine. If not, you'll just have to hope the person stocking the machines will notice that healthy snacks are selling better and will, therefore, increase those options.\n\nHomework rules\n\nHow far should you go to control the homework habits of your children? William Stixrud, a Silver Spring, Md., neuropsychologist specializing in child and adolescent learning issues, offers parents this advice:\n\n- Model behavior early. Young children and pre-teens tend to be more receptive to demonstrations of good habits and more willing to abide by parental restrictions. Set clear study rules (no IM'ing, watching TV, listening to music) while studying. Teach kids as soon as they get their first homework assignment that dividing their attention can affect how well they learn.\n- Set the environment. It's up to you to see that your children have a quiet place to study, away from distractions and with adequate space for books and papers. It doesn't have to be a separate bedroom — the dining room could suffice — as long as other members of the household are respectful.\n- Back off as they get older. There may be no piece of advice that tests parents more than this one. Get used to it. Too much parental oversight and interference can trigger a rebellion in teens. Better to take a deep breath and express confidence in a teen's ability to make positive study choices — even if they don't match yours.\n- Engage them. Have an open discussion with your child about study-time distractions and seek his or her perspective on the matter. Parents can help kids test the effects of multitasking on learning by designing a rating scale to measure their level of focus and how much they remember under different study conditions.\n- Respect them. There is no one surefire strategy to promote learning. It is important to allow students to figure out what strategies work best for them.\n\nLess boozy booze?\n\nThe liquor, beer and wine that Americans drink today is less intoxicating than the alcohol they drank in the 1950s, according to an analysis in Alcoholism: Clinical and Experimental Research.\n\nIn 2002 beer was the most-favored alcoholic beverage, making up 60 percent of alcohol consumed. In 1950, 80 percent of liquor sold was in the \"whiskey\" class (straight, bonded, blended, etc.). In 1950 the alcohol content of wine sold in the United States averaged 16.75 percent; by 2002 that figure was 11.45 percent. In 1950 the alcohol content of beer averaged 5.02 percent; it was 4.65 percent in 2002. The data come from the Alcohol Research Group, a nonprofit funded by the National Institute on Alcohol Abuse and Alcoholism.\n\nL.A. Times correction, Tuesday, Sept. 12, 2006:\n\nFOR THE RECORD\n\nPower plants: An article in the California section Friday about a South Coast Air Quality Management District plan to allow builders of new power plants to buy air pollution credits incorrectly stated that under an open-market credit program normally used by commercial power plants, they would have to pay for the credits annually. In fact, they would have to pay only once.\n\nFresno Bee editorial, Tuesday, Sept. 12, 2006:\n\nUC Merced goes green\n\nCampus seeks to be a leader in environment-friendly operations.\n\nThe University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.\n\nThe campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.\n\nhe goal is to win the U.S. Green Building Council's \"silver standard,\" a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met. The council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.\n\nBuildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.\n\nThe commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.\n\nIt doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.\n\nIt's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.\n\nThe University of California at Merced wants to go green, and in the process can set a good example for all of us in the Valley.\n\nThe campus is making huge efforts to conserve energy and resources, from water-saving devices in dormitory bathrooms to biodegradable plates in the university dining commons. They're even installing carpets made from recycled soda bottles. More than three-quarters of UC Merced's construction debris has been recycled.\n\nThe goal is to win the U.S. Green Building Council's \"silver standard,\" a measure of environmentfriendly operations that, according to UC Merced officials, no American university has yet met.\n\nThe council awards points for various steps to reduce energy and resource consumption. It takes 33 points to win the silver standard.\n\nBuildings close to public transportation win a point, using recycled construction materials is worth five and installing waterless urinals gets three points.\n\nThe commitment to a green operation is part of a larger promise from the university system that the new Merced campus would have a strong focus on environmental issues. That's appropriate in a Valley with air quality and other environmental problems long thought by many to be intractable.\n\nIt doesn't come cheap, at least at first. As is typical with new technologies, such devices and processes are often more expensive than their traditional counterparts. But in the long run, energy and materials costs will only go up, shortening the time when savings in those areas amortize the initial cost of all the new green technology.\n\nIt's the path to the future, and it's appropriate and laudable that UC Merced, part of a magnificent system of research universities, should be a leader.\n\nCapital Press Ag Weekly Editorial Fri. Sept. 8, 2006:\n\nClearing air isn't all about global warming\n\nCalifornia is leading the nation in legislation to regulate greenhouse gas pollutants, which has some industries in the state - including agriculture - nervous. It could also be a sign of things to come for the rest of the West Coast and the nation.\n\nSome are touting the bill to impose a cap on carbon dioxide and greenhouse gases, and reduce them 25 percent by 2020, as an effort to counter global warming.\n\nCritics, like Alan Caruba, of the Caruba Organization in South Orange, N.J., say it will be bad for business in California and is unnecessary because global warming is not actually happening.\n\n\"California is about to commit eco-suicide and wants the rest of the nation to join it,\" Caruba writes in a Sept. 4 column on AXcessNews.com. \"The business and industry that will flee the Golden State is incalculable. The danger of these anti-energy policies to the future of the nation is beyond comprehension.\"\n\nCaruba goes on to say that the claims, like those made by U.S. Sen. Dianne Feinstein, D-Calif., in an interview with the San Francisco Chronicle, that there is scientific consensus that global warming is happening now is \"a very big lie.\"\n\nCaruba says: \"Far from any consensus, there is a growing body of scientific evidence that utterly disputes and debunks the claims made for global warming.\"\n\nHe also says: \"There is no need for the control of greenhouse gas emissions.\"\n\nWhat Caruba seems to ignore is that California has some serious air quality problems across wide swaths of the state, including the Los Angeles Basin, Inland Empire and San Joaquin Valley and Bay Area.\n\nEven if Caruba and other global warming skeptics are correct, the fact remains that conditions in California are ideal to create smog in California. Abundant sunshine reacts with particles in the air to form smog that gets trapped in the valleys nestled between large mountain ranges.\n\nGlobal warming or not, California's air is all-too-often unhealthy in far too many parts of the state.\n\nFortunately for California agriculture and industry, Gov. Arnold Schwarzenegger was able to negotiate some safety valves in the legislation.\n\nIt includes <cursor_is_here> That option could also provide a valuable incentive for business to reduce emissions to benefit their companies economically.\n\nCaruba is correct to be concerned that this legislation is just a first successful volley in a fight to pass similar legislation at the federal level. As Caruba noted, Feinstein recently touted a plan to fight global warming with legislation she says she will introduce in the next Congressional session that has similarities to the California legislation.\n\nIt would also not be surprising to see other states, like Washington and Oregon, where the climate change mantra is also resonating to follow California's lead to control emissions even further.\n\nCalifornia has the political clout, and population numbers, to make automakers pay heed to emissions restrictions on cars that smaller states can't pull off alone.\n\nAs to whether the new emission standards will do anything to slow climate change, that's a question still open to debate. But this will clear the air a bit more in smog-prone areas of the state.\n</text>\n",
"role": "user"
},
{
"content": "a provision for trading emissions credits that will allow producers of greenhouse gases - who are also producers of energy, products and jobs that help fuel the state economy - to continue to do business.",
"role": "assistant"
}
] |
House Armed Services Committee "The State of Al‐Qaeda, its Affiliates, and Associated Groups: View from Outside Experts"
Testimony of William Braniff Executive Director National Consortium for the Study of Terrorism and Responses to Terrorism (START) University of Maryland 4 February 2014
Chairman McKeon, Ranking Member Smith, and esteemed members of the committee, I would like to thank you on behalf of the National Consortium for the Study of Terrorism and Responses to Terrorism, known as START, 1 for inviting us to speak with you today. I've been asked to reflect on the "State of al‐Qa'ida its Affiliates and Associated Groups." There is, unfortunately, much to say.
Data
In 2012, the most recent year for which START has provided a complete set of global terrorism data to the Department of State for its Congressionally‐mandated Country Reports on Terrorism, more than 6,800 terrorist attacks killed more than 11,000 people. 2 Even if you compare these more conservative 2012 figures provided to the Department of State against the more inclusive Global Terrorism Database (GTD) statistics dating back to 1970, the previous record for number of attacks was set in 2011 with more than 5,000 incidents. 3,4 This makes 2012 the most active year of terrorism on record.
1 START is supported in part by the Science and Technology Directorate Office of University Programs of the U.S. Department of Homeland Security through a Center of Excellence program based at the University of Maryland. START uses state‐of‐the‐art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. 2 It is important to note that incidents had to meet all six inclusion criteria used by START's Global Terrorism Database to be included as a terrorist incident in the Statistical Annex of the Country Reports on Terrorism 2012. However, the Global Terrorism Database itself requires only five of six criteria be satisfied for an event to be included giving the varying definitions of terrorism and to provide flexibility for those who use GTD for different analytical and operational purposes. Specifically, START includes incidents that meet three mandatory
1. The violent act was aimed at attaining a political, economic, religious, or social goal;
criteria and then two of the three following additional criteria:
2. The violent act included evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) other than the immediate victims; and
Therefore, the GTD includes a greater number of terrorist incidents than the dataset provided to the Department of State for the Country Reports on Terrorism 2012. If the GTD's inclusion standards are applied to 2012 data, 8,400 terrorist attacks killed more than 15,400 people. By either measure, 2012 is the most active year of terrorism on record.
3. The violent act was outside the precepts of International Humanitarian Law insofar as it targeted non-combatants.
3 It is critical to note that beginning with 2012 data collection, START made several important changes to the GTD collection methodology, improving the efficiency and comprehensiveness of the process. As a result of these improvements, a direct comparison between 2011 and 2012 likely overstates the increase in total attacks and fatalities worldwide during this time period. However, analysis of the data indicates that this increase began before the shift in data collection methodology, and important developments in key conflicts around the world suggest that considerable upward trends remain even when accounting for the possibility of methodological artifacts.
Strikingly, it could be argued that the six most lethal groups in 2012 were all part of "al‐ Qa'ida and its Associated Movement," a phrase used to simplify a very dynamic landscape of violent organizations and individuals. Using data provided to the Department of State, these groups were attributed responsibility for approximately 5,000 fatalities: the Taliban (more than 2,000 fatalities), Boko Haram (more than 1,100 fatalities), al‐Qa'ida in Iraq (more than 830 fatalities), Tehrik‐e Taliban Pakistan (more than 500 fatalities), al‐Qa'ida in the Arabian Peninsula (more than 280 fatalities), and al‐Shabaab (more than 280 fatalities). 5
Based on preliminary terrorism incident data for January through June of 2013, and again using the Department of State's inclusion standards, the eight most lethal organizations in that time‐period include the Taliban, al‐Qa'ida in Iraq, Tehrik‐i‐Taliban Pakistan, Boko Haram, Lashkar‐e‐Jhangvi, al‐Nusrah Front, al‐Shabaab, and al‐Mua'qi'oon Biddam Brigade. These preliminary data reinforce the hypothesis that groups generally associated with al‐ Qa'ida remain the most lethal groups in the world.
Notably, al‐Qa'ida itself was not directly responsible for any attacks in 2012 or the first six months of 2013 for which we have preliminary data. To help interpret these data on terrorist groups, I turned to a START research project funded by the Department of Homeland Security Science and Technology Directorate's Office of University Programs, the Big Allied and Dangerous (BAAD) project, led by Victor Asal and Karl Rethemeyer. 6 This project has demonstrated empirically that organizations with greater numbers of alliance
4 I am indebted to Erin Miller and the entire Global Terrorism Database team, as well as primary investigators Gary LaFree and Laura Dugan (University of Maryland) for the rigor and objectivity undergirding this terrorism incident data.
6 I am indebted to Victor Asal and Karl Rethemeyer, START researchers at the University at Albany – SUNY, who conducted this preliminary analysis and generated the associated graphic for the purpose of this testimony.
5 Using the more inclusive GTD inclusion standards, these include the Taliban (more than 2,500 fatalities), Boko Haram (more than 1,200 fatalities), al-Qa'ida in the Arabian Peninsula (more than 960 fatalities), Tehrike Taliban Pakistan (more than 950 fatalities), al-Qa'ida in Iraq (more than 930 fatalities) and al-Shabaab (more than 700 fatalities).
connections to other terrorist organizations demonstrate greater lethality on average 7 and are more likely to use or pursue chemical, biological, nuclear, or radiological weapons. 8
Using preliminary data through 2012 that is currently going through a quality control process, it appears that 12 of the top 20 most lethal organizations have alliance connections to al‐Qa'ida and 10 of the top 20 most active organizations (measured by number of terrorist attacks recorded in the GTD) also have alliance connections to al‐ Qa'ida 9 (see the figure on the next page). 10 While al‐Qa'ida did not make the list of the top 20 most lethal or active organizations in 2012, all data suggest it remains a central hub in a network of highly lethal and active terrorist organizations.
Please see the "Network Connections and Lethality" figure on the next page.
7 Asal, Victor, and R. Karl Rethemeyer. 2008. "The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality." Journal of Politics, 70(2): 437-449.
8
Organizational Factors and the Pursuit of CBRN Weapons
Asal, Victor, Gary Ackerman, and R. Karl Rethemeyer. 2012. Connections Can Be Toxic: Terrorist
9 Alliance connections can be categorized according to six types of inter-group connections: "alliance,"
Studies in Terrorism and Conflict35:229–254.
"suspected alliance," "umbrella," "suspected umbrella," supported cause, and "joint claims for attacks." Alliances or suspected alliances are reports of cooperation of any form. Umbrella relationships or suspected umbrella relationships exist when one organization speaks and/or acts on behalf of other organizations. Supported cause is public rhetorical support for a given organization.
10 Red nodes represent organizations that were in the top 20 in terms of fatalities, incidents, or both in 2012. Blue nodes connected to other nodes represent all other organizations with a least one alliance or connection in 2012. Isolated blue and red nodes had no alliance connections with other organizations. The larger the node, the more fatalities are attributed to the organization in 2012 by the GTD. This map is only for 2012; it does not reflect past alliance connections or past terrorist activity.
www.start.umd.edu
Network Connections and Lethality
Source: Big Allied and Dangerous Dataset II (BAAD II)
Primary Investigators: Victor Asal and Karl Rethemeyer, University at Albany
Analysis 11
As a result of the absence of al‐Qa'ida Core attacks in 2012 and the first six months of 2013, the al‐Qa'ida organization rarely captures media attention except when another important cadre member is killed or captured. Instead, observers now ponder the meaning of the continuous or frequently increasing levels of violence from other violent jihadist groups in the context of a post Arab‐Spring world. This is despite the fact that the various narratives of the Arab Spring seemed to undermine al‐Qa'ida's reliance on violence and its call to reestablish the caliphate as the governing structure for the Muslim nation. Additionally, individuals continue to join jihadist groups or plot violent attacks of their own volition.
What should we take from the seemingly contradictory developments of a popular rejection of al‐Qa'ida on the world stage just a few years ago, and record‐setting levels of jihadist violence over the last two years? Did al‐Qa'ida succeed by inspiring widespread jihadism, or has it lost to a variety of more popular, parochial actors? To address these questions, it is essential to understand al‐Qa'ida's origins and its place in the broader Islamist landscape; only in context can the seeming decline of the al‐Qa'ida organization and the persistence of violent jihadism be understood and can governments formulate policy for an expansive threat environment beyond al‐ Qa'ida Core.
The failure of local jihadist groups to successfully topple corrupt Muslim rulers, the "near enemy," and regionally‐oriented irredentist groups to reclaim political control of occupied territory has been a source of frustration since the 1970s. Following Usama bin Ladin's failure to convince the Government of Saudi Arabia to allow his community of jihadist veterans to protect the Arabian Peninsula from Saddam
11 Much of this section of testimony is a synthesis of the research and educational efforts of the Combating Terrorism Center at West Point, and specifically the team of instructors that comprised the Practitioner Education Program.
Hussein's Bathist military, al‐Qa'ida formulated the master narrative that would underpin the next 20 years of ideological and operational output as follows:
The reason that the Royal Family would not allow the mujahidin to defend Mecca and Medina from Iraq's advance was the same reason that local and irredentist jihadist groups elsewhere had failed in their parochial contests. The regimes were illegitimate proxies of foreign powers, and behind each of these puppet regimes was the military and economic aid of the "far‐enemy." Led by the United States, the far enemy pulled the strings across the Muslim world for their own imperial purposes and to undermine Islam.
Al‐Qa'ida's grand strategy would emerge from this diagnosis; al‐Qa'ida would enable and repurpose the violence of other militant actors to erode the political, economic, and military will of the United States to remain engaged in the Muslim world. If al‐ Qa'ida's geographically distributed attrition warfare could sever the ties between what it regarded as the puppet‐master and the puppets, revolutionary local and regional jihadist campaigns could reestablish Islamic governance for the Muslim nation, one emirate at a time, until the caliphate could be reestablished.
To realize this grand‐strategy, al‐Qa'ida positioned itself at the conceptual center of the global jihadist landscape, helping to create the multi‐faceted threat that has since manifested in at least four ways.
1. Al‐Qa'ida exploited interpersonal and inter‐organizational relationships created during the anti‐Soviet jihad and inserted itself into extant violent campaigns beginning in the 1990s and continuing until today. It provided martial and ideological training, financing, and propaganda support when it did not also engage directly in violence, as was the case in the Arabian Peninsula in the early 1990s, the mid 2000s, and remains the case today under the aegis of al‐Qa'ida in the Arabian Peninsula (AQAP) and front groups such as Ansar al‐Sharia.
The penchant for global jihadist actors to reorient and enable the violence of foreign fighters and segments of existing organizations often creates tensions among the jihadist factions, or between the local populace and the militant actors, as we have seen in Iraq, Somalia and now Syria. As a result, al‐Qa'ida rarely succeeds in retaining popular support among the populace over time or reorienting jihadist groups en toto to their tactical and targeting preferences. However, they frequently achieve partial successes that amplify al‐Qa'ida's operational reach far beyond their organizational safe haven in North Waziristan.
2. Similarly, veterans of the anti‐Soviet jihad returned to locally and regionally‐ oriented groups indoctrinated with a globalized understanding of their respective conflicts. This infusion of global jihadist thought occurred in regions as culturally disparate as Southeast Asia and the Caucasus, where individuals like Ibn al‐Khattab helped to retool the ethno nationalist separatist movement in Chechnya as a religious conflict, fostering a spiral of increasingly violent tactics between Russian and Chechen forces during the second Chechen war. Russia would eventually displace the violence in Chechnya to nearby regions including Dagestan, Ingushetia, Kabardino‐Balkariya, and North Ossetia‐Alania, in which a number of terrorist groups also adopted the symbols and spectacular tactics of global jihadism. It was this injection and ultimate embrace of global jihadism over several decades that created the threat facing the upcoming Sochi Olympics.
A recent START background report introduces the threat as follows: 12
Two suicide bombings in December targeted a train station and trolleybus in Volgograd, Russia, killing at least 34 people and wounding many more. The
12 Miller, Erin. 2014. "Background Report: Terrorism and the Olympics: Sochi, Russia 2014." START (January). http://www.start.umd.edu/pubs/STARTBackgroundReport_TerrorisminOlympicsSochiRussia_Jan2014_0.pdf.
attacks, which took place approximately 400 miles from Sochi, highlight the potential threat of terrorist violence at the 2014 Winter Games. The militant group Vilayat Dagestan, part of the Caucasus Emirate, claimed responsibility for the Volgograd attacks. A statement made by the group threatens that if the Winter Olympics are held, the group will carry out additional attacks, particularly targeting tourists in retaliation for "the Muslim blood that is shed every day around the world, be it in Afghanistan, Somalia, Syria, all around the world." 13
Attacking international tourists at the Olympics and Russian civilians in Volgograd are equated; they are portrayed as two facets of the same fight.
3. Many of the highly networked veterans of the anti‐Soviet jihad encouraged their respective organizations to establish a physical presence in other jihadist fronts as well, capitalizing on the associated ideological legitimacy for recruitment, access to training and battlefield experience, and access to fundraising and equipment pipelines pouring resources into those conflict zones. This phenomenon furthered the globalization of jihadism started during the anti‐ Soviet jihad.
For example, Algerian jihadist groups participated in Bosnia and then Iraq, creating the relationships that would eventually lead to the reincarnation of the Salafist Group for Preaching and Combat (GSPC) as al‐Qa'ida in the Islamic Maghreb (AQIM). 14 After civil war erupted in Libya in 2011, it was not a departure from historical precedent when al‐Qa'ida emir Ayman al‐Zawahiri encouraged the AQIM network to syphon resources flowing into Libya for their own violent purposes across North Africa. Neither is it unusual that Mokhtar Belmokhtar, an AQIM commander and veteran of the anti‐Soviet jihad, has recently united his AQIM brigade with the Movement for Unity and Jihad in West Africa to create a new jihadist umbrella organization on the heels of French intervention in Mali. This new organization, al‐Murabitun, paid homage to al‐ Qa'ida's emir, Ayman al‐Zawahiri, and stated its intent to unite jihadist groups across the Sahel and North Africa as an emirate akin to the storied Muslim empire which controlled al‐Andalus and fought successfully to delay Europe's Reconquista of the Iberian Peninsula. 15
14 Brown, Vahid. 2010. "Al-Qa'ida Central and Local Affiliates." In Self-Inflicted Wounds: Debates and Divisions within al-Qa'ida and its Periphery, eds. Assaf Moghadam and Brian Fishman. Combating Terrorism Center at West Point.
15 Cristiani, Dario. 2013. "Al-Murabitun: North Africa's Jihadists Reach into Hisotry in the Battle against European 'Crusaders.'" Terrorism Monitor, 11(19).
4. Finally, al‐Qa'ida was forced to invest significant resources into virtual activities following the loss of its training camps in Afghanistan after September 11, 2001, and because of its inability to control the operational and media output of al‐ Qa'ida in Iraq. While al‐Qa'ida's online communication architecture allowed it to interact with a geographically dispersed community and to protect its brand, it also created an environment where countless organizations and individuals could voice competing and complimentary ideas. The virtual landscape quickly became a place where local, regional and global forms of jihadism overlapped for a geographically, ideologically, and strategically diverse audience.
Taken as a whole, the increasingly international and intertwined histories of local, regional and global jihadist actors have at least four salient consequences.
First, and most significantly, the global jihadist cause often benefits from resources mobilized for the purpose of defensive or classical jihad – a concept far easier to justify politically and religiously than the offensive jihad practiced by global jihadists. 16 Iraq, Pakistan, Afghanistan, Yemen and Somalia illustrate this volatile relationship between military occupations or aerial strikes into sovereign territory and violent mobilization. As long as there are local and regional jihadist fronts, global jihadist actors will have access to resources that they can direct against the "far enemy."
Second, the multiplicity of grievances and narratives espoused by local, regional and global actors creates numerous radicalization and mobilization pathways into any one conflict zone. This can facilitate radicalization and the reorientation of individuals such as Najibullah Zazi, who left the United States with his two co‐ conspirators to join the Taliban and defend Afghanistan against U.S. occupation, but who was identified by al‐Qa'ida's external operations cell, trained, and sent back to
16 Hegghammer, Thomas. 2008. "Islamist violence and regime stability in Saudi Arabia." International Affairs, 84(4).
the United States to plot suicide attacks against the New York City subway system. Zazi was not primed to target American civilians when he entered into this militant ecosystem, but the geographic colocation of local and global jihadist organizations enabled that eventuality.
Third, the harmonization of parochial and cosmic narratives by al‐Qa'ida's propaganda organ, and similar propaganda nodes run by affiliated organizations, helps conflate actions on the ground, increasing the chances that Western interests will be targeted in foreign settings. The threat against the Sochi Olympics cited above is a timely example.
Fourth, the propagation of global jihadist ideas through personal contact with jihadist veterans and the propagation of jihadism online help to inspire a new cohort of inspired individuals who are prepared to take action without ever having joined a formal organization, or in some cases, without ever having met, face to face, another like‐minded individual. This threat was bolstered by the endorsement of lone‐actor jihadism by al‐Qa'ida Core and al‐Qa'ida in the Arabian Peninsula following the Fort Hood attack, and consistently thereafter by English‐language media such as Inspire Magazine.
Conclusion
The death of the 21 st century's first super‐empowered individual, Usama bin Ladin, lead to broad reflection about the viability of his organization and its place in a changing political landscape. Underscoring al‐Qa'ida's failure to generate widespread support for both the ends (severing of ties between the West and the Muslim world and reestablishment of the caliphate) and means (attrition by way of violence) of its campaign, early Arab‐Spring protestors mostly acted peacefully and
within the parameters of the international system that al‐Qa'ida sought to overthrow. Control of the nation‐state, not its dissolution, remained the goal of popular protests.
Yet in the wake of this political turmoil, extant violent groups persist, new violent groups have emerged, and global terrorism has reached its modern apex. While many violent groups coalesced around a local agenda without any impetus from the al‐Qa'ida organization, al‐Qa'ida's long‐running propagation of global jihadism and its vilification of the West has influenced these militant organizations to varying degrees. As a result, in contested regions far from al‐Qa'ida's geographic center of gravity, violence targeting both local Muslim populations and far‐enemy targets persists making the resulting mix of jihadist violence more difficult to disentangle. Moreover, jihadist violence often occurs in places where anti‐American sentiment is significant, creating the very real risk that American audiences will conflate the two.
The interplay of local, regional and global actors presents a new political reality that counterterrorism professionals continue to address. This condition will persist to varying degrees even if the al‐Qa'ida organization fails to recover from the withering attacks made against it in recent years. While the al‐Qa'ida of the 1990s was a corporate entity, albeit a highly networked one, it is no longer always useful to identify where the al‐Qa'ida organization ends and others begin.
Sophisticated counterterrorism policy must minimize the effects of global jihadism without inciting local and regional groups to take up its cause, and without allowing al‐Qa'ida to erode the nation's political will to remain engaged with the Muslim world. This requires an understanding of the jihadist narrative, the ability to distinguish it from political Islam and anti‐American sentiment, as well as an understanding of the specific history that allows al‐ Qa'ida to enable the violence of others in so many regions of the world.
It would be dangerous to conclude that because the al‐Qa'ida organization is not generating violent attacks itself, that the attrition strategy fostered by the organization is also ineffectual. These have been the most lethal two years in the history of modern terrorism, and al‐Qa'ida remains at the historical, organizational, and ideological center of the most dangerous terrorist threats of our time.
|
<urn:uuid:c7725509-4ef4-4177-be4c-91f3e48d7e6d>
|
CC-MAIN-2018-26
|
https://www.start.umd.edu/pubs/STARTCongressionalTestimony_StateofAQandAffiliates_WilliamBraniff.pdf
|
2018-06-22T05:51:49Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864354.27/warc/CC-MAIN-20180622045658-20180622065658-00264.warc.gz
| 926,101,801
| 4,958
|
eng_Latn
|
eng_Latn
| 0.969418
|
eng_Latn
| 0.995982
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
290,
3747,
6234,
8479,
8663,
10738,
12749,
14767,
15473,
17465,
19569,
21298,
22801,
23745
] |
House Armed Services Committee "The State of Al‐Qaeda, its Affiliates, and Associated Groups: View from Outside Experts"
Testimony of William Braniff Executive Director National Consortium for the Study of Terrorism and Responses to Terrorism (START) University of Maryland 4 February 2014
Chairman McKeon, Ranking Member Smith, and esteemed members of the committee, I would like to thank you on behalf of the National Consortium for the Study of Terrorism and Responses to Terrorism, known as START, 1 for inviting us to speak with you today. I've been asked to reflect on the "State of al‐Qa'ida its Affiliates and Associated Groups." There is, unfortunately, much to say.
Data
In 2012, the most recent year for which START has provided a complete set of global terrorism data to the Department of State for its Congressionally‐mandated Country Reports on Terrorism, more than 6,800 terrorist attacks killed more than 11,000 people. 2 Even if you compare these more conservative 2012 figures provided to the Department of State against the more inclusive Global Terrorism Database (GTD) statistics dating back to 1970, the previous record for number of attacks was set in 2011 with more than 5,000 incidents. 3,4 This makes 2012 the most active year of terrorism on record.
1 START is supported in part by the Science and Technology Directorate Office of University Programs of the U.S. Department of Homeland Security through a Center of Excellence program based at the University of Maryland. START uses state‐of‐the‐art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. 2 It is important to note that incidents had to meet all six inclusion criteria used by START's Global Terrorism Database to be included as a terrorist incident in the Statistical Annex of the Country Reports on Terrorism 2012. However, the Global Terrorism Database itself requires only five of six criteria be satisfied for an event to be included giving the varying definitions of terrorism and to provide flexibility for those who use GTD for different analytical and operational purposes. Specifically, START includes incidents that meet three mandatory
1. The violent act was aimed at attaining a political, economic, religious, or social goal;
criteria and then two of the three following additional criteria:
2. The violent act included evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) other than the immediate victims; and
Therefore, the GTD includes a greater number of terrorist incidents than the dataset provided to the Department of State for the Country Reports on Terrorism 2012. If the GTD's inclusion standards are applied to 2012 data, 8,400 terrorist attacks killed more than 15,400 people. By either measure, 2012 is the most active year of terrorism on record.
3. The violent act was outside the precepts of International Humanitarian Law insofar as it targeted non-combatants.
3 It is critical to note that beginning with 2012 data collection, START made several important changes to the GTD collection methodology, improving the efficiency and comprehensiveness of the process. As a result of these improvements, a direct comparison between 2011 and 2012 likely overstates the increase in total attacks and fatalities worldwide during this time period. However, analysis of the data indicates that this increase began before the shift in data collection methodology, and important developments in key conflicts around the world suggest that considerable upward trends remain even when accounting for the possibility of methodological artifacts.
Strikingly, it could be argued that the six most lethal groups in 2012 were all part of "al‐ Qa'ida and its Associated Movement," a phrase used to simplify a very dynamic landscape of violent organizations and individuals. Using data provided to the Department of State, these groups were attributed responsibility for approximately 5,000 fatalities: the Taliban (more than 2,000 fatalities), Boko Haram (more than 1,100 fatalities), al‐Qa'ida in Iraq (more than 830 fatalities), Tehrik‐e Taliban Pakistan (more than 500 fatalities), al‐Qa'ida in the Arabian Peninsula (more than 280 fatalities), and al‐Shabaab (more than 280 fatalities). 5
Based on preliminary terrorism incident data for January through June of 2013, and again using the Department of State's inclusion standards, the eight most lethal organizations in that time‐period include the Taliban, al‐Qa'ida in Iraq, Tehrik‐i‐Taliban Pakistan, Boko Haram, Lashkar‐e‐Jhangvi, al‐Nusrah Front, al‐Shabaab, and al‐Mua'qi'oon Biddam Brigade. These preliminary data reinforce the hypothesis that groups generally associated with al‐ Qa'ida remain the most lethal groups in the world.
Notably, al‐Qa'ida itself was not directly responsible for any attacks in 2012 or the first six months of 2013 for which we have preliminary data. To help interpret these data on terrorist groups, I turned to a START research project funded by the Department of Homeland Security Science and Technology Directorate's Office of University Programs, the Big Allied and Dangerous (BAAD) project, led by Victor Asal and Karl Rethemeyer. 6 This project has demonstrated empirically that organizations with greater numbers of alliance
4 I am indebted to Erin Miller and the entire Global Terrorism Database team, as well as primary investigators Gary LaFree and Laura Dugan (University of Maryland) for the rigor and objectivity undergirding this terrorism incident data.
6 I am indebted to Victor Asal and Karl Rethemeyer, START researchers at the University at Albany – SUNY, who conducted this preliminary analysis and generated the associated graphic for the purpose of this testimony.
5 Using the more inclusive GTD inclusion standards, these include the Taliban (more than 2,500 fatalities), Boko Haram (more than 1,200 fatalities), al-Qa'ida in the Arabian Peninsula (more than 960 fatalities), Tehrike Taliban Pakistan (more than 950 fatalities), al-Qa'ida in Iraq (more than 930 fatalities) and al-Shabaab (more than 700 fatalities).
connections to other terrorist organizations demonstrate greater lethality on average 7 and are more likely to use or pursue chemical, biological, nuclear, or radiological weapons. 8
Using preliminary data through 2012 that is currently going through a quality control process, it appears that 12 of the top 20 most lethal organizations have alliance connections to al‐Qa'ida and 10 of the top 20 most active organizations (measured by number of terrorist attacks recorded in the GTD) also have alliance connections to al‐ Qa'ida 9 (see the figure on the next page). 10 While al‐Qa'ida did not make the list of the top 20 most lethal or active organizations in 2012, all data suggest it remains a central hub in a network of highly lethal and active terrorist organizations.
Please see the "Network Connections and Lethality" figure on the next page.
7 Asal, Victor, and R. Karl Rethemeyer. 2008. "The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality." Journal of Politics, 70(2): 437-449.
8
Organizational Factors and the Pursuit of CBRN Weapons
Asal, Victor, Gary Ackerman, and R. Karl Rethemeyer. 2012. Connections Can Be Toxic: Terrorist
9 Alliance connections can be categorized according to six types of inter-group connections: "alliance,"
Studies in Terrorism and Conflict35:229–254.
"suspected alliance," "umbrella," "suspected umbrella," supported cause, and "joint claims for attacks." Alliances or suspected alliances are reports of cooperation of any form. Umbrella relationships or suspected umbrella relationships exist when one organization speaks and/or acts on behalf of other organizations. Supported cause is public rhetorical support for a given organization.
10 Red nodes represent organizations that were in the top 20 in terms of fatalities, incidents, or both in 2012. Blue nodes connected to other nodes represent all other organizations with a least one alliance or connection in 2012. Isolated blue and red nodes had no alliance connections with other organizations. The larger the node, the more fatalities are attributed to the organization in 2012 by the GTD. This map is only for 2012; it does not reflect past alliance connections or past terrorist activity.
www.start.umd.edu
Network Connections and Lethality
Source: Big Allied and Dangerous Dataset II (BAAD II)
Primary Investigators: Victor Asal and Karl Rethemeyer, University at Albany
Analysis 11
As a result of the absence of al‐Qa'ida Core attacks in 2012 and the first six months of 2013, the al‐Qa'ida organization rarely captures media attention except when another important cadre member is killed or captured. Instead, observers now ponder the meaning of the continuous or frequently increasing levels of violence from other violent jihadist groups in the context of a post Arab‐Spring world. This is despite the fact that the various narratives of the Arab Spring seemed to undermine al‐Qa'ida's reliance on violence and its call to reestablish the caliphate as the governing structure for the Muslim nation. Additionally, individuals continue to join jihadist groups or plot violent attacks of their own volition.
What should we take from the seemingly contradictory developments of a popular rejection of al‐Qa'ida on the world stage just a few years ago, and record‐setting levels of jihadist violence over the last two years? Did al‐Qa'ida succeed by inspiring widespread jihadism, or has it lost to a variety of more popular, parochial actors? To address these questions, it is essential to understand al‐Qa'ida's origins and its place in the broader Islamist landscape; only in context can the seeming decline of the al‐Qa'ida organization and the persistence of violent jihadism be understood and can governments formulate policy for an expansive threat environment beyond al‐ Qa'ida Core.
The failure of local jihadist groups to successfully topple corrupt Muslim rulers, the "near enemy," and regionally‐oriented irredentist groups to reclaim political control of occupied territory has been a source of frustration since the 1970s. Following Usama bin Ladin's failure to convince the Government of Saudi Arabia to allow his community of jihadist veterans to protect the Arabian Peninsula from Saddam
11 Much of this section of testimony is a synthesis of the research and educational efforts of the Combating Terrorism Center at West Point, and specifically the team of instructors that comprised the Practitioner Education Program.
Hussein's Bathist military, al‐Qa'ida formulated the master narrative that would underpin the next 20 years of ideological and operational output as follows:
The reason that the Royal Family would not allow the mujahidin to defend Mecca and Medina from Iraq's advance was the same reason that local and irredentist jihadist groups elsewhere had failed in their parochial contests. The regimes were illegitimate proxies of foreign powers, and behind each of these puppet regimes was the military and economic aid of the "far‐enemy." Led by the United States, the far enemy pulled the strings across the Muslim world for their own imperial purposes and to undermine Islam.
Al‐Qa'ida's grand strategy would emerge from this diagnosis; al‐Qa'ida would enable and repurpose the violence of other militant actors to erode the political, economic, and military will of the United States to remain engaged in the Muslim world. If al‐ Qa'ida's geographically distributed attrition warfare could sever the ties between what it regarded as the puppet‐master and the puppets, revolutionary local and regional jihadist campaigns could reestablish Islamic governance for the Muslim nation, one emirate at a time, until the caliphate could be reestablished.
To realize this grand‐strategy, al‐Qa'ida positioned itself at the conceptual center of the global jihadist landscape, helping to create the multi‐faceted threat that has since manifested in at least four ways.
1. Al‐Qa'ida exploited interpersonal and inter‐organizational relationships created during the anti‐Soviet jihad and inserted itself into extant violent campaigns beginning in the 1990s and continuing until today. It provided martial and ideological training, financing, and propaganda support when it did not also engage directly in violence, as was the case in the Arabian Peninsula in the early 1990s, the mid 2000s, and remains the case today under the aegis of al‐Qa'ida in the Arabian Peninsula (AQAP) and front groups such as Ansar al‐Sharia.
The penchant for global jihadist actors to reorient and enable the violence of foreign fighters and segments of existing organizations often creates tensions among the jihadist factions, or between the local populace and the militant actors, as we have seen in Iraq, Somalia and now Syria. As a result, al‐Qa'ida rarely succeeds in retaining popular support among the populace over time or reorienting jihadist groups en toto to their tactical and targeting preferences. However, they frequently achieve partial successes that amplify al‐Qa'ida's operational reach far beyond their organizational safe haven in North Waziristan.
2. Similarly, veterans of the anti‐Soviet jihad returned to locally and regionally‐ oriented groups indoctrinated with a globalized understanding of their respective conflicts. This infusion of global jihadist thought occurred in regions as culturally disparate as Southeast Asia and the Caucasus, where individuals like Ibn al‐Khattab helped to retool the ethno nationalist separatist movement in Chechnya as a religious conflict, fostering a spiral of increasingly violent tactics between Russian and Chechen forces during the second Chechen war. Russia would eventually displace the violence in Chechnya to nearby regions including Dagestan, Ingushetia, Kabardino‐Balkariya, and North Ossetia‐Alania, in which a number of terrorist groups also adopted the symbols and spectacular tactics of global jihadism. It was this injection and ultimate embrace of global jihadism over several decades that created the threat facing the upcoming Sochi Olympics.
A recent START background report introduces the threat as follows: 12
Two suicide bombings in December targeted a train station and trolleybus in Volgograd, Russia, killing at least 34 people and wounding many more. The
12 Miller, Erin. 2014. "Background Report: Terrorism and the Olympics: Sochi, Russia 2014." START (January). http://www.start.umd.edu/pubs/STARTBackgroundReport_TerrorisminOlympicsSochiRussia_Jan2014_0.pdf.
attacks, which took place approximately 400 miles from Sochi, highlight the potential threat of terrorist violence at the 2014 Winter Games. The militant group Vilayat Dagestan, part of the Caucasus Emirate, claimed responsibility for the Volgograd attacks. A statement made by the group threatens that if the Winter Olympics are held, the group will carry out additional attacks, particularly targeting tourists in retaliation for "the Muslim blood that is shed every day around the world, be it in Afghanistan, Somalia, Syria, all around the world." 13
Attacking international tourists at the Olympics and Russian civilians in Volgograd are equated; they are portrayed as two facets of the same fight.
3. Many of the highly networked veterans of the anti‐Soviet jihad encouraged their respective organizations to establish a physical presence in other jihadist fronts as well, capitalizing on the associated ideological legitimacy for recruitment, access to training and battlefield experience, and access to fundraising and equipment pipelines pouring resources into those conflict zones. This phenomenon furthered the globalization of jihadism started during the anti‐ Soviet jihad.
For example, Algerian jihadist groups participated in Bosnia and then Iraq, creating the relationships that would eventually lead to the reincarnation of the Salafist Group for Preaching and Combat (GSPC) as al‐Qa'ida in the Islamic Maghreb (AQIM). 14 After civil war erupted in Libya in 2011, it was not a departure from historical precedent when al‐Qa'ida emir Ayman al‐Zawahiri encouraged the AQIM network to syphon resources flowing into Libya for their own violent purposes across North Africa. Neither is it unusual that Mokhtar Belmokhtar, an AQIM commander and veteran of the anti‐Soviet jihad, has recently united his AQIM brigade with the Movement for Unity and Jihad in West Africa to create a new jihadist umbrella organization on the heels of French intervention in Mali. This new organization, al‐Murabitun, paid homage to al‐ Qa'ida's emir, Ayman al‐Zawahiri, and stated its intent to unite jihadist groups across the Sahel and North Africa as an emirate akin to the storied Muslim empire which controlled al‐Andalus and fought successfully to delay Europe's Reconquista of the Iberian Peninsula. 15
14 Brown, Vahid. 2010. "Al-Qa'ida Central and Local Affiliates." In Self-Inflicted Wounds: Debates and Divisions within al-Qa'ida and its Periphery, eds. Assaf Moghadam and Brian Fishman. Combating Terrorism Center at West Point.
15 Cristiani, Dario. 2013. "Al-Murabitun: North Africa's Jihadists Reach into Hisotry in the Battle against European 'Crusaders.'" Terrorism Monitor, 11(19).
4. Finally, al‐Qa'ida was forced to invest significant resources into virtual activities following the loss of its training camps in Afghanistan after September 11, 2001, and because of its inability to control the operational and media output of al‐ Qa'ida in Iraq. While al‐Qa'ida's online communication architecture allowed it to interact with a geographically dispersed community and to protect its brand, it also created an environment where countless organizations and individuals could voice competing and complimentary ideas. The virtual landscape quickly became a place where local, regional and global forms of jihadism overlapped for a geographically, ideologically, and strategically diverse audience.
Taken as a whole, the increasingly international and intertwined histories of local, regional and global jihadist actors have at least four salient consequences.
First, and most significantly, the global jihadist cause often benefits from resources mobilized for the purpose of defensive or classical jihad – a concept far easier to justify politically and religiously than the offensive jihad practiced by global jihadists. 16 Iraq, Pakistan, Afghanistan, Yemen and Somalia illustrate this volatile relationship between military occupations or aerial strikes into sovereign territory and violent mobilization. As long as there are local and regional jihadist fronts, global jihadist actors will have access to resources that they can direct against the "far enemy."
Second, the multiplicity of grievances and narratives espoused by local, regional and global actors creates numerous radicalization and mobilization pathways into any one conflict zone. This can facilitate radicalization and the reorientation of individuals such as Najibullah Zazi, who left the United States with his two co‐ conspirators to join the Taliban and defend Afghanistan against U.S. occupation, but who was identified by al‐Qa'ida's external operations cell, trained, and sent back to
16 Hegghammer, Thomas. 2008. "Islamist violence and regime stability in Saudi Arabia." International Affairs, 84(4).
the United States to plot suicide attacks against the New York City subway system. Zazi was not primed to target American civilians when he entered into this militant ecosystem, but the geographic colocation of local and global jihadist organizations enabled that eventuality.
Third, the harmonization of parochial and cosmic narratives by al‐Qa'ida's propaganda organ, and similar propaganda nodes run by affiliated organizations, helps conflate actions on the ground, increasing the chances that Western interests will be targeted in foreign settings. The threat against the Sochi Olympics cited above is a timely example.
Fourth, the propagation of global jihadist ideas through personal contact with jihadist veterans and the propagation of jihadism online help to inspire a new cohort of inspired individuals who are prepared to take action without ever having joined a formal organization, or in some cases, without ever having met, face to face, another like‐minded individual. This threat was bolstered by the endorsement of lone‐actor jihadism by al‐Qa'ida Core and al‐Qa'ida in the Arabian Peninsula following the Fort Hood attack, and consistently thereafter by English‐language media such as Inspire Magazine.
Conclusion
The death of the 21 st century's first super‐empowered individual, Usama bin Ladin, lead to broad reflection about the viability of his organization and its place in a changing political landscape. Underscoring al‐Qa'ida's failure to generate widespread support for both the ends (severing of ties between the West and the Muslim world and reestablishment of the caliphate) and means (attrition by way of violence) of its campaign, early Arab‐Spring protestors mostly acted peacefully and
within the parameters of the international system that al‐Qa'ida sought to overthrow. Control of the nation‐state, not its dissolution, remained the goal of popular protests.
Yet in the wake of this political turmoil, extant violent groups persist, new violent groups have emerged, and global terrorism has reached its modern apex. While many violent groups coalesced around a local agenda without any impetus from the al‐Qa'ida organization, al‐Qa'ida's long‐running propagation of global jihadism and its vilification of the West has influenced these militant organizations to varying degrees. As a result, in contested regions far from al‐Qa'ida's geographic center of gravity, violence targeting both local Muslim populations and far‐enemy targets persists making the resulting mix of jihadist violence more difficult to disentangle. Moreover, jihadist violence often occurs in places where anti‐American sentiment is significant, creating the very real risk that American audiences will conflate the two.
The interplay of local, regional and global actors presents a new political reality that counterterrorism professionals continue to address. This condition will persist to varying degrees even if the al‐Qa'ida organization fails to recover from the withering attacks made against it in recent years. While the al‐Qa'ida of the 1990s was a corporate entity, albeit a highly networked one, it is no longer always useful to identify where the al‐Qa'ida organization ends and others begin.
Sophisticated counterterrorism policy must minimize the effects of global jihadism without inciting local and regional groups to take up its cause, an
|
d without allowing al‐Qa'ida to erode the nation's political will to remain engaged with the Muslim world.
|
This requires an understanding of the jihadist narrative, the ability to distinguish it from political Islam and anti‐American sentiment, as well as an understanding of the specific history that allows al‐ Qa'ida to enable the violence of others in so many regions of the world.
It would be dangerous to conclude that because the al‐Qa'ida organization is not generating violent attacks itself, that the attrition strategy fostered by the organization is also ineffectual. These have been the most lethal two years in the history of modern terrorism, and al‐Qa'ida remains at the historical, organizational, and ideological center of the most dangerous terrorist threats of our time.
| 22,953
|
inside_word
|
and
|
remove_one_sentence
|
<url>
https://www.start.umd.edu/pubs/STARTCongressionalTestimony_StateofAQandAffiliates_WilliamBraniff.pdf
</url>
<text>
House Armed Services Committee "The State of Al‐Qaeda, its Affiliates, and Associated Groups: View from Outside Experts"
Testimony of William Braniff Executive Director National Consortium for the Study of Terrorism and Responses to Terrorism (START) University of Maryland 4 February 2014
Chairman McKeon, Ranking Member Smith, and esteemed members of the committee, I would like to thank you on behalf of the National Consortium for the Study of Terrorism and Responses to Terrorism, known as START, 1 for inviting us to speak with you today. I've been asked to reflect on the "State of al‐Qa'ida its Affiliates and Associated Groups." There is, unfortunately, much to say.
Data
In 2012, the most recent year for which START has provided a complete set of global terrorism data to the Department of State for its Congressionally‐mandated Country Reports on Terrorism, more than 6,800 terrorist attacks killed more than 11,000 people. 2 Even if you compare these more conservative 2012 figures provided to the Department of State against the more inclusive Global Terrorism Database (GTD) statistics dating back to 1970, the previous record for number of attacks was set in 2011 with more than 5,000 incidents. 3,4 This makes 2012 the most active year of terrorism on record.
1 START is supported in part by the Science and Technology Directorate Office of University Programs of the U.S. Department of Homeland Security through a Center of Excellence program based at the University of Maryland. START uses state‐of‐the‐art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. 2 It is important to note that incidents had to meet all six inclusion criteria used by START's Global Terrorism Database to be included as a terrorist incident in the Statistical Annex of the Country Reports on Terrorism 2012. However, the Global Terrorism Database itself requires only five of six criteria be satisfied for an event to be included giving the varying definitions of terrorism and to provide flexibility for those who use GTD for different analytical and operational purposes. Specifically, START includes incidents that meet three mandatory
1. The violent act was aimed at attaining a political, economic, religious, or social goal;
criteria and then two of the three following additional criteria:
2. The violent act included evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) other than the immediate victims; and
Therefore, the GTD includes a greater number of terrorist incidents than the dataset provided to the Department of State for the Country Reports on Terrorism 2012. If the GTD's inclusion standards are applied to 2012 data, 8,400 terrorist attacks killed more than 15,400 people. By either measure, 2012 is the most active year of terrorism on record.
3. The violent act was outside the precepts of International Humanitarian Law insofar as it targeted non-combatants.
3 It is critical to note that beginning with 2012 data collection, START made several important changes to the GTD collection methodology, improving the efficiency and comprehensiveness of the process. As a result of these improvements, a direct comparison between 2011 and 2012 likely overstates the increase in total attacks and fatalities worldwide during this time period. However, analysis of the data indicates that this increase began before the shift in data collection methodology, and important developments in key conflicts around the world suggest that considerable upward trends remain even when accounting for the possibility of methodological artifacts.
Strikingly, it could be argued that the six most lethal groups in 2012 were all part of "al‐ Qa'ida and its Associated Movement," a phrase used to simplify a very dynamic landscape of violent organizations and individuals. Using data provided to the Department of State, these groups were attributed responsibility for approximately 5,000 fatalities: the Taliban (more than 2,000 fatalities), Boko Haram (more than 1,100 fatalities), al‐Qa'ida in Iraq (more than 830 fatalities), Tehrik‐e Taliban Pakistan (more than 500 fatalities), al‐Qa'ida in the Arabian Peninsula (more than 280 fatalities), and al‐Shabaab (more than 280 fatalities). 5
Based on preliminary terrorism incident data for January through June of 2013, and again using the Department of State's inclusion standards, the eight most lethal organizations in that time‐period include the Taliban, al‐Qa'ida in Iraq, Tehrik‐i‐Taliban Pakistan, Boko Haram, Lashkar‐e‐Jhangvi, al‐Nusrah Front, al‐Shabaab, and al‐Mua'qi'oon Biddam Brigade. These preliminary data reinforce the hypothesis that groups generally associated with al‐ Qa'ida remain the most lethal groups in the world.
Notably, al‐Qa'ida itself was not directly responsible for any attacks in 2012 or the first six months of 2013 for which we have preliminary data. To help interpret these data on terrorist groups, I turned to a START research project funded by the Department of Homeland Security Science and Technology Directorate's Office of University Programs, the Big Allied and Dangerous (BAAD) project, led by Victor Asal and Karl Rethemeyer. 6 This project has demonstrated empirically that organizations with greater numbers of alliance
4 I am indebted to Erin Miller and the entire Global Terrorism Database team, as well as primary investigators Gary LaFree and Laura Dugan (University of Maryland) for the rigor and objectivity undergirding this terrorism incident data.
6 I am indebted to Victor Asal and Karl Rethemeyer, START researchers at the University at Albany – SUNY, who conducted this preliminary analysis and generated the associated graphic for the purpose of this testimony.
5 Using the more inclusive GTD inclusion standards, these include the Taliban (more than 2,500 fatalities), Boko Haram (more than 1,200 fatalities), al-Qa'ida in the Arabian Peninsula (more than 960 fatalities), Tehrike Taliban Pakistan (more than 950 fatalities), al-Qa'ida in Iraq (more than 930 fatalities) and al-Shabaab (more than 700 fatalities).
connections to other terrorist organizations demonstrate greater lethality on average 7 and are more likely to use or pursue chemical, biological, nuclear, or radiological weapons. 8
Using preliminary data through 2012 that is currently going through a quality control process, it appears that 12 of the top 20 most lethal organizations have alliance connections to al‐Qa'ida and 10 of the top 20 most active organizations (measured by number of terrorist attacks recorded in the GTD) also have alliance connections to al‐ Qa'ida 9 (see the figure on the next page). 10 While al‐Qa'ida did not make the list of the top 20 most lethal or active organizations in 2012, all data suggest it remains a central hub in a network of highly lethal and active terrorist organizations.
Please see the "Network Connections and Lethality" figure on the next page.
7 Asal, Victor, and R. Karl Rethemeyer. 2008. "The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality." Journal of Politics, 70(2): 437-449.
8
Organizational Factors and the Pursuit of CBRN Weapons
Asal, Victor, Gary Ackerman, and R. Karl Rethemeyer. 2012. Connections Can Be Toxic: Terrorist
9 Alliance connections can be categorized according to six types of inter-group connections: "alliance,"
Studies in Terrorism and Conflict35:229–254.
"suspected alliance," "umbrella," "suspected umbrella," supported cause, and "joint claims for attacks." Alliances or suspected alliances are reports of cooperation of any form. Umbrella relationships or suspected umbrella relationships exist when one organization speaks and/or acts on behalf of other organizations. Supported cause is public rhetorical support for a given organization.
10 Red nodes represent organizations that were in the top 20 in terms of fatalities, incidents, or both in 2012. Blue nodes connected to other nodes represent all other organizations with a least one alliance or connection in 2012. Isolated blue and red nodes had no alliance connections with other organizations. The larger the node, the more fatalities are attributed to the organization in 2012 by the GTD. This map is only for 2012; it does not reflect past alliance connections or past terrorist activity.
www.start.umd.edu
Network Connections and Lethality
Source: Big Allied and Dangerous Dataset II (BAAD II)
Primary Investigators: Victor Asal and Karl Rethemeyer, University at Albany
Analysis 11
As a result of the absence of al‐Qa'ida Core attacks in 2012 and the first six months of 2013, the al‐Qa'ida organization rarely captures media attention except when another important cadre member is killed or captured. Instead, observers now ponder the meaning of the continuous or frequently increasing levels of violence from other violent jihadist groups in the context of a post Arab‐Spring world. This is despite the fact that the various narratives of the Arab Spring seemed to undermine al‐Qa'ida's reliance on violence and its call to reestablish the caliphate as the governing structure for the Muslim nation. Additionally, individuals continue to join jihadist groups or plot violent attacks of their own volition.
What should we take from the seemingly contradictory developments of a popular rejection of al‐Qa'ida on the world stage just a few years ago, and record‐setting levels of jihadist violence over the last two years? Did al‐Qa'ida succeed by inspiring widespread jihadism, or has it lost to a variety of more popular, parochial actors? To address these questions, it is essential to understand al‐Qa'ida's origins and its place in the broader Islamist landscape; only in context can the seeming decline of the al‐Qa'ida organization and the persistence of violent jihadism be understood and can governments formulate policy for an expansive threat environment beyond al‐ Qa'ida Core.
The failure of local jihadist groups to successfully topple corrupt Muslim rulers, the "near enemy," and regionally‐oriented irredentist groups to reclaim political control of occupied territory has been a source of frustration since the 1970s. Following Usama bin Ladin's failure to convince the Government of Saudi Arabia to allow his community of jihadist veterans to protect the Arabian Peninsula from Saddam
11 Much of this section of testimony is a synthesis of the research and educational efforts of the Combating Terrorism Center at West Point, and specifically the team of instructors that comprised the Practitioner Education Program.
Hussein's Bathist military, al‐Qa'ida formulated the master narrative that would underpin the next 20 years of ideological and operational output as follows:
The reason that the Royal Family would not allow the mujahidin to defend Mecca and Medina from Iraq's advance was the same reason that local and irredentist jihadist groups elsewhere had failed in their parochial contests. The regimes were illegitimate proxies of foreign powers, and behind each of these puppet regimes was the military and economic aid of the "far‐enemy." Led by the United States, the far enemy pulled the strings across the Muslim world for their own imperial purposes and to undermine Islam.
Al‐Qa'ida's grand strategy would emerge from this diagnosis; al‐Qa'ida would enable and repurpose the violence of other militant actors to erode the political, economic, and military will of the United States to remain engaged in the Muslim world. If al‐ Qa'ida's geographically distributed attrition warfare could sever the ties between what it regarded as the puppet‐master and the puppets, revolutionary local and regional jihadist campaigns could reestablish Islamic governance for the Muslim nation, one emirate at a time, until the caliphate could be reestablished.
To realize this grand‐strategy, al‐Qa'ida positioned itself at the conceptual center of the global jihadist landscape, helping to create the multi‐faceted threat that has since manifested in at least four ways.
1. Al‐Qa'ida exploited interpersonal and inter‐organizational relationships created during the anti‐Soviet jihad and inserted itself into extant violent campaigns beginning in the 1990s and continuing until today. It provided martial and ideological training, financing, and propaganda support when it did not also engage directly in violence, as was the case in the Arabian Peninsula in the early 1990s, the mid 2000s, and remains the case today under the aegis of al‐Qa'ida in the Arabian Peninsula (AQAP) and front groups such as Ansar al‐Sharia.
The penchant for global jihadist actors to reorient and enable the violence of foreign fighters and segments of existing organizations often creates tensions among the jihadist factions, or between the local populace and the militant actors, as we have seen in Iraq, Somalia and now Syria. As a result, al‐Qa'ida rarely succeeds in retaining popular support among the populace over time or reorienting jihadist groups en toto to their tactical and targeting preferences. However, they frequently achieve partial successes that amplify al‐Qa'ida's operational reach far beyond their organizational safe haven in North Waziristan.
2. Similarly, veterans of the anti‐Soviet jihad returned to locally and regionally‐ oriented groups indoctrinated with a globalized understanding of their respective conflicts. This infusion of global jihadist thought occurred in regions as culturally disparate as Southeast Asia and the Caucasus, where individuals like Ibn al‐Khattab helped to retool the ethno nationalist separatist movement in Chechnya as a religious conflict, fostering a spiral of increasingly violent tactics between Russian and Chechen forces during the second Chechen war. Russia would eventually displace the violence in Chechnya to nearby regions including Dagestan, Ingushetia, Kabardino‐Balkariya, and North Ossetia‐Alania, in which a number of terrorist groups also adopted the symbols and spectacular tactics of global jihadism. It was this injection and ultimate embrace of global jihadism over several decades that created the threat facing the upcoming Sochi Olympics.
A recent START background report introduces the threat as follows: 12
Two suicide bombings in December targeted a train station and trolleybus in Volgograd, Russia, killing at least 34 people and wounding many more. The
12 Miller, Erin. 2014. "Background Report: Terrorism and the Olympics: Sochi, Russia 2014." START (January). http://www.start.umd.edu/pubs/STARTBackgroundReport_TerrorisminOlympicsSochiRussia_Jan2014_0.pdf.
attacks, which took place approximately 400 miles from Sochi, highlight the potential threat of terrorist violence at the 2014 Winter Games. The militant group Vilayat Dagestan, part of the Caucasus Emirate, claimed responsibility for the Volgograd attacks. A statement made by the group threatens that if the Winter Olympics are held, the group will carry out additional attacks, particularly targeting tourists in retaliation for "the Muslim blood that is shed every day around the world, be it in Afghanistan, Somalia, Syria, all around the world." 13
Attacking international tourists at the Olympics and Russian civilians in Volgograd are equated; they are portrayed as two facets of the same fight.
3. Many of the highly networked veterans of the anti‐Soviet jihad encouraged their respective organizations to establish a physical presence in other jihadist fronts as well, capitalizing on the associated ideological legitimacy for recruitment, access to training and battlefield experience, and access to fundraising and equipment pipelines pouring resources into those conflict zones. This phenomenon furthered the globalization of jihadism started during the anti‐ Soviet jihad.
For example, Algerian jihadist groups participated in Bosnia and then Iraq, creating the relationships that would eventually lead to the reincarnation of the Salafist Group for Preaching and Combat (GSPC) as al‐Qa'ida in the Islamic Maghreb (AQIM). 14 After civil war erupted in Libya in 2011, it was not a departure from historical precedent when al‐Qa'ida emir Ayman al‐Zawahiri encouraged the AQIM network to syphon resources flowing into Libya for their own violent purposes across North Africa. Neither is it unusual that Mokhtar Belmokhtar, an AQIM commander and veteran of the anti‐Soviet jihad, has recently united his AQIM brigade with the Movement for Unity and Jihad in West Africa to create a new jihadist umbrella organization on the heels of French intervention in Mali. This new organization, al‐Murabitun, paid homage to al‐ Qa'ida's emir, Ayman al‐Zawahiri, and stated its intent to unite jihadist groups across the Sahel and North Africa as an emirate akin to the storied Muslim empire which controlled al‐Andalus and fought successfully to delay Europe's Reconquista of the Iberian Peninsula. 15
14 Brown, Vahid. 2010. "Al-Qa'ida Central and Local Affiliates." In Self-Inflicted Wounds: Debates and Divisions within al-Qa'ida and its Periphery, eds. Assaf Moghadam and Brian Fishman. Combating Terrorism Center at West Point.
15 Cristiani, Dario. 2013. "Al-Murabitun: North Africa's Jihadists Reach into Hisotry in the Battle against European 'Crusaders.'" Terrorism Monitor, 11(19).
4. Finally, al‐Qa'ida was forced to invest significant resources into virtual activities following the loss of its training camps in Afghanistan after September 11, 2001, and because of its inability to control the operational and media output of al‐ Qa'ida in Iraq. While al‐Qa'ida's online communication architecture allowed it to interact with a geographically dispersed community and to protect its brand, it also created an environment where countless organizations and individuals could voice competing and complimentary ideas. The virtual landscape quickly became a place where local, regional and global forms of jihadism overlapped for a geographically, ideologically, and strategically diverse audience.
Taken as a whole, the increasingly international and intertwined histories of local, regional and global jihadist actors have at least four salient consequences.
First, and most significantly, the global jihadist cause often benefits from resources mobilized for the purpose of defensive or classical jihad – a concept far easier to justify politically and religiously than the offensive jihad practiced by global jihadists. 16 Iraq, Pakistan, Afghanistan, Yemen and Somalia illustrate this volatile relationship between military occupations or aerial strikes into sovereign territory and violent mobilization. As long as there are local and regional jihadist fronts, global jihadist actors will have access to resources that they can direct against the "far enemy."
Second, the multiplicity of grievances and narratives espoused by local, regional and global actors creates numerous radicalization and mobilization pathways into any one conflict zone. This can facilitate radicalization and the reorientation of individuals such as Najibullah Zazi, who left the United States with his two co‐ conspirators to join the Taliban and defend Afghanistan against U.S. occupation, but who was identified by al‐Qa'ida's external operations cell, trained, and sent back to
16 Hegghammer, Thomas. 2008. "Islamist violence and regime stability in Saudi Arabia." International Affairs, 84(4).
the United States to plot suicide attacks against the New York City subway system. Zazi was not primed to target American civilians when he entered into this militant ecosystem, but the geographic colocation of local and global jihadist organizations enabled that eventuality.
Third, the harmonization of parochial and cosmic narratives by al‐Qa'ida's propaganda organ, and similar propaganda nodes run by affiliated organizations, helps conflate actions on the ground, increasing the chances that Western interests will be targeted in foreign settings. The threat against the Sochi Olympics cited above is a timely example.
Fourth, the propagation of global jihadist ideas through personal contact with jihadist veterans and the propagation of jihadism online help to inspire a new cohort of inspired individuals who are prepared to take action without ever having joined a formal organization, or in some cases, without ever having met, face to face, another like‐minded individual. This threat was bolstered by the endorsement of lone‐actor jihadism by al‐Qa'ida Core and al‐Qa'ida in the Arabian Peninsula following the Fort Hood attack, and consistently thereafter by English‐language media such as Inspire Magazine.
Conclusion
The death of the 21 st century's first super‐empowered individual, Usama bin Ladin, lead to broad reflection about the viability of his organization and its place in a changing political landscape. Underscoring al‐Qa'ida's failure to generate widespread support for both the ends (severing of ties between the West and the Muslim world and reestablishment of the caliphate) and means (attrition by way of violence) of its campaign, early Arab‐Spring protestors mostly acted peacefully and
within the parameters of the international system that al‐Qa'ida sought to overthrow. Control of the nation‐state, not its dissolution, remained the goal of popular protests.
Yet in the wake of this political turmoil, extant violent groups persist, new violent groups have emerged, and global terrorism has reached its modern apex. While many violent groups coalesced around a local agenda without any impetus from the al‐Qa'ida organization, al‐Qa'ida's long‐running propagation of global jihadism and its vilification of the West has influenced these militant organizations to varying degrees. As a result, in contested regions far from al‐Qa'ida's geographic center of gravity, violence targeting both local Muslim populations and far‐enemy targets persists making the resulting mix of jihadist violence more difficult to disentangle. Moreover, jihadist violence often occurs in places where anti‐American sentiment is significant, creating the very real risk that American audiences will conflate the two.
The interplay of local, regional and global actors presents a new political reality that counterterrorism professionals continue to address. This condition will persist to varying degrees even if the al‐Qa'ida organization fails to recover from the withering attacks made against it in recent years. While the al‐Qa'ida of the 1990s was a corporate entity, albeit a highly networked one, it is no longer always useful to identify where the al‐Qa'ida organization ends and others begin.
Sophisticated counterterrorism policy must minimize the effects of global jihadism without inciting local and regional groups to take up its cause, an<cursor_is_here> This requires an understanding of the jihadist narrative, the ability to distinguish it from political Islam and anti‐American sentiment, as well as an understanding of the specific history that allows al‐ Qa'ida to enable the violence of others in so many regions of the world.
It would be dangerous to conclude that because the al‐Qa'ida organization is not generating violent attacks itself, that the attrition strategy fostered by the organization is also ineffectual. These have been the most lethal two years in the history of modern terrorism, and al‐Qa'ida remains at the historical, organizational, and ideological center of the most dangerous terrorist threats of our time.
</text>
|
[
{
"content": "<url>\nhttps://www.start.umd.edu/pubs/STARTCongressionalTestimony_StateofAQandAffiliates_WilliamBraniff.pdf\n</url>\n<text>\nHouse Armed Services Committee \"The State of Al‐Qaeda, its Affiliates, and Associated Groups: View from Outside Experts\"\n\nTestimony of William Braniff Executive Director National Consortium for the Study of Terrorism and Responses to Terrorism (START) University of Maryland 4 February 2014\n\nChairman McKeon, Ranking Member Smith, and esteemed members of the committee, I would like to thank you on behalf of the National Consortium for the Study of Terrorism and Responses to Terrorism, known as START, 1 for inviting us to speak with you today. I've been asked to reflect on the \"State of al‐Qa'ida its Affiliates and Associated Groups.\" There is, unfortunately, much to say.\n\nData\n\nIn 2012, the most recent year for which START has provided a complete set of global terrorism data to the Department of State for its Congressionally‐mandated Country Reports on Terrorism, more than 6,800 terrorist attacks killed more than 11,000 people. 2 Even if you compare these more conservative 2012 figures provided to the Department of State against the more inclusive Global Terrorism Database (GTD) statistics dating back to 1970, the previous record for number of attacks was set in 2011 with more than 5,000 incidents. 3,4 This makes 2012 the most active year of terrorism on record.\n\n1 START is supported in part by the Science and Technology Directorate Office of University Programs of the U.S. Department of Homeland Security through a Center of Excellence program based at the University of Maryland. START uses state‐of‐the‐art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. 2 It is important to note that incidents had to meet all six inclusion criteria used by START's Global Terrorism Database to be included as a terrorist incident in the Statistical Annex of the Country Reports on Terrorism 2012. However, the Global Terrorism Database itself requires only five of six criteria be satisfied for an event to be included giving the varying definitions of terrorism and to provide flexibility for those who use GTD for different analytical and operational purposes. Specifically, START includes incidents that meet three mandatory\n\n1. The violent act was aimed at attaining a political, economic, religious, or social goal;\n\ncriteria and then two of the three following additional criteria:\n\n2. The violent act included evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) other than the immediate victims; and\n\nTherefore, the GTD includes a greater number of terrorist incidents than the dataset provided to the Department of State for the Country Reports on Terrorism 2012. If the GTD's inclusion standards are applied to 2012 data, 8,400 terrorist attacks killed more than 15,400 people. By either measure, 2012 is the most active year of terrorism on record.\n\n3. The violent act was outside the precepts of International Humanitarian Law insofar as it targeted non-combatants.\n\n3 It is critical to note that beginning with 2012 data collection, START made several important changes to the GTD collection methodology, improving the efficiency and comprehensiveness of the process. As a result of these improvements, a direct comparison between 2011 and 2012 likely overstates the increase in total attacks and fatalities worldwide during this time period. However, analysis of the data indicates that this increase began before the shift in data collection methodology, and important developments in key conflicts around the world suggest that considerable upward trends remain even when accounting for the possibility of methodological artifacts.\n\nStrikingly, it could be argued that the six most lethal groups in 2012 were all part of \"al‐ Qa'ida and its Associated Movement,\" a phrase used to simplify a very dynamic landscape of violent organizations and individuals. Using data provided to the Department of State, these groups were attributed responsibility for approximately 5,000 fatalities: the Taliban (more than 2,000 fatalities), Boko Haram (more than 1,100 fatalities), al‐Qa'ida in Iraq (more than 830 fatalities), Tehrik‐e Taliban Pakistan (more than 500 fatalities), al‐Qa'ida in the Arabian Peninsula (more than 280 fatalities), and al‐Shabaab (more than 280 fatalities). 5\n\nBased on preliminary terrorism incident data for January through June of 2013, and again using the Department of State's inclusion standards, the eight most lethal organizations in that time‐period include the Taliban, al‐Qa'ida in Iraq, Tehrik‐i‐Taliban Pakistan, Boko Haram, Lashkar‐e‐Jhangvi, al‐Nusrah Front, al‐Shabaab, and al‐Mua'qi'oon Biddam Brigade. These preliminary data reinforce the hypothesis that groups generally associated with al‐ Qa'ida remain the most lethal groups in the world.\n\nNotably, al‐Qa'ida itself was not directly responsible for any attacks in 2012 or the first six months of 2013 for which we have preliminary data. To help interpret these data on terrorist groups, I turned to a START research project funded by the Department of Homeland Security Science and Technology Directorate's Office of University Programs, the Big Allied and Dangerous (BAAD) project, led by Victor Asal and Karl Rethemeyer. 6 This project has demonstrated empirically that organizations with greater numbers of alliance\n\n4 I am indebted to Erin Miller and the entire Global Terrorism Database team, as well as primary investigators Gary LaFree and Laura Dugan (University of Maryland) for the rigor and objectivity undergirding this terrorism incident data.\n\n6 I am indebted to Victor Asal and Karl Rethemeyer, START researchers at the University at Albany – SUNY, who conducted this preliminary analysis and generated the associated graphic for the purpose of this testimony.\n\n5 Using the more inclusive GTD inclusion standards, these include the Taliban (more than 2,500 fatalities), Boko Haram (more than 1,200 fatalities), al-Qa'ida in the Arabian Peninsula (more than 960 fatalities), Tehrike Taliban Pakistan (more than 950 fatalities), al-Qa'ida in Iraq (more than 930 fatalities) and al-Shabaab (more than 700 fatalities).\n\nconnections to other terrorist organizations demonstrate greater lethality on average 7 and are more likely to use or pursue chemical, biological, nuclear, or radiological weapons. 8\n\nUsing preliminary data through 2012 that is currently going through a quality control process, it appears that 12 of the top 20 most lethal organizations have alliance connections to al‐Qa'ida and 10 of the top 20 most active organizations (measured by number of terrorist attacks recorded in the GTD) also have alliance connections to al‐ Qa'ida 9 (see the figure on the next page). 10 While al‐Qa'ida did not make the list of the top 20 most lethal or active organizations in 2012, all data suggest it remains a central hub in a network of highly lethal and active terrorist organizations.\n\nPlease see the \"Network Connections and Lethality\" figure on the next page.\n\n7 Asal, Victor, and R. Karl Rethemeyer. 2008. \"The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality.\" Journal of Politics, 70(2): 437-449.\n\n8\n\nOrganizational Factors and the Pursuit of CBRN Weapons\n\nAsal, Victor, Gary Ackerman, and R. Karl Rethemeyer. 2012. Connections Can Be Toxic: Terrorist\n\n9 Alliance connections can be categorized according to six types of inter-group connections: \"alliance,\"\n\nStudies in Terrorism and Conflict35:229–254.\n\n\"suspected alliance,\" \"umbrella,\" \"suspected umbrella,\" supported cause, and \"joint claims for attacks.\" Alliances or suspected alliances are reports of cooperation of any form. Umbrella relationships or suspected umbrella relationships exist when one organization speaks and/or acts on behalf of other organizations. Supported cause is public rhetorical support for a given organization.\n\n10 Red nodes represent organizations that were in the top 20 in terms of fatalities, incidents, or both in 2012. Blue nodes connected to other nodes represent all other organizations with a least one alliance or connection in 2012. Isolated blue and red nodes had no alliance connections with other organizations. The larger the node, the more fatalities are attributed to the organization in 2012 by the GTD. This map is only for 2012; it does not reflect past alliance connections or past terrorist activity.\n\nwww.start.umd.edu\nNetwork Connections and Lethality\nSource: Big Allied and Dangerous Dataset II (BAAD II)\nPrimary Investigators: Victor Asal and Karl Rethemeyer, University at Albany\n\nAnalysis 11\n\nAs a result of the absence of al‐Qa'ida Core attacks in 2012 and the first six months of 2013, the al‐Qa'ida organization rarely captures media attention except when another important cadre member is killed or captured. Instead, observers now ponder the meaning of the continuous or frequently increasing levels of violence from other violent jihadist groups in the context of a post Arab‐Spring world. This is despite the fact that the various narratives of the Arab Spring seemed to undermine al‐Qa'ida's reliance on violence and its call to reestablish the caliphate as the governing structure for the Muslim nation. Additionally, individuals continue to join jihadist groups or plot violent attacks of their own volition.\n\nWhat should we take from the seemingly contradictory developments of a popular rejection of al‐Qa'ida on the world stage just a few years ago, and record‐setting levels of jihadist violence over the last two years? Did al‐Qa'ida succeed by inspiring widespread jihadism, or has it lost to a variety of more popular, parochial actors? To address these questions, it is essential to understand al‐Qa'ida's origins and its place in the broader Islamist landscape; only in context can the seeming decline of the al‐Qa'ida organization and the persistence of violent jihadism be understood and can governments formulate policy for an expansive threat environment beyond al‐ Qa'ida Core.\n\nThe failure of local jihadist groups to successfully topple corrupt Muslim rulers, the \"near enemy,\" and regionally‐oriented irredentist groups to reclaim political control of occupied territory has been a source of frustration since the 1970s. Following Usama bin Ladin's failure to convince the Government of Saudi Arabia to allow his community of jihadist veterans to protect the Arabian Peninsula from Saddam\n\n11 Much of this section of testimony is a synthesis of the research and educational efforts of the Combating Terrorism Center at West Point, and specifically the team of instructors that comprised the Practitioner Education Program.\n\nHussein's Bathist military, al‐Qa'ida formulated the master narrative that would underpin the next 20 years of ideological and operational output as follows:\n\nThe reason that the Royal Family would not allow the mujahidin to defend Mecca and Medina from Iraq's advance was the same reason that local and irredentist jihadist groups elsewhere had failed in their parochial contests. The regimes were illegitimate proxies of foreign powers, and behind each of these puppet regimes was the military and economic aid of the \"far‐enemy.\" Led by the United States, the far enemy pulled the strings across the Muslim world for their own imperial purposes and to undermine Islam.\n\nAl‐Qa'ida's grand strategy would emerge from this diagnosis; al‐Qa'ida would enable and repurpose the violence of other militant actors to erode the political, economic, and military will of the United States to remain engaged in the Muslim world. If al‐ Qa'ida's geographically distributed attrition warfare could sever the ties between what it regarded as the puppet‐master and the puppets, revolutionary local and regional jihadist campaigns could reestablish Islamic governance for the Muslim nation, one emirate at a time, until the caliphate could be reestablished.\n\nTo realize this grand‐strategy, al‐Qa'ida positioned itself at the conceptual center of the global jihadist landscape, helping to create the multi‐faceted threat that has since manifested in at least four ways.\n\n1. Al‐Qa'ida exploited interpersonal and inter‐organizational relationships created during the anti‐Soviet jihad and inserted itself into extant violent campaigns beginning in the 1990s and continuing until today. It provided martial and ideological training, financing, and propaganda support when it did not also engage directly in violence, as was the case in the Arabian Peninsula in the early 1990s, the mid 2000s, and remains the case today under the aegis of al‐Qa'ida in the Arabian Peninsula (AQAP) and front groups such as Ansar al‐Sharia.\n\nThe penchant for global jihadist actors to reorient and enable the violence of foreign fighters and segments of existing organizations often creates tensions among the jihadist factions, or between the local populace and the militant actors, as we have seen in Iraq, Somalia and now Syria. As a result, al‐Qa'ida rarely succeeds in retaining popular support among the populace over time or reorienting jihadist groups en toto to their tactical and targeting preferences. However, they frequently achieve partial successes that amplify al‐Qa'ida's operational reach far beyond their organizational safe haven in North Waziristan.\n\n2. Similarly, veterans of the anti‐Soviet jihad returned to locally and regionally‐ oriented groups indoctrinated with a globalized understanding of their respective conflicts. This infusion of global jihadist thought occurred in regions as culturally disparate as Southeast Asia and the Caucasus, where individuals like Ibn al‐Khattab helped to retool the ethno nationalist separatist movement in Chechnya as a religious conflict, fostering a spiral of increasingly violent tactics between Russian and Chechen forces during the second Chechen war. Russia would eventually displace the violence in Chechnya to nearby regions including Dagestan, Ingushetia, Kabardino‐Balkariya, and North Ossetia‐Alania, in which a number of terrorist groups also adopted the symbols and spectacular tactics of global jihadism. It was this injection and ultimate embrace of global jihadism over several decades that created the threat facing the upcoming Sochi Olympics.\n\nA recent START background report introduces the threat as follows: 12\n\nTwo suicide bombings in December targeted a train station and trolleybus in Volgograd, Russia, killing at least 34 people and wounding many more. The\n\n12 Miller, Erin. 2014. \"Background Report: Terrorism and the Olympics: Sochi, Russia 2014.\" START (January). http://www.start.umd.edu/pubs/STARTBackgroundReport_TerrorisminOlympicsSochiRussia_Jan2014_0.pdf.\n\nattacks, which took place approximately 400 miles from Sochi, highlight the potential threat of terrorist violence at the 2014 Winter Games. The militant group Vilayat Dagestan, part of the Caucasus Emirate, claimed responsibility for the Volgograd attacks. A statement made by the group threatens that if the Winter Olympics are held, the group will carry out additional attacks, particularly targeting tourists in retaliation for \"the Muslim blood that is shed every day around the world, be it in Afghanistan, Somalia, Syria, all around the world.\" 13\n\nAttacking international tourists at the Olympics and Russian civilians in Volgograd are equated; they are portrayed as two facets of the same fight.\n\n3. Many of the highly networked veterans of the anti‐Soviet jihad encouraged their respective organizations to establish a physical presence in other jihadist fronts as well, capitalizing on the associated ideological legitimacy for recruitment, access to training and battlefield experience, and access to fundraising and equipment pipelines pouring resources into those conflict zones. This phenomenon furthered the globalization of jihadism started during the anti‐ Soviet jihad.\n\nFor example, Algerian jihadist groups participated in Bosnia and then Iraq, creating the relationships that would eventually lead to the reincarnation of the Salafist Group for Preaching and Combat (GSPC) as al‐Qa'ida in the Islamic Maghreb (AQIM). 14 After civil war erupted in Libya in 2011, it was not a departure from historical precedent when al‐Qa'ida emir Ayman al‐Zawahiri encouraged the AQIM network to syphon resources flowing into Libya for their own violent purposes across North Africa. Neither is it unusual that Mokhtar Belmokhtar, an AQIM commander and veteran of the anti‐Soviet jihad, has recently united his AQIM brigade with the Movement for Unity and Jihad in West Africa to create a new jihadist umbrella organization on the heels of French intervention in Mali. This new organization, al‐Murabitun, paid homage to al‐ Qa'ida's emir, Ayman al‐Zawahiri, and stated its intent to unite jihadist groups across the Sahel and North Africa as an emirate akin to the storied Muslim empire which controlled al‐Andalus and fought successfully to delay Europe's Reconquista of the Iberian Peninsula. 15\n\n14 Brown, Vahid. 2010. \"Al-Qa'ida Central and Local Affiliates.\" In Self-Inflicted Wounds: Debates and Divisions within al-Qa'ida and its Periphery, eds. Assaf Moghadam and Brian Fishman. Combating Terrorism Center at West Point.\n\n15 Cristiani, Dario. 2013. \"Al-Murabitun: North Africa's Jihadists Reach into Hisotry in the Battle against European 'Crusaders.'\" Terrorism Monitor, 11(19).\n\n4. Finally, al‐Qa'ida was forced to invest significant resources into virtual activities following the loss of its training camps in Afghanistan after September 11, 2001, and because of its inability to control the operational and media output of al‐ Qa'ida in Iraq. While al‐Qa'ida's online communication architecture allowed it to interact with a geographically dispersed community and to protect its brand, it also created an environment where countless organizations and individuals could voice competing and complimentary ideas. The virtual landscape quickly became a place where local, regional and global forms of jihadism overlapped for a geographically, ideologically, and strategically diverse audience.\n\nTaken as a whole, the increasingly international and intertwined histories of local, regional and global jihadist actors have at least four salient consequences.\n\nFirst, and most significantly, the global jihadist cause often benefits from resources mobilized for the purpose of defensive or classical jihad – a concept far easier to justify politically and religiously than the offensive jihad practiced by global jihadists. 16 Iraq, Pakistan, Afghanistan, Yemen and Somalia illustrate this volatile relationship between military occupations or aerial strikes into sovereign territory and violent mobilization. As long as there are local and regional jihadist fronts, global jihadist actors will have access to resources that they can direct against the \"far enemy.\"\n\nSecond, the multiplicity of grievances and narratives espoused by local, regional and global actors creates numerous radicalization and mobilization pathways into any one conflict zone. This can facilitate radicalization and the reorientation of individuals such as Najibullah Zazi, who left the United States with his two co‐ conspirators to join the Taliban and defend Afghanistan against U.S. occupation, but who was identified by al‐Qa'ida's external operations cell, trained, and sent back to\n\n16 Hegghammer, Thomas. 2008. \"Islamist violence and regime stability in Saudi Arabia.\" International Affairs, 84(4).\n\nthe United States to plot suicide attacks against the New York City subway system. Zazi was not primed to target American civilians when he entered into this militant ecosystem, but the geographic colocation of local and global jihadist organizations enabled that eventuality.\n\nThird, the harmonization of parochial and cosmic narratives by al‐Qa'ida's propaganda organ, and similar propaganda nodes run by affiliated organizations, helps conflate actions on the ground, increasing the chances that Western interests will be targeted in foreign settings. The threat against the Sochi Olympics cited above is a timely example.\n\nFourth, the propagation of global jihadist ideas through personal contact with jihadist veterans and the propagation of jihadism online help to inspire a new cohort of inspired individuals who are prepared to take action without ever having joined a formal organization, or in some cases, without ever having met, face to face, another like‐minded individual. This threat was bolstered by the endorsement of lone‐actor jihadism by al‐Qa'ida Core and al‐Qa'ida in the Arabian Peninsula following the Fort Hood attack, and consistently thereafter by English‐language media such as Inspire Magazine.\n\nConclusion\n\nThe death of the 21 st century's first super‐empowered individual, Usama bin Ladin, lead to broad reflection about the viability of his organization and its place in a changing political landscape. Underscoring al‐Qa'ida's failure to generate widespread support for both the ends (severing of ties between the West and the Muslim world and reestablishment of the caliphate) and means (attrition by way of violence) of its campaign, early Arab‐Spring protestors mostly acted peacefully and\n\nwithin the parameters of the international system that al‐Qa'ida sought to overthrow. Control of the nation‐state, not its dissolution, remained the goal of popular protests.\n\nYet in the wake of this political turmoil, extant violent groups persist, new violent groups have emerged, and global terrorism has reached its modern apex. While many violent groups coalesced around a local agenda without any impetus from the al‐Qa'ida organization, al‐Qa'ida's long‐running propagation of global jihadism and its vilification of the West has influenced these militant organizations to varying degrees. As a result, in contested regions far from al‐Qa'ida's geographic center of gravity, violence targeting both local Muslim populations and far‐enemy targets persists making the resulting mix of jihadist violence more difficult to disentangle. Moreover, jihadist violence often occurs in places where anti‐American sentiment is significant, creating the very real risk that American audiences will conflate the two.\n\nThe interplay of local, regional and global actors presents a new political reality that counterterrorism professionals continue to address. This condition will persist to varying degrees even if the al‐Qa'ida organization fails to recover from the withering attacks made against it in recent years. While the al‐Qa'ida of the 1990s was a corporate entity, albeit a highly networked one, it is no longer always useful to identify where the al‐Qa'ida organization ends and others begin.\n\nSophisticated counterterrorism policy must minimize the effects of global jihadism without inciting local and regional groups to take up its cause, an<cursor_is_here> This requires an understanding of the jihadist narrative, the ability to distinguish it from political Islam and anti‐American sentiment, as well as an understanding of the specific history that allows al‐ Qa'ida to enable the violence of others in so many regions of the world.\n\nIt would be dangerous to conclude that because the al‐Qa'ida organization is not generating violent attacks itself, that the attrition strategy fostered by the organization is also ineffectual. These have been the most lethal two years in the history of modern terrorism, and al‐Qa'ida remains at the historical, organizational, and ideological center of the most dangerous terrorist threats of our time.\n</text>\n",
"role": "user"
},
{
"content": "d without allowing al‐Qa'ida to erode the nation's political will to remain engaged with the Muslim world.",
"role": "assistant"
}
] |
Parish Partnership Weekend Worship Schedule
Eucharist: Sat. 4:00 pm St. Augustine
5:30 pm St. Dominic
Sun. 8:00 am St Augustine
9:30 am St. Anthony
11:00 am St. Dominic
Baptism: Celebrated after the weekend Liturgies by appointment. Baptismal preparation class required. Contact the parish office to register. Set baptismal date at least two months in advance.
Reconciliation: Saturday at 3:30 pm at St. Augustine Church or by appointment. Seasonal penance services offered during Advent & Lent with dates to be announced.
Marriage: Call the parish office at least six months in advance.
Anointing of the Sick : Offered annually or by appointment. Call the parish office or (618)-791-0069 for more information or to schedule an anointing.
Welcome
We encourage everyone 18 or older to register at the office as an adult parishioner.
Families of Faith in a Community of Grace
The Twenty-Second Sunday in Ordinary Time September 1, 2024
Directory
St. Augustine Church
e-mail: [email protected]
Website: www.saintaugustinebreese.org
Find us on Facebook:
St. Augustine Catholic Church Breese Illinois
Vision Statement: "Called to Welcome, Serve and Celebrate"
525 S. Third St. Breese
(618)526-4362
St. Augustine Parish Center
(618)526-4341
St. Anthony Church
e-mail: [email protected]
Website: www.stanthonybeckemeyer.org
Vision Statement: “Continuing to Create a Future Together”
P.O. Box 305, 451 W. Third St. Beckemeyer (618)227-8236
All Saints Academy295 N. Clinton Breese
Website: www.asasaints.com
(618)526-4323
Mater Dei High School900 N. Mater Dei Dr. Breese
School Website: www.materdeiknights.org(618)526-7216
Diocesan websites: www.diobelle.org
www.bellevillemessenger.org www.catholiccharitiesusa.org
http://catholiccharitiessil.org/ccsil
Project Rachel(618)722-5068
https://www.diobelle.org/respectlife/project-rachel
Respect Life Ministry(618)722-5040
Sexual Abuse Hotline1-800-640-3044
Religious Education:
OCIA/RCIA For more info please call one of the church office(s).
Youth Faith Formation Classes: Call CRE – Dan Robben at (618) 604-3792 or the parish office for more information.
Youth Ministry Moderators:
Erin Etheridge (618)604-7640 Rhonda Pulver (248) 840-1857
Paris Hempen (618)910-4551
Parish Staff
Pastor: Fr. Chuck Tuttle (618)526-2566
Pastoral Associate/DRE: Phyllis Berndsen (618)791-0069
Permanent Deacon/DRE: Dcn. Jay Fowler (618)973-3162
Maintenance: Richard Korte (618)402-5964
Office Manager: Carol Hilmes (618)526-4362
(618)227-8236
Business Manager: Dennis Krebs St. Augustine
Business Manager: Karri Kampwerth St. Anthony
Office Hours
Breese: Mon. Office Closed Labor Day
Wed & Fri. 8:30am-4:30pm,
Thurs. 2:00pm-5:00pm
Beckemeyer: Tues. & Thurs. 8:00am-12:00pm Bulletin deadline: Wednesday at 10:00am
The Twenty-First Sunday of Ordinary Time
August 25, 2024
The Catholic Communities of
Upcoming Classes & Events:
-Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam at St. Augustine on Saturday, August 31 following 4:00pm Mass.
-First Friday Benediction: Friday, September 6 at 7:00pm at St. Dominic.
-Padre Pio Mass: Saturday, September 7. Rosary at 8:30am & Mass at 9:00am at St. Dominic.
-Baptismal Prep Class Monday, September 9 at 7:30pm at St Dominic. Register at your church office by Friday, September 6.
-Red, White & Blue Mass Saturday, September 14 at 4:00pm Mass at St. Augustine We are remembering our Fire Fighters, EMS Responders, Law Enforcement, Active Military, & Veterans.
-Are you thinking of becoming Catholic? Let us walk with you on your journey. Order of Christian Initiation of Adults (O.C.I.A. formerly R.C.I.A.) Class will start meeting every Monday from 7pm – 8pm beginning with Monday, September 23. Please grab a flyer from the bulletin Board for more information.
ST. ANTHONY MINISTRY SCHEDULES
Sunday, Sept. 8 at 9:30am
Extra-ordinary Ministers: Dan & Karen Becker, Lisa Johnson, Drew Pollmann
Altar Servers: Luke Etheridge, Caden Holtgrave
Sacristans: Sept. 1 - 7 Annette Burkhardt
Sept. 8-14 Audrey Davis
ST. AUGUSTINE MINISTRY SCHEDULES
| Bennett Deien Evan Deien | Isaiah Becker | Tom Berndsen, Dan Jansen, Bob & Ruthie Rosen |
|---|---|---|
| Jackson Davis Myla Davis | Phyllis Berndsen | Jerry Korte, John Rakers, Jamie Voss, Tony Voss |
Extra-ordinary Ministers Sat., Sept. 7 at 4:00pm: Amy Boeckman, Julie Boeckman, Ralph Kuhl, Jeff Schulte
Extra-ordinary Ministers Sun., Sept. 8 at 8:00am: Phyllis Berndsen, Rachell Maue, Mary Ann Rakers, Alex Wiegmann
Sacristan: Sept. 1 - 7 Lynn Maue
Sept. 8-14Phyllis Berndsen
Extraordinary Minister to the Home Bound: Sept. 1 Emily Timmermann Sept. 8 Nancy Renschen
Dear Friends,
On this Labor Day weekend, when we recognize all those who work in whatever way they can to provide for their families, their communities, and this nation, we also celebrate the World Day of Prayer for the Care of Creation, praying that together we can work to ensure that the world God made can be enjoyed by future generations for centuries to come. Let us praise God for this wonderful world and the opportunity to work in it.
THIS WEEK'S SCRIPTURE LESSON: God's commands take center stage today. Moses points out that when the Chosen People put God's commandments into practice, other nations will marvel at how just and wise they are. The psalmist assures us that those who act justly will live in God's presence. We begin hearing selections from the letter of James today; James continually emphasized the need to put one's faith into action. In the Gospel, Jesus chides the Pharisees for putting the letter of human rules above the spirit of God's commands. Let us reflect on how we follow God's commandments.
STEWARDSHIP: A life of stewardship depends on the realization that everything we possess is a gift from God and belongs to God. We are all stewards or managers of the many gifts God has bestowed upon us. Our challenge as Christians is to make good use of those gifts.
A REMINDER: On this Labor Day Weekend, let us be grateful for the ability we have to share our talents and experiences in the job, work, career or profession in which we give glory to God through the work of our hands. On Friday of this week, Bp. McGovern will be having Mass with the ASA students and blessing the new classrooms addition.
A QUESTION FOR THE WEEK: Where do I see injustice in my family, workplace, community, or the world? What will I do to help bring justice to those who need it in each of those places?
God bless,
Fr. Chuck
St. Anthony News. . .
Upcoming Meetings:
Finance Council: Thursday, October 3 at 6:30pm
Pastoral Council: Thursday, October 3 at 7:30pm
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
St. Augustine News. . .
Upcoming Meetings:
Tuesday, September 10at 6:30pm
Finance Council: Thursday, September 5 at 6:30pm
Pastoral Council: Thursday, September 5 at 7:30pm
Bldng & Grnds Committee:
Holy Name Meeting: Tuesday, September 10 at 7:30pm
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Thank you to Chuck Luitjohan, Charlie Kunkel and committee for the recent repair and upgrade work that was just completed.
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Use extra caution when coming to and leaving from Mass & Adoration. There is road work being performed in the area around church for the next few weeks.
Spend an hour each week with Jesus! He waits for us in this Sacrament of Love. He appeals to each of us: "Could you not watch one hour with me?"
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam on Saturday, August 31 immediately after 4:00pm Mass. _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Saturday, September 21 Rhonda Pulver will present information on AED after 4:00pm Mass. How to use it, When to use it, & Where it's located.
Youth Ministry News:
If you feel like you are lacking in growing your faith. If you are searching to ignite a spark within your relationship with Jesus. Or if you are simply wanting to surround yourself with people who you can talk to about your faith life openly and without judgement & share your journey.. please come join the next Breese Youth Ministry meeting! We will be meeting on September 8th at 6pm :) For more information please reach out to Rhonda Pulver, Erin Etheridge, or Paris Hempen. Also, you can see updates on GroupMe!
St. Augustine
ATTENDANCE
August 24 4:00pm……………190 August 25 8:00am………….130
OUR GIFTS TO GOD
August 24 Loose: $ 143.00 Envelopes: $1,220.00(52)
August 25 Loose: $ 165.00 Envelopes: $ 667.00(15)
Other Envelopes: Assumption $25.00(1), Building $45.00(2),
Education $5.00(1), Sister Parish $25.00(2)
Calendar Raffle: The Calendar Raffle has begun and will run through Sep 22. Drawings will take place in October. Completed Calendars can be turned in at 9:30 mass on Sundays or given to your parish representative. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Ladies Sodality will be holding a Bunco and Dessert Party on
Monday, September 16 at 1:00 pm in the Parish Center. Cost is $5 per person. Be sure to join in the fun! This event is open to everyone from all area parishes. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Ladies Sodality Rummage Sale is Thursday, October 31 - Saturday, November 2. Start getting your donations together now. Donations will start being accepted on Monday, October 14.
Pre Cana:
Date: September 14, 2024
Where: St. Mary Immaculate Catholic Church (Fellowship room): 1550 Main Street, Mt. Vernon IL. 62864 Registration: 9:15 – 9:45 Start: 9:45 Close with 5:00 Mass. Cost: $75.00 per couple. The cost includes materials, lunch and pizza (optional) after 5:00 Mass. To register: Contact Deacon Mark Kabat 618-316-8027
Youth Faith Formation:
YFF Prayer Service: Wednesday, September 18 at 6:30pm Students & Parents, please meet at St. Dominic Church for Mass.
St. Anthony ATTENDANCE
August 25 9:30am………….108
OUR GIFTS TO GOD
August 25 Loose: $82.00 Envelopes: $1357.00(29) Other Envelopes: Assumption $55.00(6), Building $70.00(3), Education $54.00(4), Peter's Pence $20.00(1), Sister Parish $75.00(4)
Meals & Events:
_________________________________________________________________________________________________________________________________________
Breese American Legion Post#252 Chicken Drive-Thru or CarryOut Chicken Dinner Sunday, September 8 11am-5pm. All meals are $15 and are 1/2 fried chicken, mashed potatoes, gravy, dressing, green beans and cake.
_________________________________________________________________________________________________________________________________________
Rummage Sale sponsored by Corpus Christi Ladies Club 9/139/15. Flyer available on the bulletin board.
_________________________________________________________________________________________________________________________________________
Corpus Christi Trivia Night 9/28. Flyer available.
_________________________________________________________________________________________________________________________________________
St. Bernard Parish, Albers, IL Annual Wurstmarkt Sunday, September 29, from 10:30-5:30 at St. Bernard Parish Center. Drive thru & carryouts available. Some space available to sit in and eat your carryout. $15.00 per meal.
Pro-Life Corner:
"Suicidal individuals—with or without a terminal illness—typically do not want to die. The patient requesting assisted suicide is often asking, 'Does anyone want me to be alive, or care enough to talk me out of this request and support me through this difficult time?'"
USCCB Secretariat of Pro-Life Activities, "Every Suicide is Tragic" https://www.usccb.org/every-suicide-tragic
_________________________________________________________________________________________________________________________________________
Upcoming Pro-Life Events:
Sun. Sept. 8: Catholic Single Moms Group from 2-4pm at St. Clare in O'Fallon. Flyer Available on the bulletin board.
Fri. Oct. 18: The 1 st Diocese of Belleville Respect Life Conference with pro-life speakers at the Cathedral of St. Peter _________________________________________________________________________________________________________________________________________
Home School Mass, Backpack Blessing & Lunch Reception
When: Tuesday, September 10 at 11:00am
Location: St. Clare of Assisi Catholic Church, 1411 Cross Street O’Fallon, IL 62269
Celebrant: Bishop Michael McGovern
Please RSVP by Monday, September 9 to [email protected] Have any extra curriculum? Bring it to sell or give away!
*********************************************************************************************************************************************************************************
Bibles & Brews: Who: Young Adults Ages 21-35
When: Wednesday, September 11 Social is 6:30-7:00pm, Event is 7:00-8:30pm
Where: Eckert's Cider Shed Outdoor Pavillion
951 S. Green Mount Road, Belleville, IL 62220
Hosted By: Fr. Nick Junker
Follow The Diocese of Belleville Young Adult Group:
Instagram: bellevilleyoungadults
Facebook: Diocese of Belleville Young Adults
Please remember in your prayers:
All those serving in the military and everyone listed:
Carl Aarns Jackie Aarns
Edwin Albers
Norb Albers Ruth Albers
Dolores Benhoff
Veronica Blumenstein Sadie Bryan Dave Deutsch
Christie Dust Betty Erlinger Roger Foppe
Carol Fritch
Jupe Gonzalez
JoAnn Gray
Carol Gwinn Gerri Haar Mary Haar
Mike Haar
Jim Haukup
Mary Heimann
Richard Hellige Carlos Hill Rich Holtgrave
Edna Holthaus Gertrude Holthaus Greg Jansen
Tony Jansen
Etta Kampwerth Rose Kuhl
Evie Lammers Gabrielle Ludwig Theresa Luitjohan
Joann Maue Dana Beckmann–Marks Mary Ann Maue
Carol Meier Doris Mueller Fr. Jim Nall
Mark Niemeyer Rachel Peters Florence Pingsterhaus
Ken Porter
Jerome Ratermann Joanie Rolfingsmeier
Pat Rollins Fr. Ed Schaefer Julie (Schlueter) Detmer
Marcel Thole
Clete Timmermann Loretta Trame
Lucille Trame Dottie Wellinghoff Agnes White
Special Intentions
If you have anyone who needs to be added or removed from this list, please contact the Parish Office.
Knightly News Breese K of C Council# 2869
Breese K of C #2869 Meeting: Thursday, September 12 at 7:30pm
K of C Fourth Degree Meeting: Tuesday, September 17 at 7:30pm
Taco Tuesdays: 4:30pm - 7:00pm
Wing Thursday: 4:30pm - 7:00pm
Chicken Fry Fridays: 4:30pm - 7:00pm
(All meals are eat in or take-out and are served in the basement.)
_________________________________________________________________________________________________________________________________________ Date Night for Married Couples sponsored by Diocese of Belleville on Saturday, September 21 from 5:30pm - 9:00pm at St, Nicholas Parish Hall in O'Fallon. Theme: Communication...A Step in the Right Direction. Work on communication skills, take a swing dance lesson. $30 fee includes appetizers, wine, dance lesson & babysitting. BYOB Flyer available on the bulleting board.
Red, White & Blue Mass: Saturday, September 14 at 4:00pm at St. Augustine
Reverse Drawing & Chicken Dinner: Saturday, September 21 Tickets are being mailed, but will also be available at the door.
5th Sunday Breakfast: 09/29/2024, 12/29/2024, 03/30/2025 8-11am
2024 TWENTY-SECOND WEEK IN ORDINARY TIME Daily Scripture and Reflections during Ordinary Time
| Sunday | Monday | Tuesday | Wednesday | Thursday | Friday |
|---|---|---|---|---|---|
| 2 22nd Sunday in Ordinary Time Do not lose sight of what is important. Deut. 4:1-2, 6-8 James 1:17-18, 21b-22, 27 Mark 7:1-8, 14-16, 21-23 | 3 Labor Day Weekday Proclaim the Good News with confidence. 1 Cor. 2:1-5 Luke 4:16-30 | 3 Pope St. Gregory the Great Jesus speaks with authority. 1 Cor. 2:10b-18 Luke 4:31-37 | 4 Weekday Working for the Lord is our life- long calling. 1 Cor. 3:1-9 Luke 4:38-44 | 5 Weekday We belong to Christ. 1 Cor. 3:18-23 Luke 5:1-11 | 6 Weekday We cannot judge others. 1 Cor. 4:1-5 Luke 5:33-39 |
|
<urn:uuid:52dae06a-04d1-4d70-b75b-d5543a4a08e7>
|
CC-MAIN-2024-42
|
https://stanthonybeckemeyer.org/wp-content/uploads/2024/08/1-Sep-24-Bulletin.pdf
|
2024-10-08T18:04:12+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-42/subset=warc/part-00039-0c083cf2-c0ed-42ad-af5c-44f7548e96a0.c000.gz.parquet
| 491,894,637
| 4,245
|
eng_Latn
|
eng_Latn
| 0.884495
|
eng_Latn
| 0.982985
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2923,
4806,
12227,
18288
] |
Parish Partnership Weekend Worship Schedule
Eucharist: Sat. 4:00 pm St. Augustine
5:30 pm St. Dominic
Sun. 8:00 am St Augustine
9:30 am St. Anthony
11:00 am St. Dominic
Baptism: Celebrated after the weekend Liturgies by appointment. Baptismal preparation class required. Contact the parish office to register. Set baptismal date at least two months in advance.
Reconciliation: Saturday at 3:30 pm at St. Augustine Church or by appointment. Seasonal penance services offered during Advent & Lent with dates to be announced.
Marriage: Call the parish office at least six months in advance.
Anointing of the Sick : Offered annually or by appointment. Call the parish office or (618)-791-0069 for more information or to schedule an anointing.
Welcome
We encourage everyone 18 or older to register at the office as an adult parishioner.
Families of Faith in a Community of Grace
The Twenty-Second Sunday in Ordinary Time September 1, 2024
Directory
St. Augustine Church
e-mail: [email protected]
Website: www.saintaugustinebreese.org
Find us on Facebook:
St. Augustine Catholic Church Breese Illinois
Vision Statement: "Called to Welcome, Serve and Celebrate"
525 S. Third St. Breese
(618)526-4362
St. Augustine Parish Center
(618)526-4341
St. Anthony Church
e-mail: [email protected]
Website: www.stanthonybeckemeyer.org
Vision Statement: “Continuing to Create a Future Together”
P.O. Box 305, 451 W. Third St. Beckemeyer (618)227-8236
All Saints Academy295 N. Clinton Breese
Website: www.asasaints.com
(618)526-4323
Mater Dei High School900 N. Mater Dei Dr. Breese
School Website: www.materdeiknights.org(618)526-7216
Diocesan websites: www.diobelle.org
www.bellevillemessenger.org www.catholiccharitiesusa.org
http://catholiccharitiessil.org/ccsil
Project Rachel(618)722-5068
https://www.diobelle.org/respectlife/project-rachel
Respect Life Ministry(618)722-5040
Sexual Abuse Hotline1-800-640-3044
Religious Education:
OCIA/RCIA For more info please call one of the church office(s).
Youth Faith Formation Classes: Call CRE – Dan Robben at (618) 604-3792 or the parish office for more information.
Youth Ministry Moderators:
Erin Etheridge (618)604-7640 Rhonda Pulver (248) 840-1857
Paris Hempen (618)910-4551
Parish Staff
Pastor: Fr. Chuck Tuttle (618)526-2566
Pastoral Associate/DRE: Phyllis Berndsen (618)791-0069
Permanent Deacon/DRE: Dcn. Jay Fowler (618)973-3162
Maintenance: Richard Korte (618)402-5964
Office Manager: Carol Hilmes (618)526-4362
(618)227-8236
Business Manager: Dennis Krebs St. Augustine
Business Manager: Karri Kampwerth St. Anthony
Office Hours
Breese: Mon. Office Closed Labor Day
Wed & Fri. 8:30am-4:30pm,
Thurs. 2:00pm-5:00pm
Beckemeyer: Tues. & Thurs. 8:00am-12:00pm Bulletin deadline: Wednesday at 10:00am
The Twenty-First Sunday of Ordinary Time
August 25, 2024
The Catholic Communities of
Upcoming Classes & Events:
-Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam at St. Augustine on Saturday, August 31 following 4:00pm Mass.
-First Friday Benediction: Friday, September 6 at 7:00pm at St. Dominic.
-Padre Pio Mass: Saturday, September 7. Rosary at 8:30am & Mass at 9:00am at St. Dominic.
-Baptismal Prep Class Monday, September 9 at 7:30pm at St Dominic. Register at your church office by Friday, September 6.
-Red, White & Blue Mass Saturday, September 14 at 4:00pm Mass at St. Augustine We are remembering our Fire Fighters, EMS Responders, Law Enforcement, Active Military, & Veterans.
-Are you thinking of becoming Catholic? Let us walk with you on your journey. Order of Christian Initiation of Adults (O.C.I.A. formerly R.C.I.A.) Class will start meeting every Monday from 7pm – 8pm beginning with Monday, September 23. Please grab a flyer from the bulletin Board for more information.
ST. ANTHONY MINISTRY SCHEDULES
Sunday, Sept. 8 at 9:30am
Extra-ordinary Ministers: Dan & Karen Becker, Lisa Johnson, Drew Pollmann
Altar Servers: Luke Etheridge, Caden Holtgrave
Sacristans: Sept. 1 - 7 Annette Burkhardt
Sept. 8-14 Audrey Davis
ST. AUGUSTINE MINISTRY SCHEDULES
| Bennett Deien Evan Deien | Isaiah Becker | Tom Berndsen, Dan Jansen, Bob & Ruthie Rosen |
|---|---|---|
| Jackson Davis Myla Davis | Phyllis Berndsen | Jerry Korte, John Rakers, Jamie Voss, Tony Voss |
Extra-ordinary Ministers Sat., Sept. 7 at 4:00pm: Amy Boeckman, Julie Boeckman, Ralph Kuhl, Jeff Schulte
Extra-ordinary Ministers Sun., Sept. 8 at 8:00am: Phyllis Berndsen, Rachell Maue, Mary Ann Rakers, Alex Wiegmann
Sacristan: Sept. 1 - 7 Lynn Maue
Sept. 8-14Phyllis Berndsen
Extraordinary Minister to the Home Bound: Sept. 1 Emily Timmermann Sept. 8 Nancy Renschen
Dear Friends,
On this Labor Day weekend, when we recognize all those who work in whatever way they can to provide for their families, their communities, and this nation, we also celebrate the World Day of Prayer for the Care of Creation, praying that together we can work to ensure that the world God made can be enjoyed by future generations for centuries to come. Let us praise God for this wonderful world and the opportunity to work in it.
THIS WEEK'S SCRIPTURE LESSON: God's commands take center stage today. Moses points out that when the Chosen People put God's commandments into practice, other nations will marvel at how just and wise they are. The psalmist assures us that those who act justly will live in God's presence. We begin hearing selections from the letter of James today; James continually emphasized the need to put one's faith into action. In the Gospel, Jesus chides the Pharisees for putting the letter of human rules above the spirit of God's commands. Let us reflect on how we follow God's commandments.
STEWARDSHIP: A life of stewardship depends on the realization that everything we possess is a gift from God and belongs to God. We are all stewards or managers of the many gifts God has bestowed upon us. Our challenge as Christians is to make good use of those gifts.
A REMINDER: On this Labor Day Weekend, let us be grateful for the ability we have to share our talents and experiences in the job, work, career or profession in which we give glory to God through the work of our hands. On Friday of this week, Bp. McGovern will be having Mass with the ASA students and blessing the new classrooms addition.
A QUESTION FOR THE WEEK: Where do I see injustice in my family, workplace, community, or the world? What will I do to help bring justice to those who need it in each of those places?
God bless,
Fr. Chuck
St. Anthony News. . .
Upcoming Meetings:
Finance Council: Thursday, October 3 at 6:30pm
Pastoral Council: Thursday, October 3 at 7:30pm
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
St. Augustine News. . .
Upcoming Meetings:
Tuesday, September 10at 6:30pm
Finance Council: Thursday, September 5 at 6:30pm
Pastoral Council: Thursday, September 5 at 7:30pm
Bldng & Grnds Committee:
Holy Name Meeting: Tuesday, September 10 at 7:30pm
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Thank you to Chuck Luitjohan, Charlie Kunkel and committee for the recent repair and upgrade work that was just completed.
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Use extra caution when coming to and leaving from Mass & Adoration. There is road work being performed in the area around church for the next few weeks.
Spend an hour each week with Jesus! He waits for us in this Sacrament of Love. He appeals to each of us: "Could you not watch one hour with me?"
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam on Saturday, August 31 immediately after 4:00pm Mass. _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Saturday, September 21 Rhonda Pulver will present information on AED after 4:00pm Mass. How to use it, When to use it, & Where it's located.
Youth Ministry News:
If you feel like you are lacking in growing your faith. If you are searching to ignite a spark within your relationship with Jesus. Or if you are simply wanting to surround yourself with people who you can talk to about your faith life openly and without judgement & share your journey.. please come join the next Breese Youth Ministry meeting! We will be meeting on September 8th at 6pm :) For more information please reach out to Rhonda Pulver, Erin Etheridge, or Paris Hempen. Also, you can see updates on GroupMe!
St. Augustine
ATTENDANCE
August 24 4:00pm……………190 August 25 8:00am………….130
OUR GIFTS TO GOD
August 24 Loose: $ 143.00 Envelopes: $1,220.00(52)
August 25 Loose: $ 165.00 Envelopes: $ 667.00(15)
Other Envelopes: Assumption $25.00(1), Building $45.00(2),
Education $5.00(1), Sister Parish $25.00(2)
Calendar Raffle: The Calendar Raffle has begun and will run through Sep 22. Drawings will take place in October. Completed Calendars can be turned in at 9:30 mass on Sundays or given to your parish representative. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Ladies Sodality will be holding a Bunco and Dessert Party on
Monday, September 16 at 1:00 pm in the Parish Center. Cost is $5 per person. Be sure to join in the fun! This event is open to everyone from all area parishes. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Ladies Sodality Rummage Sale is Thursday, October 31 - Saturday, November 2. Start getting your donations together now. Donations will start being accepted on Monday, October 14.
Pre Cana:
Date: September 14, 2024
Where: St. Mary Immaculate Catholic Church (Fellowship room): 1550 Main Street, Mt. Vernon IL. 62864 Registration: 9:15 – 9:45 Start: 9:45 Close with 5:00 Mass. Cost: $75.00 per couple. The cost includes materials, lunch and pizza (optional) after 5:00 Mass. To register: Contact Deacon Mark Kabat 618-316-8027
Youth Faith Formation:
YFF Prayer Service: Wednesday, September 18 at 6:30pm Students & Parents, please meet at St. Dominic Church for Mass.
St. Anthony ATTENDANCE
August 25 9:30am………….108
OUR GIFTS TO GOD
August 25 Loose: $82.00 Envelopes: $1357.00(29) Other Envelopes: Assumption $55.00(6), Building $70.00(3), Education $54.00(4), Peter's Pence $20.00(1), Sister Parish $75.00(4)
Meals & Events:
_________________________________________________________________________________________________________________________________________
Breese American Legion Post#252 Chicken Drive-Thru or CarryOut Chicken Dinner Sunday, September 8 11am-5pm. All meals are $15 and are 1/2 fried chicken, mashed potatoes, gravy, dressing, green beans and cake.
_________________________________________________________________________________________________________________________________________
Rummage Sale sponsored by Corpus Christi Ladies Club 9/139/15. Flyer available on the bulletin board.
_________________________________________________________________________________________________________________________________________
Corpus Christi Trivia Night 9/28. Flyer available.
_________________________________________________________________________________________________________________________________________
St. Bernard Parish, Albers, IL Annual Wurstmarkt Sunday, September 29, from 10:30-5:30 at St. Bernard Parish Center. Drive thru & carryouts available. Some space available to sit in and eat your carryout. $15.00 per meal.
Pro-Life Corner:
"Suicidal individuals—with or without a terminal illness—typically do not want to die. The patient requesting assisted suicide is often asking, 'Does anyone want me to be alive, or care enough to talk me out of this request and support me through this difficult time?'"
USCCB Secretariat of Pro-Life Activities, "Every Suicide is Tragic" https://www.usccb.org/every-suicide-tragic
_________________________________________________________________________________________________________________________________________
Upcoming Pro-Life Events:
Sun. Sept. 8: Catholic Single Moms Group from 2-4pm at St. Clare in O'Fallon. Flyer Available on the bulletin board.
Fri. Oct. 18: The 1 st Diocese of Belleville Respect Life Conference with pro-life speakers at the Cathedral of St. Peter _________________________________________________________________________________________________________________________________________
Home School Mass, Backpack Blessing & Lunch Reception
When: Tuesday, September 10 at 11:00am
Location: St. Clare of Assisi Catholic Church, 1411 Cross Street O’Fallon, IL 62269
Celebrant: Bishop Michael McGovern
Please RSVP by Monday, September 9 to [email protected] Have any extra curriculum? Bring it to sell or give away!
*********************************************************************************************************************************************************************************
Bibles & Brews: Who: Young Adults Ages 21-35
When: Wednesday, September 11 Social is 6:30-7:00pm, Event is 7:00-8:30pm
Where: Eckert's Cider Shed Outdoor Pavillion
951 S. Green Mount Road, Belleville, IL 62220
Hosted By: Fr. Nick Junker
Follow The Diocese of Belleville Young Adult Group:
Instagram: bellevilleyoungadults
Facebook: Diocese of Belleville Young Adults
Please remember in your prayers:
All those serving in the military and everyone listed:
Carl Aarns Jackie Aarns
Edwin Albers
Norb Albers Ruth Albers
Dolores Benhoff
Veronica Blumenstein Sadie Bryan Dave Deutsch
Christie Dust Betty Erlinger Roger Foppe
Carol Fritch
Jupe Gonzalez
JoAnn Gray
Carol Gwinn Gerri Haar Mary Haar
Mike Haar
Jim Haukup
Mary Heimann
Richard Hellige Carlos Hill Rich Holtgrave
Edna Holthaus Gertrude Holthaus Greg Jansen
Tony Jansen
Etta Kampwerth Rose Kuhl
Evie Lammers Gabrielle Ludwig Theresa Luitjohan
Joann Maue Dana Beckmann–Marks Mary Ann Maue
Carol Meier Doris Mueller Fr. Jim Nall
Mark Niemeyer Rachel Peters Florence Pingsterhaus
Ken Porter
Jerome Ratermann Joanie Rolfingsmeier
Pat Rollins Fr. Ed Schaefer Julie (Schlueter) Detmer
Marcel Thole
Clete Timmermann Loretta Trame
Lucille Trame Dottie Wellinghoff Agnes White
Special Intentions
If you have anyone who needs to be added or removed from this list, please contact the Parish Office.
Knightly News Breese K of C Council# 2869
Breese K of C #2869 Meeting: Thursday, September 12 at 7:30pm
K of C Fourth Degree Meeting: Tuesday, September 17 at 7:30pm
Taco Tuesdays: 4:30pm - 7:00pm
Wing Thursday: 4:30pm - 7:00pm
Chicken Fry Fridays: 4:30pm - 7:00pm
(All meals are eat in or take-out and are served in the basement.)
_________________________________________________________________________________________________________________________________________ Date Night for Married Couples sponsored by Diocese of Belleville on Saturday, September 21 from 5:30pm - 9:00pm at St, Nicholas Parish Hall in O'Fallon. Theme: Communication...A Step in the Right Direction. Work on communication skills, take a swing dance lesson. $30 fee includes appetizers, wine, dance lesson & babysitting. BYOB Flyer available on the bulleting board.
Red, White & Blue Mass: Saturday, September 14 at 4:00pm at St. Augustine
Reverse Drawing & Chicken Dinner: Saturday, September 21 Tickets are being mailed, but will also be available at the door.
5th Sunday Breakfast: 09/29/2024, 12/29/2024, 03/30/2025 8-11am
2024 TWENTY-SECOND WEEK IN ORDINARY TIME Daily Scripture and Reflections during Ordinary Time
| Sunday | Monday | Tuesday | Wednesday | Thursday | Friday |
|---|---|---|---|---|---|
| 2 22nd Sunday in Ordinary Time Do not lose sight of what is important. Deut. 4:1-2, 6-8 James 1:17-18, 21b-22, 27 Mark 7:1-8, 14-16, 21-23 | 3 Labor Day Weekday Proclaim the Good News with confidence. 1 Cor. 2:1-5 Luke 4:16-30 | 3 Pope St. Gregory the Great Jesus speaks with authority. 1 Cor. 2:10b-18 Luke 4:31-37
|
| 4 Weekday Working for the Lord is our life- long calling.
| 18,095
|
inside_word
|
|
|
remove_all
|
<url>
https://stanthonybeckemeyer.org/wp-content/uploads/2024/08/1-Sep-24-Bulletin.pdf
</url>
<text>
Parish Partnership Weekend Worship Schedule
Eucharist: Sat. 4:00 pm St. Augustine
5:30 pm St. Dominic
Sun. 8:00 am St Augustine
9:30 am St. Anthony
11:00 am St. Dominic
Baptism: Celebrated after the weekend Liturgies by appointment. Baptismal preparation class required. Contact the parish office to register. Set baptismal date at least two months in advance.
Reconciliation: Saturday at 3:30 pm at St. Augustine Church or by appointment. Seasonal penance services offered during Advent & Lent with dates to be announced.
Marriage: Call the parish office at least six months in advance.
Anointing of the Sick : Offered annually or by appointment. Call the parish office or (618)-791-0069 for more information or to schedule an anointing.
Welcome
We encourage everyone 18 or older to register at the office as an adult parishioner.
Families of Faith in a Community of Grace
The Twenty-Second Sunday in Ordinary Time September 1, 2024
Directory
St. Augustine Church
e-mail: [email protected]
Website: www.saintaugustinebreese.org
Find us on Facebook:
St. Augustine Catholic Church Breese Illinois
Vision Statement: "Called to Welcome, Serve and Celebrate"
525 S. Third St. Breese
(618)526-4362
St. Augustine Parish Center
(618)526-4341
St. Anthony Church
e-mail: [email protected]
Website: www.stanthonybeckemeyer.org
Vision Statement: “Continuing to Create a Future Together”
P.O. Box 305, 451 W. Third St. Beckemeyer (618)227-8236
All Saints Academy295 N. Clinton Breese
Website: www.asasaints.com
(618)526-4323
Mater Dei High School900 N. Mater Dei Dr. Breese
School Website: www.materdeiknights.org(618)526-7216
Diocesan websites: www.diobelle.org
www.bellevillemessenger.org www.catholiccharitiesusa.org
http://catholiccharitiessil.org/ccsil
Project Rachel(618)722-5068
https://www.diobelle.org/respectlife/project-rachel
Respect Life Ministry(618)722-5040
Sexual Abuse Hotline1-800-640-3044
Religious Education:
OCIA/RCIA For more info please call one of the church office(s).
Youth Faith Formation Classes: Call CRE – Dan Robben at (618) 604-3792 or the parish office for more information.
Youth Ministry Moderators:
Erin Etheridge (618)604-7640 Rhonda Pulver (248) 840-1857
Paris Hempen (618)910-4551
Parish Staff
Pastor: Fr. Chuck Tuttle (618)526-2566
Pastoral Associate/DRE: Phyllis Berndsen (618)791-0069
Permanent Deacon/DRE: Dcn. Jay Fowler (618)973-3162
Maintenance: Richard Korte (618)402-5964
Office Manager: Carol Hilmes (618)526-4362
(618)227-8236
Business Manager: Dennis Krebs St. Augustine
Business Manager: Karri Kampwerth St. Anthony
Office Hours
Breese: Mon. Office Closed Labor Day
Wed & Fri. 8:30am-4:30pm,
Thurs. 2:00pm-5:00pm
Beckemeyer: Tues. & Thurs. 8:00am-12:00pm Bulletin deadline: Wednesday at 10:00am
The Twenty-First Sunday of Ordinary Time
August 25, 2024
The Catholic Communities of
Upcoming Classes & Events:
-Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam at St. Augustine on Saturday, August 31 following 4:00pm Mass.
-First Friday Benediction: Friday, September 6 at 7:00pm at St. Dominic.
-Padre Pio Mass: Saturday, September 7. Rosary at 8:30am & Mass at 9:00am at St. Dominic.
-Baptismal Prep Class Monday, September 9 at 7:30pm at St Dominic. Register at your church office by Friday, September 6.
-Red, White & Blue Mass Saturday, September 14 at 4:00pm Mass at St. Augustine We are remembering our Fire Fighters, EMS Responders, Law Enforcement, Active Military, & Veterans.
-Are you thinking of becoming Catholic? Let us walk with you on your journey. Order of Christian Initiation of Adults (O.C.I.A. formerly R.C.I.A.) Class will start meeting every Monday from 7pm – 8pm beginning with Monday, September 23. Please grab a flyer from the bulletin Board for more information.
ST. ANTHONY MINISTRY SCHEDULES
Sunday, Sept. 8 at 9:30am
Extra-ordinary Ministers: Dan & Karen Becker, Lisa Johnson, Drew Pollmann
Altar Servers: Luke Etheridge, Caden Holtgrave
Sacristans: Sept. 1 - 7 Annette Burkhardt
Sept. 8-14 Audrey Davis
ST. AUGUSTINE MINISTRY SCHEDULES
| Bennett Deien Evan Deien | Isaiah Becker | Tom Berndsen, Dan Jansen, Bob & Ruthie Rosen |
|---|---|---|
| Jackson Davis Myla Davis | Phyllis Berndsen | Jerry Korte, John Rakers, Jamie Voss, Tony Voss |
Extra-ordinary Ministers Sat., Sept. 7 at 4:00pm: Amy Boeckman, Julie Boeckman, Ralph Kuhl, Jeff Schulte
Extra-ordinary Ministers Sun., Sept. 8 at 8:00am: Phyllis Berndsen, Rachell Maue, Mary Ann Rakers, Alex Wiegmann
Sacristan: Sept. 1 - 7 Lynn Maue
Sept. 8-14Phyllis Berndsen
Extraordinary Minister to the Home Bound: Sept. 1 Emily Timmermann Sept. 8 Nancy Renschen
Dear Friends,
On this Labor Day weekend, when we recognize all those who work in whatever way they can to provide for their families, their communities, and this nation, we also celebrate the World Day of Prayer for the Care of Creation, praying that together we can work to ensure that the world God made can be enjoyed by future generations for centuries to come. Let us praise God for this wonderful world and the opportunity to work in it.
THIS WEEK'S SCRIPTURE LESSON: God's commands take center stage today. Moses points out that when the Chosen People put God's commandments into practice, other nations will marvel at how just and wise they are. The psalmist assures us that those who act justly will live in God's presence. We begin hearing selections from the letter of James today; James continually emphasized the need to put one's faith into action. In the Gospel, Jesus chides the Pharisees for putting the letter of human rules above the spirit of God's commands. Let us reflect on how we follow God's commandments.
STEWARDSHIP: A life of stewardship depends on the realization that everything we possess is a gift from God and belongs to God. We are all stewards or managers of the many gifts God has bestowed upon us. Our challenge as Christians is to make good use of those gifts.
A REMINDER: On this Labor Day Weekend, let us be grateful for the ability we have to share our talents and experiences in the job, work, career or profession in which we give glory to God through the work of our hands. On Friday of this week, Bp. McGovern will be having Mass with the ASA students and blessing the new classrooms addition.
A QUESTION FOR THE WEEK: Where do I see injustice in my family, workplace, community, or the world? What will I do to help bring justice to those who need it in each of those places?
God bless,
Fr. Chuck
St. Anthony News. . .
Upcoming Meetings:
Finance Council: Thursday, October 3 at 6:30pm
Pastoral Council: Thursday, October 3 at 7:30pm
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
St. Augustine News. . .
Upcoming Meetings:
Tuesday, September 10at 6:30pm
Finance Council: Thursday, September 5 at 6:30pm
Pastoral Council: Thursday, September 5 at 7:30pm
Bldng & Grnds Committee:
Holy Name Meeting: Tuesday, September 10 at 7:30pm
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Thank you to Chuck Luitjohan, Charlie Kunkel and committee for the recent repair and upgrade work that was just completed.
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Use extra caution when coming to and leaving from Mass & Adoration. There is road work being performed in the area around church for the next few weeks.
Spend an hour each week with Jesus! He waits for us in this Sacrament of Love. He appeals to each of us: "Could you not watch one hour with me?"
_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam on Saturday, August 31 immediately after 4:00pm Mass. _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Saturday, September 21 Rhonda Pulver will present information on AED after 4:00pm Mass. How to use it, When to use it, & Where it's located.
Youth Ministry News:
If you feel like you are lacking in growing your faith. If you are searching to ignite a spark within your relationship with Jesus. Or if you are simply wanting to surround yourself with people who you can talk to about your faith life openly and without judgement & share your journey.. please come join the next Breese Youth Ministry meeting! We will be meeting on September 8th at 6pm :) For more information please reach out to Rhonda Pulver, Erin Etheridge, or Paris Hempen. Also, you can see updates on GroupMe!
St. Augustine
ATTENDANCE
August 24 4:00pm……………190 August 25 8:00am………….130
OUR GIFTS TO GOD
August 24 Loose: $ 143.00 Envelopes: $1,220.00(52)
August 25 Loose: $ 165.00 Envelopes: $ 667.00(15)
Other Envelopes: Assumption $25.00(1), Building $45.00(2),
Education $5.00(1), Sister Parish $25.00(2)
Calendar Raffle: The Calendar Raffle has begun and will run through Sep 22. Drawings will take place in October. Completed Calendars can be turned in at 9:30 mass on Sundays or given to your parish representative. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Ladies Sodality will be holding a Bunco and Dessert Party on
Monday, September 16 at 1:00 pm in the Parish Center. Cost is $5 per person. Be sure to join in the fun! This event is open to everyone from all area parishes. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Ladies Sodality Rummage Sale is Thursday, October 31 - Saturday, November 2. Start getting your donations together now. Donations will start being accepted on Monday, October 14.
Pre Cana:
Date: September 14, 2024
Where: St. Mary Immaculate Catholic Church (Fellowship room): 1550 Main Street, Mt. Vernon IL. 62864 Registration: 9:15 – 9:45 Start: 9:45 Close with 5:00 Mass. Cost: $75.00 per couple. The cost includes materials, lunch and pizza (optional) after 5:00 Mass. To register: Contact Deacon Mark Kabat 618-316-8027
Youth Faith Formation:
YFF Prayer Service: Wednesday, September 18 at 6:30pm Students & Parents, please meet at St. Dominic Church for Mass.
St. Anthony ATTENDANCE
August 25 9:30am………….108
OUR GIFTS TO GOD
August 25 Loose: $82.00 Envelopes: $1357.00(29) Other Envelopes: Assumption $55.00(6), Building $70.00(3), Education $54.00(4), Peter's Pence $20.00(1), Sister Parish $75.00(4)
Meals & Events:
_________________________________________________________________________________________________________________________________________
Breese American Legion Post#252 Chicken Drive-Thru or CarryOut Chicken Dinner Sunday, September 8 11am-5pm. All meals are $15 and are 1/2 fried chicken, mashed potatoes, gravy, dressing, green beans and cake.
_________________________________________________________________________________________________________________________________________
Rummage Sale sponsored by Corpus Christi Ladies Club 9/139/15. Flyer available on the bulletin board.
_________________________________________________________________________________________________________________________________________
Corpus Christi Trivia Night 9/28. Flyer available.
_________________________________________________________________________________________________________________________________________
St. Bernard Parish, Albers, IL Annual Wurstmarkt Sunday, September 29, from 10:30-5:30 at St. Bernard Parish Center. Drive thru & carryouts available. Some space available to sit in and eat your carryout. $15.00 per meal.
Pro-Life Corner:
"Suicidal individuals—with or without a terminal illness—typically do not want to die. The patient requesting assisted suicide is often asking, 'Does anyone want me to be alive, or care enough to talk me out of this request and support me through this difficult time?'"
USCCB Secretariat of Pro-Life Activities, "Every Suicide is Tragic" https://www.usccb.org/every-suicide-tragic
_________________________________________________________________________________________________________________________________________
Upcoming Pro-Life Events:
Sun. Sept. 8: Catholic Single Moms Group from 2-4pm at St. Clare in O'Fallon. Flyer Available on the bulletin board.
Fri. Oct. 18: The 1 st Diocese of Belleville Respect Life Conference with pro-life speakers at the Cathedral of St. Peter _________________________________________________________________________________________________________________________________________
Home School Mass, Backpack Blessing & Lunch Reception
When: Tuesday, September 10 at 11:00am
Location: St. Clare of Assisi Catholic Church, 1411 Cross Street O’Fallon, IL 62269
Celebrant: Bishop Michael McGovern
Please RSVP by Monday, September 9 to [email protected] Have any extra curriculum? Bring it to sell or give away!
*********************************************************************************************************************************************************************************
Bibles & Brews: Who: Young Adults Ages 21-35
When: Wednesday, September 11 Social is 6:30-7:00pm, Event is 7:00-8:30pm
Where: Eckert's Cider Shed Outdoor Pavillion
951 S. Green Mount Road, Belleville, IL 62220
Hosted By: Fr. Nick Junker
Follow The Diocese of Belleville Young Adult Group:
Instagram: bellevilleyoungadults
Facebook: Diocese of Belleville Young Adults
Please remember in your prayers:
All those serving in the military and everyone listed:
Carl Aarns Jackie Aarns
Edwin Albers
Norb Albers Ruth Albers
Dolores Benhoff
Veronica Blumenstein Sadie Bryan Dave Deutsch
Christie Dust Betty Erlinger Roger Foppe
Carol Fritch
Jupe Gonzalez
JoAnn Gray
Carol Gwinn Gerri Haar Mary Haar
Mike Haar
Jim Haukup
Mary Heimann
Richard Hellige Carlos Hill Rich Holtgrave
Edna Holthaus Gertrude Holthaus Greg Jansen
Tony Jansen
Etta Kampwerth Rose Kuhl
Evie Lammers Gabrielle Ludwig Theresa Luitjohan
Joann Maue Dana Beckmann–Marks Mary Ann Maue
Carol Meier Doris Mueller Fr. Jim Nall
Mark Niemeyer Rachel Peters Florence Pingsterhaus
Ken Porter
Jerome Ratermann Joanie Rolfingsmeier
Pat Rollins Fr. Ed Schaefer Julie (Schlueter) Detmer
Marcel Thole
Clete Timmermann Loretta Trame
Lucille Trame Dottie Wellinghoff Agnes White
Special Intentions
If you have anyone who needs to be added or removed from this list, please contact the Parish Office.
Knightly News Breese K of C Council# 2869
Breese K of C #2869 Meeting: Thursday, September 12 at 7:30pm
K of C Fourth Degree Meeting: Tuesday, September 17 at 7:30pm
Taco Tuesdays: 4:30pm - 7:00pm
Wing Thursday: 4:30pm - 7:00pm
Chicken Fry Fridays: 4:30pm - 7:00pm
(All meals are eat in or take-out and are served in the basement.)
_________________________________________________________________________________________________________________________________________ Date Night for Married Couples sponsored by Diocese of Belleville on Saturday, September 21 from 5:30pm - 9:00pm at St, Nicholas Parish Hall in O'Fallon. Theme: Communication...A Step in the Right Direction. Work on communication skills, take a swing dance lesson. $30 fee includes appetizers, wine, dance lesson & babysitting. BYOB Flyer available on the bulleting board.
Red, White & Blue Mass: Saturday, September 14 at 4:00pm at St. Augustine
Reverse Drawing & Chicken Dinner: Saturday, September 21 Tickets are being mailed, but will also be available at the door.
5th Sunday Breakfast: 09/29/2024, 12/29/2024, 03/30/2025 8-11am
2024 TWENTY-SECOND WEEK IN ORDINARY TIME Daily Scripture and Reflections during Ordinary Time
| Sunday | Monday | Tuesday | Wednesday | Thursday | Friday |
|---|---|---|---|---|---|
| 2 22nd Sunday in Ordinary Time Do not lose sight of what is important. Deut. 4:1-2, 6-8 James 1:17-18, 21b-22, 27 Mark 7:1-8, 14-16, 21-23 | 3 Labor Day Weekday Proclaim the Good News with confidence. 1 Cor. 2:1-5 Luke 4:16-30 | 3 Pope St. Gregory the Great Jesus speaks with authority. 1 Cor. 2:10b-18 Luke 4:31-37 <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://stanthonybeckemeyer.org/wp-content/uploads/2024/08/1-Sep-24-Bulletin.pdf\n</url>\n<text>\nParish Partnership Weekend Worship Schedule\n\nEucharist: Sat. 4:00 pm St. Augustine\n\n5:30 pm St. Dominic\n\nSun. 8:00 am St Augustine\n\n9:30 am St. Anthony\n\n11:00 am St. Dominic\n\nBaptism: Celebrated after the weekend Liturgies by appointment. Baptismal preparation class required. Contact the parish office to register. Set baptismal date at least two months in advance.\n\nReconciliation: Saturday at 3:30 pm at St. Augustine Church or by appointment. Seasonal penance services offered during Advent & Lent with dates to be announced.\n\nMarriage: Call the parish office at least six months in advance.\n\nAnointing of the Sick : Offered annually or by appointment. Call the parish office or (618)-791-0069 for more information or to schedule an anointing.\n\nWelcome\n\nWe encourage everyone 18 or older to register at the office as an adult parishioner.\n\nFamilies of Faith in a Community of Grace\n\nThe Twenty-Second Sunday in Ordinary Time September 1, 2024\n\nDirectory\n\nSt. Augustine Church\n\ne-mail: [email protected]\n\nWebsite: www.saintaugustinebreese.org\n\nFind us on Facebook:\n\nSt. Augustine Catholic Church Breese Illinois\n\nVision Statement: \"Called to Welcome, Serve and Celebrate\"\n\n525 S. Third St. Breese\n\n(618)526-4362\n\nSt. Augustine Parish Center\n\n(618)526-4341\n\nSt. Anthony Church\n\ne-mail: [email protected]\n\nWebsite: www.stanthonybeckemeyer.org\n\nVision Statement: “Continuing to Create a Future Together”\n\nP.O. Box 305, 451 W. Third St. Beckemeyer (618)227-8236\n\nAll Saints Academy295 N. Clinton Breese\n\nWebsite: www.asasaints.com\n\n(618)526-4323\n\nMater Dei High School900 N. Mater Dei Dr. Breese\n\nSchool Website: www.materdeiknights.org(618)526-7216\n\nDiocesan websites: www.diobelle.org\n\nwww.bellevillemessenger.org www.catholiccharitiesusa.org\n\nhttp://catholiccharitiessil.org/ccsil\n\nProject Rachel(618)722-5068\n\nhttps://www.diobelle.org/respectlife/project-rachel\n\nRespect Life Ministry(618)722-5040\n\nSexual Abuse Hotline1-800-640-3044\n\nReligious Education:\n\nOCIA/RCIA For more info please call one of the church office(s).\n\nYouth Faith Formation Classes: Call CRE – Dan Robben at (618) 604-3792 or the parish office for more information.\n\nYouth Ministry Moderators:\n\nErin Etheridge (618)604-7640 Rhonda Pulver (248) 840-1857\n\nParis Hempen (618)910-4551\n\nParish Staff\n\nPastor: Fr. Chuck Tuttle (618)526-2566\n\nPastoral Associate/DRE: Phyllis Berndsen (618)791-0069\n\nPermanent Deacon/DRE: Dcn. Jay Fowler (618)973-3162\n\nMaintenance: Richard Korte (618)402-5964\n\nOffice Manager: Carol Hilmes (618)526-4362\n\n(618)227-8236\n\nBusiness Manager: Dennis Krebs St. Augustine\n\nBusiness Manager: Karri Kampwerth St. Anthony\n\nOffice Hours\n\nBreese: Mon. Office Closed Labor Day\n\nWed & Fri. 8:30am-4:30pm,\n\nThurs. 2:00pm-5:00pm\n\nBeckemeyer: Tues. & Thurs. 8:00am-12:00pm Bulletin deadline: Wednesday at 10:00am\n\nThe Twenty-First Sunday of Ordinary Time\n\nAugust 25, 2024\n\nThe Catholic Communities of\n\nUpcoming Classes & Events:\n\n-Guatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam at St. Augustine on Saturday, August 31 following 4:00pm Mass.\n-First Friday Benediction: Friday, September 6 at 7:00pm at St. Dominic.\n-Padre Pio Mass: Saturday, September 7. Rosary at 8:30am & Mass at 9:00am at St. Dominic.\n-Baptismal Prep Class Monday, September 9 at 7:30pm at St Dominic. Register at your church office by Friday, September 6.\n-Red, White & Blue Mass Saturday, September 14 at 4:00pm Mass at St. Augustine We are remembering our Fire Fighters, EMS Responders, Law Enforcement, Active Military, & Veterans.\n-Are you thinking of becoming Catholic? Let us walk with you on your journey. Order of Christian Initiation of Adults (O.C.I.A. formerly R.C.I.A.) Class will start meeting every Monday from 7pm – 8pm beginning with Monday, September 23. Please grab a flyer from the bulletin Board for more information.\n\nST. ANTHONY MINISTRY SCHEDULES\n\nSunday, Sept. 8 at 9:30am\n\nExtra-ordinary Ministers: Dan & Karen Becker, Lisa Johnson, Drew Pollmann\n\nAltar Servers: Luke Etheridge, Caden Holtgrave\n\nSacristans: Sept. 1 - 7 Annette Burkhardt\n\nSept. 8-14 Audrey Davis\n\nST. AUGUSTINE MINISTRY SCHEDULES\n\n| Bennett Deien Evan Deien | Isaiah Becker | Tom Berndsen, Dan Jansen, Bob & Ruthie Rosen |\n|---|---|---|\n| Jackson Davis Myla Davis | Phyllis Berndsen | Jerry Korte, John Rakers, Jamie Voss, Tony Voss |\n\nExtra-ordinary Ministers Sat., Sept. 7 at 4:00pm: Amy Boeckman, Julie Boeckman, Ralph Kuhl, Jeff Schulte\n\nExtra-ordinary Ministers Sun., Sept. 8 at 8:00am: Phyllis Berndsen, Rachell Maue, Mary Ann Rakers, Alex Wiegmann\n\nSacristan: Sept. 1 - 7 Lynn Maue\n\nSept. 8-14Phyllis Berndsen\n\nExtraordinary Minister to the Home Bound: Sept. 1 Emily Timmermann Sept. 8 Nancy Renschen\n\nDear Friends,\n\nOn this Labor Day weekend, when we recognize all those who work in whatever way they can to provide for their families, their communities, and this nation, we also celebrate the World Day of Prayer for the Care of Creation, praying that together we can work to ensure that the world God made can be enjoyed by future generations for centuries to come. Let us praise God for this wonderful world and the opportunity to work in it.\n\nTHIS WEEK'S SCRIPTURE LESSON: God's commands take center stage today. Moses points out that when the Chosen People put God's commandments into practice, other nations will marvel at how just and wise they are. The psalmist assures us that those who act justly will live in God's presence. We begin hearing selections from the letter of James today; James continually emphasized the need to put one's faith into action. In the Gospel, Jesus chides the Pharisees for putting the letter of human rules above the spirit of God's commands. Let us reflect on how we follow God's commandments.\n\nSTEWARDSHIP: A life of stewardship depends on the realization that everything we possess is a gift from God and belongs to God. We are all stewards or managers of the many gifts God has bestowed upon us. Our challenge as Christians is to make good use of those gifts.\n\nA REMINDER: On this Labor Day Weekend, let us be grateful for the ability we have to share our talents and experiences in the job, work, career or profession in which we give glory to God through the work of our hands. On Friday of this week, Bp. McGovern will be having Mass with the ASA students and blessing the new classrooms addition.\n\nA QUESTION FOR THE WEEK: Where do I see injustice in my family, workplace, community, or the world? What will I do to help bring justice to those who need it in each of those places?\n\nGod bless,\n\nFr. Chuck\n\nSt. Anthony News. . .\n\nUpcoming Meetings:\n\nFinance Council: Thursday, October 3 at 6:30pm\n\nPastoral Council: Thursday, October 3 at 7:30pm\n\n__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\nSt. Augustine News. . .\n\nUpcoming Meetings:\n\nTuesday, September 10at 6:30pm\n\nFinance Council: Thursday, September 5 at 6:30pm\n\nPastoral Council: Thursday, September 5 at 7:30pm\n\nBldng & Grnds Committee:\n\nHoly Name Meeting: Tuesday, September 10 at 7:30pm\n\n_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\nThank you to Chuck Luitjohan, Charlie Kunkel and committee for the recent repair and upgrade work that was just completed.\n\n_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\n_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\nUse extra caution when coming to and leaving from Mass & Adoration. There is road work being performed in the area around church for the next few weeks.\n\nSpend an hour each week with Jesus! He waits for us in this Sacrament of Love. He appeals to each of us: \"Could you not watch one hour with me?\"\n\n_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\nGuatemala Sister Parish Trip Presentation by Deacon Jay and Sr. Pam on Saturday, August 31 immediately after 4:00pm Mass. _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Saturday, September 21 Rhonda Pulver will present information on AED after 4:00pm Mass. How to use it, When to use it, & Where it's located.\n\nYouth Ministry News:\n\nIf you feel like you are lacking in growing your faith. If you are searching to ignite a spark within your relationship with Jesus. Or if you are simply wanting to surround yourself with people who you can talk to about your faith life openly and without judgement & share your journey.. please come join the next Breese Youth Ministry meeting! We will be meeting on September 8th at 6pm :) For more information please reach out to Rhonda Pulver, Erin Etheridge, or Paris Hempen. Also, you can see updates on GroupMe!\n\nSt. Augustine\n\nATTENDANCE\n\nAugust 24 4:00pm……………190 August 25 8:00am………….130\n\nOUR GIFTS TO GOD\n\nAugust 24 Loose: $ 143.00 Envelopes: $1,220.00(52)\n\nAugust 25 Loose: $ 165.00 Envelopes: $ 667.00(15)\n\nOther Envelopes: Assumption $25.00(1), Building $45.00(2),\n\nEducation $5.00(1), Sister Parish $25.00(2)\n\nCalendar Raffle: The Calendar Raffle has begun and will run through Sep 22. Drawings will take place in October. Completed Calendars can be turned in at 9:30 mass on Sundays or given to your parish representative. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\nLadies Sodality will be holding a Bunco and Dessert Party on\n\nMonday, September 16 at 1:00 pm in the Parish Center. Cost is $5 per person. Be sure to join in the fun! This event is open to everyone from all area parishes. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________\n\nLadies Sodality Rummage Sale is Thursday, October 31 - Saturday, November 2. Start getting your donations together now. Donations will start being accepted on Monday, October 14.\n\nPre Cana:\n\nDate: September 14, 2024\n\nWhere: St. Mary Immaculate Catholic Church (Fellowship room): 1550 Main Street, Mt. Vernon IL. 62864 Registration: 9:15 – 9:45 Start: 9:45 Close with 5:00 Mass. Cost: $75.00 per couple. The cost includes materials, lunch and pizza (optional) after 5:00 Mass. To register: Contact Deacon Mark Kabat 618-316-8027\n\nYouth Faith Formation:\n\nYFF Prayer Service: Wednesday, September 18 at 6:30pm Students & Parents, please meet at St. Dominic Church for Mass.\n\nSt. Anthony ATTENDANCE\n\nAugust 25 9:30am………….108\n\nOUR GIFTS TO GOD\n\nAugust 25 Loose: $82.00 Envelopes: $1357.00(29) Other Envelopes: Assumption $55.00(6), Building $70.00(3), Education $54.00(4), Peter's Pence $20.00(1), Sister Parish $75.00(4)\n\nMeals & Events:\n\n_________________________________________________________________________________________________________________________________________\n\nBreese American Legion Post#252 Chicken Drive-Thru or CarryOut Chicken Dinner Sunday, September 8 11am-5pm. All meals are $15 and are 1/2 fried chicken, mashed potatoes, gravy, dressing, green beans and cake.\n\n_________________________________________________________________________________________________________________________________________\n\nRummage Sale sponsored by Corpus Christi Ladies Club 9/139/15. Flyer available on the bulletin board.\n\n_________________________________________________________________________________________________________________________________________\n\nCorpus Christi Trivia Night 9/28. Flyer available.\n\n_________________________________________________________________________________________________________________________________________\n\nSt. Bernard Parish, Albers, IL Annual Wurstmarkt Sunday, September 29, from 10:30-5:30 at St. Bernard Parish Center. Drive thru & carryouts available. Some space available to sit in and eat your carryout. $15.00 per meal.\n\nPro-Life Corner:\n\n\"Suicidal individuals—with or without a terminal illness—typically do not want to die. The patient requesting assisted suicide is often asking, 'Does anyone want me to be alive, or care enough to talk me out of this request and support me through this difficult time?'\"\n\nUSCCB Secretariat of Pro-Life Activities, \"Every Suicide is Tragic\" https://www.usccb.org/every-suicide-tragic\n\n_________________________________________________________________________________________________________________________________________\n\nUpcoming Pro-Life Events:\n\nSun. Sept. 8: Catholic Single Moms Group from 2-4pm at St. Clare in O'Fallon. Flyer Available on the bulletin board.\n\nFri. Oct. 18: The 1 st Diocese of Belleville Respect Life Conference with pro-life speakers at the Cathedral of St. Peter _________________________________________________________________________________________________________________________________________\n\nHome School Mass, Backpack Blessing & Lunch Reception\n\nWhen: Tuesday, September 10 at 11:00am\n\nLocation: St. Clare of Assisi Catholic Church, 1411 Cross Street O’Fallon, IL 62269\n\nCelebrant: Bishop Michael McGovern\n\nPlease RSVP by Monday, September 9 to [email protected] Have any extra curriculum? Bring it to sell or give away!\n\n*********************************************************************************************************************************************************************************\n\nBibles & Brews: Who: Young Adults Ages 21-35\n\nWhen: Wednesday, September 11 Social is 6:30-7:00pm, Event is 7:00-8:30pm\n\nWhere: Eckert's Cider Shed Outdoor Pavillion\n\n951 S. Green Mount Road, Belleville, IL 62220\n\nHosted By: Fr. Nick Junker\n\nFollow The Diocese of Belleville Young Adult Group:\n\nInstagram: bellevilleyoungadults\n\nFacebook: Diocese of Belleville Young Adults\n\nPlease remember in your prayers:\n\nAll those serving in the military and everyone listed:\n\nCarl Aarns Jackie Aarns\n\nEdwin Albers\n\nNorb Albers Ruth Albers\n\nDolores Benhoff\n\nVeronica Blumenstein Sadie Bryan Dave Deutsch\n\nChristie Dust Betty Erlinger Roger Foppe\n\nCarol Fritch\n\nJupe Gonzalez\n\nJoAnn Gray\n\nCarol Gwinn Gerri Haar Mary Haar\n\nMike Haar\n\nJim Haukup\n\nMary Heimann\n\nRichard Hellige Carlos Hill Rich Holtgrave\n\nEdna Holthaus Gertrude Holthaus Greg Jansen\n\nTony Jansen\n\nEtta Kampwerth Rose Kuhl\n\nEvie Lammers Gabrielle Ludwig Theresa Luitjohan\n\nJoann Maue Dana Beckmann–Marks Mary Ann Maue\n\nCarol Meier Doris Mueller Fr. Jim Nall\n\nMark Niemeyer Rachel Peters Florence Pingsterhaus\n\nKen Porter\n\nJerome Ratermann Joanie Rolfingsmeier\n\nPat Rollins Fr. Ed Schaefer Julie (Schlueter) Detmer\n\nMarcel Thole\n\nClete Timmermann Loretta Trame\n\nLucille Trame Dottie Wellinghoff Agnes White\n\nSpecial Intentions\n\nIf you have anyone who needs to be added or removed from this list, please contact the Parish Office.\n\nKnightly News Breese K of C Council# 2869\n\nBreese K of C #2869 Meeting: Thursday, September 12 at 7:30pm\n\nK of C Fourth Degree Meeting: Tuesday, September 17 at 7:30pm\n\nTaco Tuesdays: 4:30pm - 7:00pm\n\nWing Thursday: 4:30pm - 7:00pm\n\nChicken Fry Fridays: 4:30pm - 7:00pm\n\n(All meals are eat in or take-out and are served in the basement.)\n\n_________________________________________________________________________________________________________________________________________ Date Night for Married Couples sponsored by Diocese of Belleville on Saturday, September 21 from 5:30pm - 9:00pm at St, Nicholas Parish Hall in O'Fallon. Theme: Communication...A Step in the Right Direction. Work on communication skills, take a swing dance lesson. $30 fee includes appetizers, wine, dance lesson & babysitting. BYOB Flyer available on the bulleting board.\n\nRed, White & Blue Mass: Saturday, September 14 at 4:00pm at St. Augustine\n\nReverse Drawing & Chicken Dinner: Saturday, September 21 Tickets are being mailed, but will also be available at the door.\n\n5th Sunday Breakfast: 09/29/2024, 12/29/2024, 03/30/2025 8-11am\n\n2024 TWENTY-SECOND WEEK IN ORDINARY TIME Daily Scripture and Reflections during Ordinary Time\n\n| Sunday | Monday | Tuesday | Wednesday | Thursday | Friday |\n|---|---|---|---|---|---|\n| 2 22nd Sunday in Ordinary Time Do not lose sight of what is important. Deut. 4:1-2, 6-8 James 1:17-18, 21b-22, 27 Mark 7:1-8, 14-16, 21-23 | 3 Labor Day Weekday Proclaim the Good News with confidence. 1 Cor. 2:1-5 Luke 4:16-30 | 3 Pope St. Gregory the Great Jesus speaks with authority. 1 Cor. 2:10b-18 Luke 4:31-37 <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "| 4 Weekday Working for the Lord is our life- long calling.",
"role": "assistant"
}
] |
|
A New Approach to Affordable and Reliable Cardiology PACS Architecture Using Open-Source Technology
3
P Marcheschi 1 , A Ciregia 1 , A Mazzarisi 2 , G Augiero 1 , A Gori
1 Fondazione Toscana Gabriele Monasterio CNR-Regione Toscana, Pisa, Italy 2 CNR, Pisa, Italy 3 ASL1, Massa, Italy
Abstract
In the past ten years we followed the expansion of cardiology imaging technology and how it relates to integration, tele-consulting and standards. The new frontier of Picture archiving and communication systems (PACS) is expanding and require more technology and resources. Cardiology imaging is evolving and needs even more resources than before. The present work proposes a new approach to manage a large cardiology PACS installation using new open-source facilities on affordable hardware creating a reliable system. For this kind of application we moved our core system from Linux platform to the new OpenSolaris unix and to novelty Functions like Solaris Containers, ZFS file-system and Fair Share Scheduler, in order to achieve server consolidation, ease of use and reliability.
1. Introduction
PACS, Picture archiving and communication system are the most needed and expensive instruments in a modern hospital, this because the need for iconography representation of human body is growing in every field of health-care. PACS needs performance, stability and security in order to treat thousand of images a day, for every modality in an hospital: it needs storage space, ability to compress and decompress images in parallel and very high band throughput to satisfy health-care professional needs. One of the most used open-source PACS software is dcm4chee [1] [2] this because is written in the platform independent java language, and is a feature complete implementation of an IHE PACS system. We evaluated different lossless and lossy compression schema in order to achieve fast client/server response and to overcome low bandwidth connections limits. Moreover actual local hi-bandwidth environments required logical and physical network separation by imaging modality by the use of VLAN support and spanning tree technology. In order to assure the optimal service availability, the system is constantly monitored to quickly rise alerts and to graph system performance and status. Particular attention is posed to IT security, achieved with a cluster of two Linux firewall with network filtering support. At the moment we are sharing with the proposed system over 23 millions images, coming from MRI, CT, PET, ECHO, CR/DR and XA imaging laboratories.
2. Methods
The classic approach to server consolidation and deploying is to use windows or Linux based architecture, with Vmware virtualization solution [3]. Among different flavors of unix we can choose one of the myriad of linux distributions but when we tried Solaris/OpenSolaris [4] we realized that an alternative to these popular operating systems exists and we found in solaris unix what we were looking for. A very reliable and full of features right for our need. This Operative System is not new and has been used for years as a commercial UNIX in contrast to open source solutions based on linux. First of all ZFS (Zettabyte File System) [5], is a 128 bit file system, with end to end checksum integrity, built in compression, volume manager and unlimited snapshot features. It offers unprecedented ease of use and reliability. Solaris is the ideal solution for consolidate multiple image managers in a single server due to its native ability to support server virtualization without the need for different products and technologies. It uses the concept of zone, or container, that is the OS environment [6]. It is a light-weight OS virtualization with only one kernel per hardware, virtual networking and with a complete isolation between zones or virtual machines. OpenSolaris is a bit ahead of Solaris, it has a better support for peripherals, and has newer ZFS and kernel features, also the standard version is mature for production use. The choice of a new OS for production use is difficult because we had to develop new skills. In order to do so, SUN Microsystems [7] helped us with a free training workshop, to be able to achieve, base necessary skills, to start the project. The main goal of the project was to
develop a cheap, fast and reliable server configuration in order to store and redistribute images coming from our multiple modalities (MRI, CT, PET, CT-PET, Ultrasound, CR/DR and XA imaging laboratories).
The architecture of the system is made by three solaris servers two for the front-end, directly connected to the consoles of the modalities, and one for the historic PACS archive, that has a big storage pool (24 TB). We decided to redesign also our network using vlans. In order to develop this kind of isolation between the first level of the PACS, the front-end, we needed a way to virtualize and consolidate servers, instead of buying one machine for every modality we choose to use the Solaris containers virtualization solution. This solution gives compartmentalization and proportional use of resources trough FSS (Fair share schedule) scheduling software, which controls the allocation of available CPU resources among workloads. A zone is a virtualized environment with it's own root, but with a lack of a private dedicated kernel, it uses instead the host kernel, this is a big performance gain. There is also the possibility to create a linux branded zone with the same level of abstraction, with an emulated kernel that map primitive linux system calls to native solaris calls. This in order to migrate effortless a complete linux environment. Another possibility offered by this OS is the file-system snapshot feature, available only in more expensive NAS (Networked Attached Systems) or storage solutions, this makes possible making backups of the overall system or a particular subdirectory, in different point in time and while the system is running in production. With this facility one can recover from accidentally removed files , or is possible to backup the DB without service interruption. We used this feature to upgrade the image manager software with only a software restart. Also the purpose of this kind of architecture is to split the image compression pipeline in two different steps. Actually, to be able to store more images on storage, we adopted the JPLL (Jpeg Lossless) [8] compression schema to achieve 3:1-2:1 compression ratio. This heavy duty task is executed by the front-end servers that have low storage capacity, but high processor power. Once compressed, the images are forwarded to the historic archive in night batches. The IHE [9] [10] image manager is built upon the well known open-source project dcm4chee, a few modification were added to the standard distribution, but only in logging and control scripts because Solaris uses a different service facility called SMF (Solaris Management Facility). The dcm4chee software is rock solid, and is full of features comparable to commercial one.
In the network context, each zone uses a different physical network interface that exists on the server. We allocated a different network subnet for each network interface. On each network segment there is a modality that sends the medical study to the relative Solaris zone. This choice, implemented during the network design, assures the best performance and security in network communications. Specifically, at the end of each study, each modality sends a huge amount of data to its dedicated zone. Network traffic is composed of a number of large clinical pictures transiting on the network. Generally the implementation of routing techniques requires single frame delivery to the gateway of the subnet to which they belong, through a Layer 2 protocol, the gateway has to unpack the frame and analyze information to Layer 3 then forward the package to the proper interface where the recipient is present. The activity of unpacking and packing requires a short delay for the router computation in order to create each package, lowering the performance and adding a slight delay in communication. In addition, the router become a new point of failure in communication between the modality and the Image Manager. The above problems are avoided by positioning modality and Image Manager on the same subnet.
Surgeons, doctors and Technicians rely on PACS 24x7 availability, hence we must provide quick response in case of system malfunctioning. In addition we have considered worthwhile, having an historical view of servers performance and a day by day usage charts. To achieve such goals we used two Open Source software: Nagios [11] and Cacti [12]. In addition, for logs management produced by Dcm4chee archive manager itself, we used another Open Source software: SEC (Simple Event Correlator) [13]. Nagios is a powerful and widely used network monitoring system. The strength of this useful application is the large base of community supported add-ons, in particular the plug-ins. They are standalone piece of softwares that plug into the main application in order to do specific task. One of this plugin is the DICOM service checker that allow to monitor the availability of a DICOM service class provider (SCP).
Thanks to this kind of plug-in we can easily verify every aspect of our PACS network and in particular the status of our services. The following are the parameters checked every 5 minutes: Server Load, Hardware sensors, Disk Space, Number of processes, Raid Status, Database Status, DICOM services. We can for example actively monitor the storage status, or if a service is running and if the server load is too high. We can have a look to the hardware sensors, and we can check if the DICOM SCP service is answering through the network. If there is a problem, such as the free disk space is becoming to small (we can define various thresholds) or the DICOM SCP is no more answering, Nagios will
rise an alert on his dashboard, and it will send a notification via e-mail to the configured group of recipients (Nagios can be configured to also send notifications via SMS or instant chat systems). An extremely useful program is the Nagios Firefox plugin, that allows a constant view over PACS alerts on our desktop.
Cacti is an RRDtool (Round Robin Database Tool) based graphing solution. RRDtool is a industry standard created for data logging and graphing system of time series data. The Cacti application is configured in order to collect data from the PACS network and it renders it on its dashboard. The control panel looks nice and intuitive, and like Nagios has many community contributed scripts useful to gather any kind of information. For example we graph server load, network usage, disk space utilization, swap space, various MySQL DB aspects. Data is mainly collected using the SNMP (Simple Network Management
Protocol) protocol.
Having a look to data plotted in graphs, we can have a global view of the overall system activity of the PACS, and we can estimate also when to do small maintenance painlessly for example; looking at the network graphs we can understand if the LAN is overloaded; with home made scripts we can also monitor the growth over time of the PACS studies stored in the database.
The Dcm4chee software is written in Java, and it uses log4j for logging informational or error events. In case an error exceed a threshold, log4j can be configured to send an email message with the log attached to it. In the past we have had some problem due to the large amount of log produced, very often useless, uninteresting or duplicated. Configuring log4j for a smarter log notification can be a pain for non programmers, so we settled to use another tool called SEC that is a very smart and powerful daemon written in Perl. This tool attend to parse log files using Regular Expressions or simple string comparison; if a match is encountered, we can associate an action to this event: send a mail, ignore further match for an amount of time, group together the event to notify, drop the event, and so on. SEC is therefore a very valuable addition to the monitoring tools that we made up to follow the PACS overall health.
3. Results
One of the biggest advantage of the overall system is the reliability and the price lower than proprietary systems. With this system we are storing over 23 millions images with 60 thousand studies, and this figures are growing every day. One of the disadvantage of this system is the need for prepared technician to understand what is going on with the system itself, the personnel must be familiar with Solaris unix system administration, slightly different from linux one, with java virtual machine and web work-flow since the software is based on java award winning technology and is web based.
Another disadvantage, but this is common to other system is the crucial phase of system upgrade. Actually this kind of system has to be upgraded at least every 6 months for system operative restart and image software upgrade, this phase is delicate in order to reduce system off-line time. We decided to face this problem making a replica of the virtual containers in order to have the possibility to recover to the old state in the case of problems. The system is very stable and compatible with all of our modalities and backup system (RIMAGE from GE) and is comparable with most blazoned systems in terms of network response and features.
4. Discussion and conclusions
At the moment we have replicated the architecture in another site in Massa that is our reference cardiology surgical hospital. This has the same structure but is serving over 4 millions of images in over 35 thousand studies. This architecture seems to be reliable and stable, the choice of using Solaris Operative system and mysql database along with dcm4chee server software, was the right choice to sustain very critical tasks with one tenth of the budget needed for a commercial PACS.
References
[1] Zeilinger G. Open Source Clinical Image and Object Management. http://www.dcm4che.org/ accessed sept 2009.
[2] Warnock MJ, Toland C, Evans D, Wallace B, and Nagy P. Benefits of Using the DCM4CHE DICOM Archive. Journal of Digital Imaging, vol. 20, 2007:125–129.
[3] VMware Cloud Computing with Virtualization, Green IT, Virtual Machine & Servers. http://www.vmware.com/go/vmware-go/ accessed sept 2009.
[4] Solaris Operating System.
http://www.sun.com/software/solaris/ accessed sept 2009.
[5] Strobl R. ZFS: Revolution in File Systems. Sun Tech Days 2008-2009.
[6] Price D and Tucker A. Solaris zones: Operating system support for consolidating commercial workloads.
[7] Sun Microsystems. http://www.sun.com/ accessed sept 2009.
[8] Wallace GK and others. The JPEG still picture compression standard. Communications of the ACM. vol. 34, 1991:30–44.
[9] Grimes S. The challenge of integrating the healthcare enterprise. Engineering in Medicine and Biology Magazine. IEEE, vol. 24, 2005: 122-4.
[10] Elion J, Becker T, Keller A, Simon R, Sippel T, Solomon H, and Weintraub W. Integrating the healthcare enterprise (IHE) interoperability for cardiology: year 1 demonstration. Computers in Cardiology 2005, 2005:691694.
[11] Nagios - The Industry Standard in IT Infrastructure Monitoring. http://www.nagios.org/ accessed sept 2009.
[12] Cacti: The Complete RRDTool-based Graphing Solution. http://www.cacti.net/ accessed sept 2009.
[13] Vaarandi R. SEC - a lightweight event correlation tool. IP Operations and Management. 2002 IEEE Workshop on, 2002:111-115.
Address for correspondence
Paolo Marcheschi Fondazione Gabriele Monasterio CNR Via G. Moruzzi 1 56126, Pisa, Italy. [email protected]
|
<urn:uuid:e929e253-0c5a-4fa0-9c16-5185dc6ed823>
|
CC-MAIN-2021-04
|
https://www.cinc.org/archives/2009/pdf/0537.pdf
|
2021-01-22T01:09:06+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-04/subset=warc/part-00132-364a895c-5e5c-46bb-846e-75ec7de82b3b.c000.gz.parquet
| 713,491,847
| 3,301
|
eng_Latn
|
eng_Latn
| 0.996046
|
eng_Latn
| 0.996342
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4292,
8346,
10884,
15699
] |
A New Approach to Affordable and Reliable Cardiology PACS Architecture Using Open-Source Technology
3
P Marcheschi 1 , A Ciregia 1 , A Mazzarisi 2 , G Augiero 1 , A Gori
1 Fondazione Toscana Gabriele Monasterio CNR-Regione Toscana, Pisa, Italy 2 CNR, Pisa, Italy 3 ASL1, Massa, Italy
Abstract
In the past ten years we followed the expansion of cardiology imaging technology and how it relates to integration, tele-consulting and standards. The new frontier of Picture archiving and communication systems (PACS) is expanding and require more technology and resources. Cardiology imaging is evolving and needs even more resources than before. The present work proposes a new approach to manage a large cardiology PACS installation using new open-source facilities on affordable hardware creating a reliable system. For this kind of application we moved our core system from Linux platform to the new OpenSolaris unix and to novelty Functions like Solaris Containers, ZFS file-system and Fair Share Scheduler, in order to achieve server consolidation, ease of use and reliability.
1. Introduction
PACS, Picture archiving and communication system are the most needed and expensive instruments in a modern hospital, this because the need for iconography representation of human body is growing in every field of health-care. PACS needs performance, stability and security in order to treat thousand of images a day, for every modality in an hospital: it needs storage space, ability to compress and decompress images in parallel and very high band throughput to satisfy health-care professional needs. One of the most used open-source PACS software is dcm4chee [1] [2] this because is written in the platform independent java language, and is a feature complete implementation of an IHE PACS system. We evaluated different lossless and lossy compression schema in order to achieve fast client/server response and to overcome low bandwidth connections limits. Moreover actual local hi-bandwidth environments required logical and physical network separation by imaging modality by the use of VLAN support and spanning tree technology. In order to assure the optimal service availability, the system is constantly monitored to quickly rise alerts and to graph system performance and status. Particular attention is posed to IT security, achieved with a cluster of two Linux firewall with network filtering support. At the moment we are sharing with the proposed system over 23 millions images, coming from MRI, CT, PET, ECHO, CR/DR and XA imaging laboratories.
2. Methods
The classic approach to server consolidation and deploying is to use windows or Linux based architecture, with Vmware virtualization solution [3]. Among different flavors of unix we can choose one of the myriad of linux distributions but when we tried Solaris/OpenSolaris [4] we realized that an alternative to these popular operating systems exists and we found in solaris unix what we were looking for. A very reliable and full of features right for our need. This Operative System is not new and has been used for years as a commercial UNIX in contrast to open source solutions based on linux. First of all ZFS (Zettabyte File System) [5], is a 128 bit file system, with end to end checksum integrity, built in compression, volume manager and unlimited snapshot features. It offers unprecedented ease of use and reliability. Solaris is the ideal solution for consolidate multiple image managers in a single server due to its native ability to support server virtualization without the need for different products and technologies. It uses the concept of zone, or container, that is the OS environment [6]. It is a light-weight OS virtualization with only one kernel per hardware, virtual networking and with a complete isolation between zones or virtual machines. OpenSolaris is a bit ahead of Solaris, it has a better support for peripherals, and has newer ZFS and kernel features, also the standard version is mature for production use. The choice of a new OS for production use is difficult because we had to develop new skills. In order to do so, SUN Microsystems [7] helped us with a free training workshop, to be able to achieve, base necessary skills, to start the project. The main goal of the project was to
develop a cheap, fast and reliable server configuration in order to store and redistribute images coming from our multiple modalities (MRI, CT, PET, CT-PET, Ultrasound, CR/DR and XA imaging laboratories).
The architecture of the system is made by three solaris servers two for the front-end, directly connected to the consoles of the modalities, and one for the historic PACS archive, that has a big storage pool (24 TB). We decided to redesign also our network using vlans. In order to develop this kind of isolation between the first level of the PACS, the front-end, we needed a way to virtualize and consolidate servers, instead of buying one machine for every modality we choose to use the Solaris containers virtualization solution. This solution gives compartmentalization and proportional use of resources trough FSS (Fair share schedule) scheduling software, which controls the allocation of available CPU resources among workloads. A zone is a virtualized environment with it's own root, but with a lack of a private dedicated kernel, it uses instead the host kernel, this is a big performance gain. There is also the possibility to create a linux branded zone with the same level of abstraction, with an emulated kernel that map primitive linux system calls to native solaris calls. This in order to migrate effortless a complete linux environment. Another possibility offered by this OS is the file-system snapshot feature, available only in mo
|
re expensive NAS (Networked Attached Systems) or storage solutions, this makes possible making backups of the overall system or a particular subdirectory, in different point in time and while the system is running in production.
|
With this facility one can recover from accidentally removed files , or is possible to backup the DB without service interruption. We used this feature to upgrade the image manager software with only a software restart. Also the purpose of this kind of architecture is to split the image compression pipeline in two different steps. Actually, to be able to store more images on storage, we adopted the JPLL (Jpeg Lossless) [8] compression schema to achieve 3:1-2:1 compression ratio. This heavy duty task is executed by the front-end servers that have low storage capacity, but high processor power. Once compressed, the images are forwarded to the historic archive in night batches. The IHE [9] [10] image manager is built upon the well known open-source project dcm4chee, a few modification were added to the standard distribution, but only in logging and control scripts because Solaris uses a different service facility called SMF (Solaris Management Facility). The dcm4chee software is rock solid, and is full of features comparable to commercial one.
In the network context, each zone uses a different physical network interface that exists on the server. We allocated a different network subnet for each network interface. On each network segment there is a modality that sends the medical study to the relative Solaris zone. This choice, implemented during the network design, assures the best performance and security in network communications. Specifically, at the end of each study, each modality sends a huge amount of data to its dedicated zone. Network traffic is composed of a number of large clinical pictures transiting on the network. Generally the implementation of routing techniques requires single frame delivery to the gateway of the subnet to which they belong, through a Layer 2 protocol, the gateway has to unpack the frame and analyze information to Layer 3 then forward the package to the proper interface where the recipient is present. The activity of unpacking and packing requires a short delay for the router computation in order to create each package, lowering the performance and adding a slight delay in communication. In addition, the router become a new point of failure in communication between the modality and the Image Manager. The above problems are avoided by positioning modality and Image Manager on the same subnet.
Surgeons, doctors and Technicians rely on PACS 24x7 availability, hence we must provide quick response in case of system malfunctioning. In addition we have considered worthwhile, having an historical view of servers performance and a day by day usage charts. To achieve such goals we used two Open Source software: Nagios [11] and Cacti [12]. In addition, for logs management produced by Dcm4chee archive manager itself, we used another Open Source software: SEC (Simple Event Correlator) [13]. Nagios is a powerful and widely used network monitoring system. The strength of this useful application is the large base of community supported add-ons, in particular the plug-ins. They are standalone piece of softwares that plug into the main application in order to do specific task. One of this plugin is the DICOM service checker that allow to monitor the availability of a DICOM service class provider (SCP).
Thanks to this kind of plug-in we can easily verify every aspect of our PACS network and in particular the status of our services. The following are the parameters checked every 5 minutes: Server Load, Hardware sensors, Disk Space, Number of processes, Raid Status, Database Status, DICOM services. We can for example actively monitor the storage status, or if a service is running and if the server load is too high. We can have a look to the hardware sensors, and we can check if the DICOM SCP service is answering through the network. If there is a problem, such as the free disk space is becoming to small (we can define various thresholds) or the DICOM SCP is no more answering, Nagios will
rise an alert on his dashboard, and it will send a notification via e-mail to the configured group of recipients (Nagios can be configured to also send notifications via SMS or instant chat systems). An extremely useful program is the Nagios Firefox plugin, that allows a constant view over PACS alerts on our desktop.
Cacti is an RRDtool (Round Robin Database Tool) based graphing solution. RRDtool is a industry standard created for data logging and graphing system of time series data. The Cacti application is configured in order to collect data from the PACS network and it renders it on its dashboard. The control panel looks nice and intuitive, and like Nagios has many community contributed scripts useful to gather any kind of information. For example we graph server load, network usage, disk space utilization, swap space, various MySQL DB aspects. Data is mainly collected using the SNMP (Simple Network Management
Protocol) protocol.
Having a look to data plotted in graphs, we can have a global view of the overall system activity of the PACS, and we can estimate also when to do small maintenance painlessly for example; looking at the network graphs we can understand if the LAN is overloaded; with home made scripts we can also monitor the growth over time of the PACS studies stored in the database.
The Dcm4chee software is written in Java, and it uses log4j for logging informational or error events. In case an error exceed a threshold, log4j can be configured to send an email message with the log attached to it. In the past we have had some problem due to the large amount of log produced, very often useless, uninteresting or duplicated. Configuring log4j for a smarter log notification can be a pain for non programmers, so we settled to use another tool called SEC that is a very smart and powerful daemon written in Perl. This tool attend to parse log files using Regular Expressions or simple string comparison; if a match is encountered, we can associate an action to this event: send a mail, ignore further match for an amount of time, group together the event to notify, drop the event, and so on. SEC is therefore a very valuable addition to the monitoring tools that we made up to follow the PACS overall health.
3. Results
One of the biggest advantage of the overall system is the reliability and the price lower than proprietary systems. With this system we are storing over 23 millions images with 60 thousand studies, and this figures are growing every day. One of the disadvantage of this system is the need for prepared technician to understand what is going on with the system itself, the personnel must be familiar with Solaris unix system administration, slightly different from linux one, with java virtual machine and web work-flow since the software is based on java award winning technology and is web based.
Another disadvantage, but this is common to other system is the crucial phase of system upgrade. Actually this kind of system has to be upgraded at least every 6 months for system operative restart and image software upgrade, this phase is delicate in order to reduce system off-line time. We decided to face this problem making a replica of the virtual containers in order to have the possibility to recover to the old state in the case of problems. The system is very stable and compatible with all of our modalities and backup system (RIMAGE from GE) and is comparable with most blazoned systems in terms of network response and features.
4. Discussion and conclusions
At the moment we have replicated the architecture in another site in Massa that is our reference cardiology surgical hospital. This has the same structure but is serving over 4 millions of images in over 35 thousand studies. This architecture seems to be reliable and stable, the choice of using Solaris Operative system and mysql database along with dcm4chee server software, was the right choice to sustain very critical tasks with one tenth of the budget needed for a commercial PACS.
References
[1] Zeilinger G. Open Source Clinical Image and Object Management. http://www.dcm4che.org/ accessed sept 2009.
[2] Warnock MJ, Toland C, Evans D, Wallace B, and Nagy P. Benefits of Using the DCM4CHE DICOM Archive. Journal of Digital Imaging, vol. 20, 2007:125–129.
[3] VMware Cloud Computing with Virtualization, Green IT, Virtual Machine & Servers. http://www.vmware.com/go/vmware-go/ accessed sept 2009.
[4] Solaris Operating System.
http://www.sun.com/software/solaris/ accessed sept 2009.
[5] Strobl R. ZFS: Revolution in File Systems. Sun Tech Days 2008-2009.
[6] Price D and Tucker A. Solaris zones: Operating system support for consolidating commercial workloads.
[7] Sun Microsystems. http://www.sun.com/ accessed sept 2009.
[8] Wallace GK and others. The JPEG still picture compression standard. Communications of the ACM. vol. 34, 1991:30–44.
[9] Grimes S. The challenge of integrating the healthcare enterprise. Engineering in Medicine and Biology Magazine. IEEE, vol. 24, 2005: 122-4.
[10] Elion J, Becker T, Keller A, Simon R, Sippel T, Solomon H, and Weintraub W. Integrating the healthcare enterprise (IHE) interoperability for cardiology: year 1 demonstration. Computers in Cardiology 2005, 2005:691694.
[11] Nagios - The Industry Standard in IT Infrastructure Monitoring. http://www.nagios.org/ accessed sept 2009.
[12] Cacti: The Complete RRDTool-based Graphing Solution. http://www.cacti.net/ accessed sept 2009.
[13] Vaarandi R. SEC - a lightweight event correlation tool. IP Operations and Management. 2002 IEEE Workshop on, 2002:111-115.
Address for correspondence
Paolo Marcheschi Fondazione Gabriele Monasterio CNR Via G. Moruzzi 1 56126, Pisa, Italy. [email protected]
| 5,752
|
inside_word
|
more
|
remove_one_sentence
|
<url>
https://www.cinc.org/archives/2009/pdf/0537.pdf
</url>
<text>
A New Approach to Affordable and Reliable Cardiology PACS Architecture Using Open-Source Technology
3
P Marcheschi 1 , A Ciregia 1 , A Mazzarisi 2 , G Augiero 1 , A Gori
1 Fondazione Toscana Gabriele Monasterio CNR-Regione Toscana, Pisa, Italy 2 CNR, Pisa, Italy 3 ASL1, Massa, Italy
Abstract
In the past ten years we followed the expansion of cardiology imaging technology and how it relates to integration, tele-consulting and standards. The new frontier of Picture archiving and communication systems (PACS) is expanding and require more technology and resources. Cardiology imaging is evolving and needs even more resources than before. The present work proposes a new approach to manage a large cardiology PACS installation using new open-source facilities on affordable hardware creating a reliable system. For this kind of application we moved our core system from Linux platform to the new OpenSolaris unix and to novelty Functions like Solaris Containers, ZFS file-system and Fair Share Scheduler, in order to achieve server consolidation, ease of use and reliability.
1. Introduction
PACS, Picture archiving and communication system are the most needed and expensive instruments in a modern hospital, this because the need for iconography representation of human body is growing in every field of health-care. PACS needs performance, stability and security in order to treat thousand of images a day, for every modality in an hospital: it needs storage space, ability to compress and decompress images in parallel and very high band throughput to satisfy health-care professional needs. One of the most used open-source PACS software is dcm4chee [1] [2] this because is written in the platform independent java language, and is a feature complete implementation of an IHE PACS system. We evaluated different lossless and lossy compression schema in order to achieve fast client/server response and to overcome low bandwidth connections limits. Moreover actual local hi-bandwidth environments required logical and physical network separation by imaging modality by the use of VLAN support and spanning tree technology. In order to assure the optimal service availability, the system is constantly monitored to quickly rise alerts and to graph system performance and status. Particular attention is posed to IT security, achieved with a cluster of two Linux firewall with network filtering support. At the moment we are sharing with the proposed system over 23 millions images, coming from MRI, CT, PET, ECHO, CR/DR and XA imaging laboratories.
2. Methods
The classic approach to server consolidation and deploying is to use windows or Linux based architecture, with Vmware virtualization solution [3]. Among different flavors of unix we can choose one of the myriad of linux distributions but when we tried Solaris/OpenSolaris [4] we realized that an alternative to these popular operating systems exists and we found in solaris unix what we were looking for. A very reliable and full of features right for our need. This Operative System is not new and has been used for years as a commercial UNIX in contrast to open source solutions based on linux. First of all ZFS (Zettabyte File System) [5], is a 128 bit file system, with end to end checksum integrity, built in compression, volume manager and unlimited snapshot features. It offers unprecedented ease of use and reliability. Solaris is the ideal solution for consolidate multiple image managers in a single server due to its native ability to support server virtualization without the need for different products and technologies. It uses the concept of zone, or container, that is the OS environment [6]. It is a light-weight OS virtualization with only one kernel per hardware, virtual networking and with a complete isolation between zones or virtual machines. OpenSolaris is a bit ahead of Solaris, it has a better support for peripherals, and has newer ZFS and kernel features, also the standard version is mature for production use. The choice of a new OS for production use is difficult because we had to develop new skills. In order to do so, SUN Microsystems [7] helped us with a free training workshop, to be able to achieve, base necessary skills, to start the project. The main goal of the project was to
develop a cheap, fast and reliable server configuration in order to store and redistribute images coming from our multiple modalities (MRI, CT, PET, CT-PET, Ultrasound, CR/DR and XA imaging laboratories).
The architecture of the system is made by three solaris servers two for the front-end, directly connected to the consoles of the modalities, and one for the historic PACS archive, that has a big storage pool (24 TB). We decided to redesign also our network using vlans. In order to develop this kind of isolation between the first level of the PACS, the front-end, we needed a way to virtualize and consolidate servers, instead of buying one machine for every modality we choose to use the Solaris containers virtualization solution. This solution gives compartmentalization and proportional use of resources trough FSS (Fair share schedule) scheduling software, which controls the allocation of available CPU resources among workloads. A zone is a virtualized environment with it's own root, but with a lack of a private dedicated kernel, it uses instead the host kernel, this is a big performance gain. There is also the possibility to create a linux branded zone with the same level of abstraction, with an emulated kernel that map primitive linux system calls to native solaris calls. This in order to migrate effortless a complete linux environment. Another possibility offered by this OS is the file-system snapshot feature, available only in mo<cursor_is_here> With this facility one can recover from accidentally removed files , or is possible to backup the DB without service interruption. We used this feature to upgrade the image manager software with only a software restart. Also the purpose of this kind of architecture is to split the image compression pipeline in two different steps. Actually, to be able to store more images on storage, we adopted the JPLL (Jpeg Lossless) [8] compression schema to achieve 3:1-2:1 compression ratio. This heavy duty task is executed by the front-end servers that have low storage capacity, but high processor power. Once compressed, the images are forwarded to the historic archive in night batches. The IHE [9] [10] image manager is built upon the well known open-source project dcm4chee, a few modification were added to the standard distribution, but only in logging and control scripts because Solaris uses a different service facility called SMF (Solaris Management Facility). The dcm4chee software is rock solid, and is full of features comparable to commercial one.
In the network context, each zone uses a different physical network interface that exists on the server. We allocated a different network subnet for each network interface. On each network segment there is a modality that sends the medical study to the relative Solaris zone. This choice, implemented during the network design, assures the best performance and security in network communications. Specifically, at the end of each study, each modality sends a huge amount of data to its dedicated zone. Network traffic is composed of a number of large clinical pictures transiting on the network. Generally the implementation of routing techniques requires single frame delivery to the gateway of the subnet to which they belong, through a Layer 2 protocol, the gateway has to unpack the frame and analyze information to Layer 3 then forward the package to the proper interface where the recipient is present. The activity of unpacking and packing requires a short delay for the router computation in order to create each package, lowering the performance and adding a slight delay in communication. In addition, the router become a new point of failure in communication between the modality and the Image Manager. The above problems are avoided by positioning modality and Image Manager on the same subnet.
Surgeons, doctors and Technicians rely on PACS 24x7 availability, hence we must provide quick response in case of system malfunctioning. In addition we have considered worthwhile, having an historical view of servers performance and a day by day usage charts. To achieve such goals we used two Open Source software: Nagios [11] and Cacti [12]. In addition, for logs management produced by Dcm4chee archive manager itself, we used another Open Source software: SEC (Simple Event Correlator) [13]. Nagios is a powerful and widely used network monitoring system. The strength of this useful application is the large base of community supported add-ons, in particular the plug-ins. They are standalone piece of softwares that plug into the main application in order to do specific task. One of this plugin is the DICOM service checker that allow to monitor the availability of a DICOM service class provider (SCP).
Thanks to this kind of plug-in we can easily verify every aspect of our PACS network and in particular the status of our services. The following are the parameters checked every 5 minutes: Server Load, Hardware sensors, Disk Space, Number of processes, Raid Status, Database Status, DICOM services. We can for example actively monitor the storage status, or if a service is running and if the server load is too high. We can have a look to the hardware sensors, and we can check if the DICOM SCP service is answering through the network. If there is a problem, such as the free disk space is becoming to small (we can define various thresholds) or the DICOM SCP is no more answering, Nagios will
rise an alert on his dashboard, and it will send a notification via e-mail to the configured group of recipients (Nagios can be configured to also send notifications via SMS or instant chat systems). An extremely useful program is the Nagios Firefox plugin, that allows a constant view over PACS alerts on our desktop.
Cacti is an RRDtool (Round Robin Database Tool) based graphing solution. RRDtool is a industry standard created for data logging and graphing system of time series data. The Cacti application is configured in order to collect data from the PACS network and it renders it on its dashboard. The control panel looks nice and intuitive, and like Nagios has many community contributed scripts useful to gather any kind of information. For example we graph server load, network usage, disk space utilization, swap space, various MySQL DB aspects. Data is mainly collected using the SNMP (Simple Network Management
Protocol) protocol.
Having a look to data plotted in graphs, we can have a global view of the overall system activity of the PACS, and we can estimate also when to do small maintenance painlessly for example; looking at the network graphs we can understand if the LAN is overloaded; with home made scripts we can also monitor the growth over time of the PACS studies stored in the database.
The Dcm4chee software is written in Java, and it uses log4j for logging informational or error events. In case an error exceed a threshold, log4j can be configured to send an email message with the log attached to it. In the past we have had some problem due to the large amount of log produced, very often useless, uninteresting or duplicated. Configuring log4j for a smarter log notification can be a pain for non programmers, so we settled to use another tool called SEC that is a very smart and powerful daemon written in Perl. This tool attend to parse log files using Regular Expressions or simple string comparison; if a match is encountered, we can associate an action to this event: send a mail, ignore further match for an amount of time, group together the event to notify, drop the event, and so on. SEC is therefore a very valuable addition to the monitoring tools that we made up to follow the PACS overall health.
3. Results
One of the biggest advantage of the overall system is the reliability and the price lower than proprietary systems. With this system we are storing over 23 millions images with 60 thousand studies, and this figures are growing every day. One of the disadvantage of this system is the need for prepared technician to understand what is going on with the system itself, the personnel must be familiar with Solaris unix system administration, slightly different from linux one, with java virtual machine and web work-flow since the software is based on java award winning technology and is web based.
Another disadvantage, but this is common to other system is the crucial phase of system upgrade. Actually this kind of system has to be upgraded at least every 6 months for system operative restart and image software upgrade, this phase is delicate in order to reduce system off-line time. We decided to face this problem making a replica of the virtual containers in order to have the possibility to recover to the old state in the case of problems. The system is very stable and compatible with all of our modalities and backup system (RIMAGE from GE) and is comparable with most blazoned systems in terms of network response and features.
4. Discussion and conclusions
At the moment we have replicated the architecture in another site in Massa that is our reference cardiology surgical hospital. This has the same structure but is serving over 4 millions of images in over 35 thousand studies. This architecture seems to be reliable and stable, the choice of using Solaris Operative system and mysql database along with dcm4chee server software, was the right choice to sustain very critical tasks with one tenth of the budget needed for a commercial PACS.
References
[1] Zeilinger G. Open Source Clinical Image and Object Management. http://www.dcm4che.org/ accessed sept 2009.
[2] Warnock MJ, Toland C, Evans D, Wallace B, and Nagy P. Benefits of Using the DCM4CHE DICOM Archive. Journal of Digital Imaging, vol. 20, 2007:125–129.
[3] VMware Cloud Computing with Virtualization, Green IT, Virtual Machine & Servers. http://www.vmware.com/go/vmware-go/ accessed sept 2009.
[4] Solaris Operating System.
http://www.sun.com/software/solaris/ accessed sept 2009.
[5] Strobl R. ZFS: Revolution in File Systems. Sun Tech Days 2008-2009.
[6] Price D and Tucker A. Solaris zones: Operating system support for consolidating commercial workloads.
[7] Sun Microsystems. http://www.sun.com/ accessed sept 2009.
[8] Wallace GK and others. The JPEG still picture compression standard. Communications of the ACM. vol. 34, 1991:30–44.
[9] Grimes S. The challenge of integrating the healthcare enterprise. Engineering in Medicine and Biology Magazine. IEEE, vol. 24, 2005: 122-4.
[10] Elion J, Becker T, Keller A, Simon R, Sippel T, Solomon H, and Weintraub W. Integrating the healthcare enterprise (IHE) interoperability for cardiology: year 1 demonstration. Computers in Cardiology 2005, 2005:691694.
[11] Nagios - The Industry Standard in IT Infrastructure Monitoring. http://www.nagios.org/ accessed sept 2009.
[12] Cacti: The Complete RRDTool-based Graphing Solution. http://www.cacti.net/ accessed sept 2009.
[13] Vaarandi R. SEC - a lightweight event correlation tool. IP Operations and Management. 2002 IEEE Workshop on, 2002:111-115.
Address for correspondence
Paolo Marcheschi Fondazione Gabriele Monasterio CNR Via G. Moruzzi 1 56126, Pisa, Italy. [email protected]
</text>
|
[
{
"content": "<url>\nhttps://www.cinc.org/archives/2009/pdf/0537.pdf\n</url>\n<text>\nA New Approach to Affordable and Reliable Cardiology PACS Architecture Using Open-Source Technology\n\n3\n\nP Marcheschi 1 , A Ciregia 1 , A Mazzarisi 2 , G Augiero 1 , A Gori\n\n1 Fondazione Toscana Gabriele Monasterio CNR-Regione Toscana, Pisa, Italy 2 CNR, Pisa, Italy 3 ASL1, Massa, Italy\n\nAbstract\n\nIn the past ten years we followed the expansion of cardiology imaging technology and how it relates to integration, tele-consulting and standards. The new frontier of Picture archiving and communication systems (PACS) is expanding and require more technology and resources. Cardiology imaging is evolving and needs even more resources than before. The present work proposes a new approach to manage a large cardiology PACS installation using new open-source facilities on affordable hardware creating a reliable system. For this kind of application we moved our core system from Linux platform to the new OpenSolaris unix and to novelty Functions like Solaris Containers, ZFS file-system and Fair Share Scheduler, in order to achieve server consolidation, ease of use and reliability.\n\n1. Introduction\n\nPACS, Picture archiving and communication system are the most needed and expensive instruments in a modern hospital, this because the need for iconography representation of human body is growing in every field of health-care. PACS needs performance, stability and security in order to treat thousand of images a day, for every modality in an hospital: it needs storage space, ability to compress and decompress images in parallel and very high band throughput to satisfy health-care professional needs. One of the most used open-source PACS software is dcm4chee [1] [2] this because is written in the platform independent java language, and is a feature complete implementation of an IHE PACS system. We evaluated different lossless and lossy compression schema in order to achieve fast client/server response and to overcome low bandwidth connections limits. Moreover actual local hi-bandwidth environments required logical and physical network separation by imaging modality by the use of VLAN support and spanning tree technology. In order to assure the optimal service availability, the system is constantly monitored to quickly rise alerts and to graph system performance and status. Particular attention is posed to IT security, achieved with a cluster of two Linux firewall with network filtering support. At the moment we are sharing with the proposed system over 23 millions images, coming from MRI, CT, PET, ECHO, CR/DR and XA imaging laboratories.\n\n2. Methods\n\nThe classic approach to server consolidation and deploying is to use windows or Linux based architecture, with Vmware virtualization solution [3]. Among different flavors of unix we can choose one of the myriad of linux distributions but when we tried Solaris/OpenSolaris [4] we realized that an alternative to these popular operating systems exists and we found in solaris unix what we were looking for. A very reliable and full of features right for our need. This Operative System is not new and has been used for years as a commercial UNIX in contrast to open source solutions based on linux. First of all ZFS (Zettabyte File System) [5], is a 128 bit file system, with end to end checksum integrity, built in compression, volume manager and unlimited snapshot features. It offers unprecedented ease of use and reliability. Solaris is the ideal solution for consolidate multiple image managers in a single server due to its native ability to support server virtualization without the need for different products and technologies. It uses the concept of zone, or container, that is the OS environment [6]. It is a light-weight OS virtualization with only one kernel per hardware, virtual networking and with a complete isolation between zones or virtual machines. OpenSolaris is a bit ahead of Solaris, it has a better support for peripherals, and has newer ZFS and kernel features, also the standard version is mature for production use. The choice of a new OS for production use is difficult because we had to develop new skills. In order to do so, SUN Microsystems [7] helped us with a free training workshop, to be able to achieve, base necessary skills, to start the project. The main goal of the project was to\n\ndevelop a cheap, fast and reliable server configuration in order to store and redistribute images coming from our multiple modalities (MRI, CT, PET, CT-PET, Ultrasound, CR/DR and XA imaging laboratories).\n\nThe architecture of the system is made by three solaris servers two for the front-end, directly connected to the consoles of the modalities, and one for the historic PACS archive, that has a big storage pool (24 TB). We decided to redesign also our network using vlans. In order to develop this kind of isolation between the first level of the PACS, the front-end, we needed a way to virtualize and consolidate servers, instead of buying one machine for every modality we choose to use the Solaris containers virtualization solution. This solution gives compartmentalization and proportional use of resources trough FSS (Fair share schedule) scheduling software, which controls the allocation of available CPU resources among workloads. A zone is a virtualized environment with it's own root, but with a lack of a private dedicated kernel, it uses instead the host kernel, this is a big performance gain. There is also the possibility to create a linux branded zone with the same level of abstraction, with an emulated kernel that map primitive linux system calls to native solaris calls. This in order to migrate effortless a complete linux environment. Another possibility offered by this OS is the file-system snapshot feature, available only in mo<cursor_is_here> With this facility one can recover from accidentally removed files , or is possible to backup the DB without service interruption. We used this feature to upgrade the image manager software with only a software restart. Also the purpose of this kind of architecture is to split the image compression pipeline in two different steps. Actually, to be able to store more images on storage, we adopted the JPLL (Jpeg Lossless) [8] compression schema to achieve 3:1-2:1 compression ratio. This heavy duty task is executed by the front-end servers that have low storage capacity, but high processor power. Once compressed, the images are forwarded to the historic archive in night batches. The IHE [9] [10] image manager is built upon the well known open-source project dcm4chee, a few modification were added to the standard distribution, but only in logging and control scripts because Solaris uses a different service facility called SMF (Solaris Management Facility). The dcm4chee software is rock solid, and is full of features comparable to commercial one.\n\nIn the network context, each zone uses a different physical network interface that exists on the server. We allocated a different network subnet for each network interface. On each network segment there is a modality that sends the medical study to the relative Solaris zone. This choice, implemented during the network design, assures the best performance and security in network communications. Specifically, at the end of each study, each modality sends a huge amount of data to its dedicated zone. Network traffic is composed of a number of large clinical pictures transiting on the network. Generally the implementation of routing techniques requires single frame delivery to the gateway of the subnet to which they belong, through a Layer 2 protocol, the gateway has to unpack the frame and analyze information to Layer 3 then forward the package to the proper interface where the recipient is present. The activity of unpacking and packing requires a short delay for the router computation in order to create each package, lowering the performance and adding a slight delay in communication. In addition, the router become a new point of failure in communication between the modality and the Image Manager. The above problems are avoided by positioning modality and Image Manager on the same subnet.\n\nSurgeons, doctors and Technicians rely on PACS 24x7 availability, hence we must provide quick response in case of system malfunctioning. In addition we have considered worthwhile, having an historical view of servers performance and a day by day usage charts. To achieve such goals we used two Open Source software: Nagios [11] and Cacti [12]. In addition, for logs management produced by Dcm4chee archive manager itself, we used another Open Source software: SEC (Simple Event Correlator) [13]. Nagios is a powerful and widely used network monitoring system. The strength of this useful application is the large base of community supported add-ons, in particular the plug-ins. They are standalone piece of softwares that plug into the main application in order to do specific task. One of this plugin is the DICOM service checker that allow to monitor the availability of a DICOM service class provider (SCP).\n\nThanks to this kind of plug-in we can easily verify every aspect of our PACS network and in particular the status of our services. The following are the parameters checked every 5 minutes: Server Load, Hardware sensors, Disk Space, Number of processes, Raid Status, Database Status, DICOM services. We can for example actively monitor the storage status, or if a service is running and if the server load is too high. We can have a look to the hardware sensors, and we can check if the DICOM SCP service is answering through the network. If there is a problem, such as the free disk space is becoming to small (we can define various thresholds) or the DICOM SCP is no more answering, Nagios will\n\nrise an alert on his dashboard, and it will send a notification via e-mail to the configured group of recipients (Nagios can be configured to also send notifications via SMS or instant chat systems). An extremely useful program is the Nagios Firefox plugin, that allows a constant view over PACS alerts on our desktop.\n\nCacti is an RRDtool (Round Robin Database Tool) based graphing solution. RRDtool is a industry standard created for data logging and graphing system of time series data. The Cacti application is configured in order to collect data from the PACS network and it renders it on its dashboard. The control panel looks nice and intuitive, and like Nagios has many community contributed scripts useful to gather any kind of information. For example we graph server load, network usage, disk space utilization, swap space, various MySQL DB aspects. Data is mainly collected using the SNMP (Simple Network Management\n\nProtocol) protocol.\n\nHaving a look to data plotted in graphs, we can have a global view of the overall system activity of the PACS, and we can estimate also when to do small maintenance painlessly for example; looking at the network graphs we can understand if the LAN is overloaded; with home made scripts we can also monitor the growth over time of the PACS studies stored in the database.\n\nThe Dcm4chee software is written in Java, and it uses log4j for logging informational or error events. In case an error exceed a threshold, log4j can be configured to send an email message with the log attached to it. In the past we have had some problem due to the large amount of log produced, very often useless, uninteresting or duplicated. Configuring log4j for a smarter log notification can be a pain for non programmers, so we settled to use another tool called SEC that is a very smart and powerful daemon written in Perl. This tool attend to parse log files using Regular Expressions or simple string comparison; if a match is encountered, we can associate an action to this event: send a mail, ignore further match for an amount of time, group together the event to notify, drop the event, and so on. SEC is therefore a very valuable addition to the monitoring tools that we made up to follow the PACS overall health.\n\n3. Results\n\nOne of the biggest advantage of the overall system is the reliability and the price lower than proprietary systems. With this system we are storing over 23 millions images with 60 thousand studies, and this figures are growing every day. One of the disadvantage of this system is the need for prepared technician to understand what is going on with the system itself, the personnel must be familiar with Solaris unix system administration, slightly different from linux one, with java virtual machine and web work-flow since the software is based on java award winning technology and is web based.\n\nAnother disadvantage, but this is common to other system is the crucial phase of system upgrade. Actually this kind of system has to be upgraded at least every 6 months for system operative restart and image software upgrade, this phase is delicate in order to reduce system off-line time. We decided to face this problem making a replica of the virtual containers in order to have the possibility to recover to the old state in the case of problems. The system is very stable and compatible with all of our modalities and backup system (RIMAGE from GE) and is comparable with most blazoned systems in terms of network response and features.\n\n4. Discussion and conclusions\n\nAt the moment we have replicated the architecture in another site in Massa that is our reference cardiology surgical hospital. This has the same structure but is serving over 4 millions of images in over 35 thousand studies. This architecture seems to be reliable and stable, the choice of using Solaris Operative system and mysql database along with dcm4chee server software, was the right choice to sustain very critical tasks with one tenth of the budget needed for a commercial PACS.\n\nReferences\n\n[1] Zeilinger G. Open Source Clinical Image and Object Management. http://www.dcm4che.org/ accessed sept 2009.\n[2] Warnock MJ, Toland C, Evans D, Wallace B, and Nagy P. Benefits of Using the DCM4CHE DICOM Archive. Journal of Digital Imaging, vol. 20, 2007:125–129.\n[3] VMware Cloud Computing with Virtualization, Green IT, Virtual Machine & Servers. http://www.vmware.com/go/vmware-go/ accessed sept 2009.\n[4] Solaris Operating System.\nhttp://www.sun.com/software/solaris/ accessed sept 2009.\n[5] Strobl R. ZFS: Revolution in File Systems. Sun Tech Days 2008-2009.\n[6] Price D and Tucker A. Solaris zones: Operating system support for consolidating commercial workloads.\n[7] Sun Microsystems. http://www.sun.com/ accessed sept 2009.\n[8] Wallace GK and others. The JPEG still picture compression standard. Communications of the ACM. vol. 34, 1991:30–44.\n[9] Grimes S. The challenge of integrating the healthcare enterprise. Engineering in Medicine and Biology Magazine. IEEE, vol. 24, 2005: 122-4.\n[10] Elion J, Becker T, Keller A, Simon R, Sippel T, Solomon H, and Weintraub W. Integrating the healthcare enterprise (IHE) interoperability for cardiology: year 1 demonstration. Computers in Cardiology 2005, 2005:691694.\n[11] Nagios - The Industry Standard in IT Infrastructure Monitoring. http://www.nagios.org/ accessed sept 2009.\n[12] Cacti: The Complete RRDTool-based Graphing Solution. http://www.cacti.net/ accessed sept 2009.\n[13] Vaarandi R. SEC - a lightweight event correlation tool. IP Operations and Management. 2002 IEEE Workshop on, 2002:111-115.\n\nAddress for correspondence\n\nPaolo Marcheschi Fondazione Gabriele Monasterio CNR Via G. Moruzzi 1 56126, Pisa, Italy. [email protected]\n</text>\n",
"role": "user"
},
{
"content": "re expensive NAS (Networked Attached Systems) or storage solutions, this makes possible making backups of the overall system or a particular subdirectory, in different point in time and while the system is running in production.",
"role": "assistant"
}
] |
ILLINOIS CRIMINAL JUSTICE INFORMATION AUTHORITY
300 West Adams Street, Suite 700
Chicago, Illinois 60606
Phone: (312) 793-8550
Fax: (312) 793-8422
TDD: (312) 793-4170 http://www.icjia.state.il.us
Budget Committee
_______________________________ _______________________________
Eugene E. Murphy, Jr. Chair
Hon. Richard A. Devine Vice Chair
David P. Bradford
Barbara L. Engel
Thomas J. Jurkanin
Hon. Lisa Madigan
Larry G. Trent
_______________________________ _______________________________
- Call to Order and Roll Call
1. Approval of the Minutes of the August 26, 2008 Budget Committee Meeting
2. Approval of the Minutes of the September 5, 2008 Authority Regular Meeting Budget Agenda
3. Violence Against Women Act Plan Adjustments
FFY02 Plan Adjustment #16
FFY03 Plan Adjustment #10
FFY04 Plan Adjustment #8
FFY05 Plan Adjustment #6
FFY06 Plan Adjustment #4
FFY07 Plan Adjustment #2
FFY08 Plan Introduction
4. Victims of Crime Act Plan Adjustments FFY05 Plan Adjustment #11
FFY06 Plan Adjustment #11
FFY07 Plan Adjustment #4
- Old Business
- New Business
- Adjourn
Illinois Criminal Justice Information Authority
Sheldon Sorosky Chair
Hon. Richard A. Devine Vice Chair
Lori G. Levin Executive Director
Meeting Notice
Budget Committee
November 12, 2008 – 10:00 a.m. Illinois Criminal Justice Information Authority 300 West Adams Street 8 th Floor Conference Room Chicago, IL 60606
Agenda
This meeting will be accessible to persons with disabilities in compliance with Executive Order #5 and pertinent State and Federal laws upon anticipated attendance. Persons with disabilities planning to attend and needing special accommodations should contact by telephone or letter Mr. Hank Anthony, Associate Director, Office of Administrative Services, Illinois Criminal Justice Information Authority, 300 West Adams Street, Suite 700, Chicago, Illinois 60606 (telephone 312/793-8550). TDD services are available at 312-793-4170.
MINUTES
Illinois Criminal Justice Information Authority Budget Committee Meeting
10:00 a.m.
Tuesday, August 26, 2008
Illinois Criminal Justice Information Authority 300 West Adams Street, Eighth Floor Conference Room Chicago, Illinois
Call to Order and Roll Call
The Budget Committee of the Illinois Criminal Justice Information Authority met on Tuesday, August 26, 2008, at the Eighth Floor Conference Room at 300 West Adams Street, Chicago, Illinois. Budget Committee Chairman Eugene E. Murphy, Jr. called the meeting to order at 10:13 a.m. Other Authority members and designees present were Chief David Bradford, Waisu Fashina for Clerk Dorothy Brown, John Robertson for Sheriff Tom Dart, Director Norbert Goetten (via teleconference), Barbara Engel (via teleconference), State's Attorney Bill Mudge (via teleconference), Director Michael J. Pelletier, Authority Chairman Sheldon Sorosky (via teleconference), Mariyana Spyropoulos, Colonel Michael Snyders for Director Larry Trent, and John Z. Toscas (via teleconference). Also in attendance were Megan Alderden of the Chicago Police Department (via teleconference), Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, Associate Director Mark Myrent, and other Authority staff members.
Prior to the beginning of the meeting, Budget Committee Chairman Murphy assigned Mr. Fashina and Director Pelletier to the Budget Committee for the duration of the meeting for the purposes of attaining a quorum. Only members and designees physically present at the meeting were permitted to vote.
Minutes of the April 29, 2008 Budget Committee Meeting
Chief Bradford moved to approve the minutes of the April 29, 2008 Budget Committee Meeting. Ms. Spyropoulos seconded the motion and the minutes were approved by unanimous voice vote.
Minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda
Chief Bradford moved to approve the minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda. Mr. Fashina seconded the motion and the minutes were approved by unanimous voice vote.
Approval of the FFY04 Anti-Drug Abuse Act (ADAA) Plan Adjustments
Program Supervisor Mike Carter called attention to the memo, dated August 19, 2008 under Tab 3 of the meeting materials regarding the ADAA FFY04 Plan Adjustments. He said that currently the Authority's Research and Analysis Unit (R&A) has a $225,000 designation in FFY04 Criminal History Records Improvement (CHRI) funds for its Audit Plan. These funds were intended to cover personnel costs, including the hiring of additional research staff. However, R&A was unable to reach its hiring goal. As a result, staff recommends reducing the Audit Plan designation by $99,750 to $125,250. The $99,750 must remain dedicated to CHRI purposes and when combined with other unallocated CHRI funds, yields a total of $105,839 available for future CHRI programming. ADAA FFY04 funds expire on September 30, 2008.
Mr. Carter said that staff seeks to designate funds to the Chicago Police Department (CPD) to facilitate the modernization of its criminal history records keeping system. The CPD would use these funds to convert approximately 1 million paper records into electronic records in its automated criminal history records system. These funds would be used to cover overtime costs incurred by the conversion process.
In response to a question by Chief Bradford, Associate Director Mark Myrent (director of the Authority's R&A unit) said that the R&A unit was unable to hire the desired personnel due to difficulties in navigating the state's hiring system. Specifically, difficulties were experienced in obtaining the proper approvals to both post notices of available positions and to make timely offers to candidates for those positions. Plans are still in place to pursue hiring for those positions using funds from the next federal fiscal year's designation. In fact, interviews for those positions are scheduled to take place in September, 2008.
Chief Bradford moved to approve the FFY04 ADAA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY04 Juvenile Accountability Incentive Block Grants (JAIBG) Plan Adjustments
Mr. Carter called attention to the memo, dated August 19, 2008 under Tab 4 of the meeting materials regarding the FFY04 JAIBG Plan Adjustments. He said that JAIBG FFY04 funds expire on November 26, 2008. Currently, $108,363 in FFY04 funds is available for use. He said that staff recommends designating these funds to the Illinois Violence Prevention Authority (IVPA) which would use these funds to support the Corazón Community Services program. Corazón is a holistic social services program based in Cicero, Illinois. The IVPA reported that schools in this area are expelling an average of 15 students each month, primarily for gang-related activities. More than half of the expelled students are left without educational alternatives. Corazón would form a partnership with a local junior high school to create two alternative classrooms to serve expelled students. Services would include intake assessment, treatment, transportation, and enrollment in a life-skills program. These funds would be used to purchase computers, software, and related equipment for use by program staff and students, agency brochures, office supplies, and vehicles to support program activities.
Chief Bradford moved to approve the FFY04 JAIBG Plan Adjustments described in the addendum that was distributed to the Budget Committee members at the meeting. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY05 Victims of Crime Act (VOCA) Plan Adjustments
Program Supervisor Ron Reichgelt called attention to the memo, dated August 19, 2008, under Tab 5 of the meeting materials regarding the FFY05 VOCA Plan Adjustments. Mr. Reichgelt said that HOPE of East Central Illinois returned $6,675 from its transitional housing program. He said that staff recommends that these funds be made available for future programming. The lapsing $6,675 combined with $35,559 in other unallocated FFY05 funds yields a total of $42,234 available for future programming.
Mr. Reichgelt said that staff recommends designating the $42,234 to the Illinois Coalition Against Domestic Violence (ICADV) to support the InfoNet program. The funds would be used to upgrade or purchase computers for the ICADV's subgrantee agencies. InfoNet is the data collection system developed by the Authority for the collection of victim service data.
Chief Bradford moved to approve the FFY05 VOCA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
New Business
None.
Old Business
None.
Adjourn
Chief Bradford moved to adjourn. The motion was seconded by Ms. Spyropoulos and passed by unanimous voice vote. The meeting was adjourned at 10:25 a.m.
MINUTES
Illinois Criminal Justice Information Authority Authority Regular Meeting / Budget Agenda Friday, September 5, 2008 9:00 a.m. Illinois Criminal Justice Information Authority Michael A. Bilandic Building, 160 N. La Salle
Auditorium Room C-500 Chicago, Illinois
Call to Order and Roll Call
The Board of the Illinois Criminal Justice Information Authority met on Friday, September 5, 2008, in Auditorium Room C-500 at the Michael A. Bilandic Building, 160 N. La Salle Street, Chicago, Illinois. Authority Chairman Sheldon Sorosky called the Budget Agenda portion of the Regular Meeting to order at 9:56 a.m. Other Authority members and designees present were Clerk Dorothy Brown, Sheriff Tom Dart, Director Brad Demuzio, Authority Vice-Chairman and State's Attorney Richard A. Devine, Director Norbert Goetten, Clerk Becky Jansen, Director Thomas J. Jurkanin, Ellen Mandeltort for Attorney General Lisa Madigan, Director Michael J. Pelletier, Mariyana Spyropoulos, and John Z. Toscas. Also in attendance were Executive Director Lori G. Levin, Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, and other Authority staff members.
Chairman Sorosky, in accordance with the Authority's rules, declared the meeting a Budget Committee meeting at 9:56 a.m., operating as a committee of the budget as a whole. He appointed all Authority members present to be Budget Committee members for the limited purpose of addressing the budget-related agenda items.
Approval of the FFY07 Justice Assistance Grants (JAG) Plan Adjustments
Associate Director Chojnacki, referring to a memo in the meeting materials dated September 2, 2008 and regarding proposed JAG FFY07 plan adjustments, said that staff requested permission to reallocate previously designated JAG FFY07 funds from the Illinois Department of Juvenile Justice's (IDJJ) Young Offender Re-entry Program to the Illinois Department of Corrections' (IDOC) Community-based Residential Treatment for
Adults Program. He said that Program Supervisor Mike Carter was available to answer any questions.
Director Levin said that, essentially, this request was intended to prevent a lapse in funds back to the federal government by allowing the funds to be reprogrammed between the IDJJ and the IDOC. Mr. Chojnacki confirmed that $40,000 would transfer from the IDJJ program to the IDOC program.
Director Goetten moved to approve the FFY07 JAG Plan Adjustments. Director Demuzio seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY02, FFY04, and FFY05 Violence Against Women Act (VAWA) Plan Adjustments
Mr. Chojnacki, referring to the memo dated August 22, 2008 in the meeting materials and regarding proposed VAWA FFY02, FFY04, and FFY05 plan adjustments, said that the memo detailed designation reduction requests and recommended new designations. He said that Program Supervisor Greg Stevens was available to answer any questions.
Director Levin said that staff recommended $364,000 in FFY05 funds to the City of Chicago's Domestic Violence HelpLine. She said that staff had received permission from the Office of Violence Against Women (OVW) to shift the funding source for this program from Victims of Crime Act (VOCA) funds to VAWA Law Enforcement funds. She said that staff is trying to come up with creative uses of limited funds. She also said that staff requested that $55,500 in FFY05 funds be designated to the East Central Illinois Mobile Police Training Unit and that $20,000 be designated to the Illinois Coalition Against Sexual Assault for improving the medical response to rape victims. She said that the total amount of the new designation requests was $439,500.
Mr. Toscas moved to approve the FFY02, FFY04, and FFY05 VAWA Plan Adjustments described in the memo. Director Goetten seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY06 and FFY07 Victims of Crime Act (VOCA) Plan Adjustments and the FFY08 VOCA Plan Introduction
Mr. Chojnacki, referring to the memo dated August 22, 2008 and regarding proposed VOCA plan adjustments for FFY06 and FFY07 and the FFY08 introduction, said that Program Supervisor Greg Stevens was available to answer any questions.
Director Levin, referring to the table at the bottom of Page 13 of the memo, said that the table summarized all available funds, assuming the adoption by this committee of the proposals set forth in the memo. She said that the table indicates that there would be virtually no funds available for future programming out of existing federal fiscal year awards. She added that all VOCA programs endured a 27.8 percent cut. That cut was primarily a function of the VOCA cap having been lowered. She said that staff did as much juggling as possible in crafting the recommendations in the memo in an attempt to spend all of these funds and to deal funding cuts in an even-handed manner to all grantees.
Director Levin said that last year staff had temporarily moved some grants to the Cook County State's Attorney's Office and a grant to the Authority off of VOCA funding and covered those grants with JAG funds. As it is not possible to continue maintaining those grants with JAG funds, they were moved back under VOCA funding and this contributed to the exhaustion of available VOCA funds.
Director Levin said that there would be no back-up funds for next year. She said that it is very, very crucial that the Authority Board members do whatever they could to educate their legislators and elected representatives because the Authority is now in a very difficult position. The Authority has never been in this sort of a situation before where it has had to demand that its grantees take an almost 28 percent funding reduction. She said that when staff first began working on the funding cuts, the reductions originally looked like they would be greater than 28 percent.
Director Levin said that staff has done its best. She asked that the board approve the many designations listed in the memo. She said that all affected grantees had been notified in advance of these pending funding cuts.
Mr. Toscas moved to approve the FFY06 and FFY07 VOCA Plan Adjustments and the FFY08 Plan Introduction. Director Jurkanin seconded the motion and it was approved by unanimous voice vote.
Adjourn
At this point, 10:06 a.m., Chairman Sorosky declared the conclusion of the Budget Committee portion of the meeting. The Authority Regular meeting resumed discussion of other items on its agenda.
MEMORANDUM
TO:
Budget Committee Members
FROM: John C. Chojnacki, Associate Director, Federal & State Grants Unit
DATE: November 5, 2008
RE:
FFY02 Violence Against Women Act Plan Adjustment #16
FFY03 Violence Against Women Act Plan Adjustment #10
FFY04 Violence Against Women Act Plan Adjustment #8
FFY05 Violence Against Women Act Plan Adjustment #6
FFY06 Violence Against Women Act Plan Adjustment #4
FFY07 Violence Against Women Act Plan Adjustment #2
FFY08 Violence Against Women Act Plan Introduction
This memo describes proposed adjustments to the FFY02 through FFY07 Violence Against Women Act (VAWA) plan adjustments and the FFY08 Violence Against Women Act (VAWA) Introduction as illustrated in the attached Attachment A's dated November 12, 2008.
DESIGNATION REDUCTIONS
The following table details FFY02 and FFY03 funds returned to the Authority. These figures are provided for informational purposes only as these funds are no longer available for use.
The following table details FFY05 and FFY06 funds returned to the Authority. Staff recommends that these funds be rescinded and added to other undesignated funds.
VAWA FFY08 INTRODUCTION
The FFY08 VAWA award to Illinois is $4,013,551 and these funds are currently set to expire on April 30, 2010. An application for a one-year extension will be submitted as soon as possible. Staff expects the extension to be approved. As with FFY01 through FFY06 VAWA funds, after setting aside ten percent of the award ($401,355) for administrative purposes, 25 percent of the funds must go to law enforcement, 25 percent to prosecution, 30 percent to service providers, and five percent to the courts. The remaining 15 percent can be allocated at the state's discretion. A total of $3,612,196 is available for program purposes. The designations recommended in this memo and future designations will be consistent with the priorities set forth in the VAWA FFY06 – FFY08 Multi-Year Plan.
RECOMMENDED DESIGNATIONS
Services to Underserved Areas or Victim Groups
Illinois Coalition Against Domestic Violence and Illinois Coalition Against Sexual Assault. In the past, the Authority has designated all of each federal fiscal year's allocated Service Provider funds to the Illinois Coalition Against Sexual Assault (ICASA) and the Illinois Coalition Against Domestic Violence (ICADV) in equal amounts. These funds were then subcontracted to their program agencies for service to underserved areas or victim groups. Staff recommends that the Authority continue designating the service provider funds in this manner and that designations of FFY08 Service Provider funds in the amount of $541,829 be made to both ICASA and ICADV.
Domestic Violence / Sexual Assault Protocol Programs
Cook County State's Attorney's Office: The Cook County State's Attorney's Office (CCSAO) has both domestic violence and sexual assault protocols. These protocols allow the CCSAO to work more effectively with other components of the criminal justice system and hold offenders accountable. Staff recommends a designation of $665,879 in FFY08 funds to the CCSAO for the continuation of its protocol-related programs.
Funding for this program will be split between $431,005 from Prosecution and $234,874 from Law Enforcement for the CCSAO Special Investigators.
This $665,879 FFY08 designation would include funds for the CCSAO's Resource Center, a suburban coordinator, sexual assault prosecution, and domestic violence prosecution programs, as funded under the current grant. In addition, this designation would include funds for the CCSAO's Total Response to Domestic Violence program and its Sexual Assault Nurse Examiner program. This designation would allow all of these programs to continue for one year.
Sexual Assault Medical Advocacy Programs
Illinois Attorney General's Office (AGO): Staff recommends designating $114,242 in FFY05 Law Enforcement funds to the AGO for its Sexual Assault Nurse Examiner (SANE) training program. The program plays an important role in coordinating efforts to better serve assault survivors in Illinois. SANE training and certification will help reduce trauma for victims of sexual assault. SANE training will also assist in holding offenders accountable by providing expert testimony at trials. SANE trainings are given statewide in ten-hour sessions. This program will ensure that nurses have opportunities to be trained and receive the 60 hours of clinical follow-up that they need to become certified. This designation would allow the program to continue for another 5 months.
Illinois Attorney General's Office (AGO): Staff recommends designating $25,582 in FFY04 Prosecution funds and $21,738 in FFY04 Discretionary funds (for a total of $47,320) to the AGO to develop a web-based portion of its SANE training program.
The AGO expects that the new web-based portion of the SANE training would help to reduce the overall costs associated with the training. The AGO's goal is to move 16 to 20 hours of training on-line and reduce in-person training to two or three days. Portions of the SANE manual would be incorporated into interactive exercises to be completed prior to the in-person course. On-line teaching tools would include pictures, videos, audio, drop-downs and fill-ins, lesson reviews, and unit tests. Students would be able to access the site from anywhere and to work at their own paces. Links would be established to take students to authoritative sites, thus eliminating the need to constantly update the existing curriculum. (e.g. General Assembly home page for statutes)
Transitional Housing Services Programs
Quanada and Stopping Women Abuse Now (SWAN): The 10 transitional housing services programs use VAWA discretionary funds to cover the costs for renting the units that the victims of domestic violence stay in while receiving services. Staff recommends that $24,000 and $40,000 in FFY07 Discretionary funds be designated to Quanda and SWAN, respectively, for their transitional housing programs to allow them to continue for an additional 12 months.
Services to Female Inmates Program
Illinois Department of Corrections (IDOC): Staff recommends designating $72,000 in FFY07 Discretionary funds to the IDOC for its Services to Female Inmates program. The Services to Female Inmates program provides a program coordinator to oversee the organization, consistency, and ongoing performance of services to female inmates who were victims of domestic violence or sexual assault prior to incarceration. The program coordinator also provides direct services at Kankakee Minimum Security, Fox Valley Adult Transitional Center, and Warrenville, as well as overseeing the program throughout the Women and Family Services Division of IDOC. Additionally, the Services to Female Inmates program provides staff with training on the Seeking Safety program, domestic violence and sexual assault, and other topics directly related to the program.
The program coordinator works to build resources for the program by purchasing and distributing program supplies, DVDs, videos, workbooks, and other materials. The program coordinator also works on developing additional programming for the victims of domestic violence and sexual assault by utilizing program materials purchased previously. The additional programming would be primarily used with women who have completed the Seeking Safety program, but wish to continue treatment.
The table below summarizes the staff-recommended designations described in this memo:
AVAILABLE FUNDS
The following chart indicates the funds available for future programming, per program category, in each open federal fiscal year, assuming the adoption of the funding recommendations set forth in this memo:
Staff will be available at the meeting to answer any questions.
S.T.O.P. VIOLENCE AGAINST WOMEN FFY02 PLAN ATTACHMENT A
Total
Total
Total
S.T.O.P. VIOLENCE AGAINST WOMEN FFY03 PLAN ATTACHMENT A
Law
Service
Total
Federal
Required
S.T.O.P. VIOLENCE AGAINST WOMEN FFY04 PLAN ATTACHMENT A
Total
Total
S.T.O.P. VIOLENCE AGAINST WOMEN FFY05 PLAN
ATTACHMENT A
Total
Total
S.T.O.P. VIOLENCE AGAINST WOMEN FFY06 PLAN ATTACHMENT A
Total
Law
Service
Total
Federal
Required
Enforcement
Prosecution
Providers
Courts
Discretionary
Amount
Match
S.T.O.P. VIOLENCE AGAINST WOMEN FFY07 PLAN ATTACHMENT A
Total
S.T.O P. Violence Against Women FFY08 Plan Attachment A
MEMORANDUM
To:
Budget Committee Members
From:
John Chojnacki, Associate Director, Federal & State Grants Unit
Date:
November 5, 2008
Subject: FFY05 Victims of Crime Act (VOCA) Plan Adjustment #11
FFY06 Victims of Crime Act (VOCA) Plan Adjustment #11
FFY07 Victims of Crime Act (VOCA) Plan Adjustment #4
This memo describes proposed adjustments to the FFY05, FFY06, and FFY07 Victims of Crime Act (VOCA) plans, as illustrated in the attached Attachment A's dated November 12, 2008.
DESIGNATION REDUCTIONS
The following table details VOCA funds returned to the Authority from programs at the ends of their periods of performance. FFY05 figures are being provided for informational purposes only as these funds are no longer available for use. Staff recommends that the FFY06 and FFY07 funds listed below be made available for future programming.
SUMMARY OF AVAILABLE FUNDS
The table below describes funds remaining available for future use, assuming the adoption of the staff's recommendations described in this memo:
Staff will be available at the meeting to answer any questions.
Victims of Crime Act
FFY05 Attachment A
SERVICES TO VICTIMS OF DOMESTIC VIOLENCE
November 12, 2008
SERVICES TO VICTIMS OF SEXUAL ASSAULT
PROSECUTOR-BASED VICTIM ASSISTANCE PROGRAMS
Program Title: Law Enfocement and Prosecutor-Based Victim Assistance Services
3
TRAINING FOR VICTIM SERVICE PROVIDERS
Program Title: Centralized Training for Chicago Area
Domestic Violence Agencies
Chicago Metropolitan Battered Women's Network
$23,962
Allocated Funds $14,558,750 $14,558,747
($3)
Unallocated Funds
$0
$3
$3
Grant Funds $14,558,750
$0
Training Funds
$0
Administrative Funds $766,250 $15,325,000
INITIAL AMENDED
AMOUNT AMOUNT DIFFERENCE
Victims of Crime Act FFY06 Attachment A
SERVICES TO VICTIMS OF DOMESTIC VIOLENCE
Program Title: Services to Underserved Domestic Violence Populations
Horizons Community Services
$53,067
INITIAL AMENDED AMOUNT AMOUNT DIFFERENCE
PROSECUTOR-BASED VICTIM ASSISTANCE PROGRAMS
INITIAL
AMENDED
Victims of Crime Act FFY07
Attachment A
SERVICES TO VICTIMS OF DOMESTIC VIOLENCE
Program Title: Transitional Housing and Support Services
Program Title: Civil Legal Services for Victims of Domestic Violence
Will County Legal Assistance
$39,340
Program Title: Services to Non-English Speaking or Bilingual
INITIAL
AMENDED
INITIAL
AMENDED
INFORMATION DISSEMINATION / AUTOMATION
Program Title: Information Network for Victim Service Providers
Illinois Criminal Justice Information Authority
TRAINING FOR VICTIM SERVICE PROVIDERS
Program Title: Statewide Victim Assistance Training
Illinois Attorney General's Office
$31,200
Program Title: Centralized Training for Chicago Area Domestic Vilence Agencies
Chicago Metropolitan Battered Women's Network
$21,840
$0
|
<urn:uuid:9eb8a60d-63bf-4092-abdf-ea87167b1e8b>
|
CC-MAIN-2020-45
|
http://www.icjia.state.il.us/assets/pdf/budget/Materials%20111208.pdf
|
2020-10-20T06:32:26+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-45/subset=warc/part-00173-6409130e-6e9b-44d1-90ec-9f9d0ade2504.c000.gz.parquet
| 144,927,994
| 5,811
|
eng_Latn
|
eng_Latn
| 0.742547
|
eng_Latn
| 0.991924
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"slv_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn"
] | false
|
rolmOCR
|
[
1966,
3773,
6101,
8690,
8894,
10870,
13117,
15400,
16379,
18561,
21472,
23213,
23277,
23284,
23291,
23388,
23452,
23459,
23524,
23531,
23595,
23710,
23774,
23831,
24689,
24928,
25012,
25070,
25198,
25589,
25672,
25823,
25886,
26138,
26219,
26237,
26670
] |
ILLINOIS CRIMINAL JUSTICE INFORMATION AUTHORITY
300 West Adams Street, Suite 700
Chicago, Illinois 60606
Phone: (312) 793-8550
Fax: (312) 793-8422
TDD: (312) 793-4170 http://www.icjia.state.il.us
Budget Committee
_______________________________ _______________________________
Eugene E. Murphy, Jr. Chair
Hon. Richard A. Devine Vice Chair
David P. Bradford
Barbara L. Engel
Thomas J. Jurkanin
Hon. Lisa Madigan
Larry G. Trent
_______________________________ _______________________________
- Call to Order and Roll Call
1. Approval of the Minutes of the August 26, 2008 Budget Committee Meeting
2. Approval of the Minutes of the September 5, 2008 Authority Regular Meeting Budget Agenda
3. Violence Against Women Act Plan Adjustments
FFY02 Plan Adjustment #16
FFY03 Plan Adjustment #10
FFY04 Plan Adjustment #8
FFY05 Plan Adjustment #6
FFY06 Plan Adjustment #4
FFY07 Plan Adjustment #2
FFY08 Plan Introduction
4. Victims of Crime Act Plan Adjustments FFY05 Plan Adjustment #11
FFY06 Plan Adjustment #11
FFY07 Plan Adjustment #4
- Old Business
- New Business
- Adjourn
Illinois Criminal Justice Information Authority
Sheldon Sorosky Chair
Hon. Richard A. Devine Vice Chair
Lori G. Levin Executive Director
Meeting Notice
Budget Committee
November 12, 2008 – 10:00 a.m. Illinois Criminal Justice Information Authority 300 West Adams Street 8 th Floor Conference Room Chicago, IL 60606
Agenda
This meeting will be accessible to persons with disabilities in compliance with Executive Order #5 and pertinent State and Federal laws upon anticipated attendance. Persons with disabilities planning to attend and needing special accommodations should contact by telephone or letter Mr. Hank Anthony, Associate Director, Office of Administrative Services, Illinois Criminal Justice Information Authority, 300 West Adams Street, Suite 700, Chicago, Illinois 60606 (telephone 312/793-8550). TDD services are available at 312-793-4170.
MINUTES
Illinois Criminal Justice Information Authority Budget Committee Meeting
10:00 a.m.
Tuesday, August 26, 2008
Illinois Criminal Justice Information Authority 300 West Adams Street, Eighth Floor Conference Room Chicago, Illinois
Call to Order and Roll Call
The Budget Committee of the Illinois Criminal Justice Information Authority met on Tuesday, August 26, 2008, at the Eighth Floor Conference Room at 300 West Adams Street, Chicago, Illinois. Budget Committee Chairman Eugene E. Murphy, Jr. called the meeting to order at 10:13 a.m. Other Authority members and designees present were Chief David Bradford, Waisu Fashina for Clerk Dorothy Brown, John Robertson for Sheriff Tom Dart, Director Norbert Goetten (via teleconference), Barbara Engel (via teleconference), State's Attorney Bill Mudge (via teleconference), Director Michael J. Pelletier, Authority Chairman Sheldon Sorosky (via teleconference), Mariyana Spyropoulos, Colonel Michael Snyders for Director Larry Trent, and John Z. Toscas (via teleconference). Also in attendance were Megan Alderden of the Chicago Police Department (via teleconference), Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, Associate Director Mark Myrent, and other Authority staff members.
Prior to the beginning of the meeting, Budget Committee Chairman Murphy assigned Mr. Fashina and Director Pelletier to the Budget Committee for the duration of the meeting for the purposes of attaining a quorum. Only members and designees physically present at the meeting were permitted to vote.
Minutes of the April 29, 2008 Budget Committee Meeting
Chief Bradford moved to approve the minutes of the April 29, 2008 Budget Committee Meeting. Ms. Spyropoulos seconded the motion and the minutes were approved by unanimous voice vote.
Minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda
Chief Bradford moved to approve the minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda. Mr. Fashina seconded the motion and the minutes were approved by unanimous voice vote.
Approval of the FFY04 Anti-Drug Abuse Act (ADAA) Plan Adjustments
Program Supervisor Mike Carter called attention to the memo, dated August 19, 2008 under Tab 3 of the meeting materials regarding the ADAA FFY04 Plan Adjustments. He said that currently the Authority's Research and Analysis Unit (R&A) has a $225,000 designation in FFY04 Criminal History Records Improvement (CHRI) funds for its Audit Plan. These funds were intended to cover personnel costs, including the hiring of additional research staff. However, R&A was unable to reach its hiring goal. As a result, staff recommends reducing the Audit Plan designation by $99,750 to $125,250. The $99,750 must remain dedicated to CHRI purposes and when combined with other unallocated CHRI funds, yields a total of $105,839 available for future CHRI programming. ADAA FFY04 funds expire on September 30, 2008.
Mr. Carter said that staff seeks to designate funds to the Chicago Police Department (CPD) to facilitate the modernization of its criminal history records keeping system. The CPD would use these funds to convert approximately 1 million paper records into electronic records in its automated criminal history records system. These funds would be used to cover overtime costs incurred by the conversion process.
In response to a question by Chief Bradford, Associate Director Mark Myrent (director of the Authority's R&A unit) said that the R&A unit was unable to hire the desired personnel due to difficulties in navigating the state's hiring system. Specifically, difficulties were experienced in obtaining the proper approvals to both post notices of available positions and to make timely offers to candidates for those positions. Plans are still in place to pursue hiring for those positions using funds from the next federal fiscal year's designation. In fact, interviews for those positions are scheduled to take place in September, 2008.
Chief Bradford moved to approve the FFY04 ADAA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY04 Juvenile Accountability Incentive Block Grants (JAIBG) Plan Adjustments
Mr. Carter called attention to the memo, dated August 19, 2008 under Tab 4 of the meeting materials regarding the FFY04 JAIBG Plan Adjustments. He said that JAIBG FFY04 funds expire on November 26, 2008. Currently, $108,363 in FFY04 funds is available for use. He said that staff recommends designating these funds to the Illinois Violence Prevention Authority (IVPA) which would use these funds to support the Corazón Community Services program. Corazón is a holistic social services program based in Cicero, Illinois. The IVPA reported that schools in this area are expelling an average of 15 students each month, primarily for gang-related activities. More than half of the expelled students are left without educational alternatives. Corazón would form a partnership with a local junior high school to create two alternative classrooms to serve expelled students. Services would include intake assessment, treatment, transportation, and enrollment in a life-skills program. These funds would be used to purchase computers, software, and related equipment for use by program staff and students, agency brochures, office supplies, and vehicles to support program activities.
Chief Bradford moved to approve the FFY04 JAIBG Plan Adjustments described in the addendum that was distributed to the Budget Committee members at the meeting. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY05 Victims of Crime Act (VOCA) Plan Adjustments
Program Supervisor Ron Reichgelt called attention to the memo, dated August 19, 2008, under Tab 5 of the meeting materials regarding the FFY05 VOCA Plan Adjustments. Mr. Reichgelt said that HOPE of East Central Illinois returned $6,675 from its transitional housing program. He said that staff recommends that these funds be made available for future programming. The lapsing $6,675 combined with $35,559 in other unallocated FFY05 funds yields a total of $42,234 available for future programming.
Mr. Reichgelt said that staff recommends designating the $42,234 to the Illinois Coalition Against Domestic Violence (ICADV) to support the InfoNet program. The funds would be used to upgrade or purchase computers for the ICADV's subgrantee agencies. InfoNet is the data collection system developed by the Authority for the collection of victim service data.
Chief Bradford moved to approve the FFY05 VOCA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
New Business
None.
Old Business
None.
Adjourn
Chief Bradford moved to adjourn. The motion was seconded by Ms. Spyropoulos and passed by unanimous voice vote. The meeting was adjourned at 10:25 a.m.
MINUTES
Illinois Criminal Justice Information Authority Authority Regular Meeting / Budget Agenda Friday, September 5, 2008 9:00 a.m. Illinois Criminal Justice Information Authority Michael A. Bilandic Building, 160 N. La Salle
Auditorium Room C-500 Chicago, Illinois
Call to Order and Roll Call
The Board of the Illinois Criminal Justice Information Authority met on Friday, September 5, 2008, in Auditorium Room C-500 at the Michael A. Bilandic Building, 160 N. La Salle Street, Chicago, Illinois. Authority Chairman Sheldon Sorosky called the Budget Agenda portion of the Regular Meeting to order at 9:56 a.m. Other Authority members and designees present were Clerk Dorothy Brown, Sheriff Tom Dart, Director Brad Demuzio, Authority Vice-Chairman and State's Attorney Richard A. Devine, Director Norbert Goetten, Clerk Becky Jansen, Director Thomas J. Jurkanin, Ellen Mandeltort for Attorney General Lisa Madigan, Director Michael J. Pelletier, Mariyana Spyropoulos, and John Z. Toscas. Also in attendance were Executive Director Lori G. Levin, Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, and other Authority staff members.
Chairman Sorosky, in accordance with the Authority's rules, declared the meeting a Budget Committee meeting at 9:56 a.m., operating as a committee of the budget as a whole. He appointed all Authority members present to be Budget Committee members for the limited purpose of addressing the budget-related agenda items.
Approval of the FFY07 Justice Assistance Grants (JAG) Plan Adjustments
Associate Director Chojnacki, referring to a memo in the meeting materials dated September 2, 2008 and regarding proposed JAG FFY07 plan adjustments, said that staff requested permission to reallocate previously designated JAG FFY07 funds from the Illinois Department of Juvenile Justice's (IDJJ) Young Offender Re-entry Program to the Illinois Department of Corrections' (IDOC) Community-based Residential Treatment for
Adults Program. He said that Program Supervisor Mike Carter was available to answer any questions.
Director Levin said that, essentially, this request was intended to prevent a lapse in funds back to the federal government by allowing the funds to be reprogrammed between the IDJJ and the IDOC. Mr. Chojnacki confirmed that $40,000 would transfer from the IDJJ program to the IDOC program.
Director Goetten moved to approve the FFY07 JAG Plan Adjustments. Director Demuzio seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY02, FFY04, and FFY05 Violence Against Women Act (VAWA) Plan Adjustments
Mr. Chojnacki, referring to the memo dated August 22, 2008 in the meeting materials and regarding proposed VAWA FFY02, FFY04, and FFY05 plan adjustments, said that the memo detailed designation reduction requests and recommended new designations. He said that Program Supervisor Greg Stevens was available to answer any questions.
Director Levin said that staff recommended $364,000 in FFY05 funds to the City of Chicago's Domestic Violence HelpLine. She said that staff had received permission from the Office of Violence Against Women (OVW) to shift the funding source for this program from Victims of Crime Act (VOCA) funds to VAWA Law Enforcement funds. She said that staff is trying to come up with creative uses of limited funds. She also said that staff requested that $55,500 in FFY05 funds be designated to the East Central Illinois Mobile Police Training Unit and that $20,000 be designated to the Illinois Coalition Against Sexual Assault for improving the medical response to rape victims. She said that the total amount of the new designation requests was $439,500.
Mr. Toscas moved to approve the FFY02, FFY04, and FFY05 VAWA Plan Adjustments described in the memo. Director Goetten seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY06 and FFY07 Victims of Crime Act (VOCA) Plan Adjustments and the FFY08 VOCA Plan Introduction
Mr. Chojnacki, referring to the memo dated August 22, 2008 and regarding proposed VOCA plan adjustments for FFY06 and FFY07 and the FFY08 introduction, said that Program Supervisor Greg Stevens was available to answer any questions.
Director Levin, referring to the table at the bottom of Page 13 of the memo, said that the table summarized all available funds, assuming the adoption by this committee of the proposals set forth in the memo. She said that the table indicates that there would be virtually no funds available for future programming out of existing federal fiscal year awards. She added that all VOCA programs endured a 27.8 percent cut. That cut was primarily a function of the VOCA cap having been lowered. She said that staff did as much juggling as possible in crafting the recommendations
|
in the memo in an attempt to spend all of these funds and to deal funding cuts in an even-handed manner to all grantees.
| 13,695
|
inside_word
|
in
|
remove_all
|
<url>
http://www.icjia.state.il.us/assets/pdf/budget/Materials%20111208.pdf
</url>
<text>
ILLINOIS CRIMINAL JUSTICE INFORMATION AUTHORITY
300 West Adams Street, Suite 700
Chicago, Illinois 60606
Phone: (312) 793-8550
Fax: (312) 793-8422
TDD: (312) 793-4170 http://www.icjia.state.il.us
Budget Committee
_______________________________ _______________________________
Eugene E. Murphy, Jr. Chair
Hon. Richard A. Devine Vice Chair
David P. Bradford
Barbara L. Engel
Thomas J. Jurkanin
Hon. Lisa Madigan
Larry G. Trent
_______________________________ _______________________________
- Call to Order and Roll Call
1. Approval of the Minutes of the August 26, 2008 Budget Committee Meeting
2. Approval of the Minutes of the September 5, 2008 Authority Regular Meeting Budget Agenda
3. Violence Against Women Act Plan Adjustments
FFY02 Plan Adjustment #16
FFY03 Plan Adjustment #10
FFY04 Plan Adjustment #8
FFY05 Plan Adjustment #6
FFY06 Plan Adjustment #4
FFY07 Plan Adjustment #2
FFY08 Plan Introduction
4. Victims of Crime Act Plan Adjustments FFY05 Plan Adjustment #11
FFY06 Plan Adjustment #11
FFY07 Plan Adjustment #4
- Old Business
- New Business
- Adjourn
Illinois Criminal Justice Information Authority
Sheldon Sorosky Chair
Hon. Richard A. Devine Vice Chair
Lori G. Levin Executive Director
Meeting Notice
Budget Committee
November 12, 2008 – 10:00 a.m. Illinois Criminal Justice Information Authority 300 West Adams Street 8 th Floor Conference Room Chicago, IL 60606
Agenda
This meeting will be accessible to persons with disabilities in compliance with Executive Order #5 and pertinent State and Federal laws upon anticipated attendance. Persons with disabilities planning to attend and needing special accommodations should contact by telephone or letter Mr. Hank Anthony, Associate Director, Office of Administrative Services, Illinois Criminal Justice Information Authority, 300 West Adams Street, Suite 700, Chicago, Illinois 60606 (telephone 312/793-8550). TDD services are available at 312-793-4170.
MINUTES
Illinois Criminal Justice Information Authority Budget Committee Meeting
10:00 a.m.
Tuesday, August 26, 2008
Illinois Criminal Justice Information Authority 300 West Adams Street, Eighth Floor Conference Room Chicago, Illinois
Call to Order and Roll Call
The Budget Committee of the Illinois Criminal Justice Information Authority met on Tuesday, August 26, 2008, at the Eighth Floor Conference Room at 300 West Adams Street, Chicago, Illinois. Budget Committee Chairman Eugene E. Murphy, Jr. called the meeting to order at 10:13 a.m. Other Authority members and designees present were Chief David Bradford, Waisu Fashina for Clerk Dorothy Brown, John Robertson for Sheriff Tom Dart, Director Norbert Goetten (via teleconference), Barbara Engel (via teleconference), State's Attorney Bill Mudge (via teleconference), Director Michael J. Pelletier, Authority Chairman Sheldon Sorosky (via teleconference), Mariyana Spyropoulos, Colonel Michael Snyders for Director Larry Trent, and John Z. Toscas (via teleconference). Also in attendance were Megan Alderden of the Chicago Police Department (via teleconference), Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, Associate Director Mark Myrent, and other Authority staff members.
Prior to the beginning of the meeting, Budget Committee Chairman Murphy assigned Mr. Fashina and Director Pelletier to the Budget Committee for the duration of the meeting for the purposes of attaining a quorum. Only members and designees physically present at the meeting were permitted to vote.
Minutes of the April 29, 2008 Budget Committee Meeting
Chief Bradford moved to approve the minutes of the April 29, 2008 Budget Committee Meeting. Ms. Spyropoulos seconded the motion and the minutes were approved by unanimous voice vote.
Minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda
Chief Bradford moved to approve the minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda. Mr. Fashina seconded the motion and the minutes were approved by unanimous voice vote.
Approval of the FFY04 Anti-Drug Abuse Act (ADAA) Plan Adjustments
Program Supervisor Mike Carter called attention to the memo, dated August 19, 2008 under Tab 3 of the meeting materials regarding the ADAA FFY04 Plan Adjustments. He said that currently the Authority's Research and Analysis Unit (R&A) has a $225,000 designation in FFY04 Criminal History Records Improvement (CHRI) funds for its Audit Plan. These funds were intended to cover personnel costs, including the hiring of additional research staff. However, R&A was unable to reach its hiring goal. As a result, staff recommends reducing the Audit Plan designation by $99,750 to $125,250. The $99,750 must remain dedicated to CHRI purposes and when combined with other unallocated CHRI funds, yields a total of $105,839 available for future CHRI programming. ADAA FFY04 funds expire on September 30, 2008.
Mr. Carter said that staff seeks to designate funds to the Chicago Police Department (CPD) to facilitate the modernization of its criminal history records keeping system. The CPD would use these funds to convert approximately 1 million paper records into electronic records in its automated criminal history records system. These funds would be used to cover overtime costs incurred by the conversion process.
In response to a question by Chief Bradford, Associate Director Mark Myrent (director of the Authority's R&A unit) said that the R&A unit was unable to hire the desired personnel due to difficulties in navigating the state's hiring system. Specifically, difficulties were experienced in obtaining the proper approvals to both post notices of available positions and to make timely offers to candidates for those positions. Plans are still in place to pursue hiring for those positions using funds from the next federal fiscal year's designation. In fact, interviews for those positions are scheduled to take place in September, 2008.
Chief Bradford moved to approve the FFY04 ADAA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY04 Juvenile Accountability Incentive Block Grants (JAIBG) Plan Adjustments
Mr. Carter called attention to the memo, dated August 19, 2008 under Tab 4 of the meeting materials regarding the FFY04 JAIBG Plan Adjustments. He said that JAIBG FFY04 funds expire on November 26, 2008. Currently, $108,363 in FFY04 funds is available for use. He said that staff recommends designating these funds to the Illinois Violence Prevention Authority (IVPA) which would use these funds to support the Corazón Community Services program. Corazón is a holistic social services program based in Cicero, Illinois. The IVPA reported that schools in this area are expelling an average of 15 students each month, primarily for gang-related activities. More than half of the expelled students are left without educational alternatives. Corazón would form a partnership with a local junior high school to create two alternative classrooms to serve expelled students. Services would include intake assessment, treatment, transportation, and enrollment in a life-skills program. These funds would be used to purchase computers, software, and related equipment for use by program staff and students, agency brochures, office supplies, and vehicles to support program activities.
Chief Bradford moved to approve the FFY04 JAIBG Plan Adjustments described in the addendum that was distributed to the Budget Committee members at the meeting. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY05 Victims of Crime Act (VOCA) Plan Adjustments
Program Supervisor Ron Reichgelt called attention to the memo, dated August 19, 2008, under Tab 5 of the meeting materials regarding the FFY05 VOCA Plan Adjustments. Mr. Reichgelt said that HOPE of East Central Illinois returned $6,675 from its transitional housing program. He said that staff recommends that these funds be made available for future programming. The lapsing $6,675 combined with $35,559 in other unallocated FFY05 funds yields a total of $42,234 available for future programming.
Mr. Reichgelt said that staff recommends designating the $42,234 to the Illinois Coalition Against Domestic Violence (ICADV) to support the InfoNet program. The funds would be used to upgrade or purchase computers for the ICADV's subgrantee agencies. InfoNet is the data collection system developed by the Authority for the collection of victim service data.
Chief Bradford moved to approve the FFY05 VOCA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.
New Business
None.
Old Business
None.
Adjourn
Chief Bradford moved to adjourn. The motion was seconded by Ms. Spyropoulos and passed by unanimous voice vote. The meeting was adjourned at 10:25 a.m.
MINUTES
Illinois Criminal Justice Information Authority Authority Regular Meeting / Budget Agenda Friday, September 5, 2008 9:00 a.m. Illinois Criminal Justice Information Authority Michael A. Bilandic Building, 160 N. La Salle
Auditorium Room C-500 Chicago, Illinois
Call to Order and Roll Call
The Board of the Illinois Criminal Justice Information Authority met on Friday, September 5, 2008, in Auditorium Room C-500 at the Michael A. Bilandic Building, 160 N. La Salle Street, Chicago, Illinois. Authority Chairman Sheldon Sorosky called the Budget Agenda portion of the Regular Meeting to order at 9:56 a.m. Other Authority members and designees present were Clerk Dorothy Brown, Sheriff Tom Dart, Director Brad Demuzio, Authority Vice-Chairman and State's Attorney Richard A. Devine, Director Norbert Goetten, Clerk Becky Jansen, Director Thomas J. Jurkanin, Ellen Mandeltort for Attorney General Lisa Madigan, Director Michael J. Pelletier, Mariyana Spyropoulos, and John Z. Toscas. Also in attendance were Executive Director Lori G. Levin, Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, and other Authority staff members.
Chairman Sorosky, in accordance with the Authority's rules, declared the meeting a Budget Committee meeting at 9:56 a.m., operating as a committee of the budget as a whole. He appointed all Authority members present to be Budget Committee members for the limited purpose of addressing the budget-related agenda items.
Approval of the FFY07 Justice Assistance Grants (JAG) Plan Adjustments
Associate Director Chojnacki, referring to a memo in the meeting materials dated September 2, 2008 and regarding proposed JAG FFY07 plan adjustments, said that staff requested permission to reallocate previously designated JAG FFY07 funds from the Illinois Department of Juvenile Justice's (IDJJ) Young Offender Re-entry Program to the Illinois Department of Corrections' (IDOC) Community-based Residential Treatment for
Adults Program. He said that Program Supervisor Mike Carter was available to answer any questions.
Director Levin said that, essentially, this request was intended to prevent a lapse in funds back to the federal government by allowing the funds to be reprogrammed between the IDJJ and the IDOC. Mr. Chojnacki confirmed that $40,000 would transfer from the IDJJ program to the IDOC program.
Director Goetten moved to approve the FFY07 JAG Plan Adjustments. Director Demuzio seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY02, FFY04, and FFY05 Violence Against Women Act (VAWA) Plan Adjustments
Mr. Chojnacki, referring to the memo dated August 22, 2008 in the meeting materials and regarding proposed VAWA FFY02, FFY04, and FFY05 plan adjustments, said that the memo detailed designation reduction requests and recommended new designations. He said that Program Supervisor Greg Stevens was available to answer any questions.
Director Levin said that staff recommended $364,000 in FFY05 funds to the City of Chicago's Domestic Violence HelpLine. She said that staff had received permission from the Office of Violence Against Women (OVW) to shift the funding source for this program from Victims of Crime Act (VOCA) funds to VAWA Law Enforcement funds. She said that staff is trying to come up with creative uses of limited funds. She also said that staff requested that $55,500 in FFY05 funds be designated to the East Central Illinois Mobile Police Training Unit and that $20,000 be designated to the Illinois Coalition Against Sexual Assault for improving the medical response to rape victims. She said that the total amount of the new designation requests was $439,500.
Mr. Toscas moved to approve the FFY02, FFY04, and FFY05 VAWA Plan Adjustments described in the memo. Director Goetten seconded the motion and it was approved by unanimous voice vote.
Approval of the FFY06 and FFY07 Victims of Crime Act (VOCA) Plan Adjustments and the FFY08 VOCA Plan Introduction
Mr. Chojnacki, referring to the memo dated August 22, 2008 and regarding proposed VOCA plan adjustments for FFY06 and FFY07 and the FFY08 introduction, said that Program Supervisor Greg Stevens was available to answer any questions.
Director Levin, referring to the table at the bottom of Page 13 of the memo, said that the table summarized all available funds, assuming the adoption by this committee of the proposals set forth in the memo. She said that the table indicates that there would be virtually no funds available for future programming out of existing federal fiscal year awards. She added that all VOCA programs endured a 27.8 percent cut. That cut was primarily a function of the VOCA cap having been lowered. She said that staff did as much juggling as possible in crafting the recommendations <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.icjia.state.il.us/assets/pdf/budget/Materials%20111208.pdf\n</url>\n<text>\nILLINOIS CRIMINAL JUSTICE INFORMATION AUTHORITY\n\n300 West Adams Street, Suite 700\n\nChicago, Illinois 60606\n\nPhone: (312) 793-8550\n\nFax: (312) 793-8422\n\nTDD: (312) 793-4170 http://www.icjia.state.il.us\n\nBudget Committee\n\n_______________________________ _______________________________\n\nEugene E. Murphy, Jr. Chair\n\nHon. Richard A. Devine Vice Chair\n\nDavid P. Bradford\n\nBarbara L. Engel\n\nThomas J. Jurkanin\n\nHon. Lisa Madigan\n\nLarry G. Trent\n\n_______________________________ _______________________________\n\n- Call to Order and Roll Call\n\n1. Approval of the Minutes of the August 26, 2008 Budget Committee Meeting\n\n2. Approval of the Minutes of the September 5, 2008 Authority Regular Meeting Budget Agenda\n\n3. Violence Against Women Act Plan Adjustments\n\nFFY02 Plan Adjustment #16\n\nFFY03 Plan Adjustment #10\n\nFFY04 Plan Adjustment #8\n\nFFY05 Plan Adjustment #6\n\nFFY06 Plan Adjustment #4\n\nFFY07 Plan Adjustment #2\n\nFFY08 Plan Introduction\n\n4. Victims of Crime Act Plan Adjustments FFY05 Plan Adjustment #11\n\nFFY06 Plan Adjustment #11\n\nFFY07 Plan Adjustment #4\n\n- Old Business\n\n- New Business\n\n- Adjourn\n\nIllinois Criminal Justice Information Authority\n\nSheldon Sorosky Chair\n\nHon. Richard A. Devine Vice Chair\n\nLori G. Levin Executive Director\n\nMeeting Notice\n\nBudget Committee\n\nNovember 12, 2008 – 10:00 a.m. Illinois Criminal Justice Information Authority 300 West Adams Street 8 th Floor Conference Room Chicago, IL 60606\n\nAgenda\n\nThis meeting will be accessible to persons with disabilities in compliance with Executive Order #5 and pertinent State and Federal laws upon anticipated attendance. Persons with disabilities planning to attend and needing special accommodations should contact by telephone or letter Mr. Hank Anthony, Associate Director, Office of Administrative Services, Illinois Criminal Justice Information Authority, 300 West Adams Street, Suite 700, Chicago, Illinois 60606 (telephone 312/793-8550). TDD services are available at 312-793-4170.\n\nMINUTES\n\nIllinois Criminal Justice Information Authority Budget Committee Meeting\n\n10:00 a.m.\n\nTuesday, August 26, 2008\n\nIllinois Criminal Justice Information Authority 300 West Adams Street, Eighth Floor Conference Room Chicago, Illinois\n\nCall to Order and Roll Call\n\nThe Budget Committee of the Illinois Criminal Justice Information Authority met on Tuesday, August 26, 2008, at the Eighth Floor Conference Room at 300 West Adams Street, Chicago, Illinois. Budget Committee Chairman Eugene E. Murphy, Jr. called the meeting to order at 10:13 a.m. Other Authority members and designees present were Chief David Bradford, Waisu Fashina for Clerk Dorothy Brown, John Robertson for Sheriff Tom Dart, Director Norbert Goetten (via teleconference), Barbara Engel (via teleconference), State's Attorney Bill Mudge (via teleconference), Director Michael J. Pelletier, Authority Chairman Sheldon Sorosky (via teleconference), Mariyana Spyropoulos, Colonel Michael Snyders for Director Larry Trent, and John Z. Toscas (via teleconference). Also in attendance were Megan Alderden of the Chicago Police Department (via teleconference), Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, Associate Director Mark Myrent, and other Authority staff members.\n\nPrior to the beginning of the meeting, Budget Committee Chairman Murphy assigned Mr. Fashina and Director Pelletier to the Budget Committee for the duration of the meeting for the purposes of attaining a quorum. Only members and designees physically present at the meeting were permitted to vote.\n\nMinutes of the April 29, 2008 Budget Committee Meeting\n\nChief Bradford moved to approve the minutes of the April 29, 2008 Budget Committee Meeting. Ms. Spyropoulos seconded the motion and the minutes were approved by unanimous voice vote.\n\nMinutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda\n\nChief Bradford moved to approve the minutes of the June 6, 2008 Authority Regular Meeting / Budget Agenda. Mr. Fashina seconded the motion and the minutes were approved by unanimous voice vote.\n\nApproval of the FFY04 Anti-Drug Abuse Act (ADAA) Plan Adjustments\n\nProgram Supervisor Mike Carter called attention to the memo, dated August 19, 2008 under Tab 3 of the meeting materials regarding the ADAA FFY04 Plan Adjustments. He said that currently the Authority's Research and Analysis Unit (R&A) has a $225,000 designation in FFY04 Criminal History Records Improvement (CHRI) funds for its Audit Plan. These funds were intended to cover personnel costs, including the hiring of additional research staff. However, R&A was unable to reach its hiring goal. As a result, staff recommends reducing the Audit Plan designation by $99,750 to $125,250. The $99,750 must remain dedicated to CHRI purposes and when combined with other unallocated CHRI funds, yields a total of $105,839 available for future CHRI programming. ADAA FFY04 funds expire on September 30, 2008.\n\nMr. Carter said that staff seeks to designate funds to the Chicago Police Department (CPD) to facilitate the modernization of its criminal history records keeping system. The CPD would use these funds to convert approximately 1 million paper records into electronic records in its automated criminal history records system. These funds would be used to cover overtime costs incurred by the conversion process.\n\nIn response to a question by Chief Bradford, Associate Director Mark Myrent (director of the Authority's R&A unit) said that the R&A unit was unable to hire the desired personnel due to difficulties in navigating the state's hiring system. Specifically, difficulties were experienced in obtaining the proper approvals to both post notices of available positions and to make timely offers to candidates for those positions. Plans are still in place to pursue hiring for those positions using funds from the next federal fiscal year's designation. In fact, interviews for those positions are scheduled to take place in September, 2008.\n\nChief Bradford moved to approve the FFY04 ADAA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.\n\nApproval of the FFY04 Juvenile Accountability Incentive Block Grants (JAIBG) Plan Adjustments\n\nMr. Carter called attention to the memo, dated August 19, 2008 under Tab 4 of the meeting materials regarding the FFY04 JAIBG Plan Adjustments. He said that JAIBG FFY04 funds expire on November 26, 2008. Currently, $108,363 in FFY04 funds is available for use. He said that staff recommends designating these funds to the Illinois Violence Prevention Authority (IVPA) which would use these funds to support the Corazón Community Services program. Corazón is a holistic social services program based in Cicero, Illinois. The IVPA reported that schools in this area are expelling an average of 15 students each month, primarily for gang-related activities. More than half of the expelled students are left without educational alternatives. Corazón would form a partnership with a local junior high school to create two alternative classrooms to serve expelled students. Services would include intake assessment, treatment, transportation, and enrollment in a life-skills program. These funds would be used to purchase computers, software, and related equipment for use by program staff and students, agency brochures, office supplies, and vehicles to support program activities.\n\nChief Bradford moved to approve the FFY04 JAIBG Plan Adjustments described in the addendum that was distributed to the Budget Committee members at the meeting. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.\n\nApproval of the FFY05 Victims of Crime Act (VOCA) Plan Adjustments\n\nProgram Supervisor Ron Reichgelt called attention to the memo, dated August 19, 2008, under Tab 5 of the meeting materials regarding the FFY05 VOCA Plan Adjustments. Mr. Reichgelt said that HOPE of East Central Illinois returned $6,675 from its transitional housing program. He said that staff recommends that these funds be made available for future programming. The lapsing $6,675 combined with $35,559 in other unallocated FFY05 funds yields a total of $42,234 available for future programming.\n\nMr. Reichgelt said that staff recommends designating the $42,234 to the Illinois Coalition Against Domestic Violence (ICADV) to support the InfoNet program. The funds would be used to upgrade or purchase computers for the ICADV's subgrantee agencies. InfoNet is the data collection system developed by the Authority for the collection of victim service data.\n\nChief Bradford moved to approve the FFY05 VOCA Plan Adjustments. Ms. Spyropoulos seconded the motion and it was approved by unanimous voice vote.\n\nNew Business\n\nNone.\n\nOld Business\n\nNone.\n\nAdjourn\n\nChief Bradford moved to adjourn. The motion was seconded by Ms. Spyropoulos and passed by unanimous voice vote. The meeting was adjourned at 10:25 a.m.\n\nMINUTES\n\nIllinois Criminal Justice Information Authority Authority Regular Meeting / Budget Agenda Friday, September 5, 2008 9:00 a.m. Illinois Criminal Justice Information Authority Michael A. Bilandic Building, 160 N. La Salle\n\nAuditorium Room C-500 Chicago, Illinois\n\nCall to Order and Roll Call\n\nThe Board of the Illinois Criminal Justice Information Authority met on Friday, September 5, 2008, in Auditorium Room C-500 at the Michael A. Bilandic Building, 160 N. La Salle Street, Chicago, Illinois. Authority Chairman Sheldon Sorosky called the Budget Agenda portion of the Regular Meeting to order at 9:56 a.m. Other Authority members and designees present were Clerk Dorothy Brown, Sheriff Tom Dart, Director Brad Demuzio, Authority Vice-Chairman and State's Attorney Richard A. Devine, Director Norbert Goetten, Clerk Becky Jansen, Director Thomas J. Jurkanin, Ellen Mandeltort for Attorney General Lisa Madigan, Director Michael J. Pelletier, Mariyana Spyropoulos, and John Z. Toscas. Also in attendance were Executive Director Lori G. Levin, Authority General Counsel Jack Cutrone, Associate Director John Chojnacki, and other Authority staff members.\n\nChairman Sorosky, in accordance with the Authority's rules, declared the meeting a Budget Committee meeting at 9:56 a.m., operating as a committee of the budget as a whole. He appointed all Authority members present to be Budget Committee members for the limited purpose of addressing the budget-related agenda items.\n\nApproval of the FFY07 Justice Assistance Grants (JAG) Plan Adjustments\n\nAssociate Director Chojnacki, referring to a memo in the meeting materials dated September 2, 2008 and regarding proposed JAG FFY07 plan adjustments, said that staff requested permission to reallocate previously designated JAG FFY07 funds from the Illinois Department of Juvenile Justice's (IDJJ) Young Offender Re-entry Program to the Illinois Department of Corrections' (IDOC) Community-based Residential Treatment for\n\nAdults Program. He said that Program Supervisor Mike Carter was available to answer any questions.\n\nDirector Levin said that, essentially, this request was intended to prevent a lapse in funds back to the federal government by allowing the funds to be reprogrammed between the IDJJ and the IDOC. Mr. Chojnacki confirmed that $40,000 would transfer from the IDJJ program to the IDOC program.\n\nDirector Goetten moved to approve the FFY07 JAG Plan Adjustments. Director Demuzio seconded the motion and it was approved by unanimous voice vote.\n\nApproval of the FFY02, FFY04, and FFY05 Violence Against Women Act (VAWA) Plan Adjustments\n\nMr. Chojnacki, referring to the memo dated August 22, 2008 in the meeting materials and regarding proposed VAWA FFY02, FFY04, and FFY05 plan adjustments, said that the memo detailed designation reduction requests and recommended new designations. He said that Program Supervisor Greg Stevens was available to answer any questions.\n\nDirector Levin said that staff recommended $364,000 in FFY05 funds to the City of Chicago's Domestic Violence HelpLine. She said that staff had received permission from the Office of Violence Against Women (OVW) to shift the funding source for this program from Victims of Crime Act (VOCA) funds to VAWA Law Enforcement funds. She said that staff is trying to come up with creative uses of limited funds. She also said that staff requested that $55,500 in FFY05 funds be designated to the East Central Illinois Mobile Police Training Unit and that $20,000 be designated to the Illinois Coalition Against Sexual Assault for improving the medical response to rape victims. She said that the total amount of the new designation requests was $439,500.\n\nMr. Toscas moved to approve the FFY02, FFY04, and FFY05 VAWA Plan Adjustments described in the memo. Director Goetten seconded the motion and it was approved by unanimous voice vote.\n\nApproval of the FFY06 and FFY07 Victims of Crime Act (VOCA) Plan Adjustments and the FFY08 VOCA Plan Introduction\n\nMr. Chojnacki, referring to the memo dated August 22, 2008 and regarding proposed VOCA plan adjustments for FFY06 and FFY07 and the FFY08 introduction, said that Program Supervisor Greg Stevens was available to answer any questions.\n\nDirector Levin, referring to the table at the bottom of Page 13 of the memo, said that the table summarized all available funds, assuming the adoption by this committee of the proposals set forth in the memo. She said that the table indicates that there would be virtually no funds available for future programming out of existing federal fiscal year awards. She added that all VOCA programs endured a 27.8 percent cut. That cut was primarily a function of the VOCA cap having been lowered. She said that staff did as much juggling as possible in crafting the recommendations <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "in the memo in an attempt to spend all of these funds and to deal funding cuts in an even-handed manner to all grantees.",
"role": "assistant"
}
] |
|
Inferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents
Sarah Carroll, MD; Stephan Moll, MD
IVC Filters
What Is an IVC Filter? What Is Its Purpose?
Patients who have a blood clot in their leg, referred to as deep vein thrombosis (DVT), are at risk of the clot breaking off and traveling toward the lung. It gets to the lung via the big vein in the abdomen (Figure 1), called the inferior vena cava (IVC). The traveling clot is called an embolus. Once it reaches the lung (after having passed through the right chambers of the heart) and becomes lodged in the lung, it is called a pulmonary embolism (PE). A filter can be inserted into the IVC (Figure 1) to catch and trap a traveling clot, preventing it from reaching the lung. Such filters used to be called Greenfield filters, but a variety of differently shaped filters now exist, so a more generic and better term is IVC filter. Filters can be nonremovable and thus are permanent, or they can be removable and thus can be left in for only a few weeks or months.
How Is an IVC Filter Placed?
Filters are typically placed by a radiologist or vascular surgeon or cardiologist through a vein in either the neck or the groin and then deployed via a catheter into the correct position in the IVC (Figure 1). The placement itself is relatively straightforward and takes only 10 to 15 minutes. Together with preparations, the procedure may take 30 to 45 minutes; it can be done as an outpatient procedure.
What Are Potential Benefits and Downsides?
The potential benefit of a filter is clear: It is meant to catch moderate-sized or large clots and prevent them from traveling to the lung. Filters do not prevent new clots—leg or pelvic DVT or clots in and around the filter—from forming. There are potential downsides of having a filter in place. The most common complication from placing an IVC filter is a hematoma or bleeding at the catheter insertion site in the neck or groin. This is typically not a major problem because the hematoma resolves.
heart. This may lead to further DVTs below the filter, sometimes involving both legs. In addition, a clot can form on the upper side of the filter and still lead to a PE. Thus, PEs can happen despite an IVC filter. Less common complications include small pieces of the metal frame of the filter breaking off; the filter tilting, changing position, and thus obstructing blood flow in the IVC and increasing the risk for DVT; the filter becoming loose and traveling to the heart or lung; and the filter causing a small hole (perforation) in the IVC, leading to internal bleeding.
Who Should Get an IVC Filter?
Probably the most important potential problem is that a large clot or multiple smaller clots can become trapped in the filter and make it harder for blood to travel from the legs to the
People who have a new DVT in the large veins of the pelvis or thigh and are not able to safely take blood thinners because of current major bleeding or a high risk of bleeding should have an IVC filter inserted. Once it is safe to start blood thinners, after a few days or weeks, the filter should be removed.
There are a number of situations in which filter placement is sometimes considered by physicians. However, it is less clear whether they really should
The information contained in this Circulation Cardiology Patient Page is not a substitute for medical advice, and the American Heart Association recommends consultation with your doctor or healthcare professional.
From University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology, Chapel Hill.
Correspondence to Stephan Moll, MD, University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology,
CB 7035, Chapel Hill, NC 27599-7035. E-mail [email protected]
(
Circulation
. 2016;133:e383-e387. DOI: 10.1161/CIRCULATIONAHA.115.019944.)
© 2016 American Heart Association, Inc.
e383
be placed in these situations. Because filters by themselves, being foreign bodies in the vascular system, increase the risk for DVT and because they can lead to the complications discussed above, the risk of placing a filter in these situation may be higher than the potential benefit:
* Trauma: People who sustain a trauma, especially if it will require them to be immobilized for long periods of time, are at a higher risk of developing a blood clot. Many of these patients also cannot use blood thinners to prevent blood clots because of a high risk of bleeding or the need for surgery. It is unclear whether trauma patients should get an IVC filter if they do not have a new blood clot, but most probably should not.
pelvic, leg, or back surgeries) have a higher risk of blood clots. Most patients should be on blood thinners after surgery to prevent blood clots from forming. It is unclear whether people at high risk for blood clots should have an IVC filter in addition to using a blood thinner, but most probably should not.
* Orthopedic surgery: People undergoing orthopedic surgeries (hip or knee replacement; major
* Pregnancy: Patients who are pregnant are at increased risk for blood clots as a result of increased estrogen levels and pressure of the pregnant uterus onto the big veins in the pelvis. It is not clear whether pregnant women at particularly high risk for DVT should get a filter. The pressure of the overlying pregnant uterus can potentially damage filters. There are likely few, if any, situations in which a filter is needed and beneficial.
* Obesity (bariatric) surgery: People undergoing obesity surgery are
at increased risk of blood clots because of the surgery and the obesity itself. Small studies show that placing an IVC filter before surgery in a person who does not have a blood clot does not decrease the risk of a PE after surgery.
* Recurrent DVT: Although filters are sometimes considered in patients who have a second (recurrent) DVT despite having been on blood thinners, that is, patients with anticoagulant failure, no data exist that filters in this situation are beneficial.
* Severe lung or heart disease: In patients with severe lung or heart disease, even a small to mediumsized PE can be detrimental. If such patients have a DVT, filters are sometimes considered to protect the lung from clots.
* Clot busters or mechanical DVT removal (thrombectomy): DVTs are sometimes treated with strong clot-dissolving medications, called clot busters or fibrinolytic drugs, or by putting a catheter into the clot and sucking it out, referred to as mechanical thrombectomy. Because of a concern that parts of the clot may break loose during the procedure, an IVC filter is sometimes placed temporarily.
Existing Guidelines
Several medical groups have created best-practice guidelines for IVC filters. The American College of Chest Physicians and the Society of Interventional Radiology recommend that IVC filters be placed in someone with a known DVT in the pelvis or thigh who cannot be on blood thinners because of bleeding. 1,2 The following additional recommendation have been made:
* The American College of Chest Physicians recommends that people do not get an IVC filter if they are able to use blood thinner medications. 1
* The Society of Interventional Radiology recommends IVC
filters in patients who have a new or worsening clot while on blood thinners, whereas the American College of Chest Physicians does not recommend an IVC filter in this situation. 1,2 The Society of Interventional Radiology also recommends an IVC filter in people with a large PE who still have evidence of a DVT. In addition, the Society of Interventional Radiology recommends an IVC filter in patients with DVT who have severe heart or lung disease.
* Recognizing the potential side effects of IVC filters, the US Food and Drug Administration recommends that IVC filters be considered for removal as soon as protection from PE is no longer needed. 3
Do I Need to Stay on Anticoagulation if I Have an IVC Filter?
Blood thinners should be restarted when the bleeding has resolved even if an IVC filter was placed. It is important to start anticoagulation as soon as possible because an IVC filter does not prevent the formation of new blood clots. Once a patient is safely on blood thinners, the filter should be removed. The duration of treatment with blood thinners depends on what caused the DVT or PE in the first place. Although people with an IVC filter are at a slightly higher risk for a clot in the future once blood thinners are stopped, most people should not continue taking anticoagulation just because an IVC filter is in place. How long to treat with a blood thinner is an individualized decision that should be discussed with your doctor.
How Is an IVC Filter Removed?
A radiologist or vascular surgeon can remove a filter by inserting a catheter into one of the neck veins, the same way as when the filter was placed. The catheter hooks around a hook at the top of the filter, which can then be pulled out. This is typically an outpatient procedure. Removing a filter is most successful if attempted within 3 months of placement. The filter becomes more difficult to remove the longer it has been in because its feet (struts) become embedded in the wall of the IVC. Sometimes, filters cannot be removed, even within the first few months after their placement. Some radiologists or vascular surgeons feel comfortable removing the filter while the patient is on a blood thinner; others want the patient to discontinue the blood thinner before the removal.
Summary
IVC filters should generally be reserved for patients with a new, acute, fresh blood clot in the pelvis or thigh who cannot safely use blood thinner medications. The filter should be removed as soon as possible. How long to keep someone on blood thinners if an IVC filter is not removed depends on a number of factors, mostly the reasons why the DVT or PE formed in the first place.
Vein Stents
What Is a Vein Stent? What Is its Purpose?
Vein stents are small mesh tubes (Figure 2, oval inset) that are inserted into large veins when they become narrowed. These stents keep the blood vessel open so that blood can continue to move from the legs to the heart. They can be placed into the large veins in the abdomen (ie, the IVC) or pelvis.
May-Thurner Syndrome
People can have narrowing of a vein for several reasons. One of them is an anatomic variation called May-Thurner syndrome. In normal anatomy, the artery leading to the right leg (called the right common iliac artery) rests on top of the vein coming from the left leg (the left common iliac vein). In some people, the artery puts increased pressure on the vein, causing the vein to be narrowed (Figure 2). People are born with this variant and have it throughout their life. The narrowing can range from mild to severe. Some studies estimate that 20% of people have some degree of narrowing. Severe narrowing is less common. Veins can also become chronically narrowed as a result of scarring from previous DVTs or from external compression (eg, from a cancer). Significant narrowing can lead to blood flow disturbance and can increase the chance of developing a DVT.
What Are the Symptoms of May-Thurner Syndrome?
Most people with May-Thurner syndrome have no symptoms and will never develop any. Even if the vein is severely narrowed, bypassing veins (collaterals) may open up and drain the leg so that a patient may be without symptoms. However, in some people, the narrowing can lead to chronic leg swelling or can contribute to the formation of a DVT in the left leg.
How Is May-Thurner Syndrome Diagnosed?
A routine Doppler ultrasound of the leg is not likely to see the narrowing because the veins involved are deep in the pelvis, an area that a Doppler ultrasound cannot visualize. A computed tomography venogram or magnetic resonance venogram of the pelvis can show the narrowing of the vein. Another way to see the narrowing is by injecting contrast dye into a vein in the leg, called a contrast venogram. Sometimes, intravenous ultrasound is done with an ultrasound catheter in the vein. This is to determine the degree of narrowing and to measure pressures in front of and behind the narrowed stretch of vein to determine how severely narrowed the vein is.
Does May-Thurner Increase My Risk for a DVT?
It is unknown how much the vein narrowing increases the risk for developing a DVT. DVTs are often attributable to multiple risk factors, not just one. May-Thurner syndrome may contribute to DVT. However, it is important to determine other risk factors (major surgery, major trauma, hospitalization or other immobility, long-distance travel, birth control pill, patch or ring,
pregnancy, etc) and perhaps to assess for congenital or acquired clotting disorders by blood testing before blaming the occurrence of a DVT on the presence of May-Thurner syndrome.
If I Have May-Thurner, Do I Need a Stent?
* Vein stents are not indicated in people who have no symptoms and have not had a DVT.
* People with a DVT in the leg who are found to have significant May-Thurner syndrome can be considered for a stent. However, it is unknown if placing a stent decreases the risk of getting a blood clot in the future.
* A stent can be considered in the patient with May-Thurner syndrome who has had a DVT and who still has significant leg pain or swelling after a few months of blood thinner treatment. Studies have shown that leg symptoms may improve after stent placement.
How Is a Stent Placed? Does It Stay Open?
A stent is placed with the help of a catheter via the large veins in the leg behind the knee or in the groin, with deployment of the stent in the area of narrowing. Most stents are patent for the first 1 to 2 years after being inserted. 4 Unfortunately, some become narrowed within 3 to 5 years. When stents become narrowed, leg swelling may increase. A radiologist, vascular surgeon, or interventional cardiologist can put a catheter through the vein in the leg and open up the stent by using a balloon to reinflate the stent or by placing a new stent. This is usually successful.
How Do You Monitor if a Stent Is Still Patent?
If you have a stent and develop more leg swelling, leg pain, or a new DVT, then the radiologist, surgeon, or cardiologist should evaluate whether your stent is patent by injecting contrast dye into the veins of the leg. It is not known whether people with stents who are doing well and have no new symptoms need regular routine followup monitoring with images (such as a computed tomography venogram).
Do I Need to Stay on Blood Thinners if I Have a Stent?
Once the stent is placed, you will likely stay on blood thinner medications for at least 3 months to treat your acute DVT. The decision on how long to treat with a blood thinner is based on the circumstances of the blood clot, your risk of bleeding, and how well you tolerate the blood thinner. If the blood thinner is stopped, we do not know if you should start on an antiplatelet medication (eg, aspirin or clopidogrel) because it is not known whether antiplatelets are beneficial in keeping vein stents open.
Existing Guidelines
Many clinical management issues about venous stents are unknown because stents have not been studied much in clinical trials. Therefore, there are very limited guidelines related to venous stents. The Society for Vascular Surgery and the American Venous Forum recommend stents for large veins in the pelvis, but not in the thigh of around behind the knee, if narrowing is found after a blood clot has been removed. 5 However, it is not known whether stents are really beneficial and decrease the risk for recurrent clots in this situation.
Summary
Vein stents can be successful in decreasing leg symptoms after a leg DVT such as chronic swelling and leg pain caused by narrowing of a pelvic vein. We do not know whether stents prevent blood clots from forming in the future or how long a patient needs to stay on blood thinners or antiplatelet medications after stent placement. Stents are foreign bodies and are not without risk. They may occlude over time and lead to the need for repeated radiological procedures (angioplasties) to open them again. Therefore, they should be placed only after the risks and benefits have been carefully weighed.
Acknowledgments
We thank Joe Chovan, medical illustrator, Cincinnati, OH, for the creation of the figures for this article.
Disclosures
None.
References
1. Kearon C, Akl EA, Comerota AJ, Prandoni P, Bounameaux H, Goldhaber SZ, Nelson ME, Wells PS, Gould MK, Dentali F, Crowther M, Kahn SR; American College of Chest Physicians. Antithrombotic therapy for VTE disease: Antithrombotic Therapy and Prevention of Thrombosis, 9th ed: American College of Chest Physicians EvidenceBased Clinical Practice Guidelines. Chest. 2012;141(suppl):e419S–e494S. doi: 10.1378/ chest.11-2301.
2. Caplin DM, Nikolic B, Kalva SP, Ganguli S, Saad WE, Zuckerman DA; Society of
Interventional Radiology Standards of Practice Committee. Quality improvement guidelines for the performance of inferior vena cava filter placement for the prevention of pulmonary embolism. J Vasc Interv Radiol. 2011;22:1499–1506. doi: 10.1016/j. jvir.2011.07.012.
of endovascular treatment with long-term follow-up. Eur J Radiol. 2008;68:487–492. doi: 10.1016/j.ejrad.2007.08.019.
3. US Food and Drug Administration. Removing Retrievable Inferior Vena Cava Filters: FDA Safety Communication. May 6, 2014. http://www.fda.gov/MedicalDevices/ Safety/AlertsandNotices/default.htm. Accessed November 11, 2015.
4. Oguzkurt L, Tercan F, Ozkan U, Gulcan O. Iliac vein compression syndrome: outcome
5. Meissner MH, Gloviczki P, Comerota AJ, Dalsing MC, Eklof BG, Gillespie DL, Lohr JM, McLafferty RB, Murad MH, Padberg F, Pappas P, Raffetto JD, Wakefield TW; Society for Vascular Surgery; American Venous Forum. Early thrombus removal strategies for acute deep venous thrombosis: clinical practice guidelines of the Society for Vascular Surgery and the American Venous Forum. J Vasc Surg. 2012;55:1449–1462. doi: 10.1016/j.jvs.2011.12.081.
Inferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents
Sarah Carroll and Stephan Moll
Circulation.
2016;133:e383-e387
is published by the American Heart Association, 7272 Greenville Avenue, Dallas, TX 75231
doi: 10.1161/CIRCULATIONAHA.115.019944
Copyright © 2016 American Heart Association, Inc. All rights reserved.
Print ISSN: 0009-7322. Online ISSN: 1524-4539
World Wide Web at: The online version of this article, along with updated information and services, is located on the http://circ.ahajournals.org/content/133/6/e383
document. Permissions and Rights Question and Answer this process is available in the click Request Permissions in the middle column of the Web page under Services. Further information about Office. Once the online version of the published article for which permission is being requested is located, can be obtained via RightsLink, a service of the Copyright Clearance Center, not the Editorial Circulation in Requests for permissions to reproduce figures, tables, or portions of articles originally published Permissions:
http://www.lww.com/reprints Information about reprints can be found online at: Reprints:
is online at: Circulation Information about subscribing to http://circ.ahajournals.org//subscriptions/ Subscriptions:
Circulation
|
<urn:uuid:c51d684c-a6d8-4f14-a7dc-0325cae4a91d>
|
CC-MAIN-2018-26
|
http://circ.ahajournals.org/content/circulationaha/133/6/e383.full.pdf
|
2018-06-23T17:35:26Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865145.53/warc/CC-MAIN-20180623171526-20180623191526-00452.warc.gz
| 59,090,215
| 4,382
|
eng_Latn
|
eng_Latn
| 0.882727
|
eng_Latn
| 0.997342
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3948,
7286,
12732,
16483,
18130,
19424
] |
Inferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents
Sarah Carroll, MD; Stephan Moll, MD
IVC Filters
What Is an IVC Filter? What Is Its Purpose?
Patients who have a blood clot in their leg, referred to as deep vein thrombosis (DVT), are at risk of the clot breaking off and traveling toward the lung. It gets to the lung via the big vein in the abdomen (Figure 1), called the inferior vena cava (IVC). The traveling clot is called an embolus. Once it reaches the lung (after having passed through the right chambers of the heart) and becomes lodged in the lung, it is called a pulmonary embolism (PE). A filter can be inserted into the IVC (Figure 1) to catch and trap a traveling clot, preventing it from reaching the lung. Such filters used to be called Greenfield filters, but a variety of differently shaped filters now exist, so a more generic and better term is IVC filter. Filters can be nonremovable and thus are permanent, or they can be removable and thus can be left in for only a few weeks or months.
How Is an IVC Filter Placed?
Filters are typically placed by a radiologist or vascular surgeon or cardiologist through a vein in either the neck or the groin and then deployed via a catheter into the correct position in the IVC (Figure 1). The placement itself is relatively straightforward and takes only 10 to 15 minutes. Together with preparations, the procedure may take 30 to 45 minutes; it can be done as an outpatient procedure.
What Are Potential Benefits and Downsides?
The potential benefit of a filter is clear: It is meant to catch moderate-sized or large clots and prevent them from traveling to the lung. Filters do not prevent new clots—leg or pelvic DVT or clots in and around the filter—from forming. There are potential downsides of having a filter in place. The most common complication from placing an IVC filter is a hematoma or bleeding at the catheter insertion site in the neck or groin. This is typically not a major problem because the hematoma resolves.
heart. This may lead to further DVTs below the filter, sometimes involving both legs. In addition, a clot can form on the upper side of the filter and still lead to a PE. Thus, PEs can happen despite an IVC filter. Less common complications include small pieces of the metal frame of the filter breaking off; the filter tilting, changing position, and thus obstructing blood flow in the IVC and increasing the risk for DVT; the filter becoming loose and traveling to the heart or lung; and the filter causing a small hole (perforation) in the IVC, leading to internal bleeding.
Who Should Get an IVC Filter?
Probably the most important potential problem is that a large clot or multiple smaller clots can become trapped in the filter and make it harder for blood to travel from the legs to the
People who have a new DVT in the large veins of the pelvis or thigh and are not able to safely take blood thinners because of current major bleeding or a high risk of bleeding should have an IVC filter inserted. Once it is safe to start blood thinners, after a few days or weeks, the filter should be removed.
There are a number of situations in which filter placement is sometimes considered by physicians. However, it is less clear whether they really should
The information contained in this Circulation Cardiology Patient Page is not a substitute for medical advice, and the American Heart Association recommends consultation with your doctor or healthcare professional.
From University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology, Chapel Hill.
Correspondence to Stephan Moll, MD, University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology,
CB 7035, Chapel Hill, NC 27599-7035. E-mail [email protected]
(
Circulation
. 2016;133:e383-e387. DOI: 10.1161/CIRCULATIONAHA.115.019944.)
© 2016 American Heart Association, Inc.
e383
be placed in these situations. Because filters by themselves, being foreign bodies in the vascular system, increase the risk for DVT and because they can lead to the complications discussed above, the risk of placing a filter in these situation may be higher than the potential benefit:
* Trauma: People who sustain a trauma, especially if it will require them to be immobilized for long periods of time, are at a higher risk of developing a blood clot. Many of these patients also cannot use blood thinners to prevent blood clots because of a high risk of bleeding or the need for surgery. It is unclear whether trauma patients should get an IVC filter if they do not have a new blood clot, but most probably should not.
pelvic, leg, or back surgeries) have a higher risk of blood clots. Most patients should be on blood thinners after surgery to prevent blood clots from forming. It is unclear whether people at high risk for blood clots should have an IVC filter in addition to using a blood thinner, but most probably should not.
* Orthopedic surgery: People undergoing orthopedic surgeries (hip or knee replacement; major
* Pregnancy: Patients who are pregnant are at increased risk for blood clots as a result of increased estrogen levels and pressure of the pregnant uterus onto the big veins in the pelvis. It is not clear whether pregnant women at particularly high risk for DVT should get a filter. The pressure of the overlying pregnant uterus can potentially damage filters. There are likely few, if any, situations in which a filter is needed and beneficial.
* Obesity (bariatric) surgery: People undergoing obesity surgery are
at increased risk of blood clots because of the surgery and the obesity itself. Small studies show that placing an IVC filter before surgery in a person who does not have a blood clot does not decrease the risk of a PE after surgery.
* Recurrent DVT: Although filters are sometimes considered in patients who have a second (recurrent) DVT despite having been on blood thinners, that is, patients with anticoagulant failure, no data exist that filters in this situation are beneficial.
* Severe lung or heart disease: In patients with severe lung or heart disease, even a small to mediumsized PE can be detrimental. If such patients have a DVT, filters are sometimes considered to protect the lung from clots.
* Clot busters or mechanical DVT removal (thrombectomy): DVTs are sometimes treated with strong clot-dissolving medications, called clot busters or fibrinolytic drugs, or by putting a catheter into the clot and sucking it out, referred to as mechanical thrombectomy. Because of a concern that parts of the clot may break loose during the procedure, an IVC filter is sometimes placed temporarily.
Existing Guidelines
Several medical groups have created best-practice guidelines for IVC filters. The American College of Chest Physicians and the Society of Interventional Radiology recommend that IVC filters be placed in someone with a known DVT in the pelvis or thigh who cannot be on blood thinners because of bleeding. 1,2 The following additional recommendation have been made:
* The American College of Chest Physicians recommends that people do not get an IVC filter if they are able to use blood thinner medications. 1
* The Society of Interventional Radiology recommends IVC
filters in patients who have a new or worsening clot while on blood thinners, whereas the American College of Chest Physicians does not recommend an IVC filter in this situation. 1,2 The Society of Interventional Radiology also recommends an IVC filter in people with a large PE who still have evidence of a DVT. In addition, the Society of Interventional Radiology recommends an IVC filter in patients with DVT who have severe heart or lung disease.
* Recognizing the potential side effects of IVC filters, the US Food and Drug Administration recommends that IVC filters be considered for removal as soon as protection from PE is no longer needed. 3
Do I Need to Stay on Anticoagulation if I Have an IVC Filter?
Blood thinners should be restarted when the bleeding has resolved even if an IVC filter was placed. It is important to start anticoagulation as soon as possible because an IVC filter does not prevent the formation of new blood clots. Once a patient is safely on blood thinners, the filter should be removed. The duration of treatment with blood thinners depends on what caused the DVT or PE in the first place. Although people with an IVC filter are at a slightly higher risk for a clot in the future once blood thinners are stopped, most people should not continue taking anticoagulation just because an IVC filter is in place. How long to treat with a blood thinner is an individualized decision that should be discussed with your doctor.
How Is an IVC Filter Removed?
A radiologist or vascular surgeon can remove a filter by inserting a catheter into one of the neck veins, the same way as when the filter was placed. The catheter hooks around a hook at the top of the filter, which can then be pulled out. This is typically an outpatient procedure. Removing a filter is most successful if attempted within 3 months of placement. The filter becomes more difficult to remove the longer it has been in because its feet (struts) become embedded in the wall of the IVC. Sometimes, filters cannot be removed, even within the first few months after their placement. Some radiologists or vascular surgeons feel comfortable removing the filter while the patient is on a blood thinner; others want the patient to discontinue the blood thinner before the removal.
Summary
IVC filters should generally be reserved for patients with a new, acute, fresh blood clot in the pelvis or thigh who cannot safely use blood thinner medications. The filter should be removed as soon as possible. How long to keep someone on blood thinners if an IVC filter is not removed depends on a number of factors, mostly the reasons why the DVT or PE formed in the first place.
Vein Stents
What Is a Vein Stent? What Is its Purpose?
Vein stents are small mesh tubes (Figure 2, oval inset) that are inserted into large veins when they become narrowed. These stents keep the blood vessel open so that blood can continue to move from the legs to the heart. They can be placed into the large veins in the abdomen (ie, the IVC) or pelvis.
May-Thurner Syndrome
People can have narrowing of a vein for several reasons. One of them is an anatomic variation called May-Thurner syndrome. In normal anatomy, the artery leading to the right leg (called the right common iliac artery) rests on top of the vein coming from the left leg (the left common iliac vein). In some people, the artery puts increased pressure on the vein, causing the vein to be narrowed (Figure 2). People are born with this variant and have it throughout their life. The narrowing can range from mild to severe. Some studies estimate that 20% of people have some degree of narrowing. Severe narrowing is less common. Veins can also become chronically narrowed as a result of scarring from previous DVTs or from external compression (eg, from a cancer). Significant narrowing can lead to blood flow disturbance and can increase the chance of developing a DVT.
What Are the Symptoms of May-Thurner Syndrome?
Most people with May-Thurner syndrome have no symptoms and will never develop any. Even if the vein is severely narrowed, bypassing veins (collaterals) may open up and drain the leg so that a patient may be without symptoms. However, in some people, the narrowing can lead to chronic leg swelling or can contribute to the formation of a DVT in the left leg.
How Is May-Thurner Syndrome Diagnosed?
A routine Doppler ultrasound of the leg is not likely to see the narrowing because the veins involved are deep in the pelvis, an area that a Doppler ultrasound cannot visualize. A computed tomography venogram or magnetic resonance venogram of the pelvis can show the narrowing of the vein. Another way to see the narrowing is by injecting contrast dye into a vein in the leg, called a contrast venogram. Sometimes, intravenous ultrasound is done with an ultrasound catheter in the vein. This is to determine the degree of narrowing and to measure pressures in front of and behind the narrowed stretch of vein to determine how severely narrowed the vein is.
Does May-Thurner Increase My Risk for a DVT?
It is unknown how much the vein narrowing increases the risk for developing a DVT. DVTs are often attributable to multiple risk factors, not just one. May-Thurner syndrome may contribute to DVT. However, it is important to determine other risk factors (major surgery, major trauma, hospitalization or other immobility, long-distance travel, birth control pill, patch or ring,
pregnancy, etc) and perhaps to assess for congenital or acquired clotting disorders by blood testing before blaming the occurrence of a DVT on the presence of May-Thurner syndrome.
If I Have May-Thurner, Do I Need a Stent?
* Vein stents are not indicated in people who have no symptoms and have not had a DVT.
* People with a DVT in the leg who are found to have significant May-Thurner syndrome can be considered for a stent. However, it is unknown if placing a stent decreases the risk of getting a blood clot in the future.
* A stent can be considered in the patient with May-Thurner syndrome who has had a DVT and who still has significant leg pain or swelling after a few months of blood thinner treatment. Studies have shown that leg symptoms may improve after stent placement.
How Is a Stent Placed? Does It Stay Open?
A stent is placed with the help of a catheter via the large veins in the leg behind the knee or in the groin, with deployment of the stent in the area of narrowing. Most stents are patent for the first 1 to 2 years after being inserted. 4 Unfortunately, some become narrowed within 3 to 5 years. When stents become narrowed, leg swelling may increase. A radiologist, vascular surgeon, or interventional cardiologist can put a catheter through the vein in the leg and open up the stent by using a balloon to reinflate the stent or by placing a new stent. This is usually successful.
How Do You Monitor if a Stent Is Still Patent?
If you have a stent and develop more leg swelling, leg pain, or a new DVT, then the radiologist, surgeon, or cardiologist should evaluate whether your stent is patent by injecting contrast dye into the veins of the leg. It is not known whether people with stents who are doing well and have no new symptoms need regular routine followup monitoring with images (such as a computed tomography venogram).
Do I Need to Stay on Blood Thinners if I Have a Stent?
Once the stent is placed, you will likely stay on blood thinner medications for at least 3 months to treat your acute DVT. The decision on how long to treat with a blood thinner is based on the circumstances of the blood clot, your risk of bleeding, and how well you tolerate the blood thinner. If the blood thinner is stopped, we do not know if you should start on an antiplatelet medication (eg, aspirin or clopidogrel) because it is not known whether antiplatelets are beneficial in keeping vein stents open.
Existing Guidelines
Many clinical management issues about venous stents are unknown because stents have not been studied much in clinical trials. Therefore, there are very limited guidelines related to venous stents. The Society for Vascular Surgery and the American Venous Forum recommend stents for large veins in the pelvis, but not in the thigh of around behind the knee, if narrowing is found after a blood clot has been removed. 5 However, it is not known whether stents are really beneficial and decrease the risk for recurrent clots in this situation.
Summary
Vein stents can be successful in decreasing leg symptoms after a leg DVT such as chronic swelling and leg pain caused by narrowing of a pelvic vein. We do not know whether stents prevent blood clots from forming in the future or how long a patient needs to stay on blood thinners or antiplatelet medications after stent placement. Stents are foreign bodies and are not without risk. They may occlude over time and lead to the need for repeated radiological procedures (angioplasties) to open them again. Therefore, they should be placed only after the risks and benefits have been carefully weighed.
Acknowledgments
We thank Joe Chovan, medical illustrator, Cincinnati, OH, for the creation of the figures for this article.
Disclosures
None.
References
1. Kearon C, Akl EA, Comerota AJ, Prandoni P, Bounameaux H, Goldhaber SZ, Nelson ME, Wells PS, Gould MK, Dentali F, Crowther M, Kahn SR; American College of Chest Physicians. Anti
|
thrombotic therapy for VTE disease: Antithrombotic Therapy and Prevention of Thrombosis, 9th ed: American College of Chest Physicians EvidenceBased Clinical Practice Guidelines.
|
Chest. 2012;141(suppl):e419S–e494S. doi: 10.1378/ chest.11-2301.
2. Caplin DM, Nikolic B, Kalva SP, Ganguli S, Saad WE, Zuckerman DA; Society of
Interventional Radiology Standards of Practice Committee. Quality improvement guidelines for the performance of inferior vena cava filter placement for the prevention of pulmonary embolism. J Vasc Interv Radiol. 2011;22:1499–1506. doi: 10.1016/j. jvir.2011.07.012.
of endovascular treatment with long-term follow-up. Eur J Radiol. 2008;68:487–492. doi: 10.1016/j.ejrad.2007.08.019.
3. US Food and Drug Administration. Removing Retrievable Inferior Vena Cava Filters: FDA Safety Communication. May 6, 2014. http://www.fda.gov/MedicalDevices/ Safety/AlertsandNotices/default.htm. Accessed November 11, 2015.
4. Oguzkurt L, Tercan F, Ozkan U, Gulcan O. Iliac vein compression syndrome: outcome
5. Meissner MH, Gloviczki P, Comerota AJ, Dalsing MC, Eklof BG, Gillespie DL, Lohr JM, McLafferty RB, Murad MH, Padberg F, Pappas P, Raffetto JD, Wakefield TW; Society for Vascular Surgery; American Venous Forum. Early thrombus removal strategies for acute deep venous thrombosis: clinical practice guidelines of the Society for Vascular Surgery and the American Venous Forum. J Vasc Surg. 2012;55:1449–1462. doi: 10.1016/j.jvs.2011.12.081.
Inferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents
Sarah Carroll and Stephan Moll
Circulation.
2016;133:e383-e387
is published by the American Heart Association, 7272 Greenville Avenue, Dallas, TX 75231
doi: 10.1161/CIRCULATIONAHA.115.019944
Copyright © 2016 American Heart Association, Inc. All rights reserved.
Print ISSN: 0009-7322. Online ISSN: 1524-4539
World Wide Web at: The online version of this article, along with updated information and services, is located on the http://circ.ahajournals.org/content/133/6/e383
document. Permissions and Rights Question and Answer this process is available in the click Request Permissions in the middle column of the Web page under Services. Further information about Office. Once the online version of the published article for which permission is being requested is located, can be obtained via RightsLink, a service of the Copyright Clearance Center, not the Editorial Circulation in Requests for permissions to reproduce figures, tables, or portions of articles originally published Permissions:
http://www.lww.com/reprints Information about reprints can be found online at: Reprints:
is online at: Circulation Information about subscribing to http://circ.ahajournals.org//subscriptions/ Subscriptions:
Circulation
| 16,676
|
inside_word
|
Antithrombotic
|
remove_one_sentence
|
<url>
http://circ.ahajournals.org/content/circulationaha/133/6/e383.full.pdf
</url>
<text>
Inferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents
Sarah Carroll, MD; Stephan Moll, MD
IVC Filters
What Is an IVC Filter? What Is Its Purpose?
Patients who have a blood clot in their leg, referred to as deep vein thrombosis (DVT), are at risk of the clot breaking off and traveling toward the lung. It gets to the lung via the big vein in the abdomen (Figure 1), called the inferior vena cava (IVC). The traveling clot is called an embolus. Once it reaches the lung (after having passed through the right chambers of the heart) and becomes lodged in the lung, it is called a pulmonary embolism (PE). A filter can be inserted into the IVC (Figure 1) to catch and trap a traveling clot, preventing it from reaching the lung. Such filters used to be called Greenfield filters, but a variety of differently shaped filters now exist, so a more generic and better term is IVC filter. Filters can be nonremovable and thus are permanent, or they can be removable and thus can be left in for only a few weeks or months.
How Is an IVC Filter Placed?
Filters are typically placed by a radiologist or vascular surgeon or cardiologist through a vein in either the neck or the groin and then deployed via a catheter into the correct position in the IVC (Figure 1). The placement itself is relatively straightforward and takes only 10 to 15 minutes. Together with preparations, the procedure may take 30 to 45 minutes; it can be done as an outpatient procedure.
What Are Potential Benefits and Downsides?
The potential benefit of a filter is clear: It is meant to catch moderate-sized or large clots and prevent them from traveling to the lung. Filters do not prevent new clots—leg or pelvic DVT or clots in and around the filter—from forming. There are potential downsides of having a filter in place. The most common complication from placing an IVC filter is a hematoma or bleeding at the catheter insertion site in the neck or groin. This is typically not a major problem because the hematoma resolves.
heart. This may lead to further DVTs below the filter, sometimes involving both legs. In addition, a clot can form on the upper side of the filter and still lead to a PE. Thus, PEs can happen despite an IVC filter. Less common complications include small pieces of the metal frame of the filter breaking off; the filter tilting, changing position, and thus obstructing blood flow in the IVC and increasing the risk for DVT; the filter becoming loose and traveling to the heart or lung; and the filter causing a small hole (perforation) in the IVC, leading to internal bleeding.
Who Should Get an IVC Filter?
Probably the most important potential problem is that a large clot or multiple smaller clots can become trapped in the filter and make it harder for blood to travel from the legs to the
People who have a new DVT in the large veins of the pelvis or thigh and are not able to safely take blood thinners because of current major bleeding or a high risk of bleeding should have an IVC filter inserted. Once it is safe to start blood thinners, after a few days or weeks, the filter should be removed.
There are a number of situations in which filter placement is sometimes considered by physicians. However, it is less clear whether they really should
The information contained in this Circulation Cardiology Patient Page is not a substitute for medical advice, and the American Heart Association recommends consultation with your doctor or healthcare professional.
From University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology, Chapel Hill.
Correspondence to Stephan Moll, MD, University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology,
CB 7035, Chapel Hill, NC 27599-7035. E-mail [email protected]
(
Circulation
. 2016;133:e383-e387. DOI: 10.1161/CIRCULATIONAHA.115.019944.)
© 2016 American Heart Association, Inc.
e383
be placed in these situations. Because filters by themselves, being foreign bodies in the vascular system, increase the risk for DVT and because they can lead to the complications discussed above, the risk of placing a filter in these situation may be higher than the potential benefit:
* Trauma: People who sustain a trauma, especially if it will require them to be immobilized for long periods of time, are at a higher risk of developing a blood clot. Many of these patients also cannot use blood thinners to prevent blood clots because of a high risk of bleeding or the need for surgery. It is unclear whether trauma patients should get an IVC filter if they do not have a new blood clot, but most probably should not.
pelvic, leg, or back surgeries) have a higher risk of blood clots. Most patients should be on blood thinners after surgery to prevent blood clots from forming. It is unclear whether people at high risk for blood clots should have an IVC filter in addition to using a blood thinner, but most probably should not.
* Orthopedic surgery: People undergoing orthopedic surgeries (hip or knee replacement; major
* Pregnancy: Patients who are pregnant are at increased risk for blood clots as a result of increased estrogen levels and pressure of the pregnant uterus onto the big veins in the pelvis. It is not clear whether pregnant women at particularly high risk for DVT should get a filter. The pressure of the overlying pregnant uterus can potentially damage filters. There are likely few, if any, situations in which a filter is needed and beneficial.
* Obesity (bariatric) surgery: People undergoing obesity surgery are
at increased risk of blood clots because of the surgery and the obesity itself. Small studies show that placing an IVC filter before surgery in a person who does not have a blood clot does not decrease the risk of a PE after surgery.
* Recurrent DVT: Although filters are sometimes considered in patients who have a second (recurrent) DVT despite having been on blood thinners, that is, patients with anticoagulant failure, no data exist that filters in this situation are beneficial.
* Severe lung or heart disease: In patients with severe lung or heart disease, even a small to mediumsized PE can be detrimental. If such patients have a DVT, filters are sometimes considered to protect the lung from clots.
* Clot busters or mechanical DVT removal (thrombectomy): DVTs are sometimes treated with strong clot-dissolving medications, called clot busters or fibrinolytic drugs, or by putting a catheter into the clot and sucking it out, referred to as mechanical thrombectomy. Because of a concern that parts of the clot may break loose during the procedure, an IVC filter is sometimes placed temporarily.
Existing Guidelines
Several medical groups have created best-practice guidelines for IVC filters. The American College of Chest Physicians and the Society of Interventional Radiology recommend that IVC filters be placed in someone with a known DVT in the pelvis or thigh who cannot be on blood thinners because of bleeding. 1,2 The following additional recommendation have been made:
* The American College of Chest Physicians recommends that people do not get an IVC filter if they are able to use blood thinner medications. 1
* The Society of Interventional Radiology recommends IVC
filters in patients who have a new or worsening clot while on blood thinners, whereas the American College of Chest Physicians does not recommend an IVC filter in this situation. 1,2 The Society of Interventional Radiology also recommends an IVC filter in people with a large PE who still have evidence of a DVT. In addition, the Society of Interventional Radiology recommends an IVC filter in patients with DVT who have severe heart or lung disease.
* Recognizing the potential side effects of IVC filters, the US Food and Drug Administration recommends that IVC filters be considered for removal as soon as protection from PE is no longer needed. 3
Do I Need to Stay on Anticoagulation if I Have an IVC Filter?
Blood thinners should be restarted when the bleeding has resolved even if an IVC filter was placed. It is important to start anticoagulation as soon as possible because an IVC filter does not prevent the formation of new blood clots. Once a patient is safely on blood thinners, the filter should be removed. The duration of treatment with blood thinners depends on what caused the DVT or PE in the first place. Although people with an IVC filter are at a slightly higher risk for a clot in the future once blood thinners are stopped, most people should not continue taking anticoagulation just because an IVC filter is in place. How long to treat with a blood thinner is an individualized decision that should be discussed with your doctor.
How Is an IVC Filter Removed?
A radiologist or vascular surgeon can remove a filter by inserting a catheter into one of the neck veins, the same way as when the filter was placed. The catheter hooks around a hook at the top of the filter, which can then be pulled out. This is typically an outpatient procedure. Removing a filter is most successful if attempted within 3 months of placement. The filter becomes more difficult to remove the longer it has been in because its feet (struts) become embedded in the wall of the IVC. Sometimes, filters cannot be removed, even within the first few months after their placement. Some radiologists or vascular surgeons feel comfortable removing the filter while the patient is on a blood thinner; others want the patient to discontinue the blood thinner before the removal.
Summary
IVC filters should generally be reserved for patients with a new, acute, fresh blood clot in the pelvis or thigh who cannot safely use blood thinner medications. The filter should be removed as soon as possible. How long to keep someone on blood thinners if an IVC filter is not removed depends on a number of factors, mostly the reasons why the DVT or PE formed in the first place.
Vein Stents
What Is a Vein Stent? What Is its Purpose?
Vein stents are small mesh tubes (Figure 2, oval inset) that are inserted into large veins when they become narrowed. These stents keep the blood vessel open so that blood can continue to move from the legs to the heart. They can be placed into the large veins in the abdomen (ie, the IVC) or pelvis.
May-Thurner Syndrome
People can have narrowing of a vein for several reasons. One of them is an anatomic variation called May-Thurner syndrome. In normal anatomy, the artery leading to the right leg (called the right common iliac artery) rests on top of the vein coming from the left leg (the left common iliac vein). In some people, the artery puts increased pressure on the vein, causing the vein to be narrowed (Figure 2). People are born with this variant and have it throughout their life. The narrowing can range from mild to severe. Some studies estimate that 20% of people have some degree of narrowing. Severe narrowing is less common. Veins can also become chronically narrowed as a result of scarring from previous DVTs or from external compression (eg, from a cancer). Significant narrowing can lead to blood flow disturbance and can increase the chance of developing a DVT.
What Are the Symptoms of May-Thurner Syndrome?
Most people with May-Thurner syndrome have no symptoms and will never develop any. Even if the vein is severely narrowed, bypassing veins (collaterals) may open up and drain the leg so that a patient may be without symptoms. However, in some people, the narrowing can lead to chronic leg swelling or can contribute to the formation of a DVT in the left leg.
How Is May-Thurner Syndrome Diagnosed?
A routine Doppler ultrasound of the leg is not likely to see the narrowing because the veins involved are deep in the pelvis, an area that a Doppler ultrasound cannot visualize. A computed tomography venogram or magnetic resonance venogram of the pelvis can show the narrowing of the vein. Another way to see the narrowing is by injecting contrast dye into a vein in the leg, called a contrast venogram. Sometimes, intravenous ultrasound is done with an ultrasound catheter in the vein. This is to determine the degree of narrowing and to measure pressures in front of and behind the narrowed stretch of vein to determine how severely narrowed the vein is.
Does May-Thurner Increase My Risk for a DVT?
It is unknown how much the vein narrowing increases the risk for developing a DVT. DVTs are often attributable to multiple risk factors, not just one. May-Thurner syndrome may contribute to DVT. However, it is important to determine other risk factors (major surgery, major trauma, hospitalization or other immobility, long-distance travel, birth control pill, patch or ring,
pregnancy, etc) and perhaps to assess for congenital or acquired clotting disorders by blood testing before blaming the occurrence of a DVT on the presence of May-Thurner syndrome.
If I Have May-Thurner, Do I Need a Stent?
* Vein stents are not indicated in people who have no symptoms and have not had a DVT.
* People with a DVT in the leg who are found to have significant May-Thurner syndrome can be considered for a stent. However, it is unknown if placing a stent decreases the risk of getting a blood clot in the future.
* A stent can be considered in the patient with May-Thurner syndrome who has had a DVT and who still has significant leg pain or swelling after a few months of blood thinner treatment. Studies have shown that leg symptoms may improve after stent placement.
How Is a Stent Placed? Does It Stay Open?
A stent is placed with the help of a catheter via the large veins in the leg behind the knee or in the groin, with deployment of the stent in the area of narrowing. Most stents are patent for the first 1 to 2 years after being inserted. 4 Unfortunately, some become narrowed within 3 to 5 years. When stents become narrowed, leg swelling may increase. A radiologist, vascular surgeon, or interventional cardiologist can put a catheter through the vein in the leg and open up the stent by using a balloon to reinflate the stent or by placing a new stent. This is usually successful.
How Do You Monitor if a Stent Is Still Patent?
If you have a stent and develop more leg swelling, leg pain, or a new DVT, then the radiologist, surgeon, or cardiologist should evaluate whether your stent is patent by injecting contrast dye into the veins of the leg. It is not known whether people with stents who are doing well and have no new symptoms need regular routine followup monitoring with images (such as a computed tomography venogram).
Do I Need to Stay on Blood Thinners if I Have a Stent?
Once the stent is placed, you will likely stay on blood thinner medications for at least 3 months to treat your acute DVT. The decision on how long to treat with a blood thinner is based on the circumstances of the blood clot, your risk of bleeding, and how well you tolerate the blood thinner. If the blood thinner is stopped, we do not know if you should start on an antiplatelet medication (eg, aspirin or clopidogrel) because it is not known whether antiplatelets are beneficial in keeping vein stents open.
Existing Guidelines
Many clinical management issues about venous stents are unknown because stents have not been studied much in clinical trials. Therefore, there are very limited guidelines related to venous stents. The Society for Vascular Surgery and the American Venous Forum recommend stents for large veins in the pelvis, but not in the thigh of around behind the knee, if narrowing is found after a blood clot has been removed. 5 However, it is not known whether stents are really beneficial and decrease the risk for recurrent clots in this situation.
Summary
Vein stents can be successful in decreasing leg symptoms after a leg DVT such as chronic swelling and leg pain caused by narrowing of a pelvic vein. We do not know whether stents prevent blood clots from forming in the future or how long a patient needs to stay on blood thinners or antiplatelet medications after stent placement. Stents are foreign bodies and are not without risk. They may occlude over time and lead to the need for repeated radiological procedures (angioplasties) to open them again. Therefore, they should be placed only after the risks and benefits have been carefully weighed.
Acknowledgments
We thank Joe Chovan, medical illustrator, Cincinnati, OH, for the creation of the figures for this article.
Disclosures
None.
References
1. Kearon C, Akl EA, Comerota AJ, Prandoni P, Bounameaux H, Goldhaber SZ, Nelson ME, Wells PS, Gould MK, Dentali F, Crowther M, Kahn SR; American College of Chest Physicians. Anti<cursor_is_here> Chest. 2012;141(suppl):e419S–e494S. doi: 10.1378/ chest.11-2301.
2. Caplin DM, Nikolic B, Kalva SP, Ganguli S, Saad WE, Zuckerman DA; Society of
Interventional Radiology Standards of Practice Committee. Quality improvement guidelines for the performance of inferior vena cava filter placement for the prevention of pulmonary embolism. J Vasc Interv Radiol. 2011;22:1499–1506. doi: 10.1016/j. jvir.2011.07.012.
of endovascular treatment with long-term follow-up. Eur J Radiol. 2008;68:487–492. doi: 10.1016/j.ejrad.2007.08.019.
3. US Food and Drug Administration. Removing Retrievable Inferior Vena Cava Filters: FDA Safety Communication. May 6, 2014. http://www.fda.gov/MedicalDevices/ Safety/AlertsandNotices/default.htm. Accessed November 11, 2015.
4. Oguzkurt L, Tercan F, Ozkan U, Gulcan O. Iliac vein compression syndrome: outcome
5. Meissner MH, Gloviczki P, Comerota AJ, Dalsing MC, Eklof BG, Gillespie DL, Lohr JM, McLafferty RB, Murad MH, Padberg F, Pappas P, Raffetto JD, Wakefield TW; Society for Vascular Surgery; American Venous Forum. Early thrombus removal strategies for acute deep venous thrombosis: clinical practice guidelines of the Society for Vascular Surgery and the American Venous Forum. J Vasc Surg. 2012;55:1449–1462. doi: 10.1016/j.jvs.2011.12.081.
Inferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents
Sarah Carroll and Stephan Moll
Circulation.
2016;133:e383-e387
is published by the American Heart Association, 7272 Greenville Avenue, Dallas, TX 75231
doi: 10.1161/CIRCULATIONAHA.115.019944
Copyright © 2016 American Heart Association, Inc. All rights reserved.
Print ISSN: 0009-7322. Online ISSN: 1524-4539
World Wide Web at: The online version of this article, along with updated information and services, is located on the http://circ.ahajournals.org/content/133/6/e383
document. Permissions and Rights Question and Answer this process is available in the click Request Permissions in the middle column of the Web page under Services. Further information about Office. Once the online version of the published article for which permission is being requested is located, can be obtained via RightsLink, a service of the Copyright Clearance Center, not the Editorial Circulation in Requests for permissions to reproduce figures, tables, or portions of articles originally published Permissions:
http://www.lww.com/reprints Information about reprints can be found online at: Reprints:
is online at: Circulation Information about subscribing to http://circ.ahajournals.org//subscriptions/ Subscriptions:
Circulation
</text>
|
[
{
"content": "<url>\nhttp://circ.ahajournals.org/content/circulationaha/133/6/e383.full.pdf\n</url>\n<text>\nInferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents\n\nSarah Carroll, MD; Stephan Moll, MD\n\nIVC Filters\n\nWhat Is an IVC Filter? What Is Its Purpose?\n\nPatients who have a blood clot in their leg, referred to as deep vein thrombosis (DVT), are at risk of the clot breaking off and traveling toward the lung. It gets to the lung via the big vein in the abdomen (Figure 1), called the inferior vena cava (IVC). The traveling clot is called an embolus. Once it reaches the lung (after having passed through the right chambers of the heart) and becomes lodged in the lung, it is called a pulmonary embolism (PE). A filter can be inserted into the IVC (Figure 1) to catch and trap a traveling clot, preventing it from reaching the lung. Such filters used to be called Greenfield filters, but a variety of differently shaped filters now exist, so a more generic and better term is IVC filter. Filters can be nonremovable and thus are permanent, or they can be removable and thus can be left in for only a few weeks or months.\n\nHow Is an IVC Filter Placed?\n\nFilters are typically placed by a radiologist or vascular surgeon or cardiologist through a vein in either the neck or the groin and then deployed via a catheter into the correct position in the IVC (Figure 1). The placement itself is relatively straightforward and takes only 10 to 15 minutes. Together with preparations, the procedure may take 30 to 45 minutes; it can be done as an outpatient procedure.\n\nWhat Are Potential Benefits and Downsides?\n\nThe potential benefit of a filter is clear: It is meant to catch moderate-sized or large clots and prevent them from traveling to the lung. Filters do not prevent new clots—leg or pelvic DVT or clots in and around the filter—from forming. There are potential downsides of having a filter in place. The most common complication from placing an IVC filter is a hematoma or bleeding at the catheter insertion site in the neck or groin. This is typically not a major problem because the hematoma resolves.\n\nheart. This may lead to further DVTs below the filter, sometimes involving both legs. In addition, a clot can form on the upper side of the filter and still lead to a PE. Thus, PEs can happen despite an IVC filter. Less common complications include small pieces of the metal frame of the filter breaking off; the filter tilting, changing position, and thus obstructing blood flow in the IVC and increasing the risk for DVT; the filter becoming loose and traveling to the heart or lung; and the filter causing a small hole (perforation) in the IVC, leading to internal bleeding.\n\nWho Should Get an IVC Filter?\n\nProbably the most important potential problem is that a large clot or multiple smaller clots can become trapped in the filter and make it harder for blood to travel from the legs to the\n\nPeople who have a new DVT in the large veins of the pelvis or thigh and are not able to safely take blood thinners because of current major bleeding or a high risk of bleeding should have an IVC filter inserted. Once it is safe to start blood thinners, after a few days or weeks, the filter should be removed.\n\nThere are a number of situations in which filter placement is sometimes considered by physicians. However, it is less clear whether they really should\n\nThe information contained in this Circulation Cardiology Patient Page is not a substitute for medical advice, and the American Heart Association recommends consultation with your doctor or healthcare professional.\n\nFrom University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology, Chapel Hill.\n\nCorrespondence to Stephan Moll, MD, University of North Carolina School of Medicine, Department of Medicine, Division of Hematology-Oncology,\n\nCB 7035, Chapel Hill, NC 27599-7035. E-mail [email protected]\n\n(\n\nCirculation\n\n. 2016;133:e383-e387. DOI: 10.1161/CIRCULATIONAHA.115.019944.)\n\n© 2016 American Heart Association, Inc.\n\ne383\n\nbe placed in these situations. Because filters by themselves, being foreign bodies in the vascular system, increase the risk for DVT and because they can lead to the complications discussed above, the risk of placing a filter in these situation may be higher than the potential benefit:\n\n* Trauma: People who sustain a trauma, especially if it will require them to be immobilized for long periods of time, are at a higher risk of developing a blood clot. Many of these patients also cannot use blood thinners to prevent blood clots because of a high risk of bleeding or the need for surgery. It is unclear whether trauma patients should get an IVC filter if they do not have a new blood clot, but most probably should not.\n\npelvic, leg, or back surgeries) have a higher risk of blood clots. Most patients should be on blood thinners after surgery to prevent blood clots from forming. It is unclear whether people at high risk for blood clots should have an IVC filter in addition to using a blood thinner, but most probably should not.\n\n* Orthopedic surgery: People undergoing orthopedic surgeries (hip or knee replacement; major\n* Pregnancy: Patients who are pregnant are at increased risk for blood clots as a result of increased estrogen levels and pressure of the pregnant uterus onto the big veins in the pelvis. It is not clear whether pregnant women at particularly high risk for DVT should get a filter. The pressure of the overlying pregnant uterus can potentially damage filters. There are likely few, if any, situations in which a filter is needed and beneficial.\n* Obesity (bariatric) surgery: People undergoing obesity surgery are\nat increased risk of blood clots because of the surgery and the obesity itself. Small studies show that placing an IVC filter before surgery in a person who does not have a blood clot does not decrease the risk of a PE after surgery.\n* Recurrent DVT: Although filters are sometimes considered in patients who have a second (recurrent) DVT despite having been on blood thinners, that is, patients with anticoagulant failure, no data exist that filters in this situation are beneficial.\n* Severe lung or heart disease: In patients with severe lung or heart disease, even a small to mediumsized PE can be detrimental. If such patients have a DVT, filters are sometimes considered to protect the lung from clots.\n* Clot busters or mechanical DVT removal (thrombectomy): DVTs are sometimes treated with strong clot-dissolving medications, called clot busters or fibrinolytic drugs, or by putting a catheter into the clot and sucking it out, referred to as mechanical thrombectomy. Because of a concern that parts of the clot may break loose during the procedure, an IVC filter is sometimes placed temporarily.\n\nExisting Guidelines\n\nSeveral medical groups have created best-practice guidelines for IVC filters. The American College of Chest Physicians and the Society of Interventional Radiology recommend that IVC filters be placed in someone with a known DVT in the pelvis or thigh who cannot be on blood thinners because of bleeding. 1,2 The following additional recommendation have been made:\n\n* The American College of Chest Physicians recommends that people do not get an IVC filter if they are able to use blood thinner medications. 1\n* The Society of Interventional Radiology recommends IVC\n\nfilters in patients who have a new or worsening clot while on blood thinners, whereas the American College of Chest Physicians does not recommend an IVC filter in this situation. 1,2 The Society of Interventional Radiology also recommends an IVC filter in people with a large PE who still have evidence of a DVT. In addition, the Society of Interventional Radiology recommends an IVC filter in patients with DVT who have severe heart or lung disease.\n\n* Recognizing the potential side effects of IVC filters, the US Food and Drug Administration recommends that IVC filters be considered for removal as soon as protection from PE is no longer needed. 3\n\nDo I Need to Stay on Anticoagulation if I Have an IVC Filter?\n\nBlood thinners should be restarted when the bleeding has resolved even if an IVC filter was placed. It is important to start anticoagulation as soon as possible because an IVC filter does not prevent the formation of new blood clots. Once a patient is safely on blood thinners, the filter should be removed. The duration of treatment with blood thinners depends on what caused the DVT or PE in the first place. Although people with an IVC filter are at a slightly higher risk for a clot in the future once blood thinners are stopped, most people should not continue taking anticoagulation just because an IVC filter is in place. How long to treat with a blood thinner is an individualized decision that should be discussed with your doctor.\n\nHow Is an IVC Filter Removed?\n\nA radiologist or vascular surgeon can remove a filter by inserting a catheter into one of the neck veins, the same way as when the filter was placed. The catheter hooks around a hook at the top of the filter, which can then be pulled out. This is typically an outpatient procedure. Removing a filter is most successful if attempted within 3 months of placement. The filter becomes more difficult to remove the longer it has been in because its feet (struts) become embedded in the wall of the IVC. Sometimes, filters cannot be removed, even within the first few months after their placement. Some radiologists or vascular surgeons feel comfortable removing the filter while the patient is on a blood thinner; others want the patient to discontinue the blood thinner before the removal.\n\nSummary\n\nIVC filters should generally be reserved for patients with a new, acute, fresh blood clot in the pelvis or thigh who cannot safely use blood thinner medications. The filter should be removed as soon as possible. How long to keep someone on blood thinners if an IVC filter is not removed depends on a number of factors, mostly the reasons why the DVT or PE formed in the first place.\n\nVein Stents\n\nWhat Is a Vein Stent? What Is its Purpose?\n\nVein stents are small mesh tubes (Figure 2, oval inset) that are inserted into large veins when they become narrowed. These stents keep the blood vessel open so that blood can continue to move from the legs to the heart. They can be placed into the large veins in the abdomen (ie, the IVC) or pelvis.\n\nMay-Thurner Syndrome\n\nPeople can have narrowing of a vein for several reasons. One of them is an anatomic variation called May-Thurner syndrome. In normal anatomy, the artery leading to the right leg (called the right common iliac artery) rests on top of the vein coming from the left leg (the left common iliac vein). In some people, the artery puts increased pressure on the vein, causing the vein to be narrowed (Figure 2). People are born with this variant and have it throughout their life. The narrowing can range from mild to severe. Some studies estimate that 20% of people have some degree of narrowing. Severe narrowing is less common. Veins can also become chronically narrowed as a result of scarring from previous DVTs or from external compression (eg, from a cancer). Significant narrowing can lead to blood flow disturbance and can increase the chance of developing a DVT.\n\nWhat Are the Symptoms of May-Thurner Syndrome?\n\nMost people with May-Thurner syndrome have no symptoms and will never develop any. Even if the vein is severely narrowed, bypassing veins (collaterals) may open up and drain the leg so that a patient may be without symptoms. However, in some people, the narrowing can lead to chronic leg swelling or can contribute to the formation of a DVT in the left leg.\n\nHow Is May-Thurner Syndrome Diagnosed?\n\nA routine Doppler ultrasound of the leg is not likely to see the narrowing because the veins involved are deep in the pelvis, an area that a Doppler ultrasound cannot visualize. A computed tomography venogram or magnetic resonance venogram of the pelvis can show the narrowing of the vein. Another way to see the narrowing is by injecting contrast dye into a vein in the leg, called a contrast venogram. Sometimes, intravenous ultrasound is done with an ultrasound catheter in the vein. This is to determine the degree of narrowing and to measure pressures in front of and behind the narrowed stretch of vein to determine how severely narrowed the vein is.\n\nDoes May-Thurner Increase My Risk for a DVT?\n\nIt is unknown how much the vein narrowing increases the risk for developing a DVT. DVTs are often attributable to multiple risk factors, not just one. May-Thurner syndrome may contribute to DVT. However, it is important to determine other risk factors (major surgery, major trauma, hospitalization or other immobility, long-distance travel, birth control pill, patch or ring,\n\npregnancy, etc) and perhaps to assess for congenital or acquired clotting disorders by blood testing before blaming the occurrence of a DVT on the presence of May-Thurner syndrome.\n\nIf I Have May-Thurner, Do I Need a Stent?\n\n* Vein stents are not indicated in people who have no symptoms and have not had a DVT.\n* People with a DVT in the leg who are found to have significant May-Thurner syndrome can be considered for a stent. However, it is unknown if placing a stent decreases the risk of getting a blood clot in the future.\n* A stent can be considered in the patient with May-Thurner syndrome who has had a DVT and who still has significant leg pain or swelling after a few months of blood thinner treatment. Studies have shown that leg symptoms may improve after stent placement.\n\nHow Is a Stent Placed? Does It Stay Open?\n\nA stent is placed with the help of a catheter via the large veins in the leg behind the knee or in the groin, with deployment of the stent in the area of narrowing. Most stents are patent for the first 1 to 2 years after being inserted. 4 Unfortunately, some become narrowed within 3 to 5 years. When stents become narrowed, leg swelling may increase. A radiologist, vascular surgeon, or interventional cardiologist can put a catheter through the vein in the leg and open up the stent by using a balloon to reinflate the stent or by placing a new stent. This is usually successful.\n\nHow Do You Monitor if a Stent Is Still Patent?\n\nIf you have a stent and develop more leg swelling, leg pain, or a new DVT, then the radiologist, surgeon, or cardiologist should evaluate whether your stent is patent by injecting contrast dye into the veins of the leg. It is not known whether people with stents who are doing well and have no new symptoms need regular routine followup monitoring with images (such as a computed tomography venogram).\n\nDo I Need to Stay on Blood Thinners if I Have a Stent?\n\nOnce the stent is placed, you will likely stay on blood thinner medications for at least 3 months to treat your acute DVT. The decision on how long to treat with a blood thinner is based on the circumstances of the blood clot, your risk of bleeding, and how well you tolerate the blood thinner. If the blood thinner is stopped, we do not know if you should start on an antiplatelet medication (eg, aspirin or clopidogrel) because it is not known whether antiplatelets are beneficial in keeping vein stents open.\n\nExisting Guidelines\n\nMany clinical management issues about venous stents are unknown because stents have not been studied much in clinical trials. Therefore, there are very limited guidelines related to venous stents. The Society for Vascular Surgery and the American Venous Forum recommend stents for large veins in the pelvis, but not in the thigh of around behind the knee, if narrowing is found after a blood clot has been removed. 5 However, it is not known whether stents are really beneficial and decrease the risk for recurrent clots in this situation.\n\nSummary\n\nVein stents can be successful in decreasing leg symptoms after a leg DVT such as chronic swelling and leg pain caused by narrowing of a pelvic vein. We do not know whether stents prevent blood clots from forming in the future or how long a patient needs to stay on blood thinners or antiplatelet medications after stent placement. Stents are foreign bodies and are not without risk. They may occlude over time and lead to the need for repeated radiological procedures (angioplasties) to open them again. Therefore, they should be placed only after the risks and benefits have been carefully weighed.\n\nAcknowledgments\n\nWe thank Joe Chovan, medical illustrator, Cincinnati, OH, for the creation of the figures for this article.\n\nDisclosures\n\nNone.\n\nReferences\n\n1. Kearon C, Akl EA, Comerota AJ, Prandoni P, Bounameaux H, Goldhaber SZ, Nelson ME, Wells PS, Gould MK, Dentali F, Crowther M, Kahn SR; American College of Chest Physicians. Anti<cursor_is_here> Chest. 2012;141(suppl):e419S–e494S. doi: 10.1378/ chest.11-2301.\n2. Caplin DM, Nikolic B, Kalva SP, Ganguli S, Saad WE, Zuckerman DA; Society of\nInterventional Radiology Standards of Practice Committee. Quality improvement guidelines for the performance of inferior vena cava filter placement for the prevention of pulmonary embolism. J Vasc Interv Radiol. 2011;22:1499–1506. doi: 10.1016/j. jvir.2011.07.012.\nof endovascular treatment with long-term follow-up. Eur J Radiol. 2008;68:487–492. doi: 10.1016/j.ejrad.2007.08.019.\n3. US Food and Drug Administration. Removing Retrievable Inferior Vena Cava Filters: FDA Safety Communication. May 6, 2014. http://www.fda.gov/MedicalDevices/ Safety/AlertsandNotices/default.htm. Accessed November 11, 2015.\n4. Oguzkurt L, Tercan F, Ozkan U, Gulcan O. Iliac vein compression syndrome: outcome\n5. Meissner MH, Gloviczki P, Comerota AJ, Dalsing MC, Eklof BG, Gillespie DL, Lohr JM, McLafferty RB, Murad MH, Padberg F, Pappas P, Raffetto JD, Wakefield TW; Society for Vascular Surgery; American Venous Forum. Early thrombus removal strategies for acute deep venous thrombosis: clinical practice guidelines of the Society for Vascular Surgery and the American Venous Forum. J Vasc Surg. 2012;55:1449–1462. doi: 10.1016/j.jvs.2011.12.081.\n\nInferior Vena Cava Filters, May-Thurner Syndrome, and Vein Stents\n\nSarah Carroll and Stephan Moll\n\nCirculation.\n\n2016;133:e383-e387\n\nis published by the American Heart Association, 7272 Greenville Avenue, Dallas, TX 75231\n\ndoi: 10.1161/CIRCULATIONAHA.115.019944\n\nCopyright © 2016 American Heart Association, Inc. All rights reserved.\n\nPrint ISSN: 0009-7322. Online ISSN: 1524-4539\n\nWorld Wide Web at: The online version of this article, along with updated information and services, is located on the http://circ.ahajournals.org/content/133/6/e383\n\ndocument. Permissions and Rights Question and Answer this process is available in the click Request Permissions in the middle column of the Web page under Services. Further information about Office. Once the online version of the published article for which permission is being requested is located, can be obtained via RightsLink, a service of the Copyright Clearance Center, not the Editorial Circulation in Requests for permissions to reproduce figures, tables, or portions of articles originally published Permissions:\n\nhttp://www.lww.com/reprints Information about reprints can be found online at: Reprints:\n\nis online at: Circulation Information about subscribing to http://circ.ahajournals.org//subscriptions/ Subscriptions:\n\nCirculation\n</text>\n",
"role": "user"
},
{
"content": "thrombotic therapy for VTE disease: Antithrombotic Therapy and Prevention of Thrombosis, 9th ed: American College of Chest Physicians EvidenceBased Clinical Practice Guidelines.",
"role": "assistant"
}
] |
A Virtual Audio Driver for the Internet Speaker
Ishan Mandrekar
and
Vassilis Prevelakis
Technical Report DU-CS-02-05
Department of Computer Science
Drexel University
Philadelphia, PA 19104
December 2002
A Virtual Audio Driver for the Internet Speaker
Ishan Mandrekar and Vassilis Prevelakis
Computer Science Department
Drexel University
{ishan, [email protected]
Abstract
We have developed the “Internet Speaker” (IS), a network-enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the LAN using multicast packets, and the IS can select any one of them and play it back. A key requirement for the IS is that it must be capable of playing any type of audio stream, independent of the streaming protocol, or the encoding used.
We achieved this by providing a streaming audio server built as a virtual audio device (VAD) in the OpenBSD kernel. The VAD accepts input from any of the existing audio file players, or streaming audio clients. Since all audio applications have to be able to use the system audio driver, our system can accommodate any protocol or file format, provided there exists some compatible player running under OpenBSD.
In this paper we discuss the design and implementation of the server as a VAD, the streaming protocol developed for this application, and the implementation of the client.
Keywords: virtual drivers, OpenBSD, audio, multicast.
1 Introduction
Audio hardware is becoming increasingly common on desktop computers. With the advent of easy to install and cost-effective networking solutions such as Ethernet and more recently, Wireless Local Area Networks, there has been an increasing interest in allowing audio sources to be shared by multiple devices. One central server can stream audio data to a number of clients all part of the same network. The clients just need to capture the streamed data and play it on their audio devices (Figure 1). This concept can work at home, as well as a campus or office LAN where it can be used as the basis for wireless surround audio systems, background music, public announcements, etc.
However, the popularity of audio services in the Internet has resulted in the deployment of a large number of protocols and data formats producing an on-line Babel of mismatched applications and protocols. Moreover, most of the popular streaming services have adopted incompatible and proprietary formats. It is particularly noteworthy that even though Real Networks released the source code for Helix Client, they did not provide source for the RealAudio G2 and RealAudio 8 decoders.\(^1\) In addition to the streaming audio formats, there are also a large number of encoding schemes for file-based audio players (MP3, wav, and so on).
In order to be able to cope with all these formats, users have to use multiple audio playback applications, each with its own user interface and peculiarities.
\(^1\)https://www.helixcommunity.org/2002/intro/client
Moreover, most commercially available streaming servers cannot stream audio files in their native formats. These files need to be “hinted” with metadata which aids the streamer in generating Real Time Protocol (RTP) [3] packets.\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm} This mandates that the audio files undergo a format conversion before they become eligible for streaming.
Our goal was to produce an audio server that would be independent of the format of the audio source. We also endeavored to create a single client that would be able to accept music from any of the above players without the need for specialized plug-ins or updates.
In the next section we discuss the issues surrounding the design of the audio client and the streaming server. We then, describe our prototype implementation which allows the redirection of the output of off-the-shelf audio player applications using a virtual audio driver. Finally, we discuss how our work compares with related projects and systems, and our plans for future enhancements.
## 2 Design
### 2.1 The Server
A typical audio device [7], as shown in Figure 2, consists of two logically independent systems, one for recording, and another for playback. In the recording section, analog input is first passed through a mixer before being fed to an Analog to Digital Converter (ADC), whose output is subsequently stored in a buffer. The audio hardware dictates various configuration parameters such as resolution (8 bits or 16 bits), data formats (linear or $\mu$-law), channels (mono/stereo) and the sampling rate.
The playback section makes use of a similar buffer to hold data that is to be passed to the Digital to Analog Converter (DAC). The output of the DAC is channeled through a mixer before being sent to the speakers. The operating system also provides format conversions to supplement the native features supplied by the hardware.
An audio playback application like mpg321\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm}, works by continuously reading blocks of audio information from the source (file, or network connection), performing some processing and sending the result to the audio device for playback. This is done by writing blocks of data to the audio special device (/dev/audio). This data is placed in the playback buffer. The device driver further divides the playback buffer into smaller size blocks before passing the data to the audio hardware. I/O control (\texttt{ioctl(2)}) calls are used by applications to ask the device driver about the capabilities of the underlying hardware, or to set various parameters for the audio device (e.g. sampling rate).
The audio device driver in the OpenBSD 3.1 kernel is divided into a high level hardware independent layer, and a low level hardware dependent layer. The high-level driver interacts with user-level applications. It provides a uniform application programming interface to the underlying hardware dependent driver modules.
Low-level drivers provide a set of function calls [2] which allow the hardware to be integrated into the runtime environment of the operating system. A device driver does not need to implement all the calls, but at a minimum a useful driver needs to support opening and closing the device, device control and configuration, and I/O calls.
This observation led us to the design of a \textit{virtual} audio driver that replaces the traditional audio driver and associated hardware, sending the audio information to the network (grey box in Figure 2).
#### 2.1.1 The Virtual Audio Driver
Instead of writing a user level application using streaming protocols (e.g. RTP) and CODECs for complex encodings such as MP3 (MPEG Layer 3), we have added a new virtual audio interface (VAD) to the OpenBSD opFigure 3: Application 1 plays audio to the normal audio device, while Application 2 plays to the VAD, which sends the audio data to a remote machine via the network.
The design of the Virtual Audio Driver (VAD) was heavily influenced by the design of the pseudo terminals (\textit{ptys}) that first appeared in BSD 4.2.
The reason for the wide adoption of the \textit{ptys} is that, as far as the application program is concerned, they are indistinguishable from a real terminal. They implement every nuance of the terminal interface even including settings such as the communication speed that are meaningless to a virtual device. This allowed applications (shells, editors, games, etc) to be used on \textit{ptys} without any modification to the programs or to the way they were used.
In a similar manner, we endeavored to produce a virtual audio driver indistinguishable from a real audio device to the application program. The veracity of the emulation is due to the fact that, to the operating system, the VAD looks like the driver of a real audio device (Figure 3). The VAD responds to the configuration request (probe) at boot time and is thus assigned a minor device number so that application programs can address it.
By using the virtual driver technique, we provide an audio streaming facility that does not depend on the audio application, or the encoding format. Moreover, the music file does not need to be in a special “\textit{hinted}” format unlike the Darwin Streaming Server.\footnote{http://developer.apple.com/darwin/projects/streaming} This enables the VAD server to accommodate new audio encoding formats as long as a player has been ported to OpenBSD.
Another benefit of this approach is that the machine that produces the audio stream (server) does not need to have an audio card and can support multiple instances of the VAD allowing multiple clients to generate separate audio streams.
Each VAD device is bound to a specific multicast address (and port). Once the program opens the VAD device and starts writing to it, the VAD will begin sending packets to the network.
### 2.2 The Client
Our client, which we call “The Internet Speaker” (IS) is a rather simple device, comprising a single board computer (SBC) running an embedded version of OpenBSD, a network connection (preferably wireless), an audio card, and a pair of speakers. The IS receives music from the network and plays it on its speakers. Since Drexel has a campus-wide network, the IS can receive music anywhere within our campus.
Being an embedded device, the IS has limited resources, so it was considered important to standardize the format of the incoming streams. Another constraint is synchronization; if more than one ISs are playing the same channel within earshot, any delay between the two outputs creates cacophony. Finally, since we expect a large number of ISs to be deployed in our campus, we had to minimize the impact of the ISs on the network resources.
These three constraints made the use of an off the shelf player infeasible. We briefly experimented with the Real Time Audio Tool [6] but it did not allow us to convert, for example, Real Audio streams into something the IS could play.
In the end we decided to use multicast packets for the streaming audio with one address per channel. This achieves synchronization between playing ISs and reduces the load on the network. We then “pipe” the output of existing player applications into the network. In this way we do not need to have the players in the ISs but in one or more audio servers. By removing the players we can also standardize the user interface of the ISs. Finally, we redirect the packets received at the ISs to their corresponding audio devices without any post-processing. This reduces the processing power requirements at the ISs and achieves format standardization of the incoming streams.
To avoid burdening the server, we also require that the IS selects which channel to play to, without having to make arrangements with the server.
### 2.3 Protocol Design
The communication protocol between the audio streaming server and the ISs has to be lightweight and easy to implement. On the server side all the protocol is running in kernel space, so a simple design decreases debugging (and kernel reboots). Also, a simple protocol imposes a lesser burden on the resources on the client side, allowing lightweight clients to be used.
Given the real-time nature of the transmissions, and the continuous nature of the audio stream, there is no need for retransmissions or error correction. Incorrect packets are simply discarded. This is acceptable in our target environment which, being a LAN, exhibits low packet loss rates.
Clients may join a transmission at any time and are able to recover from lost packets or transient network problems. This allows the server to be oblivious to the number or type of the clients operating in the network.
Finally, we use multicast packets to reduce network load and synchronize the clients.
### 3 Implementation
#### 3.1 The Streaming Server
When a client application accesses the audio device (via the `open(2)` call), the data flow to the network *via* the VAD. This is done by having the VAD open a kernel UDP socket. The destination address in the socket’s address structure is set to a predefined multicast address and destination port.
Every time data gets written into the play buffer by a user-level application, it is packetized and sent to the network in the following manner: a special control packet containing information to configure the audio device at the client side precedes the transmission of the actual data. The contents of the play buffer are then sent as one or more 1024 byte packets.
The socket is finally closed when the user process terminates the connection with the audio driver.
As we mentioned earlier, the approach we adopted is similar to the use for the Unix pseudo terminals (*ptys*). As in the case of *ptys*, we provide a new low-level driver that looks like a driver for a real audio card. The difference with the *pty* implementation is that pseudo terminals allow the I/O to the *pty* to be directed to another user-level process. Although this technique is more flexible and allows better handling of the audio stream, we decided not to adopt it as it is particularly wasteful in terms of resources. Since the main application of the VAD is the redirection of audio streams to the network, directing the stream to a user-level process which then transmits it to the network would involve superfluous data copying and context switching.
We, therefore, decided to inject the audio byte stream directly into the network as a series of multicast packets. This allows the VAD to construct the packets and forward them to the networking code entirely within the kernel. This minimizes copying and sends the packets without another context switch.
In our current prototype, the multicast address is defined during kernel generation, but in future releases we will allow this to be defined via an `ioctl(2)` or a `sysctl(8)` call. We envisage an interface similar to the `ifconfig(8)` call that allows the address and various parameters to be defined as well as enabling, or disabling the device.
Synchronising the audio output of two devices is not as simple as ensuring that we send the audio data to both devices at the same time. Variations in the routing topology (e.g. different number of hops between the server and the various receivers), Operating System actions (e.g interrupt processing, scheduling the client process, etc.) may result in loss of synchronization. The human ear is sensitive to the resulting phase differences, so we were careful to create an operational environment where such conditions are unlikely to occur.
We have standardized the configuration of the clients (hardware, operating system, applications), and our network topology follows a logical design where machines in the same area are normally connected to the same Ethernet segment. The only case where this is violated, is where we have wireless clients next to a client connected to the wired LAN.
### 3.2 The Client-Server Protocol
The client must select a multicast stream and then start playing the audio. The design of the protocol is such that the client never contacts the server. We achieve this by interspersing control packets between the normal data packets. The control packets (Figure 4) contain sufficient information (sampling rate, bit precision, encoding, channels etc.) for the client to configure its own audio hardware so that it can process the data sent by the server. The data in the ordinary packets is sent directly to the audio device via the standard interface (/dev/audio).
| CTRL | SAMPLING RATE | ENCODING | PRECISION | CHANNELS |
|------|---------------|----------|-----------|----------|
**Figure 4: Control Packet**
Multimedia streaming servers make use of the RTP control protocol (RTCP) to obtain feedback on the quality of data distribution. The protocol consists of periodically transmitting control packets (sender and receiver reports) to all participants in the session, using the same distribution mechanism as the data packets. This feedback may be directly useful to the server for control of adaptive encoding schemes, or alternatively may be used to diagnose faults in the distribution. Sending reception feedback reports to all participants helps in analyzing whether problems are local or global.
The VAD server transmits the audio data in its raw (uncompressed) form over a relatively benign LAN environment, where network resources are plentiful. This does not justify incurring the extra overhead that feedback entails, given that the probability of congestion, or other network problems is low in a LAN. Also, the feedback traffic imposes a burden on the server.
Clients can join or leave the multicast groups anytime without notifying the server. The server remains oblivious of the number of clients “tuned in”, and its performance does not degrade as the number of the client increases. This makes the application very scalable and it can be used across campus or office networks.
### 3.3 The Audio Client
We have constructed a sample client that receives packets from the network and plays them back via the local audio device. The client is a simple program that is designed to run on a variety of platforms (our current implementation runs under OpenBSD and RedHat Linux 7.3). By far, what makes this client portable is the fact that it only has to deal with a simple protocol and a single audio encoding scheme. We expect to be able to support most popular platforms within the next couple of months.
We make use of the multicast API of the pnet6 [1] library to obtain membership of the multicast group that the server is transmitting to. The client program takes two command line arguments, namely the IP address of the multicast group and the destination port number that the server is transmitting to. It then creates a UDP socket and executes a JOIN command. If the join is successful, the client becomes a member of the multicast group and can now start receiving all the traffic destined to the group.
An important prerequisite for this to work is that the network infrastructure supports the IGMP protocol for multicast group management. [8] Ethernet networks support this protocol by default, however, when the network includes routers, they need to be appropriately configured. We believe that within a private network, multicasting has more chances of establishing itself, than in the Internet at large.
The client executes a call-back routine every time it receives a packet. If the received packet is a control packet, the audio parameters are configured else the packet is written to the audio device. To differentiate between audio streams with varying parameters, the client compares the configuration parameters in every control packet to
the parameters which have been previously used to setup the audio device. If there is a mismatch, it invokes the configuration setup routine before sending data to the device.
The client can be terminated at any time, by sending an interrupt signal to the running process. The interrupt handler closes all open file and socket descriptors and terminates the process.
Since the client receives raw data using the native encoding of the audio driver from the network, there is no decompression or decoding overhead incurred, thereby minimizing the load on the client. This also makes the client code extremely simple and concise since all it has to do now is to send the received data to the audio device. Thus the client can be easily ported to a variety of UNIX platforms which have a similar audio device interface. The low computing requirements make future ports of the client to hand-held devices a viable option.
The client application runs in the Internet Speaker, an embedded platform for audio playback over the LAN. The IS is a single board computer with a Pentium class CPU and 64Mb of RAM. The computer also includes a 4Mb flash memory as a boot medium, a PCMCIA slot for the network interface, and an audio card. The device boots a kernel that contains a RAM disk with the root partition and downloads its configuration from the network.
The design of the IS borrows a lot from development carried out as part of the embedded VPN gateway [9] project which used a similar embedded design for a combined Firewall and Virtual Private Network gateway.
Channel selection is currently handled by a number of pushbuttons on the front panel of the machine. The interface attempts to mimic the pre-set buttons on car radios. The IS monitors a number of “well known” multicast addresses for audio information and identifies the push-buttons that are associated with active audio streams. The user presses one of the these “active” buttons and the IS begins to playback the appropriate audio stream.
This interface is rather limited and we plan to augment it by advertising available programs on a separate multicast channel. This information can include the name of the song being played and the multicast address of the channel. The user will then be able to select the desired audio track by touching the name of the channel on a touch-sensitive screen.
### 4 Evaluation
The format used by the server for the audio data is essentially the raw data that are sent to the audio device. This is usually an uncompressed stream in one of the encodings supported by the virtual audio device. This creates a rather sizable stream.
To calculate a lower bound on the stream size (assuming no compression and current audio encoding formats) let us consider a CD quality audio source. This generates 44100 16 bit samples per second in two channels. We, therefore, have:
\[
44100 \times 2 \times 16 \text{ bits} = 1.4 \text{ Mbps}
\]
This is just for the audio data, without counting the protocol overhead or the control packets. To calculate the actual bit-rate we played an MP3 audio file on the server that was 4582086 bytes long.
On the client we received a total of 70846 packets, of which 14231 were control packets. Most of the data packets were of the maximum size allowed by the protocol. The rest were partial, since playback buffers vary in size. The total amount of audio data received by the client was 50769054 bytes and the playback lasted 286 seconds.
The control packets were 71 bytes long while data packets had a protocol and framing overhead of 46 bytes. This gives:
\[
(((56615 \times 46) + 50769054 + (14231 \times 71)) \times 8)/286 = 1.52 \text{ Mbps}
\]
Notice that if we send the compressed file, we will achieve about one order of magnitude reduction in the bit-rate.
Due to the use of multicasting, the network load is the same regardless of the number of clients listening in on the transmissions. Similarly, if no one is listening on a transmission, the bandwidth is wasted.
In a Fast Ethernet network such a stream consumes about 1.5% of the available bandwidth, so a small number of such streams (less than 10) would not adversely effect the operation of the network.
However, by utilizing even a trivial audio compression algorithm the bit-rate can be drastically reduced without any appreciable loss in quality. The compression is done by the server on a per-stream basis, so the incremental overhead of the compression is not significant.
On the client the costs are proportionately small, since audio processing imposes a very small computational burden. The client is assumed to have a less capable processor, and it only needs to decompress a single stream (the one that its playing), so we do not anticipate problems in that area either. We hope to have compression implemented in the next release of our streaming server and client.
Adding a simple compression scheme probably exhausts the limits of the current kernel-based design. Additional enhancements will have to be performed outside the kernel, necessitating the redirection of the audio stream to another user-level process. This is likely to increase the load to the server because of the additional context switch overhead and the copying of all this data between user and kernel space. We hope to be able to provide this functionality in a future release so that we can measure the performance hit and evaluate it against the expected benefits.
Another area of concern is that GUI-based players cannot be run in unattended mode. We currently do not have a fully satisfactory response to this problem, but we believe that as software manufactures modify their user interfaces to accommodate persons with disabilities they will provide the hooks to automate control of their applications.
5 Related Work
SHOUTcast\(^4\) is a MPEG Layer 3 based streaming server technology. It permits anyone to broadcast audio content from their PC to listeners across the Internet or any other IP based network. It is capable of streaming live audio as well as on-demand archived broadcasts.
Listeners tune in to SHOUTcast broadcasts by using a player capable of streaming MP3 audio e.g. Winamp for Windows, XMMS for Linux etc. Broadcasters use Winamp along with a special plug-in called SHOUTcast source to redirect Winamp’s output to the SHOUTcast server. The streaming is done by the SHOUTcast Distributed Network Audio Server (DNAS). All MP3 files inside the content folder are streamable. The server can maintain a web interface for users to selectively play its streamable content.
Since the broadcasters need to use Winamp with the SHOUTcast source plug-in, they are limited to the formats supported by Winamp. Also it is not clear whether the system supports multiple concurrent Winamp server sessions on the same machine. Moreover, the server is designed to support outbound audio transitions (from the LAN to the outside) and thus does not support multicasting. Finally, the server is tied to the Windows platform.
The Helix Universal Server from RealNetworks is a universal platform server with support for live and on-demand delivery of all major file formats including Real Media, Windows Media, QuickTime, MPEG4, MP3 and more. It is both scalable and bandwidth conserving as it comes integrated with a content networking system, specifically designed to provision live and on-demand content. It also includes server fail-over capabilities which route client requests to backup servers in the event of failure or unexpected outages.
A similar application to the VAD is the Multicast File Transfer Protocol [4] (MFTP) from StarBurst Communications. MFTP is designed to provide efficient and reliable file delivery from a single sender to multiple receivers.
The concern that messages sent by clients participating in a multicast, can flood the server is mentioned in the Multicast FTP draft RFC.[4] Under the MFTP protocol, after a file is multicast, clients contact the server to get missing or corrupted blocks of the file. MFTP aggregates these requests (NAKs) from each recipient, so that one NAK can represent multiple bad or dropped packets. The VAD design acknowledging that a small number of discarded packets is acceptable for audio transmissions, allows the clients to ignore bad, or lost packets.
MFTP also uses a separate multicast group to announce the availability of data sets on other multicast groups. This gives the clients a chance to choose whether to participate in an MFTP transfer. This is a very interesting idea in that the client does not need to listen-in on channels that are of no interest to it. We plan to adopt this approach in the next release of our streaming audio server, for the announcement of information about the audio streams that are being transmitted via the network. In this way the user can see which programs are being multicast, rather than having to switch channels to monitor the audio transmissions.
\(^4\)http://www.shoutcast.com/support/docs/
Another benefit from the use of this out-of-band catalog, is that it enables the server to suspend transmission of a particular channel, if it notices that there are no listeners. This notification may be handled through the use of the proposed MSNIP standard [5]. MSNIP allows the audio server to contact the first hop routers asking whether there are listeners on the other side. This allows the server to receive overall status information without running the risk of suffering the “NAK implosion” problem mentioned earlier. Unfortunately, we have to wait until the MSNIP appears in the software distributions running on our campus routers.
6 Conclusions
Our motivation for doing this work was that we felt that existing audio players presented an inferior compromise between interoperability and reliability. In a LAN environment, there is no need for elaborate mechanisms for adapting to network problems. On the other hand the need for multiple connections to remote audio servers increases the load on the external connection points of the network and the work that has to be performed by firewalls, routers etc. Finally, the large number of special purpose audio players (each compatible with a different subset of available formats), alienates users and creates support and administrative headaches.
By implementing the audio streaming server as a virtual device on the system running the decoding applications, we have bypassed the compatibility issues that haunt any general-purpose audio player. Our system confines the special-purpose audio players to a few servers that multicast the audio data always using the same common format.
The existence of a single internal protocol without special cases or the need for additional development to support new formats, allowed the creation of the “Internet Speaker” an embedded device that plays audio streams received from the network. The communications protocol also allows any client to “tune” -in or -out of a transmission, without requiring the knowledge or cooperation of the server. The protocol also provides synchronization between clients broadcasting the same audio stream.
References
[1] Libpnet6. An Advanced Networking Library. http://pnet6.sourceforge.net/.
[2] Writing a pseudo device, NetBSD Documentation. http://www.netbsd.org/Documentation/kernel/pseudo.
[3] H. Schulzrinne et all. RTP: A Transport Protocol for Real-Time Applications. RFC: 1889.
[4] K. Miller et all. StarBurst multicast file transfer protocol (MFTP) specification. Internet Draft, Internet Engineering Task Force, April 1998.
[5] Bill Fenner, Brian Haberman, Hugh Holbrook, and Isidor Kouvelas. Multicast Source Notification of Interest Protocol (MSNIP). draft-ietf-magma-msnip-01.txt, November 2002.
[6] I. Kouvelas and V. Hardman. Overcoming Workstation Problems in a Real-Time Audio Tool. In USENIX Annual Technical Conference, January 1997.
[7] James S. Lowe and Luigi Rizzio. Multimedia Driver Support in the FreeBSD Operating System 5. In USENIX Annual Technical Conference, FREENIX track, June 1998.
[8] C. Kenneth Miller. Multicast Networking and Applications. Addison-Wesley Longman, Inc., 1999.
[9] Vassilis Prevelakis and Angelos Keromytis. Designing an Embedded Firewall/VPN Gateway. In Proceedings of the Third International Network Conference, Plymouth, UK, July 2002.
|
<urn:uuid:41829041-ee99-4d67-8003-61d8703b3509>
|
CC-MAIN-2015-11
|
http://drexel.edu/~/media/Files/cs/techreports/DU-CS-02-05.ashx
|
2015-03-01T19:40:17Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462548.53/warc/CC-MAIN-20150226074102-00316-ip-10-28-5-156.ec2.internal.warc.gz
| 83,081,010
| 6,258
|
eng_Latn
|
eng_Latn
| 0.940178
|
eng_Latn
| 0.997571
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
204,
2976,
6818,
9622,
14089,
18809,
23018,
27823,
31167
] |
A Virtual Audio Driver for the Internet Speaker
Ishan Mandrekar
and
Vassilis Prevelakis
Technical Report DU-CS-02-05
Department of Computer Science
Drexel University
Philadelphia, PA 19104
December 2002
A Virtual Audio Driver for the Internet Speaker
Ishan Mandrekar and Vassilis Prevelakis
Computer Science Department
Drexel University
{ishan, [email protected]
Abstract
We have developed the “Internet Speaker” (IS), a network-enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the LAN using multicast packets, and the IS can select any one of them and play it back. A key requirement for the IS is that it must be capable of playing any type of audio stream, independent of the streaming protocol, or the encoding used.
We achieved this by providing a streaming audio server built as a virtual audio device (VAD) in the OpenBSD kernel. The VAD accepts input from any of the existing audio file players, or streaming audio clients. Since all audio applications have to be able to use the system audio driver, our system can accommodate any protocol or file format, provided there exists some compatible player running under OpenBSD.
In this paper we discuss the design and implementation of the server as a VAD, the streaming protocol developed for this application, and the implementation of the client.
Keywords: virtual drivers, OpenBSD, audio, multicast.
1 Introduction
Audio hardware is becoming increasingly common on desktop computers. With the advent of easy to install and cost-effective networking solutions such as Ethernet and more recently, Wireless Local Area Networks, there has been an increasing interest in allowing audio sources to be shared by multiple devices. One central server can stream audio data to a number of clients all part of the same network. The clients just need to capture the streamed data and play it on their audio devices (Figure 1). This concept can work at home, as well as a campus or office LAN where it can be used as the basis for wireless surround audio systems, background music, public announcements, etc.
However, the popularity of audio services in the Internet has resulted in the deployment of a large number of protocols and data formats producing an on-line Babel of mismatched applications and protocols. Moreover, most of the popular streaming services have adopted incompatible and proprietary formats. It is particularly noteworthy that even though Real Networks released the source code for Helix Client, they did not provide source for the RealAudio G2 and RealAudio 8 decoders.\(^1\) In addition to the streaming audio formats, there are also a large number of encoding schemes for file-based audio players (MP3, wav, and so on).
In order to be able to cope with all these formats, users have to use multiple audio playback applications, each with its own user interface and peculiarities.
\(^1\)https://www.helixcommunity.org/2002/intro/client
Moreover, most commercially available streaming servers cannot stream audio files in their native formats. These files need to be “hinted” with metadata which aids the streamer in generating Real Time Protocol (RTP) [3] packets.\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm} This mandates that the audio files undergo a format conversion before they become eligible for streaming.
Our goal was to produce an audio server that would be independent of the format of the audio source. We also endeavored to create a single client that would be able to accept music from any of the above players without the need for specialized plug-ins or updates.
In the next section we discuss the issues surrounding the design of the audio client and the streaming server. We then, describe our prototype implementation which allows the redirection of the output of off-the-shelf audio player applications using a virtual audio driver. Finally, we discuss how our work compares with related projects and systems, and our plans for future enhancements.
## 2 Design
### 2.1 The Server
A typical audio device [7], as shown in Figure 2, consists of two logically independent systems, one for recording, and another for playback. In the recording section, analog input is first passed through a mixer before being fed to an Analog to Digital Converter (ADC), whose output is subsequently stored in a buffer. The audio hardware dictates various configuration parameters such as resolution (8 bits or 16 bits), data formats (linear or $\mu$-law), channels (mono/stereo) and the sampling rate.
The playback section makes use of a similar buffer to hold data that is to be passed to the Digital to Analog Converter (DAC). The output of the DAC is channeled through a mixer before being sent to the speakers. The operating system also provides format conversions to supplement the native features supplied by the hardware.
An audio playback application like mpg321\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm}, works by continuously reading blocks of audio information from the source (file, or network connection), performing some processing and sending the result to the audio device for playback. This is done by writing blocks of data to the audio special device (/dev/audio). This data is placed in the playback buffer. The device driver further divides the playback buffer into smaller size blocks before passing the data to the audio hardware. I/O control (\texttt{ioctl(2)}) calls are used by applications to ask the device driver about the capabilities of the underlying hardware, or to set various parameters for the audio device (e.g. sampling rate).
The audio device driver in the OpenBSD 3.1 kernel is divided into a high level hardware independent layer, and a low level hardware dependent layer. The high-level driver interacts with user-level applications. It provides a uniform application programming interface to the underlying hardware dependent driver modules.
Low-level drivers provide a set of function calls [2] which allow the hardware to be integrated into the runtime environment of the operating system. A device driver does not need to implement all the calls, but at a minimum a useful driver needs to support opening and closing the device, device control and configuration, and I/O calls.
This observation led us to the design of a \textit{virtual} audio driver that replaces the traditional audio driver and associated hardware, sending the audio information to the network (grey box in Figure 2).
#### 2.1.1 The Virtual Audio Driver
Instead of writing a user level application using streaming protocols (e.g. RTP) and CODECs for complex encodings such as MP3 (MPEG Layer 3), we have added a new virtual audio interface (VAD) to the OpenBSD opFigure 3: Application 1 plays audio to the normal audio device, while Application 2 plays to the VAD, which sends the audio data to a remote machine via the network.
The design of the Virtual Audio Driver (VAD) was heavily influenced by the design of the pseudo terminals (\textit{ptys}) that first appeared in BSD 4.2.
The reason for the wide adoption of the \textit{ptys} is that, as far as the application program is concerned, they are indistinguishable from a real terminal. They implement every nuance of the terminal interface even including settings such as the communication speed that are meaningless to a virtual device. This allowed applications (shells, editors, games, etc) to be used on \textit{ptys} without any modification to the programs or to the way they were used.
In a similar manner, we endeavored to produce a virtual audio driver indistinguishable from a real audio device to the application program. The veracity of the emulation is due to the fact that, to the operating system, the VA
|
D looks like the driver of a real audio device (Figure 3).
|
The VAD responds to the configuration request (probe) at boot time and is thus assigned a minor device number so that application programs can address it.
By using the virtual driver technique, we provide an audio streaming facility that does not depend on the audio application, or the encoding format. Moreover, the music file does not need to be in a special “\textit{hinted}” format unlike the Darwin Streaming Server.\footnote{http://developer.apple.com/darwin/projects/streaming} This enables the VAD server to accommodate new audio encoding formats as long as a player has been ported to OpenBSD.
Another benefit of this approach is that the machine that produces the audio stream (server) does not need to have an audio card and can support multiple instances of the VAD allowing multiple clients to generate separate audio streams.
Each VAD device is bound to a specific multicast address (and port). Once the program opens the VAD device and starts writing to it, the VAD will begin sending packets to the network.
### 2.2 The Client
Our client, which we call “The Internet Speaker” (IS) is a rather simple device, comprising a single board computer (SBC) running an embedded version of OpenBSD, a network connection (preferably wireless), an audio card, and a pair of speakers. The IS receives music from the network and plays it on its speakers. Since Drexel has a campus-wide network, the IS can receive music anywhere within our campus.
Being an embedded device, the IS has limited resources, so it was considered important to standardize the format of the incoming streams. Another constraint is synchronization; if more than one ISs are playing the same channel within earshot, any delay between the two outputs creates cacophony. Finally, since we expect a large number of ISs to be deployed in our campus, we had to minimize the impact of the ISs on the network resources.
These three constraints made the use of an off the shelf player infeasible. We briefly experimented with the Real Time Audio Tool [6] but it did not allow us to convert, for example, Real Audio streams into something the IS could play.
In the end we decided to use multicast packets for the streaming audio with one address per channel. This achieves synchronization between playing ISs and reduces the load on the network. We then “pipe” the output of existing player applications into the network. In this way we do not need to have the players in the ISs but in one or more audio servers. By removing the players we can also standardize the user interface of the ISs. Finally, we redirect the packets received at the ISs to their corresponding audio devices without any post-processing. This reduces the processing power requirements at the ISs and achieves format standardization of the incoming streams.
To avoid burdening the server, we also require that the IS selects which channel to play to, without having to make arrangements with the server.
### 2.3 Protocol Design
The communication protocol between the audio streaming server and the ISs has to be lightweight and easy to implement. On the server side all the protocol is running in kernel space, so a simple design decreases debugging (and kernel reboots). Also, a simple protocol imposes a lesser burden on the resources on the client side, allowing lightweight clients to be used.
Given the real-time nature of the transmissions, and the continuous nature of the audio stream, there is no need for retransmissions or error correction. Incorrect packets are simply discarded. This is acceptable in our target environment which, being a LAN, exhibits low packet loss rates.
Clients may join a transmission at any time and are able to recover from lost packets or transient network problems. This allows the server to be oblivious to the number or type of the clients operating in the network.
Finally, we use multicast packets to reduce network load and synchronize the clients.
### 3 Implementation
#### 3.1 The Streaming Server
When a client application accesses the audio device (via the `open(2)` call), the data flow to the network *via* the VAD. This is done by having the VAD open a kernel UDP socket. The destination address in the socket’s address structure is set to a predefined multicast address and destination port.
Every time data gets written into the play buffer by a user-level application, it is packetized and sent to the network in the following manner: a special control packet containing information to configure the audio device at the client side precedes the transmission of the actual data. The contents of the play buffer are then sent as one or more 1024 byte packets.
The socket is finally closed when the user process terminates the connection with the audio driver.
As we mentioned earlier, the approach we adopted is similar to the use for the Unix pseudo terminals (*ptys*). As in the case of *ptys*, we provide a new low-level driver that looks like a driver for a real audio card. The difference with the *pty* implementation is that pseudo terminals allow the I/O to the *pty* to be directed to another user-level process. Although this technique is more flexible and allows better handling of the audio stream, we decided not to adopt it as it is particularly wasteful in terms of resources. Since the main application of the VAD is the redirection of audio streams to the network, directing the stream to a user-level process which then transmits it to the network would involve superfluous data copying and context switching.
We, therefore, decided to inject the audio byte stream directly into the network as a series of multicast packets. This allows the VAD to construct the packets and forward them to the networking code entirely within the kernel. This minimizes copying and sends the packets without another context switch.
In our current prototype, the multicast address is defined during kernel generation, but in future releases we will allow this to be defined via an `ioctl(2)` or a `sysctl(8)` call. We envisage an interface similar to the `ifconfig(8)` call that allows the address and various parameters to be defined as well as enabling, or disabling the device.
Synchronising the audio output of two devices is not as simple as ensuring that we send the audio data to both devices at the same time. Variations in the routing topology (e.g. different number of hops between the server and the various receivers), Operating System actions (e.g interrupt processing, scheduling the client process, etc.) may result in loss of synchronization. The human ear is sensitive to the resulting phase differences, so we were careful to create an operational environment where such conditions are unlikely to occur.
We have standardized the configuration of the clients (hardware, operating system, applications), and our network topology follows a logical design where machines in the same area are normally connected to the same Ethernet segment. The only case where this is violated, is where we have wireless clients next to a client connected to the wired LAN.
### 3.2 The Client-Server Protocol
The client must select a multicast stream and then start playing the audio. The design of the protocol is such that the client never contacts the server. We achieve this by interspersing control packets between the normal data packets. The control packets (Figure 4) contain sufficient information (sampling rate, bit precision, encoding, channels etc.) for the client to configure its own audio hardware so that it can process the data sent by the server. The data in the ordinary packets is sent directly to the audio device via the standard interface (/dev/audio).
| CTRL | SAMPLING RATE | ENCODING | PRECISION | CHANNELS |
|------|---------------|----------|-----------|----------|
**Figure 4: Control Packet**
Multimedia streaming servers make use of the RTP control protocol (RTCP) to obtain feedback on the quality of data distribution. The protocol consists of periodically transmitting control packets (sender and receiver reports) to all participants in the session, using the same distribution mechanism as the data packets. This feedback may be directly useful to the server for control of adaptive encoding schemes, or alternatively may be used to diagnose faults in the distribution. Sending reception feedback reports to all participants helps in analyzing whether problems are local or global.
The VAD server transmits the audio data in its raw (uncompressed) form over a relatively benign LAN environment, where network resources are plentiful. This does not justify incurring the extra overhead that feedback entails, given that the probability of congestion, or other network problems is low in a LAN. Also, the feedback traffic imposes a burden on the server.
Clients can join or leave the multicast groups anytime without notifying the server. The server remains oblivious of the number of clients “tuned in”, and its performance does not degrade as the number of the client increases. This makes the application very scalable and it can be used across campus or office networks.
### 3.3 The Audio Client
We have constructed a sample client that receives packets from the network and plays them back via the local audio device. The client is a simple program that is designed to run on a variety of platforms (our current implementation runs under OpenBSD and RedHat Linux 7.3). By far, what makes this client portable is the fact that it only has to deal with a simple protocol and a single audio encoding scheme. We expect to be able to support most popular platforms within the next couple of months.
We make use of the multicast API of the pnet6 [1] library to obtain membership of the multicast group that the server is transmitting to. The client program takes two command line arguments, namely the IP address of the multicast group and the destination port number that the server is transmitting to. It then creates a UDP socket and executes a JOIN command. If the join is successful, the client becomes a member of the multicast group and can now start receiving all the traffic destined to the group.
An important prerequisite for this to work is that the network infrastructure supports the IGMP protocol for multicast group management. [8] Ethernet networks support this protocol by default, however, when the network includes routers, they need to be appropriately configured. We believe that within a private network, multicasting has more chances of establishing itself, than in the Internet at large.
The client executes a call-back routine every time it receives a packet. If the received packet is a control packet, the audio parameters are configured else the packet is written to the audio device. To differentiate between audio streams with varying parameters, the client compares the configuration parameters in every control packet to
the parameters which have been previously used to setup the audio device. If there is a mismatch, it invokes the configuration setup routine before sending data to the device.
The client can be terminated at any time, by sending an interrupt signal to the running process. The interrupt handler closes all open file and socket descriptors and terminates the process.
Since the client receives raw data using the native encoding of the audio driver from the network, there is no decompression or decoding overhead incurred, thereby minimizing the load on the client. This also makes the client code extremely simple and concise since all it has to do now is to send the received data to the audio device. Thus the client can be easily ported to a variety of UNIX platforms which have a similar audio device interface. The low computing requirements make future ports of the client to hand-held devices a viable option.
The client application runs in the Internet Speaker, an embedded platform for audio playback over the LAN. The IS is a single board computer with a Pentium class CPU and 64Mb of RAM. The computer also includes a 4Mb flash memory as a boot medium, a PCMCIA slot for the network interface, and an audio card. The device boots a kernel that contains a RAM disk with the root partition and downloads its configuration from the network.
The design of the IS borrows a lot from development carried out as part of the embedded VPN gateway [9] project which used a similar embedded design for a combined Firewall and Virtual Private Network gateway.
Channel selection is currently handled by a number of pushbuttons on the front panel of the machine. The interface attempts to mimic the pre-set buttons on car radios. The IS monitors a number of “well known” multicast addresses for audio information and identifies the push-buttons that are associated with active audio streams. The user presses one of the these “active” buttons and the IS begins to playback the appropriate audio stream.
This interface is rather limited and we plan to augment it by advertising available programs on a separate multicast channel. This information can include the name of the song being played and the multicast address of the channel. The user will then be able to select the desired audio track by touching the name of the channel on a touch-sensitive screen.
### 4 Evaluation
The format used by the server for the audio data is essentially the raw data that are sent to the audio device. This is usually an uncompressed stream in one of the encodings supported by the virtual audio device. This creates a rather sizable stream.
To calculate a lower bound on the stream size (assuming no compression and current audio encoding formats) let us consider a CD quality audio source. This generates 44100 16 bit samples per second in two channels. We, therefore, have:
\[
44100 \times 2 \times 16 \text{ bits} = 1.4 \text{ Mbps}
\]
This is just for the audio data, without counting the protocol overhead or the control packets. To calculate the actual bit-rate we played an MP3 audio file on the server that was 4582086 bytes long.
On the client we received a total of 70846 packets, of which 14231 were control packets. Most of the data packets were of the maximum size allowed by the protocol. The rest were partial, since playback buffers vary in size. The total amount of audio data received by the client was 50769054 bytes and the playback lasted 286 seconds.
The control packets were 71 bytes long while data packets had a protocol and framing overhead of 46 bytes. This gives:
\[
(((56615 \times 46) + 50769054 + (14231 \times 71)) \times 8)/286 = 1.52 \text{ Mbps}
\]
Notice that if we send the compressed file, we will achieve about one order of magnitude reduction in the bit-rate.
Due to the use of multicasting, the network load is the same regardless of the number of clients listening in on the transmissions. Similarly, if no one is listening on a transmission, the bandwidth is wasted.
In a Fast Ethernet network such a stream consumes about 1.5% of the available bandwidth, so a small number of such streams (less than 10) would not adversely effect the operation of the network.
However, by utilizing even a trivial audio compression algorithm the bit-rate can be drastically reduced without any appreciable loss in quality. The compression is done by the server on a per-stream basis, so the incremental overhead of the compression is not significant.
On the client the costs are proportionately small, since audio processing imposes a very small computational burden. The client is assumed to have a less capable processor, and it only needs to decompress a single stream (the one that its playing), so we do not anticipate problems in that area either. We hope to have compression implemented in the next release of our streaming server and client.
Adding a simple compression scheme probably exhausts the limits of the current kernel-based design. Additional enhancements will have to be performed outside the kernel, necessitating the redirection of the audio stream to another user-level process. This is likely to increase the load to the server because of the additional context switch overhead and the copying of all this data between user and kernel space. We hope to be able to provide this functionality in a future release so that we can measure the performance hit and evaluate it against the expected benefits.
Another area of concern is that GUI-based players cannot be run in unattended mode. We currently do not have a fully satisfactory response to this problem, but we believe that as software manufactures modify their user interfaces to accommodate persons with disabilities they will provide the hooks to automate control of their applications.
5 Related Work
SHOUTcast\(^4\) is a MPEG Layer 3 based streaming server technology. It permits anyone to broadcast audio content from their PC to listeners across the Internet or any other IP based network. It is capable of streaming live audio as well as on-demand archived broadcasts.
Listeners tune in to SHOUTcast broadcasts by using a player capable of streaming MP3 audio e.g. Winamp for Windows, XMMS for Linux etc. Broadcasters use Winamp along with a special plug-in called SHOUTcast source to redirect Winamp’s output to the SHOUTcast server. The streaming is done by the SHOUTcast Distributed Network Audio Server (DNAS). All MP3 files inside the content folder are streamable. The server can maintain a web interface for users to selectively play its streamable content.
Since the broadcasters need to use Winamp with the SHOUTcast source plug-in, they are limited to the formats supported by Winamp. Also it is not clear whether the system supports multiple concurrent Winamp server sessions on the same machine. Moreover, the server is designed to support outbound audio transitions (from the LAN to the outside) and thus does not support multicasting. Finally, the server is tied to the Windows platform.
The Helix Universal Server from RealNetworks is a universal platform server with support for live and on-demand delivery of all major file formats including Real Media, Windows Media, QuickTime, MPEG4, MP3 and more. It is both scalable and bandwidth conserving as it comes integrated with a content networking system, specifically designed to provision live and on-demand content. It also includes server fail-over capabilities which route client requests to backup servers in the event of failure or unexpected outages.
A similar application to the VAD is the Multicast File Transfer Protocol [4] (MFTP) from StarBurst Communications. MFTP is designed to provide efficient and reliable file delivery from a single sender to multiple receivers.
The concern that messages sent by clients participating in a multicast, can flood the server is mentioned in the Multicast FTP draft RFC.[4] Under the MFTP protocol, after a file is multicast, clients contact the server to get missing or corrupted blocks of the file. MFTP aggregates these requests (NAKs) from each recipient, so that one NAK can represent multiple bad or dropped packets. The VAD design acknowledging that a small number of discarded packets is acceptable for audio transmissions, allows the clients to ignore bad, or lost packets.
MFTP also uses a separate multicast group to announce the availability of data sets on other multicast groups. This gives the clients a chance to choose whether to participate in an MFTP transfer. This is a very interesting idea in that the client does not need to listen-in on channels that are of no interest to it. We plan to adopt this approach in the next release of our streaming audio server, for the announcement of information about the audio streams that are being transmitted via the network. In this way the user can see which programs are being multicast, rather than having to switch channels to monitor the audio transmissions.
\(^4\)http://www.shoutcast.com/support/docs/
Another benefit from the use of this out-of-band catalog, is that it enables the server to suspend transmission of a particular channel, if it notices that there are no listeners. This notification may be handled through the use of the proposed MSNIP standard [5]. MSNIP allows the audio server to contact the first hop routers asking whether there are listeners on the other side. This allows the server to receive overall status information without running the risk of suffering the “NAK implosion” problem mentioned earlier. Unfortunately, we have to wait until the MSNIP appears in the software distributions running on our campus routers.
6 Conclusions
Our motivation for doing this work was that we felt that existing audio players presented an inferior compromise between interoperability and reliability. In a LAN environment, there is no need for elaborate mechanisms for adapting to network problems. On the other hand the need for multiple connections to remote audio servers increases the load on the external connection points of the network and the work that has to be performed by firewalls, routers etc. Finally, the large number of special purpose audio players (each compatible with a different subset of available formats), alienates users and creates support and administrative headaches.
By implementing the audio streaming server as a virtual device on the system running the decoding applications, we have bypassed the compatibility issues that haunt any general-purpose audio player. Our system confines the special-purpose audio players to a few servers that multicast the audio data always using the same common format.
The existence of a single internal protocol without special cases or the need for additional development to support new formats, allowed the creation of the “Internet Speaker” an embedded device that plays audio streams received from the network. The communications protocol also allows any client to “tune” -in or -out of a transmission, without requiring the knowledge or cooperation of the server. The protocol also provides synchronization between clients broadcasting the same audio stream.
References
[1] Libpnet6. An Advanced Networking Library. http://pnet6.sourceforge.net/.
[2] Writing a pseudo device, NetBSD Documentation. http://www.netbsd.org/Documentation/kernel/pseudo.
[3] H. Schulzrinne et all. RTP: A Transport Protocol for Real-Time Applications. RFC: 1889.
[4] K. Miller et all. StarBurst multicast file transfer protocol (MFTP) specification. Internet Draft, Internet Engineering Task Force, April 1998.
[5] Bill Fenner, Brian Haberman, Hugh Holbrook, and Isidor Kouvelas. Multicast Source Notification of Interest Protocol (MSNIP). draft-ietf-magma-msnip-01.txt, November 2002.
[6] I. Kouvelas and V. Hardman. Overcoming Workstation Problems in a Real-Time Audio Tool. In USENIX Annual Technical Conference, January 1997.
[7] James S. Lowe and Luigi Rizzio. Multimedia Driver Support in the FreeBSD Operating System 5. In USENIX Annual Technical Conference, FREENIX track, June 1998.
[8] C. Kenneth Miller. Multicast Networking and Applications. Addison-Wesley Longman, Inc., 1999.
[9] Vassilis Prevelakis and Angelos Keromytis. Designing an Embedded Firewall/VPN Gateway. In Proceedings of the Third International Network Conference, Plymouth, UK, July 2002.
| 7,836
|
inside_word
|
VAD
|
remove_one_sentence
|
<url>
http://drexel.edu/~/media/Files/cs/techreports/DU-CS-02-05.ashx
</url>
<text>
A Virtual Audio Driver for the Internet Speaker
Ishan Mandrekar
and
Vassilis Prevelakis
Technical Report DU-CS-02-05
Department of Computer Science
Drexel University
Philadelphia, PA 19104
December 2002
A Virtual Audio Driver for the Internet Speaker
Ishan Mandrekar and Vassilis Prevelakis
Computer Science Department
Drexel University
{ishan, [email protected]
Abstract
We have developed the “Internet Speaker” (IS), a network-enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the LAN using multicast packets, and the IS can select any one of them and play it back. A key requirement for the IS is that it must be capable of playing any type of audio stream, independent of the streaming protocol, or the encoding used.
We achieved this by providing a streaming audio server built as a virtual audio device (VAD) in the OpenBSD kernel. The VAD accepts input from any of the existing audio file players, or streaming audio clients. Since all audio applications have to be able to use the system audio driver, our system can accommodate any protocol or file format, provided there exists some compatible player running under OpenBSD.
In this paper we discuss the design and implementation of the server as a VAD, the streaming protocol developed for this application, and the implementation of the client.
Keywords: virtual drivers, OpenBSD, audio, multicast.
1 Introduction
Audio hardware is becoming increasingly common on desktop computers. With the advent of easy to install and cost-effective networking solutions such as Ethernet and more recently, Wireless Local Area Networks, there has been an increasing interest in allowing audio sources to be shared by multiple devices. One central server can stream audio data to a number of clients all part of the same network. The clients just need to capture the streamed data and play it on their audio devices (Figure 1). This concept can work at home, as well as a campus or office LAN where it can be used as the basis for wireless surround audio systems, background music, public announcements, etc.
However, the popularity of audio services in the Internet has resulted in the deployment of a large number of protocols and data formats producing an on-line Babel of mismatched applications and protocols. Moreover, most of the popular streaming services have adopted incompatible and proprietary formats. It is particularly noteworthy that even though Real Networks released the source code for Helix Client, they did not provide source for the RealAudio G2 and RealAudio 8 decoders.\(^1\) In addition to the streaming audio formats, there are also a large number of encoding schemes for file-based audio players (MP3, wav, and so on).
In order to be able to cope with all these formats, users have to use multiple audio playback applications, each with its own user interface and peculiarities.
\(^1\)https://www.helixcommunity.org/2002/intro/client
Moreover, most commercially available streaming servers cannot stream audio files in their native formats. These files need to be “hinted” with metadata which aids the streamer in generating Real Time Protocol (RTP) [3] packets.\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm} This mandates that the audio files undergo a format conversion before they become eligible for streaming.
Our goal was to produce an audio server that would be independent of the format of the audio source. We also endeavored to create a single client that would be able to accept music from any of the above players without the need for specialized plug-ins or updates.
In the next section we discuss the issues surrounding the design of the audio client and the streaming server. We then, describe our prototype implementation which allows the redirection of the output of off-the-shelf audio player applications using a virtual audio driver. Finally, we discuss how our work compares with related projects and systems, and our plans for future enhancements.
## 2 Design
### 2.1 The Server
A typical audio device [7], as shown in Figure 2, consists of two logically independent systems, one for recording, and another for playback. In the recording section, analog input is first passed through a mixer before being fed to an Analog to Digital Converter (ADC), whose output is subsequently stored in a buffer. The audio hardware dictates various configuration parameters such as resolution (8 bits or 16 bits), data formats (linear or $\mu$-law), channels (mono/stereo) and the sampling rate.
The playback section makes use of a similar buffer to hold data that is to be passed to the Digital to Analog Converter (DAC). The output of the DAC is channeled through a mixer before being sent to the speakers. The operating system also provides format conversions to supplement the native features supplied by the hardware.
An audio playback application like mpg321\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm}, works by continuously reading blocks of audio information from the source (file, or network connection), performing some processing and sending the result to the audio device for playback. This is done by writing blocks of data to the audio special device (/dev/audio). This data is placed in the playback buffer. The device driver further divides the playback buffer into smaller size blocks before passing the data to the audio hardware. I/O control (\texttt{ioctl(2)}) calls are used by applications to ask the device driver about the capabilities of the underlying hardware, or to set various parameters for the audio device (e.g. sampling rate).
The audio device driver in the OpenBSD 3.1 kernel is divided into a high level hardware independent layer, and a low level hardware dependent layer. The high-level driver interacts with user-level applications. It provides a uniform application programming interface to the underlying hardware dependent driver modules.
Low-level drivers provide a set of function calls [2] which allow the hardware to be integrated into the runtime environment of the operating system. A device driver does not need to implement all the calls, but at a minimum a useful driver needs to support opening and closing the device, device control and configuration, and I/O calls.
This observation led us to the design of a \textit{virtual} audio driver that replaces the traditional audio driver and associated hardware, sending the audio information to the network (grey box in Figure 2).
#### 2.1.1 The Virtual Audio Driver
Instead of writing a user level application using streaming protocols (e.g. RTP) and CODECs for complex encodings such as MP3 (MPEG Layer 3), we have added a new virtual audio interface (VAD) to the OpenBSD opFigure 3: Application 1 plays audio to the normal audio device, while Application 2 plays to the VAD, which sends the audio data to a remote machine via the network.
The design of the Virtual Audio Driver (VAD) was heavily influenced by the design of the pseudo terminals (\textit{ptys}) that first appeared in BSD 4.2.
The reason for the wide adoption of the \textit{ptys} is that, as far as the application program is concerned, they are indistinguishable from a real terminal. They implement every nuance of the terminal interface even including settings such as the communication speed that are meaningless to a virtual device. This allowed applications (shells, editors, games, etc) to be used on \textit{ptys} without any modification to the programs or to the way they were used.
In a similar manner, we endeavored to produce a virtual audio driver indistinguishable from a real audio device to the application program. The veracity of the emulation is due to the fact that, to the operating system, the VA<cursor_is_here> The VAD responds to the configuration request (probe) at boot time and is thus assigned a minor device number so that application programs can address it.
By using the virtual driver technique, we provide an audio streaming facility that does not depend on the audio application, or the encoding format. Moreover, the music file does not need to be in a special “\textit{hinted}” format unlike the Darwin Streaming Server.\footnote{http://developer.apple.com/darwin/projects/streaming} This enables the VAD server to accommodate new audio encoding formats as long as a player has been ported to OpenBSD.
Another benefit of this approach is that the machine that produces the audio stream (server) does not need to have an audio card and can support multiple instances of the VAD allowing multiple clients to generate separate audio streams.
Each VAD device is bound to a specific multicast address (and port). Once the program opens the VAD device and starts writing to it, the VAD will begin sending packets to the network.
### 2.2 The Client
Our client, which we call “The Internet Speaker” (IS) is a rather simple device, comprising a single board computer (SBC) running an embedded version of OpenBSD, a network connection (preferably wireless), an audio card, and a pair of speakers. The IS receives music from the network and plays it on its speakers. Since Drexel has a campus-wide network, the IS can receive music anywhere within our campus.
Being an embedded device, the IS has limited resources, so it was considered important to standardize the format of the incoming streams. Another constraint is synchronization; if more than one ISs are playing the same channel within earshot, any delay between the two outputs creates cacophony. Finally, since we expect a large number of ISs to be deployed in our campus, we had to minimize the impact of the ISs on the network resources.
These three constraints made the use of an off the shelf player infeasible. We briefly experimented with the Real Time Audio Tool [6] but it did not allow us to convert, for example, Real Audio streams into something the IS could play.
In the end we decided to use multicast packets for the streaming audio with one address per channel. This achieves synchronization between playing ISs and reduces the load on the network. We then “pipe” the output of existing player applications into the network. In this way we do not need to have the players in the ISs but in one or more audio servers. By removing the players we can also standardize the user interface of the ISs. Finally, we redirect the packets received at the ISs to their corresponding audio devices without any post-processing. This reduces the processing power requirements at the ISs and achieves format standardization of the incoming streams.
To avoid burdening the server, we also require that the IS selects which channel to play to, without having to make arrangements with the server.
### 2.3 Protocol Design
The communication protocol between the audio streaming server and the ISs has to be lightweight and easy to implement. On the server side all the protocol is running in kernel space, so a simple design decreases debugging (and kernel reboots). Also, a simple protocol imposes a lesser burden on the resources on the client side, allowing lightweight clients to be used.
Given the real-time nature of the transmissions, and the continuous nature of the audio stream, there is no need for retransmissions or error correction. Incorrect packets are simply discarded. This is acceptable in our target environment which, being a LAN, exhibits low packet loss rates.
Clients may join a transmission at any time and are able to recover from lost packets or transient network problems. This allows the server to be oblivious to the number or type of the clients operating in the network.
Finally, we use multicast packets to reduce network load and synchronize the clients.
### 3 Implementation
#### 3.1 The Streaming Server
When a client application accesses the audio device (via the `open(2)` call), the data flow to the network *via* the VAD. This is done by having the VAD open a kernel UDP socket. The destination address in the socket’s address structure is set to a predefined multicast address and destination port.
Every time data gets written into the play buffer by a user-level application, it is packetized and sent to the network in the following manner: a special control packet containing information to configure the audio device at the client side precedes the transmission of the actual data. The contents of the play buffer are then sent as one or more 1024 byte packets.
The socket is finally closed when the user process terminates the connection with the audio driver.
As we mentioned earlier, the approach we adopted is similar to the use for the Unix pseudo terminals (*ptys*). As in the case of *ptys*, we provide a new low-level driver that looks like a driver for a real audio card. The difference with the *pty* implementation is that pseudo terminals allow the I/O to the *pty* to be directed to another user-level process. Although this technique is more flexible and allows better handling of the audio stream, we decided not to adopt it as it is particularly wasteful in terms of resources. Since the main application of the VAD is the redirection of audio streams to the network, directing the stream to a user-level process which then transmits it to the network would involve superfluous data copying and context switching.
We, therefore, decided to inject the audio byte stream directly into the network as a series of multicast packets. This allows the VAD to construct the packets and forward them to the networking code entirely within the kernel. This minimizes copying and sends the packets without another context switch.
In our current prototype, the multicast address is defined during kernel generation, but in future releases we will allow this to be defined via an `ioctl(2)` or a `sysctl(8)` call. We envisage an interface similar to the `ifconfig(8)` call that allows the address and various parameters to be defined as well as enabling, or disabling the device.
Synchronising the audio output of two devices is not as simple as ensuring that we send the audio data to both devices at the same time. Variations in the routing topology (e.g. different number of hops between the server and the various receivers), Operating System actions (e.g interrupt processing, scheduling the client process, etc.) may result in loss of synchronization. The human ear is sensitive to the resulting phase differences, so we were careful to create an operational environment where such conditions are unlikely to occur.
We have standardized the configuration of the clients (hardware, operating system, applications), and our network topology follows a logical design where machines in the same area are normally connected to the same Ethernet segment. The only case where this is violated, is where we have wireless clients next to a client connected to the wired LAN.
### 3.2 The Client-Server Protocol
The client must select a multicast stream and then start playing the audio. The design of the protocol is such that the client never contacts the server. We achieve this by interspersing control packets between the normal data packets. The control packets (Figure 4) contain sufficient information (sampling rate, bit precision, encoding, channels etc.) for the client to configure its own audio hardware so that it can process the data sent by the server. The data in the ordinary packets is sent directly to the audio device via the standard interface (/dev/audio).
| CTRL | SAMPLING RATE | ENCODING | PRECISION | CHANNELS |
|------|---------------|----------|-----------|----------|
**Figure 4: Control Packet**
Multimedia streaming servers make use of the RTP control protocol (RTCP) to obtain feedback on the quality of data distribution. The protocol consists of periodically transmitting control packets (sender and receiver reports) to all participants in the session, using the same distribution mechanism as the data packets. This feedback may be directly useful to the server for control of adaptive encoding schemes, or alternatively may be used to diagnose faults in the distribution. Sending reception feedback reports to all participants helps in analyzing whether problems are local or global.
The VAD server transmits the audio data in its raw (uncompressed) form over a relatively benign LAN environment, where network resources are plentiful. This does not justify incurring the extra overhead that feedback entails, given that the probability of congestion, or other network problems is low in a LAN. Also, the feedback traffic imposes a burden on the server.
Clients can join or leave the multicast groups anytime without notifying the server. The server remains oblivious of the number of clients “tuned in”, and its performance does not degrade as the number of the client increases. This makes the application very scalable and it can be used across campus or office networks.
### 3.3 The Audio Client
We have constructed a sample client that receives packets from the network and plays them back via the local audio device. The client is a simple program that is designed to run on a variety of platforms (our current implementation runs under OpenBSD and RedHat Linux 7.3). By far, what makes this client portable is the fact that it only has to deal with a simple protocol and a single audio encoding scheme. We expect to be able to support most popular platforms within the next couple of months.
We make use of the multicast API of the pnet6 [1] library to obtain membership of the multicast group that the server is transmitting to. The client program takes two command line arguments, namely the IP address of the multicast group and the destination port number that the server is transmitting to. It then creates a UDP socket and executes a JOIN command. If the join is successful, the client becomes a member of the multicast group and can now start receiving all the traffic destined to the group.
An important prerequisite for this to work is that the network infrastructure supports the IGMP protocol for multicast group management. [8] Ethernet networks support this protocol by default, however, when the network includes routers, they need to be appropriately configured. We believe that within a private network, multicasting has more chances of establishing itself, than in the Internet at large.
The client executes a call-back routine every time it receives a packet. If the received packet is a control packet, the audio parameters are configured else the packet is written to the audio device. To differentiate between audio streams with varying parameters, the client compares the configuration parameters in every control packet to
the parameters which have been previously used to setup the audio device. If there is a mismatch, it invokes the configuration setup routine before sending data to the device.
The client can be terminated at any time, by sending an interrupt signal to the running process. The interrupt handler closes all open file and socket descriptors and terminates the process.
Since the client receives raw data using the native encoding of the audio driver from the network, there is no decompression or decoding overhead incurred, thereby minimizing the load on the client. This also makes the client code extremely simple and concise since all it has to do now is to send the received data to the audio device. Thus the client can be easily ported to a variety of UNIX platforms which have a similar audio device interface. The low computing requirements make future ports of the client to hand-held devices a viable option.
The client application runs in the Internet Speaker, an embedded platform for audio playback over the LAN. The IS is a single board computer with a Pentium class CPU and 64Mb of RAM. The computer also includes a 4Mb flash memory as a boot medium, a PCMCIA slot for the network interface, and an audio card. The device boots a kernel that contains a RAM disk with the root partition and downloads its configuration from the network.
The design of the IS borrows a lot from development carried out as part of the embedded VPN gateway [9] project which used a similar embedded design for a combined Firewall and Virtual Private Network gateway.
Channel selection is currently handled by a number of pushbuttons on the front panel of the machine. The interface attempts to mimic the pre-set buttons on car radios. The IS monitors a number of “well known” multicast addresses for audio information and identifies the push-buttons that are associated with active audio streams. The user presses one of the these “active” buttons and the IS begins to playback the appropriate audio stream.
This interface is rather limited and we plan to augment it by advertising available programs on a separate multicast channel. This information can include the name of the song being played and the multicast address of the channel. The user will then be able to select the desired audio track by touching the name of the channel on a touch-sensitive screen.
### 4 Evaluation
The format used by the server for the audio data is essentially the raw data that are sent to the audio device. This is usually an uncompressed stream in one of the encodings supported by the virtual audio device. This creates a rather sizable stream.
To calculate a lower bound on the stream size (assuming no compression and current audio encoding formats) let us consider a CD quality audio source. This generates 44100 16 bit samples per second in two channels. We, therefore, have:
\[
44100 \times 2 \times 16 \text{ bits} = 1.4 \text{ Mbps}
\]
This is just for the audio data, without counting the protocol overhead or the control packets. To calculate the actual bit-rate we played an MP3 audio file on the server that was 4582086 bytes long.
On the client we received a total of 70846 packets, of which 14231 were control packets. Most of the data packets were of the maximum size allowed by the protocol. The rest were partial, since playback buffers vary in size. The total amount of audio data received by the client was 50769054 bytes and the playback lasted 286 seconds.
The control packets were 71 bytes long while data packets had a protocol and framing overhead of 46 bytes. This gives:
\[
(((56615 \times 46) + 50769054 + (14231 \times 71)) \times 8)/286 = 1.52 \text{ Mbps}
\]
Notice that if we send the compressed file, we will achieve about one order of magnitude reduction in the bit-rate.
Due to the use of multicasting, the network load is the same regardless of the number of clients listening in on the transmissions. Similarly, if no one is listening on a transmission, the bandwidth is wasted.
In a Fast Ethernet network such a stream consumes about 1.5% of the available bandwidth, so a small number of such streams (less than 10) would not adversely effect the operation of the network.
However, by utilizing even a trivial audio compression algorithm the bit-rate can be drastically reduced without any appreciable loss in quality. The compression is done by the server on a per-stream basis, so the incremental overhead of the compression is not significant.
On the client the costs are proportionately small, since audio processing imposes a very small computational burden. The client is assumed to have a less capable processor, and it only needs to decompress a single stream (the one that its playing), so we do not anticipate problems in that area either. We hope to have compression implemented in the next release of our streaming server and client.
Adding a simple compression scheme probably exhausts the limits of the current kernel-based design. Additional enhancements will have to be performed outside the kernel, necessitating the redirection of the audio stream to another user-level process. This is likely to increase the load to the server because of the additional context switch overhead and the copying of all this data between user and kernel space. We hope to be able to provide this functionality in a future release so that we can measure the performance hit and evaluate it against the expected benefits.
Another area of concern is that GUI-based players cannot be run in unattended mode. We currently do not have a fully satisfactory response to this problem, but we believe that as software manufactures modify their user interfaces to accommodate persons with disabilities they will provide the hooks to automate control of their applications.
5 Related Work
SHOUTcast\(^4\) is a MPEG Layer 3 based streaming server technology. It permits anyone to broadcast audio content from their PC to listeners across the Internet or any other IP based network. It is capable of streaming live audio as well as on-demand archived broadcasts.
Listeners tune in to SHOUTcast broadcasts by using a player capable of streaming MP3 audio e.g. Winamp for Windows, XMMS for Linux etc. Broadcasters use Winamp along with a special plug-in called SHOUTcast source to redirect Winamp’s output to the SHOUTcast server. The streaming is done by the SHOUTcast Distributed Network Audio Server (DNAS). All MP3 files inside the content folder are streamable. The server can maintain a web interface for users to selectively play its streamable content.
Since the broadcasters need to use Winamp with the SHOUTcast source plug-in, they are limited to the formats supported by Winamp. Also it is not clear whether the system supports multiple concurrent Winamp server sessions on the same machine. Moreover, the server is designed to support outbound audio transitions (from the LAN to the outside) and thus does not support multicasting. Finally, the server is tied to the Windows platform.
The Helix Universal Server from RealNetworks is a universal platform server with support for live and on-demand delivery of all major file formats including Real Media, Windows Media, QuickTime, MPEG4, MP3 and more. It is both scalable and bandwidth conserving as it comes integrated with a content networking system, specifically designed to provision live and on-demand content. It also includes server fail-over capabilities which route client requests to backup servers in the event of failure or unexpected outages.
A similar application to the VAD is the Multicast File Transfer Protocol [4] (MFTP) from StarBurst Communications. MFTP is designed to provide efficient and reliable file delivery from a single sender to multiple receivers.
The concern that messages sent by clients participating in a multicast, can flood the server is mentioned in the Multicast FTP draft RFC.[4] Under the MFTP protocol, after a file is multicast, clients contact the server to get missing or corrupted blocks of the file. MFTP aggregates these requests (NAKs) from each recipient, so that one NAK can represent multiple bad or dropped packets. The VAD design acknowledging that a small number of discarded packets is acceptable for audio transmissions, allows the clients to ignore bad, or lost packets.
MFTP also uses a separate multicast group to announce the availability of data sets on other multicast groups. This gives the clients a chance to choose whether to participate in an MFTP transfer. This is a very interesting idea in that the client does not need to listen-in on channels that are of no interest to it. We plan to adopt this approach in the next release of our streaming audio server, for the announcement of information about the audio streams that are being transmitted via the network. In this way the user can see which programs are being multicast, rather than having to switch channels to monitor the audio transmissions.
\(^4\)http://www.shoutcast.com/support/docs/
Another benefit from the use of this out-of-band catalog, is that it enables the server to suspend transmission of a particular channel, if it notices that there are no listeners. This notification may be handled through the use of the proposed MSNIP standard [5]. MSNIP allows the audio server to contact the first hop routers asking whether there are listeners on the other side. This allows the server to receive overall status information without running the risk of suffering the “NAK implosion” problem mentioned earlier. Unfortunately, we have to wait until the MSNIP appears in the software distributions running on our campus routers.
6 Conclusions
Our motivation for doing this work was that we felt that existing audio players presented an inferior compromise between interoperability and reliability. In a LAN environment, there is no need for elaborate mechanisms for adapting to network problems. On the other hand the need for multiple connections to remote audio servers increases the load on the external connection points of the network and the work that has to be performed by firewalls, routers etc. Finally, the large number of special purpose audio players (each compatible with a different subset of available formats), alienates users and creates support and administrative headaches.
By implementing the audio streaming server as a virtual device on the system running the decoding applications, we have bypassed the compatibility issues that haunt any general-purpose audio player. Our system confines the special-purpose audio players to a few servers that multicast the audio data always using the same common format.
The existence of a single internal protocol without special cases or the need for additional development to support new formats, allowed the creation of the “Internet Speaker” an embedded device that plays audio streams received from the network. The communications protocol also allows any client to “tune” -in or -out of a transmission, without requiring the knowledge or cooperation of the server. The protocol also provides synchronization between clients broadcasting the same audio stream.
References
[1] Libpnet6. An Advanced Networking Library. http://pnet6.sourceforge.net/.
[2] Writing a pseudo device, NetBSD Documentation. http://www.netbsd.org/Documentation/kernel/pseudo.
[3] H. Schulzrinne et all. RTP: A Transport Protocol for Real-Time Applications. RFC: 1889.
[4] K. Miller et all. StarBurst multicast file transfer protocol (MFTP) specification. Internet Draft, Internet Engineering Task Force, April 1998.
[5] Bill Fenner, Brian Haberman, Hugh Holbrook, and Isidor Kouvelas. Multicast Source Notification of Interest Protocol (MSNIP). draft-ietf-magma-msnip-01.txt, November 2002.
[6] I. Kouvelas and V. Hardman. Overcoming Workstation Problems in a Real-Time Audio Tool. In USENIX Annual Technical Conference, January 1997.
[7] James S. Lowe and Luigi Rizzio. Multimedia Driver Support in the FreeBSD Operating System 5. In USENIX Annual Technical Conference, FREENIX track, June 1998.
[8] C. Kenneth Miller. Multicast Networking and Applications. Addison-Wesley Longman, Inc., 1999.
[9] Vassilis Prevelakis and Angelos Keromytis. Designing an Embedded Firewall/VPN Gateway. In Proceedings of the Third International Network Conference, Plymouth, UK, July 2002.
</text>
|
[
{
"content": "<url>\nhttp://drexel.edu/~/media/Files/cs/techreports/DU-CS-02-05.ashx\n</url>\n<text>\nA Virtual Audio Driver for the Internet Speaker\n\nIshan Mandrekar\nand\nVassilis Prevelakis\n\nTechnical Report DU-CS-02-05\nDepartment of Computer Science\nDrexel University\nPhiladelphia, PA 19104\nDecember 2002\n\nA Virtual Audio Driver for the Internet Speaker\n\nIshan Mandrekar and Vassilis Prevelakis\n\nComputer Science Department\nDrexel University\n{ishan, [email protected]\n\nAbstract\n\nWe have developed the “Internet Speaker” (IS), a network-enabled single board computer embedded into a conventional audio speaker. Audio streams are transmitted in the LAN using multicast packets, and the IS can select any one of them and play it back. A key requirement for the IS is that it must be capable of playing any type of audio stream, independent of the streaming protocol, or the encoding used.\n\nWe achieved this by providing a streaming audio server built as a virtual audio device (VAD) in the OpenBSD kernel. The VAD accepts input from any of the existing audio file players, or streaming audio clients. Since all audio applications have to be able to use the system audio driver, our system can accommodate any protocol or file format, provided there exists some compatible player running under OpenBSD.\n\nIn this paper we discuss the design and implementation of the server as a VAD, the streaming protocol developed for this application, and the implementation of the client.\n\nKeywords: virtual drivers, OpenBSD, audio, multicast.\n\n1 Introduction\n\nAudio hardware is becoming increasingly common on desktop computers. With the advent of easy to install and cost-effective networking solutions such as Ethernet and more recently, Wireless Local Area Networks, there has been an increasing interest in allowing audio sources to be shared by multiple devices. One central server can stream audio data to a number of clients all part of the same network. The clients just need to capture the streamed data and play it on their audio devices (Figure 1). This concept can work at home, as well as a campus or office LAN where it can be used as the basis for wireless surround audio systems, background music, public announcements, etc.\n\nHowever, the popularity of audio services in the Internet has resulted in the deployment of a large number of protocols and data formats producing an on-line Babel of mismatched applications and protocols. Moreover, most of the popular streaming services have adopted incompatible and proprietary formats. It is particularly noteworthy that even though Real Networks released the source code for Helix Client, they did not provide source for the RealAudio G2 and RealAudio 8 decoders.\\(^1\\) In addition to the streaming audio formats, there are also a large number of encoding schemes for file-based audio players (MP3, wav, and so on).\n\nIn order to be able to cope with all these formats, users have to use multiple audio playback applications, each with its own user interface and peculiarities.\n\n\\(^1\\)https://www.helixcommunity.org/2002/intro/client\n\nMoreover, most commercially available streaming servers cannot stream audio files in their native formats. These files need to be “hinted” with metadata which aids the streamer in generating Real Time Protocol (RTP) [3] packets.\\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm} This mandates that the audio files undergo a format conversion before they become eligible for streaming.\n\nOur goal was to produce an audio server that would be independent of the format of the audio source. We also endeavored to create a single client that would be able to accept music from any of the above players without the need for specialized plug-ins or updates.\n\nIn the next section we discuss the issues surrounding the design of the audio client and the streaming server. We then, describe our prototype implementation which allows the redirection of the output of off-the-shelf audio player applications using a virtual audio driver. Finally, we discuss how our work compares with related projects and systems, and our plans for future enhancements.\n\n## 2 Design\n\n### 2.1 The Server\n\nA typical audio device [7], as shown in Figure 2, consists of two logically independent systems, one for recording, and another for playback. In the recording section, analog input is first passed through a mixer before being fed to an Analog to Digital Converter (ADC), whose output is subsequently stored in a buffer. The audio hardware dictates various configuration parameters such as resolution (8 bits or 16 bits), data formats (linear or $\\mu$-law), channels (mono/stereo) and the sampling rate.\n\nThe playback section makes use of a similar buffer to hold data that is to be passed to the Digital to Analog Converter (DAC). The output of the DAC is channeled through a mixer before being sent to the speakers. The operating system also provides format conversions to supplement the native features supplied by the hardware.\n\nAn audio playback application like mpg321\\footnote{http://developer.apple.com/techpubs/quicktime/qtdevdocs/RM/framestet2.htm}, works by continuously reading blocks of audio information from the source (file, or network connection), performing some processing and sending the result to the audio device for playback. This is done by writing blocks of data to the audio special device (/dev/audio). This data is placed in the playback buffer. The device driver further divides the playback buffer into smaller size blocks before passing the data to the audio hardware. I/O control (\\texttt{ioctl(2)}) calls are used by applications to ask the device driver about the capabilities of the underlying hardware, or to set various parameters for the audio device (e.g. sampling rate).\n\nThe audio device driver in the OpenBSD 3.1 kernel is divided into a high level hardware independent layer, and a low level hardware dependent layer. The high-level driver interacts with user-level applications. It provides a uniform application programming interface to the underlying hardware dependent driver modules.\n\nLow-level drivers provide a set of function calls [2] which allow the hardware to be integrated into the runtime environment of the operating system. A device driver does not need to implement all the calls, but at a minimum a useful driver needs to support opening and closing the device, device control and configuration, and I/O calls.\n\nThis observation led us to the design of a \\textit{virtual} audio driver that replaces the traditional audio driver and associated hardware, sending the audio information to the network (grey box in Figure 2).\n\n#### 2.1.1 The Virtual Audio Driver\n\nInstead of writing a user level application using streaming protocols (e.g. RTP) and CODECs for complex encodings such as MP3 (MPEG Layer 3), we have added a new virtual audio interface (VAD) to the OpenBSD opFigure 3: Application 1 plays audio to the normal audio device, while Application 2 plays to the VAD, which sends the audio data to a remote machine via the network.\n\nThe design of the Virtual Audio Driver (VAD) was heavily influenced by the design of the pseudo terminals (\\textit{ptys}) that first appeared in BSD 4.2.\n\nThe reason for the wide adoption of the \\textit{ptys} is that, as far as the application program is concerned, they are indistinguishable from a real terminal. They implement every nuance of the terminal interface even including settings such as the communication speed that are meaningless to a virtual device. This allowed applications (shells, editors, games, etc) to be used on \\textit{ptys} without any modification to the programs or to the way they were used.\n\nIn a similar manner, we endeavored to produce a virtual audio driver indistinguishable from a real audio device to the application program. The veracity of the emulation is due to the fact that, to the operating system, the VA<cursor_is_here> The VAD responds to the configuration request (probe) at boot time and is thus assigned a minor device number so that application programs can address it.\n\nBy using the virtual driver technique, we provide an audio streaming facility that does not depend on the audio application, or the encoding format. Moreover, the music file does not need to be in a special “\\textit{hinted}” format unlike the Darwin Streaming Server.\\footnote{http://developer.apple.com/darwin/projects/streaming} This enables the VAD server to accommodate new audio encoding formats as long as a player has been ported to OpenBSD.\n\nAnother benefit of this approach is that the machine that produces the audio stream (server) does not need to have an audio card and can support multiple instances of the VAD allowing multiple clients to generate separate audio streams.\n\nEach VAD device is bound to a specific multicast address (and port). Once the program opens the VAD device and starts writing to it, the VAD will begin sending packets to the network.\n\n### 2.2 The Client\n\nOur client, which we call “The Internet Speaker” (IS) is a rather simple device, comprising a single board computer (SBC) running an embedded version of OpenBSD, a network connection (preferably wireless), an audio card, and a pair of speakers. The IS receives music from the network and plays it on its speakers. Since Drexel has a campus-wide network, the IS can receive music anywhere within our campus.\n\nBeing an embedded device, the IS has limited resources, so it was considered important to standardize the format of the incoming streams. Another constraint is synchronization; if more than one ISs are playing the same channel within earshot, any delay between the two outputs creates cacophony. Finally, since we expect a large number of ISs to be deployed in our campus, we had to minimize the impact of the ISs on the network resources.\n\nThese three constraints made the use of an off the shelf player infeasible. We briefly experimented with the Real Time Audio Tool [6] but it did not allow us to convert, for example, Real Audio streams into something the IS could play.\n\nIn the end we decided to use multicast packets for the streaming audio with one address per channel. This achieves synchronization between playing ISs and reduces the load on the network. We then “pipe” the output of existing player applications into the network. In this way we do not need to have the players in the ISs but in one or more audio servers. By removing the players we can also standardize the user interface of the ISs. Finally, we redirect the packets received at the ISs to their corresponding audio devices without any post-processing. This reduces the processing power requirements at the ISs and achieves format standardization of the incoming streams.\n\nTo avoid burdening the server, we also require that the IS selects which channel to play to, without having to make arrangements with the server.\n\n### 2.3 Protocol Design\n\nThe communication protocol between the audio streaming server and the ISs has to be lightweight and easy to implement. On the server side all the protocol is running in kernel space, so a simple design decreases debugging (and kernel reboots). Also, a simple protocol imposes a lesser burden on the resources on the client side, allowing lightweight clients to be used.\n\nGiven the real-time nature of the transmissions, and the continuous nature of the audio stream, there is no need for retransmissions or error correction. Incorrect packets are simply discarded. This is acceptable in our target environment which, being a LAN, exhibits low packet loss rates.\n\nClients may join a transmission at any time and are able to recover from lost packets or transient network problems. This allows the server to be oblivious to the number or type of the clients operating in the network.\n\nFinally, we use multicast packets to reduce network load and synchronize the clients.\n\n### 3 Implementation\n\n#### 3.1 The Streaming Server\n\nWhen a client application accesses the audio device (via the `open(2)` call), the data flow to the network *via* the VAD. This is done by having the VAD open a kernel UDP socket. The destination address in the socket’s address structure is set to a predefined multicast address and destination port.\n\nEvery time data gets written into the play buffer by a user-level application, it is packetized and sent to the network in the following manner: a special control packet containing information to configure the audio device at the client side precedes the transmission of the actual data. The contents of the play buffer are then sent as one or more 1024 byte packets.\n\nThe socket is finally closed when the user process terminates the connection with the audio driver.\n\nAs we mentioned earlier, the approach we adopted is similar to the use for the Unix pseudo terminals (*ptys*). As in the case of *ptys*, we provide a new low-level driver that looks like a driver for a real audio card. The difference with the *pty* implementation is that pseudo terminals allow the I/O to the *pty* to be directed to another user-level process. Although this technique is more flexible and allows better handling of the audio stream, we decided not to adopt it as it is particularly wasteful in terms of resources. Since the main application of the VAD is the redirection of audio streams to the network, directing the stream to a user-level process which then transmits it to the network would involve superfluous data copying and context switching.\n\nWe, therefore, decided to inject the audio byte stream directly into the network as a series of multicast packets. This allows the VAD to construct the packets and forward them to the networking code entirely within the kernel. This minimizes copying and sends the packets without another context switch.\n\nIn our current prototype, the multicast address is defined during kernel generation, but in future releases we will allow this to be defined via an `ioctl(2)` or a `sysctl(8)` call. We envisage an interface similar to the `ifconfig(8)` call that allows the address and various parameters to be defined as well as enabling, or disabling the device.\n\nSynchronising the audio output of two devices is not as simple as ensuring that we send the audio data to both devices at the same time. Variations in the routing topology (e.g. different number of hops between the server and the various receivers), Operating System actions (e.g interrupt processing, scheduling the client process, etc.) may result in loss of synchronization. The human ear is sensitive to the resulting phase differences, so we were careful to create an operational environment where such conditions are unlikely to occur.\n\nWe have standardized the configuration of the clients (hardware, operating system, applications), and our network topology follows a logical design where machines in the same area are normally connected to the same Ethernet segment. The only case where this is violated, is where we have wireless clients next to a client connected to the wired LAN.\n\n### 3.2 The Client-Server Protocol\n\nThe client must select a multicast stream and then start playing the audio. The design of the protocol is such that the client never contacts the server. We achieve this by interspersing control packets between the normal data packets. The control packets (Figure 4) contain sufficient information (sampling rate, bit precision, encoding, channels etc.) for the client to configure its own audio hardware so that it can process the data sent by the server. The data in the ordinary packets is sent directly to the audio device via the standard interface (/dev/audio).\n\n| CTRL | SAMPLING RATE | ENCODING | PRECISION | CHANNELS |\n|------|---------------|----------|-----------|----------|\n\n**Figure 4: Control Packet**\n\nMultimedia streaming servers make use of the RTP control protocol (RTCP) to obtain feedback on the quality of data distribution. The protocol consists of periodically transmitting control packets (sender and receiver reports) to all participants in the session, using the same distribution mechanism as the data packets. This feedback may be directly useful to the server for control of adaptive encoding schemes, or alternatively may be used to diagnose faults in the distribution. Sending reception feedback reports to all participants helps in analyzing whether problems are local or global.\n\nThe VAD server transmits the audio data in its raw (uncompressed) form over a relatively benign LAN environment, where network resources are plentiful. This does not justify incurring the extra overhead that feedback entails, given that the probability of congestion, or other network problems is low in a LAN. Also, the feedback traffic imposes a burden on the server.\n\nClients can join or leave the multicast groups anytime without notifying the server. The server remains oblivious of the number of clients “tuned in”, and its performance does not degrade as the number of the client increases. This makes the application very scalable and it can be used across campus or office networks.\n\n### 3.3 The Audio Client\n\nWe have constructed a sample client that receives packets from the network and plays them back via the local audio device. The client is a simple program that is designed to run on a variety of platforms (our current implementation runs under OpenBSD and RedHat Linux 7.3). By far, what makes this client portable is the fact that it only has to deal with a simple protocol and a single audio encoding scheme. We expect to be able to support most popular platforms within the next couple of months.\n\nWe make use of the multicast API of the pnet6 [1] library to obtain membership of the multicast group that the server is transmitting to. The client program takes two command line arguments, namely the IP address of the multicast group and the destination port number that the server is transmitting to. It then creates a UDP socket and executes a JOIN command. If the join is successful, the client becomes a member of the multicast group and can now start receiving all the traffic destined to the group.\n\nAn important prerequisite for this to work is that the network infrastructure supports the IGMP protocol for multicast group management. [8] Ethernet networks support this protocol by default, however, when the network includes routers, they need to be appropriately configured. We believe that within a private network, multicasting has more chances of establishing itself, than in the Internet at large.\n\nThe client executes a call-back routine every time it receives a packet. If the received packet is a control packet, the audio parameters are configured else the packet is written to the audio device. To differentiate between audio streams with varying parameters, the client compares the configuration parameters in every control packet to\n\nthe parameters which have been previously used to setup the audio device. If there is a mismatch, it invokes the configuration setup routine before sending data to the device.\n\nThe client can be terminated at any time, by sending an interrupt signal to the running process. The interrupt handler closes all open file and socket descriptors and terminates the process.\n\nSince the client receives raw data using the native encoding of the audio driver from the network, there is no decompression or decoding overhead incurred, thereby minimizing the load on the client. This also makes the client code extremely simple and concise since all it has to do now is to send the received data to the audio device. Thus the client can be easily ported to a variety of UNIX platforms which have a similar audio device interface. The low computing requirements make future ports of the client to hand-held devices a viable option.\n\nThe client application runs in the Internet Speaker, an embedded platform for audio playback over the LAN. The IS is a single board computer with a Pentium class CPU and 64Mb of RAM. The computer also includes a 4Mb flash memory as a boot medium, a PCMCIA slot for the network interface, and an audio card. The device boots a kernel that contains a RAM disk with the root partition and downloads its configuration from the network.\n\nThe design of the IS borrows a lot from development carried out as part of the embedded VPN gateway [9] project which used a similar embedded design for a combined Firewall and Virtual Private Network gateway.\n\nChannel selection is currently handled by a number of pushbuttons on the front panel of the machine. The interface attempts to mimic the pre-set buttons on car radios. The IS monitors a number of “well known” multicast addresses for audio information and identifies the push-buttons that are associated with active audio streams. The user presses one of the these “active” buttons and the IS begins to playback the appropriate audio stream.\n\nThis interface is rather limited and we plan to augment it by advertising available programs on a separate multicast channel. This information can include the name of the song being played and the multicast address of the channel. The user will then be able to select the desired audio track by touching the name of the channel on a touch-sensitive screen.\n\n### 4 Evaluation\n\nThe format used by the server for the audio data is essentially the raw data that are sent to the audio device. This is usually an uncompressed stream in one of the encodings supported by the virtual audio device. This creates a rather sizable stream.\n\nTo calculate a lower bound on the stream size (assuming no compression and current audio encoding formats) let us consider a CD quality audio source. This generates 44100 16 bit samples per second in two channels. We, therefore, have:\n\n\\[\n44100 \\times 2 \\times 16 \\text{ bits} = 1.4 \\text{ Mbps}\n\\]\n\nThis is just for the audio data, without counting the protocol overhead or the control packets. To calculate the actual bit-rate we played an MP3 audio file on the server that was 4582086 bytes long.\n\nOn the client we received a total of 70846 packets, of which 14231 were control packets. Most of the data packets were of the maximum size allowed by the protocol. The rest were partial, since playback buffers vary in size. The total amount of audio data received by the client was 50769054 bytes and the playback lasted 286 seconds.\n\nThe control packets were 71 bytes long while data packets had a protocol and framing overhead of 46 bytes. This gives:\n\n\\[\n(((56615 \\times 46) + 50769054 + (14231 \\times 71)) \\times 8)/286 = 1.52 \\text{ Mbps}\n\\]\n\nNotice that if we send the compressed file, we will achieve about one order of magnitude reduction in the bit-rate.\n\nDue to the use of multicasting, the network load is the same regardless of the number of clients listening in on the transmissions. Similarly, if no one is listening on a transmission, the bandwidth is wasted.\n\nIn a Fast Ethernet network such a stream consumes about 1.5% of the available bandwidth, so a small number of such streams (less than 10) would not adversely effect the operation of the network.\n\nHowever, by utilizing even a trivial audio compression algorithm the bit-rate can be drastically reduced without any appreciable loss in quality. The compression is done by the server on a per-stream basis, so the incremental overhead of the compression is not significant.\n\nOn the client the costs are proportionately small, since audio processing imposes a very small computational burden. The client is assumed to have a less capable processor, and it only needs to decompress a single stream (the one that its playing), so we do not anticipate problems in that area either. We hope to have compression implemented in the next release of our streaming server and client.\n\nAdding a simple compression scheme probably exhausts the limits of the current kernel-based design. Additional enhancements will have to be performed outside the kernel, necessitating the redirection of the audio stream to another user-level process. This is likely to increase the load to the server because of the additional context switch overhead and the copying of all this data between user and kernel space. We hope to be able to provide this functionality in a future release so that we can measure the performance hit and evaluate it against the expected benefits.\n\nAnother area of concern is that GUI-based players cannot be run in unattended mode. We currently do not have a fully satisfactory response to this problem, but we believe that as software manufactures modify their user interfaces to accommodate persons with disabilities they will provide the hooks to automate control of their applications.\n\n5 Related Work\n\nSHOUTcast\\(^4\\) is a MPEG Layer 3 based streaming server technology. It permits anyone to broadcast audio content from their PC to listeners across the Internet or any other IP based network. It is capable of streaming live audio as well as on-demand archived broadcasts.\n\nListeners tune in to SHOUTcast broadcasts by using a player capable of streaming MP3 audio e.g. Winamp for Windows, XMMS for Linux etc. Broadcasters use Winamp along with a special plug-in called SHOUTcast source to redirect Winamp’s output to the SHOUTcast server. The streaming is done by the SHOUTcast Distributed Network Audio Server (DNAS). All MP3 files inside the content folder are streamable. The server can maintain a web interface for users to selectively play its streamable content.\n\nSince the broadcasters need to use Winamp with the SHOUTcast source plug-in, they are limited to the formats supported by Winamp. Also it is not clear whether the system supports multiple concurrent Winamp server sessions on the same machine. Moreover, the server is designed to support outbound audio transitions (from the LAN to the outside) and thus does not support multicasting. Finally, the server is tied to the Windows platform.\n\nThe Helix Universal Server from RealNetworks is a universal platform server with support for live and on-demand delivery of all major file formats including Real Media, Windows Media, QuickTime, MPEG4, MP3 and more. It is both scalable and bandwidth conserving as it comes integrated with a content networking system, specifically designed to provision live and on-demand content. It also includes server fail-over capabilities which route client requests to backup servers in the event of failure or unexpected outages.\n\nA similar application to the VAD is the Multicast File Transfer Protocol [4] (MFTP) from StarBurst Communications. MFTP is designed to provide efficient and reliable file delivery from a single sender to multiple receivers.\n\nThe concern that messages sent by clients participating in a multicast, can flood the server is mentioned in the Multicast FTP draft RFC.[4] Under the MFTP protocol, after a file is multicast, clients contact the server to get missing or corrupted blocks of the file. MFTP aggregates these requests (NAKs) from each recipient, so that one NAK can represent multiple bad or dropped packets. The VAD design acknowledging that a small number of discarded packets is acceptable for audio transmissions, allows the clients to ignore bad, or lost packets.\n\nMFTP also uses a separate multicast group to announce the availability of data sets on other multicast groups. This gives the clients a chance to choose whether to participate in an MFTP transfer. This is a very interesting idea in that the client does not need to listen-in on channels that are of no interest to it. We plan to adopt this approach in the next release of our streaming audio server, for the announcement of information about the audio streams that are being transmitted via the network. In this way the user can see which programs are being multicast, rather than having to switch channels to monitor the audio transmissions.\n\n\\(^4\\)http://www.shoutcast.com/support/docs/\n\nAnother benefit from the use of this out-of-band catalog, is that it enables the server to suspend transmission of a particular channel, if it notices that there are no listeners. This notification may be handled through the use of the proposed MSNIP standard [5]. MSNIP allows the audio server to contact the first hop routers asking whether there are listeners on the other side. This allows the server to receive overall status information without running the risk of suffering the “NAK implosion” problem mentioned earlier. Unfortunately, we have to wait until the MSNIP appears in the software distributions running on our campus routers.\n\n6 Conclusions\n\nOur motivation for doing this work was that we felt that existing audio players presented an inferior compromise between interoperability and reliability. In a LAN environment, there is no need for elaborate mechanisms for adapting to network problems. On the other hand the need for multiple connections to remote audio servers increases the load on the external connection points of the network and the work that has to be performed by firewalls, routers etc. Finally, the large number of special purpose audio players (each compatible with a different subset of available formats), alienates users and creates support and administrative headaches.\n\nBy implementing the audio streaming server as a virtual device on the system running the decoding applications, we have bypassed the compatibility issues that haunt any general-purpose audio player. Our system confines the special-purpose audio players to a few servers that multicast the audio data always using the same common format.\n\nThe existence of a single internal protocol without special cases or the need for additional development to support new formats, allowed the creation of the “Internet Speaker” an embedded device that plays audio streams received from the network. The communications protocol also allows any client to “tune” -in or -out of a transmission, without requiring the knowledge or cooperation of the server. The protocol also provides synchronization between clients broadcasting the same audio stream.\n\nReferences\n\n[1] Libpnet6. An Advanced Networking Library. http://pnet6.sourceforge.net/.\n\n[2] Writing a pseudo device, NetBSD Documentation. http://www.netbsd.org/Documentation/kernel/pseudo.\n\n[3] H. Schulzrinne et all. RTP: A Transport Protocol for Real-Time Applications. RFC: 1889.\n\n[4] K. Miller et all. StarBurst multicast file transfer protocol (MFTP) specification. Internet Draft, Internet Engineering Task Force, April 1998.\n\n[5] Bill Fenner, Brian Haberman, Hugh Holbrook, and Isidor Kouvelas. Multicast Source Notification of Interest Protocol (MSNIP). draft-ietf-magma-msnip-01.txt, November 2002.\n\n[6] I. Kouvelas and V. Hardman. Overcoming Workstation Problems in a Real-Time Audio Tool. In USENIX Annual Technical Conference, January 1997.\n\n[7] James S. Lowe and Luigi Rizzio. Multimedia Driver Support in the FreeBSD Operating System 5. In USENIX Annual Technical Conference, FREENIX track, June 1998.\n\n[8] C. Kenneth Miller. Multicast Networking and Applications. Addison-Wesley Longman, Inc., 1999.\n\n[9] Vassilis Prevelakis and Angelos Keromytis. Designing an Embedded Firewall/VPN Gateway. In Proceedings of the Third International Network Conference, Plymouth, UK, July 2002.\n</text>\n",
"role": "user"
},
{
"content": "D looks like the driver of a real audio device (Figure 3).",
"role": "assistant"
}
] |
Oracle Beginning Pl Sql From Novice To Professional Experts Voice In Oracle
If you ally infatuation such a referred beginning pl sql from novice to professional experts voice in oracle books that will meet the expense of you worth, get the unquestionably best seller from us currently from several preferred authors. If you desire to humorous books, lots of novels, tale, jokes, and more fictions collections are as well as launched, from best seller to one of the most current released.
You may not be perplexed to enjoy all book collections beginning pl sql from novice to professional experts voice in oracle that we will utterly offer. It is not in the region of the costs. It's approximately what you infatuation currently. This beginning pl sql from novice to professional experts voice in oracle, as one of the most full of life sellers here will enormously be in the middle of the best options to review.
TOP 5 SQL BOOKS FOR BEGINNERSOracle SQL All-in-One Quick Start Tutorial Series (4 HOURS!) Basic PL/SQL for ETL Developers | Stored Procedure Transformation Introduction to Oracle PL SQL Learning PL/SQL programming
Oracle - PL/SQL - Getting Started
Oracle SQL Tutorial 4 -
Beginner Terms - Database Design Primer 1 pl sql concepts Best SQL Books in 2020 Oracle PL SQL Training Videos | Pl SQL Tutorials | Oracle PL/SQL Training Creating data model with Oracle SQL Developer - Part 1 SQL Tutorial - Full Database Course for Beginners MySQL Database Complete Tutorial: Go from Zero to Hero - Part 1/2 Start Learning SQL Server (My $200,000+ Per Year Career) Database Design Course - Learn how to design and plan a database for beginners SQL Developer: How
Oracle To Become A Successful SQL Developer? SQL Training | SQL Tutorial | Intellipaat SQL Tutorial for Beginners 2: Creating Your First Table Using MySQL Database Service with Oracle Analytics Cloud DDL, DML, DCL \u0026 TCL statements in SQL (Database basics) Learn SQL Fast - W3schools SQL Tutorial for Beginners WHY LEARN SQL [in 2 minutes for beginners] By Manish Sharma Complete Oracle SQL Tutorial for Beginners Oracle SQL Basics Difference between SQL and PL/SQL | SQL vs PL SQL | Intellipaat SQL Full Course | SQL Tutorial For Beginners | Learn SQL (Structured Query Language) | Edureka Oracle DB SQL Commands Stored Procedures in PL/SQL | Oracle PL/SQL Tutorial Videos | Mr.Vijay Kumar
PL/SQL Oracle tutorial, Oracle introduction, PL/SQL basics (Lesson 1)Beginning Pl Sql From Novice Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this.
Beginning PL/SQL: From Novice to Professional (Expert's ... You can get rolling with Oracle PL/SQL faster than you think -- and when we say "get rolling," we mean actually start solving business problems, not just fooling around. Beginning PL/SQL: From Novice to Professional is the book can get you there. This is no fancied-up restatement of the "Help": It's a well distilled, surprisingly brief, relentlessly practical introduction to the PL/SQL features developers and DBAs really need to understand in order to write production code.
Beginning PL/SQL: From Novice to Professional by Donald ... Beginning PL/SQL: From Novice to Professional - Ebook written
Oracle by Donald Bales. Read this book using Google Play Books app on your PC, android, iOS devices. Download for offline reading, highlight, bookmark or take notes while you read Beginning PL/SQL: From Novice to Professional.
Beginning PL/SQL: From Novice to Professional by Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL - From Novice to Professional | Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience
Beginning Pl/SQL: From Novice to Professional by Donald Bales Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial. Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL: From Novice to Professional - Donald ... Beginning PL/SQL: From Novice to Professional by Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online Page 3/11
Oracle learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
CHAPTER 1: Genesis - Beginning PL/SQL: From Novice to ... Beginning Pl/Sql: From Novice To Professional: Author: Donald J. Bales: Publisher: Dreamtech Press, 2007: ISBN: 8181288858, 9788181288851: Length: 496 pages : Export Citation: BiBTeX EndNote RefMan
Beginning Pl/Sql: From Novice To Professional - Donald J ... Beginning PL/SQL: From Novice to Professional (Beginning from Novice to Professional) Submitted by admin on Fri, 2008-01-18 11:10 Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL , a fast-paced and example-filled tutorial.
Beginning PL/SQL: From Novice to Professional (Beginning ... To get started finding Beginning Pl Sql From Novice To Professional Experts Voice In Oracle , you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Beginning Pl Sql From Novice To Professional Experts Voice ... Beginning PL/SQL From Novice to Professional Donald J. Bales Bales_882-2FRONT.fm Page i Thursday, July 19, 2007 1:45 PM
Beginning PL/SQL
As the title suggests, Beginning PL/SQL: From Novice to Professional covers a range of PL/SQL topics, both foundational and advanced. From the fundamentals such as triggers, procedures, packages, the book moves into the more advanced operations of Bulk Collection, Objects and even one of the more neglected but no less important areas in PL/SQL, unit testing. Page 4/11
Bookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In Oracle
Amazon.com: Customer reviews: Beginning PL/SQL: From ... Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL.
Beginning PL/SQL : from novice to professional (eBook ... Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
- Beginning PL/SQL: From Novice to Professional [Book] English . Brand New Book. Beginning Queries with SQL is a friendly and easily read guide to writing queries with the allimportant - in the database world - SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of
Download PDF > Beginning SQL Queries 2016: From Novice to ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL by Bales, Donald (ebook) Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important ? in the database world ? SQL Page 5/11
Oracle language. Anyo... Download free Beginning SQL Queries: From Novice to Professional eBook in PDF
Beginning SQL Queries: From Novice to Professional - Free ... ?Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. This book gets readers up-to-speed on the core of the language.
?Beginning PL/SQL on Apple Books
Find many great new & used options and get the best deals for Expert's Voice in Oracle Ser.: Beginning PL/SQL by Donald J. Bales (2007, Perfect, New Edition) at the best online prices at eBay! Free shipping for many products!
Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL. This book gets readers up-to-speed on the core of the language without wasting time on esoteric and seldom used syntax.
This book, written by veteran Oracle database administrator Iggy Fernandez, a regular on the Oracle conference circuit and the editor of NoCOUG Journal, is a manageable introduction to key Oracle Page 6/11
Oracle database administration topics including planning, installation, monitoring, troubleshooting, maintenance, and backups, to name just a few. As is clear from the table of contents, this book is not simply a recitation of Oracle Database features such as what you find in the reference guides available for free download on the Oracle web site. For example, the chapter on database monitoring explains how to monitor database availability, database changes, database security, database backups, database growth, database workload, database performance, and database capacity. The chapters of this book are logically organized into four parts that closely track the way your database administration career will naturally evolve. Part 1 gives you necessary background in relational database theory and Oracle Database concepts, Part 2 teaches you how to implement an Oracle database correctly, Part 3 exposes you to the daily routine of a database administrator, and Part 4 introduces you to the fine art of performance tuning. Each chapter has exercises designed to help you apply the lessons of the chapter. Each chapter also includes a list of reference works that contain more information on the topic of the chapter. In this book, you'll find information that you won't find in other books on Oracle Database. Here you'll discover not only technical information, but also guidance on work practices that are as vital to your success as technical skills. The author's favorite chapter is "The Big Picture and the Ten Deliverables." If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator than you ever thought possible.
Start developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for Page 7/11
Oracle practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.
Start developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with Page 8/11
Oracle databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.
From the authorized Oracle Press comes a complete guide to developing robust PL/SQL applications. The book contains new information on development tools, datatypes, SQL commands and Page 9/11
Oracle functions, and much more. The CD-ROM contains sample code plus a sampling of development environments covered in the book.
The authors have revised and updated this bestseller to include both the Oracle8i and new Oracle9i Internet-savvy database products.
Find tips for creating efficient PL/SQL code If you know a bit about SQL, this book will make PL/SQL programming painless! The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it'll be a breeze with this book! You'll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more. Discover how to Write efficient, easy-to-maintain code Test and debug PL/SQL routines Integrate SQL and PL/SQL Apply PL/SQL best practices Use new features introduced in Oracle 9i and 10g
Beginning Oracle Database 12c Administration is your entry point into a successful and satisfying career as an Oracle Database Administrator. The chapters of this book are logically organized into four parts closely tracking the way your database administration career will naturally evolve. Part 1 "Database Concepts" gives necessary background in relational database theory and Oracle Database concepts, Part 2 "Database Implementation" teaches how to implement an Oracle database correctly, Part 3 "Database Support" exposes you to the daily routine of a database administrator, and Part 4 "Database Tuning" introduces the fine art of performance tuning. Beginning Oracle Database 12c Administration provides information that you won't find in other books on Oracle Database. You'll discover not only technical information, but also guidance on work practices that are as vital to your success as are your technical skills. The author's favorite chapter is "The Big Picture and the Ten Deliverables." (It is the Page 10/11
Copyright : myprofile.gctelegram.com
Bookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In
Oracle editor's favorite chapter too!) If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator than you ever thought possible. You will grasp the key aspects of theory behind relational database management systems and learn how to: • Install and configure an Oracle database, and ensure that it's properly licensed; • Execute common management tasks in a Linux environment; • Defend against data loss by implementing sound backup and recovery practices; and • Improve database and query performance.
Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important — in the database world — SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O'Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of Beginning Database Design, an author who is garnering great reviews on Amazon due to the clarity and succinctness of her writing.
Copyright code : b542ff236eb2811de15680300ce7d6b2
|
<urn:uuid:dec4c4fa-37e7-4baf-9695-f6f5958077d7>
|
CC-MAIN-2021-49
|
http://myprofile.gctelegram.com/cgi-bin/content/view.php?data=beginning_pl_sql_from_novice_to_professional_experts_voice_in_oracle&filetype=pdf&id=b542ff236eb2811de15680300ce7d6b2
|
2021-12-06T08:12:20+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-49/subset=warc/part-00091-eb7089cf-762b-4a3e-8cab-20b677c0d246.c000.gz.parquet
| 57,350,943
| 4,041
|
eng_Latn
|
eng_Latn
| 0.992712
|
eng_Latn
| 0.996264
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1671,
3452,
5226,
6915,
8701,
10200,
12341,
14479,
16622,
18548,
19817
] |
Oracle Beginning Pl Sql From Novice To Professional Experts Voice In Oracle
If you ally infatuation such a referred beginning pl sql from novice to professional experts voice in oracle books that will meet the expense of you worth, get the unquestionably best seller from us currently from several preferred authors. If you desire to humorous books, lots of novels, tale, jokes, and more fictions collections are as well as launched, from best seller to one of the most current released.
You may not be perplexed to enjoy all book collections beginning pl sql from novice to professional experts voice in oracle that we will utterly offer. It is not in the region of the costs. It's approximately what you infatuation currently. This beginning pl sql from novice to professional experts voice in oracle, as one of the most full of life sellers here will enormously be in the middle of the best options to review.
TOP 5 SQL BOOKS FOR BEGINNERSOracle SQL All-in-One Quick Start Tutorial Series (4 HOURS!) Basic PL/SQL for ETL Developers | Stored Procedure Transformation Introduction to Oracle PL SQL Learning PL/SQL programming
Oracle - PL/SQL - Getting Started
Oracle SQL Tutorial 4 -
Beginner Terms - Database Design Primer 1 pl sql concepts Best SQL Books in 2020 Oracle PL SQL Training Videos | Pl SQL Tutorials | Oracle PL/SQL Training Creating data model with Oracle SQL Developer - Part 1 SQL Tutorial - Full Database Course for Beginners MySQL Database Complete Tutorial: Go from Zero to Hero - Part 1/2 Start Learning SQL Server (My $200,000+ Per Year Career) Database Design Course - Learn how to design and plan a database for beginners SQL Developer: How
Oracle To Become A Successful SQL Developer? SQL Training | SQL Tutorial | Intellipaat SQL Tutorial for Beginners 2: Creating Your First Table Using MySQL Database Service with Oracle Analytics Cloud DDL, DML, DCL \u0026 TCL statements in SQL (Database basics) Learn SQL Fast - W3schools SQL Tutorial for Beginners WHY LEARN SQL [in 2 minutes for beginners] By Manish Sharma Complete Oracle SQL Tutorial for Beginners Oracle SQL Basics Difference between SQL and PL/SQL | SQL vs PL SQL | Intellipaat SQL Full Course | SQL Tutorial For Beginners | Learn SQL (Structured Query Language) | Edureka Oracle DB SQL Commands Stored Procedures in PL/SQL | Oracle PL/SQL Tutorial Videos | Mr.Vijay Kumar
PL/SQL Oracle tutorial, Oracle introduction, PL/SQL basics (Lesson 1)Beginning Pl Sql From Novice Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this.
Beginning PL/SQL: From Novice to Professional (Expert's ... You can get rolling with Oracle PL/SQL faster than you think -- and when we say "get rolling," we mean actually start solving business problems, not just fooling around. Beginning PL/SQL: From Novice to Professional is the book can get you there. This is no fancied-up restatement of the "Help": It's a well distilled, surprisingly brief, relentlessly practical introduction to the PL/SQL features developers and DBAs really need to understand in order to write production code.
Beginning PL/SQL: From Novice to Professional by Donald ... Beginning PL/SQL: From Novice to Professional - Ebook written
Oracle by Donald Bales. Read this book using Google Play Books app on your PC, android, iOS devices. Download for offline reading, highlight, bookmark or take notes while you read Beginning PL/SQL: From Novice to Professional.
Beginning PL/SQL: From Novice to Professional by Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL - From Novice to Professional | Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience
Beginning Pl/SQL: From Novice to Professional by Donald Bales Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial. Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL: From Novice to Professional - Donald ... Beginning PL/SQL: From Novice to Professional by Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online Page 3/11
Oracle learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
CHAPTER 1: Genesis - Beginning PL/SQL: From Novice to ... Beginning Pl/Sql: From Novice To Professional: Author: Donald J. Bales: Publisher: Dreamtech Press, 2007: ISBN: 8181288858, 9788181288851: Length: 496 pages : Export Citation: BiBTeX EndNote RefMan
Beginning Pl/Sql: From Novice To Professional - Donald J ... Beginning PL/SQL: From Novice to Professional (Beginning from Novice to Professional) Submitted by admin on Fri, 2008-01-18 11:10 Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL , a fast-paced and example-filled tutorial.
Beginning PL/SQL: From Novice to Professional (Beginning ... To get started finding Beginning Pl Sql From Novice To Professional Experts Voice In Oracle , you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Beginning Pl Sql From Novice To Professional Experts Voice ... Beginning PL/SQL From Novice to Professional Donald J. Bales Bales_882-2FRONT.fm Page i Thursday, July 19, 2007 1:45 PM
Beginning PL/SQL
As the title suggests, Beginning PL/SQL: From Novice to Professional covers a range of PL/SQL topics, both foundational and advanced. From the fundamentals such as triggers, procedures, packages, the book moves into the more advanced operations of Bulk Collection, Objects and even one of the more neglected but no less important areas in PL/SQL, unit testing. Page 4/11
Bookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In Oracle
Amazon.com: Customer reviews: Beginning PL/SQL: From ... Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL.
Beginning PL/SQL : from novice to professional (eBook ... Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
- Beginning PL/SQL: From Novice to Professional [Book] English . Brand New Book. Beginning Queries with SQL is a friendly and easily read guide to writing queries with the allimportant - in the database world - SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of
Download PDF > Beginning SQL Queries 2016: From Novice to ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL by Bales, Donald (ebook) Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important ? in the database world ? SQL Page 5/11
Oracle language. Anyo... Download free Beginning SQL Queries: From Novice to Professional eBook in PDF
Beginning SQL Queries: From Novice to Professional - Free ... ?Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. This book gets readers up-to-speed on the core of the language.
?Beginning PL/SQL on Apple Books
Find many great new & used options and get the best deals for Expert's Voice in Oracle Ser.: Beginning PL/SQL by Donald J. Bales (2007, Perfect, New Edition) at the best online prices at eBay! Free shipping for many products!
Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL. This book gets readers up-to-speed on the core of the language without wasting time on esoteric and seldom used syntax.
This book, written by veteran Oracle database administrator Iggy Fernandez, a regular on the Oracle conference circuit and the editor of NoCOUG Journal, is a manageable introduction to key Oracle Page 6/11
Oracle database administration topics including planning, installation, monitoring, troubleshooting, maintenance, and backups, to name just a few. As is clear from the table of contents, this book is not simply a recitation of Oracle Database features such as what you find in the reference guides available for free download on the Oracle web site. For example, the chapter on database monitoring explains how to monitor database availability, database changes, database security, database backups, database growth, database workload, database performance, and database capacity. The chapters of this book are logically organized into four parts that closely track the way your database administration career will naturally evolve. Part 1 gives you necessary background in relational database theory and Oracle Database concepts, Part 2 teaches you how to implement an Oracle database correctly, Part 3 exposes you to the daily routine of a database administrator, and Part 4 introduces you to the fine art of performance tuning. Each chapter has exercises designed to help you apply the lessons of the chapter. Each chapter also includes a list of reference works that contain more information on the topic of the chapter. In this book, you'll find information that you won't find in other books on Oracle Database. Here you'll discover not only technical information, but also guidance on work practices that are as vital to your success as technical skills. The author's favorite chapter is "The Big Picture and the Ten Deliverables." If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator than you ever thought possible.
Start developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for Page 7/11
Oracle practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.
Start developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with Page 8/11
Oracle databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.
From the authorized Oracle Press comes a complete guide to developing robust PL/SQL applications. The book contains new information on development tools, datatypes, SQL commands and Page 9/11
Oracle functions, and much more. The CD-ROM contains sample code plus a sampling of development environments covered in the book.
The authors have revised and updated this bestseller to include both the Oracle8i and new Oracle9i Internet-savvy database products.
Find tips for creating efficient PL/SQL code If you know a bit about SQL, this book will make PL/SQL programming painless! The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it'll be a breeze with this book! You'll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more. Discover how to Write efficient, easy-to-maintain code Test and debug PL/SQL routines Integrate SQL and PL/SQL Apply PL/SQL best practices Use new features introduced in Oracle 9i and 10g
Beginning Oracle Database 12c Administration is your entry point into a successful and satisfying career as an Oracle Database Administrator. The chapters of this book are logically organized into four parts closely tracking the way your database administration career will naturally evolve. Part 1 "Database Concepts" gives necessary background in relational database theory and Oracle Database concepts, Part 2 "Database Implementation" teaches how to implement an Oracle database correctly, Part 3 "Database Support" exposes you to the daily routine of a database administrator, and Part 4 "Database Tuning" introduces the fine art of performance tuning. Beginning Oracle Database 12c Administration provides information that you won't find in other books on Oracle Database. You'll discover not only technical information, but also guidance on work practices that are as vital to your success as are your technical skills. The author's favorite chapter is "The Big Picture and the Ten Deliverables." (It is the Page 10/11
Copyright : myprofile.gctelegram.com
Bookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In
Oracle editor's favorite chapter too!) If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator th
|
an you ever thought possible.
|
You will grasp the key aspects of theory behind relational database management systems and learn how to: • Install and configure an Oracle database, and ensure that it's properly licensed; • Execute common management tasks in a Linux environment; • Defend against data loss by implementing sound backup and recovery practices; and • Improve database and query performance.
Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important — in the database world — SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O'Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of Beginning Database Design, an author who is garnering great reviews on Amazon due to the clarity and succinctness of her writing.
Copyright code : b542ff236eb2811de15680300ce7d6b2
| 18,827
|
inside_word
|
than
|
remove_one_sentence
|
<url>
http://myprofile.gctelegram.com/cgi-bin/content/view.php?data=beginning_pl_sql_from_novice_to_professional_experts_voice_in_oracle&filetype=pdf&id=b542ff236eb2811de15680300ce7d6b2
</url>
<text>
Oracle Beginning Pl Sql From Novice To Professional Experts Voice In Oracle
If you ally infatuation such a referred beginning pl sql from novice to professional experts voice in oracle books that will meet the expense of you worth, get the unquestionably best seller from us currently from several preferred authors. If you desire to humorous books, lots of novels, tale, jokes, and more fictions collections are as well as launched, from best seller to one of the most current released.
You may not be perplexed to enjoy all book collections beginning pl sql from novice to professional experts voice in oracle that we will utterly offer. It is not in the region of the costs. It's approximately what you infatuation currently. This beginning pl sql from novice to professional experts voice in oracle, as one of the most full of life sellers here will enormously be in the middle of the best options to review.
TOP 5 SQL BOOKS FOR BEGINNERSOracle SQL All-in-One Quick Start Tutorial Series (4 HOURS!) Basic PL/SQL for ETL Developers | Stored Procedure Transformation Introduction to Oracle PL SQL Learning PL/SQL programming
Oracle - PL/SQL - Getting Started
Oracle SQL Tutorial 4 -
Beginner Terms - Database Design Primer 1 pl sql concepts Best SQL Books in 2020 Oracle PL SQL Training Videos | Pl SQL Tutorials | Oracle PL/SQL Training Creating data model with Oracle SQL Developer - Part 1 SQL Tutorial - Full Database Course for Beginners MySQL Database Complete Tutorial: Go from Zero to Hero - Part 1/2 Start Learning SQL Server (My $200,000+ Per Year Career) Database Design Course - Learn how to design and plan a database for beginners SQL Developer: How
Oracle To Become A Successful SQL Developer? SQL Training | SQL Tutorial | Intellipaat SQL Tutorial for Beginners 2: Creating Your First Table Using MySQL Database Service with Oracle Analytics Cloud DDL, DML, DCL \u0026 TCL statements in SQL (Database basics) Learn SQL Fast - W3schools SQL Tutorial for Beginners WHY LEARN SQL [in 2 minutes for beginners] By Manish Sharma Complete Oracle SQL Tutorial for Beginners Oracle SQL Basics Difference between SQL and PL/SQL | SQL vs PL SQL | Intellipaat SQL Full Course | SQL Tutorial For Beginners | Learn SQL (Structured Query Language) | Edureka Oracle DB SQL Commands Stored Procedures in PL/SQL | Oracle PL/SQL Tutorial Videos | Mr.Vijay Kumar
PL/SQL Oracle tutorial, Oracle introduction, PL/SQL basics (Lesson 1)Beginning Pl Sql From Novice Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this.
Beginning PL/SQL: From Novice to Professional (Expert's ... You can get rolling with Oracle PL/SQL faster than you think -- and when we say "get rolling," we mean actually start solving business problems, not just fooling around. Beginning PL/SQL: From Novice to Professional is the book can get you there. This is no fancied-up restatement of the "Help": It's a well distilled, surprisingly brief, relentlessly practical introduction to the PL/SQL features developers and DBAs really need to understand in order to write production code.
Beginning PL/SQL: From Novice to Professional by Donald ... Beginning PL/SQL: From Novice to Professional - Ebook written
Oracle by Donald Bales. Read this book using Google Play Books app on your PC, android, iOS devices. Download for offline reading, highlight, bookmark or take notes while you read Beginning PL/SQL: From Novice to Professional.
Beginning PL/SQL: From Novice to Professional by Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL - From Novice to Professional | Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience
Beginning Pl/SQL: From Novice to Professional by Donald Bales Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial. Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL: From Novice to Professional - Donald ... Beginning PL/SQL: From Novice to Professional by Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online Page 3/11
Oracle learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
CHAPTER 1: Genesis - Beginning PL/SQL: From Novice to ... Beginning Pl/Sql: From Novice To Professional: Author: Donald J. Bales: Publisher: Dreamtech Press, 2007: ISBN: 8181288858, 9788181288851: Length: 496 pages : Export Citation: BiBTeX EndNote RefMan
Beginning Pl/Sql: From Novice To Professional - Donald J ... Beginning PL/SQL: From Novice to Professional (Beginning from Novice to Professional) Submitted by admin on Fri, 2008-01-18 11:10 Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL , a fast-paced and example-filled tutorial.
Beginning PL/SQL: From Novice to Professional (Beginning ... To get started finding Beginning Pl Sql From Novice To Professional Experts Voice In Oracle , you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Beginning Pl Sql From Novice To Professional Experts Voice ... Beginning PL/SQL From Novice to Professional Donald J. Bales Bales_882-2FRONT.fm Page i Thursday, July 19, 2007 1:45 PM
Beginning PL/SQL
As the title suggests, Beginning PL/SQL: From Novice to Professional covers a range of PL/SQL topics, both foundational and advanced. From the fundamentals such as triggers, procedures, packages, the book moves into the more advanced operations of Bulk Collection, Objects and even one of the more neglected but no less important areas in PL/SQL, unit testing. Page 4/11
Bookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In Oracle
Amazon.com: Customer reviews: Beginning PL/SQL: From ... Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL.
Beginning PL/SQL : from novice to professional (eBook ... Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
- Beginning PL/SQL: From Novice to Professional [Book] English . Brand New Book. Beginning Queries with SQL is a friendly and easily read guide to writing queries with the allimportant - in the database world - SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of
Download PDF > Beginning SQL Queries 2016: From Novice to ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...
Beginning PL/SQL by Bales, Donald (ebook) Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important ? in the database world ? SQL Page 5/11
Oracle language. Anyo... Download free Beginning SQL Queries: From Novice to Professional eBook in PDF
Beginning SQL Queries: From Novice to Professional - Free ... ?Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. This book gets readers up-to-speed on the core of the language.
?Beginning PL/SQL on Apple Books
Find many great new & used options and get the best deals for Expert's Voice in Oracle Ser.: Beginning PL/SQL by Donald J. Bales (2007, Perfect, New Edition) at the best online prices at eBay! Free shipping for many products!
Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL. This book gets readers up-to-speed on the core of the language without wasting time on esoteric and seldom used syntax.
This book, written by veteran Oracle database administrator Iggy Fernandez, a regular on the Oracle conference circuit and the editor of NoCOUG Journal, is a manageable introduction to key Oracle Page 6/11
Oracle database administration topics including planning, installation, monitoring, troubleshooting, maintenance, and backups, to name just a few. As is clear from the table of contents, this book is not simply a recitation of Oracle Database features such as what you find in the reference guides available for free download on the Oracle web site. For example, the chapter on database monitoring explains how to monitor database availability, database changes, database security, database backups, database growth, database workload, database performance, and database capacity. The chapters of this book are logically organized into four parts that closely track the way your database administration career will naturally evolve. Part 1 gives you necessary background in relational database theory and Oracle Database concepts, Part 2 teaches you how to implement an Oracle database correctly, Part 3 exposes you to the daily routine of a database administrator, and Part 4 introduces you to the fine art of performance tuning. Each chapter has exercises designed to help you apply the lessons of the chapter. Each chapter also includes a list of reference works that contain more information on the topic of the chapter. In this book, you'll find information that you won't find in other books on Oracle Database. Here you'll discover not only technical information, but also guidance on work practices that are as vital to your success as technical skills. The author's favorite chapter is "The Big Picture and the Ten Deliverables." If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator than you ever thought possible.
Start developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for Page 7/11
Oracle practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.
Start developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with Page 8/11
Oracle databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.
From the authorized Oracle Press comes a complete guide to developing robust PL/SQL applications. The book contains new information on development tools, datatypes, SQL commands and Page 9/11
Oracle functions, and much more. The CD-ROM contains sample code plus a sampling of development environments covered in the book.
The authors have revised and updated this bestseller to include both the Oracle8i and new Oracle9i Internet-savvy database products.
Find tips for creating efficient PL/SQL code If you know a bit about SQL, this book will make PL/SQL programming painless! The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it'll be a breeze with this book! You'll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more. Discover how to Write efficient, easy-to-maintain code Test and debug PL/SQL routines Integrate SQL and PL/SQL Apply PL/SQL best practices Use new features introduced in Oracle 9i and 10g
Beginning Oracle Database 12c Administration is your entry point into a successful and satisfying career as an Oracle Database Administrator. The chapters of this book are logically organized into four parts closely tracking the way your database administration career will naturally evolve. Part 1 "Database Concepts" gives necessary background in relational database theory and Oracle Database concepts, Part 2 "Database Implementation" teaches how to implement an Oracle database correctly, Part 3 "Database Support" exposes you to the daily routine of a database administrator, and Part 4 "Database Tuning" introduces the fine art of performance tuning. Beginning Oracle Database 12c Administration provides information that you won't find in other books on Oracle Database. You'll discover not only technical information, but also guidance on work practices that are as vital to your success as are your technical skills. The author's favorite chapter is "The Big Picture and the Ten Deliverables." (It is the Page 10/11
Copyright : myprofile.gctelegram.com
Bookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In
Oracle editor's favorite chapter too!) If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator th<cursor_is_here> You will grasp the key aspects of theory behind relational database management systems and learn how to: • Install and configure an Oracle database, and ensure that it's properly licensed; • Execute common management tasks in a Linux environment; • Defend against data loss by implementing sound backup and recovery practices; and • Improve database and query performance.
Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important — in the database world — SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O'Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of Beginning Database Design, an author who is garnering great reviews on Amazon due to the clarity and succinctness of her writing.
Copyright code : b542ff236eb2811de15680300ce7d6b2
</text>
|
[
{
"content": "<url>\nhttp://myprofile.gctelegram.com/cgi-bin/content/view.php?data=beginning_pl_sql_from_novice_to_professional_experts_voice_in_oracle&filetype=pdf&id=b542ff236eb2811de15680300ce7d6b2\n</url>\n<text>\nOracle Beginning Pl Sql From Novice To Professional Experts Voice In Oracle\n\nIf you ally infatuation such a referred beginning pl sql from novice to professional experts voice in oracle books that will meet the expense of you worth, get the unquestionably best seller from us currently from several preferred authors. If you desire to humorous books, lots of novels, tale, jokes, and more fictions collections are as well as launched, from best seller to one of the most current released.\n\nYou may not be perplexed to enjoy all book collections beginning pl sql from novice to professional experts voice in oracle that we will utterly offer. It is not in the region of the costs. It's approximately what you infatuation currently. This beginning pl sql from novice to professional experts voice in oracle, as one of the most full of life sellers here will enormously be in the middle of the best options to review.\n\nTOP 5 SQL BOOKS FOR BEGINNERSOracle SQL All-in-One Quick Start Tutorial Series (4 HOURS!) Basic PL/SQL for ETL Developers | Stored Procedure Transformation Introduction to Oracle PL SQL Learning PL/SQL programming\n\nOracle - PL/SQL - Getting Started\n\nOracle SQL Tutorial 4 -\n\nBeginner Terms - Database Design Primer 1 pl sql concepts Best SQL Books in 2020 Oracle PL SQL Training Videos | Pl SQL Tutorials | Oracle PL/SQL Training Creating data model with Oracle SQL Developer - Part 1 SQL Tutorial - Full Database Course for Beginners MySQL Database Complete Tutorial: Go from Zero to Hero - Part 1/2 Start Learning SQL Server (My $200,000+ Per Year Career) Database Design Course - Learn how to design and plan a database for beginners SQL Developer: How\n\nOracle To Become A Successful SQL Developer? SQL Training | SQL Tutorial | Intellipaat SQL Tutorial for Beginners 2: Creating Your First Table Using MySQL Database Service with Oracle Analytics Cloud DDL, DML, DCL \\u0026 TCL statements in SQL (Database basics) Learn SQL Fast - W3schools SQL Tutorial for Beginners WHY LEARN SQL [in 2 minutes for beginners] By Manish Sharma Complete Oracle SQL Tutorial for Beginners Oracle SQL Basics Difference between SQL and PL/SQL | SQL vs PL SQL | Intellipaat SQL Full Course | SQL Tutorial For Beginners | Learn SQL (Structured Query Language) | Edureka Oracle DB SQL Commands Stored Procedures in PL/SQL | Oracle PL/SQL Tutorial Videos | Mr.Vijay Kumar\n\nPL/SQL Oracle tutorial, Oracle introduction, PL/SQL basics (Lesson 1)Beginning Pl Sql From Novice Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this.\n\nBeginning PL/SQL: From Novice to Professional (Expert's ... You can get rolling with Oracle PL/SQL faster than you think -- and when we say \"get rolling,\" we mean actually start solving business problems, not just fooling around. Beginning PL/SQL: From Novice to Professional is the book can get you there. This is no fancied-up restatement of the \"Help\": It's a well distilled, surprisingly brief, relentlessly practical introduction to the PL/SQL features developers and DBAs really need to understand in order to write production code.\n\nBeginning PL/SQL: From Novice to Professional by Donald ... Beginning PL/SQL: From Novice to Professional - Ebook written\n\nOracle by Donald Bales. Read this book using Google Play Books app on your PC, android, iOS devices. Download for offline reading, highlight, bookmark or take notes while you read Beginning PL/SQL: From Novice to Professional.\n\nBeginning PL/SQL: From Novice to Professional by Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...\n\nBeginning PL/SQL - From Novice to Professional | Donald ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience\n\nBeginning Pl/SQL: From Novice to Professional by Donald Bales Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial. Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features. Bales takes his 20+ years of experience and a wealth of ...\n\nBeginning PL/SQL: From Novice to Professional - Donald ... Beginning PL/SQL: From Novice to Professional by Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online Page 3/11\n\nOracle learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.\n\nCHAPTER 1: Genesis - Beginning PL/SQL: From Novice to ... Beginning Pl/Sql: From Novice To Professional: Author: Donald J. Bales: Publisher: Dreamtech Press, 2007: ISBN: 8181288858, 9788181288851: Length: 496 pages : Export Citation: BiBTeX EndNote RefMan\n\nBeginning Pl/Sql: From Novice To Professional - Donald J ... Beginning PL/SQL: From Novice to Professional (Beginning from Novice to Professional) Submitted by admin on Fri, 2008-01-18 11:10 Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL , a fast-paced and example-filled tutorial.\n\nBeginning PL/SQL: From Novice to Professional (Beginning ... To get started finding Beginning Pl Sql From Novice To Professional Experts Voice In Oracle , you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.\n\nBeginning Pl Sql From Novice To Professional Experts Voice ... Beginning PL/SQL From Novice to Professional Donald J. Bales Bales_882-2FRONT.fm Page i Thursday, July 19, 2007 1:45 PM\n\nBeginning PL/SQL\n\nAs the title suggests, Beginning PL/SQL: From Novice to Professional covers a range of PL/SQL topics, both foundational and advanced. From the fundamentals such as triggers, procedures, packages, the book moves into the more advanced operations of Bulk Collection, Objects and even one of the more neglected but no less important areas in PL/SQL, unit testing. Page 4/11\n\nBookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In Oracle\n\nAmazon.com: Customer reviews: Beginning PL/SQL: From ... Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL.\n\nBeginning PL/SQL : from novice to professional (eBook ... Get Beginning PL/SQL: From Novice to Professional now with O'Reilly online learning. O'Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.\n\n- Beginning PL/SQL: From Novice to Professional [Book] English . Brand New Book. Beginning Queries with SQL is a friendly and easily read guide to writing queries with the allimportant - in the database world - SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of\n\nDownload PDF > Beginning SQL Queries 2016: From Novice to ... Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial.Learn from author Don Bales extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.. Bales takes his 20+ years of experience and a wealth of ...\n\nBeginning PL/SQL by Bales, Donald (ebook) Beginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important ? in the database world ? SQL Page 5/11\n\nOracle language. Anyo... Download free Beginning SQL Queries: From Novice to Professional eBook in PDF\n\nBeginning SQL Queries: From Novice to Professional - Free ... ?Beginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. This book gets readers up-to-speed on the core of the language.\n\n?Beginning PL/SQL on Apple Books\n\nFind many great new & used options and get the best deals for Expert's Voice in Oracle Ser.: Beginning PL/SQL by Donald J. Bales (2007, Perfect, New Edition) at the best online prices at eBay! Free shipping for many products!\n\nBeginning PL/SQL is a fast-paced and blissfully short introduction to Oracle's PL/SQL language. PL/SQL is the built-in language that every Oracle developer and database administrator simply must know. The book shows readers how to apply object-oriented PL/SQL to production applications. No other book on PL/SQL does this. It gives the reader practical advice on what works and what doesn't, and advises on the performance tradeoffs between doing work in SQL versus in PL/SQL. This book gets readers up-to-speed on the core of the language without wasting time on esoteric and seldom used syntax.\n\nThis book, written by veteran Oracle database administrator Iggy Fernandez, a regular on the Oracle conference circuit and the editor of NoCOUG Journal, is a manageable introduction to key Oracle Page 6/11\n\nOracle database administration topics including planning, installation, monitoring, troubleshooting, maintenance, and backups, to name just a few. As is clear from the table of contents, this book is not simply a recitation of Oracle Database features such as what you find in the reference guides available for free download on the Oracle web site. For example, the chapter on database monitoring explains how to monitor database availability, database changes, database security, database backups, database growth, database workload, database performance, and database capacity. The chapters of this book are logically organized into four parts that closely track the way your database administration career will naturally evolve. Part 1 gives you necessary background in relational database theory and Oracle Database concepts, Part 2 teaches you how to implement an Oracle database correctly, Part 3 exposes you to the daily routine of a database administrator, and Part 4 introduces you to the fine art of performance tuning. Each chapter has exercises designed to help you apply the lessons of the chapter. Each chapter also includes a list of reference works that contain more information on the topic of the chapter. In this book, you'll find information that you won't find in other books on Oracle Database. Here you'll discover not only technical information, but also guidance on work practices that are as vital to your success as technical skills. The author's favorite chapter is \"The Big Picture and the Ten Deliverables.\" If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator than you ever thought possible.\n\nStart developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for Page 7/11\n\nOracle practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.\n\nStart developing with Oracle SQL. This book is a one-stop introduction to everything you need to know about getting started developing an Oracle Database. You'll learn about foundational concepts, setting up a simple schema, adding data, reading data from the database, and making changes. No experience with Page 8/11\n\nOracle databases is required to get started. Examples in the book are built around Oracle Live SQL, a freely available, online sandbox for practicing and experimenting with SQL statements, and Oracle Express Edition, a free version of Oracle Database that is available for download. A marquee feature of Beginning Oracle SQL for Oracle Database 18c is the small chapter size. Content is divided into easily digestible chunks that can be read and practiced in very short intervals of time, making this the ideal book for a busy professional to learn from. Even just a 15-20 minute block of free time can be put to good use. Author Ben Brumm begins by helping you understand what a database is, and getting you set up with a sandbox in which to practice the SQL that you are learning. From there, easily digestible chapters cover, point-by-point, the different aspects of writing queries to get data out of a database. You'll also learn about creating tables and getting data into the database. Crucial topics such as working with nulls and writing analytic queries are given the attention they deserve, helping you to avoid pitfalls when writing queries for production use. What You'll Learn Create, update, and delete tables in an Oracle database Add, update, delete data from those database tables Query and view data stored in your database Manipulate and transform data using in-built database functions and features Correctly choose when to use Oracle-specific syntax and features Who This Book Is For Those new to Oracle who are planning to develop software using Oracle as the back-end data store. The book is also for those who are getting started in software development and realize they need to learn some kind of database language. Those who are learning software development on the side of their normal job, or learning it as a college student, who are ready to learn what a database is and how to use it also will find this book useful.\n\nFrom the authorized Oracle Press comes a complete guide to developing robust PL/SQL applications. The book contains new information on development tools, datatypes, SQL commands and Page 9/11\n\nOracle functions, and much more. The CD-ROM contains sample code plus a sampling of development environments covered in the book.\n\nThe authors have revised and updated this bestseller to include both the Oracle8i and new Oracle9i Internet-savvy database products.\n\nFind tips for creating efficient PL/SQL code If you know a bit about SQL, this book will make PL/SQL programming painless! The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it'll be a breeze with this book! You'll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more. Discover how to Write efficient, easy-to-maintain code Test and debug PL/SQL routines Integrate SQL and PL/SQL Apply PL/SQL best practices Use new features introduced in Oracle 9i and 10g\n\nBeginning Oracle Database 12c Administration is your entry point into a successful and satisfying career as an Oracle Database Administrator. The chapters of this book are logically organized into four parts closely tracking the way your database administration career will naturally evolve. Part 1 \"Database Concepts\" gives necessary background in relational database theory and Oracle Database concepts, Part 2 \"Database Implementation\" teaches how to implement an Oracle database correctly, Part 3 \"Database Support\" exposes you to the daily routine of a database administrator, and Part 4 \"Database Tuning\" introduces the fine art of performance tuning. Beginning Oracle Database 12c Administration provides information that you won't find in other books on Oracle Database. You'll discover not only technical information, but also guidance on work practices that are as vital to your success as are your technical skills. The author's favorite chapter is \"The Big Picture and the Ten Deliverables.\" (It is the Page 10/11\n\nCopyright : myprofile.gctelegram.com\n\nBookmark File PDF Beginning Pl Sql From Novice To Professional Experts Voice In\n\nOracle editor's favorite chapter too!) If you take the lessons in that chapter to heart, you can quickly become a much better Oracle database administrator th<cursor_is_here> You will grasp the key aspects of theory behind relational database management systems and learn how to: • Install and configure an Oracle database, and ensure that it's properly licensed; • Execute common management tasks in a Linux environment; • Defend against data loss by implementing sound backup and recovery practices; and • Improve database and query performance.\n\nBeginning Queries with SQL is a friendly and easily read guide to writing queries with the all-important — in the database world — SQL language. Anyone who does any work at all with databases needs to know something of SQL, and that is evidenced by the strong sales of such books as Learning SQL (O'Reilly) and SQL Queries for Mere Mortals (Pearson). Beginning Queries with SQL is written by the author of Beginning Database Design, an author who is garnering great reviews on Amazon due to the clarity and succinctness of her writing.\n\nCopyright code : b542ff236eb2811de15680300ce7d6b2\n</text>\n",
"role": "user"
},
{
"content": "an you ever thought possible.",
"role": "assistant"
}
] |
Shubha N Prakash et al
Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes
1Shubha N Prakash, 2Jayakumari Shanthakumari, 3Anitha Devanath
ABSTRACT
Introduction: With growing awareness of the link between diet and health and the problem of obesity, public concern over sugar levels in the diet is forcing a worldwide trend toward cutting down on sugar by using artificial sweeteners (AS).
Aim: To study the effect of increasing concentrations of sucralose (an AS) on glucose uptake in rat L6 myotubes.
Materials and methods: The L6 cell line from American type cell culture (ATCC) was grown in Dulbecco's Modified Eagle's Medium (DMEM) and differentiated into myotubes. The wells were exposed to either 0, 1 nM, 1 µM, or 1 mM of sucralose alone or with 10 nM insulin for 24 hours. Glucose uptake was studied after this period.
Results: Significant decrease was seen between the insulinstimulated basal glucose uptake and insulin-stimulated glucose uptake across all the concentrations of sucralose treatment.
Conclusion: Increased concentration of sucralose appears to decrease glucose uptake even on insulin stimulation.
including candy, chewing gum, ice cream, soft drinks, jellies, yogurt, fruit juice, and baked goods. They are also present in some pharmaceutical products, which include cough drops, cough syrups, certain medications, and vitamins. 2 Health awareness and adopting "healthier" diets in the quest to quell metabolic disorders and diseases are increasing. 3 People who are overweight/obese or diabetics consume these substances to control their dietary intake of table sugar and body weight. 2 However, several common AS, e.g., aspartame, sucralose, and saccharin, have been the subjects of enduring controversy due to observational and laboratory studies indicating an association of AS consumption with increased appetite, food intake, weight gain, and glucose intolerance. 1,4-6 It is still debatable whether increased AS or nonnutritive sweetener (NNS) consumption has any adverse effects on obesity and diabetes management. 2,7-9
Clinical significance: It may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.
Keywords: Artificial sweetener, Glucose uptake, Sucralose.
How to cite this article: Prakash SN, Shanthakumari J, Devanath A. Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes. Indian J Med Biochem 2017;21(2):162-165.
Source of support: Nil
Conflict of interest: None
INTRODUCTION
The use of low-calorific/noncalorific/AS as substitutes for sugar has increased markedly in the past decades, reflecting widespread attempts to reduce energy consumption and combat the rising prevalence of obesity. 1 These sweeteners are 30 to 13,000 times sweeter than table sugar. These sugar substitutes are used in a variety of food substances labeled as "diet" or "sugar free"
1Assistant Professor, 2Professor Grade II, 3Professor
1-3Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India
Corresponding Author: Jayakumari Shanthakumari, Professor Grade II, Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India, Phone: +919880259248, e-mail: [email protected]
Sucralose is an intensely sweet compound that has a sweetening potency approximately 600 times that of sucrose. Unlike sugar, the glycosidic linkage of this substituted disaccharide is apparently unavailable to the enzymes that cleave it. Ingested sucralose is neither metabolized to its monosaccharide-like moieties nor is it a source of energy. Therefore, it is not digested and about 15 to 20% is absorbed as such and completely excreted within 72 hours in urine. Its acceptable daily intake (ADI) is 0 to 15 mg/kg/d. 10 Sucralose undergoes thermal decomposition above 119°C and forms chloropropanols with glycerol, which are carcinogenic. 11 However, it is used in beverages and other foods, including those undergoing heat treatments, such as baked goods. Data from some studies, conducted in human subjects with and without diabetes, found that even extremely high doses of sucralose (many times above the ADI) did not have adverse effects. 12-19 However, some other studies found weight gain and metabolic disturbances. 4,5,20-22
Suez et al 23 have shown that consumption of AS can lead to glucose intolerance. Pepino et al 24 in a review have shown that, in obese individuals, sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and insulin secretion in response to glucose stimulation. Alonso Romo-Romo et al, 25 in a systematic review, have observed that obesity could be a possible confounding factor for the associations found in some of the observational studies bwtween NNS consumption and the development of metabolic diseases.
They also suggested that further studies are required to probe the effect of AS on carbohydrate metabolism.
Therefore, we wanted to study the effect of sucralose on glucose uptake in muscle cells. We selected rat L6 cells as this cell line has shown to be most sensitive to insulin.
AIM
To study the effect of sucralose on glucose uptake in L6 cell line.
MATERIALS AND METHODS
Cell Culture
The L6 cells from the ATCC were grown in DMEM with 4 mM L-glutamine adjusted to contain 1.5 g/L sodium bicarbonate, 1 g/L glucose, and 1 mM sodium pyruvate (Gibco) with 10% fetal bovine serum (FBS) in an incubator at 37°C with 5% CO2. Medium was changed every 2 to 3 days. Once the myoblasts were grown to confluence in a 24-well plate, the media were replaced with DMEM containing 2% FBS to induce differentiation into myotubes. Full differentiation took about 7 to 8 days. A day prior to experiment, half of the plates (12 wells) were incubated with 0, 1 nM, 1 μM, or 1 mM of sucralose alone and another half with the increasing concentration of sucralose and 10 nM insulin for 24 hours. After this incubation, glucose uptake was studied.
Glucose Uptake
All experiments were done in triplicate. After 24-hour incubation with AS, L6 myotubes were incubated with deoxyglucose in no-glucose DMEM media for 10 minutes. After 10 minutes, 0.1 μCi/mL 2-deoxy[3H] glucose (PerkinElmer Life Sciences) was added alone for basal and with 10 nM insulin for stimulated glucose uptake. 10 minutes later, L6 myotubes were placed on ice, washed with ice-cold phosphate buffered saline, and lysed in 0.1% sodium dodecyl sulfate. It was then transferred to vials with scintillation cocktail for counting and an aliquot taken for protein estimation by Bicinchoninic acid method (ThermoFisher Pierce). Uptake of 2-deoxyglucose was then quantified by liquid scintillation counter and expressed per mg of protein.
Table 1: Two-way ANOVA test between insulin-stimulated and AS-induced glucose uptake (p < 0.05)
RESULTS
The results were analyzed using GraphPad Prism software version 6. Two-way analysis of variance (ANOVA) and Bonferroni's multiple comparison were done.
Table 1 depicts two-way ANOVA that showed a significant difference (p 0.0137) for the interaction between sweetener and insulin and (p < 0.0001) for the effect of different concentrations of sucralose on glucose uptake.
Table 2 depicts Bonferroni's multiple comparison tests. There was significant increase in stimulated untreated glucose uptake compared with basal untreated uptake. Significant decrease was also observed between stimulated untreated vs stimulated sucralose of 1 nM, 1 µM, and 1 mM glucose uptake. Our study shows an increasing suppression of glucose uptake as sucralose concentration was increased.
Graph 1 shows basal and stimulated glucose uptake vs different concentrations of sucralose.
DISCUSSION
The AS act through a sweet-taste receptor, which is a transmembrane protein present in the cell membrane, i.e., coupled to a G-protein. It is a dimer of T1R2 and T1R3 proteins. It is present in tongue and other nongustatory sites like intestine, brain, adipocytes, muscle, etc. Binding of a sweet compound to the receptor causes dissociation of α-gustducin from the receptor and activates phospholipase C-β2. Elevation of cytoplasmic calcium concentration [Ca2+]i and subsequent activation of sodium-permeable TRPM5 channel are critical to sweet sensation. Stimulation of the T1R2/T1R3 taste receptor activates peripheral gustatory nerves and, in turn, brain gustatory pathways. Sweet-tasting compounds, such as sugars and low-energy sweeteners, can bind to and stimulate the sweet-taste receptor. 26 Nakagawa et al 27 have studied the mechanism of action of four different AS including sucralose in MIN6
Table 2: Bonferroni's multiple comparison test for untreated stimulated vs stimulated sucralose conditions
CI: Confidence interval
cells. They have found that all the four AS evoke different cellular responses and were inhibited by different substances. Sucralose induced elevation of [Ca2+]i and [cAMP]i and was inhibited by gurmarin, an antagonist of the sweet-taste receptor. Masubuchi et al 28 have shown that the sweet-taste receptor in 3T3 L1 cells was distinct from the one seen in tongue and may activate a different signaling pathway. Simon et al 29 have shown that these AS can act even in T1R2/T1R3 knockdown cells. This implies that they could be acting through other receptors that have not yet been identified.
In our study, we observed that sucralose decreased glucose uptake in insulin-stimulated condition across all the concentrations studied. This suppression of uptake increased with increase in concentration of sucralose as shown in Graph 1. This is in accordance with Suez et al 23 and Pepino et al 24 who suggest that AS could cause insulin resistance in human subjects. Pepino et al 24 found that ingestion of sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and glucose-stimulated insulin secretion in subjects with obesity. Sucralose also tended to increase plasma glucose-dependent insulinotropic peptide concentration, and could promote insulin resistance. Approximately 20% higher than normal concentrations of insulin were required to maintain same glycemia when obese subjects consumed sucralose than when they consumed water before glucose ingestion. Sucralose has been shown to increase glucose-stimulated insulin secretion in mouse insulinoma–MIN6 cell line and mouse and rat islet cells. 30,31 It also increased secretion of glucagonlike polypeptide-1 in human L cell line NCI-H716. 30
There are several studies on the effect of sucralose and other AS in various other cell lines. But we found studies with effect of other AS on glucose uptake. In a study done by Simon et al, 29 saccharin AS increased adipogenesis and glucose uptake in 3T3L1 adipocytes, but sucralose caused mild inhibition of adipogenesis. They studied 0.45 and 4.5 mM saccharin concentrations, which are greater than the expected physiological concentration (approximately 75 µM), and these concentrations are much higher than what we have used in our study. Bhasker et al 32 reported increased glucose uptake with naturally occurring AS in diabetes-induced L6 cells. These differences could be attributed to the difference in cell type (3T3L1 and diabetes-induced L6) and/or the type of AS and/or mode of action through different receptors. Therefore, further studies are required to elucidate the receptor and signaling pathways for sucralose.
CONCLUSION
From our study, we have seen a decrease in insulinstimulated glucose uptake with sucralose. Increase in concentration of sucralose decreased the uptake further. Hence, it may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.
ACKNOWLEDGMENT
Authors would like to thank Prof Matthew Watt for support, encouragement, and infrastructure to carry out the work in his Biology of Lipid Metabolism laboratory, Department of Physiology, Monash University, Melbourne.
REFERENCES
1. Overduin J, Collet TH, Medic N, Henning E, Keogh JM, Forsyth F, Stephenson C, Kanning MW, Ruijschop RM, Farooqi IS, et al. Failure of sucrose replacement with the non-nutritive sweetener erythritol to alter GLP-1 or PYY release or test meal size in lean or obese people. Appetite 2016 Dec;107:596-603.
2. van Eyk AD. The effect of five artificial sweeteners on CaCO2, HT-29 and HEK-293 cells. Drug Chem Toxicol 2015 Oct;38(3):318-327.
3. Sharma A, Amarnath S, Thulasimani M, Ramaswamy S. Artificial sweeteners as a sugar substitute: are they really safe? Indian J Pharmacol 2016 May-Jun;48(3):237-240.
4. Dhingra R, Sullivan L, Jacques PF, Wang TJ, Fox CS, Meigs JB, D'Agostino RB, Gaziano JM, Vasan RS. Soft drink consumption and risk of developing cardiometabolic risk factors and the metabolic syndrome in middle-aged adults in the community. Circulation 2007 Jul;116(5):480-488.
5. Fowler SP, Williams K, Resendez RG, Hunt KJ, Hazuda HP, Stern MP. Fueling the obesity epidemic? Artificially sweetened beverage use and long-term weight gain. Obesity (Silver Spring) 2008 Aug;16(8):1894-1900.
6. Fowler SP, Williams K, Hazuda HP. Diet soda intake is associated with long-term increases in waist circumference in a biethnic cohort of older adults: the San Antonio Longitudinal Study of Aging. J Am Geriatr Soc 2015 Apr;63(4):708-715.
7. Gallus S, Scotti L, Negri E, Talamini R, Franceschi S, Montella M, Giacosa A, Dal Maso L, La Vecchia C. Artificial sweeteners and
cancer risk in a network of case-control studies. Ann Oncol 2007 Jan;18(1):40-44.
8. Renwick AG. The intake of intense sweeteners – an update review. Food Addit Contam 2006 Apr;23(4):327-338.
9. Tandel KR. Sugar substitutes: health controversy over perceived benefits. J Pharmacol Pharmacother 2011 Oct;2(4): 236-243.
10. Magnuson BA, Carakostas MC, Moore NH, Poulos SP, Renwick AG. Biological fate of low-calorie sweeteners. Nutr Rev 2016 Nov;74(11):670-689.
11. Schiffman SS, Rother KI. Sucralose, a synthetic organochlorine sweetener: overview of biological issues. J Toxicol Environ Health B Crit Rev 2013 Sep;16(7):399-451.
12. Mezitis NH, Maggio CA, Koch P, Quddoos A, Allison DB, Pi-Sunyer FX. Glycemic effect of a single high oral dose of the novel sweetener sucralose in patients with diabetes. Diabetes Care 1996 Sep;19(9):1004-1005.
13. Grotz VL, Henry RR, McGill JB, Prince MJ, Shamoon H, Trout JR, Pi-Sunyer FX. Lack of effect of sucralose on glucose homeostasis in subjects with type 2 diabetes. J Am Diet Assoc 2003 Dec;103(12):1607-1612.
14. Baird IM, Shephard NW, Merritt RJ, Hildick-Smith G. Repeated dose study of sucralose tolerance in human subjects. Food Chem Toxicol 2000 Feb;38(Suppl 2):S123-S129.
15. Ma J, Chang J, Checklin HL, Young RL, Jones KL, Horowitz M, Rayner CK. Effect of the artificial sweetener, sucralose, on small intestinal glucose absorption in healthy human subjects. Br J Nutr 2010 Sep;104(6):803-806.
16. Ford HE, Peters V, Martin NM, Sleeth ML, Ghatei MA, Frost GS, Bloom SR. Effects of oral ingestion of sucralose on gut hormone response and appetite in healthy normal-weight subjects. Eur J Clin Nutr 2011 Apr;65(4):508-513.
17. Wu T, Zhao BR, Bound MJ, Checklin HL, Bellon M, Little TJ, Young RL, Jones KL, Horowitz M, Rayner CK. Effects of different sweet preloads on incretin hormone secretion, gastric emptying, and postprandial glycemia in healthy humans. Am J Clin Nutr 2012 Jan;95(1):78-83.
18. Brown AW, Bohan Brown MM, Onken KL, Beitz DC. Shortterm consumption of sucralose, a nonnutritive sweetener, is similar to water with regard to select markers of hunger signaling and short-term glucose homeostasis in women. Nutr Res 2011 Dec;31(12):882-888.
19. Wu T, Bound MJ, Standfield SD, Bellon M, Young RL, Jones KL, Horowitz M, Rayner CK. Artificial sweeteners have no effect on gastric emptying, glucagon-like peptide-1, or glycemia after oral glucose in healthy humans. Diabetes Care 2013 Dec;36(12):e202-e203.
20. Stellman SD, Garfinkel L. Artificial sweetener use and one-year weight change among women. Prev Med 1986 Mar;15(2):195-202.
21. Colditz GA, Willett WC, Stampfer MJ, London SJ, Segal MR, Speizer FE. Patterns of weight change and their relation to diet in a cohort of healthy women. Am J Clin Nutr 1990 Jun;51(6):1100-1105.
22. Duffey KJ, Popkin BM. Adults with healthier dietary patterns have healthier beverage patterns. J Nutr 2006 Nov;136(11): 2901-2907.
23. Suez J, Korem T, Zeevi D, Zilberman-Schapira G, Thaiss GA, Maza O, Israeli D, Zmora N, Gilad S, Weinberger A, et al. Artificial sweeteners induce glucose intolerance by altering the gut microbiota. Nature 2014 Oct;514(7521):181-186.
24. Pepino MY, Tiemann CD, Patterson BW, Wice BM, Klein S. Sucralose affects glycemic and hormonal responses to an oral glucose load. Diabetes Care 2013 Sep;36(9):2530-2535.
25. Romo-Romo A, Aguilar-Salinas CA, Brito-Córdova GX, Gómez Díaz RA, Vilchis Valentín D, Almeda-Valdes P. Effects of the non-nutritive sweeteners on glucose metabolism and appetite regulating hormones: systematic review of observational prospective studies and clinical trials. PLoS One 2016 Aug;11(8):e0161264.
26. Renwick AG, Molinary SV. Sweet-taste receptors, low-energy sweeteners, glucose absorption and insulin release. Br J Nutr 2010 Nov;104(10):1415-1420.
27. Nakagawa Y, Nagasawa M, Mogami H, Lohse M, Ninomiya Y, Kojima I. Multimodal function of the sweet taste receptor expressed in pancreatic β-cells: generation of diverse patterns of intracellular signals by sweet agonists. Endocr J 2013 Aug;60(10): 1191-1206.
28. Masubuchi Y, Nakagawa Y, Ma J, Sasaki T, Kitamura T, Yamamoto Y, Kurose H, Kojima I, Shibata H. A novel regulatory function of sweet taste-sensing receptor in adipogenic differentiation of 3T3-L1 cells. PLoS One 2013 Jan;8(1):e54500.
29. Simon BR, Parlee SD, Learman BS, Mori H, Scheller EL, Cawthorn WP, Ning X, Gallagher K, Tyrberg B, Assadi-Porter FM, et al. Artificial sweeteners stimulate adipogenesis and suppress lipolysis independently of sweet taste receptors. J Biol Chem 2013 Nov;288(45):32475-32489.
30. Jang HJ, Kokrashvili Z, Theodorakis MJ, Carlson OD, Kim BJ, Zhou J, Kim HH, Xu X, Chan SL, Juhaszova M, et al. Gut-expressed gustducin and taste receptors regulate secretion of glucagonlike peptide-1. Proc Natl Acad Sci U S A 2007 Sep;104(38): 15069-15074.
31. Nakagawa Y, Nagasawa M, Yamada S, Hara A, Mogami H, Nikolaev VO, Lohse MJ, Shigemura N, Ninomiya Y, Kojima I. Sweet taste receptor expressed in pancreatic ß-cells activates the calcium and cyclic AMP signaling systems and stimulates insulin secretion. PLoS One 2009 Apr;4(4):e5106.
32. Bhasker S, Madhav H, Chinnamma M. Molecular evidence of insulinomimetic property exhibited by steviol and stevioside in diabetes induced L6 and 3T3L1 cells. Phytomedicine 2015 Oct;22(11):1037-1044.
|
<urn:uuid:a08d34ae-8699-49bb-bc49-a194bc4ae1ef>
|
CC-MAIN-2024-38
|
https://www.ijmb.in/doi/IJMB/pdf/10.5005/jp-journals-10054-0042
|
2024-09-10T21:30:04+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-38/subset=warc/part-00069-781f89b0-54ef-4e32-b51d-e5860e733e3a.c000.gz.parquet
| 757,367,539
| 4,840
|
eng_Latn
|
eng_Latn
| 0.879678
|
eng_Latn
| 0.966466
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4841,
8757,
13468,
18802
] |
Shubha N Prakash et al
Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes
1Shubha N Prakash, 2Jayakumari Shanthakumari, 3Anitha Devanath
ABSTRACT
Introduction: With growing awareness of the link between diet and health and the problem of obesity, public concern over sugar levels in the diet is forcing a worldwide trend toward cutting down on sugar by using artificial sweeteners (AS).
Aim: To study the effect of increasing concentrations of sucralose (an AS) on glucose uptake in rat L6 myotubes.
Materials and methods: The L6 cell line from American type cell culture (ATCC) was grown in Dulbecco's Modified Eagle's Medium (DMEM) and differentiated into myotubes. The wells were exposed to either 0, 1 nM, 1 µM, or 1 mM of sucralose alone or with 10 nM insulin for 24 hours. Glucose uptake was studied after this period.
Results: Significant decrease was seen between the insulinstimulated basal glucose uptake and insulin-stimulated glucose uptake across all the concentrations of sucralose treatment.
Conclusion: Increased concentration of sucralose appears to decrease glucose uptake even on insulin stimulation.
including candy, chewing gum, ice cream, soft drinks, jellies, yogurt, fruit juice, and baked goods. They are also present in some pharmaceutical products, which include cough drops, cough syrups, certain medications, and vitamins. 2 Health awareness and adopting "healthier" diets in the quest to quell metabolic disorders and diseases are increasing. 3 People who are overweight/obese or diabetics consume these substances to control their dietary intake of table sugar and body weight. 2 However, several common AS, e.g., aspartame, sucralose, and saccharin, have been the subjects of enduring controversy due to observational and laboratory studies indicating an association of AS consumption with increased appetite, food intake, weight gain, and glucose intolerance. 1,4-6 It is still debatable whether increased AS or nonnutritive sweetener (NNS) consumption has any adverse effects on obesity and diabetes management. 2,7-9
Clinical significance: It may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.
Keywords: Artificial sweetener, Glucose uptake, Sucralose.
How to cite this article: Prakash SN, Shanthakumari J, Devanath A. Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes. Indian J Med Biochem 2017;21(2):162-165.
Source of support: Nil
Conflict of interest: None
INTRODUCTION
The use of low-calorific/noncalorific/AS as substitutes for sugar has increased markedly in the past decades, reflecting widespread attempts to reduce energy consumption and combat the rising prevalence of obesity. 1 These sweeteners are 30 to 13,000 times sweeter than table sugar. These sugar substitutes are used in a variety of food substances labeled as "diet" or "sugar free"
1Assistant Professor, 2Professor Grade II, 3Professor
1-3Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India
Corresponding Author: Jayakumari Shanthakumari, Professor Grade II, Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India, Phone: +919880259248, e-mail: [email protected]
Sucralose is an intensely sweet compound that has a sweetening potency approximately 600 times that of sucrose. Unlike sugar, the glycosidic linkage of this substituted disaccharide is apparently unavailable to the enzymes that cleave it. Ingested sucralose is neither metabolized to its monosaccharide-like moieties nor is it a source of energy. Therefore, it is not digested and about 15 to 20% is absorbed as such and completely excreted within 72 hours in urine. Its acceptable daily intake (ADI) is 0 to 15 mg/kg/d. 10 Sucralose undergoes thermal decomposition above 119°C and forms chloropropanols with glycerol, which are carcinogenic. 11 However, it is used in beverages and other foods, including those undergoing heat treatments, such as baked goods. Data from some studies, conducted in human subjects with and without diabetes, found that even extremely high doses of sucralose (many times above the ADI) did not have adverse effects. 12-19 However, some other studies found weight gain and metabolic disturbances. 4,5,20-22
Suez et al 23 have shown that consumption of AS can lead to glucose intolerance. Pepino et al 24 in a review have shown that, in obese individuals, sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and insulin secretion in response to glucose stimulation. Alonso Romo-Romo et al, 25 in a systematic review, have observed that obesity could be a possible confounding factor for the associations found in some of the observational studies bwtween NNS consumption and the development of metabolic diseases.
They also suggested that further studies are required to probe the effect of AS on carbohydrate metabolism.
Therefore, we wanted to study the effect of sucralose on glucose uptake in muscle cells. We selected rat L6 cells as this cell line has shown to be most sensitive to insulin.
AIM
To study the effect of sucralose on glucose uptake in L6 cell line.
MATERIALS AND METHODS
Cell Culture
The L6 cells from the ATCC were grown in DMEM with 4 mM L-glutamine adjusted to contain 1.5 g/L sodium bicarbonate, 1 g/L glucose, and 1 mM sodium pyruvate (Gibco) with 10% fetal bovine serum (FBS) in an incubator at 37°C with 5% CO2. Medium was changed every 2 to 3 days. Once the myoblasts were grown to confluence in a 24-well plate, the media were replaced with DMEM containing 2% FBS to induce differentiation into myotubes. Full differentiation took about 7 to 8 days. A day prior to experiment, half of the plates (12 wells) were incubated with 0, 1 nM, 1 μM, or 1 mM of sucralose alone and another half with the increasing concentration of sucralose and 10 nM insulin for 24 hours. After this incubation, glucose uptake was studied.
Glucose Uptake
All experiments were done in triplicate. After 24-hour incubation with AS, L6 myotubes were incubated with deoxyglucose in no-glucose DMEM media for 10 minutes. After 10 minutes, 0.1 μCi/mL 2-deoxy[3H] glucose (PerkinElmer Life Sciences) was added alone for basal and with 10 nM insulin for stimulated glucose uptake. 10 minutes later, L6 myotubes were placed on ice, washed with ice-cold phosphate buffered saline, and lysed in 0.1% sodium dodecyl sulfate. It was then transferred to vials with scintillation cocktail for counting and an aliquot taken for protein estimation by Bicinchoninic acid method (ThermoFisher Pierce). Uptake of 2-deoxyglucose was then quantified by liquid scintillation counter and expressed per mg of protein.
Table 1: Two-way ANOVA test between insulin-stimulated and AS-induced glucose uptake (p < 0.05)
RESULTS
The results were analyzed using GraphPad Prism software version 6. Two-way analysis of variance (ANOVA) and Bonferroni's multiple comparison were done.
Table 1 depicts two-way ANOVA that showed a significant difference (p 0.0137) for the interaction between sweetener and insulin and (p < 0.0001) for the effect of different concentrations of sucralose on glucose uptake.
Table 2 depicts Bonferroni's multiple comparison tests. There was significant increase in stimulated untreated glucose uptake compared with basal untreated uptake. Significant decrease was also observed between stimulated untreated vs stimulated sucralose of 1 nM, 1 µM, and 1 mM glucose uptake. Our study shows an increasing suppression of glucose uptake as sucralose concentration was increased.
Graph 1 shows basal and stimulated glucose uptake vs different concentrations of sucralose.
DISCUSSION
The AS act through a sweet-taste receptor, which is a transmembrane protein present in the cell membrane, i.e., coupled to a G-protein. It is a dimer of T1R2 and T1R3 proteins. It is present in tongue and other nongustatory sites like intestine, brain, adipocytes, muscle, etc. Binding of a sweet compound to the receptor causes dissociation of α-gustducin from the receptor and activates phospholipase C-β2. Elevation of cytoplasmic calcium concentration [Ca2+]i and subsequent activation of sodium-permeable TRPM5 channel are critical to sweet sensation. Stimulation of the T1R2/T1R3 taste receptor activates peripheral gustatory nerves and, in turn, brain gustatory pathways. Sweet-tasting compounds, such as sugars and low-energy sweeteners, can bind to and stimulate the sweet-taste receptor. 26 Nakagawa et al 27 have studied the mechanism of action of four different AS including sucralose in MIN6
Table 2: Bonferroni's multiple comparison test for untreated stimulated vs stimulated sucralose conditions
CI: Confidence interval
cells. They have found that all the four AS evoke different cellular responses and were inhibited by different substances. Sucralose induced elevation of [Ca2+]i and [cAMP]i and was inhibited by gurmarin, an antagonist of the sweet-taste receptor. Masubuchi et al 28 have shown that the sweet-taste receptor in 3T3 L1 cells was distinct from the one seen in tongue and may activate a different signaling pathway. Simon et al 29 have shown that these AS can act even in T1R2/T1R3 knockdown cells. This implies that they could be acting through other receptors that have not yet been identified.
In our study, we observed that sucralose decreased glucose uptake in insulin-stimulated condition across all the concentrations studied. This suppression of uptake increased with increase in concentration of sucralose as shown in Graph 1. This is in accordance with Suez et al 23 and Pepino et al 24 who suggest that AS could cause insulin resistance in human subjects. Pepino et al 24 found that ingestion of sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and glucose-stimulated insulin secretion in subjects with obesity. Sucralose also tended to increase plasma glucose-dependent insulinotropic peptide concentration, and could promote insulin resistance. Approximately 20% higher than normal concentrations of insulin were required to maintain same glycemia when obese subjects consumed sucralose than when they consumed water before glucose ingestion. Sucralose has been shown to increase glucose-stimulated insulin secretion in mouse insulinoma–MIN6 cell line and mouse and rat islet cells. 30,31 It also increased secretion of glucagonlike polypeptide-1 in human L cell line NCI-H716. 30
There are several studies on the effect of sucralose and other AS in various other cell lines. But we found studies with effect of other AS on glucose uptake. In a study done by Simon et al, 29 saccharin AS increased adipogenesis and glucose uptake in 3T3L1 adipocytes, but sucralose caused mild inhibition of adipogenesis. They studied 0.45 and 4.5 mM saccharin concentrations, which are greater than the expected physiological concentration (approximately 75 µM), and these concentrations are much higher than what we have used in our study. Bhasker et al 32 reported increased glucose uptake with naturally occurring AS in diabetes-induced L6 cells. These differences could be attributed to the difference in cell type (3T3L1 and diabetes-induced L6) and/or the type of AS and/or mode of action through different receptors. Therefore, further studies are required to elucidate the receptor and signaling pathways for sucralose.
CONCLUSION
From our study, we have seen a decrease in insulinstimulated glucose uptake with sucralose. Increase in concentration of sucralose decreased the uptake further. Hence, it may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.
ACKNOWLEDGMENT
Authors would like to thank Prof Matthew Watt for support, encouragement, and infrastructure to carry out the work in his Biology of Lipid Metabolism laboratory, Department of Physiology, Monash University, Melbourne.
REFERENCES
1. Overduin J, Collet TH, Medic N, Henning E, Keogh JM, Forsyth F, Stephenson C, Kanning MW, Ruijschop RM, Farooqi IS, et al. Failure of sucrose replacement with the non-nutritive sweetener erythritol to alter GLP-1 or PYY release or test meal size in lean or obese people. Appetite 2016 Dec;107:596-603.
2. van Eyk AD. The effect of five artificial sweeteners on CaCO2, HT-29 and HEK-293 cells. Drug Chem Toxicol 2015 Oct;38(3):318-327.
3. Sharma A, Amarnath S, Thulasimani M, Ramaswamy S. Artificial sweeteners as a sugar substitute: are they really safe? Indian J Pharmacol 2016 May-Jun;48(3):237-240.
4. Dhingra R, Sullivan L, Jacques PF, Wang TJ, Fox CS, Meigs JB, D'Agostino RB, Gaziano JM, Vasan RS. Soft drink consumption and risk of developing cardiometabolic risk factors and the metabolic syndrome in middle-aged adults in the community. Circulation 2007 Jul;116(5):480-488.
5. Fowler SP, Williams K, Resendez RG, Hunt KJ, Hazuda HP, Stern MP. Fueling the obesity epidemic? Artificially sweetened beverage use and long-term weight gain. Obesity (Silver Spring) 2008 Aug;16(8):1894-1900.
6. Fowler SP, Williams K, Hazuda HP. Diet soda intake is associated with long-term increases in waist circumference in a biethnic cohort of older adults: the San Antonio Longitudinal Study of Aging. J Am Geriatr Soc 2015 Apr;63(4):708-715.
7. Gallus S, Scotti L, Negri E, Talamini R, Franceschi S, Montella M, Giacosa A, Dal Maso L, La Vecchia C. Artificial sweeteners and
cancer risk in a network of case-control studies. Ann Oncol 2007 Jan;18(1):40-44.
8. Renwick AG. The intake of intense sweeteners – an update review. Food Addit Contam 2006 Apr;23(4):327-338.
9. Tandel KR. Sugar substitutes: health controversy over perceived benefits. J Pharmacol Pharmacother 2011 Oct;2(4): 236-243.
10. Magnuson BA, Carakostas MC, Moore NH, Poulos SP, Renwick AG. Biological fate of low-calorie sweeteners. Nutr Rev 2016 Nov;74(11):670-689.
11. Schiffman SS, Rother KI. Sucralose, a synthetic organochlorine sweetener: overview of biological issues. J Toxicol Environ Health B Crit Rev 2013 Sep;16(7):399-451.
12. Mezitis NH, Maggio CA, Koch P, Quddoos A, Allison DB, Pi-Sunyer FX. Glycemic effect of a single high oral dose of the novel sweetener sucralose in patients with diabetes. Diabetes Care 1996 Sep;19(9):1004-1005.
13. Grotz VL, Henry RR, McGill JB, Prince MJ, Shamoon H, Trout JR, Pi-Sunyer FX. Lack of effect of sucralose on glucose homeostasis in subjects with type 2 diabetes. J Am Diet Assoc 2003 Dec;103(12):1607-1612.
14. Baird IM, Shephard NW, Merritt RJ, Hildick-Smith G. Repeated dose study of sucralose tolerance in human subjects. Food Chem Toxicol 2000 Feb;38(Suppl 2):S123-S129.
15. Ma J, Chang J, Checklin HL, Young RL, Jones KL, Horowitz M, Rayner CK. Effect of the artificial sweetener, sucralose, on small intestinal glucose absorption in healthy human subjects. Br J Nutr 2010 Sep;104(6):803-806.
16. Ford HE, Peters V, Martin NM, Sleeth ML, Ghatei MA, Frost GS, Bloom SR. Effects of oral ingestion of sucralose on gut hormone response and appetite in healthy normal-weight subjects. Eur J Clin Nutr 2011 Apr;65(4):508-513.
17. Wu T, Zhao BR, Bound MJ, Checklin HL, Bellon M, Little TJ, Young RL, Jones KL, Horowitz M, Rayner CK. Effects of different sweet preloads on incretin hormone secretion, gastric emptying, and postprandial glycemia in healthy humans. Am J Clin Nutr 2012 Jan;95(1):78-83.
18. Brown AW, Bohan Brown MM, Onken KL, Beitz DC. Shortterm consumption of sucralose, a nonnutritive sweetener, is similar to water with regard to select markers of hunger signaling and short-term glucose homeostasis in women. Nutr Res 2011 Dec;31(12):882-888.
19. Wu T, Bound MJ, Standfield SD, Bellon M, Young RL, Jones KL, Horowitz M, Rayner CK. Artificial sweeteners have no effect on gastric emptying, glucagon-like peptide-1, or glycemia after oral glucose in healthy humans. Diabetes Care 2013 Dec;36(12):e202-e203.
20. Stellman SD, Garfinkel L. Artificial sweetener use and one-year weight change among
|
women.
|
Prev Med 1986 Mar;15(2):195-202.
21. Colditz GA, Willett WC, Stampfer MJ, London SJ, Segal MR, Speizer FE. Patterns of weight change and their relation to diet in a cohort of healthy women. Am J Clin Nutr 1990 Jun;51(6):1100-1105.
22. Duffey KJ, Popkin BM. Adults with healthier dietary patterns have healthier beverage patterns. J Nutr 2006 Nov;136(11): 2901-2907.
23. Suez J, Korem T, Zeevi D, Zilberman-Schapira G, Thaiss GA, Maza O, Israeli D, Zmora N, Gilad S, Weinberger A, et al. Artificial sweeteners induce glucose intolerance by altering the gut microbiota. Nature 2014 Oct;514(7521):181-186.
24. Pepino MY, Tiemann CD, Patterson BW, Wice BM, Klein S. Sucralose affects glycemic and hormonal responses to an oral glucose load. Diabetes Care 2013 Sep;36(9):2530-2535.
25. Romo-Romo A, Aguilar-Salinas CA, Brito-Córdova GX, Gómez Díaz RA, Vilchis Valentín D, Almeda-Valdes P. Effects of the non-nutritive sweeteners on glucose metabolism and appetite regulating hormones: systematic review of observational prospective studies and clinical trials. PLoS One 2016 Aug;11(8):e0161264.
26. Renwick AG, Molinary SV. Sweet-taste receptors, low-energy sweeteners, glucose absorption and insulin release. Br J Nutr 2010 Nov;104(10):1415-1420.
27. Nakagawa Y, Nagasawa M, Mogami H, Lohse M, Ninomiya Y, Kojima I. Multimodal function of the sweet taste receptor expressed in pancreatic β-cells: generation of diverse patterns of intracellular signals by sweet agonists. Endocr J 2013 Aug;60(10): 1191-1206.
28. Masubuchi Y, Nakagawa Y, Ma J, Sasaki T, Kitamura T, Yamamoto Y, Kurose H, Kojima I, Shibata H. A novel regulatory function of sweet taste-sensing receptor in adipogenic differentiation of 3T3-L1 cells. PLoS One 2013 Jan;8(1):e54500.
29. Simon BR, Parlee SD, Learman BS, Mori H, Scheller EL, Cawthorn WP, Ning X, Gallagher K, Tyrberg B, Assadi-Porter FM, et al. Artificial sweeteners stimulate adipogenesis and suppress lipolysis independently of sweet taste receptors. J Biol Chem 2013 Nov;288(45):32475-32489.
30. Jang HJ, Kokrashvili Z, Theodorakis MJ, Carlson OD, Kim BJ, Zhou J, Kim HH, Xu X, Chan SL, Juhaszova M, et al. Gut-expressed gustducin and taste receptors regulate secretion of glucagonlike peptide-1. Proc Natl Acad Sci U S A 2007 Sep;104(38): 15069-15074.
31. Nakagawa Y, Nagasawa M, Yamada S, Hara A, Mogami H, Nikolaev VO, Lohse MJ, Shigemura N, Ninomiya Y, Kojima I. Sweet taste receptor expressed in pancreatic ß-cells activates the calcium and cyclic AMP signaling systems and stimulates insulin secretion. PLoS One 2009 Apr;4(4):e5106.
32. Bhasker S, Madhav H, Chinnamma M. Molecular evidence of insulinomimetic property exhibited by steviol and stevioside in diabetes induced L6 and 3T3L1 cells. Phytomedicine 2015 Oct;22(11):1037-1044.
| 16,022
|
beginning_of_word
|
women.
|
remove_one_sentence
|
<url>
https://www.ijmb.in/doi/IJMB/pdf/10.5005/jp-journals-10054-0042
</url>
<text>
Shubha N Prakash et al
Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes
1Shubha N Prakash, 2Jayakumari Shanthakumari, 3Anitha Devanath
ABSTRACT
Introduction: With growing awareness of the link between diet and health and the problem of obesity, public concern over sugar levels in the diet is forcing a worldwide trend toward cutting down on sugar by using artificial sweeteners (AS).
Aim: To study the effect of increasing concentrations of sucralose (an AS) on glucose uptake in rat L6 myotubes.
Materials and methods: The L6 cell line from American type cell culture (ATCC) was grown in Dulbecco's Modified Eagle's Medium (DMEM) and differentiated into myotubes. The wells were exposed to either 0, 1 nM, 1 µM, or 1 mM of sucralose alone or with 10 nM insulin for 24 hours. Glucose uptake was studied after this period.
Results: Significant decrease was seen between the insulinstimulated basal glucose uptake and insulin-stimulated glucose uptake across all the concentrations of sucralose treatment.
Conclusion: Increased concentration of sucralose appears to decrease glucose uptake even on insulin stimulation.
including candy, chewing gum, ice cream, soft drinks, jellies, yogurt, fruit juice, and baked goods. They are also present in some pharmaceutical products, which include cough drops, cough syrups, certain medications, and vitamins. 2 Health awareness and adopting "healthier" diets in the quest to quell metabolic disorders and diseases are increasing. 3 People who are overweight/obese or diabetics consume these substances to control their dietary intake of table sugar and body weight. 2 However, several common AS, e.g., aspartame, sucralose, and saccharin, have been the subjects of enduring controversy due to observational and laboratory studies indicating an association of AS consumption with increased appetite, food intake, weight gain, and glucose intolerance. 1,4-6 It is still debatable whether increased AS or nonnutritive sweetener (NNS) consumption has any adverse effects on obesity and diabetes management. 2,7-9
Clinical significance: It may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.
Keywords: Artificial sweetener, Glucose uptake, Sucralose.
How to cite this article: Prakash SN, Shanthakumari J, Devanath A. Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes. Indian J Med Biochem 2017;21(2):162-165.
Source of support: Nil
Conflict of interest: None
INTRODUCTION
The use of low-calorific/noncalorific/AS as substitutes for sugar has increased markedly in the past decades, reflecting widespread attempts to reduce energy consumption and combat the rising prevalence of obesity. 1 These sweeteners are 30 to 13,000 times sweeter than table sugar. These sugar substitutes are used in a variety of food substances labeled as "diet" or "sugar free"
1Assistant Professor, 2Professor Grade II, 3Professor
1-3Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India
Corresponding Author: Jayakumari Shanthakumari, Professor Grade II, Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India, Phone: +919880259248, e-mail: [email protected]
Sucralose is an intensely sweet compound that has a sweetening potency approximately 600 times that of sucrose. Unlike sugar, the glycosidic linkage of this substituted disaccharide is apparently unavailable to the enzymes that cleave it. Ingested sucralose is neither metabolized to its monosaccharide-like moieties nor is it a source of energy. Therefore, it is not digested and about 15 to 20% is absorbed as such and completely excreted within 72 hours in urine. Its acceptable daily intake (ADI) is 0 to 15 mg/kg/d. 10 Sucralose undergoes thermal decomposition above 119°C and forms chloropropanols with glycerol, which are carcinogenic. 11 However, it is used in beverages and other foods, including those undergoing heat treatments, such as baked goods. Data from some studies, conducted in human subjects with and without diabetes, found that even extremely high doses of sucralose (many times above the ADI) did not have adverse effects. 12-19 However, some other studies found weight gain and metabolic disturbances. 4,5,20-22
Suez et al 23 have shown that consumption of AS can lead to glucose intolerance. Pepino et al 24 in a review have shown that, in obese individuals, sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and insulin secretion in response to glucose stimulation. Alonso Romo-Romo et al, 25 in a systematic review, have observed that obesity could be a possible confounding factor for the associations found in some of the observational studies bwtween NNS consumption and the development of metabolic diseases.
They also suggested that further studies are required to probe the effect of AS on carbohydrate metabolism.
Therefore, we wanted to study the effect of sucralose on glucose uptake in muscle cells. We selected rat L6 cells as this cell line has shown to be most sensitive to insulin.
AIM
To study the effect of sucralose on glucose uptake in L6 cell line.
MATERIALS AND METHODS
Cell Culture
The L6 cells from the ATCC were grown in DMEM with 4 mM L-glutamine adjusted to contain 1.5 g/L sodium bicarbonate, 1 g/L glucose, and 1 mM sodium pyruvate (Gibco) with 10% fetal bovine serum (FBS) in an incubator at 37°C with 5% CO2. Medium was changed every 2 to 3 days. Once the myoblasts were grown to confluence in a 24-well plate, the media were replaced with DMEM containing 2% FBS to induce differentiation into myotubes. Full differentiation took about 7 to 8 days. A day prior to experiment, half of the plates (12 wells) were incubated with 0, 1 nM, 1 μM, or 1 mM of sucralose alone and another half with the increasing concentration of sucralose and 10 nM insulin for 24 hours. After this incubation, glucose uptake was studied.
Glucose Uptake
All experiments were done in triplicate. After 24-hour incubation with AS, L6 myotubes were incubated with deoxyglucose in no-glucose DMEM media for 10 minutes. After 10 minutes, 0.1 μCi/mL 2-deoxy[3H] glucose (PerkinElmer Life Sciences) was added alone for basal and with 10 nM insulin for stimulated glucose uptake. 10 minutes later, L6 myotubes were placed on ice, washed with ice-cold phosphate buffered saline, and lysed in 0.1% sodium dodecyl sulfate. It was then transferred to vials with scintillation cocktail for counting and an aliquot taken for protein estimation by Bicinchoninic acid method (ThermoFisher Pierce). Uptake of 2-deoxyglucose was then quantified by liquid scintillation counter and expressed per mg of protein.
Table 1: Two-way ANOVA test between insulin-stimulated and AS-induced glucose uptake (p < 0.05)
RESULTS
The results were analyzed using GraphPad Prism software version 6. Two-way analysis of variance (ANOVA) and Bonferroni's multiple comparison were done.
Table 1 depicts two-way ANOVA that showed a significant difference (p 0.0137) for the interaction between sweetener and insulin and (p < 0.0001) for the effect of different concentrations of sucralose on glucose uptake.
Table 2 depicts Bonferroni's multiple comparison tests. There was significant increase in stimulated untreated glucose uptake compared with basal untreated uptake. Significant decrease was also observed between stimulated untreated vs stimulated sucralose of 1 nM, 1 µM, and 1 mM glucose uptake. Our study shows an increasing suppression of glucose uptake as sucralose concentration was increased.
Graph 1 shows basal and stimulated glucose uptake vs different concentrations of sucralose.
DISCUSSION
The AS act through a sweet-taste receptor, which is a transmembrane protein present in the cell membrane, i.e., coupled to a G-protein. It is a dimer of T1R2 and T1R3 proteins. It is present in tongue and other nongustatory sites like intestine, brain, adipocytes, muscle, etc. Binding of a sweet compound to the receptor causes dissociation of α-gustducin from the receptor and activates phospholipase C-β2. Elevation of cytoplasmic calcium concentration [Ca2+]i and subsequent activation of sodium-permeable TRPM5 channel are critical to sweet sensation. Stimulation of the T1R2/T1R3 taste receptor activates peripheral gustatory nerves and, in turn, brain gustatory pathways. Sweet-tasting compounds, such as sugars and low-energy sweeteners, can bind to and stimulate the sweet-taste receptor. 26 Nakagawa et al 27 have studied the mechanism of action of four different AS including sucralose in MIN6
Table 2: Bonferroni's multiple comparison test for untreated stimulated vs stimulated sucralose conditions
CI: Confidence interval
cells. They have found that all the four AS evoke different cellular responses and were inhibited by different substances. Sucralose induced elevation of [Ca2+]i and [cAMP]i and was inhibited by gurmarin, an antagonist of the sweet-taste receptor. Masubuchi et al 28 have shown that the sweet-taste receptor in 3T3 L1 cells was distinct from the one seen in tongue and may activate a different signaling pathway. Simon et al 29 have shown that these AS can act even in T1R2/T1R3 knockdown cells. This implies that they could be acting through other receptors that have not yet been identified.
In our study, we observed that sucralose decreased glucose uptake in insulin-stimulated condition across all the concentrations studied. This suppression of uptake increased with increase in concentration of sucralose as shown in Graph 1. This is in accordance with Suez et al 23 and Pepino et al 24 who suggest that AS could cause insulin resistance in human subjects. Pepino et al 24 found that ingestion of sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and glucose-stimulated insulin secretion in subjects with obesity. Sucralose also tended to increase plasma glucose-dependent insulinotropic peptide concentration, and could promote insulin resistance. Approximately 20% higher than normal concentrations of insulin were required to maintain same glycemia when obese subjects consumed sucralose than when they consumed water before glucose ingestion. Sucralose has been shown to increase glucose-stimulated insulin secretion in mouse insulinoma–MIN6 cell line and mouse and rat islet cells. 30,31 It also increased secretion of glucagonlike polypeptide-1 in human L cell line NCI-H716. 30
There are several studies on the effect of sucralose and other AS in various other cell lines. But we found studies with effect of other AS on glucose uptake. In a study done by Simon et al, 29 saccharin AS increased adipogenesis and glucose uptake in 3T3L1 adipocytes, but sucralose caused mild inhibition of adipogenesis. They studied 0.45 and 4.5 mM saccharin concentrations, which are greater than the expected physiological concentration (approximately 75 µM), and these concentrations are much higher than what we have used in our study. Bhasker et al 32 reported increased glucose uptake with naturally occurring AS in diabetes-induced L6 cells. These differences could be attributed to the difference in cell type (3T3L1 and diabetes-induced L6) and/or the type of AS and/or mode of action through different receptors. Therefore, further studies are required to elucidate the receptor and signaling pathways for sucralose.
CONCLUSION
From our study, we have seen a decrease in insulinstimulated glucose uptake with sucralose. Increase in concentration of sucralose decreased the uptake further. Hence, it may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.
ACKNOWLEDGMENT
Authors would like to thank Prof Matthew Watt for support, encouragement, and infrastructure to carry out the work in his Biology of Lipid Metabolism laboratory, Department of Physiology, Monash University, Melbourne.
REFERENCES
1. Overduin J, Collet TH, Medic N, Henning E, Keogh JM, Forsyth F, Stephenson C, Kanning MW, Ruijschop RM, Farooqi IS, et al. Failure of sucrose replacement with the non-nutritive sweetener erythritol to alter GLP-1 or PYY release or test meal size in lean or obese people. Appetite 2016 Dec;107:596-603.
2. van Eyk AD. The effect of five artificial sweeteners on CaCO2, HT-29 and HEK-293 cells. Drug Chem Toxicol 2015 Oct;38(3):318-327.
3. Sharma A, Amarnath S, Thulasimani M, Ramaswamy S. Artificial sweeteners as a sugar substitute: are they really safe? Indian J Pharmacol 2016 May-Jun;48(3):237-240.
4. Dhingra R, Sullivan L, Jacques PF, Wang TJ, Fox CS, Meigs JB, D'Agostino RB, Gaziano JM, Vasan RS. Soft drink consumption and risk of developing cardiometabolic risk factors and the metabolic syndrome in middle-aged adults in the community. Circulation 2007 Jul;116(5):480-488.
5. Fowler SP, Williams K, Resendez RG, Hunt KJ, Hazuda HP, Stern MP. Fueling the obesity epidemic? Artificially sweetened beverage use and long-term weight gain. Obesity (Silver Spring) 2008 Aug;16(8):1894-1900.
6. Fowler SP, Williams K, Hazuda HP. Diet soda intake is associated with long-term increases in waist circumference in a biethnic cohort of older adults: the San Antonio Longitudinal Study of Aging. J Am Geriatr Soc 2015 Apr;63(4):708-715.
7. Gallus S, Scotti L, Negri E, Talamini R, Franceschi S, Montella M, Giacosa A, Dal Maso L, La Vecchia C. Artificial sweeteners and
cancer risk in a network of case-control studies. Ann Oncol 2007 Jan;18(1):40-44.
8. Renwick AG. The intake of intense sweeteners – an update review. Food Addit Contam 2006 Apr;23(4):327-338.
9. Tandel KR. Sugar substitutes: health controversy over perceived benefits. J Pharmacol Pharmacother 2011 Oct;2(4): 236-243.
10. Magnuson BA, Carakostas MC, Moore NH, Poulos SP, Renwick AG. Biological fate of low-calorie sweeteners. Nutr Rev 2016 Nov;74(11):670-689.
11. Schiffman SS, Rother KI. Sucralose, a synthetic organochlorine sweetener: overview of biological issues. J Toxicol Environ Health B Crit Rev 2013 Sep;16(7):399-451.
12. Mezitis NH, Maggio CA, Koch P, Quddoos A, Allison DB, Pi-Sunyer FX. Glycemic effect of a single high oral dose of the novel sweetener sucralose in patients with diabetes. Diabetes Care 1996 Sep;19(9):1004-1005.
13. Grotz VL, Henry RR, McGill JB, Prince MJ, Shamoon H, Trout JR, Pi-Sunyer FX. Lack of effect of sucralose on glucose homeostasis in subjects with type 2 diabetes. J Am Diet Assoc 2003 Dec;103(12):1607-1612.
14. Baird IM, Shephard NW, Merritt RJ, Hildick-Smith G. Repeated dose study of sucralose tolerance in human subjects. Food Chem Toxicol 2000 Feb;38(Suppl 2):S123-S129.
15. Ma J, Chang J, Checklin HL, Young RL, Jones KL, Horowitz M, Rayner CK. Effect of the artificial sweetener, sucralose, on small intestinal glucose absorption in healthy human subjects. Br J Nutr 2010 Sep;104(6):803-806.
16. Ford HE, Peters V, Martin NM, Sleeth ML, Ghatei MA, Frost GS, Bloom SR. Effects of oral ingestion of sucralose on gut hormone response and appetite in healthy normal-weight subjects. Eur J Clin Nutr 2011 Apr;65(4):508-513.
17. Wu T, Zhao BR, Bound MJ, Checklin HL, Bellon M, Little TJ, Young RL, Jones KL, Horowitz M, Rayner CK. Effects of different sweet preloads on incretin hormone secretion, gastric emptying, and postprandial glycemia in healthy humans. Am J Clin Nutr 2012 Jan;95(1):78-83.
18. Brown AW, Bohan Brown MM, Onken KL, Beitz DC. Shortterm consumption of sucralose, a nonnutritive sweetener, is similar to water with regard to select markers of hunger signaling and short-term glucose homeostasis in women. Nutr Res 2011 Dec;31(12):882-888.
19. Wu T, Bound MJ, Standfield SD, Bellon M, Young RL, Jones KL, Horowitz M, Rayner CK. Artificial sweeteners have no effect on gastric emptying, glucagon-like peptide-1, or glycemia after oral glucose in healthy humans. Diabetes Care 2013 Dec;36(12):e202-e203.
20. Stellman SD, Garfinkel L. Artificial sweetener use and one-year weight change among <cursor_is_here> Prev Med 1986 Mar;15(2):195-202.
21. Colditz GA, Willett WC, Stampfer MJ, London SJ, Segal MR, Speizer FE. Patterns of weight change and their relation to diet in a cohort of healthy women. Am J Clin Nutr 1990 Jun;51(6):1100-1105.
22. Duffey KJ, Popkin BM. Adults with healthier dietary patterns have healthier beverage patterns. J Nutr 2006 Nov;136(11): 2901-2907.
23. Suez J, Korem T, Zeevi D, Zilberman-Schapira G, Thaiss GA, Maza O, Israeli D, Zmora N, Gilad S, Weinberger A, et al. Artificial sweeteners induce glucose intolerance by altering the gut microbiota. Nature 2014 Oct;514(7521):181-186.
24. Pepino MY, Tiemann CD, Patterson BW, Wice BM, Klein S. Sucralose affects glycemic and hormonal responses to an oral glucose load. Diabetes Care 2013 Sep;36(9):2530-2535.
25. Romo-Romo A, Aguilar-Salinas CA, Brito-Córdova GX, Gómez Díaz RA, Vilchis Valentín D, Almeda-Valdes P. Effects of the non-nutritive sweeteners on glucose metabolism and appetite regulating hormones: systematic review of observational prospective studies and clinical trials. PLoS One 2016 Aug;11(8):e0161264.
26. Renwick AG, Molinary SV. Sweet-taste receptors, low-energy sweeteners, glucose absorption and insulin release. Br J Nutr 2010 Nov;104(10):1415-1420.
27. Nakagawa Y, Nagasawa M, Mogami H, Lohse M, Ninomiya Y, Kojima I. Multimodal function of the sweet taste receptor expressed in pancreatic β-cells: generation of diverse patterns of intracellular signals by sweet agonists. Endocr J 2013 Aug;60(10): 1191-1206.
28. Masubuchi Y, Nakagawa Y, Ma J, Sasaki T, Kitamura T, Yamamoto Y, Kurose H, Kojima I, Shibata H. A novel regulatory function of sweet taste-sensing receptor in adipogenic differentiation of 3T3-L1 cells. PLoS One 2013 Jan;8(1):e54500.
29. Simon BR, Parlee SD, Learman BS, Mori H, Scheller EL, Cawthorn WP, Ning X, Gallagher K, Tyrberg B, Assadi-Porter FM, et al. Artificial sweeteners stimulate adipogenesis and suppress lipolysis independently of sweet taste receptors. J Biol Chem 2013 Nov;288(45):32475-32489.
30. Jang HJ, Kokrashvili Z, Theodorakis MJ, Carlson OD, Kim BJ, Zhou J, Kim HH, Xu X, Chan SL, Juhaszova M, et al. Gut-expressed gustducin and taste receptors regulate secretion of glucagonlike peptide-1. Proc Natl Acad Sci U S A 2007 Sep;104(38): 15069-15074.
31. Nakagawa Y, Nagasawa M, Yamada S, Hara A, Mogami H, Nikolaev VO, Lohse MJ, Shigemura N, Ninomiya Y, Kojima I. Sweet taste receptor expressed in pancreatic ß-cells activates the calcium and cyclic AMP signaling systems and stimulates insulin secretion. PLoS One 2009 Apr;4(4):e5106.
32. Bhasker S, Madhav H, Chinnamma M. Molecular evidence of insulinomimetic property exhibited by steviol and stevioside in diabetes induced L6 and 3T3L1 cells. Phytomedicine 2015 Oct;22(11):1037-1044.
</text>
|
[
{
"content": "<url>\nhttps://www.ijmb.in/doi/IJMB/pdf/10.5005/jp-journals-10054-0042\n</url>\n<text>\nShubha N Prakash et al\n\nEffect of Sucralose on Glucose Uptake in Rat L6 Myotubes\n\n1Shubha N Prakash, 2Jayakumari Shanthakumari, 3Anitha Devanath\n\nABSTRACT\n\nIntroduction: With growing awareness of the link between diet and health and the problem of obesity, public concern over sugar levels in the diet is forcing a worldwide trend toward cutting down on sugar by using artificial sweeteners (AS).\n\nAim: To study the effect of increasing concentrations of sucralose (an AS) on glucose uptake in rat L6 myotubes.\n\nMaterials and methods: The L6 cell line from American type cell culture (ATCC) was grown in Dulbecco's Modified Eagle's Medium (DMEM) and differentiated into myotubes. The wells were exposed to either 0, 1 nM, 1 µM, or 1 mM of sucralose alone or with 10 nM insulin for 24 hours. Glucose uptake was studied after this period.\n\nResults: Significant decrease was seen between the insulinstimulated basal glucose uptake and insulin-stimulated glucose uptake across all the concentrations of sucralose treatment.\n\nConclusion: Increased concentration of sucralose appears to decrease glucose uptake even on insulin stimulation.\n\nincluding candy, chewing gum, ice cream, soft drinks, jellies, yogurt, fruit juice, and baked goods. They are also present in some pharmaceutical products, which include cough drops, cough syrups, certain medications, and vitamins. 2 Health awareness and adopting \"healthier\" diets in the quest to quell metabolic disorders and diseases are increasing. 3 People who are overweight/obese or diabetics consume these substances to control their dietary intake of table sugar and body weight. 2 However, several common AS, e.g., aspartame, sucralose, and saccharin, have been the subjects of enduring controversy due to observational and laboratory studies indicating an association of AS consumption with increased appetite, food intake, weight gain, and glucose intolerance. 1,4-6 It is still debatable whether increased AS or nonnutritive sweetener (NNS) consumption has any adverse effects on obesity and diabetes management. 2,7-9\n\nClinical significance: It may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.\n\nKeywords: Artificial sweetener, Glucose uptake, Sucralose.\n\nHow to cite this article: Prakash SN, Shanthakumari J, Devanath A. Effect of Sucralose on Glucose Uptake in Rat L6 Myotubes. Indian J Med Biochem 2017;21(2):162-165.\n\nSource of support: Nil\n\nConflict of interest: None\n\nINTRODUCTION\n\nThe use of low-calorific/noncalorific/AS as substitutes for sugar has increased markedly in the past decades, reflecting widespread attempts to reduce energy consumption and combat the rising prevalence of obesity. 1 These sweeteners are 30 to 13,000 times sweeter than table sugar. These sugar substitutes are used in a variety of food substances labeled as \"diet\" or \"sugar free\"\n\n1Assistant Professor, 2Professor Grade II, 3Professor\n\n1-3Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India\n\nCorresponding Author: Jayakumari Shanthakumari, Professor Grade II, Department of Biochemistry, St. John's Medical College Bengaluru, Karnataka, India, Phone: +919880259248, e-mail: [email protected]\n\nSucralose is an intensely sweet compound that has a sweetening potency approximately 600 times that of sucrose. Unlike sugar, the glycosidic linkage of this substituted disaccharide is apparently unavailable to the enzymes that cleave it. Ingested sucralose is neither metabolized to its monosaccharide-like moieties nor is it a source of energy. Therefore, it is not digested and about 15 to 20% is absorbed as such and completely excreted within 72 hours in urine. Its acceptable daily intake (ADI) is 0 to 15 mg/kg/d. 10 Sucralose undergoes thermal decomposition above 119°C and forms chloropropanols with glycerol, which are carcinogenic. 11 However, it is used in beverages and other foods, including those undergoing heat treatments, such as baked goods. Data from some studies, conducted in human subjects with and without diabetes, found that even extremely high doses of sucralose (many times above the ADI) did not have adverse effects. 12-19 However, some other studies found weight gain and metabolic disturbances. 4,5,20-22\n\nSuez et al 23 have shown that consumption of AS can lead to glucose intolerance. Pepino et al 24 in a review have shown that, in obese individuals, sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and insulin secretion in response to glucose stimulation. Alonso Romo-Romo et al, 25 in a systematic review, have observed that obesity could be a possible confounding factor for the associations found in some of the observational studies bwtween NNS consumption and the development of metabolic diseases.\n\nThey also suggested that further studies are required to probe the effect of AS on carbohydrate metabolism.\n\nTherefore, we wanted to study the effect of sucralose on glucose uptake in muscle cells. We selected rat L6 cells as this cell line has shown to be most sensitive to insulin.\n\nAIM\n\nTo study the effect of sucralose on glucose uptake in L6 cell line.\n\nMATERIALS AND METHODS\n\nCell Culture\n\nThe L6 cells from the ATCC were grown in DMEM with 4 mM L-glutamine adjusted to contain 1.5 g/L sodium bicarbonate, 1 g/L glucose, and 1 mM sodium pyruvate (Gibco) with 10% fetal bovine serum (FBS) in an incubator at 37°C with 5% CO2. Medium was changed every 2 to 3 days. Once the myoblasts were grown to confluence in a 24-well plate, the media were replaced with DMEM containing 2% FBS to induce differentiation into myotubes. Full differentiation took about 7 to 8 days. A day prior to experiment, half of the plates (12 wells) were incubated with 0, 1 nM, 1 μM, or 1 mM of sucralose alone and another half with the increasing concentration of sucralose and 10 nM insulin for 24 hours. After this incubation, glucose uptake was studied.\n\nGlucose Uptake\n\nAll experiments were done in triplicate. After 24-hour incubation with AS, L6 myotubes were incubated with deoxyglucose in no-glucose DMEM media for 10 minutes. After 10 minutes, 0.1 μCi/mL 2-deoxy[3H] glucose (PerkinElmer Life Sciences) was added alone for basal and with 10 nM insulin for stimulated glucose uptake. 10 minutes later, L6 myotubes were placed on ice, washed with ice-cold phosphate buffered saline, and lysed in 0.1% sodium dodecyl sulfate. It was then transferred to vials with scintillation cocktail for counting and an aliquot taken for protein estimation by Bicinchoninic acid method (ThermoFisher Pierce). Uptake of 2-deoxyglucose was then quantified by liquid scintillation counter and expressed per mg of protein.\n\nTable 1: Two-way ANOVA test between insulin-stimulated and AS-induced glucose uptake (p < 0.05)\n\nRESULTS\n\nThe results were analyzed using GraphPad Prism software version 6. Two-way analysis of variance (ANOVA) and Bonferroni's multiple comparison were done.\n\nTable 1 depicts two-way ANOVA that showed a significant difference (p 0.0137) for the interaction between sweetener and insulin and (p < 0.0001) for the effect of different concentrations of sucralose on glucose uptake.\n\nTable 2 depicts Bonferroni's multiple comparison tests. There was significant increase in stimulated untreated glucose uptake compared with basal untreated uptake. Significant decrease was also observed between stimulated untreated vs stimulated sucralose of 1 nM, 1 µM, and 1 mM glucose uptake. Our study shows an increasing suppression of glucose uptake as sucralose concentration was increased.\n\nGraph 1 shows basal and stimulated glucose uptake vs different concentrations of sucralose.\n\nDISCUSSION\n\nThe AS act through a sweet-taste receptor, which is a transmembrane protein present in the cell membrane, i.e., coupled to a G-protein. It is a dimer of T1R2 and T1R3 proteins. It is present in tongue and other nongustatory sites like intestine, brain, adipocytes, muscle, etc. Binding of a sweet compound to the receptor causes dissociation of α-gustducin from the receptor and activates phospholipase C-β2. Elevation of cytoplasmic calcium concentration [Ca2+]i and subsequent activation of sodium-permeable TRPM5 channel are critical to sweet sensation. Stimulation of the T1R2/T1R3 taste receptor activates peripheral gustatory nerves and, in turn, brain gustatory pathways. Sweet-tasting compounds, such as sugars and low-energy sweeteners, can bind to and stimulate the sweet-taste receptor. 26 Nakagawa et al 27 have studied the mechanism of action of four different AS including sucralose in MIN6\n\nTable 2: Bonferroni's multiple comparison test for untreated stimulated vs stimulated sucralose conditions\n\nCI: Confidence interval\n\ncells. They have found that all the four AS evoke different cellular responses and were inhibited by different substances. Sucralose induced elevation of [Ca2+]i and [cAMP]i and was inhibited by gurmarin, an antagonist of the sweet-taste receptor. Masubuchi et al 28 have shown that the sweet-taste receptor in 3T3 L1 cells was distinct from the one seen in tongue and may activate a different signaling pathway. Simon et al 29 have shown that these AS can act even in T1R2/T1R3 knockdown cells. This implies that they could be acting through other receptors that have not yet been identified.\n\nIn our study, we observed that sucralose decreased glucose uptake in insulin-stimulated condition across all the concentrations studied. This suppression of uptake increased with increase in concentration of sucralose as shown in Graph 1. This is in accordance with Suez et al 23 and Pepino et al 24 who suggest that AS could cause insulin resistance in human subjects. Pepino et al 24 found that ingestion of sucralose affects the glycemic response to an oral glucose load and increases both peak plasma glucose concentration and glucose-stimulated insulin secretion in subjects with obesity. Sucralose also tended to increase plasma glucose-dependent insulinotropic peptide concentration, and could promote insulin resistance. Approximately 20% higher than normal concentrations of insulin were required to maintain same glycemia when obese subjects consumed sucralose than when they consumed water before glucose ingestion. Sucralose has been shown to increase glucose-stimulated insulin secretion in mouse insulinoma–MIN6 cell line and mouse and rat islet cells. 30,31 It also increased secretion of glucagonlike polypeptide-1 in human L cell line NCI-H716. 30\n\nThere are several studies on the effect of sucralose and other AS in various other cell lines. But we found studies with effect of other AS on glucose uptake. In a study done by Simon et al, 29 saccharin AS increased adipogenesis and glucose uptake in 3T3L1 adipocytes, but sucralose caused mild inhibition of adipogenesis. They studied 0.45 and 4.5 mM saccharin concentrations, which are greater than the expected physiological concentration (approximately 75 µM), and these concentrations are much higher than what we have used in our study. Bhasker et al 32 reported increased glucose uptake with naturally occurring AS in diabetes-induced L6 cells. These differences could be attributed to the difference in cell type (3T3L1 and diabetes-induced L6) and/or the type of AS and/or mode of action through different receptors. Therefore, further studies are required to elucidate the receptor and signaling pathways for sucralose.\n\nCONCLUSION\n\nFrom our study, we have seen a decrease in insulinstimulated glucose uptake with sucralose. Increase in concentration of sucralose decreased the uptake further. Hence, it may not be beneficial to use sucralose in certain groups of people who have insulin resistance or are prone to it.\n\nACKNOWLEDGMENT\n\nAuthors would like to thank Prof Matthew Watt for support, encouragement, and infrastructure to carry out the work in his Biology of Lipid Metabolism laboratory, Department of Physiology, Monash University, Melbourne.\n\nREFERENCES\n\n1. Overduin J, Collet TH, Medic N, Henning E, Keogh JM, Forsyth F, Stephenson C, Kanning MW, Ruijschop RM, Farooqi IS, et al. Failure of sucrose replacement with the non-nutritive sweetener erythritol to alter GLP-1 or PYY release or test meal size in lean or obese people. Appetite 2016 Dec;107:596-603.\n2. van Eyk AD. The effect of five artificial sweeteners on CaCO2, HT-29 and HEK-293 cells. Drug Chem Toxicol 2015 Oct;38(3):318-327.\n3. Sharma A, Amarnath S, Thulasimani M, Ramaswamy S. Artificial sweeteners as a sugar substitute: are they really safe? Indian J Pharmacol 2016 May-Jun;48(3):237-240.\n4. Dhingra R, Sullivan L, Jacques PF, Wang TJ, Fox CS, Meigs JB, D'Agostino RB, Gaziano JM, Vasan RS. Soft drink consumption and risk of developing cardiometabolic risk factors and the metabolic syndrome in middle-aged adults in the community. Circulation 2007 Jul;116(5):480-488.\n5. Fowler SP, Williams K, Resendez RG, Hunt KJ, Hazuda HP, Stern MP. Fueling the obesity epidemic? Artificially sweetened beverage use and long-term weight gain. Obesity (Silver Spring) 2008 Aug;16(8):1894-1900.\n6. Fowler SP, Williams K, Hazuda HP. Diet soda intake is associated with long-term increases in waist circumference in a biethnic cohort of older adults: the San Antonio Longitudinal Study of Aging. J Am Geriatr Soc 2015 Apr;63(4):708-715.\n7. Gallus S, Scotti L, Negri E, Talamini R, Franceschi S, Montella M, Giacosa A, Dal Maso L, La Vecchia C. Artificial sweeteners and\n\ncancer risk in a network of case-control studies. Ann Oncol 2007 Jan;18(1):40-44.\n8. Renwick AG. The intake of intense sweeteners – an update review. Food Addit Contam 2006 Apr;23(4):327-338.\n9. Tandel KR. Sugar substitutes: health controversy over perceived benefits. J Pharmacol Pharmacother 2011 Oct;2(4): 236-243.\n10. Magnuson BA, Carakostas MC, Moore NH, Poulos SP, Renwick AG. Biological fate of low-calorie sweeteners. Nutr Rev 2016 Nov;74(11):670-689.\n11. Schiffman SS, Rother KI. Sucralose, a synthetic organochlorine sweetener: overview of biological issues. J Toxicol Environ Health B Crit Rev 2013 Sep;16(7):399-451.\n12. Mezitis NH, Maggio CA, Koch P, Quddoos A, Allison DB, Pi-Sunyer FX. Glycemic effect of a single high oral dose of the novel sweetener sucralose in patients with diabetes. Diabetes Care 1996 Sep;19(9):1004-1005.\n13. Grotz VL, Henry RR, McGill JB, Prince MJ, Shamoon H, Trout JR, Pi-Sunyer FX. Lack of effect of sucralose on glucose homeostasis in subjects with type 2 diabetes. J Am Diet Assoc 2003 Dec;103(12):1607-1612.\n14. Baird IM, Shephard NW, Merritt RJ, Hildick-Smith G. Repeated dose study of sucralose tolerance in human subjects. Food Chem Toxicol 2000 Feb;38(Suppl 2):S123-S129.\n15. Ma J, Chang J, Checklin HL, Young RL, Jones KL, Horowitz M, Rayner CK. Effect of the artificial sweetener, sucralose, on small intestinal glucose absorption in healthy human subjects. Br J Nutr 2010 Sep;104(6):803-806.\n16. Ford HE, Peters V, Martin NM, Sleeth ML, Ghatei MA, Frost GS, Bloom SR. Effects of oral ingestion of sucralose on gut hormone response and appetite in healthy normal-weight subjects. Eur J Clin Nutr 2011 Apr;65(4):508-513.\n17. Wu T, Zhao BR, Bound MJ, Checklin HL, Bellon M, Little TJ, Young RL, Jones KL, Horowitz M, Rayner CK. Effects of different sweet preloads on incretin hormone secretion, gastric emptying, and postprandial glycemia in healthy humans. Am J Clin Nutr 2012 Jan;95(1):78-83.\n18. Brown AW, Bohan Brown MM, Onken KL, Beitz DC. Shortterm consumption of sucralose, a nonnutritive sweetener, is similar to water with regard to select markers of hunger signaling and short-term glucose homeostasis in women. Nutr Res 2011 Dec;31(12):882-888.\n19. Wu T, Bound MJ, Standfield SD, Bellon M, Young RL, Jones KL, Horowitz M, Rayner CK. Artificial sweeteners have no effect on gastric emptying, glucagon-like peptide-1, or glycemia after oral glucose in healthy humans. Diabetes Care 2013 Dec;36(12):e202-e203.\n20. Stellman SD, Garfinkel L. Artificial sweetener use and one-year weight change among <cursor_is_here> Prev Med 1986 Mar;15(2):195-202.\n21. Colditz GA, Willett WC, Stampfer MJ, London SJ, Segal MR, Speizer FE. Patterns of weight change and their relation to diet in a cohort of healthy women. Am J Clin Nutr 1990 Jun;51(6):1100-1105.\n22. Duffey KJ, Popkin BM. Adults with healthier dietary patterns have healthier beverage patterns. J Nutr 2006 Nov;136(11): 2901-2907.\n23. Suez J, Korem T, Zeevi D, Zilberman-Schapira G, Thaiss GA, Maza O, Israeli D, Zmora N, Gilad S, Weinberger A, et al. Artificial sweeteners induce glucose intolerance by altering the gut microbiota. Nature 2014 Oct;514(7521):181-186.\n24. Pepino MY, Tiemann CD, Patterson BW, Wice BM, Klein S. Sucralose affects glycemic and hormonal responses to an oral glucose load. Diabetes Care 2013 Sep;36(9):2530-2535.\n25. Romo-Romo A, Aguilar-Salinas CA, Brito-Córdova GX, Gómez Díaz RA, Vilchis Valentín D, Almeda-Valdes P. Effects of the non-nutritive sweeteners on glucose metabolism and appetite regulating hormones: systematic review of observational prospective studies and clinical trials. PLoS One 2016 Aug;11(8):e0161264.\n26. Renwick AG, Molinary SV. Sweet-taste receptors, low-energy sweeteners, glucose absorption and insulin release. Br J Nutr 2010 Nov;104(10):1415-1420.\n27. Nakagawa Y, Nagasawa M, Mogami H, Lohse M, Ninomiya Y, Kojima I. Multimodal function of the sweet taste receptor expressed in pancreatic β-cells: generation of diverse patterns of intracellular signals by sweet agonists. Endocr J 2013 Aug;60(10): 1191-1206.\n28. Masubuchi Y, Nakagawa Y, Ma J, Sasaki T, Kitamura T, Yamamoto Y, Kurose H, Kojima I, Shibata H. A novel regulatory function of sweet taste-sensing receptor in adipogenic differentiation of 3T3-L1 cells. PLoS One 2013 Jan;8(1):e54500.\n29. Simon BR, Parlee SD, Learman BS, Mori H, Scheller EL, Cawthorn WP, Ning X, Gallagher K, Tyrberg B, Assadi-Porter FM, et al. Artificial sweeteners stimulate adipogenesis and suppress lipolysis independently of sweet taste receptors. J Biol Chem 2013 Nov;288(45):32475-32489.\n30. Jang HJ, Kokrashvili Z, Theodorakis MJ, Carlson OD, Kim BJ, Zhou J, Kim HH, Xu X, Chan SL, Juhaszova M, et al. Gut-expressed gustducin and taste receptors regulate secretion of glucagonlike peptide-1. Proc Natl Acad Sci U S A 2007 Sep;104(38): 15069-15074.\n31. Nakagawa Y, Nagasawa M, Yamada S, Hara A, Mogami H, Nikolaev VO, Lohse MJ, Shigemura N, Ninomiya Y, Kojima I. Sweet taste receptor expressed in pancreatic ß-cells activates the calcium and cyclic AMP signaling systems and stimulates insulin secretion. PLoS One 2009 Apr;4(4):e5106.\n32. Bhasker S, Madhav H, Chinnamma M. Molecular evidence of insulinomimetic property exhibited by steviol and stevioside in diabetes induced L6 and 3T3L1 cells. Phytomedicine 2015 Oct;22(11):1037-1044.\n</text>\n",
"role": "user"
},
{
"content": "women.",
"role": "assistant"
}
] |
NEWANA Minutes
March 7, 2015
Meeting opened at 9:50 by Carrie B Paragraph 2 of guidelines read by Carrie B. 12 Concepts read by Tana 12 Traditions read by Barry
Group voted to change the order of the day to allow voting for Tana as ASC Chair. Tana was elected as Chair.
New Members- Jaime, of Hugz not Drugz.
Area Officers Elections
Trusted Servant /
Voting Members - 16
Written Grievances – Written Grievance submitted by Cory B. Please see attachment. Steering committee and three GSRs will meet to address grievance.
Topic Discussion – Third Concept was read and discussed.
Minutes Read- Minutes were approved with an amendment made to strike out statement in old business about Planning Committee.
Group Reports (Groups marked "ab" if they were not present.)
Items of Interests from groups:
1. Monday Night Miracles– Still planning a potluck or BBQ in the summer.
2. Saturday Night NA-Giving literature to a newcomer monthly. Saturday NA will not be represented at April's ASC.
3. Thursday Night Literature Study-Almost done with Living Clean will be starting How it Works and Why next.
4. Sunday Night Wrap Up-We need help with service positions at the group level.
Break: No Break
Reconvene:
Voting Members: 14
Area Officers Nominations/Elections:
Simona nominated for Secretary goes back to groups.
Qualifications:
I have a sponsor, and my sponsor has a sponsor.
I have served as ASC Secretary for one year and would like to serve for one more year.
I have done service work on a group level for several years.
Subcommittee Nominations/Elections:
Kevin B. was elected as Outreach Liaison.
Kevin S. was elected as Learning Day Chair.
Kenny B. was elected as elected as Activities Chair.
Budget Requests:
Old Business:
Date of Motion: 2/7/2015 Motion: 1
Maker of the Motion: Tana. Seconded by: Barry, of Candle Light
Motion: To provide each NA group 3 IP's NA Groups and Meditation, Disruptive and Violent Behavior Roles and Responsibilities and Group Business Meetings for a total of $1.03.
Intent: To provide information to the groups to help keep meetings healthy.
Why is the Motion Needed? Excessive stock of IP's that will never be purchased.
How much money will this action take? $1.03
Who will carry out the motion? Literature
What other resources will the motion require if passed? None
Pros:1 Cons:3
Results: Passed
Date of Motion: 2/7/2015 Motion: 2
Maker of the Motion: Tommy S . Seconded by: Barry, of Candle Light
Motion: I move to create an ADHOC Committee to create a new NA event called "Run for the Young". A motorcycle run to 3 different adolescent treatment centers in Spokane to carry the message of NA. To be held in the early summer. All proceeds will be donated to ASC in some way.
Intent: To carry the message of NA to the newcomers.
Why is the Motion Needed? To create unity in the area and to raise more money for our Area.
How much money will this action take? 0
Who will carry out the motion? ASC
What other resources will the motion require if passed? None
Pros:0 Cons:0
Results: Maker of motion was not present. Motion was pulled.
New Business
Motions
Date of Motion: 2/7/2015 Motion: 3
Maker of the Motion: Kenny B. Seconded by: Gary G., Monday Night Miracles
Motion: To have funds from sales at Area meeting to be used to replenish Campout Deposit Fund.
Intent: To put back money in campout fund, so to have deposit available for future campsites.
Why is the Motion Needed? We have no campout deposit fund available at this time.
How much money will this action take? none
Who will carry out the motion? ASC
What other resources will the motion require if passed? None
Pros:3 Cons:0
Results: Back to Groups
Date of Motion: 2/7/2015 Motion: 4
Maker of the Motion: Angie S. Seconded by: Chris M., Lost and Found
Motion: Voting 5.5 "Discussion Shall be conducted immediately prior to voting on all ASC Motions. This will be in addition to any discussion that takes place for clarification when the motion is initially presented." To Add: motions that go back to groups will not be discussed again when vote is taken the following month.
Intent: To clarify
Why is the Motion Needed? People are trying to manipulate discussion rules.
How much money will this action take? 0
Who will carry out the motion? ASC
What other resources will the motion require if passed? Revising Guidelines
Pros:0 Cons:0
Results: Pulled
Date of Motion: 2/7/2015 Motion: 5
Maker of the Motion: Cory B. Seconded by: Jennifer P., Can't Understand Normal Thinking
Motion: To pay Meals on Wheels for rent incurred while meeting as a subcommittee. This was directed at the direction of this body. Intent: To pay our bills.
Why is the Motion Needed? We owe rent
How much money will this action take? $50.00
Who will carry out the motion? ASC
What other resources will the motion require if passed? none
Pros:3 Cons:2
Results: Back to Groups
Date of Motion: 2/7/2015 Motion: 6
Maker of the Motion: Kristina S. Seconded by: Monday Night Miracles
Motion: To have Treasurer cancel credit cards for Treasurer and Activities and to open a separate bank account specifically for Activities that will never hold more than the budgeted amount approved by ASC for Activities.
Intent: To reduce confusion created by the addition of credit card to treasury process and reduce the possibility of interest charges and fees.
Why is the Motion Needed? Same as intent.
How much money will this action take? none
Who will carry out the motion? Treasurer and Activities Chair
What other resources will the motion require if passed? Treasurer and Activities Chair continued cooperation.
Pros:3 Cons:0
Results: Back to Groups
Date of Motion: 3/7/2015 Motion: 1
Maker of the Motion: Tony A. Seconded by: Rex M.
Motion: Delay sending quarterly NEWANA donation to region until treasury audit is completed.
Intent: To Allow accurate accounting of area funds before determining if we have excess to donate.
Why is the Motion Needed? Area treasurer's audit has not been conducted according to guidelines and extra time is needed to complete audit.
How much money will this action take? none
Who will carry out the motion? ASC
What other resources will the motion require if passed? none
Pros:1 Cons:1 (group voted to send back to group because we ran out of time for continued discussion.)
Results: Back to Groups
Officer / subcommittee Chairs action list:
GSR Action List: Take back to groups:
Area Officers Nominations/Elections:
Simona nominated for Secretary goes back to groups.
Qualifications:
I have a sponsor, and my sponsor has a sponsor.
I have served as ASC Secretary for one year and would like to serve for one more year.
I have done service work on a group level for several years.
The following Motions that are going back to groups are 3,5,6,and 1.
The following SERVICE positions are open in ASC
Date and Time of Next Meeting:
Corbin Senior Center April 4, 2015 GSR orientation at 9:00am ASC at 9:30 am
Meeting adjourned at 11:45 by Tana.
Monthly Officer Reports
Chair: no report
Vice-Chair: Carrie B.—Written Report
3/7/15
Good Morning-
Thank you for letting me serve. I have been able to sit in on an audit for our area this month and look forward to being of service.
Thank you.
Carrie B.
Secretary: Simona—
3/7/15
Hello,
I apologize for accidently sending out the failed motion with the minutes last month. I participated in the Treasurer Audit this month. As a reminder, if you receive any funding from ASC please bring a receipt to the following Area. Thank you for allowing me to be of service.
Simona
Treasury: Kristina S- Please see attachments.
RCM I: Chris W.—No report
RCM I: David L.-No report
Monthly Subcommittee Reports
Activities: Kenny B.—Written report
3/7/15
Location of Meeting is Mid City Concerns. Date and Time of Meeting is every other Thursday at 5:30pm.
Bowling ending on the 27 th of this month. The 28 th will be our annual Unity Day from 3-7pm at Mid-City Concerns. April 18 th is the Spring Fling. Activities has updated our guidelines and will have them ready for approval next Area. We have a new logo and will be going to print at end of the month. Activities has nominated myself as chair.
Archives:
Gary H.—No report.
C&E:
Chris M.—No report
Learning Days
: Vacant.—No report.
Literature:
No Report
PRC:
Barry—Written Report
3/7/14
Good Morning ASC.
PRC Sub-committee is going good. We reviewed orientation and guidelines in an ad-hoc committee. Some changes may need to be made. In the next couple of months we'll have that done. Then we will bring revised copies to ASC.
PRC needs women to become part of for the phone line and H&I.
PRC meets the fist Saturdat at noon for orientatation. Subcommittee to follow at 1:00pm.
Thank you,
Barry
Schedules:
Niko T. —Written Report
3/7/2015
If your group's GSR is not going to be at area and you do not contact me to make other arrangements to pick up your group's standing order I will distribute those schedules to groups who are present. You will then need to contact me to re-order.
Thank you.
Spiritual Breakfast: Bill P.—Written Report
NEWANA Spiritual Breakfast 2015 Chairman's Final Report
Hello fellow NA members.
The 27th Annual NEWANA Sprirtual Breakfast was a great success. The event was held February 22 at Mukagowa Fort Wright Institute. A special thanks to Ashley Poole, the Mukagowa coordinator, for going above and beyond her duties to accommodate our needs. She gave us an extra week to sell tickets and provided 250 plates of food but only charged us for 225 and all at a lower cost than previous Spiritual Breakfasts held there. We all came together as a fellowship to make this event a great success. Over 200 breakfast tickets were sold and about 325 people showed up for this event. There was more than enough food for everyone. It was an honor and a privilege to serve as chair. I want to give personal thanks to all 47 Spiritual Breakfast Committee members, Home Groups for their raffle basket donations, everyone who donated something for the auction, Bill H for his last minute help running the auction, and both our speakers Michael and Trisha for coming from out of
town at their own expense to share a wonderful message of recovery and hope. The closing clean time countdown was awesome.
Yours in service, Bill P
Expenses
SBC meeting place rent $ 70.00 Mukagowa deposit $ 500.00 Decorations (books & balloons) $ 140.88 Misc (receipt book & raffle tickets) $ 14.00 Mukagowa (breakfasts, gratuity and tax) $ 2850.75 Total $ 3575.63
Income
Mukagowa deposit returned $ 500.00 Ticket sales $ 3069.00 Raffle ticket sales $ 965.00 Auction $ 1896.00 Total $ 6430.00 Net Profit turned in to NEWANA $ 2854.37
Website: Cory B.—Emailed Report
March 2015
Greetings Family!
Nothing new to report.
In loving service,
Cory B. NEWANA Website Liaison
February 2015
Greetings Family!
I was able to attend All Subs Day and sit in on the IT committee meeting. I finally can tell you we are 3 rd in line for getting our website moved to the region for hosting! Also, might even learn how to do it and be of services to the region.
In loving service,
Cory B. NEWANA Website Liaison
Planning: Cory B.-Emailed Report
Date: 2-6-2015
Greetings family!
Well, I had a great time helping with the Area Inventory. It was nice to have input from some fairly new members to help us keep things in perspective. Great turnout! We gathered lots of data to use for developing a road map for our committee this year.
Time to get busy! Please, if you know of anyone who would like to help, please invite them to come join us. Currently we are entering in all the data collected from the Area Inventory so that we can organize the goals and priorities for this year. Then, we will get to work!
We are still in need of a Co-Facilitator and lots of Project Leaders. Please come to the Planning committee if you are interested in either of these positions. Clean time requirement is one year for Co-Facilitator and no clean time requirement for Project Leaders.
We moved the date and time of the Planning committee meeting due to lack of budget. However, I don't think meeting at Perkins is going to work out. We will continue to look for a solution.
In loving service, Cory B.
Planning Facilitator Report March 2015
Date: 3-6-2015
Greetings family!
The Planning committee has met twice this month at Perkin to continue to collate and organize the priorities that were desided at the Area Inventory. We have established a template we can use to create approaches for each opportunity. This will help ensure that we consult the Traditions, Concepts and Guidelines while working on solutions. We are in need of more members to help us create task groups to work on the priorities we have been given.
Thank you for allow me to serve.
In loving service, Cory B.
Planning Facilitator Report February 2015
|
<urn:uuid:067cba25-2cb6-42da-be8c-83eff385617a>
|
CC-MAIN-2018-30
|
http://www.newana.org/get_document.ydev?news_id=46689
|
2018-07-21T03:45:36Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592309.94/warc/CC-MAIN-20180721032019-20180721052019-00521.warc.gz
| 503,816,245
| 3,064
|
eng_Latn
|
eng_Latn
| 0.997384
|
eng_Latn
| 0.998205
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
775,
1738,
3708,
6516,
7050,
8257,
10234,
11247,
12970
] |
NEWANA Minutes
March 7, 2015
Meeting opened at 9:50 by Carrie B Paragraph 2 of guidelines read by Carrie B. 12 Concepts read by Tana 12 Traditions read by Barry
Group voted to change the order of the day to allow voting for Tana as ASC Chair. Tana was elected as Chair.
New Members- Jaime, of Hugz not Drugz.
Area Officers Elections
Trusted Servant /
Voting Members - 16
Written Grievances – Written Grievance submitted by Cory B. Please see attachment. Steering committee and three GSRs will meet to address grievance.
Topic Discussion – Third Concept was read and discussed.
Minutes Read- Minutes were approved with an amendment made to strike out statement in old business about Planning Committee.
Group Reports (Groups marked "ab" if they were not present.)
Items of Interests from groups:
1. Monday Night Miracles– Still planning a potluck or BBQ in the summer.
2. Saturday Night NA-Giving literature to a newcomer monthly. Saturday NA will not be represented at April's ASC.
3. Thursday Night Literature Study-Almost done with Living Clean will be starting How it Works and Why next.
4. Sunday Night Wrap Up-We need help with service positions at the group level.
Break: No Break
Reconvene:
Voting Members: 14
Area Officers Nominations/Elections:
Simona nominated for Secretary goes back to groups.
Qualifications:
I have a sponsor, and my sponsor has a sponsor.
I have served as ASC Secretary for one year and would like to serve for one more year.
I have done service work on a group level for several years.
Subcommittee Nominations/Elections:
Kevin B. was elected as Outreach Liaison.
Kevin S. was elected as Learning Day Chair.
Kenny B. was elected as elected as Activities Chair.
Budget Requests:
Old Business:
Date of Motion: 2/7/2015 Motion: 1
Maker of the Motion: Tana. Seconded by: Barry, of Candle Light
Motion: To provide each NA group 3 IP's NA Groups and Meditation, Disruptive and Violent Behavior Roles and Responsibilities and Group Business Meetings for a total of $1.03.
Intent: To provide information to the groups to help keep meetings healthy.
Why is the Motion Needed? Excessive stock of IP's that will never be purchased.
How much money will this action take? $1.03
Who will carry out the motion? Literature
What other resources will the motion require if passed? None
Pros:1 Cons:3
Results: Passed
Date of Motion: 2/7/2015 Motion: 2
Maker of the Motion: Tommy S . Seconded by: Barry, of Candle Light
Motion: I move to create an ADHOC Committee to create a new NA event called "Run for the Young". A motorcycle run to 3 different adolescent treatment centers in Spokane to carry the message of NA. To be held in the early summer. All proceeds will be donated to ASC in some way.
Intent: To carry the message of NA to the newcomers.
Why is the Motion Needed? To create unity in the area and to raise more money for our Area.
How much money will this action take? 0
Who will carry out the motion? ASC
What other resources will the motion require if passed? None
Pros:0 Cons:0
Results: Maker of motion was not present. Motion was pulled.
New Business
Motions
Date of Motion: 2/7/2015 Motion: 3
Maker of the Motion: Kenny B. Seconded by: Gary G., Monday Night Miracles
Motion: To have funds from sales at Area meeting to be used to replenish Campout Deposit Fund.
Intent: To put back money in campout fund, so to have deposit available for future campsites.
Why is the Motion Needed? We have no campout deposit fund available at this time.
How much money will this action take? none
Who will carry out the motion? ASC
What other resources will the motion require if passed? None
Pros:3 Cons:0
Results: Back to Groups
Date of Motion: 2/7/2015 Motion: 4
Maker of the Motion: Angie S. Seconded by: Chris M., Lost and Found
Motion: Voting 5.5 "Discussion Shall be conducted immediately prior to votin
|
g on all ASC Motions.
| 3,891
|
inside_word
|
voting
|
remove_all
|
<url>
http://www.newana.org/get_document.ydev?news_id=46689
</url>
<text>
NEWANA Minutes
March 7, 2015
Meeting opened at 9:50 by Carrie B Paragraph 2 of guidelines read by Carrie B. 12 Concepts read by Tana 12 Traditions read by Barry
Group voted to change the order of the day to allow voting for Tana as ASC Chair. Tana was elected as Chair.
New Members- Jaime, of Hugz not Drugz.
Area Officers Elections
Trusted Servant /
Voting Members - 16
Written Grievances – Written Grievance submitted by Cory B. Please see attachment. Steering committee and three GSRs will meet to address grievance.
Topic Discussion – Third Concept was read and discussed.
Minutes Read- Minutes were approved with an amendment made to strike out statement in old business about Planning Committee.
Group Reports (Groups marked "ab" if they were not present.)
Items of Interests from groups:
1. Monday Night Miracles– Still planning a potluck or BBQ in the summer.
2. Saturday Night NA-Giving literature to a newcomer monthly. Saturday NA will not be represented at April's ASC.
3. Thursday Night Literature Study-Almost done with Living Clean will be starting How it Works and Why next.
4. Sunday Night Wrap Up-We need help with service positions at the group level.
Break: No Break
Reconvene:
Voting Members: 14
Area Officers Nominations/Elections:
Simona nominated for Secretary goes back to groups.
Qualifications:
I have a sponsor, and my sponsor has a sponsor.
I have served as ASC Secretary for one year and would like to serve for one more year.
I have done service work on a group level for several years.
Subcommittee Nominations/Elections:
Kevin B. was elected as Outreach Liaison.
Kevin S. was elected as Learning Day Chair.
Kenny B. was elected as elected as Activities Chair.
Budget Requests:
Old Business:
Date of Motion: 2/7/2015 Motion: 1
Maker of the Motion: Tana. Seconded by: Barry, of Candle Light
Motion: To provide each NA group 3 IP's NA Groups and Meditation, Disruptive and Violent Behavior Roles and Responsibilities and Group Business Meetings for a total of $1.03.
Intent: To provide information to the groups to help keep meetings healthy.
Why is the Motion Needed? Excessive stock of IP's that will never be purchased.
How much money will this action take? $1.03
Who will carry out the motion? Literature
What other resources will the motion require if passed? None
Pros:1 Cons:3
Results: Passed
Date of Motion: 2/7/2015 Motion: 2
Maker of the Motion: Tommy S . Seconded by: Barry, of Candle Light
Motion: I move to create an ADHOC Committee to create a new NA event called "Run for the Young". A motorcycle run to 3 different adolescent treatment centers in Spokane to carry the message of NA. To be held in the early summer. All proceeds will be donated to ASC in some way.
Intent: To carry the message of NA to the newcomers.
Why is the Motion Needed? To create unity in the area and to raise more money for our Area.
How much money will this action take? 0
Who will carry out the motion? ASC
What other resources will the motion require if passed? None
Pros:0 Cons:0
Results: Maker of motion was not present. Motion was pulled.
New Business
Motions
Date of Motion: 2/7/2015 Motion: 3
Maker of the Motion: Kenny B. Seconded by: Gary G., Monday Night Miracles
Motion: To have funds from sales at Area meeting to be used to replenish Campout Deposit Fund.
Intent: To put back money in campout fund, so to have deposit available for future campsites.
Why is the Motion Needed? We have no campout deposit fund available at this time.
How much money will this action take? none
Who will carry out the motion? ASC
What other resources will the motion require if passed? None
Pros:3 Cons:0
Results: Back to Groups
Date of Motion: 2/7/2015 Motion: 4
Maker of the Motion: Angie S. Seconded by: Chris M., Lost and Found
Motion: Voting 5.5 "Discussion Shall be conducted immediately prior to votin<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.newana.org/get_document.ydev?news_id=46689\n</url>\n<text>\nNEWANA Minutes\n\nMarch 7, 2015\n\nMeeting opened at 9:50 by Carrie B Paragraph 2 of guidelines read by Carrie B. 12 Concepts read by Tana 12 Traditions read by Barry\n\nGroup voted to change the order of the day to allow voting for Tana as ASC Chair. Tana was elected as Chair.\n\nNew Members- Jaime, of Hugz not Drugz.\n\nArea Officers Elections\n\nTrusted Servant /\n\nVoting Members - 16\n\nWritten Grievances – Written Grievance submitted by Cory B. Please see attachment. Steering committee and three GSRs will meet to address grievance.\n\nTopic Discussion – Third Concept was read and discussed.\n\nMinutes Read- Minutes were approved with an amendment made to strike out statement in old business about Planning Committee.\n\nGroup Reports (Groups marked \"ab\" if they were not present.)\n\nItems of Interests from groups:\n\n1. Monday Night Miracles– Still planning a potluck or BBQ in the summer.\n2. Saturday Night NA-Giving literature to a newcomer monthly. Saturday NA will not be represented at April's ASC.\n3. Thursday Night Literature Study-Almost done with Living Clean will be starting How it Works and Why next.\n4. Sunday Night Wrap Up-We need help with service positions at the group level.\n\nBreak: No Break\n\nReconvene:\n\nVoting Members: 14\n\nArea Officers Nominations/Elections:\n\nSimona nominated for Secretary goes back to groups.\n\nQualifications:\n\nI have a sponsor, and my sponsor has a sponsor.\n\nI have served as ASC Secretary for one year and would like to serve for one more year.\n\nI have done service work on a group level for several years.\n\nSubcommittee Nominations/Elections:\n\nKevin B. was elected as Outreach Liaison.\n\nKevin S. was elected as Learning Day Chair.\n\nKenny B. was elected as elected as Activities Chair.\n\nBudget Requests:\n\nOld Business:\n\nDate of Motion: 2/7/2015 Motion: 1\n\nMaker of the Motion: Tana. Seconded by: Barry, of Candle Light\n\nMotion: To provide each NA group 3 IP's NA Groups and Meditation, Disruptive and Violent Behavior Roles and Responsibilities and Group Business Meetings for a total of $1.03.\n\nIntent: To provide information to the groups to help keep meetings healthy.\n\nWhy is the Motion Needed? Excessive stock of IP's that will never be purchased.\n\nHow much money will this action take? $1.03\n\nWho will carry out the motion? Literature\n\nWhat other resources will the motion require if passed? None\n\nPros:1 Cons:3\n\nResults: Passed\n\nDate of Motion: 2/7/2015 Motion: 2\n\nMaker of the Motion: Tommy S . Seconded by: Barry, of Candle Light\n\nMotion: I move to create an ADHOC Committee to create a new NA event called \"Run for the Young\". A motorcycle run to 3 different adolescent treatment centers in Spokane to carry the message of NA. To be held in the early summer. All proceeds will be donated to ASC in some way.\n\nIntent: To carry the message of NA to the newcomers.\n\nWhy is the Motion Needed? To create unity in the area and to raise more money for our Area.\n\nHow much money will this action take? 0\n\nWho will carry out the motion? ASC\n\nWhat other resources will the motion require if passed? None\n\nPros:0 Cons:0\n\nResults: Maker of motion was not present. Motion was pulled.\n\nNew Business\n\nMotions\n\nDate of Motion: 2/7/2015 Motion: 3\n\nMaker of the Motion: Kenny B. Seconded by: Gary G., Monday Night Miracles\n\nMotion: To have funds from sales at Area meeting to be used to replenish Campout Deposit Fund.\n\nIntent: To put back money in campout fund, so to have deposit available for future campsites.\n\nWhy is the Motion Needed? We have no campout deposit fund available at this time.\n\nHow much money will this action take? none\n\nWho will carry out the motion? ASC\n\nWhat other resources will the motion require if passed? None\n\nPros:3 Cons:0\n\nResults: Back to Groups\n\nDate of Motion: 2/7/2015 Motion: 4\n\nMaker of the Motion: Angie S. Seconded by: Chris M., Lost and Found\n\nMotion: Voting 5.5 \"Discussion Shall be conducted immediately prior to votin<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "g on all ASC Motions.",
"role": "assistant"
}
] |
|
INDICES
| +17,7% |
|---|
| +18,9% |
| +15,4% |
| +18,8% |
| +16,8% |
| +8,7% |
| +0,8% |
AKTIEN
Ähnlich wie bereits im April 2019 genügte auch im August wieder eine Twitter Nachricht des US-Präsidenten Donald Trump für einen stärkeren Kursrückgang von rund 7% an den Aktienmärkten. Einmal mehr drohte er mit seiner Verschärfung des Handelskonfliktes mit China – erstmals bezeichnete er den Chinesischen Präsidenten Xi als Feind.
Auf diese Korrekturen an den amerikanischen und europäischen Aktienmärkten folgten Erholungen bis an die seit längerem intakten oberen Widerstandszonen, an denen die Märkte jüngst notieren. In Amerika sind dies jeweils die all-time highs – in Europa sind es Kursniveaus die rund 10% unter den höchsten Kursen vom Jahreswechsel 2017-18 liegen.
Es ist weiterhin unmöglich einen soliden Ausblick auf die kurzfristige weitere Marktentwicklung zu geben. Die Kapitalmärkte werden weiterhin massgeblich vom Handelskonflikt der USA mit China beeinflusst. Wir schätzen, dass die Verhandlungen weiterhin zäh verlaufen werden, da u.a. die Chinesen die Verhandlungen in den US-Präsidentschaftswahlkampf 2020 ziehen möchten, um für sich eine noch bessere Verhandlungsposition gegenüber Trump zu erreichen. Trump hat sich völlig planlos verrannt und findet keinen sauberen Weg zurück zu einer Lösung – insbesondere wird es ihm unmöglich sein, nochmals ein minimales Vertrauen bei den Chinesen zu gewinnen, da die Bezeichnung als Feind für Chinesen unentschuldbar ist. Entsprechend dürfte die Phase der schwierigen Vorhersehbarkeit weiterhin anhalten. Wir möchten an dieser Stelle auf unsere diesmalige Beilage hinweisen. Uns fiel kürzlich ein Artikel des Nobelpreisträgers Paul Krugman in der New York Times in die Hände, in dem er eben diese Situation im sumpfigen Moor, in der sich die US-Politik befindet, beschreibt.
Für einen längerfristigen Blick bleibt festzuhalten, dass der Konjunkturzyklus in den USA überlang war und er massgeblich durch die US-Steuersenkung in 2017 künstlich verlängert wurde. Europa befindet sich bereits sehr deutlich in einer Abschwungsphase. Dennoch notieren die Aktienkurse bisher – im Vergleich zu früheren Jahren – noch sehr hoch. Die aktuellen Niveaus spiegeln die zu erwartenden rückläufigen Umsatz- und Ergebniszahlen der Unternehmen noch nicht wieder. Als wichtigste Begründung wird vieler Ortens die Alternativlosigkeit der Aktien mangels Rendite auf der Bondseite genannt – dies ist uns zu wenig. Wir gehen – weiterhin völlig unverändert – von einer stärkeren Korrektur an den Aktienmärkten aus. Das aktuelle Kursniveau in den USA stellt sicherlich für ein bis zwei Jahre einen sehr starken Widerstand nach oben dar. Von hier aus dürften sich deutlich fallende Kurse in den nächsten Monaten zur abschließenden Welle 5 des laufenden Abwärtszyklus formieren. Am Ende dieser folgenden Korrekturwelle können wir uns sehr gut mindestens Kurse um 2.650 Punkte im S&P500 vorstellen. Auch Kurse des Heiligabends 2018 (S&P500 bei 2.350 Punkten) sind nicht unwahrscheinlich.
Wir sind unverändert mit einem Viertel der jeweils maximalen Aktienquote netto short investiert.
ANLEIHEN, Investment Grade
Beachtenswert sind die aktuellen Zeitpunkte der jüngsten Maßnahmen. Sie sind allesamt sehr früh im laufenden Abwärtszyklus. Dies schürt zunehmend die Sorge der Marktteilnehmer, wie kritisch die Zentralbanken die aktuelle wirtschaftliche Abkühlung tatsächlich einschätzen.
Beide großen Zentralbanken haben – auch unter dem massiven Druck der US-Politik – im letzten Quartal alles geliefert, was die Kapitalmärkte sich gewünscht hatten. Die FED hat zweimal ihren Referenzzins auf einen aktuellen Korridor von 1,75-2,00% gesenkt und ferner ein neuerliches QE angekündigt. Die EZB hat den Einlagezinssatz für Banken von -0,40% auf -0,50% gesenkt und für den Herbst den Beginn eines weiteren, wieder zeitlich unbegrenztes Anleihekaufprogrammen angekündigt. Die Nachrichten sorgten nur noch am Tag der Pressekonferenzen für minimale Ausschläge an den Kapitalmärkten. Hiermit setzt sich eine Entwicklung der letzten rund 10 Jahren sehr klar fort. Es ist festzuhalten, dass die Marktreaktionen auf Aktionen der Zentralbanken immer schwächer werden.
Diese Aktionen der Zentralbanken haben zu nochmals deutlich festeren Kursen von Investment Grade Anleihen geführt, so dass zwischenzeitlich Anleihen im Umfang von rund 13.000 Mrd. nur noch negative Renditen beim jetzigen Erwerb bieten.
Ferner ist seit mehreren Monaten eine inverse Zinsstrukturkurve in den USA zu sehen, d.h. Renditen kurzfristiger Anleihen notieren höher als die Renditen von längerfristigen Anleihen – dieser Formation ist in den vergangenen 60 Jahren (mit einer Ausnahme zum Ende der 1960er Jahre) stets eine Rezession in den USA gefolgt.
Ein besonderes Augenmerk bedarf es noch einer Sondersituation am amerikanischen Interbankengeldmarkt in der zweiten Septemberhälfte. Plötzlich kollabierte dieser Markt. Der Zinssatz zu dem Banken sich untereinander Kapital „über Nacht" ausleihen, schnellte von 2 auf 10% hoch, so dass die FED den Banken an mehreren, teils aufeinander folgenden Tagen jeweils täglich rund 80 Mrd. Liquidität anbieten musste, um die Märkte wieder zu beruhigen. Die Banken nahmen an den Tagen jeweils fast das gesamte Angebot an. Derartige Interventionen der FED waren zuletzt im Jahr 2008 im Rahmen der Lehmann-Pleite erfolgt.
Anleihen der ersten Qualität werden im Kurs weiter fester notieren, da – zumindest in den USA – weitere Zinssenkungen und auf beiden Seiten des Atlantiks zusätzliche Liquidität zu erwarten sein werden. Allerdings wird dies die negativen Renditen weiter verstärken und eben keine attraktiven Anlagemöglichkeiten bieten.
Wir sind in diesem Segment aufgrund negativer oder nur minimaler Renditen weiterhin nicht investiert.
Autor: Dr. Oliver Stolte · Alpine Trust Management GmbH · Am Südpark 45 · D – 50968 Köln-Marienburg
Tel. +49 221 250 80 987 · Fax +49 221 250 80 988 · Mail [email protected]
JEDES VERMÖGEN HAT EINE GESCHICHTE - GEMEINSAM SCHREIBEN WIR SIE WEITER.
ANLEIHEN, Non-Investment Grade notierten in allen Segmenten im letzten Quartal leicht freundlicher, da die hier noch gebotenen positiven Renditen Investoren anlockten.
Anleihen der zweiten Qualität werden – gestützt durch die genannten Stimuli der Zentralbanken – seitwärts notieren.
Wir sind in diesem Segment in kurzen bis mittleren Laufzeiten investiert, da wir von langfristig niedrigen Zinsen ausgehen.
ÖL
WTI-Rohöl schoss im September aufgrund des Angriffs auf die saudischen Ölfelder stark nach oben, pendelte sich hiernach aber wieder in einer Spanne um 55-60 US-$/Barrel ein. Wir sind in Öl weiterhin nicht investiert, da auch dieser Markt – neben seiner starken politischen Prägung – von der nachlassenden Weltkonjunktur weiter belastet werden dürfte.
GOLD
notierte stark freundlicher und hat seinen sechsjährigen Widerstand bei 1.400 nach oben durchstoßen, um unmittelbar bis aus 1.554 US-$/Unze vorzurücken. Hierdurch ist Gold nun aus charttechnischer Sicht für viele Investoren wieder eine Alternative bei fallenden Aktienkursen geworden.
Wir erwarten nach Abarbeiten der aktuellen kleineren Korrektur – die durchaus noch bis 1.450 US-$/Unze verlaufen kann – deutlich höhere Kurse in diesem und den nächsten Jahren.
Wir halten die maximalen Zielquoten in Gold.
EUR-USD
Der USD notierte gegen den Euro sukzessive fester und erreichte jüngst Wechselkurse unter 1,09 US-$/€.
Wir gehen von einem stärkeren USD – nicht nur gegenüber dem EUR – aus und können uns bei weiterem Fortschreiten der Aktienmarktkorrektur auch eine Entwicklung zur Parität als safe haven gut vorstellen.
Disclaimer und Risikohinweise
Diese Unterlage ist kein Angebotsprospekt und stellt kein Angebot zum Erwerb von Wertpapieren jeglicher Art dar. Sie dient ausschließlich der Information. Diese Unterlage ist persönlich und darf nur von derjenigen Person verwendet werden, der wir die Unterlage ausgehändigt und/oder zugesandt haben. Sie darf ohne unsere ausdrückliche Genehmigung weder vervielfältigt noch direkt oder indirekt verteilt oder einer anderen Person zugängig gemacht werden. Die in dieser Unterlage enthaltenen Informationen, Meinungen und Einschätzungen geben den Stand zum Zeitpunkt der Publikation wieder. Die in dieser Unterlage enthaltenen Informationen und Meinungen stammen aus von uns als zuverlässig erachteten Quellen. Dennoch garantieren wir weder deren Richtigkeit noch deren Vollständigkeit. Die in dieser Unterlage enthaltenen Informationen, Meinungen und Einschätzungen stellen keine rechtliche und/oder steuerliche Empfehlung allgemeiner oder spezifischer Natur dar. Bevor auf der Grundlage dieser Unterlage eine Anlageentscheidung getroffen wird, empfehlen wir einen eigenen unabhängigen steuerlichen und/oder juristischen Berater zu konsultieren. Die Informationen in dieser Unterlage können Aussagen über künftige Entwicklungen enthalten. Aufgrund ihrer Art beinhalten solche Aussagen allgemeine und spezifische Risiken und Ungewissheiten. Es besteht die Gefahr, dass Vorhersagen, Prognosen, Projektionen und Ergebnisse, die in zukunftsgerichteten Aussagen beschrieben oder impliziert sind, nicht eintreffen. Die Wertentwicklung in der Vergangenheit ist kein Hinweis auf und bietet keinerlei Garantie für künftige Wertentwicklungen. Es wird weder eine ausdrückliche noch eine stillschweigende Haftung oder Garantie bezüglich der künftigen Wertentwicklung übernommen. Investitionen sind mit Risiken verbunden, wozu auch der Verlust des eingesetzten Kapitals gehört.
Autor: Dr. Oliver Stolte · Alpine Trust Management GmbH · Am Südpark 45 · D – 50968 Köln-Marienburg
Tel. +49 221 250 80 987 · Fax +49 221 250 80 988 · Mail [email protected]
JEDES VERMÖGEN HAT EINE GESCHICHTE - GEMEINSAM SCHREIBEN WIR SIE WEITER.
Trump's Trade Quagmire (Wonkish)
He just keeps escalating as his strategy fails.
By Paul Krugman Opinion Columnist
Aug. 3, 2019
Remember the Vietnam quagmire? (Actually, I hope many of my readers are young enough that they don't, but you've presumably heard about it.) In political discourse, "quagmire" has come to have a quite specific meaning. It's what happens when a government has committed itself to a policy that isn't working, but can't bring itself to admit failure and cut its losses. So it just keeps escalating, and things keep getting worse.
Well, here's my thought: Trump's trade war is looking more and more like a classic policy quagmire. It's not working — that is, it isn't at all delivering the results Trump wants. But he's even less willing than the average politician to admit to a mistake, so he keeps doing even more of what's not working. And if you extrapolate based on that insight, the implications for the U.S. and world economies are starting to get pretty scary.
This article, by the way, while not very technical, is going to make use of a number of charts and even a few terms of art, hence the "wonkish" warning.
To preview, I'm going to make five points:
1. The trade war is getting big. Tariffs on Chinese goods are back to levels we associate with pre-1930s protectionism. And the trade war is reaching the point where it becomes a significant drag on the U.S. economy.
2. Nonetheless, the trade war is failing in its goals, at least as Trump sees them: the Chinese aren't crying uncle, and the trade deficit is rising, not falling.
3. The Fed probably can't offset the harm the trade war is doing, and is probably getting less willing even to try.
Unlock more free articles. Create an account or log in
4. Trump is likely to respond to his disappointments by escalating, with tariffs on more stuff and more countries, and — despite denials — in the end, with currency intervention.
5. Other countries will retaliate, and this will get very ugly, very fast.
I could, of course, be wrong. But that's how it looks given what we know now.
O. K., let's start with the scale of the policy. The invaluable people at the Peterson Institute for International Economics have a nice chart showing the escalation of tariffs on Chinese goods under Trump:
Trump's tariff escalation PIIE
So roughly speaking, we've seen a 20 percent tax imposed on the $500 billion worth of goods we import from China each year. Although Trump keeps insisting that the Chinese are paying that tax, they aren't. When you compare what has happened to prices of imports subject to new tariffs with those of other imports, it's overwhelmingly clear that the burden is falling on U.S. businesses and consumers.
So that's a $100 billion a year tax hike. However, we aren't collecting nearly that much in extra tariff revenue:
Partly that's because the revenue numbers don't yet include the full range of Trump tariffs. But it's also because one big effect of the Trump tariffs on China has been to shift the sourcing of U.S. imports — e.g., instead of importing from China, we buy stuff from higher-cost sources like Vietnam. When this "trade diversion" happens, it's still a de facto tax increase on U.S. consumers, who are paying more, but it doesn't even have the benefit of generating new revenue.
So this is a pretty big tax hike, which amounts to contractionary fiscal policy. And we should add in two other effects: foreign retaliation, which hurts U.S. exports, and uncertainty: Why build a new factory when for all you know Trump will suddenly decide to cut off your market, your supply chain, or both?
I don't think it's outlandish to suggest that the overall anti-stimulus from the Trump tariffs is comparable in scale to the stimulus from his tax cut, which largely went to corporations that just used the money to buy back their own stock. And that stimulus is behind us, while the drag from his trade war is just getting started.
But why is Trump doing this? A lot of center-right apologists for Trump used to claim that he wasn't really fixated on bilateral trade balances, which every economist knows is stupid, that it was really about intellectual property or something. I'm not hearing that much anymore; it's increasingly clear that he is, indeed, fixated on trade balances, and believes that America runs trade deficits because other countries don't play fair.
Strange to say, however, despite all those new tariffs the U.S. trade deficit is getting bigger, not smaller, on his watch:
The deficit that wouldn't come down Federal Reserve of St. Louis
And adjusted for inflation, imports are still growing strongly, while U.S. exports have been shriveling:
Who's winning this trade war, exactly? Federal Reserve of St. Louis
Why aren't tariffs shrinking the trade deficit? Mainly the answer is that Trump's theory of the case is all wrong. Trade balances are mainly about macroeconomics, not tariff policy. In particular, the persistent weakness of the Japanese and European economies, probably mainly the result of shrinking prime-age work forces, keeps the yen and the euro low and makes the U.S. less competitive.
When it comes to recent import and export trends, there may also be an asymmetric effect of the tariffs themselves. As I already mentioned, U.S. tariffs on Chinese goods don't do much to reduce overall imports, because we just shift to products from other Asian economies. On the other hand, when the Chinese stop buying our soybeans, there aren't any major alternative markets.
Whatever the explanation, Trump's tariffs aren't producing the results he wanted. Nor are they getting the other thing he wants: Splashy concessions from China that he can portray as victories ("tweetable deliveries"). As Gavyn Davies says, China seems "increasingly confident it can weather the trade wars," and it's not showing any urge to placate the U.S.
So this might seem to be a good time to hit the pause button and rethink strategy. Instead, however, Trump went ahead and slapped on a new round of tariffs. Why?
Well, stock traders reportedly think that Trump was emboldened by the Fed's rate cut, which he imagines means that the Fed will insulate the U.S. economy from any adverse effects of his trade war. We have no way of knowing if that's true. However, if Trump does think that, he's almost surely wrong.
For one thing, the Fed probably doesn't have much traction: interest rates are already very low. And the sector most influenced by interest rates, housing, hasn't shown much response to what is already a sharp drop in mortgage rates.
Furthermore, the Fed itself must be wondering if its rate cut was seen by Trump as an implicit promise to underwrite his trade war, which will make it less willing to do more — a novel form of moral hazard.
There is, by the way, a strong contrast here with China, which for all its problems retains the ability to pursue coordinated monetary and fiscal stimulus to a degree unimaginable here. Trump probably can't bully the Fed into offsetting the damage he's inflicting (and just try to imagine him getting Nancy Pelosi to bail him out); Xi is in a position to do whatever it takes.
So what will Trump do next? My guess is that instead of rethinking, he'll escalate, which he can do on several fronts. He can push those China tariffs even higher. He can try to deal with trade diversion by expanding the trade war to include more countries (good morning, Vietnam!).
And he can sell dollars on foreign exchange markets, in an attempt to depreciate our currency. The Fed would actually carry out the intervention, but currency policy is normally up to the Treasury Department, and in June Jerome Powell reiterated that this is still the Fed's view. So we might well see a unilateral decision by Trump to attempt to weaken the dollar.
But a deliberate attempt to weaken the dollar, gaining competitive advantage at a time when other economies are struggling, would be widely — and correctly — seen as beggar-thy-neighbor "currency war." It would lead to widespread retaliation, even though it would also probably be ineffective. And the U.S. would have forfeited whatever remaining claims it may still have to being a benevolent global hegemon.
The Times is committed to publishing a diversity of letters to the editor. Weʼd like to hear what you think about this or any of our articles. Here are some tips. And hereʼs our email: [email protected].
Follow The New York Times Opinion section on Facebook, Twitter (@NYTopinion) and Instagram.
Paul Krugman has been an Opinion columnist since 2000 and is also a Distinguished Professor at the City University of New York Graduate Center. He won the 2008 Nobel Memorial Prize in Economic Sciences for his work on international trade and economic geography. @PaulKrugman
READ 365 COMMENTS
|
<urn:uuid:162ed35d-acc7-458a-ad68-a63636d82487>
|
CC-MAIN-2021-25
|
https://alpinetrust.de/wp-content/uploads/2018/03/2019-10-01-Marktbericht-ATM.pdf
|
2021-06-18T03:19:22+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-25/subset=warc/part-00171-e638c5dd-3c3d-4738-8d52-dc1e9f44de3a.c000.gz.parquet
| 108,073,620
| 4,772
|
eng_Latn
|
eng_Latn
| 0.66642
|
deu_Latn
| 0.712156
|
[
"deu_Latn",
"deu_Latn",
"deu_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3027,
6065,
9834,
11582,
12156,
13792,
14522,
16186,
18661
] |
INDICES
| +17,7% |
|---|
| +18,9% |
| +15,4% |
| +18,8% |
| +16,8% |
| +8,7% |
| +0,8% |
AKTIEN
Ähnlich wie bereits im April 2019 genügte auch im August wieder eine Twitter Nachricht des US-Präsidenten Donald Trump für einen stärkeren Kursrückgang von rund 7% an den Aktienmärkten. Einmal mehr drohte er mit seiner Verschärfung des Handelskonfliktes mit China – erstmals bezeichnete er den Chinesischen Präsidenten Xi als Feind.
Auf diese Korrekturen an den amerikanischen und europäischen Aktienmärkten folgten Erholungen bis an die seit längerem intakten oberen Widerstandszonen, an denen die Märkte jüngst notieren. In Amerika sind dies jeweils die all-time highs – in Europa sind es Kursniveaus die rund 10% unter den höchsten Kursen vom Jahreswechsel 2017-18 liegen.
Es ist weiterhin unmöglich einen soliden Ausblick auf die kurzfristige weitere Marktentwicklung zu geben. Die Kapitalmärkte werden weiterhin massgeblich vom Handelskonflikt der USA mit China beeinflusst. Wir schätzen, dass die Verhandlungen weiterhin zäh verlaufen werden, da u.a. die Chinesen die Verhandlungen in den US-Präsidentschaftswahlkampf 2020 ziehen möchten, um für sich eine noch bessere Verhandlungsposition gegenüber Trump zu erreichen. Trump hat sich völlig planlos verrannt und findet keinen sauberen Weg zurück zu einer Lösung – insbesondere wird es ihm unmöglich sein, nochmals ein minimales Vertrauen bei den Chinesen zu gewinnen, da die Bezeichnung als Feind für Chinesen unentschuldbar ist. Entsprechend dürfte die Phase der schwierigen Vorhersehbarkeit weiterhin anhalten. Wir möchten an dieser Stelle auf unsere diesmalige Beilage hinweisen. Uns fiel kürzlich ein Artikel des Nobelpreisträgers Paul Krugman in der New York Times in die Hände, in dem er eben diese Situation im sumpfigen Moor, in der sich die US-Politik befindet, beschreibt.
Für einen längerfristigen Blick bleibt festzuhalten, dass der Konjunkturzyklus in den USA überlang war und er massgeblich durch die US-Steuersenkung in 2017 künstlich verlängert wurde. Europa befindet sich bereits sehr deutlich in einer Abschwungsphase. Dennoch notieren die Aktienkurse bisher – im Vergleich zu früheren Jahren – noch sehr hoch. Die aktuellen Niveaus spiegeln die zu erwartenden rückläufigen Umsatz- und Ergebniszahlen der Unternehmen noch nicht wieder. Als wichtigste Begründung wird vieler Ortens die Alternativlosigkeit der Aktien mangels Rendite auf der Bondseite genannt – dies ist uns zu wenig. Wir gehen – weiterhin völlig unverändert – von einer stärkeren Korrektur an den Aktienmärkten aus. Das aktuelle Kursniveau in den USA stellt sicherlich für ein bis zwei Jahre einen sehr starken Widerstand nach oben dar. Von hier aus dürften sich deutlich fallende Kurse in den nächsten Monaten zur abschließenden Welle 5 des laufenden Abwärtszyklus formieren. Am Ende dieser folgenden Korrekturwelle können wir uns sehr gut mindestens Kurse um 2.650 Punkte im S&P500 vorstellen. Auch Kurse des Heiligabends 2018 (S&P500 bei 2.350 Punkten) sind nicht unwahrscheinlich.
Wir sind unverändert mit einem Viertel der jeweils maximalen Aktienquote netto short investiert.
ANLEIHEN, Investment Grade
Beachtenswert sind die aktuellen Zeitpunkte der jüngsten Maßnahmen. Sie sind allesamt sehr früh im laufenden Abwärtszyklus. Dies schürt zunehmend die Sorge der Marktteilnehmer, wie kritisch die Zentralbanken die aktuelle wirtschaftliche Abkühlung tatsächlich einschätzen.
Beide großen Zentralbanken haben – auch unter dem massiven Druck der US-Politik – im letzten Quartal alles geliefert, was die Kapitalmärkte sich gewünscht hatten. Die FED hat zweimal ihren Referenzzins auf einen aktuellen Korridor von 1,75-2,00% gesenkt und ferner ein neuerliches QE angekündigt. Die EZB hat den Einlagezinssatz für Banken von -0,40% auf -0,50% gesenkt und für den Herbst den Beginn eines
|
weiteren, wieder zeitlich unbegrenztes Anleihekaufprogrammen angekündigt.
| 3,834
|
beginning_of_word
|
weiteren,
|
remove_all
|
<url>
https://alpinetrust.de/wp-content/uploads/2018/03/2019-10-01-Marktbericht-ATM.pdf
</url>
<text>
INDICES
| +17,7% |
|---|
| +18,9% |
| +15,4% |
| +18,8% |
| +16,8% |
| +8,7% |
| +0,8% |
AKTIEN
Ähnlich wie bereits im April 2019 genügte auch im August wieder eine Twitter Nachricht des US-Präsidenten Donald Trump für einen stärkeren Kursrückgang von rund 7% an den Aktienmärkten. Einmal mehr drohte er mit seiner Verschärfung des Handelskonfliktes mit China – erstmals bezeichnete er den Chinesischen Präsidenten Xi als Feind.
Auf diese Korrekturen an den amerikanischen und europäischen Aktienmärkten folgten Erholungen bis an die seit längerem intakten oberen Widerstandszonen, an denen die Märkte jüngst notieren. In Amerika sind dies jeweils die all-time highs – in Europa sind es Kursniveaus die rund 10% unter den höchsten Kursen vom Jahreswechsel 2017-18 liegen.
Es ist weiterhin unmöglich einen soliden Ausblick auf die kurzfristige weitere Marktentwicklung zu geben. Die Kapitalmärkte werden weiterhin massgeblich vom Handelskonflikt der USA mit China beeinflusst. Wir schätzen, dass die Verhandlungen weiterhin zäh verlaufen werden, da u.a. die Chinesen die Verhandlungen in den US-Präsidentschaftswahlkampf 2020 ziehen möchten, um für sich eine noch bessere Verhandlungsposition gegenüber Trump zu erreichen. Trump hat sich völlig planlos verrannt und findet keinen sauberen Weg zurück zu einer Lösung – insbesondere wird es ihm unmöglich sein, nochmals ein minimales Vertrauen bei den Chinesen zu gewinnen, da die Bezeichnung als Feind für Chinesen unentschuldbar ist. Entsprechend dürfte die Phase der schwierigen Vorhersehbarkeit weiterhin anhalten. Wir möchten an dieser Stelle auf unsere diesmalige Beilage hinweisen. Uns fiel kürzlich ein Artikel des Nobelpreisträgers Paul Krugman in der New York Times in die Hände, in dem er eben diese Situation im sumpfigen Moor, in der sich die US-Politik befindet, beschreibt.
Für einen längerfristigen Blick bleibt festzuhalten, dass der Konjunkturzyklus in den USA überlang war und er massgeblich durch die US-Steuersenkung in 2017 künstlich verlängert wurde. Europa befindet sich bereits sehr deutlich in einer Abschwungsphase. Dennoch notieren die Aktienkurse bisher – im Vergleich zu früheren Jahren – noch sehr hoch. Die aktuellen Niveaus spiegeln die zu erwartenden rückläufigen Umsatz- und Ergebniszahlen der Unternehmen noch nicht wieder. Als wichtigste Begründung wird vieler Ortens die Alternativlosigkeit der Aktien mangels Rendite auf der Bondseite genannt – dies ist uns zu wenig. Wir gehen – weiterhin völlig unverändert – von einer stärkeren Korrektur an den Aktienmärkten aus. Das aktuelle Kursniveau in den USA stellt sicherlich für ein bis zwei Jahre einen sehr starken Widerstand nach oben dar. Von hier aus dürften sich deutlich fallende Kurse in den nächsten Monaten zur abschließenden Welle 5 des laufenden Abwärtszyklus formieren. Am Ende dieser folgenden Korrekturwelle können wir uns sehr gut mindestens Kurse um 2.650 Punkte im S&P500 vorstellen. Auch Kurse des Heiligabends 2018 (S&P500 bei 2.350 Punkten) sind nicht unwahrscheinlich.
Wir sind unverändert mit einem Viertel der jeweils maximalen Aktienquote netto short investiert.
ANLEIHEN, Investment Grade
Beachtenswert sind die aktuellen Zeitpunkte der jüngsten Maßnahmen. Sie sind allesamt sehr früh im laufenden Abwärtszyklus. Dies schürt zunehmend die Sorge der Marktteilnehmer, wie kritisch die Zentralbanken die aktuelle wirtschaftliche Abkühlung tatsächlich einschätzen.
Beide großen Zentralbanken haben – auch unter dem massiven Druck der US-Politik – im letzten Quartal alles geliefert, was die Kapitalmärkte sich gewünscht hatten. Die FED hat zweimal ihren Referenzzins auf einen aktuellen Korridor von 1,75-2,00% gesenkt und ferner ein neuerliches QE angekündigt. Die EZB hat den Einlagezinssatz für Banken von -0,40% auf -0,50% gesenkt und für den Herbst den Beginn eines <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://alpinetrust.de/wp-content/uploads/2018/03/2019-10-01-Marktbericht-ATM.pdf\n</url>\n<text>\nINDICES\n\n| +17,7% |\n|---|\n| +18,9% |\n| +15,4% |\n| +18,8% |\n| +16,8% |\n| +8,7% |\n| +0,8% |\n\nAKTIEN\n\nÄhnlich wie bereits im April 2019 genügte auch im August wieder eine Twitter Nachricht des US-Präsidenten Donald Trump für einen stärkeren Kursrückgang von rund 7% an den Aktienmärkten. Einmal mehr drohte er mit seiner Verschärfung des Handelskonfliktes mit China – erstmals bezeichnete er den Chinesischen Präsidenten Xi als Feind.\n\nAuf diese Korrekturen an den amerikanischen und europäischen Aktienmärkten folgten Erholungen bis an die seit längerem intakten oberen Widerstandszonen, an denen die Märkte jüngst notieren. In Amerika sind dies jeweils die all-time highs – in Europa sind es Kursniveaus die rund 10% unter den höchsten Kursen vom Jahreswechsel 2017-18 liegen.\n\nEs ist weiterhin unmöglich einen soliden Ausblick auf die kurzfristige weitere Marktentwicklung zu geben. Die Kapitalmärkte werden weiterhin massgeblich vom Handelskonflikt der USA mit China beeinflusst. Wir schätzen, dass die Verhandlungen weiterhin zäh verlaufen werden, da u.a. die Chinesen die Verhandlungen in den US-Präsidentschaftswahlkampf 2020 ziehen möchten, um für sich eine noch bessere Verhandlungsposition gegenüber Trump zu erreichen. Trump hat sich völlig planlos verrannt und findet keinen sauberen Weg zurück zu einer Lösung – insbesondere wird es ihm unmöglich sein, nochmals ein minimales Vertrauen bei den Chinesen zu gewinnen, da die Bezeichnung als Feind für Chinesen unentschuldbar ist. Entsprechend dürfte die Phase der schwierigen Vorhersehbarkeit weiterhin anhalten. Wir möchten an dieser Stelle auf unsere diesmalige Beilage hinweisen. Uns fiel kürzlich ein Artikel des Nobelpreisträgers Paul Krugman in der New York Times in die Hände, in dem er eben diese Situation im sumpfigen Moor, in der sich die US-Politik befindet, beschreibt.\n\nFür einen längerfristigen Blick bleibt festzuhalten, dass der Konjunkturzyklus in den USA überlang war und er massgeblich durch die US-Steuersenkung in 2017 künstlich verlängert wurde. Europa befindet sich bereits sehr deutlich in einer Abschwungsphase. Dennoch notieren die Aktienkurse bisher – im Vergleich zu früheren Jahren – noch sehr hoch. Die aktuellen Niveaus spiegeln die zu erwartenden rückläufigen Umsatz- und Ergebniszahlen der Unternehmen noch nicht wieder. Als wichtigste Begründung wird vieler Ortens die Alternativlosigkeit der Aktien mangels Rendite auf der Bondseite genannt – dies ist uns zu wenig. Wir gehen – weiterhin völlig unverändert – von einer stärkeren Korrektur an den Aktienmärkten aus. Das aktuelle Kursniveau in den USA stellt sicherlich für ein bis zwei Jahre einen sehr starken Widerstand nach oben dar. Von hier aus dürften sich deutlich fallende Kurse in den nächsten Monaten zur abschließenden Welle 5 des laufenden Abwärtszyklus formieren. Am Ende dieser folgenden Korrekturwelle können wir uns sehr gut mindestens Kurse um 2.650 Punkte im S&P500 vorstellen. Auch Kurse des Heiligabends 2018 (S&P500 bei 2.350 Punkten) sind nicht unwahrscheinlich.\n\nWir sind unverändert mit einem Viertel der jeweils maximalen Aktienquote netto short investiert.\n\nANLEIHEN, Investment Grade\n\nBeachtenswert sind die aktuellen Zeitpunkte der jüngsten Maßnahmen. Sie sind allesamt sehr früh im laufenden Abwärtszyklus. Dies schürt zunehmend die Sorge der Marktteilnehmer, wie kritisch die Zentralbanken die aktuelle wirtschaftliche Abkühlung tatsächlich einschätzen.\n\nBeide großen Zentralbanken haben – auch unter dem massiven Druck der US-Politik – im letzten Quartal alles geliefert, was die Kapitalmärkte sich gewünscht hatten. Die FED hat zweimal ihren Referenzzins auf einen aktuellen Korridor von 1,75-2,00% gesenkt und ferner ein neuerliches QE angekündigt. Die EZB hat den Einlagezinssatz für Banken von -0,40% auf -0,50% gesenkt und für den Herbst den Beginn eines <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "weiteren, wieder zeitlich unbegrenztes Anleihekaufprogrammen angekündigt.",
"role": "assistant"
}
] |
|
INFRASTRUCTURAL FACILITIES OF ELEMENTARY SCHOOLS IN KAKDWIP SUBDIVISION OF SOUTH TWENTY FOUR PARGANAS DISTRICT, WEST BENGAL
ANGSHUMITA CHAKRABORTY
Mahishadal Girls'
College
PurbaMedinipur District, West Bengal
Email: [email protected]
ABSTRACT:
Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the core methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully. Different Researches have already established the fact that non-availability or poor infrastructure affects the quality of education.Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education. In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and Pathar Pratima. DISE data and field observation are the key sources of information. Parameters have been selected from the EDI parameters proposed by National University of Planning and Administration with some necessary modifications.Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard.
KEY WORDS: School environment, school infrastructure, Universalization of Elementary Education, infrastructural facilities.
1. Introduction: Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully.
Omotoso (1992) and Adeyemi (1998) stressed that educational facilities are the main contributors to students learning outcomes in the school system. These facilities include school buildings, classrooms, furniture, libraries, recreational equipment, apparatus and other instructional materials (cited in Adeyemi and Adu, 2010). Availability or non-availability of physical facilities affect the quality of education; provision of sufficient facilities in schools provides a challenging environment for students and effective teaching by the teachers; lack of adequate facilities such as textbooks, ill-equipped classrooms, laboratories, workshops and library are responsible for poor performance in examinations among the student's (Saeed and Wain, 2011). Different Researches have already established the fact that nonavailability or poor infrastructure affects the quality of education. Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education.
2. Materials and Methods:In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. The Study Area is located within N 21º32΄ to N 22º0΄20˝ of latitudes and E 87º58΄59˝ to E 88º32΄47˝ of longitudes. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and PatharPratima. DISE data and field observation are the key sources of information. The objective of this paper is to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district in West Bengal.
International Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022
National University of Planning and Administration (NUEPA) have proposed some parameters for preparing Educational Development Index. Some parameters have been selected from these. Selected variables are as follows: pupil-classroom ratio, school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. At first the variables have been categorized into two divisions viz., positive and negative. After calculating the Z- Scores of each of these variables G. P wise, Composite Z- Scores have been calculated for positive variables for the year 2010. Suitable statistical methods and cartographic techniques have been applied for proper representation.
3. Observations: Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard. Though in a region like Sundarban sometimes it is felt that people are compelled to send their children to the nearest available school ignoring whatever may be the infrastructure as they have very limited choice specially in case of upper primary school.Eighteen schools have been visited in Sagar block within which twelve schools are primary and six schools are upper primary schools. Drinking water, electricity, kitchen shed, and book bank all these facilities are present in the school. But all of these schools do not have play ground and boundary wall. Even ManasadwipGangamoniSishuNiketan has no drinking water and separate toilet facility. But it has a common toilet.The percentage for schools having electric facility was only 5% in 2010 respectively. Thirteen schools have been visited in Kakdwip block. All of them have drinking water facility.Girls' toilet is also found within them. Many of them do not have play ground. BagherChakSishuShiksha Kendra,Berar ChakNiveditaSishuShiksha Kendra do not have ramp.
4. Discussion:
4.A.Situation of Institutional Arrangement and Infrastructural Facilities:
4. A.1. Classroom: It has been observed that (Table 1) average number of class room for primary level remains same (4) for 2007 and 2010. The upper primary schools have an average room of 12 and 10 for 2007 and 2010 respectively. In Kakdwip sub-division there was more (2109) class room at primary section than upper primary (1518). In case of primary though 68.56% of classroom was pucca in nature, 31.20% of classroom was partially pucca in nature. For upper primary 92.16% classroom was pucca and only 7.05% classroom was partially pucca. It has been found from table 2 that more than 50% of the class room was of good condition in Kakdwip subdivision for both primary and upper primary level. But 20% of the class rooms of primary level and 14% of the class rooms of upper primary level needed minor repair. On the other hand, the proportions for classroom which need major repair were 27% and 23% for primary and upper primary level respectively.
4. A.2. Pupil-Class Room Ratio: The indicator 'Average Student-Classroom ratio' (SCR) gives an idea as to how many students there are, on an average, in a classroom. Jalan and Panda (2010) consider this ratio as the only physical infrastructural characteristic of school that has some impact on learning levels. This pupil class room ratio (Table-3) is quite higher in the upper primary level than the primary level indicating the fact that congested class-room, lack of sufficient class-room space is hampering the teaching-learning process. In case of primary level pressure of student is highest on Kakdwip block and at upper primary level the pressure shifted to Sagar block. So, in Sagar block the classrooms area a little bit crowded. On the other hand the pressure is less in Namkahana block at both primary and upper primary level. Flow of students from adjoining district (Midnapore) to Sagar block for higher study may be one of the causes for this.
4. A.3. Drinking Water Facilities: Availability of drinking water in school is the most essential facility that every school must have. From Fig. 1, it is clear that drinking water facility was higher in primary schools than the upper primary schools for both 2007 and 2010. Out of 701 elementary schools within Kakdwip sub-division about 94% schools (primary 75% and upper primary 19%) had drinking water facility in 2007. But in 2010 this figure went down to almost 89%, within these primary schools occupied 69%, but upper primary schools occupied only 20%. At the elementary level PatharPratima (33.52%), Kakdwip (22.25%), Sagar (21.97%), and Namkhana (16.26%) blocks represents 1st, 2nd, 3rd and 4th position respectively in 2007. Same ranking was maintained in 2010 for the elementary level. PatharPratima (27.67%), Sagar (17.55%), Kakdwip (16.69%) and Namkhana (13.12%) occupied the 1st, 2nd, 3rd and 4th position in case of the primary schools. While the positions of PatharPratima (5.85%), Kakdwip (5.56%), Sagar (4.42%), and Namkhana (3.14 %) were 1st, 2nd,3rd and 4th respectively for the upper primary schools.Dependency on tube well was found within 85% and 90% schools at primary and upper primary level respectively. Only 2% of schools had tap water facility for both primary and upper primary level in 2010. 8% primary and 4% upper primary schools had no drinking water facility in 2010.
4. A.4. Toilet facility: In Kakdwip sub-division, about 88.30% of the elementary schools had common toilet facility and only 41.94% of schools had girls' toilet in 2007 (table 4). The percentage was higher for primary schools (70%). A few upper primary schools had common toilet facilities (18%). But the provision is more
International Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022
necessary for the upper primary level. About 58% of the elementary schools of Kakdwip sub-division did not have girls' toilet. The percentage was almost the same (57%) for primary schools but far less like only 1% for upper primary schools. Out of 42% elementary schools having this facility, primary schools occupied 24% and upper primary schools occupied 18%. In case of elementary school, 88.30% of the schools had common toilet. But in 2010, the proportion of school having common toilet had been decreased and proportion of school with girls' toilet had been increased. The same trend was found in primary, upper primary and total elementary. It is a good sign that to increase girls' enrolment and retention more girls' toilet was being constructed. Still 34% primary and 11% upper primary schools didn't have even common toilet. The proportion of schools without girls' toilet was 27% and 2% for primary and upper primary level respectively. Some of the schools though had latrines but it was without water and door. Students had to go to home for accessing toilet, parents hesitate to send their girl child to school and teachers also face great problem for this. Female teachers coming from long distance and also the teachers who reside in that village have to search for toilet in nearby houses in need which is very awkward to them. Especially for co-educational schools this create great problem for regular attendance. Except Swami Vivekananda in Kakdwip block, Ghoramara, Muriganga-I, Ramkarchar in Sagar block, DakshinRoypur in PatharPratima block all other GPs had some upper primary schools without common toilet. Suryanagar in Kakdwip block, DakshinGangadharpur, DakshinRoypur, Durbachati, HerambaGopalpur, LaxmiJanardanpur in PatharPratima block, Dhablat, DhasparaSumatinagar-I in Sagar block, Budhakhali, Frasergunj, Haripur, Shibrampur of Namkhana block had some upper primary schools without girls' toilet. 4. A.5. Other facilities: In Kakdwip sub-division only 10% of the elementary schools had electric connection in 2007 within which primary school occupies 3% and upper primary school occupied 7% and in 2010 this percentage value rose to 12% only. Only 4% of the primary schools and 8% of the upper primary schools had electric connection in 2010.Book bank facility is a sector within infrastructural facilities where cent percent development has been occurred in Kakdwip sub-division. About 98% of the elementary schools were having this facility in 2007 and in 2010 it covered each and every school.69% and 36% schools have Kitchen Shedat both primary and upper primary level respectively.
4.B. Status of Developmentat block level:
Selected variables for this study includes school student ratio, average student-classroom ratio, pupil-teacher ratio, school teacher ratio, classroom type, condition of classroom school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. Composite Z- Scoreshave been calculated for positive variables for the year 2010 at gram panchayat level (Table 5). Three classes have been prepared to reveal the levels of development at the Gram Panchayat level regarding infrastructure issue in elementary schools like high development (1.00 to 2.00), moderate development (0 to1.00), low development (0 to -1.00) and very low development (-1.00 to -2.00) in case of positive variables.
Kakdwip Block:In Kakdwip block, Pratapadityanagar and Suryanagar G. P reflect highest and lowest development respectively in case of the positive indicators. Only Pratapadityanagar exhibits high level of development. Bapuji, Rabindra, Rishi Bankim Chandra,Srinagar and Swami Vivekananda fall within the zone of moderate level of development. Madhusudanpur, Netaji,Ramgopalpur, Sri Sri Ramakrishna andSuryanagarshow low level of development.In case of the negative indicators,Suryanagar and Madhusudanpur G. P have been identified as most developed and least developed G.P. They fall within the zones of high development and very low development.Sri Sri Ramakrishna,Rishi Bankimchandra, Swami Vivekananda, Pratapadityanagarexhibit low level of development whileBapuji,Netaji, Rabindra,Ramgopalpur, Srinagar, fall within the moderate development zone(Map 1).
Sagarblock: InSagar block, Ramkarchar and Ghoramara G. P reflect highest and lowest development respectively in case of the positive indicators. They fall within the zones of high development and very low development.Dhablat, Gangasagar and Rudranagar represent moderate level of development. Rest of the gram panchayats falls under low development zone. In case of the negative indicators,Ghoramara,Muri Ganga I reflect high development and Gangasagar represent very low development. Ramkarchar andRudranagar exhibit moderate level of development. Rest of the gram panchayats falls within the zone of low development (Map 2).
5. Conclusions: In this era of Globalization, it is desirable that every school will have the basic facilities. But in case of schools of Sundarban area especially for the vulnerable parts like Ghoramara Island, Mousini Island, GPlot and some other islands of PatharPratima C.D. Block, it cannot be expected. Developing school infrastructure becomes a demotivating issue for the Government. Fund distribution should be made on accordance with the need of the schools and the authority should be very alert and efficient in collection and utilization of fund, grant etc. at right moment. Proper monitoring and supervision can be beneficial for effective utilization of fund. Along with that area specific strategies, greater flexibility in approach and sympathetic attitude are required to realize the local need and to improve the efficiency of this system.
6.References
- Analytical Report (2005), Elementary Education in India, NIEPA, New Delhi, pp.171-210.
- Adeyemi T.O and E.T. Adu (2010), Enrolment Analysis and the Availability of Physical Facilities for the Universal Basic Education Programme in Ekiti State, Nigeria, Middle-East Journal of Scientific Research 5 (1): 14-21, (Online) available at www.idosi.org/mejsr/mejsr5(1)/3.pdf,(accessed on 8.2.13).
- DISE (2007),Flash Statistics, NUEPA, New Delhi.
- Jalan J. and Panda (2010), Low Mean High Variance: Quality of Primary Education in Rural West Bengal, Centre for Studies in Social Sciences, Calcutta, pp. 1-96, (Online) available a www.cssscal.org/pdf/Education%20Report%20CD.pdf, (accessed on 17.03.13).
- DISE (2010),Flash Statistics, NUEPA, New Delhi.
- Saeed M. and K. U. R. Wain (2011), Status of Missing Physical Facilities in Government Schools of Punjab, Journal of Research and Reflections in Education, December,5(2):105 -127(Online) available at http://www.ue.edu.pk/jrre, (accessed on 12.03.13).
- Zaidi S.M.I.A. (2005), Provision and Utilization of Elementary Education Facilities in North East India: What DISE data reveals? New Frontiers in Education, 35 (3).
Fig 1: Schools Having Drinking Water Facility in Kakdwip Sub-Division, Data Source: DISE, 2010
7. Tables & Figures:
Table-1: Average Number of Class Room; Data Source: DISE, 2007 and 2010
Table-3: Average Pupil Class Room Ratio;Data Source: DISE, 2007 and 2010
Table-2: Condition of Classroom in the Study Area; Source: DISE, 2010
Table 4: Toilet Facility in Kakdwip Sub-Division; Data Source: DISE, 2007and 2010
Table 5: Mean Composite Z- Scores of two Block; Data Source: Computed from DISE (2010) data
Map-1& 2: Infrastructural Development of Elementary Schools in Kakdwip&Sagar Block (Based On Positive Variables, 2010); Data Source: Computed from DISE (2010) data
|
<urn:uuid:e0e218e3-7a09-4c18-9d66-5a132eb26dbf>
|
CC-MAIN-2025-08
|
https://int-jecse.net/article/INFRASTRUCTURAL+FACILITIES+OF+ELEMENTARY+SCHOOLS+IN+KAKDWIP+SUBDIVISION+OF+SOUTH+TWENTY+FOUR+PARGANAS+DISTRICT%252C+WEST+BENGAL_5272/?download=true&format=pdf
|
2025-02-06T15:26:38+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2025-08/subset=warc/part-00273-b184e832-acd1-425a-bab7-895830f2748a.c000.gz.parquet
| 284,957,619
| 4,224
|
eng_Latn
|
eng_Latn
| 0.744624
|
eng_Latn
| 0.993326
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4858,
10803,
16769,
18145,
18466,
18631
] |
INFRASTRUCTURAL FACILITIES OF ELEMENTARY SCHOOLS IN KAKDWIP SUBDIVISION OF SOUTH TWENTY FOUR PARGANAS DISTRICT, WEST BENGAL
ANGSHUMITA CHAKRABORTY
Mahishadal Girls'
College
PurbaMedinipur District, West Bengal
Email: [email protected]
ABSTRACT:
Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the core methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully. Different Researches have already established the fact that non-availability or poor infrastructure affects the quality of education.Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education. In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and Pathar Pratima. DISE data and field observation are the key sources of information. Parameters have been selected from the EDI parameters proposed by National University of Planning and Administration with some necessary modifications.Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard.
KEY WORDS: School environment, school infrastructure, Universalization of Elementary Education, infrastructural facilities.
1. Introduction: Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully.
Omotoso (1992) and Adeyemi (1998) stressed that educational facilities are the main contributors to students learning outcomes in the school system. These facilities include school buildings, classrooms, furniture, libraries, recreational equipment, apparatus and other instructional materials (cited in Adeyemi and Adu, 2010). Availability or non-availability of physical facilities affect the quality of education; provision of sufficient facilities in schools provides a challenging environment for students and effective teaching by the teachers; lack of adequate facilities such as textbooks, ill-equipped classrooms, laboratories, workshops and library are responsible for poor performance in examinations among the student's (Saeed and Wain, 2011). Different Researches have already established the fact that nonavailability or poor infrastructure affects the quality of education. Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education.
2. Materials and Methods:In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. The Study Area is located within N 21º32΄ to N 22º0΄20˝ of latitudes and E 87º58΄59˝ to E 88º32΄47˝ of longitudes. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and PatharPratima. DISE data and field observation are the key sources of information. The objective of this paper is to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district in West Bengal.
International Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022
National University of Planning and Administration (NUEPA) have proposed some parameters for preparing Educational Development Index. Some parameters have been selected from these. Selected variables are as follows: pupil-classroom ratio, school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. At first the variables have been categorized into two divisions viz., positive and negative. After calculating the Z- Scores of each of these variables G. P wise, Composite Z- Scores have been calculated for positive variables for the year 2010. Suitable statistical methods and cartographic techniques have been applied for proper representation.
3. Observations: Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard. Though in a region like Sundarban sometimes it is felt that people are compelled to send their children to the nearest available school ignoring whatever may be the infrastructure as they have very limited choice specially in case of upper primary school.Eighteen schools have been visited in Sagar block within which twelve schools are primary and six schools are upper primary schools. Drinking water, electricity, kitchen shed, and book bank all these facilities are present in the school. But all of these schools do not have play ground and boundary wall. Even ManasadwipGangamoniSishuNiketan has no drinking water and separate toilet facility. But it has a common toilet.The percentage for schools having electric facility was only 5% in 2010 respectively. Thirteen schools have been visited in Kakdwip block. All of them have drinking water facility.Girls' toilet is also found within them. Many of them do not have play ground. BagherChakSishuShiksha Kendra,Berar ChakNiveditaSishuShiksha Kendra do not have ramp.
4. Discussion:
4.A.Situation of Institutional Arrangement and Infrastructural Facilities:
4. A.1. Classroom: It has been observed that (Table 1) average number of class room for primary level remains same (4) for 2007 and 2010. The upper primary schools have an average room of 12 and 10 for 2007 and 2010 respectively. In Kakdwip sub-division there was more (2109) class room at primary section than upper primary (1518). In case of primary though 68.56% of classroom was pucca in nature, 31.20% of classroom was partially pucca in nature. For upper primary 92.16% classroom was pucca and only 7.05% classroom was partially pucca. It has been found from table 2 that more than 50% of the class room was of good condition in Kakdwip subdivision for both primary and upper primary level. But 20% of the class rooms of primary level and 14% of the class rooms of upper primary level needed minor repair. On the other hand, the proportions for classroom which need major repair were 27% and 23% for primary and upper primary level respectively.
4. A.2. Pupil-Class Room Ratio: The indicator 'Average Student-Classroom ratio' (SCR) gives an idea as to how many students there a
|
re, on an average, in a classroom.
|
Jalan and Panda (2010) consider this ratio as the only physical infrastructural characteristic of school that has some impact on learning levels. This pupil class room ratio (Table-3) is quite higher in the upper primary level than the primary level indicating the fact that congested class-room, lack of sufficient class-room space is hampering the teaching-learning process. In case of primary level pressure of student is highest on Kakdwip block and at upper primary level the pressure shifted to Sagar block. So, in Sagar block the classrooms area a little bit crowded. On the other hand the pressure is less in Namkahana block at both primary and upper primary level. Flow of students from adjoining district (Midnapore) to Sagar block for higher study may be one of the causes for this.
4. A.3. Drinking Water Facilities: Availability of drinking water in school is the most essential facility that every school must have. From Fig. 1, it is clear that drinking water facility was higher in primary schools than the upper primary schools for both 2007 and 2010. Out of 701 elementary schools within Kakdwip sub-division about 94% schools (primary 75% and upper primary 19%) had drinking water facility in 2007. But in 2010 this figure went down to almost 89%, within these primary schools occupied 69%, but upper primary schools occupied only 20%. At the elementary level PatharPratima (33.52%), Kakdwip (22.25%), Sagar (21.97%), and Namkhana (16.26%) blocks represents 1st, 2nd, 3rd and 4th position respectively in 2007. Same ranking was maintained in 2010 for the elementary level. PatharPratima (27.67%), Sagar (17.55%), Kakdwip (16.69%) and Namkhana (13.12%) occupied the 1st, 2nd, 3rd and 4th position in case of the primary schools. While the positions of PatharPratima (5.85%), Kakdwip (5.56%), Sagar (4.42%), and Namkhana (3.14 %) were 1st, 2nd,3rd and 4th respectively for the upper primary schools.Dependency on tube well was found within 85% and 90% schools at primary and upper primary level respectively. Only 2% of schools had tap water facility for both primary and upper primary level in 2010. 8% primary and 4% upper primary schools had no drinking water facility in 2010.
4. A.4. Toilet facility: In Kakdwip sub-division, about 88.30% of the elementary schools had common toilet facility and only 41.94% of schools had girls' toilet in 2007 (table 4). The percentage was higher for primary schools (70%). A few upper primary schools had common toilet facilities (18%). But the provision is more
International Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022
necessary for the upper primary level. About 58% of the elementary schools of Kakdwip sub-division did not have girls' toilet. The percentage was almost the same (57%) for primary schools but far less like only 1% for upper primary schools. Out of 42% elementary schools having this facility, primary schools occupied 24% and upper primary schools occupied 18%. In case of elementary school, 88.30% of the schools had common toilet. But in 2010, the proportion of school having common toilet had been decreased and proportion of school with girls' toilet had been increased. The same trend was found in primary, upper primary and total elementary. It is a good sign that to increase girls' enrolment and retention more girls' toilet was being constructed. Still 34% primary and 11% upper primary schools didn't have even common toilet. The proportion of schools without girls' toilet was 27% and 2% for primary and upper primary level respectively. Some of the schools though had latrines but it was without water and door. Students had to go to home for accessing toilet, parents hesitate to send their girl child to school and teachers also face great problem for this. Female teachers coming from long distance and also the teachers who reside in that village have to search for toilet in nearby houses in need which is very awkward to them. Especially for co-educational schools this create great problem for regular attendance. Except Swami Vivekananda in Kakdwip block, Ghoramara, Muriganga-I, Ramkarchar in Sagar block, DakshinRoypur in PatharPratima block all other GPs had some upper primary schools without common toilet. Suryanagar in Kakdwip block, DakshinGangadharpur, DakshinRoypur, Durbachati, HerambaGopalpur, LaxmiJanardanpur in PatharPratima block, Dhablat, DhasparaSumatinagar-I in Sagar block, Budhakhali, Frasergunj, Haripur, Shibrampur of Namkhana block had some upper primary schools without girls' toilet. 4. A.5. Other facilities: In Kakdwip sub-division only 10% of the elementary schools had electric connection in 2007 within which primary school occupies 3% and upper primary school occupied 7% and in 2010 this percentage value rose to 12% only. Only 4% of the primary schools and 8% of the upper primary schools had electric connection in 2010.Book bank facility is a sector within infrastructural facilities where cent percent development has been occurred in Kakdwip sub-division. About 98% of the elementary schools were having this facility in 2007 and in 2010 it covered each and every school.69% and 36% schools have Kitchen Shedat both primary and upper primary level respectively.
4.B. Status of Developmentat block level:
Selected variables for this study includes school student ratio, average student-classroom ratio, pupil-teacher ratio, school teacher ratio, classroom type, condition of classroom school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. Composite Z- Scoreshave been calculated for positive variables for the year 2010 at gram panchayat level (Table 5). Three classes have been prepared to reveal the levels of development at the Gram Panchayat level regarding infrastructure issue in elementary schools like high development (1.00 to 2.00), moderate development (0 to1.00), low development (0 to -1.00) and very low development (-1.00 to -2.00) in case of positive variables.
Kakdwip Block:In Kakdwip block, Pratapadityanagar and Suryanagar G. P reflect highest and lowest development respectively in case of the positive indicators. Only Pratapadityanagar exhibits high level of development. Bapuji, Rabindra, Rishi Bankim Chandra,Srinagar and Swami Vivekananda fall within the zone of moderate level of development. Madhusudanpur, Netaji,Ramgopalpur, Sri Sri Ramakrishna andSuryanagarshow low level of development.In case of the negative indicators,Suryanagar and Madhusudanpur G. P have been identified as most developed and least developed G.P. They fall within the zones of high development and very low development.Sri Sri Ramakrishna,Rishi Bankimchandra, Swami Vivekananda, Pratapadityanagarexhibit low level of development whileBapuji,Netaji, Rabindra,Ramgopalpur, Srinagar, fall within the moderate development zone(Map 1).
Sagarblock: InSagar block, Ramkarchar and Ghoramara G. P reflect highest and lowest development respectively in case of the positive indicators. They fall within the zones of high development and very low development.Dhablat, Gangasagar and Rudranagar represent moderate level of development. Rest of the gram panchayats falls under low development zone. In case of the negative indicators,Ghoramara,Muri Ganga I reflect high development and Gangasagar represent very low development. Ramkarchar andRudranagar exhibit moderate level of development. Rest of the gram panchayats falls within the zone of low development (Map 2).
5. Conclusions: In this era of Globalization, it is desirable that every school will have the basic facilities. But in case of schools of Sundarban area especially for the vulnerable parts like Ghoramara Island, Mousini Island, GPlot and some other islands of PatharPratima C.D. Block, it cannot be expected. Developing school infrastructure becomes a demotivating issue for the Government. Fund distribution should be made on accordance with the need of the schools and the authority should be very alert and efficient in collection and utilization of fund, grant etc. at right moment. Proper monitoring and supervision can be beneficial for effective utilization of fund. Along with that area specific strategies, greater flexibility in approach and sympathetic attitude are required to realize the local need and to improve the efficiency of this system.
6.References
- Analytical Report (2005), Elementary Education in India, NIEPA, New Delhi, pp.171-210.
- Adeyemi T.O and E.T. Adu (2010), Enrolment Analysis and the Availability of Physical Facilities for the Universal Basic Education Programme in Ekiti State, Nigeria, Middle-East Journal of Scientific Research 5 (1): 14-21, (Online) available at www.idosi.org/mejsr/mejsr5(1)/3.pdf,(accessed on 8.2.13).
- DISE (2007),Flash Statistics, NUEPA, New Delhi.
- Jalan J. and Panda (2010), Low Mean High Variance: Quality of Primary Education in Rural West Bengal, Centre for Studies in Social Sciences, Calcutta, pp. 1-96, (Online) available a www.cssscal.org/pdf/Education%20Report%20CD.pdf, (accessed on 17.03.13).
- DISE (2010),Flash Statistics, NUEPA, New Delhi.
- Saeed M. and K. U. R. Wain (2011), Status of Missing Physical Facilities in Government Schools of Punjab, Journal of Research and Reflections in Education, December,5(2):105 -127(Online) available at http://www.ue.edu.pk/jrre, (accessed on 12.03.13).
- Zaidi S.M.I.A. (2005), Provision and Utilization of Elementary Education Facilities in North East India: What DISE data reveals? New Frontiers in Education, 35 (3).
Fig 1: Schools Having Drinking Water Facility in Kakdwip Sub-Division, Data Source: DISE, 2010
7. Tables & Figures:
Table-1: Average Number of Class Room; Data Source: DISE, 2007 and 2010
Table-3: Average Pupil Class Room Ratio;Data Source: DISE, 2007 and 2010
Table-2: Condition of Classroom in the Study Area; Source: DISE, 2010
Table 4: Toilet Facility in Kakdwip Sub-Division; Data Source: DISE, 2007and 2010
Table 5: Mean Composite Z- Scores of two Block; Data Source: Computed from DISE (2010) data
Map-1& 2: Infrastructural Development of Elementary Schools in Kakdwip&Sagar Block (Based On Positive Variables, 2010); Data Source: Computed from DISE (2010) data
| 8,240
|
inside_word
|
are,
|
remove_one_sentence
|
<url>
https://int-jecse.net/article/INFRASTRUCTURAL+FACILITIES+OF+ELEMENTARY+SCHOOLS+IN+KAKDWIP+SUBDIVISION+OF+SOUTH+TWENTY+FOUR+PARGANAS+DISTRICT%252C+WEST+BENGAL_5272/?download=true&format=pdf
</url>
<text>
INFRASTRUCTURAL FACILITIES OF ELEMENTARY SCHOOLS IN KAKDWIP SUBDIVISION OF SOUTH TWENTY FOUR PARGANAS DISTRICT, WEST BENGAL
ANGSHUMITA CHAKRABORTY
Mahishadal Girls'
College
PurbaMedinipur District, West Bengal
Email: [email protected]
ABSTRACT:
Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the core methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully. Different Researches have already established the fact that non-availability or poor infrastructure affects the quality of education.Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education. In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and Pathar Pratima. DISE data and field observation are the key sources of information. Parameters have been selected from the EDI parameters proposed by National University of Planning and Administration with some necessary modifications.Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard.
KEY WORDS: School environment, school infrastructure, Universalization of Elementary Education, infrastructural facilities.
1. Introduction: Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully.
Omotoso (1992) and Adeyemi (1998) stressed that educational facilities are the main contributors to students learning outcomes in the school system. These facilities include school buildings, classrooms, furniture, libraries, recreational equipment, apparatus and other instructional materials (cited in Adeyemi and Adu, 2010). Availability or non-availability of physical facilities affect the quality of education; provision of sufficient facilities in schools provides a challenging environment for students and effective teaching by the teachers; lack of adequate facilities such as textbooks, ill-equipped classrooms, laboratories, workshops and library are responsible for poor performance in examinations among the student's (Saeed and Wain, 2011). Different Researches have already established the fact that nonavailability or poor infrastructure affects the quality of education. Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education.
2. Materials and Methods:In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. The Study Area is located within N 21º32΄ to N 22º0΄20˝ of latitudes and E 87º58΄59˝ to E 88º32΄47˝ of longitudes. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and PatharPratima. DISE data and field observation are the key sources of information. The objective of this paper is to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district in West Bengal.
International Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022
National University of Planning and Administration (NUEPA) have proposed some parameters for preparing Educational Development Index. Some parameters have been selected from these. Selected variables are as follows: pupil-classroom ratio, school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. At first the variables have been categorized into two divisions viz., positive and negative. After calculating the Z- Scores of each of these variables G. P wise, Composite Z- Scores have been calculated for positive variables for the year 2010. Suitable statistical methods and cartographic techniques have been applied for proper representation.
3. Observations: Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard. Though in a region like Sundarban sometimes it is felt that people are compelled to send their children to the nearest available school ignoring whatever may be the infrastructure as they have very limited choice specially in case of upper primary school.Eighteen schools have been visited in Sagar block within which twelve schools are primary and six schools are upper primary schools. Drinking water, electricity, kitchen shed, and book bank all these facilities are present in the school. But all of these schools do not have play ground and boundary wall. Even ManasadwipGangamoniSishuNiketan has no drinking water and separate toilet facility. But it has a common toilet.The percentage for schools having electric facility was only 5% in 2010 respectively. Thirteen schools have been visited in Kakdwip block. All of them have drinking water facility.Girls' toilet is also found within them. Many of them do not have play ground. BagherChakSishuShiksha Kendra,Berar ChakNiveditaSishuShiksha Kendra do not have ramp.
4. Discussion:
4.A.Situation of Institutional Arrangement and Infrastructural Facilities:
4. A.1. Classroom: It has been observed that (Table 1) average number of class room for primary level remains same (4) for 2007 and 2010. The upper primary schools have an average room of 12 and 10 for 2007 and 2010 respectively. In Kakdwip sub-division there was more (2109) class room at primary section than upper primary (1518). In case of primary though 68.56% of classroom was pucca in nature, 31.20% of classroom was partially pucca in nature. For upper primary 92.16% classroom was pucca and only 7.05% classroom was partially pucca. It has been found from table 2 that more than 50% of the class room was of good condition in Kakdwip subdivision for both primary and upper primary level. But 20% of the class rooms of primary level and 14% of the class rooms of upper primary level needed minor repair. On the other hand, the proportions for classroom which need major repair were 27% and 23% for primary and upper primary level respectively.
4. A.2. Pupil-Class Room Ratio: The indicator 'Average Student-Classroom ratio' (SCR) gives an idea as to how many students there a<cursor_is_here> Jalan and Panda (2010) consider this ratio as the only physical infrastructural characteristic of school that has some impact on learning levels. This pupil class room ratio (Table-3) is quite higher in the upper primary level than the primary level indicating the fact that congested class-room, lack of sufficient class-room space is hampering the teaching-learning process. In case of primary level pressure of student is highest on Kakdwip block and at upper primary level the pressure shifted to Sagar block. So, in Sagar block the classrooms area a little bit crowded. On the other hand the pressure is less in Namkahana block at both primary and upper primary level. Flow of students from adjoining district (Midnapore) to Sagar block for higher study may be one of the causes for this.
4. A.3. Drinking Water Facilities: Availability of drinking water in school is the most essential facility that every school must have. From Fig. 1, it is clear that drinking water facility was higher in primary schools than the upper primary schools for both 2007 and 2010. Out of 701 elementary schools within Kakdwip sub-division about 94% schools (primary 75% and upper primary 19%) had drinking water facility in 2007. But in 2010 this figure went down to almost 89%, within these primary schools occupied 69%, but upper primary schools occupied only 20%. At the elementary level PatharPratima (33.52%), Kakdwip (22.25%), Sagar (21.97%), and Namkhana (16.26%) blocks represents 1st, 2nd, 3rd and 4th position respectively in 2007. Same ranking was maintained in 2010 for the elementary level. PatharPratima (27.67%), Sagar (17.55%), Kakdwip (16.69%) and Namkhana (13.12%) occupied the 1st, 2nd, 3rd and 4th position in case of the primary schools. While the positions of PatharPratima (5.85%), Kakdwip (5.56%), Sagar (4.42%), and Namkhana (3.14 %) were 1st, 2nd,3rd and 4th respectively for the upper primary schools.Dependency on tube well was found within 85% and 90% schools at primary and upper primary level respectively. Only 2% of schools had tap water facility for both primary and upper primary level in 2010. 8% primary and 4% upper primary schools had no drinking water facility in 2010.
4. A.4. Toilet facility: In Kakdwip sub-division, about 88.30% of the elementary schools had common toilet facility and only 41.94% of schools had girls' toilet in 2007 (table 4). The percentage was higher for primary schools (70%). A few upper primary schools had common toilet facilities (18%). But the provision is more
International Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022
necessary for the upper primary level. About 58% of the elementary schools of Kakdwip sub-division did not have girls' toilet. The percentage was almost the same (57%) for primary schools but far less like only 1% for upper primary schools. Out of 42% elementary schools having this facility, primary schools occupied 24% and upper primary schools occupied 18%. In case of elementary school, 88.30% of the schools had common toilet. But in 2010, the proportion of school having common toilet had been decreased and proportion of school with girls' toilet had been increased. The same trend was found in primary, upper primary and total elementary. It is a good sign that to increase girls' enrolment and retention more girls' toilet was being constructed. Still 34% primary and 11% upper primary schools didn't have even common toilet. The proportion of schools without girls' toilet was 27% and 2% for primary and upper primary level respectively. Some of the schools though had latrines but it was without water and door. Students had to go to home for accessing toilet, parents hesitate to send their girl child to school and teachers also face great problem for this. Female teachers coming from long distance and also the teachers who reside in that village have to search for toilet in nearby houses in need which is very awkward to them. Especially for co-educational schools this create great problem for regular attendance. Except Swami Vivekananda in Kakdwip block, Ghoramara, Muriganga-I, Ramkarchar in Sagar block, DakshinRoypur in PatharPratima block all other GPs had some upper primary schools without common toilet. Suryanagar in Kakdwip block, DakshinGangadharpur, DakshinRoypur, Durbachati, HerambaGopalpur, LaxmiJanardanpur in PatharPratima block, Dhablat, DhasparaSumatinagar-I in Sagar block, Budhakhali, Frasergunj, Haripur, Shibrampur of Namkhana block had some upper primary schools without girls' toilet. 4. A.5. Other facilities: In Kakdwip sub-division only 10% of the elementary schools had electric connection in 2007 within which primary school occupies 3% and upper primary school occupied 7% and in 2010 this percentage value rose to 12% only. Only 4% of the primary schools and 8% of the upper primary schools had electric connection in 2010.Book bank facility is a sector within infrastructural facilities where cent percent development has been occurred in Kakdwip sub-division. About 98% of the elementary schools were having this facility in 2007 and in 2010 it covered each and every school.69% and 36% schools have Kitchen Shedat both primary and upper primary level respectively.
4.B. Status of Developmentat block level:
Selected variables for this study includes school student ratio, average student-classroom ratio, pupil-teacher ratio, school teacher ratio, classroom type, condition of classroom school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. Composite Z- Scoreshave been calculated for positive variables for the year 2010 at gram panchayat level (Table 5). Three classes have been prepared to reveal the levels of development at the Gram Panchayat level regarding infrastructure issue in elementary schools like high development (1.00 to 2.00), moderate development (0 to1.00), low development (0 to -1.00) and very low development (-1.00 to -2.00) in case of positive variables.
Kakdwip Block:In Kakdwip block, Pratapadityanagar and Suryanagar G. P reflect highest and lowest development respectively in case of the positive indicators. Only Pratapadityanagar exhibits high level of development. Bapuji, Rabindra, Rishi Bankim Chandra,Srinagar and Swami Vivekananda fall within the zone of moderate level of development. Madhusudanpur, Netaji,Ramgopalpur, Sri Sri Ramakrishna andSuryanagarshow low level of development.In case of the negative indicators,Suryanagar and Madhusudanpur G. P have been identified as most developed and least developed G.P. They fall within the zones of high development and very low development.Sri Sri Ramakrishna,Rishi Bankimchandra, Swami Vivekananda, Pratapadityanagarexhibit low level of development whileBapuji,Netaji, Rabindra,Ramgopalpur, Srinagar, fall within the moderate development zone(Map 1).
Sagarblock: InSagar block, Ramkarchar and Ghoramara G. P reflect highest and lowest development respectively in case of the positive indicators. They fall within the zones of high development and very low development.Dhablat, Gangasagar and Rudranagar represent moderate level of development. Rest of the gram panchayats falls under low development zone. In case of the negative indicators,Ghoramara,Muri Ganga I reflect high development and Gangasagar represent very low development. Ramkarchar andRudranagar exhibit moderate level of development. Rest of the gram panchayats falls within the zone of low development (Map 2).
5. Conclusions: In this era of Globalization, it is desirable that every school will have the basic facilities. But in case of schools of Sundarban area especially for the vulnerable parts like Ghoramara Island, Mousini Island, GPlot and some other islands of PatharPratima C.D. Block, it cannot be expected. Developing school infrastructure becomes a demotivating issue for the Government. Fund distribution should be made on accordance with the need of the schools and the authority should be very alert and efficient in collection and utilization of fund, grant etc. at right moment. Proper monitoring and supervision can be beneficial for effective utilization of fund. Along with that area specific strategies, greater flexibility in approach and sympathetic attitude are required to realize the local need and to improve the efficiency of this system.
6.References
- Analytical Report (2005), Elementary Education in India, NIEPA, New Delhi, pp.171-210.
- Adeyemi T.O and E.T. Adu (2010), Enrolment Analysis and the Availability of Physical Facilities for the Universal Basic Education Programme in Ekiti State, Nigeria, Middle-East Journal of Scientific Research 5 (1): 14-21, (Online) available at www.idosi.org/mejsr/mejsr5(1)/3.pdf,(accessed on 8.2.13).
- DISE (2007),Flash Statistics, NUEPA, New Delhi.
- Jalan J. and Panda (2010), Low Mean High Variance: Quality of Primary Education in Rural West Bengal, Centre for Studies in Social Sciences, Calcutta, pp. 1-96, (Online) available a www.cssscal.org/pdf/Education%20Report%20CD.pdf, (accessed on 17.03.13).
- DISE (2010),Flash Statistics, NUEPA, New Delhi.
- Saeed M. and K. U. R. Wain (2011), Status of Missing Physical Facilities in Government Schools of Punjab, Journal of Research and Reflections in Education, December,5(2):105 -127(Online) available at http://www.ue.edu.pk/jrre, (accessed on 12.03.13).
- Zaidi S.M.I.A. (2005), Provision and Utilization of Elementary Education Facilities in North East India: What DISE data reveals? New Frontiers in Education, 35 (3).
Fig 1: Schools Having Drinking Water Facility in Kakdwip Sub-Division, Data Source: DISE, 2010
7. Tables & Figures:
Table-1: Average Number of Class Room; Data Source: DISE, 2007 and 2010
Table-3: Average Pupil Class Room Ratio;Data Source: DISE, 2007 and 2010
Table-2: Condition of Classroom in the Study Area; Source: DISE, 2010
Table 4: Toilet Facility in Kakdwip Sub-Division; Data Source: DISE, 2007and 2010
Table 5: Mean Composite Z- Scores of two Block; Data Source: Computed from DISE (2010) data
Map-1& 2: Infrastructural Development of Elementary Schools in Kakdwip&Sagar Block (Based On Positive Variables, 2010); Data Source: Computed from DISE (2010) data
</text>
|
[
{
"content": "<url>\nhttps://int-jecse.net/article/INFRASTRUCTURAL+FACILITIES+OF+ELEMENTARY+SCHOOLS+IN+KAKDWIP+SUBDIVISION+OF+SOUTH+TWENTY+FOUR+PARGANAS+DISTRICT%252C+WEST+BENGAL_5272/?download=true&format=pdf\n</url>\n<text>\nINFRASTRUCTURAL FACILITIES OF ELEMENTARY SCHOOLS IN KAKDWIP SUBDIVISION OF SOUTH TWENTY FOUR PARGANAS DISTRICT, WEST BENGAL\n\nANGSHUMITA CHAKRABORTY\n\nMahishadal Girls'\n\nCollege\n\nPurbaMedinipur District, West Bengal\n\nEmail: [email protected]\n\nABSTRACT:\n\nEducation is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the core methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully. Different Researches have already established the fact that non-availability or poor infrastructure affects the quality of education.Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education. In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and Pathar Pratima. DISE data and field observation are the key sources of information. Parameters have been selected from the EDI parameters proposed by National University of Planning and Administration with some necessary modifications.Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard.\n\nKEY WORDS: School environment, school infrastructure, Universalization of Elementary Education, infrastructural facilities.\n\n1. Introduction: Education is very much related to globalization through its service giving quality. School environment in which the students learn is very crucial for sustaining the quality. Effective teaching learning is very much dependent on the suitable school infrastructure which is one of the methodologies to globalize the education. Infrastructure is the underlying organizational structure needed by any school to remain functional and to run successfully.\nOmotoso (1992) and Adeyemi (1998) stressed that educational facilities are the main contributors to students learning outcomes in the school system. These facilities include school buildings, classrooms, furniture, libraries, recreational equipment, apparatus and other instructional materials (cited in Adeyemi and Adu, 2010). Availability or non-availability of physical facilities affect the quality of education; provision of sufficient facilities in schools provides a challenging environment for students and effective teaching by the teachers; lack of adequate facilities such as textbooks, ill-equipped classrooms, laboratories, workshops and library are responsible for poor performance in examinations among the student's (Saeed and Wain, 2011). Different Researches have already established the fact that nonavailability or poor infrastructure affects the quality of education. Ill-equipped classrooms, absence of toilet, lavatory exert negative impact on students as well as teachers. School absenteeism, drop out, poor achievement, poor performance in the examination all these are also related with the availability of sufficient infrastructure and other facilities within school. As elementary education is the gateway to lifelong learning process, strengthening its infrastructure is a pre-requisite to achieve Universalization of Elementary Education/Universalization of Primary Education.\n2. Materials and Methods:In this backdrop this paper attempts to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district, West Bengal. The Study Area is located within N 21º32΄ to N 22º0΄20˝ of latitudes and E 87º58΄59˝ to E 88º32΄47˝ of longitudes. This study covers primary and upper primary schools of four C. D. Blocks namely, Kakdwip, Namkhana, Sagar and PatharPratima. DISE data and field observation are the key sources of information. The objective of this paper is to expose the situation of infrastructural facilities of elementary schools in Kakdwip subdivision of South Twenty Four Parganas district in West Bengal.\n\nInternational Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022\n\nNational University of Planning and Administration (NUEPA) have proposed some parameters for preparing Educational Development Index. Some parameters have been selected from these. Selected variables are as follows: pupil-classroom ratio, school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. At first the variables have been categorized into two divisions viz., positive and negative. After calculating the Z- Scores of each of these variables G. P wise, Composite Z- Scores have been calculated for positive variables for the year 2010. Suitable statistical methods and cartographic techniques have been applied for proper representation.\n3. Observations: Availability of different facilities within the schools in the study area is inadequate. But it is also a striking feature that some schools represented better position in spite of being a part of the vulnerable area of Sundarban to climatic hazard. Though in a region like Sundarban sometimes it is felt that people are compelled to send their children to the nearest available school ignoring whatever may be the infrastructure as they have very limited choice specially in case of upper primary school.Eighteen schools have been visited in Sagar block within which twelve schools are primary and six schools are upper primary schools. Drinking water, electricity, kitchen shed, and book bank all these facilities are present in the school. But all of these schools do not have play ground and boundary wall. Even ManasadwipGangamoniSishuNiketan has no drinking water and separate toilet facility. But it has a common toilet.The percentage for schools having electric facility was only 5% in 2010 respectively. Thirteen schools have been visited in Kakdwip block. All of them have drinking water facility.Girls' toilet is also found within them. Many of them do not have play ground. BagherChakSishuShiksha Kendra,Berar ChakNiveditaSishuShiksha Kendra do not have ramp.\n\n4. Discussion:\n\n4.A.Situation of Institutional Arrangement and Infrastructural Facilities:\n\n4. A.1. Classroom: It has been observed that (Table 1) average number of class room for primary level remains same (4) for 2007 and 2010. The upper primary schools have an average room of 12 and 10 for 2007 and 2010 respectively. In Kakdwip sub-division there was more (2109) class room at primary section than upper primary (1518). In case of primary though 68.56% of classroom was pucca in nature, 31.20% of classroom was partially pucca in nature. For upper primary 92.16% classroom was pucca and only 7.05% classroom was partially pucca. It has been found from table 2 that more than 50% of the class room was of good condition in Kakdwip subdivision for both primary and upper primary level. But 20% of the class rooms of primary level and 14% of the class rooms of upper primary level needed minor repair. On the other hand, the proportions for classroom which need major repair were 27% and 23% for primary and upper primary level respectively.\n4. A.2. Pupil-Class Room Ratio: The indicator 'Average Student-Classroom ratio' (SCR) gives an idea as to how many students there a<cursor_is_here> Jalan and Panda (2010) consider this ratio as the only physical infrastructural characteristic of school that has some impact on learning levels. This pupil class room ratio (Table-3) is quite higher in the upper primary level than the primary level indicating the fact that congested class-room, lack of sufficient class-room space is hampering the teaching-learning process. In case of primary level pressure of student is highest on Kakdwip block and at upper primary level the pressure shifted to Sagar block. So, in Sagar block the classrooms area a little bit crowded. On the other hand the pressure is less in Namkahana block at both primary and upper primary level. Flow of students from adjoining district (Midnapore) to Sagar block for higher study may be one of the causes for this.\n4. A.3. Drinking Water Facilities: Availability of drinking water in school is the most essential facility that every school must have. From Fig. 1, it is clear that drinking water facility was higher in primary schools than the upper primary schools for both 2007 and 2010. Out of 701 elementary schools within Kakdwip sub-division about 94% schools (primary 75% and upper primary 19%) had drinking water facility in 2007. But in 2010 this figure went down to almost 89%, within these primary schools occupied 69%, but upper primary schools occupied only 20%. At the elementary level PatharPratima (33.52%), Kakdwip (22.25%), Sagar (21.97%), and Namkhana (16.26%) blocks represents 1st, 2nd, 3rd and 4th position respectively in 2007. Same ranking was maintained in 2010 for the elementary level. PatharPratima (27.67%), Sagar (17.55%), Kakdwip (16.69%) and Namkhana (13.12%) occupied the 1st, 2nd, 3rd and 4th position in case of the primary schools. While the positions of PatharPratima (5.85%), Kakdwip (5.56%), Sagar (4.42%), and Namkhana (3.14 %) were 1st, 2nd,3rd and 4th respectively for the upper primary schools.Dependency on tube well was found within 85% and 90% schools at primary and upper primary level respectively. Only 2% of schools had tap water facility for both primary and upper primary level in 2010. 8% primary and 4% upper primary schools had no drinking water facility in 2010.\n4. A.4. Toilet facility: In Kakdwip sub-division, about 88.30% of the elementary schools had common toilet facility and only 41.94% of schools had girls' toilet in 2007 (table 4). The percentage was higher for primary schools (70%). A few upper primary schools had common toilet facilities (18%). But the provision is more\n\nInternational Journal of Early Childhood Special Education (INT-JECSE) ISSN:1308-5581 Vol 14, Spl Issue 01, 2022\n\nnecessary for the upper primary level. About 58% of the elementary schools of Kakdwip sub-division did not have girls' toilet. The percentage was almost the same (57%) for primary schools but far less like only 1% for upper primary schools. Out of 42% elementary schools having this facility, primary schools occupied 24% and upper primary schools occupied 18%. In case of elementary school, 88.30% of the schools had common toilet. But in 2010, the proportion of school having common toilet had been decreased and proportion of school with girls' toilet had been increased. The same trend was found in primary, upper primary and total elementary. It is a good sign that to increase girls' enrolment and retention more girls' toilet was being constructed. Still 34% primary and 11% upper primary schools didn't have even common toilet. The proportion of schools without girls' toilet was 27% and 2% for primary and upper primary level respectively. Some of the schools though had latrines but it was without water and door. Students had to go to home for accessing toilet, parents hesitate to send their girl child to school and teachers also face great problem for this. Female teachers coming from long distance and also the teachers who reside in that village have to search for toilet in nearby houses in need which is very awkward to them. Especially for co-educational schools this create great problem for regular attendance. Except Swami Vivekananda in Kakdwip block, Ghoramara, Muriganga-I, Ramkarchar in Sagar block, DakshinRoypur in PatharPratima block all other GPs had some upper primary schools without common toilet. Suryanagar in Kakdwip block, DakshinGangadharpur, DakshinRoypur, Durbachati, HerambaGopalpur, LaxmiJanardanpur in PatharPratima block, Dhablat, DhasparaSumatinagar-I in Sagar block, Budhakhali, Frasergunj, Haripur, Shibrampur of Namkhana block had some upper primary schools without girls' toilet. 4. A.5. Other facilities: In Kakdwip sub-division only 10% of the elementary schools had electric connection in 2007 within which primary school occupies 3% and upper primary school occupied 7% and in 2010 this percentage value rose to 12% only. Only 4% of the primary schools and 8% of the upper primary schools had electric connection in 2010.Book bank facility is a sector within infrastructural facilities where cent percent development has been occurred in Kakdwip sub-division. About 98% of the elementary schools were having this facility in 2007 and in 2010 it covered each and every school.69% and 36% schools have Kitchen Shedat both primary and upper primary level respectively.\n\n4.B. Status of Developmentat block level:\n\nSelected variables for this study includes school student ratio, average student-classroom ratio, pupil-teacher ratio, school teacher ratio, classroom type, condition of classroom school with drinking water facilities, schools with common toilet as well as girls' toilet, boys' toilet, schools with facilities like blackboard, electricity, kitchen shed, book bank, play ground, boundary wall and ramp. Composite Z- Scoreshave been calculated for positive variables for the year 2010 at gram panchayat level (Table 5). Three classes have been prepared to reveal the levels of development at the Gram Panchayat level regarding infrastructure issue in elementary schools like high development (1.00 to 2.00), moderate development (0 to1.00), low development (0 to -1.00) and very low development (-1.00 to -2.00) in case of positive variables.\n\nKakdwip Block:In Kakdwip block, Pratapadityanagar and Suryanagar G. P reflect highest and lowest development respectively in case of the positive indicators. Only Pratapadityanagar exhibits high level of development. Bapuji, Rabindra, Rishi Bankim Chandra,Srinagar and Swami Vivekananda fall within the zone of moderate level of development. Madhusudanpur, Netaji,Ramgopalpur, Sri Sri Ramakrishna andSuryanagarshow low level of development.In case of the negative indicators,Suryanagar and Madhusudanpur G. P have been identified as most developed and least developed G.P. They fall within the zones of high development and very low development.Sri Sri Ramakrishna,Rishi Bankimchandra, Swami Vivekananda, Pratapadityanagarexhibit low level of development whileBapuji,Netaji, Rabindra,Ramgopalpur, Srinagar, fall within the moderate development zone(Map 1).\n\nSagarblock: InSagar block, Ramkarchar and Ghoramara G. P reflect highest and lowest development respectively in case of the positive indicators. They fall within the zones of high development and very low development.Dhablat, Gangasagar and Rudranagar represent moderate level of development. Rest of the gram panchayats falls under low development zone. In case of the negative indicators,Ghoramara,Muri Ganga I reflect high development and Gangasagar represent very low development. Ramkarchar andRudranagar exhibit moderate level of development. Rest of the gram panchayats falls within the zone of low development (Map 2).\n\n5. Conclusions: In this era of Globalization, it is desirable that every school will have the basic facilities. But in case of schools of Sundarban area especially for the vulnerable parts like Ghoramara Island, Mousini Island, GPlot and some other islands of PatharPratima C.D. Block, it cannot be expected. Developing school infrastructure becomes a demotivating issue for the Government. Fund distribution should be made on accordance with the need of the schools and the authority should be very alert and efficient in collection and utilization of fund, grant etc. at right moment. Proper monitoring and supervision can be beneficial for effective utilization of fund. Along with that area specific strategies, greater flexibility in approach and sympathetic attitude are required to realize the local need and to improve the efficiency of this system.\n\n6.References\n\n- Analytical Report (2005), Elementary Education in India, NIEPA, New Delhi, pp.171-210.\n- Adeyemi T.O and E.T. Adu (2010), Enrolment Analysis and the Availability of Physical Facilities for the Universal Basic Education Programme in Ekiti State, Nigeria, Middle-East Journal of Scientific Research 5 (1): 14-21, (Online) available at www.idosi.org/mejsr/mejsr5(1)/3.pdf,(accessed on 8.2.13).\n- DISE (2007),Flash Statistics, NUEPA, New Delhi.\n- Jalan J. and Panda (2010), Low Mean High Variance: Quality of Primary Education in Rural West Bengal, Centre for Studies in Social Sciences, Calcutta, pp. 1-96, (Online) available a www.cssscal.org/pdf/Education%20Report%20CD.pdf, (accessed on 17.03.13).\n- DISE (2010),Flash Statistics, NUEPA, New Delhi.\n- Saeed M. and K. U. R. Wain (2011), Status of Missing Physical Facilities in Government Schools of Punjab, Journal of Research and Reflections in Education, December,5(2):105 -127(Online) available at http://www.ue.edu.pk/jrre, (accessed on 12.03.13).\n- Zaidi S.M.I.A. (2005), Provision and Utilization of Elementary Education Facilities in North East India: What DISE data reveals? New Frontiers in Education, 35 (3).\n\nFig 1: Schools Having Drinking Water Facility in Kakdwip Sub-Division, Data Source: DISE, 2010\n\n7. Tables & Figures:\n\nTable-1: Average Number of Class Room; Data Source: DISE, 2007 and 2010\n\nTable-3: Average Pupil Class Room Ratio;Data Source: DISE, 2007 and 2010\n\nTable-2: Condition of Classroom in the Study Area; Source: DISE, 2010\n\nTable 4: Toilet Facility in Kakdwip Sub-Division; Data Source: DISE, 2007and 2010\n\nTable 5: Mean Composite Z- Scores of two Block; Data Source: Computed from DISE (2010) data\n\nMap-1& 2: Infrastructural Development of Elementary Schools in Kakdwip&Sagar Block (Based On Positive Variables, 2010); Data Source: Computed from DISE (2010) data\n</text>\n",
"role": "user"
},
{
"content": "re, on an average, in a classroom.",
"role": "assistant"
}
] |
Twin-width for digraphs
´Edouard Bonnet
ENS Lyon, LIP
meeting ANR DIGRAPHS
Three outcomes between a pair of vertices: edge, or non-edge, or red edge (error edge)
Contractions in trigraphs
Contractions in trigraphs
Contractions in trigraphs
edges to N(u)△N(v ) turn red, for N(u) ∩ N(v ) red is absorbing
Contraction sequence
A contraction sequence of G:
Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G:
Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 0
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d
Maximum red degree = 1
overall maximum red degree = 2.
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 1
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 2
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 0
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d
Maximum red degree = 3
overall maximum red degree = 3.
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 3
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 3
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
```
Maximum red degree = 1 overall maximum red degree = 3
```
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 3
Classes with bounded twin-width
- cographs = twin-width 0
- trees, bounded treewidth, clique-width/rank-width
- grids
- . . .
Trees
If possible, contract two leaves with the same parent
Trees
If not, contract a deepest leaf with its parent
Trees
If not, contract a deepest leaf with its parent
Trees
If possible, contract two leaves with the same parent
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Generalization to orientations of bounded treewidth graphs, and to undirected bounded rank-width graphs
The following sequence works for any orientation
Grids
Grids
Orientations of bounded twin-width classes
Perhaps every "sparse" class of bounded twin-width has an orientation closure of bounded twin-width?
Orientations of bounded twin-width classes
Perhaps every "sparse" class of bounded twin-width has an orientation closure of bounded twin-width?
Theorem
The class of all orientations of graphs from a Kt,t-free class of bounded twin-width has itself bounded twin-width.
We will see later why
Simple operations preserving twin-width
For graphs:
- complementation: remains the same
- taking induced subgraphs: may only decrease
- adding one apex: at most "doubles"
- substitution G(v ← H): max of the twin-width of G and H
For digraphs:
- any map {→, ↔, · · · } →{→, ←, ↔, · · · }: may only decrease
- taking induced subdigraphs: may only decrease
- adding one apex: at most "quadruples"
- substitution G(v ← H): max of the twin-width of G and H
Substitution and lexicographic product
Substitution and lexicographic product
G = ⃗ C5, H = ⃗ P4, substitution G[v ← H]
Substitution and lexicographic product
Substitution and lexicographic product
More generally any modular decomposition
Substitution and lexicographic product
More generally any modular decomposition
Substitution and lexicographic product
tww(G[H]) = max(tww(G), tww(H))
Theorem (B., Geniet, Kim, Thomass´e, Watrigant '20 & '21)
The following classes have bounded twin-width, and O(1)-sequences can be computed in polynomial time.
- Bounded rank-width, and even, boolean-width graphs,
- every hereditary proper subclass of permutation graphs,
- posets of bounded antichain size,
- unit interval graphs,
- Kt-minor free graphs,
- map graphs with embedding,
- d-dimensional grids,
- Kt-free unit d-dimensional ball graphs,
- Ω(log n)-subdivisions of all the n-vertex graphs,
- cubic expanders defined by iterative random 2-lifts from K4,
- flat classes,
- subgraphs of every Kt,t-free class above,
- first-order transductions of all the above.
Twin-width in the language of matrices
```
1 0 1 0 1 0 1 0 1 0 1 1 0 1 1 0 1 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0
```
Encode a bipartite graph (or, if symmetric, any graph)
Twin-width in the language of matrices
Contraction of two columns (similar with two rows)
Twin-width in the language of matrices
How is the twin-width (re)defined?
Twin-width in the language of matrices
How to tune it for non-bipartite graph?
Twin-width in the language of matrices
Digraph encoding:
- i → j: 1 at (i, j), −1 at (j, i),
- i ↔ j: 2 at (i, j) and (j, i),
- otherwise: 0 at (i, j) and (j, i).
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Maximum number of non-constant "zones" per column or row part = error value
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Maximum number of non-constant "zones" per column or row part . . . until there are a single row part and column part
Partition viewpoint
Matrix partition: partitions of the row set and of the column set
Matrix division: same but all the parts are consecutive
Twin-width as maximum error value of a contraction sequence
Grid minor
t-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries
Grid minor
t-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries
A matrix is said t-grid free if it does not have a t-grid minor
Mixed minor
Mixed cell: not horizontal nor vertical
Mixed minor
Mixed cell: not horizontal nor vertical
Every mixed cell is witnessed by a 2 × 2 square = corner
Mixed minor
Mixed cell: not horizontal nor vertical
A matrix is said t-mixed free if it does not have a t-mixed minor
Mixed value
≈ (maximum) number of cells with a corner per row/column part
Mixed value
But we add the number of boundaries containing a corner
Mixed value
∴ merging row parts do not increase mixed value of column part
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20) If G admits a t-mixed free adjacency matrix, then tww(G) = 2 2 O ( t ) . Holds for binary structures in general
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
```
If ∃σ s.t. Adj (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
```
σ
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
```
Theorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
```
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part
Stanley-Wilf conjecture / Marcus-Tardos theorem
Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Question
For every k, is there a ck such that every n × m 0, 1-matrix with at least ck 1 per row and column admits a k-grid minor?
Stanley-Wilf conjecture / Marcus-Tardos theorem Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Conjecture (reformulation of F¨uredi-Hajnal conjecture '92) For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.
Stanley-Wilf conjecture / Marcus-Tardos theorem
Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed
Conjecture (reformulation of F¨uredi-Hajnal conjecture '92)
For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.
Conjecture (Stanley-Wilf conjecture '80s)
Any proper permutation class contains only 2 O ( n ) n-permutations.
Klazar showed F¨uredi-Hajnal ⇒ Stanley-Wilf in 2000 Marcus and Tardos showed F¨uredi-Hajnal in 2004
Let M be an n × n 0, 1-matrix without k-grid minor
Marcus-Tardos one-page inductive proof
Draw a regular n k 2 × n k 2 division on top of M
Marcus-Tardos one-page inductive proof
A cell is wide if it has at least k columns with a 1
Marcus-Tardos one-page inductive proof
There are less than k k 2 k wide cells per column part. Why?
Marcus-Tardos one-page inductive proof
Marcus-Tardos one-page inductive proof
In W and T, at most 2 · n k 2 · k k 2 k · k 4 = 2k 3 k 2 k n entries 1
Marcus-Tardos one-page inductive proof
There are at most (k − 1) 2 ck n k 2 remaining 1. Why?
Marcus-Tardos one-page inductive proof
Choose ck = 2k 4 k 2 k so that (k − 1) 2 ck n k 2 + 2 k 3 k 2 k n ⩽ ckn
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If
∃
σ
s.t. Adj
O
(
t
)
σ
(
G
)
is t-mixed free, then tww
(
G
) = 2
2.
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part Impossible!
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Step 2: find a contraction sequence with error value g(t)
Refinement of Di where each part coincides on the non-mixed cells
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Now to bound the twin-width of a class C:
1) Find a good vertex-ordering procedure
2) Argue that, in this order, a t-mixed minor would conflict with C
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Theorem
The following are equivalent.
- (i) C has bounded twin-width.
- (ii) C has bounded "oriented twin-width."
- (iii) C is t-mixed free.
Oriented twin-width: put red arcs from contracted vertices, and consider the red out-degree.
(i) ⇒ (ii): immediate.
(ii) ⇒ (iii): same simple proof as (i) ⇒ (iii).
(iii) ⇒ (i): what we just saw.
Bounded twin-width – unit interval graphs
Warm-up with unit interval graphs: order by left endpoints
Bounded twin-width – unit interval graphs
No 3-by-3 grid has all 9 cells crossed by two non-decreasing curves
Bounded twin-width – posets of bounded antichain
Put the k chains in order one after the other
Bounded twin-width – posets of bounded antichain
Bounded twin-width – posets of bounded antichain
Bounded twin-width – posets of bounded antichain
Sparse twin-width
Theorem (B., Geniet, Kim, Thomass´e, Watrigant 21) If C is a hereditary class of bounded twin-width, tfae.
- (i) C is Kt,t -free.
- (ii) C is d-grid free.
- (iii) Every n-vertex graph G ∈ C has at most gn edges.
- (iv) The subgraph closure of C has bounded twin-width.
- (v) C has bounded expansion.
Sparse twin-width
Theorem (B., Geniet, Kim, Thomass´e, Watrigant 21)
If C is a hereditary class of bounded twin-width, tfae.
- (i) C is Kt,t -free.
- (ii) C is d-grid free.
- (iii) Every n-vertex graph G ∈ C has at most gn edges.
- (iv) The subgraph closure of C has bounded twin-width.
- (v) C has bounded expansion.
d-grid freeness is preserved by turning some 1 into -1 or 2
Theorem
The class of all orientations of graphs from a Kt,t-free class of bounded twin-width has itself bounded twin-width.
Sparse twin-width (2)
In the sparse setting d-mixed minor are replaced by d-grid minor
Theorem
If C is a hereditary Kt,t -free class, tfae.
- (i) C has bounded twin-width.
- (ii) C is d-grid free.
First-order model checking
FO Model Checking( {E2} )
Parameter: |ϕ|
Input: A digraph G and a first-order sentence ϕ ∈ FO({E })
Question: G | = ϕ?
First-order model checking
FO Model Checking( {E2} )
Parameter: |ϕ|
Input: A digraph G and a first-order sentence ϕ ∈ FO({E })
Question: G | = ϕ?
Example:
First-order model checking
FO Model Checking( {E2} )
Parameter: |ϕ|
Input: A digraph G and a first-order sentence ϕ ∈ FO({E })
Question: G | = ϕ?
Example:
)
First-order model checking
FO Model Checking( {E2} )
Parameter: |ϕ|
Input: A digraph G and a first-order sentence ϕ ∈ FO({E })
Question: G | = ϕ?
Example:
G
)
First-order model checking
FO Model Checking( {E2} )
Parameter: |ϕ|
Input: A digraph G and a first-order sentence ϕ ∈ FO({E })
Question: G | = ϕ?
Also expressible in FO: k -Independent Set , k -Clique , k -Dominating Set , "transitive", etc.
First-order model checking
FO Model Checking( {E2} )
Parameter: |ϕ|
Input: A digraph G and a first-order sentence ϕ ∈ FO({E })
Question: G | = ϕ?
Not expressible in FO: "k-colorable" for any k ⩾ 2, "cyclic", "Eulerian", "Hamiltonian", etc.
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO transduction: color by O(1) unary relations, interpret, delete
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO transduction: color by O(1) unary relations, interpret, delete
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO transduction: color by O(1) unary relations, interpret, delete
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO transduction: color by O(1) unary relations, interpret, delete
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO transduction: color by O(1) unary relations, interpret, delete
FO interpretations and transductions
FO simple interpretation: redefine the edges by a first-order formula
FO transduction: color by O(1) unary relations, interpret, delete
Theorem (B., Kim, Thomass´e, Watrigant '20)
Transductions of bounded twin-width classes have bounded twin-width.
Dependence and monadic dependence
A class C is
dependent, if the hereditary closure of every interpretation of C misses some graph monadically dependent, if every transduction of C misses some graph [Baldwin, Shelah '85]
Dependence and monadic dependence
A class C is
dependent, if the hereditary closure of every interpretation of C misses some graph monadically dependent, if every transduction of C misses some graph [Baldwin, Shelah '85]
Theorem (Downey, Fellows, Taylor '96)
FO model checking is AW [∗]-complete on general graphs, thus unlikely FPT on independent classes
Could it be that on every dependent class, it is FPT?
Known FPT FO model checking –tractable classes
bounded sparse
classes
planar
proper minor-closed
polynomial expansion
bounded expansion
nowhere dense
degree
bounded twin-width
bounded
rank-width
cographs
posets of
bounded
width
L
-interval
unit interval
pattern
avoiding
permuta-
tions
map
graphs
dense
classes
Theorem (B., Kim, Thomass´e, Watrigant '20)
FO Model Checking solvable in f (|ϕ|, d)n on graphs with a d-sequence.
Equivalences for ordered graphs
Theorem (B., Giocanti, Ossona de Mendez, Toru´nczyk, Thomass´e, Simon '21+)
Let C be a hereditary class of ordered graphs, the following are equivalent.
(i) C has bounded twin-width.
(ii) C is tractable.
(iii) C is dependent.
(iv) C is monadically dependent.
(v ) C has subfactorial growth.
(vi) C has exponential growth.
Other settings where bounded twin-width tractable ⇔ dependent?
Open question:
Let T be a hereditary class of tournaments. T bounded twin-width ⇔ T tractable?
⇔
Other settings where bounded twin-width tractable ⇔ dependent?
Open question:
Let T be a hereditary class of tournaments.
T bounded twin-width ⇔ T tractable?
Large transitive subtournaments → totally ordered pieces but no global order...
⇔
Caccetta-H¨aggkvist conjecture
CH: Every n-vertex oriented graph without directed cycles of length at most ℓ has minimum out-degree at most (n − 1)/ℓ.
"ℓ = 3" has received the most attention
Caccetta-H¨aggkvist conjecture
CH: Every n-vertex oriented graph without directed cycles of length at most ℓ has minimum out-degree at most (n − 1)/ℓ.
"ℓ = 3" has received the most attention
The (assumed exhaustive list of) extremal configurations are built with lexicographic products so have bounded twin-width
Recap and open questions
We have seen that:
(1) Oriented twin-width is functionally equivalent to twin-width.
(2) Orientations of Kt,t-free bounded twin-width classes have bounded twin-width.
(3) Maximum "delimiting power" of twin-width on ordered graphs.
Open questions
- Marcus-Tardos-free proof of (1).
- Bounded twin-width ⇔ tractable among hereditary classes of tournaments.
- Revisiting conjectures like CH with a bounded/unbounded twin-width win-win argument.
|
<urn:uuid:909d5903-badf-48a7-af39-6adaed0e33a0>
|
CC-MAIN-2021-43
|
https://project.inria.fr/anrdigraphs/files/2021/06/slides-twin-width.pdf
|
2021-10-17T17:18:11+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00102-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 620,026,633
| 5,904
|
eng_Latn
|
eng_Latn
| 0.800168
|
eng_Latn
| 0.96513
|
[
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"swe_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"swe_Latn",
"eng_Latn",
"mlt_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dan_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"mlt_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"xho_Latn",
"eng_Latn",
"slv_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"mlt_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
77,
165,
192,
219,
311,
479,
646,
813,
981,
1148,
1315,
1482,
1672,
1862,
2052,
2242,
2432,
2622,
2812,
3014,
3216,
3418,
3620,
3822,
4031,
4233,
4361,
4423,
4479,
4535,
4597,
4641,
4685,
4729,
4773,
4817,
4861,
4973,
5023,
5030,
5037,
5183,
5478,
5935,
5975,
6058,
6098,
6180,
6262,
6335,
7006,
7175,
7267,
7342,
7423,
7589,
7733,
7954,
8217,
8423,
8533,
8708,
8762,
8874,
8995,
9071,
9141,
9218,
9406,
9548,
9796,
10042,
10281,
10559,
10811,
11111,
11628,
11680,
11771,
11865,
11905,
11968,
12008,
12122,
12218,
12334,
12612,
12923,
13252,
13395,
13690,
14176,
14279,
14391,
14488,
14538,
14588,
14638,
14959,
15468,
15670,
15820,
15980,
16143,
16309,
16556,
16801,
16908,
17082,
17256,
17430,
17604,
17778,
18067,
18291,
18707,
19139,
19497,
19661,
19907,
20101,
20417,
20889
] |
Twin-width for digraphs
´Edouard Bonnet
ENS Lyon, LIP
meeting ANR DIGRAPHS
Three outcomes between a pair of vertices: edge, or non-edge, or red edge (error edge)
Contractions in trigraphs
Contractions in trigraphs
Contractions in trigraphs
edges to N(u)△N(v ) turn red, for N(u) ∩ N(v ) red is absorbing
Contraction sequence
A contraction sequence of G:
Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G:
Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 0
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d
Maximum red degree = 1
overall maximum red degree = 2.
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 1
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 2
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 0
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d
Maximum red degree = 3
overall maximum red degree = 3.
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 3
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 3
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
```
Maximum red degree = 1 overall maximum red degree = 3
```
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 3
Classes with bounded twin-width
- cographs = twin-width 0
- trees, bounded treewidth, clique-width/rank-width
- grids
- . . .
Trees
If possible, contract two leaves with the same parent
Trees
If not, contract a deepest leaf with its parent
Trees
If not, contract a deepest leaf with its parent
Trees
If possible, contract two leaves with the same parent
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Generalization to orientations of bounded treewidth graphs, and to undirected bounded rank-width graphs
The following sequence works for any orientation
Grids
Grids
Orientations of bounded twin-width classes
Perhaps every "sparse" class of bounded twin-width has an orientation closure of bounded twin-width?
Orientations of bounded twin-width classes
Perhaps every "sparse" class of bounded twin-width has an orientation closure of bounded twin-width?
Theorem
The class of all orientations of graphs from a Kt,t-free class of bounded twin-width has itself bounded twin-width.
We will see later why
Simple operations preserving twin-width
For graphs:
- complementation: remains the same
- taking induced subgraphs: may only decrease
- adding one apex: at most "doubles"
- substitution G(v ← H): max of the twin-width of G and H
For digraphs:
- any map {→, ↔, · · · } →{→, ←, ↔, · · · }: may only decrease
- taking induced subdigraphs: may only decrease
- adding one apex: at most "quadruples"
- substitution G(v ← H): max of the twin-width of G and H
Substitution and lexicographic product
Substitution and lexicographic product
G = ⃗ C5, H = ⃗ P4, substitution G[v ← H]
Substitution and lexicographic product
Substitution and lexicographic product
More generally any modular decomposition
Substitution and lexicographic product
More generally any modular decomposition
Substitution and lexicographic product
tww(G[H]) = max(tww(G), tww(H))
Theorem (B., Geniet, Kim, Thomass´e, Watrigant '20 & '21)
The following classes have bounded twin-width, and O(1)-sequences can be computed in polynomial time.
- Bounded rank-width, and even, boolean-width graphs,
- every hereditary proper subclass of permutation graphs,
- posets of bounded antichain size,
- unit interval graphs,
- Kt-minor free graphs,
- map graphs with embedding,
- d-dimensional grids,
- Kt-free unit d-dimensional ball graphs,
- Ω(log n)-subdivisions of all the n-vertex graphs,
- cubic expanders defined by iterative random 2-lifts from K4,
- flat classes,
- subgraphs of every Kt,t-free class above,
- first-order transductions of all the above.
Twin-width in the language of matrices
```
1 0 1 0 1 0 1 0 1 0 1 1 0 1 1 0 1 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0
```
Encode a bipartite graph (or, if symmetric, any graph)
Twin-width in the language of matrices
Contraction of two columns (similar with two rows)
Twin-width in the language of matrices
How is the twin-width (re)defined?
Twin-width in the language of matrices
How to tune it for non-bipartite graph?
Twin-width in the language of matrices
Digraph encoding:
- i → j: 1 at (i, j), −1 at (j, i),
- i ↔ j: 2 at (i, j) and (j, i),
- otherwise: 0 at (i, j) and (j, i).
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Maximum number of non-constant "zones" per column or row part = error value
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Maximum number of non-constant "zones" per column or row part . . . until there are a single row part and column part
Partition viewpoint
Matrix partition: partitions of the row set and of the column set
Matrix division: same but all the parts are consecutive
Twin-width as maximum error value of a contraction sequence
Grid minor
t-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries
Grid minor
t-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries
A matrix is said t-grid free if it does not have a t-grid minor
Mixed minor
Mixed cell: not horizontal nor vertical
Mixed minor
Mixed cell: not horizontal nor vertical
Every mixed cell is witnessed by a 2 × 2 square = corner
Mixed minor
Mixed cell: not horizontal nor vertical
A matrix is said t-mixed free if it does not have a t-mixed minor
Mixed value
≈ (maximum) number of cells with a corner per row/column part
Mixed value
But we add the number of boundaries containing a corner
Mixed value
∴ merging row parts do not increase mixed value of column part
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20) If G admits a t-mixed free adjacency matrix, then tww(G) = 2 2 O ( t ) . Holds for binary structures in general
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
```
If ∃σ s.t. Adj (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
```
σ
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
```
Theorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
```
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part
Stanley-Wilf conjecture / Marcus-Tardos theorem
Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Question
For every k, is there a ck such that every n × m 0, 1-matrix with at least ck 1 per row and column admits a k-grid minor?
Stanley-Wilf conjecture / Marcus-Tardos theorem Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Conjecture (reformulation of F¨uredi-Hajnal conjecture '92) For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.
Stanley-Wilf conjecture / Marcus-Tardos theorem
Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed
Conjecture (reformulation of F¨uredi-Hajnal conjecture '92)
For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.
Conjecture (Stanley-Wilf conjecture '80s)
Any proper permutation class contains only 2 O ( n ) n-permutations.
Klazar showed F¨uredi-Hajnal ⇒ Stanley-Wilf in 2000 Marcus and Tardos showed F¨uredi-Hajnal in 2004
Let M be an n × n 0, 1-matrix without k-grid minor
Marcus-Tardos one-page inductive proof
Draw a regular n k 2 × n k 2 division on top of M
Marcus-Tardos one-page inductive proof
A cell is wide if it has at least k columns with a 1
Marcus-Tardos one-page inductive proof
There are less than k k 2 k wide cells per column part. Why?
Marcus-Tardos one-page inductive proof
Marcus-Tardos one-page inductive proof
In W and T, at most 2 · n k 2 · k k 2 k · k 4 = 2k 3 k 2 k n entries 1
Marcus-Tardos one-page inductive proof
There are at most (k − 1) 2 ck n k 2 remaining 1. Why?
Marcus-Tardos one-page inductive proof
Choose ck = 2k 4 k 2 k so that (k − 1) 2 ck n k 2 + 2 k 3 k 2 k n ⩽ ckn
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If
∃
σ
s.t. Adj
O
(
t
)
σ
(
G
)
is t-mixed free, then tww
(
G
) = 2
2.
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part Impossible!
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Step 2: find a contraction sequence with error value g(t)
Refinement of Di where each part coincides on the non-mixed cells
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Now to bound the twin-width of a class C:
1) Find a good vertex-ordering procedure
2) Argue that, in this order, a t-mixed minor would conflict with C
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Theorem
The following are equivalent.
- (i) C has bounded twin-width.
- (ii) C has bounded "oriented twin-width."
- (iii) C is t-mixed free.
Oriented twin-width: put red arcs from contracted vertices, and consider the red out-degree.
(i) ⇒ (ii): immediate.
(ii) ⇒ (iii): same simple proof as (i) ⇒ (iii).
(iii) ⇒ (i): what we just saw.
Bounded twin-width – unit interval graphs
Warm-up with unit interval graphs: order by left endpoints
Bounded twin-width – unit interval graphs
No 3-by-3 grid has all 9 cells crossed by two non-decreasing curves
Bounded twin-width – posets of bounded antichain
Put the k chains in order one after the other
Bounded twin-width – posets of bounded antichain
Bounded twin-width – posets of bounded antichain
Bounded twin-width – posets of bounded antichain
Sparse twin-width
Theorem (B., Geniet, Kim, Thomass´e, Watrigant 21) If C is a hereditary class of bounded twin-width, tfae.
- (i) C is Kt,t -free.
- (ii) C is d-grid free.
- (iii) Every n-ver
|
tex graph G ∈ C has at most gn edges.
| 14,834
|
inside_word
|
n-vertex
|
remove_all
|
<url>
https://project.inria.fr/anrdigraphs/files/2021/06/slides-twin-width.pdf
</url>
<text>
Twin-width for digraphs
´Edouard Bonnet
ENS Lyon, LIP
meeting ANR DIGRAPHS
Three outcomes between a pair of vertices: edge, or non-edge, or red edge (error edge)
Contractions in trigraphs
Contractions in trigraphs
Contractions in trigraphs
edges to N(u)△N(v ) turn red, for N(u) ∩ N(v ) red is absorbing
Contraction sequence
A contraction sequence of G:
Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G:
Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Contraction sequence
A contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 0
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d
Maximum red degree = 1
overall maximum red degree = 2.
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 1
overall maximum red degree = 2
Twin-width
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 2
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 0
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d
Maximum red degree = 3
overall maximum red degree = 3.
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 3
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 3
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 2
overall maximum red degree = 3
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
```
Maximum red degree = 1 overall maximum red degree = 3
```
Twin-width of digraphs
tww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.
Maximum red degree = 0
overall maximum red degree = 3
Classes with bounded twin-width
- cographs = twin-width 0
- trees, bounded treewidth, clique-width/rank-width
- grids
- . . .
Trees
If possible, contract two leaves with the same parent
Trees
If not, contract a deepest leaf with its parent
Trees
If not, contract a deepest leaf with its parent
Trees
If possible, contract two leaves with the same parent
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Cannot create a red degree-3 vertex
Trees
Generalization to orientations of bounded treewidth graphs, and to undirected bounded rank-width graphs
The following sequence works for any orientation
Grids
Grids
Orientations of bounded twin-width classes
Perhaps every "sparse" class of bounded twin-width has an orientation closure of bounded twin-width?
Orientations of bounded twin-width classes
Perhaps every "sparse" class of bounded twin-width has an orientation closure of bounded twin-width?
Theorem
The class of all orientations of graphs from a Kt,t-free class of bounded twin-width has itself bounded twin-width.
We will see later why
Simple operations preserving twin-width
For graphs:
- complementation: remains the same
- taking induced subgraphs: may only decrease
- adding one apex: at most "doubles"
- substitution G(v ← H): max of the twin-width of G and H
For digraphs:
- any map {→, ↔, · · · } →{→, ←, ↔, · · · }: may only decrease
- taking induced subdigraphs: may only decrease
- adding one apex: at most "quadruples"
- substitution G(v ← H): max of the twin-width of G and H
Substitution and lexicographic product
Substitution and lexicographic product
G = ⃗ C5, H = ⃗ P4, substitution G[v ← H]
Substitution and lexicographic product
Substitution and lexicographic product
More generally any modular decomposition
Substitution and lexicographic product
More generally any modular decomposition
Substitution and lexicographic product
tww(G[H]) = max(tww(G), tww(H))
Theorem (B., Geniet, Kim, Thomass´e, Watrigant '20 & '21)
The following classes have bounded twin-width, and O(1)-sequences can be computed in polynomial time.
- Bounded rank-width, and even, boolean-width graphs,
- every hereditary proper subclass of permutation graphs,
- posets of bounded antichain size,
- unit interval graphs,
- Kt-minor free graphs,
- map graphs with embedding,
- d-dimensional grids,
- Kt-free unit d-dimensional ball graphs,
- Ω(log n)-subdivisions of all the n-vertex graphs,
- cubic expanders defined by iterative random 2-lifts from K4,
- flat classes,
- subgraphs of every Kt,t-free class above,
- first-order transductions of all the above.
Twin-width in the language of matrices
```
1 0 1 0 1 0 1 0 1 0 1 1 0 1 1 0 1 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0
```
Encode a bipartite graph (or, if symmetric, any graph)
Twin-width in the language of matrices
Contraction of two columns (similar with two rows)
Twin-width in the language of matrices
How is the twin-width (re)defined?
Twin-width in the language of matrices
How to tune it for non-bipartite graph?
Twin-width in the language of matrices
Digraph encoding:
- i → j: 1 at (i, j), −1 at (j, i),
- i ↔ j: 2 at (i, j) and (j, i),
- otherwise: 0 at (i, j) and (j, i).
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Maximum number of non-constant "zones" per column or row part = error value
Partition viewpoint
Matrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive
Maximum number of non-constant "zones" per column or row part . . . until there are a single row part and column part
Partition viewpoint
Matrix partition: partitions of the row set and of the column set
Matrix division: same but all the parts are consecutive
Twin-width as maximum error value of a contraction sequence
Grid minor
t-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries
Grid minor
t-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries
A matrix is said t-grid free if it does not have a t-grid minor
Mixed minor
Mixed cell: not horizontal nor vertical
Mixed minor
Mixed cell: not horizontal nor vertical
Every mixed cell is witnessed by a 2 × 2 square = corner
Mixed minor
Mixed cell: not horizontal nor vertical
A matrix is said t-mixed free if it does not have a t-mixed minor
Mixed value
≈ (maximum) number of cells with a corner per row/column part
Mixed value
But we add the number of boundaries containing a corner
Mixed value
∴ merging row parts do not increase mixed value of column part
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20) If G admits a t-mixed free adjacency matrix, then tww(G) = 2 2 O ( t ) . Holds for binary structures in general
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
```
If ∃σ s.t. Adj (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
```
σ
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
```
Theorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
```
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Merge consecutive parts greedily
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part
Stanley-Wilf conjecture / Marcus-Tardos theorem
Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Question
For every k, is there a ck such that every n × m 0, 1-matrix with at least ck 1 per row and column admits a k-grid minor?
Stanley-Wilf conjecture / Marcus-Tardos theorem Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Conjecture (reformulation of F¨uredi-Hajnal conjecture '92) For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.
Stanley-Wilf conjecture / Marcus-Tardos theorem
Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed
Conjecture (reformulation of F¨uredi-Hajnal conjecture '92)
For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.
Conjecture (Stanley-Wilf conjecture '80s)
Any proper permutation class contains only 2 O ( n ) n-permutations.
Klazar showed F¨uredi-Hajnal ⇒ Stanley-Wilf in 2000 Marcus and Tardos showed F¨uredi-Hajnal in 2004
Let M be an n × n 0, 1-matrix without k-grid minor
Marcus-Tardos one-page inductive proof
Draw a regular n k 2 × n k 2 division on top of M
Marcus-Tardos one-page inductive proof
A cell is wide if it has at least k columns with a 1
Marcus-Tardos one-page inductive proof
There are less than k k 2 k wide cells per column part. Why?
Marcus-Tardos one-page inductive proof
Marcus-Tardos one-page inductive proof
In W and T, at most 2 · n k 2 · k k 2 k · k 4 = 2k 3 k 2 k n entries 1
Marcus-Tardos one-page inductive proof
There are at most (k − 1) 2 ck n k 2 remaining 1. Why?
Marcus-Tardos one-page inductive proof
Choose ck = 2k 4 k 2 k so that (k − 1) 2 ck n k 2 + 2 k 3 k 2 k n ⩽ ckn
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If
∃
σ
s.t. Adj
O
(
t
)
σ
(
G
)
is t-mixed free, then tww
(
G
) = 2
2.
Step 1: find a division sequence (Di)i with mixed value f (t)
Stuck, removing every other separation → f ( t ) 2 mixed cells per part Impossible!
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Step 1: find a division sequence (Di)i with mixed value f (t)
Step 2: find a contraction sequence with error value g(t)
Refinement of Di where each part coincides on the non-mixed cells
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Now to bound the twin-width of a class C:
1) Find a good vertex-ordering procedure
2) Argue that, in this order, a t-mixed minor would conflict with C
Twin-width and mixed freeness
Theorem (B., Kim, Thomass´e, Watrigant '20)
If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .
Theorem
The following are equivalent.
- (i) C has bounded twin-width.
- (ii) C has bounded "oriented twin-width."
- (iii) C is t-mixed free.
Oriented twin-width: put red arcs from contracted vertices, and consider the red out-degree.
(i) ⇒ (ii): immediate.
(ii) ⇒ (iii): same simple proof as (i) ⇒ (iii).
(iii) ⇒ (i): what we just saw.
Bounded twin-width – unit interval graphs
Warm-up with unit interval graphs: order by left endpoints
Bounded twin-width – unit interval graphs
No 3-by-3 grid has all 9 cells crossed by two non-decreasing curves
Bounded twin-width – posets of bounded antichain
Put the k chains in order one after the other
Bounded twin-width – posets of bounded antichain
Bounded twin-width – posets of bounded antichain
Bounded twin-width – posets of bounded antichain
Sparse twin-width
Theorem (B., Geniet, Kim, Thomass´e, Watrigant 21) If C is a hereditary class of bounded twin-width, tfae.
- (i) C is Kt,t -free.
- (ii) C is d-grid free.
- (iii) Every n-ver<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://project.inria.fr/anrdigraphs/files/2021/06/slides-twin-width.pdf\n</url>\n<text>\nTwin-width for digraphs\n\n´Edouard Bonnet\n\nENS Lyon, LIP\n\nmeeting ANR DIGRAPHS\n\nThree outcomes between a pair of vertices: edge, or non-edge, or red edge (error edge)\n\nContractions in trigraphs\n\nContractions in trigraphs\n\nContractions in trigraphs\n\nedges to N(u)△N(v ) turn red, for N(u) ∩ N(v ) red is absorbing\n\nContraction sequence\n\nA contraction sequence of G:\n\nSequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nContraction sequence\n\nA contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nContraction sequence\n\nA contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nContraction sequence\n\nA contraction sequence of G:\n\nSequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nContraction sequence\n\nA contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nContraction sequence\n\nA contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nContraction sequence\n\nA contraction sequence of G: Sequence of trigraphs G = Gn, Gn−1, . . . , G2, G1 such that Gi is obtained by performing one contraction in Gi+1.\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 0\n\noverall maximum red degree = 0\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 2\n\noverall maximum red degree = 2\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 2\n\noverall maximum red degree = 2\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 2\n\noverall maximum red degree = 2\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d\n\nMaximum red degree = 1\n\noverall maximum red degree = 2.\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 1\n\noverall maximum red degree = 2\n\nTwin-width\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 0\n\noverall maximum red degree = 2\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 0\n\noverall maximum red degree = 0\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d\n\nMaximum red degree = 3\n\noverall maximum red degree = 3.\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 3\n\noverall maximum red degree = 3\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 3\n\noverall maximum red degree = 3\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 2\n\noverall maximum red degree = 3\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\n```\nMaximum red degree = 1 overall maximum red degree = 3\n```\n\nTwin-width of digraphs\n\ntww(G): Least integer d such that G admits a contraction sequence where all trigraphs have maximum red degree at most d.\n\nMaximum red degree = 0\n\noverall maximum red degree = 3\n\nClasses with bounded twin-width\n\n- cographs = twin-width 0\n- trees, bounded treewidth, clique-width/rank-width\n- grids\n- . . .\n\nTrees\n\nIf possible, contract two leaves with the same parent\n\nTrees\n\nIf not, contract a deepest leaf with its parent\n\nTrees\n\nIf not, contract a deepest leaf with its parent\n\nTrees\n\nIf possible, contract two leaves with the same parent\n\nTrees\n\nCannot create a red degree-3 vertex\n\nTrees\n\nCannot create a red degree-3 vertex\n\nTrees\n\nCannot create a red degree-3 vertex\n\nTrees\n\nCannot create a red degree-3 vertex\n\nTrees\n\nCannot create a red degree-3 vertex\n\nTrees\n\nCannot create a red degree-3 vertex\n\nTrees\n\nGeneralization to orientations of bounded treewidth graphs, and to undirected bounded rank-width graphs\n\nThe following sequence works for any orientation\n\nGrids\n\nGrids\n\nOrientations of bounded twin-width classes\n\nPerhaps every \"sparse\" class of bounded twin-width has an orientation closure of bounded twin-width?\n\nOrientations of bounded twin-width classes\n\nPerhaps every \"sparse\" class of bounded twin-width has an orientation closure of bounded twin-width?\n\nTheorem\n\nThe class of all orientations of graphs from a Kt,t-free class of bounded twin-width has itself bounded twin-width.\n\nWe will see later why\n\nSimple operations preserving twin-width\n\nFor graphs:\n\n- complementation: remains the same\n- taking induced subgraphs: may only decrease\n- adding one apex: at most \"doubles\"\n- substitution G(v ← H): max of the twin-width of G and H\n\nFor digraphs:\n\n- any map {→, ↔, · · · } →{→, ←, ↔, · · · }: may only decrease\n- taking induced subdigraphs: may only decrease\n- adding one apex: at most \"quadruples\"\n- substitution G(v ← H): max of the twin-width of G and H\n\nSubstitution and lexicographic product\n\nSubstitution and lexicographic product\n\nG = ⃗ C5, H = ⃗ P4, substitution G[v ← H]\n\nSubstitution and lexicographic product\n\nSubstitution and lexicographic product\n\nMore generally any modular decomposition\n\nSubstitution and lexicographic product\n\nMore generally any modular decomposition\n\nSubstitution and lexicographic product\n\ntww(G[H]) = max(tww(G), tww(H))\n\nTheorem (B., Geniet, Kim, Thomass´e, Watrigant '20 & '21)\n\nThe following classes have bounded twin-width, and O(1)-sequences can be computed in polynomial time.\n\n- Bounded rank-width, and even, boolean-width graphs,\n- every hereditary proper subclass of permutation graphs,\n- posets of bounded antichain size,\n- unit interval graphs,\n- Kt-minor free graphs,\n- map graphs with embedding,\n- d-dimensional grids,\n- Kt-free unit d-dimensional ball graphs,\n- Ω(log n)-subdivisions of all the n-vertex graphs,\n- cubic expanders defined by iterative random 2-lifts from K4,\n- flat classes,\n- subgraphs of every Kt,t-free class above,\n- first-order transductions of all the above.\n\nTwin-width in the language of matrices\n\n```\n1 0 1 0 1 0 1 0 1 0 1 1 0 1 1 0 1 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0\n```\n\nEncode a bipartite graph (or, if symmetric, any graph)\n\nTwin-width in the language of matrices\n\nContraction of two columns (similar with two rows)\n\nTwin-width in the language of matrices\n\nHow is the twin-width (re)defined?\n\nTwin-width in the language of matrices\n\nHow to tune it for non-bipartite graph?\n\nTwin-width in the language of matrices\n\nDigraph encoding:\n\n- i → j: 1 at (i, j), −1 at (j, i),\n- i ↔ j: 2 at (i, j) and (j, i),\n- otherwise: 0 at (i, j) and (j, i).\n\nPartition viewpoint\n\nMatrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive\n\nPartition viewpoint\n\nMatrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive\n\nMaximum number of non-constant \"zones\" per column or row part = error value\n\nPartition viewpoint\n\nMatrix partition: partitions of the row set and of the column set Matrix division: same but all the parts are consecutive\n\nMaximum number of non-constant \"zones\" per column or row part . . . until there are a single row part and column part\n\nPartition viewpoint\n\nMatrix partition: partitions of the row set and of the column set\n\nMatrix division: same but all the parts are consecutive\n\nTwin-width as maximum error value of a contraction sequence\n\nGrid minor\n\nt-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries\n\nGrid minor\n\nt-grid minor: t × t-division where every cell is non-empty Non-empty cell: not full of 0 entries\n\nA matrix is said t-grid free if it does not have a t-grid minor\n\nMixed minor\n\nMixed cell: not horizontal nor vertical\n\nMixed minor\n\nMixed cell: not horizontal nor vertical\n\nEvery mixed cell is witnessed by a 2 × 2 square = corner\n\nMixed minor\n\nMixed cell: not horizontal nor vertical\n\nA matrix is said t-mixed free if it does not have a t-mixed minor\n\nMixed value\n\n≈ (maximum) number of cells with a corner per row/column part\n\nMixed value\n\nBut we add the number of boundaries containing a corner\n\nMixed value\n\n∴ merging row parts do not increase mixed value of column part\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20) If G admits a t-mixed free adjacency matrix, then tww(G) = 2 2 O ( t ) . Holds for binary structures in general\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\n```\nIf ∃σ s.t. Adj (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n```\n\nσ\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nMerge consecutive parts greedily\n\nTwin-width and mixed freeness\n\n```\nTheorem (B., Kim, Thomass´e, Watrigant '20) If ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n```\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nMerge consecutive parts greedily\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nMerge consecutive parts greedily\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nStuck, removing every other separation → f ( t ) 2 mixed cells per part\n\nStanley-Wilf conjecture / Marcus-Tardos theorem\n\nAuxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Question\n\nFor every k, is there a ck such that every n × m 0, 1-matrix with at least ck 1 per row and column admits a k-grid minor?\n\nStanley-Wilf conjecture / Marcus-Tardos theorem Auxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed Conjecture (reformulation of F¨uredi-Hajnal conjecture '92) For every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.\n\nStanley-Wilf conjecture / Marcus-Tardos theorem\n\nAuxiliary 0,1-matrix with one entry per cell: a 1 iffthe cell is mixed\n\nConjecture (reformulation of F¨uredi-Hajnal conjecture '92)\n\nFor every k, there is a ck such that every n × m 0, 1-matrix with at least ck max(n, m) 1 entries admits a k-grid minor.\n\nConjecture (Stanley-Wilf conjecture '80s)\n\nAny proper permutation class contains only 2 O ( n ) n-permutations.\n\nKlazar showed F¨uredi-Hajnal ⇒ Stanley-Wilf in 2000 Marcus and Tardos showed F¨uredi-Hajnal in 2004\n\nLet M be an n × n 0, 1-matrix without k-grid minor\n\nMarcus-Tardos one-page inductive proof\n\nDraw a regular n k 2 × n k 2 division on top of M\n\nMarcus-Tardos one-page inductive proof\n\nA cell is wide if it has at least k columns with a 1\n\nMarcus-Tardos one-page inductive proof\n\nThere are less than k k 2 k wide cells per column part. Why?\n\nMarcus-Tardos one-page inductive proof\n\nMarcus-Tardos one-page inductive proof\n\nIn W and T, at most 2 · n k 2 · k k 2 k · k 4 = 2k 3 k 2 k n entries 1\n\nMarcus-Tardos one-page inductive proof\n\nThere are at most (k − 1) 2 ck n k 2 remaining 1. Why?\n\nMarcus-Tardos one-page inductive proof\n\nChoose ck = 2k 4 k 2 k so that (k − 1) 2 ck n k 2 + 2 k 3 k 2 k n ⩽ ckn\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nStuck, removing every other separation → f ( t ) 2 mixed cells per part\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf\n\n∃\n\nσ\n\ns.t. Adj\n\nO\n\n(\n\nt\n\n)\n\nσ\n\n(\n\nG\n\n)\n\nis t-mixed free, then tww\n\n(\n\nG\n\n) = 2\n\n2.\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nStuck, removing every other separation → f ( t ) 2 mixed cells per part Impossible!\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nStep 1: find a division sequence (Di)i with mixed value f (t)\n\nStep 2: find a contraction sequence with error value g(t)\n\nRefinement of Di where each part coincides on the non-mixed cells\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nNow to bound the twin-width of a class C:\n\n1) Find a good vertex-ordering procedure\n2) Argue that, in this order, a t-mixed minor would conflict with C\n\nTwin-width and mixed freeness\n\nTheorem (B., Kim, Thomass´e, Watrigant '20)\n\nIf ∃σ s.t. Adj σ (G) is t-mixed free, then tww(G) = 2 2 O ( t ) .\n\nTheorem\n\nThe following are equivalent.\n\n- (i) C has bounded twin-width.\n- (ii) C has bounded \"oriented twin-width.\"\n- (iii) C is t-mixed free.\n\nOriented twin-width: put red arcs from contracted vertices, and consider the red out-degree.\n\n(i) ⇒ (ii): immediate.\n\n(ii) ⇒ (iii): same simple proof as (i) ⇒ (iii).\n\n(iii) ⇒ (i): what we just saw.\n\nBounded twin-width – unit interval graphs\n\nWarm-up with unit interval graphs: order by left endpoints\n\nBounded twin-width – unit interval graphs\n\nNo 3-by-3 grid has all 9 cells crossed by two non-decreasing curves\n\nBounded twin-width – posets of bounded antichain\n\nPut the k chains in order one after the other\n\nBounded twin-width – posets of bounded antichain\n\nBounded twin-width – posets of bounded antichain\n\nBounded twin-width – posets of bounded antichain\n\nSparse twin-width\n\nTheorem (B., Geniet, Kim, Thomass´e, Watrigant 21) If C is a hereditary class of bounded twin-width, tfae.\n\n- (i) C is Kt,t -free.\n- (ii) C is d-grid free.\n- (iii) Every n-ver<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "tex graph G ∈ C has at most gn edges.",
"role": "assistant"
}
] |
|
COMPLAINTS POLICY
ADOPTED DATE: NOVEMBER 2018
REVIEW DATE: NOVEMBER 2021
Acorn Childcare Centre Empingham Road Stamford PE9 2SR
Dealing With Complaints – Initial Concerns
At Acorn Childcare Centre (the Centre) we take informal concerns seriously at the earliest stage so that we are able to resolve most issues very quickly and effectively. In most cases the Room Manager, Key Worker or Out of School Club Manager will receive the first approach about a concern. It is helpful if staff are able to resolve issues on the spot, including apologising where necessary. We recognise however that sometimes this is not possible and formal complaints should always follow this Complaints Policy. Most concerns are handled without the need for formal procedures. The requirement to have a Complaints Policy does not in any way undermine efforts to resolve the concern informally.
The Difference Between A Concern And A Complaint
A 'concern' may be defined as 'an expression of worry or doubt over an issue considered to be important for which reassurances are sought'. A complaint may be generally defined as 'an expression of dissatisfaction however made, about actions taken or a lack of action'. At Acorn Childcare Centre, we take informal concerns seriously and make every effort to resolve the matter as quickly as possible. It is in everyone's interest that complaints are resolved at the earliest possible stage. Many issues can be resolved informally, without the need to invoke formal procedures.
There are occasions when complainants would like to raise their concerns formally. In those cases, the Centre's formal policy should be invoked through the stages outlined within our procedure Annex A.
Who Can Make A Complaint?
Any person, including members of the general public, may make a complaint about any provision of facilities or services which the Centre provides. We do not limit complaints to parents or carers of children who are registered at the Centre.
Complaints Regarding Children With Special Educational Needs And/Or Disabilities
A parent or carer who has a child at the Centre with special educational needs (SEN), and who wishes to make a complaint, should approach the Complaints Coordinator in the first instance, stating that they have a child with SEN. The Complaints Coordinator will then always and automatically ensure that the Special Educational Needs Coordinator (SENDCo) is involved in resolving the complaint. If the complaint remains unresolved or if the complaint is about the SENDCo, it will follow the normal procedure as detailed below.
Timeliness
The Centre will aim to consider complaints and resolve complaints as quickly, and efficiently as possible. Each action within each stage will be completed as soon as possible and within at least fourteen days. When further investigations are necessary, we will set new time limits. In those instances, we will send the complainant details of the new deadline and give an explanation for the delay.
Stages
The Centre expects complaints to be made as soon as possible after an incident arises to allow for effective management of a complaint. We consider three months to be an acceptable time frame in which to lodge a complaint, although we will consider any complaints lodged beyond this period.
Recording Complaints
The Centre asks for complaints to be made by using a complaint form or in writing. If the complainant has communication preferences due to disability or learning difficulties, then we allow alternative methods of contact.
* A complaint may be made in person, by telephone, or in writing.
* In order to prevent any later challenge or disagreement over what was said, brief notes of meetings and telephone calls will be kept and a copy of any written response added to the record. Where there are communication difficulties, we may wish to use recording devices to ensure the complainant is able to access and review the discussions at a later point.
* We will record the progress of the complaint and the final outcome. The Complaints Coordinator is responsible for these records and holds them centrally.
* The Centre is aware that complainants have a right to copies of these records under the Freedom of Information and Data Protection Acts.
* Our standard complaint form is included in Annex B.
Directors' Review
Complaints will not be shared with all the Directors, except in very general terms, in case an appeal panel needs to be organised. If all the Directors are aware of the substance of a complaint before the final stage has been completed, the Centre will arrange for an independent panel to hear the complaint. The Centre is most likely to approach the Governing Body of Malcolm Sargent Primary School to help in this regard.
Complainants have the right to request an independent panel, if they believe there is likely to be bias in the proceedings. The Centre will consider the request but ultimately, the decision is made by the Directors.
The process of listening to and resolving complaints can contribute to improvement. When individual complaints are heard, the Centre may also identify underlying issues which need to be addressed. The Centre recognises that monitoring and a review of complaints can be a useful tool in evaluating its performance. The Directors will review complaints and their handling at regular intervals to inform improvements and the effectiveness of the complaints procedure.
Complaints not in scope of the policy
Our Complaints Policy covers all complaints about any provision of facilities or services which the Centre provides, with the exceptions listed below for which there are separate (statutory) procedures:
Annex A - Complaints Procedure
Dealing With Complaints – Formal Procedures
The formal procedures will need to be invoked when initial attempts to resolve the issue are unsuccessful and the person raising the concern remains dissatisfied and wishes to take the matter further. At the Centre, we nominate a member of staff to have responsibility for the operation and management of the Centre's complaints procedure. The Centre's Complaints Co-ordinator is the Deputy Manager.
Stage 1 (Informal): Complaint Heard By Staff Member
It is in everyone's interest that complaints are resolved at the earliest possible stage. The Centre understands that the experience of the first contact between the complainant and the Centre is crucial in determining whether the complaint will escalate. To that end, staff are made aware of the procedures, so that they will know what to do when they receive a complaint.
We respect the views of a complainant who indicates that he/she would have difficulty discussing a complaint with a particular member of staff. In these cases, the Complaints Coordinator can refer the complainant to another staff member. Where the complaint concerns the Manager, the Complaints Coordinator will refer the complainant to the Safeguarding Director.
Similarly, if the member of staff directly involved feels too compromised to deal with a complaint, the Complaints Coordinator may consider referring the complainant to another staff member. The member of staff may be more senior but does not have to be. The ability to consider the complaint objectively and impartially is crucial.
Where the first approach is made to a Director, the next step is to refer the complainant to the appropriate person and advise them about the procedure.
It is useful if Directors do not act unilaterally on an individual complaint outside the formal procedure or be involved at the early stages in case they are needed to sit on a panel at a later stage of the procedure.
Stage 2 (Formal): Complaint Heard By the Centre Manager
The Centre Manager's influence will already have shaped the way complaints are handled at the Centre. At this point, the complainant may be dissatisfied with the way the complaint was handled at Stage 1 as well as pursuing their initial complaint. The Manager may delegate the task of collating the information to another staff member but not the decision on the action to be taken.
Stage 3 (Formal): Complaint Heard By the Safeguarding Director
If the complainant is not satisfied with the response of the Manager or the complaint is about the Manager, the complainant should write to the Centre's Safeguarding Director to request that their complaint is considered further.
Stage 4 (Formal): Complaint Heard By A Directors' Appeal Panel
The complainant usually needs to write to the Directors giving details of the complaint and asking that it is put before the Appeal Panel. The Chair (or if the Chair has been involved at any previous stage in the process, a nominated member of the Directors) will convene a Directors' Appeal Panel. The Appeal Panel hearing is the last Centre-based stage of the complaints process and is not convened merely to rubber-stamp previous decisions.
Individual complaints would not be heard by all the Directors at any stage, as this could compromise the impartiality of any panel set up for a disciplinary hearing against a member of staff following a serious complaint.
The Directors may nominate a number of members with delegated powers to hear complaints at that stage, and set out its terms of reference. These can include:
- drawing up its procedures;
- hearing individual appeals;
- making recommendations on policy as a result of complaints.
The procedure adopted by the Directors' Appeal Panel would normally be part of the Centre S complaints procedure. The panel can be drawn from the nominated members and may consist of three or more people. The panel may choose their own Chair.
The Remit Of The Directors' Appeal Panel
The Appeal Panel can:
- dismiss the complaint in whole or in part;
- uphold the complaint in whole or in part;
- decide on the appropriate action to be taken to resolve the complaint;
- recommend changes to the school's systems or procedures to ensure that problems of a similar nature do not recur.
There are several points which any member of the Directors sitting on an Appeal Panel needs to remember:
- It is important that the hearing is independent and impartial and that it is seen to be so.
- No Director may sit on the panel if he/she has had a prior involvement in the complaint or in the circumstances surrounding it. In deciding the make-up of the panel, the Directors need to try and ensure that it is a cross-section of the categories of Directors and sensitive to the issues of race, gender and religious affiliation.
- The aim of the hearing, which needs to be held in private, will always be to resolve the complaint and achieve reconciliation between the Centre and the complainant. However, it has to be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously.
- An effective panel will acknowledge that many complainants feel nervous and inhibited in a formal setting. Parents often feel emotional when discussing an issue which affects their child. The Appeal Panel Chair will ensure that the proceedings are as welcoming as possible. The layout of the room will set the tone and care is needed to ensure the setting is informal and not adversarial.
- Extra care needs to be taken when the complainant is a child. Careful consideration of the atmosphere and proceedings will ensure that the child does not feel intimidated. The Appeal Panel needs to be aware of the views of the child and give them equal consideration to those of adults. Where the child's parent is the complainant, it would be helpful to give the parent the opportunity to say which parts of the hearing, if any, the child needs to attend.
- The Directors' Appeal Panel members need to be aware of the complaints procedure.
Annex B –Complaint Form
Please complete and return to the Centre's Complaints Coordinator who will acknowledge receipt and explain what action will be taken.
Your name:
Child's name (if relevant):
Your relationship to the child (if relevant):
Address:
Postcode:
Day time telephone number:
Evening telephone number:
Please give details of your complaint.
What action, if any, have you already taken to try and resolve your complaint. (Who did you speak to and what was the response)?
What actions do you feel might resolve the problem at this stage?
Are you attaching any paperwork? If so, please give details.
Signature:
Date:
Official use
Date acknowledgement sent:
By who:
Complaint referred to:
Date:
Annex C: Roles and Responsibilities
The Complainant
The complainant or person who makes the complaint will receive a more effective response to the complaint if he/she:
- co-operates with the Centre in seeking a solution to the complaint;
- expresses the complaint in full as early as possible;
- responds promptly to requests for information or meetings or in agreeing the details of the complaint;
- asks for assistance as needed;
- treats all those involved in the complaint with respect.
The Complaints Coordinator
The Complaints Coordinator will:
- ensure that the complainant is fully updated at each stage of the procedure;
- ensure that all people involved in the complaint procedure will be aware of the legislation around complaints including the Equality Act 2010, Data Protection Act 1998 and Freedom of Information Act 2000;
- liaise with staff members, Managers and Directors to ensure the smooth running of the complaints procedure;
-
keep records;
- be aware of issues regarding:
- sharing third party information;
- additional support - this may be needed by complainants when making a complaint including interpretation support.
The Investigator
The Investigator is the person involved in Stages 1 and 2 of the procedure. The Investigator's role includes providing a comprehensive, open, transparent and fair consideration of the complaint through:
- sensitive and thorough interviewing of the complainant to establish what has happened and who has been involved;
- consideration of records and other relevant information;
- interviewing staff and children/young people and other people relevant to the complaint;
-
analysing information;
- effectively liaising with the complainant and the Complaints Coordinator as appropriate to clarify what the complainant feels would put things right;
- identifying solutions and recommending courses of action to resolve problems;
- being mindful of the timescales to respond; and
- responding to the complainant in plain and clear language.
The Investigator will also make sure that they:
- conduct interviews with an open mind and be prepared to persist in the questioning;
- keep notes of interviews or arrange for an independent note taker to record minutes of the meeting.
The Panel Clerk (This Could Be The Complaints Coordinator)
The Clerk is the contact point for the complainant for the panel meeting and will:
- set the date, time and venue of the hearing, ensuring that the dates are convenient to all parties and that the venue and proceedings are accessible;
- collate any written material and send it to the parties in advance of the hearing;
- meet and welcome the parties as they arrive at the hearing;
- record the proceedings;
- circulate the minutes of the panel hearing;
- notify all parties of the panel's decision;
- liaise with the Complaints Coordinator.
The Appeal Panel Chair
The Appeal Panel Chair has a key role in ensuring that:
- the meeting is minuted;
- the remit of the panel is explained to the complainant and both they and the school have the opportunity of putting their case without undue interruption;
- the issues are addressed;
- key findings of fact are made;
- parents/carers and others who may not be used to speaking at such a hearing are put at ease which is particularly important if the complainant is a child/young person;
- the hearing is conducted in an informal manner with everyone treated with respect and courtesy;
- the layout of the room will set the tone; care is needed to ensure the setting is informal and not adversarial;
- the panel is open-minded and acts independently;
- no member of the panel has an external interest in the outcome of the proceedings or any involvement in an earlier stage of the procedure;
- both the complainant and the Centre are given the opportunity to state their case and seek clarity;
- written material is seen by everyone in attendance; if a new issue arises it would be useful to give everyone the opportunity to consider and comment upon it; this may require a short adjournment of the hearing;
- liaise with the Clerk and Complaints Coordinator.
Panel Members
Panel members will need to be aware that:
- it is important that the review panel hearing is independent and impartial, and that it is seen to be so;
- None of the Directors may sit on the panel if they have had a prior involvement in the complaint or in the circumstances surrounding it.
- the aim of the hearing, which will be held in private, will always be to resolve the complaint and achieve reconciliation between the school and the complainant. However, it must be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously;
- many complainants will feel nervous and inhibited in a formal setting;
- Parents/carers often feel emotional when discussing an issue which affects their child; the panel chair will ensure that the proceedings are as welcoming as possible.
- extra care needs to be taken when the complainant is a child/young person and present during all or part of the hearing;
- Careful consideration of the atmosphere and proceedings will ensure that the child/young person does not feel intimidated; the panel should respect the views of the child/young person and give them equal consideration to those of adults.
- If the child/young person is the complainant, the panel should ask in advance if any support is needed to help them present their complaint. Where the child/young person's parent is the complainant, the panel should give the parent the opportunity to say which parts of the hearing, if any, the child/young person needs to attend.
- The parent should be advised however that agreement might not always be possible if the parent wishes the child/young person to attend a part of the meeting which the panel considers not to be in the child/young person's best interests.
- The welfare of the child/young person is paramount.
Annex D- Interviewing Best Practice Tips
Children/Young People
- Children/young people should be interviewed in the presence of another member of staff, or in the case of serious complaints (e.g. where the possibility of criminal investigation exists) in the presence of their parents/carers. However, it might not always be possible to conduct an interview in case it prejudices a LADO or police investigation.
- Care should be taken in these circumstances not to create an intimidating atmosphere.
- Children/young people should be told what the interview is about and that they can have someone with them.
Staff/Witnesses
- Explain the complaint and your role clearly to the interviewee and confirm that they understand the complaints procedure and their role in it.
- Staff are allowed a colleague to support them at their interview. The colleague must not be anyone likely to be interviewed themselves, including their line manager.
- Use open, not leading questions.
- Do not express opinions in words or attitude.
- Ask single not multiple questions, i.e. one question at a time.
- Try to separate 'hearsay' evidence from fact by asking interviewees how they know a particular fact.
- Persist with questions if necessary. Do not be afraid to ask the same question twice. Make notes of each answer given.
- Deal with conflicting evidence by seeking corroborative evidence. If this is not available, discuss with the Complaints Coordinator/Principal/Directors the option of a meeting between the conflicting witnesses.
- Make a formal record of the interview from the written notes as soon as possible while the memory is fresh.
- Show the interviewee the formal record, ask if s/he has anything to add, and to sign the record as accurate.
Annexe E - Policy for Unreasonable Complainants
The Centre is committed to dealing with all complaints fairly and impartially, and to providing a high quality service to those who complain. We will not normally limit the contact complainants have with the Centre. However, we do not expect our staff to tolerate unacceptable behaviour and will take action to protect staff from that behaviour, including that which is abusive, offensive or threatening.
The Centre defines unreasonable complainants as 'those who, because of the frequency or nature of their contacts with the school, hinder our consideration of their or other people's complaints'.
A complaint may be regarded as unreasonable when the person making the complaint:
- refuses to articulate their complaint or specify the grounds of a complaint or the outcomes sought by raising the complaint, despite offers of assistance;
- refuses to co-operate with the complaints investigation process while still wishing their complaint to be resolved;
- refuses to accept that certain issues are not within the scope of a complaints procedure;
- insists on the complaint being dealt with in ways which are incompatible with the adopted complaints procedure or with good practice;
- introduces trivial or irrelevant information which the complainant expects to be taken into account and commented on, or raises large numbers of detailed but unimportant questions, and insists they are fully answered, often immediately and to their own timescales;
- makes unjustified complaints about staff who are trying to deal with the issues, and seeks to have them replaced;
- changes the basis of the complaint as the investigation proceeds;
- repeatedly makes the same complaint (despite previous investigations or responses concluding that the complaint is groundless or has been addressed);
- refuses to accept the findings of the investigation into that complaint where the Centre's complaint procedure has been fully and properly implemented and completed including referral to the Department for Education;
- seeks an unrealistic outcome;
- makes excessive demands on school time by frequent, lengthy, complicated and stressful contact with staff regarding the complaint in person, in writing, by email and by telephone while the complaint is being dealt with.
A complaint may also be considered unreasonable if the person making the complaint does so either face-to-face, by telephone or in writing or electronically:
- maliciously;
- aggressively;
- using threats, intimidation or violence;
- using abusive, offensive or discriminatory language;
- knowing it to be false;
- using falsified information;
- publishing unacceptable information in a variety of media such as in social media websites and newspapers.
Complainants should limit the numbers of communications with a school while a complaint is being progressed. It is not helpful if repeated correspondence is sent (either by letter, phone, email or text) as it could delay the outcome being reached.
Whenever possible, the Manager will discuss any concerns with the complainant informally before applying an 'unreasonable' marking.
If the behaviour continues, the Manager will write to the complainant explaining that their behaviour is unreasonable and asking them to change it. For complainants who excessively contact the Centre causing a significant level of disruption, we may specify methods of communication and limit the number of contacts in a communication plan. This will be reviewed after six months.
In response to any serious incident of aggression or violence, the concerns and actions taken will be put in writing immediately and the police informed. This may include barring an individual from the Centre.
Barring from the Centre's Premises
Although fulfilling a public function, the Centre is a private place. The public has no automatic right of entry. The Centre will therefore act to ensure it remains a safe place for children, staff and other members of their community.
If a parent's behaviour is a cause for concern, the Centre can ask him/her to leave its premises. In serious cases, the Manager can notify them in writing that their implied licence to be on its premises has been temporarily revoked subject to any representations that the parent may wish to make. The Centre should always give the parent the opportunity to formally express their views on the decision to bar in writing.
The decision to bar should then be reviewed, taking into account any representations made by the parent, and either confirmed or lifted. If the decision is confirmed the parent should be notified in writing, explaining how long the bar will be in place.
Anyone wishing to complain about being barred can do so, by letter or email, to the Centre Manager. Once the Centre's own complaints procedure has been completed, the only remaining avenue of appeal is through the Courts; independent legal advice must therefore be sought.
|
<urn:uuid:c87ed9e3-19fd-4183-8d75-73c086444559>
|
CC-MAIN-2020-24
|
https://www.acornchildcarecentre.co.uk/attachments/download.asp?file=113&type=pdf
|
2020-05-27T09:22:25+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-24/subset=warc/part-00290-b4a094ce-c3a1-4796-8c26-d927e48e4b4a.c000.gz.parquet
| 646,724,186
| 4,917
|
eng_Latn
|
eng_Latn
| 0.955826
|
eng_Latn
| 0.998844
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
133,
3313,
5712,
8429,
11034,
11972,
12466,
12696,
14712,
16880,
18820,
20570,
23173,
25544
] |
COMPLAINTS POLICY
ADOPTED DATE: NOVEMBER 2018
REVIEW DATE: NOVEMBER 2021
Acorn Childcare Centre Empingham Road Stamford PE9 2SR
Dealing With Complaints – Initial Concerns
At Acorn Childcare Centre (the Centre) we take informal concerns seriously at the earliest stage so that we are able to resolve most issues very quickly and effectively. In most cases the Room Manager, Key Worker or Out of School Club Manager will receive the first approach about a concern. It is helpful if staff are able to resolve issues on the spot, including apologising where necessary. We recognise however that sometimes this is not possible and formal complaints should always follow this Complaints Policy. Most concerns are handled without the need for formal procedures. The requirement to have a Complaints Policy does not in any way undermine efforts to resolve the concern informally.
The Difference Between A Concern And A Complaint
A 'concern' may be defined as 'an expression of worry or doubt over an issue considered to be important for which reassurances are sought'. A complaint may be generally defined as 'an expression of dissatisfaction however made, about actions taken or a lack of action'. At Acorn Childcare Centre, we take informal concerns seriously and make every effort to resolve the matter as quickly as possible. It is in everyone's interest that complaints are resolved at the earliest possible stage. Many issues can be resolved informally, without the need to invoke formal procedures.
There are occasions when complainants would like to raise their concerns formally. In those cases, the Centre's formal policy should be invoked through the stages outlined within our procedure Annex A.
Who Can Make A Complaint?
Any person, including members of the general public, may make a complaint about any provision of facilities or services which the Centre provides. We do not limit complaints to parents or carers of children who are registered at the Centre.
Complaints Regarding Children With Special Educational Needs And/Or Disabilities
A parent or carer who has a child at the Centre with special educational needs (SEN), and who wishes to make a complaint, should approach the Complaints Coordinator in the first instance, stating that they have a child with SEN. The Complaints Coordinator will then always and automatically ensure that the Special Educational Needs Coordinator (SENDCo) is involved in resolving the complaint. If the complaint remains unresolved or if the complaint is about the SENDCo, it will follow the normal procedure as detailed below.
Timeliness
The Centre will aim to consider complaints and resolve complaints as quickly, and efficiently as possible. Each action within each stage will be completed as soon as possible and within at least fourteen days. When further investigations are necessary, we will set new time limits. In those instances, we will send the complainant details of the new deadline and give an explanation for the delay.
Stages
The Centre expects complaints to be made as soon as possible after an incident arises to allow for effective management of a complaint. We consider three months to be an acceptable time frame in which to lodge a complaint, although we will consider any complaints lodged beyond this period.
Recording Complaints
The Centre asks for complaints to be made by using a complaint form or in writing. If the complainant has communication preferences due to disability or learning difficulties, then we allow alternative methods of contact.
* A complaint may be made in person, by telephone, or in writing.
* In order to prevent any later challenge or disagreement over what was said, brief notes of meetings and telephone calls will be kept and a copy of any written response added to the record. Where there are communication difficulties, we may wish to use recording devices to ensure the complainant is able to access and review the discussions at a later point.
* We will record the progress of the complaint and the final outcome. The Complaints Coordinator is responsible for these records and holds them centrally.
* The Centre is aware that complainants have a right to copies of these records under the Freedom of Information and Data Protection Acts.
* Our standard complaint form is included in Annex B.
Directors' Review
Complaints will not be shared with all the Directors, except in very general terms, in case an appeal panel needs to be organised. If all the Directors are aware of the substance of a complaint before the final stage has been completed, the Centre will arrange for an independent panel to hear the complaint. The Centre is most likely to approach the Governing Body of Malcolm Sargent Primary School to help in this regard.
Complainants have the right to request an independent panel, if they believe there is likely to be bias in the proceedings. The Centre will consider the request but ultimately, the decision is made by the Directors.
The process of listening to and resolving complaints can contribute to improvement. When individual complaints are heard, the Centre may also identify underlying issues which need to be addressed. The Centre recognises that monitoring and a review of complaints can be a useful tool in evaluating its performance. The Directors will review complaints and their handling at regular intervals to inform improvements and the effectiveness of the complaints procedure.
Complaints not in scope of the policy
Our Complaints Policy covers all complaints about any provision of facilities or services which the Centre provides, with the exceptions listed below for which there are separate (statutory) procedures:
Annex A - Complaints Procedure
Dealing With Complaints – Formal Procedures
The formal procedures will need to be invoked when initial attempts to resolve the issue are unsuccessful and the person raising the concern remains dissatisfied and wishes to take the matter further. At the Centre, we nominate a member of staff to have responsibility for the operation and management of the Centre's complaints procedure. The Centre's Complaints Co-ordinator is the Deputy Manager.
Stage 1 (Informal): Complaint Heard By Staff Member
It is in everyone's interest that complaints are resolved at the earliest possible stage. The Centre understands that the experience of the first contact between the complainant and the Centre is crucial in determining whether the complaint will escalate. To that end, staff are made aware of the procedures, so that they will know what to do when they receive a complaint.
We respect the views of a complainant who indicates that he/she would have difficulty discussing a complaint with a particular member of staff. In these cases, the Complaints Coordinator can refer the complainant to another staff member. Where the complaint concerns the Manager, the Complaints Coordinator will refer the complainant to the Safeguarding Director.
Similarly, if the member of staff directly involved feels too compromised to deal with a complaint, the Complaints Coordinator may consider referring the complainant to another staff member. The member of staff may be more senior but does not have to be. The ability to consider the complaint objectively and impartially is crucial.
Where the first approach is made to a Director, the next step is to refer the complainant to the appropriate person and advise them about the procedure.
It is useful if Directors do not act unilaterally on an individual complaint outside the formal procedure or be involved at the early stages in case they are needed to sit on a panel at a later stage of the procedure.
Stage 2 (Formal): Complaint Heard By the Centre Manager
The Centre Manager's influence will already have shaped the way complaints are handled at the Centre. At this point, the complainant may be dissatisfied with the way the complaint was handled at Stage 1 as well as pursuing their initial complaint. The Manager may delegate the task of collating the information to another staff member but not the decision on the action to be taken.
Stage 3 (Formal): Complaint Heard By the Safeguarding Director
If the complainant is not satisfied with the response of the Manager or the complaint is about the Manager, the complainant should write to the Centre's Safeguarding Director to request that their complaint is considered further.
Stage 4 (Formal): Complaint Heard By A Directors' Appeal Panel
The complainant usually needs to write to the Directors giving details of the complaint and asking that it is put before the Appeal Panel. The Chair (or if the Chair has been involved at any previous stage in the process, a nominated member of the Directors) will convene a Directors' Appeal Panel. The Appeal Panel hearing is the last Centre-based stage of the complaints process and is not convened merely to rubber-stamp previous decisions.
Individual complaints would not be heard by all the Directors at any stage, as this could compromise the impartiality of any panel set up for a disciplinary hearing against a member of staff following a serious complaint.
The Directors may nominate a number of members with delegated powers to hear complaints at that stage, and set out its terms of reference. These can include:
- drawing up its procedures;
- hearing individual appeals;
- making recommendations on policy as a result of complaints.
The procedure adopted by the Directors' Appeal Panel would normally be part of the Centre S complaints procedure. The panel can be drawn from the nominated members and may consist of three or more people. The panel may choose their own Chair.
The Remit Of The Directors' Appeal Panel
The Appeal Panel can:
- dismiss the complaint in whole or in part;
- uphold the complaint in whole or in part;
- decide on the appropriate action to be taken to resolve the complaint;
- recommend changes to the school's systems or procedures to ensure that problems of a similar nature do not recur.
There are several points which any member of the Directors sitting on an Appeal Panel needs to remember:
- It is important that the hearing is independent and impartial and that it is seen to be so.
- No Director may sit on the panel if he/she has had a prior involvement in the complaint or in the circumstances surrounding it. In deciding the make-up of the panel, the Directors need to try and ensure that it is a cross-section of the categories of Directors and sensitive to the issues of race, gender and religious affiliation.
- The aim of the hearing, which needs to be held in private, will always be to resolve the complaint and achieve reconciliation between the Centre and the complainant. However, it has to be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously.
- An effective panel will acknowledge that many complainants feel nervous and inhibited in a formal setting. Parents often feel emotional when discussing an issue which affects their child. The Appeal Panel Chair will ensure that the proceedings are as welcoming as possible. The layout of the room will set the tone and care is needed to ensure the setting is informal and not adversarial.
- Extra care needs to be taken when the complainant is a child. Careful consideration of the atmosphere and proceedings will ensure that the child does not feel intimidated. The Appeal Panel needs to be aware of the views of the child and give them equal consideration to those of adults. Where the child's parent is the complainant, it would be helpful to give the parent the opportunity to say which parts of the hearing, if any, the child needs to attend.
- The Directors' Appeal Panel members need to be aware of the complaints procedure.
Annex B –Complaint Form
Please complete and return to the Centre's Complaints Coordinator who will acknowledge receipt and explain what action will be taken.
Your name:
Child's name (if relevant):
Your relationship to the child (if relevant):
Address:
Postcode:
Day time telephone number:
Evening telephone number:
Please give details of your complaint.
What action, if any, have you already taken to try and resolve your complaint. (Who did you speak to and what was the response)?
What actions do you feel might resolve the problem at this stage?
Are you attaching any paperwork? If so, please give details.
Signature:
Date:
Official use
Date acknowledgement sent:
By who:
Complaint referred to:
Date:
Annex C: Roles and Responsibilities
The Complainant
The complainant or person who makes the complaint will receive a more effective response to the complaint if he/she:
- co-operates with the Centre in seeking a solution to the complaint;
- expresses the complaint in full as early as possible;
- responds promptly to requests for information or meetings or in agreeing the details of the complaint;
- asks for assistance as needed;
- treats all those involved in the complaint with respect.
The Complaints Coordinator
The Complaints Coordinator will:
- ensure that the complainant is fully updated at each stage of the procedure;
- ensure that all people involved in the complaint procedure will be aware of the legislation around complaints including the Equality Act 2010, Data Protection Act 1998 and Freedom of Information Act 2000;
- liaise with staff members, Managers and Directors to ensure the smooth running of the complaints procedure;
-
keep records;
- be aware of issues regarding:
- sharing third party information;
- additional support - this may be needed by complainants when making a complaint including interpretation support.
The Investigator
The Investigator is the person involved in Stages 1 and 2 of the procedure. The Investigator's role includes providing a comprehensive, open, transparent and fair consideration of the complaint through:
- sensitive and thorough interviewing of the complainant to establish what has happened and who has been involved;
- consideration of records and other relevant information;
- interviewing staff and children/young people and other people relevant to the complaint;
-
analysing information;
- effectively liaising with the complainant and the Complaints Coordinator as appropriate to clarify what the complainant feels would put things right;
- identifying solutions and recommending courses of action to resolve problems;
- being mindful of the timescales to respond; and
- responding to the complainant in plain and clear language.
The Investigator will also make sure that they:
- conduct interviews with an open mind and be prepared to persist in the questioning;
- keep notes of interviews or arrange for an independent note taker to record minutes of the meeting.
The Panel Clerk (This Could Be The Complaints Coordinator)
The Clerk is the contact point for the complainant for the panel meeting and will:
- set the date, time and venue of the hearing, ensuring that the dates are convenient to all parties and that the venue and proceedings are accessible;
- collate any written material and send it to the parties in advance of the hearing;
- meet and welcome the parties as they arrive at the hearing;
- record the proceedings;
- circulate the minutes of the panel hearing;
- notify all parties of the panel's decision;
- liaise with the Complaints Coordinator.
The Appeal Panel Chair
The Appeal Panel Chair has a key role in ensuring that:
- the meeting is minuted;
- the remit of the panel is explained to the complainant and both they and the school have the opportunity of putting their case without undue interruption;
- the issues are addressed;
- key findings of fact are made;
- parents/carers and others who may not be used to speaking at such a hearing are put at ease which is particularly important if the complainant is a child/young person;
- the hearing is conducted in an informal manner with everyone treated with respect and courtesy;
- the layout of the room will set the tone; care is needed to ensure the setting is informal and not adversarial;
- the panel is open-minded and acts independently;
- no member of the panel has an external interest in the outcome of the proceedings or any involvement in an earlier stage of the procedure;
- both the complainant and the Centre are given the opportunity to state their case and seek clarity;
- written material is seen by everyone in attendance; if a new issue arises it would be useful to give everyone the opportunity to consider and comment upon it; this may require a short adjournment of the hearing;
- liaise with the Clerk and Complaints Coordinator.
Panel Members
Panel members will need to be aware that:
- it is important that the review panel hearing is independent and impartial, and that it is seen to be so;
- None of the Directors may sit on the panel if they have had a prior involvement in the complaint or in the circumstances surrounding it.
- the aim of the hearing, which will be held in private, will always be to resolve the complaint and achieve reconciliation between the school and the complainant. However, it must be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously;
- many complainants will feel nervous and inhibited in a formal setting;
- Parents/carers often feel emotional when discussing an issue which affects their child; the panel chair will ensure that the proceedings are as welcoming as possible.
- extra care needs to be taken when the complainant is a child/young person and present during all or part of the hearing;
- Careful consideration of the atmosphere and proceedings will ensure that the child/young person does not feel intimidated; the panel should respect the views of the child/young person and give them equal consideration to those of adults.
- If the child/young person is the complainant, the panel should ask in
|
advance if any support is needed to help them present their complaint.
|
Where the child/young person's parent is the complainant, the panel should give the parent the opportunity to say which parts of the hearing, if any, the child/young person needs to attend.
- The parent should be advised however that agreement might not always be possible if the parent wishes the child/young person to attend a part of the meeting which the panel considers not to be in the child/young person's best interests.
- The welfare of the child/young person is paramount.
Annex D- Interviewing Best Practice Tips
Children/Young People
- Children/young people should be interviewed in the presence of another member of staff, or in the case of serious complaints (e.g. where the possibility of criminal investigation exists) in the presence of their parents/carers. However, it might not always be possible to conduct an interview in case it prejudices a LADO or police investigation.
- Care should be taken in these circumstances not to create an intimidating atmosphere.
- Children/young people should be told what the interview is about and that they can have someone with them.
Staff/Witnesses
- Explain the complaint and your role clearly to the interviewee and confirm that they understand the complaints procedure and their role in it.
- Staff are allowed a colleague to support them at their interview. The colleague must not be anyone likely to be interviewed themselves, including their line manager.
- Use open, not leading questions.
- Do not express opinions in words or attitude.
- Ask single not multiple questions, i.e. one question at a time.
- Try to separate 'hearsay' evidence from fact by asking interviewees how they know a particular fact.
- Persist with questions if necessary. Do not be afraid to ask the same question twice. Make notes of each answer given.
- Deal with conflicting evidence by seeking corroborative evidence. If this is not available, discuss with the Complaints Coordinator/Principal/Directors the option of a meeting between the conflicting witnesses.
- Make a formal record of the interview from the written notes as soon as possible while the memory is fresh.
- Show the interviewee the formal record, ask if s/he has anything to add, and to sign the record as accurate.
Annexe E - Policy for Unreasonable Complainants
The Centre is committed to dealing with all complaints fairly and impartially, and to providing a high quality service to those who complain. We will not normally limit the contact complainants have with the Centre. However, we do not expect our staff to tolerate unacceptable behaviour and will take action to protect staff from that behaviour, including that which is abusive, offensive or threatening.
The Centre defines unreasonable complainants as 'those who, because of the frequency or nature of their contacts with the school, hinder our consideration of their or other people's complaints'.
A complaint may be regarded as unreasonable when the person making the complaint:
- refuses to articulate their complaint or specify the grounds of a complaint or the outcomes sought by raising the complaint, despite offers of assistance;
- refuses to co-operate with the complaints investigation process while still wishing their complaint to be resolved;
- refuses to accept that certain issues are not within the scope of a complaints procedure;
- insists on the complaint being dealt with in ways which are incompatible with the adopted complaints procedure or with good practice;
- introduces trivial or irrelevant information which the complainant expects to be taken into account and commented on, or raises large numbers of detailed but unimportant questions, and insists they are fully answered, often immediately and to their own timescales;
- makes unjustified complaints about staff who are trying to deal with the issues, and seeks to have them replaced;
- changes the basis of the complaint as the investigation proceeds;
- repeatedly makes the same complaint (despite previous investigations or responses concluding that the complaint is groundless or has been addressed);
- refuses to accept the findings of the investigation into that complaint where the Centre's complaint procedure has been fully and properly implemented and completed including referral to the Department for Education;
- seeks an unrealistic outcome;
- makes excessive demands on school time by frequent, lengthy, complicated and stressful contact with staff regarding the complaint in person, in writing, by email and by telephone while the complaint is being dealt with.
A complaint may also be considered unreasonable if the person making the complaint does so either face-to-face, by telephone or in writing or electronically:
- maliciously;
- aggressively;
- using threats, intimidation or violence;
- using abusive, offensive or discriminatory language;
- knowing it to be false;
- using falsified information;
- publishing unacceptable information in a variety of media such as in social media websites and newspapers.
Complainants should limit the numbers of communications with a school while a complaint is being progressed. It is not helpful if repeated correspondence is sent (either by letter, phone, email or text) as it could delay the outcome being reached.
Whenever possible, the Manager will discuss any concerns with the complainant informally before applying an 'unreasonable' marking.
If the behaviour continues, the Manager will write to the complainant explaining that their behaviour is unreasonable and asking them to change it. For complainants who excessively contact the Centre causing a significant level of disruption, we may specify methods of communication and limit the number of contacts in a communication plan. This will be reviewed after six months.
In response to any serious incident of aggression or violence, the concerns and actions taken will be put in writing immediately and the police informed. This may include barring an individual from the Centre.
Barring from the Centre's Premises
Although fulfilling a public function, the Centre is a private place. The public has no automatic right of entry. The Centre will therefore act to ensure it remains a safe place for children, staff and other members of their community.
If a parent's behaviour is a cause for concern, the Centre can ask him/her to leave its premises. In serious cases, the Manager can notify them in writing that their implied licence to be on its premises has been temporarily revoked subject to any representations that the parent may wish to make. The Centre should always give the parent the opportunity to formally express their views on the decision to bar in writing.
The decision to bar should then be reviewed, taking into account any representations made by the parent, and either confirmed or lifted. If the decision is confirmed the parent should be notified in writing, explaining how long the bar will be in place.
Anyone wishing to complain about being barred can do so, by letter or email, to the Centre Manager. Once the Centre's own complaints procedure has been completed, the only remaining avenue of appeal is through the Courts; independent legal advice must therefore be sought.
| 18,266
|
end_of_word
|
in
|
remove_one_sentence
|
<url>
https://www.acornchildcarecentre.co.uk/attachments/download.asp?file=113&type=pdf
</url>
<text>
COMPLAINTS POLICY
ADOPTED DATE: NOVEMBER 2018
REVIEW DATE: NOVEMBER 2021
Acorn Childcare Centre Empingham Road Stamford PE9 2SR
Dealing With Complaints – Initial Concerns
At Acorn Childcare Centre (the Centre) we take informal concerns seriously at the earliest stage so that we are able to resolve most issues very quickly and effectively. In most cases the Room Manager, Key Worker or Out of School Club Manager will receive the first approach about a concern. It is helpful if staff are able to resolve issues on the spot, including apologising where necessary. We recognise however that sometimes this is not possible and formal complaints should always follow this Complaints Policy. Most concerns are handled without the need for formal procedures. The requirement to have a Complaints Policy does not in any way undermine efforts to resolve the concern informally.
The Difference Between A Concern And A Complaint
A 'concern' may be defined as 'an expression of worry or doubt over an issue considered to be important for which reassurances are sought'. A complaint may be generally defined as 'an expression of dissatisfaction however made, about actions taken or a lack of action'. At Acorn Childcare Centre, we take informal concerns seriously and make every effort to resolve the matter as quickly as possible. It is in everyone's interest that complaints are resolved at the earliest possible stage. Many issues can be resolved informally, without the need to invoke formal procedures.
There are occasions when complainants would like to raise their concerns formally. In those cases, the Centre's formal policy should be invoked through the stages outlined within our procedure Annex A.
Who Can Make A Complaint?
Any person, including members of the general public, may make a complaint about any provision of facilities or services which the Centre provides. We do not limit complaints to parents or carers of children who are registered at the Centre.
Complaints Regarding Children With Special Educational Needs And/Or Disabilities
A parent or carer who has a child at the Centre with special educational needs (SEN), and who wishes to make a complaint, should approach the Complaints Coordinator in the first instance, stating that they have a child with SEN. The Complaints Coordinator will then always and automatically ensure that the Special Educational Needs Coordinator (SENDCo) is involved in resolving the complaint. If the complaint remains unresolved or if the complaint is about the SENDCo, it will follow the normal procedure as detailed below.
Timeliness
The Centre will aim to consider complaints and resolve complaints as quickly, and efficiently as possible. Each action within each stage will be completed as soon as possible and within at least fourteen days. When further investigations are necessary, we will set new time limits. In those instances, we will send the complainant details of the new deadline and give an explanation for the delay.
Stages
The Centre expects complaints to be made as soon as possible after an incident arises to allow for effective management of a complaint. We consider three months to be an acceptable time frame in which to lodge a complaint, although we will consider any complaints lodged beyond this period.
Recording Complaints
The Centre asks for complaints to be made by using a complaint form or in writing. If the complainant has communication preferences due to disability or learning difficulties, then we allow alternative methods of contact.
* A complaint may be made in person, by telephone, or in writing.
* In order to prevent any later challenge or disagreement over what was said, brief notes of meetings and telephone calls will be kept and a copy of any written response added to the record. Where there are communication difficulties, we may wish to use recording devices to ensure the complainant is able to access and review the discussions at a later point.
* We will record the progress of the complaint and the final outcome. The Complaints Coordinator is responsible for these records and holds them centrally.
* The Centre is aware that complainants have a right to copies of these records under the Freedom of Information and Data Protection Acts.
* Our standard complaint form is included in Annex B.
Directors' Review
Complaints will not be shared with all the Directors, except in very general terms, in case an appeal panel needs to be organised. If all the Directors are aware of the substance of a complaint before the final stage has been completed, the Centre will arrange for an independent panel to hear the complaint. The Centre is most likely to approach the Governing Body of Malcolm Sargent Primary School to help in this regard.
Complainants have the right to request an independent panel, if they believe there is likely to be bias in the proceedings. The Centre will consider the request but ultimately, the decision is made by the Directors.
The process of listening to and resolving complaints can contribute to improvement. When individual complaints are heard, the Centre may also identify underlying issues which need to be addressed. The Centre recognises that monitoring and a review of complaints can be a useful tool in evaluating its performance. The Directors will review complaints and their handling at regular intervals to inform improvements and the effectiveness of the complaints procedure.
Complaints not in scope of the policy
Our Complaints Policy covers all complaints about any provision of facilities or services which the Centre provides, with the exceptions listed below for which there are separate (statutory) procedures:
Annex A - Complaints Procedure
Dealing With Complaints – Formal Procedures
The formal procedures will need to be invoked when initial attempts to resolve the issue are unsuccessful and the person raising the concern remains dissatisfied and wishes to take the matter further. At the Centre, we nominate a member of staff to have responsibility for the operation and management of the Centre's complaints procedure. The Centre's Complaints Co-ordinator is the Deputy Manager.
Stage 1 (Informal): Complaint Heard By Staff Member
It is in everyone's interest that complaints are resolved at the earliest possible stage. The Centre understands that the experience of the first contact between the complainant and the Centre is crucial in determining whether the complaint will escalate. To that end, staff are made aware of the procedures, so that they will know what to do when they receive a complaint.
We respect the views of a complainant who indicates that he/she would have difficulty discussing a complaint with a particular member of staff. In these cases, the Complaints Coordinator can refer the complainant to another staff member. Where the complaint concerns the Manager, the Complaints Coordinator will refer the complainant to the Safeguarding Director.
Similarly, if the member of staff directly involved feels too compromised to deal with a complaint, the Complaints Coordinator may consider referring the complainant to another staff member. The member of staff may be more senior but does not have to be. The ability to consider the complaint objectively and impartially is crucial.
Where the first approach is made to a Director, the next step is to refer the complainant to the appropriate person and advise them about the procedure.
It is useful if Directors do not act unilaterally on an individual complaint outside the formal procedure or be involved at the early stages in case they are needed to sit on a panel at a later stage of the procedure.
Stage 2 (Formal): Complaint Heard By the Centre Manager
The Centre Manager's influence will already have shaped the way complaints are handled at the Centre. At this point, the complainant may be dissatisfied with the way the complaint was handled at Stage 1 as well as pursuing their initial complaint. The Manager may delegate the task of collating the information to another staff member but not the decision on the action to be taken.
Stage 3 (Formal): Complaint Heard By the Safeguarding Director
If the complainant is not satisfied with the response of the Manager or the complaint is about the Manager, the complainant should write to the Centre's Safeguarding Director to request that their complaint is considered further.
Stage 4 (Formal): Complaint Heard By A Directors' Appeal Panel
The complainant usually needs to write to the Directors giving details of the complaint and asking that it is put before the Appeal Panel. The Chair (or if the Chair has been involved at any previous stage in the process, a nominated member of the Directors) will convene a Directors' Appeal Panel. The Appeal Panel hearing is the last Centre-based stage of the complaints process and is not convened merely to rubber-stamp previous decisions.
Individual complaints would not be heard by all the Directors at any stage, as this could compromise the impartiality of any panel set up for a disciplinary hearing against a member of staff following a serious complaint.
The Directors may nominate a number of members with delegated powers to hear complaints at that stage, and set out its terms of reference. These can include:
- drawing up its procedures;
- hearing individual appeals;
- making recommendations on policy as a result of complaints.
The procedure adopted by the Directors' Appeal Panel would normally be part of the Centre S complaints procedure. The panel can be drawn from the nominated members and may consist of three or more people. The panel may choose their own Chair.
The Remit Of The Directors' Appeal Panel
The Appeal Panel can:
- dismiss the complaint in whole or in part;
- uphold the complaint in whole or in part;
- decide on the appropriate action to be taken to resolve the complaint;
- recommend changes to the school's systems or procedures to ensure that problems of a similar nature do not recur.
There are several points which any member of the Directors sitting on an Appeal Panel needs to remember:
- It is important that the hearing is independent and impartial and that it is seen to be so.
- No Director may sit on the panel if he/she has had a prior involvement in the complaint or in the circumstances surrounding it. In deciding the make-up of the panel, the Directors need to try and ensure that it is a cross-section of the categories of Directors and sensitive to the issues of race, gender and religious affiliation.
- The aim of the hearing, which needs to be held in private, will always be to resolve the complaint and achieve reconciliation between the Centre and the complainant. However, it has to be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously.
- An effective panel will acknowledge that many complainants feel nervous and inhibited in a formal setting. Parents often feel emotional when discussing an issue which affects their child. The Appeal Panel Chair will ensure that the proceedings are as welcoming as possible. The layout of the room will set the tone and care is needed to ensure the setting is informal and not adversarial.
- Extra care needs to be taken when the complainant is a child. Careful consideration of the atmosphere and proceedings will ensure that the child does not feel intimidated. The Appeal Panel needs to be aware of the views of the child and give them equal consideration to those of adults. Where the child's parent is the complainant, it would be helpful to give the parent the opportunity to say which parts of the hearing, if any, the child needs to attend.
- The Directors' Appeal Panel members need to be aware of the complaints procedure.
Annex B –Complaint Form
Please complete and return to the Centre's Complaints Coordinator who will acknowledge receipt and explain what action will be taken.
Your name:
Child's name (if relevant):
Your relationship to the child (if relevant):
Address:
Postcode:
Day time telephone number:
Evening telephone number:
Please give details of your complaint.
What action, if any, have you already taken to try and resolve your complaint. (Who did you speak to and what was the response)?
What actions do you feel might resolve the problem at this stage?
Are you attaching any paperwork? If so, please give details.
Signature:
Date:
Official use
Date acknowledgement sent:
By who:
Complaint referred to:
Date:
Annex C: Roles and Responsibilities
The Complainant
The complainant or person who makes the complaint will receive a more effective response to the complaint if he/she:
- co-operates with the Centre in seeking a solution to the complaint;
- expresses the complaint in full as early as possible;
- responds promptly to requests for information or meetings or in agreeing the details of the complaint;
- asks for assistance as needed;
- treats all those involved in the complaint with respect.
The Complaints Coordinator
The Complaints Coordinator will:
- ensure that the complainant is fully updated at each stage of the procedure;
- ensure that all people involved in the complaint procedure will be aware of the legislation around complaints including the Equality Act 2010, Data Protection Act 1998 and Freedom of Information Act 2000;
- liaise with staff members, Managers and Directors to ensure the smooth running of the complaints procedure;
-
keep records;
- be aware of issues regarding:
- sharing third party information;
- additional support - this may be needed by complainants when making a complaint including interpretation support.
The Investigator
The Investigator is the person involved in Stages 1 and 2 of the procedure. The Investigator's role includes providing a comprehensive, open, transparent and fair consideration of the complaint through:
- sensitive and thorough interviewing of the complainant to establish what has happened and who has been involved;
- consideration of records and other relevant information;
- interviewing staff and children/young people and other people relevant to the complaint;
-
analysing information;
- effectively liaising with the complainant and the Complaints Coordinator as appropriate to clarify what the complainant feels would put things right;
- identifying solutions and recommending courses of action to resolve problems;
- being mindful of the timescales to respond; and
- responding to the complainant in plain and clear language.
The Investigator will also make sure that they:
- conduct interviews with an open mind and be prepared to persist in the questioning;
- keep notes of interviews or arrange for an independent note taker to record minutes of the meeting.
The Panel Clerk (This Could Be The Complaints Coordinator)
The Clerk is the contact point for the complainant for the panel meeting and will:
- set the date, time and venue of the hearing, ensuring that the dates are convenient to all parties and that the venue and proceedings are accessible;
- collate any written material and send it to the parties in advance of the hearing;
- meet and welcome the parties as they arrive at the hearing;
- record the proceedings;
- circulate the minutes of the panel hearing;
- notify all parties of the panel's decision;
- liaise with the Complaints Coordinator.
The Appeal Panel Chair
The Appeal Panel Chair has a key role in ensuring that:
- the meeting is minuted;
- the remit of the panel is explained to the complainant and both they and the school have the opportunity of putting their case without undue interruption;
- the issues are addressed;
- key findings of fact are made;
- parents/carers and others who may not be used to speaking at such a hearing are put at ease which is particularly important if the complainant is a child/young person;
- the hearing is conducted in an informal manner with everyone treated with respect and courtesy;
- the layout of the room will set the tone; care is needed to ensure the setting is informal and not adversarial;
- the panel is open-minded and acts independently;
- no member of the panel has an external interest in the outcome of the proceedings or any involvement in an earlier stage of the procedure;
- both the complainant and the Centre are given the opportunity to state their case and seek clarity;
- written material is seen by everyone in attendance; if a new issue arises it would be useful to give everyone the opportunity to consider and comment upon it; this may require a short adjournment of the hearing;
- liaise with the Clerk and Complaints Coordinator.
Panel Members
Panel members will need to be aware that:
- it is important that the review panel hearing is independent and impartial, and that it is seen to be so;
- None of the Directors may sit on the panel if they have had a prior involvement in the complaint or in the circumstances surrounding it.
- the aim of the hearing, which will be held in private, will always be to resolve the complaint and achieve reconciliation between the school and the complainant. However, it must be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously;
- many complainants will feel nervous and inhibited in a formal setting;
- Parents/carers often feel emotional when discussing an issue which affects their child; the panel chair will ensure that the proceedings are as welcoming as possible.
- extra care needs to be taken when the complainant is a child/young person and present during all or part of the hearing;
- Careful consideration of the atmosphere and proceedings will ensure that the child/young person does not feel intimidated; the panel should respect the views of the child/young person and give them equal consideration to those of adults.
- If the child/young person is the complainant, the panel should ask in<cursor_is_here> Where the child/young person's parent is the complainant, the panel should give the parent the opportunity to say which parts of the hearing, if any, the child/young person needs to attend.
- The parent should be advised however that agreement might not always be possible if the parent wishes the child/young person to attend a part of the meeting which the panel considers not to be in the child/young person's best interests.
- The welfare of the child/young person is paramount.
Annex D- Interviewing Best Practice Tips
Children/Young People
- Children/young people should be interviewed in the presence of another member of staff, or in the case of serious complaints (e.g. where the possibility of criminal investigation exists) in the presence of their parents/carers. However, it might not always be possible to conduct an interview in case it prejudices a LADO or police investigation.
- Care should be taken in these circumstances not to create an intimidating atmosphere.
- Children/young people should be told what the interview is about and that they can have someone with them.
Staff/Witnesses
- Explain the complaint and your role clearly to the interviewee and confirm that they understand the complaints procedure and their role in it.
- Staff are allowed a colleague to support them at their interview. The colleague must not be anyone likely to be interviewed themselves, including their line manager.
- Use open, not leading questions.
- Do not express opinions in words or attitude.
- Ask single not multiple questions, i.e. one question at a time.
- Try to separate 'hearsay' evidence from fact by asking interviewees how they know a particular fact.
- Persist with questions if necessary. Do not be afraid to ask the same question twice. Make notes of each answer given.
- Deal with conflicting evidence by seeking corroborative evidence. If this is not available, discuss with the Complaints Coordinator/Principal/Directors the option of a meeting between the conflicting witnesses.
- Make a formal record of the interview from the written notes as soon as possible while the memory is fresh.
- Show the interviewee the formal record, ask if s/he has anything to add, and to sign the record as accurate.
Annexe E - Policy for Unreasonable Complainants
The Centre is committed to dealing with all complaints fairly and impartially, and to providing a high quality service to those who complain. We will not normally limit the contact complainants have with the Centre. However, we do not expect our staff to tolerate unacceptable behaviour and will take action to protect staff from that behaviour, including that which is abusive, offensive or threatening.
The Centre defines unreasonable complainants as 'those who, because of the frequency or nature of their contacts with the school, hinder our consideration of their or other people's complaints'.
A complaint may be regarded as unreasonable when the person making the complaint:
- refuses to articulate their complaint or specify the grounds of a complaint or the outcomes sought by raising the complaint, despite offers of assistance;
- refuses to co-operate with the complaints investigation process while still wishing their complaint to be resolved;
- refuses to accept that certain issues are not within the scope of a complaints procedure;
- insists on the complaint being dealt with in ways which are incompatible with the adopted complaints procedure or with good practice;
- introduces trivial or irrelevant information which the complainant expects to be taken into account and commented on, or raises large numbers of detailed but unimportant questions, and insists they are fully answered, often immediately and to their own timescales;
- makes unjustified complaints about staff who are trying to deal with the issues, and seeks to have them replaced;
- changes the basis of the complaint as the investigation proceeds;
- repeatedly makes the same complaint (despite previous investigations or responses concluding that the complaint is groundless or has been addressed);
- refuses to accept the findings of the investigation into that complaint where the Centre's complaint procedure has been fully and properly implemented and completed including referral to the Department for Education;
- seeks an unrealistic outcome;
- makes excessive demands on school time by frequent, lengthy, complicated and stressful contact with staff regarding the complaint in person, in writing, by email and by telephone while the complaint is being dealt with.
A complaint may also be considered unreasonable if the person making the complaint does so either face-to-face, by telephone or in writing or electronically:
- maliciously;
- aggressively;
- using threats, intimidation or violence;
- using abusive, offensive or discriminatory language;
- knowing it to be false;
- using falsified information;
- publishing unacceptable information in a variety of media such as in social media websites and newspapers.
Complainants should limit the numbers of communications with a school while a complaint is being progressed. It is not helpful if repeated correspondence is sent (either by letter, phone, email or text) as it could delay the outcome being reached.
Whenever possible, the Manager will discuss any concerns with the complainant informally before applying an 'unreasonable' marking.
If the behaviour continues, the Manager will write to the complainant explaining that their behaviour is unreasonable and asking them to change it. For complainants who excessively contact the Centre causing a significant level of disruption, we may specify methods of communication and limit the number of contacts in a communication plan. This will be reviewed after six months.
In response to any serious incident of aggression or violence, the concerns and actions taken will be put in writing immediately and the police informed. This may include barring an individual from the Centre.
Barring from the Centre's Premises
Although fulfilling a public function, the Centre is a private place. The public has no automatic right of entry. The Centre will therefore act to ensure it remains a safe place for children, staff and other members of their community.
If a parent's behaviour is a cause for concern, the Centre can ask him/her to leave its premises. In serious cases, the Manager can notify them in writing that their implied licence to be on its premises has been temporarily revoked subject to any representations that the parent may wish to make. The Centre should always give the parent the opportunity to formally express their views on the decision to bar in writing.
The decision to bar should then be reviewed, taking into account any representations made by the parent, and either confirmed or lifted. If the decision is confirmed the parent should be notified in writing, explaining how long the bar will be in place.
Anyone wishing to complain about being barred can do so, by letter or email, to the Centre Manager. Once the Centre's own complaints procedure has been completed, the only remaining avenue of appeal is through the Courts; independent legal advice must therefore be sought.
</text>
|
[
{
"content": "<url>\nhttps://www.acornchildcarecentre.co.uk/attachments/download.asp?file=113&type=pdf\n</url>\n<text>\nCOMPLAINTS POLICY\n\nADOPTED DATE: NOVEMBER 2018\n\nREVIEW DATE: NOVEMBER 2021\n\nAcorn Childcare Centre Empingham Road Stamford PE9 2SR\n\nDealing With Complaints – Initial Concerns\n\nAt Acorn Childcare Centre (the Centre) we take informal concerns seriously at the earliest stage so that we are able to resolve most issues very quickly and effectively. In most cases the Room Manager, Key Worker or Out of School Club Manager will receive the first approach about a concern. It is helpful if staff are able to resolve issues on the spot, including apologising where necessary. We recognise however that sometimes this is not possible and formal complaints should always follow this Complaints Policy. Most concerns are handled without the need for formal procedures. The requirement to have a Complaints Policy does not in any way undermine efforts to resolve the concern informally.\n\nThe Difference Between A Concern And A Complaint\n\nA 'concern' may be defined as 'an expression of worry or doubt over an issue considered to be important for which reassurances are sought'. A complaint may be generally defined as 'an expression of dissatisfaction however made, about actions taken or a lack of action'. At Acorn Childcare Centre, we take informal concerns seriously and make every effort to resolve the matter as quickly as possible. It is in everyone's interest that complaints are resolved at the earliest possible stage. Many issues can be resolved informally, without the need to invoke formal procedures.\n\nThere are occasions when complainants would like to raise their concerns formally. In those cases, the Centre's formal policy should be invoked through the stages outlined within our procedure Annex A.\n\nWho Can Make A Complaint?\n\nAny person, including members of the general public, may make a complaint about any provision of facilities or services which the Centre provides. We do not limit complaints to parents or carers of children who are registered at the Centre.\n\nComplaints Regarding Children With Special Educational Needs And/Or Disabilities\n\nA parent or carer who has a child at the Centre with special educational needs (SEN), and who wishes to make a complaint, should approach the Complaints Coordinator in the first instance, stating that they have a child with SEN. The Complaints Coordinator will then always and automatically ensure that the Special Educational Needs Coordinator (SENDCo) is involved in resolving the complaint. If the complaint remains unresolved or if the complaint is about the SENDCo, it will follow the normal procedure as detailed below.\n\nTimeliness\n\nThe Centre will aim to consider complaints and resolve complaints as quickly, and efficiently as possible. Each action within each stage will be completed as soon as possible and within at least fourteen days. When further investigations are necessary, we will set new time limits. In those instances, we will send the complainant details of the new deadline and give an explanation for the delay.\n\nStages\n\nThe Centre expects complaints to be made as soon as possible after an incident arises to allow for effective management of a complaint. We consider three months to be an acceptable time frame in which to lodge a complaint, although we will consider any complaints lodged beyond this period.\n\nRecording Complaints\n\nThe Centre asks for complaints to be made by using a complaint form or in writing. If the complainant has communication preferences due to disability or learning difficulties, then we allow alternative methods of contact.\n\n* A complaint may be made in person, by telephone, or in writing.\n* In order to prevent any later challenge or disagreement over what was said, brief notes of meetings and telephone calls will be kept and a copy of any written response added to the record. Where there are communication difficulties, we may wish to use recording devices to ensure the complainant is able to access and review the discussions at a later point.\n* We will record the progress of the complaint and the final outcome. The Complaints Coordinator is responsible for these records and holds them centrally.\n* The Centre is aware that complainants have a right to copies of these records under the Freedom of Information and Data Protection Acts.\n* Our standard complaint form is included in Annex B.\n\nDirectors' Review\n\nComplaints will not be shared with all the Directors, except in very general terms, in case an appeal panel needs to be organised. If all the Directors are aware of the substance of a complaint before the final stage has been completed, the Centre will arrange for an independent panel to hear the complaint. The Centre is most likely to approach the Governing Body of Malcolm Sargent Primary School to help in this regard.\n\nComplainants have the right to request an independent panel, if they believe there is likely to be bias in the proceedings. The Centre will consider the request but ultimately, the decision is made by the Directors.\n\nThe process of listening to and resolving complaints can contribute to improvement. When individual complaints are heard, the Centre may also identify underlying issues which need to be addressed. The Centre recognises that monitoring and a review of complaints can be a useful tool in evaluating its performance. The Directors will review complaints and their handling at regular intervals to inform improvements and the effectiveness of the complaints procedure.\n\nComplaints not in scope of the policy\n\nOur Complaints Policy covers all complaints about any provision of facilities or services which the Centre provides, with the exceptions listed below for which there are separate (statutory) procedures:\n\nAnnex A - Complaints Procedure\n\nDealing With Complaints – Formal Procedures\n\nThe formal procedures will need to be invoked when initial attempts to resolve the issue are unsuccessful and the person raising the concern remains dissatisfied and wishes to take the matter further. At the Centre, we nominate a member of staff to have responsibility for the operation and management of the Centre's complaints procedure. The Centre's Complaints Co-ordinator is the Deputy Manager.\n\nStage 1 (Informal): Complaint Heard By Staff Member\n\nIt is in everyone's interest that complaints are resolved at the earliest possible stage. The Centre understands that the experience of the first contact between the complainant and the Centre is crucial in determining whether the complaint will escalate. To that end, staff are made aware of the procedures, so that they will know what to do when they receive a complaint.\n\nWe respect the views of a complainant who indicates that he/she would have difficulty discussing a complaint with a particular member of staff. In these cases, the Complaints Coordinator can refer the complainant to another staff member. Where the complaint concerns the Manager, the Complaints Coordinator will refer the complainant to the Safeguarding Director.\n\nSimilarly, if the member of staff directly involved feels too compromised to deal with a complaint, the Complaints Coordinator may consider referring the complainant to another staff member. The member of staff may be more senior but does not have to be. The ability to consider the complaint objectively and impartially is crucial.\n\nWhere the first approach is made to a Director, the next step is to refer the complainant to the appropriate person and advise them about the procedure.\n\nIt is useful if Directors do not act unilaterally on an individual complaint outside the formal procedure or be involved at the early stages in case they are needed to sit on a panel at a later stage of the procedure.\n\nStage 2 (Formal): Complaint Heard By the Centre Manager\n\nThe Centre Manager's influence will already have shaped the way complaints are handled at the Centre. At this point, the complainant may be dissatisfied with the way the complaint was handled at Stage 1 as well as pursuing their initial complaint. The Manager may delegate the task of collating the information to another staff member but not the decision on the action to be taken.\n\nStage 3 (Formal): Complaint Heard By the Safeguarding Director\n\nIf the complainant is not satisfied with the response of the Manager or the complaint is about the Manager, the complainant should write to the Centre's Safeguarding Director to request that their complaint is considered further.\n\nStage 4 (Formal): Complaint Heard By A Directors' Appeal Panel\n\nThe complainant usually needs to write to the Directors giving details of the complaint and asking that it is put before the Appeal Panel. The Chair (or if the Chair has been involved at any previous stage in the process, a nominated member of the Directors) will convene a Directors' Appeal Panel. The Appeal Panel hearing is the last Centre-based stage of the complaints process and is not convened merely to rubber-stamp previous decisions.\n\nIndividual complaints would not be heard by all the Directors at any stage, as this could compromise the impartiality of any panel set up for a disciplinary hearing against a member of staff following a serious complaint.\n\nThe Directors may nominate a number of members with delegated powers to hear complaints at that stage, and set out its terms of reference. These can include:\n\n- drawing up its procedures;\n- hearing individual appeals;\n- making recommendations on policy as a result of complaints.\n\nThe procedure adopted by the Directors' Appeal Panel would normally be part of the Centre S complaints procedure. The panel can be drawn from the nominated members and may consist of three or more people. The panel may choose their own Chair.\n\nThe Remit Of The Directors' Appeal Panel\n\nThe Appeal Panel can:\n\n- dismiss the complaint in whole or in part;\n- uphold the complaint in whole or in part;\n- decide on the appropriate action to be taken to resolve the complaint;\n- recommend changes to the school's systems or procedures to ensure that problems of a similar nature do not recur.\n\nThere are several points which any member of the Directors sitting on an Appeal Panel needs to remember:\n\n- It is important that the hearing is independent and impartial and that it is seen to be so.\n- No Director may sit on the panel if he/she has had a prior involvement in the complaint or in the circumstances surrounding it. In deciding the make-up of the panel, the Directors need to try and ensure that it is a cross-section of the categories of Directors and sensitive to the issues of race, gender and religious affiliation.\n- The aim of the hearing, which needs to be held in private, will always be to resolve the complaint and achieve reconciliation between the Centre and the complainant. However, it has to be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously.\n\n- An effective panel will acknowledge that many complainants feel nervous and inhibited in a formal setting. Parents often feel emotional when discussing an issue which affects their child. The Appeal Panel Chair will ensure that the proceedings are as welcoming as possible. The layout of the room will set the tone and care is needed to ensure the setting is informal and not adversarial.\n- Extra care needs to be taken when the complainant is a child. Careful consideration of the atmosphere and proceedings will ensure that the child does not feel intimidated. The Appeal Panel needs to be aware of the views of the child and give them equal consideration to those of adults. Where the child's parent is the complainant, it would be helpful to give the parent the opportunity to say which parts of the hearing, if any, the child needs to attend.\n- The Directors' Appeal Panel members need to be aware of the complaints procedure.\n\nAnnex B –Complaint Form\n\nPlease complete and return to the Centre's Complaints Coordinator who will acknowledge receipt and explain what action will be taken.\n\nYour name:\n\nChild's name (if relevant):\n\nYour relationship to the child (if relevant):\n\nAddress:\n\nPostcode:\n\nDay time telephone number:\n\nEvening telephone number:\n\nPlease give details of your complaint.\n\nWhat action, if any, have you already taken to try and resolve your complaint. (Who did you speak to and what was the response)?\n\nWhat actions do you feel might resolve the problem at this stage?\n\nAre you attaching any paperwork? If so, please give details.\n\nSignature:\n\nDate:\n\nOfficial use\n\nDate acknowledgement sent:\n\nBy who:\n\nComplaint referred to:\n\nDate:\n\nAnnex C: Roles and Responsibilities\n\nThe Complainant\n\nThe complainant or person who makes the complaint will receive a more effective response to the complaint if he/she:\n\n- co-operates with the Centre in seeking a solution to the complaint;\n- expresses the complaint in full as early as possible;\n- responds promptly to requests for information or meetings or in agreeing the details of the complaint;\n- asks for assistance as needed;\n- treats all those involved in the complaint with respect.\n\nThe Complaints Coordinator\n\nThe Complaints Coordinator will:\n\n- ensure that the complainant is fully updated at each stage of the procedure;\n- ensure that all people involved in the complaint procedure will be aware of the legislation around complaints including the Equality Act 2010, Data Protection Act 1998 and Freedom of Information Act 2000;\n- liaise with staff members, Managers and Directors to ensure the smooth running of the complaints procedure;\n\n-\n\nkeep records;\n\n- be aware of issues regarding:\n- sharing third party information;\n- additional support - this may be needed by complainants when making a complaint including interpretation support.\n\nThe Investigator\n\nThe Investigator is the person involved in Stages 1 and 2 of the procedure. The Investigator's role includes providing a comprehensive, open, transparent and fair consideration of the complaint through:\n\n- sensitive and thorough interviewing of the complainant to establish what has happened and who has been involved;\n- consideration of records and other relevant information;\n- interviewing staff and children/young people and other people relevant to the complaint;\n\n-\n\nanalysing information;\n\n- effectively liaising with the complainant and the Complaints Coordinator as appropriate to clarify what the complainant feels would put things right;\n- identifying solutions and recommending courses of action to resolve problems;\n- being mindful of the timescales to respond; and\n- responding to the complainant in plain and clear language.\n\nThe Investigator will also make sure that they:\n\n- conduct interviews with an open mind and be prepared to persist in the questioning;\n- keep notes of interviews or arrange for an independent note taker to record minutes of the meeting.\n\nThe Panel Clerk (This Could Be The Complaints Coordinator)\n\nThe Clerk is the contact point for the complainant for the panel meeting and will:\n\n- set the date, time and venue of the hearing, ensuring that the dates are convenient to all parties and that the venue and proceedings are accessible;\n- collate any written material and send it to the parties in advance of the hearing;\n- meet and welcome the parties as they arrive at the hearing;\n- record the proceedings;\n- circulate the minutes of the panel hearing;\n- notify all parties of the panel's decision;\n- liaise with the Complaints Coordinator.\n\nThe Appeal Panel Chair\n\nThe Appeal Panel Chair has a key role in ensuring that:\n\n- the meeting is minuted;\n- the remit of the panel is explained to the complainant and both they and the school have the opportunity of putting their case without undue interruption;\n- the issues are addressed;\n- key findings of fact are made;\n- parents/carers and others who may not be used to speaking at such a hearing are put at ease which is particularly important if the complainant is a child/young person;\n- the hearing is conducted in an informal manner with everyone treated with respect and courtesy;\n- the layout of the room will set the tone; care is needed to ensure the setting is informal and not adversarial;\n- the panel is open-minded and acts independently;\n- no member of the panel has an external interest in the outcome of the proceedings or any involvement in an earlier stage of the procedure;\n- both the complainant and the Centre are given the opportunity to state their case and seek clarity;\n- written material is seen by everyone in attendance; if a new issue arises it would be useful to give everyone the opportunity to consider and comment upon it; this may require a short adjournment of the hearing;\n- liaise with the Clerk and Complaints Coordinator.\n\nPanel Members\n\nPanel members will need to be aware that:\n\n- it is important that the review panel hearing is independent and impartial, and that it is seen to be so;\n- None of the Directors may sit on the panel if they have had a prior involvement in the complaint or in the circumstances surrounding it.\n- the aim of the hearing, which will be held in private, will always be to resolve the complaint and achieve reconciliation between the school and the complainant. However, it must be recognised that the complainant might not be satisfied with the outcome if the hearing does not find in their favour. It may only be possible to establish the facts and make recommendations which will satisfy the complainant that his or her complaint has been taken seriously;\n- many complainants will feel nervous and inhibited in a formal setting;\n- Parents/carers often feel emotional when discussing an issue which affects their child; the panel chair will ensure that the proceedings are as welcoming as possible.\n- extra care needs to be taken when the complainant is a child/young person and present during all or part of the hearing;\n- Careful consideration of the atmosphere and proceedings will ensure that the child/young person does not feel intimidated; the panel should respect the views of the child/young person and give them equal consideration to those of adults.\n- If the child/young person is the complainant, the panel should ask in<cursor_is_here> Where the child/young person's parent is the complainant, the panel should give the parent the opportunity to say which parts of the hearing, if any, the child/young person needs to attend.\n- The parent should be advised however that agreement might not always be possible if the parent wishes the child/young person to attend a part of the meeting which the panel considers not to be in the child/young person's best interests.\n- The welfare of the child/young person is paramount.\n\nAnnex D- Interviewing Best Practice Tips\n\nChildren/Young People\n\n- Children/young people should be interviewed in the presence of another member of staff, or in the case of serious complaints (e.g. where the possibility of criminal investigation exists) in the presence of their parents/carers. However, it might not always be possible to conduct an interview in case it prejudices a LADO or police investigation.\n- Care should be taken in these circumstances not to create an intimidating atmosphere.\n- Children/young people should be told what the interview is about and that they can have someone with them.\n\nStaff/Witnesses\n\n- Explain the complaint and your role clearly to the interviewee and confirm that they understand the complaints procedure and their role in it.\n- Staff are allowed a colleague to support them at their interview. The colleague must not be anyone likely to be interviewed themselves, including their line manager.\n- Use open, not leading questions.\n- Do not express opinions in words or attitude.\n- Ask single not multiple questions, i.e. one question at a time.\n- Try to separate 'hearsay' evidence from fact by asking interviewees how they know a particular fact.\n- Persist with questions if necessary. Do not be afraid to ask the same question twice. Make notes of each answer given.\n- Deal with conflicting evidence by seeking corroborative evidence. If this is not available, discuss with the Complaints Coordinator/Principal/Directors the option of a meeting between the conflicting witnesses.\n- Make a formal record of the interview from the written notes as soon as possible while the memory is fresh.\n- Show the interviewee the formal record, ask if s/he has anything to add, and to sign the record as accurate.\n\nAnnexe E - Policy for Unreasonable Complainants\n\nThe Centre is committed to dealing with all complaints fairly and impartially, and to providing a high quality service to those who complain. We will not normally limit the contact complainants have with the Centre. However, we do not expect our staff to tolerate unacceptable behaviour and will take action to protect staff from that behaviour, including that which is abusive, offensive or threatening.\n\nThe Centre defines unreasonable complainants as 'those who, because of the frequency or nature of their contacts with the school, hinder our consideration of their or other people's complaints'.\n\nA complaint may be regarded as unreasonable when the person making the complaint:\n\n- refuses to articulate their complaint or specify the grounds of a complaint or the outcomes sought by raising the complaint, despite offers of assistance;\n- refuses to co-operate with the complaints investigation process while still wishing their complaint to be resolved;\n- refuses to accept that certain issues are not within the scope of a complaints procedure;\n- insists on the complaint being dealt with in ways which are incompatible with the adopted complaints procedure or with good practice;\n- introduces trivial or irrelevant information which the complainant expects to be taken into account and commented on, or raises large numbers of detailed but unimportant questions, and insists they are fully answered, often immediately and to their own timescales;\n- makes unjustified complaints about staff who are trying to deal with the issues, and seeks to have them replaced;\n- changes the basis of the complaint as the investigation proceeds;\n- repeatedly makes the same complaint (despite previous investigations or responses concluding that the complaint is groundless or has been addressed);\n- refuses to accept the findings of the investigation into that complaint where the Centre's complaint procedure has been fully and properly implemented and completed including referral to the Department for Education;\n- seeks an unrealistic outcome;\n- makes excessive demands on school time by frequent, lengthy, complicated and stressful contact with staff regarding the complaint in person, in writing, by email and by telephone while the complaint is being dealt with.\n\nA complaint may also be considered unreasonable if the person making the complaint does so either face-to-face, by telephone or in writing or electronically:\n\n- maliciously;\n- aggressively;\n- using threats, intimidation or violence;\n- using abusive, offensive or discriminatory language;\n\n- knowing it to be false;\n- using falsified information;\n- publishing unacceptable information in a variety of media such as in social media websites and newspapers.\n\nComplainants should limit the numbers of communications with a school while a complaint is being progressed. It is not helpful if repeated correspondence is sent (either by letter, phone, email or text) as it could delay the outcome being reached.\n\nWhenever possible, the Manager will discuss any concerns with the complainant informally before applying an 'unreasonable' marking.\n\nIf the behaviour continues, the Manager will write to the complainant explaining that their behaviour is unreasonable and asking them to change it. For complainants who excessively contact the Centre causing a significant level of disruption, we may specify methods of communication and limit the number of contacts in a communication plan. This will be reviewed after six months.\n\nIn response to any serious incident of aggression or violence, the concerns and actions taken will be put in writing immediately and the police informed. This may include barring an individual from the Centre.\n\nBarring from the Centre's Premises\n\nAlthough fulfilling a public function, the Centre is a private place. The public has no automatic right of entry. The Centre will therefore act to ensure it remains a safe place for children, staff and other members of their community.\n\nIf a parent's behaviour is a cause for concern, the Centre can ask him/her to leave its premises. In serious cases, the Manager can notify them in writing that their implied licence to be on its premises has been temporarily revoked subject to any representations that the parent may wish to make. The Centre should always give the parent the opportunity to formally express their views on the decision to bar in writing.\n\nThe decision to bar should then be reviewed, taking into account any representations made by the parent, and either confirmed or lifted. If the decision is confirmed the parent should be notified in writing, explaining how long the bar will be in place.\n\nAnyone wishing to complain about being barred can do so, by letter or email, to the Centre Manager. Once the Centre's own complaints procedure has been completed, the only remaining avenue of appeal is through the Courts; independent legal advice must therefore be sought.\n</text>\n",
"role": "user"
},
{
"content": " advance if any support is needed to help them present their complaint.",
"role": "assistant"
}
] |
SCIAMACHY CLOUD PRODUCT VALIDATION
N. Fournier ∗ (1) , P . Stammes (1) , J. R. Acarreta (1) , H. Eskes (1) , A. Piters (1) , M. Hess (2) , A. von Bargen (2) , A. Kokhanovsky (3) , and M. Grzegorski (4)
(1)KNMI, Climate Research and Seismology Department, De Bilt, The Netherlands (2)DLR/IMF, German Aerospace Center, Remote Sensing Technology Institute, Wessling, Germany (3)Institute of Remote Sensing, University of Bremen, Germany (4)Institute of Environmental Physics, University of Heidelberg, Germany
Abstract
Radiative scattering by clouds leads to errors in the retrieval of column densities and concentration profiles of atmospheric trace gas species from satellites. The SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY (SCIAMACHY) instrument on the Envisat satellite, principally designed to retrieve trace gases in the atmosphere, is also capable of detecting clouds. Cloud fraction is retrieved using the Optical Cloud Recognition Algorithm (OCRA). In this paper, this Level 2 operational cloud product is compared to the results from other cloud algorithms such as FRESCO (Fast Retrieval Scheme for Clouds from the Oxygen A-band). It is shown that the retrieved cloud fractions correlate well between OCRA and FRESCO since the 28 th April 2004. FRESCO provides a consistent set of cloud products by retrieving simultaneously cloud fraction and cloud top pressure. Moreover, FRESCO retrievals are corroborated with cloud top pressure from MODIS. Other algorithms such as HICRU (cloud fraction) and SACURA (cloud top pressure) are also available to validate independently these cloud products.
able to operate with new viewing geometries namely limb and sun, moon occultations. The primary scientific objective of SCIAMACHY is the global measurement of various trace gases on a global scale [2].
Key words: FRESCO; OCRA; cloud fraction; cloud top pressure.
1. INTRODUCTION
SCIAMACHY (SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY) is a spaceborne spectrometer that flies on Envisat since March 2002. The instrument is a national contribution by Germany-DLR, the Netherlands-NIVR and BelgiumBUSOC to the European Space Agency satellite Envisat. SCIAMACHY measures the solar radiation reflected from the atmosphere in the wavelength range between 240 and 2380 nm. This is recorded at relatively high resolution (0.2 to 1.5 nm) over the range 240 to 1750 nm, and in selected regions between 2000 and 2400 nm. SCIAMACHY is extended as compared to its precursor GOME (Global Ozone Monitoring Experiment; [1]) with a wavelength range extending in the near IR region and
∗ Corresponding author : [email protected]; Tel : +31 (0) 30 2206
The trace gases that SCIAMACHY detects, like O3, NO2, BrO, SO2, CO and CH4, occur not only in the stratosphere but also in the troposphere, where clouds reside. To detect these trace gases accurately, the presence and properties of clouds have to be known, in order to correct for the effect of clouds. The three cloud parameters that most strongly influence trace gas measurements are: cloud fraction, cloud albedo or cloud optical thickness, and cloud top pressure. Microphysical cloud parameters, like particle size and shape, are of minor importance [3].
Clouds affect the path of photons through the atmosphere and therefore change the interpretation of the depth of an absorption band. Taking ozone as an example, the effect of clouds on ozone retrieval can be regarded as due to two main effects [3]: (1) albedo effect: clouds act as a reflecting boundary below the ozone layer and enhance the depth of the ozone absorption bands, and (2) ghost column effect: clouds shield tropospheric ozone from observation. A third, smaller effect exists, which is the enhancement of the photon path inside clouds, causing an enhancement of the absorption line depth inside clouds [4].
In order to correct for the albedo effect of clouds, it is necessary to retrieve the cloud fraction and cloud albedo (or cloud optical thickness) or, equivalently, the product of cloud fraction and cloud albedo, which we call the effective cloud fraction. In order to correct for the ghost column effect of clouds, it is necessary to retrieve both the effective cloud fraction and the cloud top pressure.
The above cloud effects not only occur for O3 but also for other gases. Especially for NO2, much of which is residing in the troposphere in polluted circumstances, the ghost column effect is very important [5]. Therefore, a cloud detection algorithm suitable for trace gas retrievals for SCIAMACHY should be able to detect at least effective cloud fraction and cloud pressure. If the cloud
pressure is available, then the tropospheric ozone column can be determined by comparing cloudy and clear pixels, using the convective-cloud-differential technique [6].
This paper is devoted to the SCIAMACHY cloud products' validation. The operational Level 2 cloud fraction from OCRA is investigated and compared with the retrievals obtained from FRESCO. Moreover, the scientific cloud top pressure product from FRESCO is compared to results from the O2-O2 method and from another satellite instrument, namely MODIS on EOS/Terra.
2. Cloud retrieval techniques for SCIAMACHY
For reasons of timeliness and co-location, it is most practical to retrieve cloud parameters from the SCIAMACHY data itself. To this aim various SCIAMACHY channels and atmospheric absorption bands can be chosen. In the case of GOME, the Polarisation Measurement Devices (PMDs) had been used by several groups to detect cloud fraction. The advantage of the PMDs is that they have a better spatial resolution than the spectral channels. Reference [7] have developed various cloud algorithms for GOME, among which the Optical Cloud Recognition Algorithm (OCRA) technique. This technique uses the color of PMD images to select cloud free scenes for a global database of cloud free reflectances. The difference between the current PMD reflectances and this cloud free database is used to retrieve cloud fractions. To detect cloud pressure, however, the PMDs cannot be used because they have insufficient spectral resolution to detect absorption lines of well-mixed absorbers like oxygen. In the SCIAMACHY range there are several oxygen or oxygen-oxygen absorption bands. The strongest band is the O2 A-band at 760 nm. Figure 1 shows the absorption lines of Oxygen in this region.
There is also the weaker O2 B-band around 680 nm, and several weak O2-O2 lines. The Initial Cloud Fitting Algorithm (ICFA), which is used in the operational data processing of GOME, uses the O 2 A-band [8], [9]. ICFA only produces the cloud fraction; cloud pressure is taken from a climatology. Validation of ICFA has been performed by [9], and it was shown that ICFA produces inaccurate cloud fractions. The GOME-CAT (Cloud retrieval algorithm) method [10] uses a combination of PMD data and O 2 A-band data to retrieve cloud fraction, cloud optical thickness and cloud pressure. In the results of this algorithm, however, the cloud optical thickness appears to be unreliable.
Recently, an intercomparison of different cloud retrieval algorithms that exist for GOME was published by [11]. They compared ICFA, OCRA and FRESCO cloud fractions with groundbased synoptical observations. It was shown that the effective cloud fraction as used by FRESCO underestimates the real cloud fraction for optically thin clouds, as expected, but correlates well with synoptical cloud observations. Other recent cloud algorithm comparisons for GOME and SCIAMACHY have been performed. Reference [12] developed an advanced PMD technique for cloud fraction retrieval, called HICRU (Heidelberg Iterative Cloud Retrieval Utilities). SACURA (SemiAnalytical CloUd Retrieval Algorithm) from [13] determines the cloud top pressure and geometrical thickness using measurements of the cloud reflection function.
Apart from the O2 A-band, also the 477-nm absorption band of the collision-complex O2-O2 has been used for retrieval of cloud fraction and cloud pressure from GOME [14]. The O2-O2 method will be used as operational cloud detection method for OMI, to be launched on board of EOS-Aura in July 2004. The O2-O2 method is more sensitive to low clouds than to high clouds, due to the pressure-squared dependence.
Another atmospheric scattering process that can be used for cloud pressure retrieval is Raman scattering. Raman scattering is the inelastic part of Rayleigh scattering by nitrogen and oxygen, which fills-in solar Fraunhofer lines in scattered light from the Earth. The amount of filling-in is more or less proportional to the pressure of the cloud. Recently, this Raman method has been successfully applied to GOME data [15].
In cloud retrievals from satellite, it is very important to have a good estimate of the surface albedo. The reason is that cloud detection is usually performed by comparing the measured reflectivity with the expected reflectivity from a cloud-free scene. Recently, a new spectral surface albedo database based on 5.5 years of GOME data has been published [16]. This database is freely available and is used in FRESCO in this study.
2..1 FRESCO method
The FRESCO (Fast Retrieval Scheme for Cloud Observables) method has been developed by [17] as a simple, fast, and robust algorithm to provide cloud information for cloud correction of ozone. FRESCO uses the reflectivity in three 1-nm wide windows of the O 2 A-band: 758-759 nm, 760-761 nm, and 765-766 nm. The measured reflectivity is compared to a modeled reflectivity, as computed for a simple cloud model. In this model the cloud is assumed to be a Lambertian reflector with albedo 0.8 below a clear atmosphere, in which only O 2 absorption is taken into account. To simulate the spectrum of a partly cloudy pixel, a simple atmospheric transmission model is used, in which the atmosphere above the ground surface (for the clear part of the pixel) or cloud (for the cloudy part of the pixel) is treated as a purely absorbing, non-scattering, medium. The retrieved parameters are the effective cloud fraction (between 0 and 1) and the cloud pressure. Absorption by oxygen inside the cloud is neglected.
FRESCO is used in the fast-delivery processing of GOME ozone data [18] and in the SCIAMACHY ozone processor TOSOMI, which provides ozone data from SCIAMACHY within the ESA TEMIS project (see http://www.temis.nl).
FRESCO has been validated regionally and globally [17], [13], [11], and is proven to be reliable. However, FRESCO overestimates the cloud fraction retrievals over the Sahara region. This is under investigation but a possible explanation could be the higher albedo over this desert, from sand and aerosols, than in the low resolution surface albedo database used by FRESCO. Secondly, FRESCO overestimates cloud top pressure by on average about 50 hPa, as compared to infrared techniques. A possible reason is the fact that photon paths inside the cloud enhance the O2 A band depth. We note that for cloud correction of ozone and other trace gases, a qualitatively similar path enhancement is expected.
2..2 OCRA method
OCRA was developed by [19]. It is a PMD algorithm using the "red", "green" and "blue" PMDs for cloud fraction determination. The cloud fraction is calculated from a linear interpolation of the current PMD reflectance between a minimum (cloud free) value and a maximum (totally cloudy) value, the latter being fixed by scaling factors. An average of the results of the three PMDs is used. Reflectances of cloud free scenes are stored on a global grid. They are determined once from a large set of historic data using color distances between measured PMD color and the white point in the chromaticity diagram. Reflectances with the largest distance to the white point are selected to represent the cloud free case at a certain grid point. Currently, a database calculated from GOME PMD measurements is applied. For the totally cloudy case, one scaling factor is used for each PMD, representing the maximum reflectance.
3. VALIDATION RESULTS
In this section we directly intercompare the retrieved cloud paramaters from the different cloud algorithms. More specifically, results obtained by applying the FRESCO algorithm to SCIAMACHY data are compared with the equivalent Level 2 operational cloud fraction from OCRA. Moreover, the retrieved cloud top pressure results are assessed against another satellite instrument based values (MODIS).
3..1 Cloud fraction
Firstly, Figure 2 illustrates a comparison between OCRA and FRESCO cloud fraction retrievals for the validation reference dataset. This dataset corresponds to the states shown in Figure 3 covering the period from August to October 2002. A good agreement is obtained between OCRA and FRESCO with a standard deviation of 0.1. The discrepancies at the cloud fraction value of 1.0 are due to FRESCO algorithm assumptions at high latitudes. Indeed, in these regions, the algorithm switches to snow/ice mode where an effective cloud fraction of 1.0 is assumed.
Fig. 2. Comparison of cloud fraction derived from SCIAMACHY Data between OCRA (Scia) and FRESCO (Tosomi) retrieval cloud algorithms for the validation reference dataset.
Secondly, a more specific comparison between OCRA and FRESCO cloud fraction retrievals is shown in Figure 4. This concerns the SCIAMACHY data from the reference orbit 2510 (August 23, 2002). It is clear that both cloud fractions correlate well. The linear fit gives a determination coefficient (R 2 ) of 0.95 with a slope of 0.94.
However, plotting the cloud fraction difference between OCRA and FRESCO as a function of the viewing zenith angle (Figure 5) for the same orbit produces a rather surprising parabolic response. It was found that this dependency in scanning angle is due to an inadequate definition of reflectances in OCRA, which takes the
Fig. 3. SCIAMACHY measurements locations corresponding to the validation reference dataset used in the comparison between OCRA and FRESCO cloud fractions of Figure 2. The measurements date from the period from August to October 2002.
cosine of this angle into account.
Furthermore, in Figure 6 the retrieved cloud fractions from both FRESCO and the O2-O2 method are compared with OCRA values in the case of the orbit 2510, corroborating the previous results.
The good correlation in the retrieved cloud fraction values between OCRA and FRESCO with the verification orbit 2510, but also 2509, is also found for SCIAMACHY data on Near-Real-Time orbits since April 28, 2004 (Figures 7 and 8). Indeed, beforehand, an error with a Near-Real-Time Level 1-2 processor
initialisation file prevented OCRA to retrieve accurate values of cloud fraction.
Another promising cloud algorithm (HICRU) is currently applied on SCIAMACHY data to retrieve cloud fraction. First results (Figure 9) showed that the retrieved cloud fractions agree well with the values obtained from GOME data and, also, with images from Meteosat [20].
3..2 Cloud top pressure
The comparison between SCIAMACHY operational Level 2 and FRESCO cloud top pressures from the reference orbit 2510 (August 23, 2002) underlines a strong disagreement. Indeed, while FRESCO provides a consistent set of cloud parameters (simultaneous retrieval), the operational product is derived from the ISCCP monthly mean cloud top height database, which is a climatology based on measurements of clouds from satellites (MeteoSat, GMS, GOES and NOAA). However, in a future version of the operational processor, an oxygen band algorithm for cloud top pressure retrieval will be included.
This is corroborated in the comparison of the SCIAMACHY operational product (Figure 10) and FRESCO
(Figure 11) retrieved results with MODIS [21] co-located values for the orbit 2510. MODIS Level 2 granules overlapping the SCIAMACHY 2510 orbit are processed. While the operational product exhibits important differences with MODIS values, FRESCO shows a reasonable agreement with differences about 100 hPa.
Furthermore, in Figure 12, the retrieved cloud top pressures from FRESCO (blue), the O2-O2 method (red) and the operational product (black) are compared with MODIS co-located values in the case of
the orbit 2510. For FRESCO and the O2-O2 method, only the retrieved values concerning optically thick clouds are considered (cloud optical thickness of 5 or more). This improves the correlation of FRESCO with MODIS obtained in Figure 11 and confirms the slight overestimation in FRESCO retrieved values. To complete this validation, there are also other algorithms which should be employed such as SACURA (see http://www.ww.iup.physik.uni-bremen.de/scia-arc) providing cloud top pressure retrieval (dataset not yet available on-line) using SCIAMACHY data [13].
4. CONCLUSION
To validate SCIAMACHY cloud products, an intercomparison has been undertaken between the results of the operational algorithm OCRA and other algorithms such as FRESCO or the O2-O2 method. Moreover, the validation has been extended with MODIS co-located data in the case of the cloud top pressure. This shows that OCRA operational Level 2 cloud fraction product correlates well with FRESCO and the O2-O2 method using SCIAMACHY data. The accuracy of this product is about 0.1, as compared to FRESCO, and could even be improved by correcting from the scanning angle dependency. However, for the current implementation of the OCRA method in the operational SCIAMACHY processor, this is the first, and encouraging validation study. Further studies will be needed to define OCRA optimised parameter settings. In terms of cloud top pressure, FRESCO matches well the MODIS values with an ac-
curacy about 100 hPa while SCIAMACHY operational product is derived from a climatological database. Therefore, FRESCO provides a consistent set of cloud parameters by its simultaneous retrieval. The validation of these cloud products should be completed by using other available algorithms such as HICRU (cloud fraction) or SACURA (cloud top pressure) which evaluate independently cloud fraction and cloud top pressure.
Acknowledgements
The work performed for this publication is (partly) financed by the Netherlands Agency for Aerospace Programmes (NIVR).
5. REFERENCES
1. Burrows, J. P., et al., The Global Ozone Monitoring Experiment (GOME): Mission Concept and First Scientific Results, J. Atm. Sci., 56, 151–175, 1999.
2. Bovensmann H., J. P. Burrows, M. Buchwitz, J. Frerick, S. Noel, V. Rozanov, K.V. Chance and A.P.H. Goede, SCIAMACHY: Mission objectives and measurement modes', J. Atm. Sci., 56, 127–150, 1999.
3. Koelemeijer R.B.A., and P. Stammes, Effects of clouds on the ozone column retrievalfrom GOME UV measurements, J. Geophys. Res., D, 104, 8281-8294, 1999a.
4. Newchurch, M. J., X. Liu, J. H. Kim, P. K. Bhartia, On the accuracy of Total Ozone Mapping Spectrometer retrievals over tropical cloudy regions, J. Geophys. Res., 106 (D23), 32315-32326, 10.1029/2000JD000151, 2001.
5.Boersma K. F., H. J. Eskes, E. J. Brinksma, Error analysis for tropospheric NO2 retrieval from space, J. Geophys. Res., 109, doi:10.1029/2003JD003962, 2004.
6. Valks, P.J.M., A.J.M. Piters, J.C. Lambert, C. Zehner and H. Kelder, A Fast Delivery System for the retrieval of near-real time ozone columns from GOME data, Int. J. Remote Sensing, 24, 423-436, 2003a.
7. Von Bargen, A., T. P. Kurosu, K. Chance, D. Loyola, B. Aberle, R.J. Spurr, Cloud retrieval algorithm for GOME. Final Report, ER-TN-DLR-CRAG-007, ESA/ESTEC, October 2000.
8. Kuze, A., and K.V. Chance, Analysis of cloud top height and cloud fraction from satellites using the O2 A and B bands, J. Geophys. Res., 99, 14482-14491, 1994.
9. Koelemeijer R.B.A., and P. Stammes, Validation of Global Ozone Monitoring Experiment cloud fractions relevant for accurate ozone column retrieval, J. Geophys. Res., D, 104, 18,801-18,814, 1999b.
10. Kurosu, T.P., K. Chance, R.J.D. Spurr, A. v. Bargen, and D. Loyola, GOMECAT - a Cloud Retrieval Algorithm for the European Space Agency's Global Ozone Monitoring Experiment, Manuscript in preparation 2002.
11. Tuinder, O.N.E., R. de Winter-Sorkina, P. Builtjes, Retrieval methods of effective cloud cover from the GOME instrument: an intercomparison, Atmos. Chem. Phys., 4, 255-273, 2004 (www.atmos-chem-phys.org/acp/4/255).
12. Grzegorski, M., Determination of cloud parameters for GOME with broad band spectrometers and from absorption bands of oxygen dimer (in German), Diplomarbeit, Univ. Heidelberg, 2003.
13. Kokhanovsky, A.A., V.V. Rozanov, E.P. Zege, H. Bovensmann, and J.P. Burrows, A semianalytical cloud retrieval algorithm using backscattered radiation in 0.4-2.4 µm spectral region, J. Geophys. Res., 2003, Vol. 108 (D1), doi 10.1029/2001JD001543.
14. Acarreta, J.R., J.F. de Haan, P. Stammes, Cloud pressure retrieval using the O2-O2 absorption band at 477 nm, J. Geophys. Res., Vol. 109, doi:10.1029/2003JD003915, 2004.
15. Joiner J., A. P. Vasilkov, D. E. Flittner, J. F. Gleason, P. K. Bhartia, Retrieval of cloud pressure and oceanic chlorophyll content using Raman scattering in GOME ultraviolet spectra, J. Geophys. Res., 109, doi:10.1029/2003JD003698, 2004.
16. Koelemeijer, R.B.A., J.F. de Haan, and P. Stammes, A database of spectral surface reflectivity in the range 335 – 772 nm derived from 5.5 years of GOME observations, J. Geophys. Res., 2003, Vol. 108 (D2), doi 10.1029/2002JD002429.
17. Koelemeijer, R.B.A., P. Stammes, J.W. Hovenier, and J.F. de Haan, A fast method for retrieval of cloud parameters using oxygen A-band measurements from the Global Ozone Monitoring Instrument, J. Geophys. Res., D, 106, 3475-3490, 2001.
18. Valks P. J. M., R. B. A. Koelemeijer, M. van Weele, P. van Velthoven, J. P. F. Fortuin, H. Kelder, Variability in tropical tropospheric ozone: Analysis with Global Ozone Monitoring Experiment observations and a global model, J. Geophys. Res., 108, doi:10.1029/2002JD002894, 2003b.
19. Loyola, D., A New Cloud Recognition Algorithm for Optical Sensors. In IEEE International Geoscience and Remote Sensing Symposium, volume 2 of IGARSS 1998 Digest, p. 572-574, Seattle, 1998.
20. Grzegorski, M. et al., 'Determination of cloud parameters from satellite instruments for the correction of tropospheric trace gases', EGU General Assembly, Nice, France, 25-30 April 2004.
21. Platnick, S., M.D. King, S.A. Ackerman, W.P. Menzel, B.A. Baum, J.C. Ri´edi, and R.A. Frey, The MODIS Cloud Products: Algorithms and Examples from Terra, IEEE Transactions on Geoscience and Remote Sensing, 41, 2, 459-473, 2003.
|
<urn:uuid:d54fbb0f-c1f4-4dc1-9132-39b180713103>
|
CC-MAIN-2018-05
|
http://www.temis.nl/fresco/ESC01PS.pdf
|
2018-01-23T00:07:47Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891546.92/warc/CC-MAIN-20180122232843-20180123012843-00053.warc.gz
| 563,430,379
| 5,548
|
eng_Latn
|
eng_Latn
| 0.934435
|
eng_Latn
| 0.981079
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4667,
10189,
13854,
15584,
16190,
22503
] |
SCIAMACHY CLOUD PRODUCT VALIDATION
N. Fournier ∗ (1) , P . Stammes (1) , J. R. Acarreta (1) , H. Eskes (1) , A. Piters (1) , M. Hess (2) , A. von Bargen (2) , A. Kokhanovsky (3) , and M. Grzegorski (4)
(1)KNMI, Climate Research and Seismology Department, De Bilt, The Netherlands (2)DLR/IMF, German Aerospace Center, Remote Sensing Technology Institute, Wessling, Germany (3)Institute of Remote Sensing, University of Bremen, Germany (4)Institute of Environmental Physics, University of Heidelberg, Germany
Abstract
Radiative scattering by clouds leads to errors in the retrieval of column densities and concentration profiles of atmospheric trace gas species from satellites. The SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY (SCIAMACHY) instrument on the Envisat satellite, principally designed to retrieve trace gases in the atmosphere, is also capable of detecting clouds. Cloud fraction is retrieved using the Optical Cloud Recognition Algorithm (OCRA). In this paper, this Level 2 operational cloud product is compared to the results from other cloud algorithms such as FRESCO (Fast Retrieval Scheme for Clouds from the Oxygen A-band). It is shown that the retrieved cloud fractions correlate well between OCRA and FRESCO since the 28 th April 2004. FRESCO provides a consistent set of cloud products by retrieving simultaneously cloud fraction and cloud top pressure. Moreover, FRESCO retrievals are corroborated with cloud top pressure from MODIS. Other algorithms such as HICRU (cloud fraction) and SACURA (cloud top pressure) are also available to validate independently these cloud products.
able to operate with new viewing geometries namely limb and sun, moon occultations. The primary scientific objective of SCIAMACHY is the global measurement of various trace gases on a global scale [2].
Key words: FRESCO; OCRA; cloud fraction; cloud top pressure.
1. INTRODUCTION
SCIAMACHY (SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY) is a spaceborne spectrometer that flies on Envisat since March 2002. The instrument is a national contribution by Germany-DLR, the Netherlands-NIVR and BelgiumBUSOC to the European Space Agency satellite Envisat. SCIAMACHY measures the solar radiation reflected from the atmosphere in the wavelength range between 240 and 2380 nm. This is recorded at relatively high resolution (0.2 to 1.5 nm) over the range 240 to 1750 nm, and in selected regions between 2000 and 2400 nm. SCIAMACHY is extended as compared to its precursor GOME (Global Ozone Monitoring Experiment; [1]) with a wavelength range extending in the near IR region and
∗ Corresponding author : [email protected]; Tel : +31 (0) 30 2206
The trace gases that SCIAMACHY detects, like O3, NO2, BrO, SO2, CO and CH4, occur not only in the stratosphere but also in the troposphere, where clouds reside. To detect these trace gases accurately, the presence and properties of clouds have to be known, in order to correct for the effect of clouds. The three cloud parameters that most strongly influence trace gas measurements are: cloud fraction, cloud albedo or cloud optical thickness, and cloud top pressure. Microphysical cloud parameters, like particle size and shape, are of minor importance [3].
Clouds affect the path of photons through the atmosphere and therefore change the interpretation of the depth of an absorption band. Taking ozone as an example, the effect of clouds on ozone retrieval can be regarded as due to two main effects [3]: (1) albedo effect: clouds act as a reflecting boundary below the ozone layer and enhance the depth of the ozone absorption bands, and (2) ghost column effect: clouds shield tropospheric ozone from observation. A third, smaller effect exists, which is the enhancement of the photon path inside clouds, causing an enhancement of the absorption line depth inside clouds [4].
In order to correct for the albedo effect of clouds, it is necessary to retrieve the cloud fraction and cloud albedo (or cloud optical thickness) or, equivalently, the product of cloud fraction and cloud albedo, which we call the effective cloud fraction. In order to correct for the ghost column effect of clouds, it is necessary to retrieve both the effective cloud fraction and the cloud top pressure.
The above cloud effects not only occur for O3 but also for other gases. Especially for NO2, much of which is residing in the troposphere in polluted circumstances, the ghost column effect is very important [5]. Therefore, a cloud detection algorithm suitable for trace gas retrievals for SCIAMACHY should be able to detect at least effective cloud fraction and cloud pressure. If the cloud
pressure is available, then the tropospheric ozone column can be determined by comparing cloudy and clear pixels, using the convective-cloud-differential technique [6].
This paper is devoted to the SCIAMACHY cloud products' validation. The operational Level 2 cloud fraction from OCRA is investigated and compared with the retrievals obtained from FRESCO. Moreover, the scientific cloud top pressure product from FRESCO is compared to results from the O2-O2 method and from another satellite instrument, namely MODIS on EOS/Terra.
2. Cloud retrieval techniques for SCIAMACHY
For reasons of timeliness and co-location, it is most practical to retrieve cloud parameters from the SCIAMACHY data itself. To this aim various SCIAMACHY channels and atmospheric absorption bands can be chosen. In the case of GOME, the Polarisation Measurement Devices (PMDs) had been used by several groups to detect cloud fraction. The advantage of the PMDs is that they have a better spatial resolution than the spectral channels. Reference [7] have developed various cloud algorithms for GOME, among which the Optical Cloud Recognition Algorithm (OCRA) technique. This technique uses the color of PMD images to select cloud free scenes for a global database of cloud free reflectances. The difference between the current PMD reflectances and this cloud free database is used to retrieve cloud fractions. To detect cloud pressure, however, the PMDs cannot be used because they have insufficient spectral resolution to detect absorption lines of well-mixed absorbers like oxygen. In the SCIAMACHY range there are several oxygen or oxygen-oxygen absorption bands. The strongest band is the O2 A-band at 760 nm. Figure 1 shows the absorption lines of Oxygen in this region.
There is also the weaker O2 B-band around 680 nm, and several weak O2-O2 lines. The Initial Cloud Fitting Algorithm (ICFA), which is used in the operational data processing of GOME, uses the O 2 A-band [8], [9]. ICFA only produces the cloud fraction; cloud pressure is taken from a climatology. Validation of ICFA has been performed by [9], and it was shown that ICFA produces inaccurate cloud fractions. The GOME-CAT (Cloud retrieval algorithm) method [10] uses a combination of PMD data and O 2 A-band data to retrieve cloud fraction, cloud optical thickness and cloud pressure. In the results of this algorithm, however, the cloud optical thickness appears to be unreliable.
Recently, an intercomparison of different cloud retrieval algorithms that exist for GOME was published by [11]. They compared ICFA, OCRA and FRESCO cloud fractions with groundbased synoptical observations. It was shown that the effective cloud fraction as used by FRESCO underestimates the real cloud fraction for optically thin clouds, as expected, but correlates well with synoptical cloud observations. Other recent cloud algorithm comparisons for GOME and SCIAMACHY have been performed. Reference [12] developed an advanced PMD technique for cloud fraction retrieval, called HICRU (Heidelberg Iterative Cloud Retrieval Utilities). SACURA (SemiAnalytical CloUd Retrieval Algorithm) from [13] determines the cloud top pressure and geometrical thickness using measurements of the cloud reflection function.
Apart from the O2 A-band, also the 477-nm absorption band of the collision-complex O2-O2 has been used for retrieval of cloud fraction and cloud pressure from GOME [14]. The O2-O2 method will be used as operational cloud detection method for OMI, to be launched on board of EOS-Aura in July 2004. The O2-O2 method is more sensitive to low clouds than to high clouds, due to the pressure-squared dependence.
Another atmospheric scattering process that can be used for cloud pressure retrieval is Raman scattering. Raman scattering is the inelastic part of Rayleigh scattering by nitrogen and oxygen, which fills-in solar Fraunhofer lines in scattered light from the Earth. The amount of filling-in is more or less proportional to the pressure of the cloud. Recently, this Raman method has been successfully applied to GOME data [15].
In cloud retrievals from satellite, it is very important to have a good estimate of the surface albedo. The reason is that cloud detection is usually performed by comparing the measured reflectivity with the expected reflectivity from a cloud-free scene. Recently, a new spectral surface albedo database based on 5.5 years of GOME data has been published [16]. This database is freely available and is used in FRESCO in this study.
2..1 FRESCO method
The FRESCO (Fast Retrieval Scheme for Cloud Observables) method has been developed by [17] as a simple, fast, and robust algorithm to provide cloud information for cloud correction of ozone. FRESCO uses the reflectivity in three 1-nm wide windows of the O 2 A-band: 758-759 nm, 760-761 nm, and 765-766 nm. The measured reflectivity is compared to a modeled reflectivity, as computed for a simple cloud model. In this model the cloud is assumed to be a Lambertian reflector with albedo 0.8 below a clear atmosphere, in which only O 2 absorption is taken into account. To simulate the spectrum of a partly cloudy pixel, a simple atmospheric transmission model is used, in which the atmosphere above the ground surface (for the clear part of the pixel) or cloud (for the cloudy part of the pixel) is treated as a purely absorbing, non-scattering, medium. The retrieved parameters are the effective cloud fraction (between 0 and 1) and the cloud pressure. Absorption by oxygen inside the cloud is neglected.
FRESCO is used in the fast-delivery processing of GOME ozone data [18] and in the SCIAMACHY ozone processor TOSOMI, which provides ozone data from SCIAMACHY within the ESA TEMIS project (see http://www.temis.nl).
FRESCO has been validated regionally and globally [17], [13], [11], and is proven to be reliable. However, FRESCO overestimates the cloud fraction retrievals over the Sahara region. This is under investigation but a possible explanation could be the higher albedo over this desert, from sand and aerosols, than in the low resolution surface albedo database used by FRESCO. Secondly, FRESCO overestimates cloud top pressure by on average about 50 hPa, as compared to infrared techniques. A possible reason is the fact that photon paths inside the cloud enhance the O2 A band depth. We note that for cloud correction of ozone and other trace gases, a qualitatively similar path enhancement is expected.
2..2 OCRA method
OCRA was developed by [19]. It is a PMD algorithm using the "red", "green" and "blue" PMDs for cloud fraction determination. The cloud fraction is calculated from a linear interpolation of the current PMD reflectance between a minimum (cloud free) value and a maximum (totally cloudy) value, the latter being fixed by scaling factors. An average of the results of the three PMDs is used. Reflectances of cloud free scenes are stored on a global grid. They are determined once from a large set of historic data using color distances between measured PMD color and the white point in the chromaticity diagram. Reflectances with the largest distance to the white point are selected to represent the cloud free case at a certain grid point. Currently, a database calculated from GOME PMD measurements is applied. For the totally cloudy case, one scaling factor is used for each PMD, representing the maximum reflectance.
3. VALIDATION RESULTS
In this section we directly intercompare the retrieved cloud paramaters from the different cloud algorithms. More specifically, results obtained by applying the FRESCO algorithm to SCIAMACHY data are compared with the equivalent Level 2 operational cloud fraction from OCRA. Moreover, the retrieved cloud top pressure results are assessed against another satellite instrument based values (MODIS).
3..1 Cloud fraction
Firstly, Figure 2 illustrates a comparison between OCRA and FRESCO cloud fraction retrievals for the validation reference dataset. This dataset corresponds to the states shown in Figure 3 covering the period from August to October 2002. A good agreement is obtained between OCRA and FRESCO with a standard deviation of 0.1. The discrepancies at the cloud fraction value of 1.0 are due to FRESCO algorithm assumptions at high latitudes. Indeed, in these regions, the algorithm switches to snow/ice mode where an effective cloud fraction of 1.0 is assumed.
Fig. 2. Comparison of cloud fraction derived from SCIAMACHY Data between OCRA (Scia) and FRESCO (Tosomi) retrieval cloud algorithms for the validation reference dataset.
Secondly, a more specific comparison between OCRA and FRESCO cloud fraction retrievals is shown in Figure 4. This concerns the SCIAMACHY data from the reference orbit 2510 (August 23, 2002). It is clear that both cloud fractions correlate well. The linear fit gives a determination coefficient (R 2 ) of 0.95 with a slope of 0.94.
However, plotting the cloud fraction difference between OCRA and FRESCO as a function of the viewing zenith angle (Figure 5) for the same orbit produces a rather surprising parabolic response. It was found that this dependency in scanning angle is due to an inadequate definition of reflectances in OCRA, which takes the
Fig. 3. SCIAMACHY measurements locations corresponding to the validation reference dataset used in the comparison between OCRA and FRESCO cloud fractions of Figure 2. The measurements date from the period from August to October 2002.
cosine of this angle into account.
Furthermore, in Figure 6 the retrieved cloud fractions from both FRESCO and the O2-O2 method are compared with OCRA values in the case of the orbit 2510, corroborating the previous results.
The good correlation in the retrieved cloud fraction values between OCRA and FRESCO with the verification orbit 2510, but also 2509, is also found for SCIAMACHY data on Near-Real-Time orbits since April 28, 2004 (Figures 7 and 8). Indeed, beforehand, an error with a Near-Real-Time Level 1-2 processor
initialisation file prevented OCRA to retrieve accurate values of cloud fraction.
Another promising cloud algorithm (HICRU) is currently applied on SCIAMACHY data to retrieve cloud fraction. First results (Figure 9) showed that the retrieved cloud fractions agree well with the values obtained from GOME data and, also, with images from Meteosat [20].
3..2 Cloud top pressure
The comparison between SCIAMACHY operational Level 2 and FRESCO cloud top pressures from the reference orbit 2510 (August 23, 2002) underlines a strong disagreement. Indeed, while FRESCO provides a consistent set of cloud parameters (simultaneous retrieval), the operational product is derived from the ISCCP monthly mean cloud top height database, which is a climatology based on measurements of clouds from satellites (MeteoSat, GMS, GOES and NOAA). However, in a future version of the operational processor, an oxygen band algorithm for cloud top pressure retrieval will be included.
This is corroborated in the comparison of the SCIAMACHY operational product (Figure 10) and FRESCO
(Figure 11) retrieved results with MODIS [21] co-located values for the orbit 2510. MODIS Level 2 granules overlapping the SCIAMACHY 2510 orbit are processed. While the operational product exhibits important differences with MODIS values, FRESCO shows a reasonable agreement with differences about 100 hPa.
Furthermore, in Figure 12, the retrieved cloud top pressures from FRESCO (blue), the O2-O2 method (red) and the operational product (black) are compared with MODIS co-located values in the case of
the orbit 2510. For FRESCO and the O2-O2 method, only the retrieved values concerning optically thick clouds are considered (cloud optical thickness of 5 or more). This improves the correlation of FRESCO with MODIS obtained in Figure 11 and confirms the slight overestimation in FRESCO retrieved values. To complete this validation, there are also other algorithms which should be employed such as SACURA (see http://www.ww.iup.physik.uni-bremen.de/scia-arc) providing cloud top pressure retrieval (dataset not yet available on-line) using SCIAMACHY data [13].
4. CONCLUSION
To validate SCIAMACHY cloud products, an intercomparison has been undertaken between the results of the operational algorithm OCRA and other algorithms such as FRESCO or the O2-O2 method. Moreover, the validation has been extended with MODIS co-located data in the case of the cloud top pressure. This shows that OCRA operational Level 2 cloud fraction product correlates well with FRESCO and the O2-O2 method using SCIAMACHY data. The accuracy of this product is about 0.1, as compared to FRESCO, and could even be improved by correcting from the scanning angle dependency. However, for the current implementation of the OCRA method in the operational SCIAMACHY processor, this is the first, and encouraging validation study. Further studies will be needed to define OCRA optimised parameter settings. In terms of cloud top pressure, FRESCO matches well the MODIS values with an ac-
curacy about 100 hPa while SCIAMACHY operational product is derived from a climatological database. Therefore, FRESCO provides a consistent set of cloud parameters by its simultaneous retrieval. The validation of these cloud products should be completed by using other available algorithms such as HICRU (cloud fraction) or SACURA (cloud top pressure) which evaluate independently cloud fraction and cloud top pressure.
Acknowledgements
The work performed for this publication is (partly) financed by the Netherlands Agency for Aerospace Programmes (NIVR).
5. REFERENCES
1. Burrows, J. P., et al., The Global Ozone Monitoring Experiment (GOME): Mission Concept and First Scientific Results, J. Atm. Sci., 56, 151–175, 1999.
2. Bovensmann H., J. P. Burrows, M. Buchwitz, J. Frerick, S. Noel, V. Rozanov, K.V. Chance and A.P.H. Goede, SCIAMACHY: Mission objectives and measurement modes', J. Atm. Sci., 56, 127–150, 1999.
3. Koelemeijer R.B.A., and P. Stammes, Effects of clouds on the ozone column retrievalfrom GOME UV measurements, J. Geophys. Res., D, 104, 8281-8294, 1999a.
4. Newchurch, M. J., X. Liu, J. H. Kim, P. K. Bhartia, On the accuracy of Total Ozone Mapping Spectrometer retrievals over tropical cloudy regions, J. Geophys. Res., 106 (D23), 32315-32326, 10.1029/2000JD000151, 2001.
5.Boersma K. F., H. J. Eskes, E. J. Brinksma, Error analysis for tropospheric NO2 retrieval from space, J. Geophys. Res., 109, doi:10.1029/2003JD003962, 2004.
6. Valks, P.J.M., A.J.M. Piters, J.C. Lambert, C. Zehner and H. Kelder, A Fast Delivery System for the retrieval of near-real time ozone columns from GOME data, Int. J. Remote Sensing, 24, 423-436, 2003a.
7. Von Bargen, A., T. P. Kurosu, K. Chance,
|
D.
| 19,356
|
end_of_word
|
Chance,
|
remove_all
|
<url>
http://www.temis.nl/fresco/ESC01PS.pdf
</url>
<text>
SCIAMACHY CLOUD PRODUCT VALIDATION
N. Fournier ∗ (1) , P . Stammes (1) , J. R. Acarreta (1) , H. Eskes (1) , A. Piters (1) , M. Hess (2) , A. von Bargen (2) , A. Kokhanovsky (3) , and M. Grzegorski (4)
(1)KNMI, Climate Research and Seismology Department, De Bilt, The Netherlands (2)DLR/IMF, German Aerospace Center, Remote Sensing Technology Institute, Wessling, Germany (3)Institute of Remote Sensing, University of Bremen, Germany (4)Institute of Environmental Physics, University of Heidelberg, Germany
Abstract
Radiative scattering by clouds leads to errors in the retrieval of column densities and concentration profiles of atmospheric trace gas species from satellites. The SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY (SCIAMACHY) instrument on the Envisat satellite, principally designed to retrieve trace gases in the atmosphere, is also capable of detecting clouds. Cloud fraction is retrieved using the Optical Cloud Recognition Algorithm (OCRA). In this paper, this Level 2 operational cloud product is compared to the results from other cloud algorithms such as FRESCO (Fast Retrieval Scheme for Clouds from the Oxygen A-band). It is shown that the retrieved cloud fractions correlate well between OCRA and FRESCO since the 28 th April 2004. FRESCO provides a consistent set of cloud products by retrieving simultaneously cloud fraction and cloud top pressure. Moreover, FRESCO retrievals are corroborated with cloud top pressure from MODIS. Other algorithms such as HICRU (cloud fraction) and SACURA (cloud top pressure) are also available to validate independently these cloud products.
able to operate with new viewing geometries namely limb and sun, moon occultations. The primary scientific objective of SCIAMACHY is the global measurement of various trace gases on a global scale [2].
Key words: FRESCO; OCRA; cloud fraction; cloud top pressure.
1. INTRODUCTION
SCIAMACHY (SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY) is a spaceborne spectrometer that flies on Envisat since March 2002. The instrument is a national contribution by Germany-DLR, the Netherlands-NIVR and BelgiumBUSOC to the European Space Agency satellite Envisat. SCIAMACHY measures the solar radiation reflected from the atmosphere in the wavelength range between 240 and 2380 nm. This is recorded at relatively high resolution (0.2 to 1.5 nm) over the range 240 to 1750 nm, and in selected regions between 2000 and 2400 nm. SCIAMACHY is extended as compared to its precursor GOME (Global Ozone Monitoring Experiment; [1]) with a wavelength range extending in the near IR region and
∗ Corresponding author : [email protected]; Tel : +31 (0) 30 2206
The trace gases that SCIAMACHY detects, like O3, NO2, BrO, SO2, CO and CH4, occur not only in the stratosphere but also in the troposphere, where clouds reside. To detect these trace gases accurately, the presence and properties of clouds have to be known, in order to correct for the effect of clouds. The three cloud parameters that most strongly influence trace gas measurements are: cloud fraction, cloud albedo or cloud optical thickness, and cloud top pressure. Microphysical cloud parameters, like particle size and shape, are of minor importance [3].
Clouds affect the path of photons through the atmosphere and therefore change the interpretation of the depth of an absorption band. Taking ozone as an example, the effect of clouds on ozone retrieval can be regarded as due to two main effects [3]: (1) albedo effect: clouds act as a reflecting boundary below the ozone layer and enhance the depth of the ozone absorption bands, and (2) ghost column effect: clouds shield tropospheric ozone from observation. A third, smaller effect exists, which is the enhancement of the photon path inside clouds, causing an enhancement of the absorption line depth inside clouds [4].
In order to correct for the albedo effect of clouds, it is necessary to retrieve the cloud fraction and cloud albedo (or cloud optical thickness) or, equivalently, the product of cloud fraction and cloud albedo, which we call the effective cloud fraction. In order to correct for the ghost column effect of clouds, it is necessary to retrieve both the effective cloud fraction and the cloud top pressure.
The above cloud effects not only occur for O3 but also for other gases. Especially for NO2, much of which is residing in the troposphere in polluted circumstances, the ghost column effect is very important [5]. Therefore, a cloud detection algorithm suitable for trace gas retrievals for SCIAMACHY should be able to detect at least effective cloud fraction and cloud pressure. If the cloud
pressure is available, then the tropospheric ozone column can be determined by comparing cloudy and clear pixels, using the convective-cloud-differential technique [6].
This paper is devoted to the SCIAMACHY cloud products' validation. The operational Level 2 cloud fraction from OCRA is investigated and compared with the retrievals obtained from FRESCO. Moreover, the scientific cloud top pressure product from FRESCO is compared to results from the O2-O2 method and from another satellite instrument, namely MODIS on EOS/Terra.
2. Cloud retrieval techniques for SCIAMACHY
For reasons of timeliness and co-location, it is most practical to retrieve cloud parameters from the SCIAMACHY data itself. To this aim various SCIAMACHY channels and atmospheric absorption bands can be chosen. In the case of GOME, the Polarisation Measurement Devices (PMDs) had been used by several groups to detect cloud fraction. The advantage of the PMDs is that they have a better spatial resolution than the spectral channels. Reference [7] have developed various cloud algorithms for GOME, among which the Optical Cloud Recognition Algorithm (OCRA) technique. This technique uses the color of PMD images to select cloud free scenes for a global database of cloud free reflectances. The difference between the current PMD reflectances and this cloud free database is used to retrieve cloud fractions. To detect cloud pressure, however, the PMDs cannot be used because they have insufficient spectral resolution to detect absorption lines of well-mixed absorbers like oxygen. In the SCIAMACHY range there are several oxygen or oxygen-oxygen absorption bands. The strongest band is the O2 A-band at 760 nm. Figure 1 shows the absorption lines of Oxygen in this region.
There is also the weaker O2 B-band around 680 nm, and several weak O2-O2 lines. The Initial Cloud Fitting Algorithm (ICFA), which is used in the operational data processing of GOME, uses the O 2 A-band [8], [9]. ICFA only produces the cloud fraction; cloud pressure is taken from a climatology. Validation of ICFA has been performed by [9], and it was shown that ICFA produces inaccurate cloud fractions. The GOME-CAT (Cloud retrieval algorithm) method [10] uses a combination of PMD data and O 2 A-band data to retrieve cloud fraction, cloud optical thickness and cloud pressure. In the results of this algorithm, however, the cloud optical thickness appears to be unreliable.
Recently, an intercomparison of different cloud retrieval algorithms that exist for GOME was published by [11]. They compared ICFA, OCRA and FRESCO cloud fractions with groundbased synoptical observations. It was shown that the effective cloud fraction as used by FRESCO underestimates the real cloud fraction for optically thin clouds, as expected, but correlates well with synoptical cloud observations. Other recent cloud algorithm comparisons for GOME and SCIAMACHY have been performed. Reference [12] developed an advanced PMD technique for cloud fraction retrieval, called HICRU (Heidelberg Iterative Cloud Retrieval Utilities). SACURA (SemiAnalytical CloUd Retrieval Algorithm) from [13] determines the cloud top pressure and geometrical thickness using measurements of the cloud reflection function.
Apart from the O2 A-band, also the 477-nm absorption band of the collision-complex O2-O2 has been used for retrieval of cloud fraction and cloud pressure from GOME [14]. The O2-O2 method will be used as operational cloud detection method for OMI, to be launched on board of EOS-Aura in July 2004. The O2-O2 method is more sensitive to low clouds than to high clouds, due to the pressure-squared dependence.
Another atmospheric scattering process that can be used for cloud pressure retrieval is Raman scattering. Raman scattering is the inelastic part of Rayleigh scattering by nitrogen and oxygen, which fills-in solar Fraunhofer lines in scattered light from the Earth. The amount of filling-in is more or less proportional to the pressure of the cloud. Recently, this Raman method has been successfully applied to GOME data [15].
In cloud retrievals from satellite, it is very important to have a good estimate of the surface albedo. The reason is that cloud detection is usually performed by comparing the measured reflectivity with the expected reflectivity from a cloud-free scene. Recently, a new spectral surface albedo database based on 5.5 years of GOME data has been published [16]. This database is freely available and is used in FRESCO in this study.
2..1 FRESCO method
The FRESCO (Fast Retrieval Scheme for Cloud Observables) method has been developed by [17] as a simple, fast, and robust algorithm to provide cloud information for cloud correction of ozone. FRESCO uses the reflectivity in three 1-nm wide windows of the O 2 A-band: 758-759 nm, 760-761 nm, and 765-766 nm. The measured reflectivity is compared to a modeled reflectivity, as computed for a simple cloud model. In this model the cloud is assumed to be a Lambertian reflector with albedo 0.8 below a clear atmosphere, in which only O 2 absorption is taken into account. To simulate the spectrum of a partly cloudy pixel, a simple atmospheric transmission model is used, in which the atmosphere above the ground surface (for the clear part of the pixel) or cloud (for the cloudy part of the pixel) is treated as a purely absorbing, non-scattering, medium. The retrieved parameters are the effective cloud fraction (between 0 and 1) and the cloud pressure. Absorption by oxygen inside the cloud is neglected.
FRESCO is used in the fast-delivery processing of GOME ozone data [18] and in the SCIAMACHY ozone processor TOSOMI, which provides ozone data from SCIAMACHY within the ESA TEMIS project (see http://www.temis.nl).
FRESCO has been validated regionally and globally [17], [13], [11], and is proven to be reliable. However, FRESCO overestimates the cloud fraction retrievals over the Sahara region. This is under investigation but a possible explanation could be the higher albedo over this desert, from sand and aerosols, than in the low resolution surface albedo database used by FRESCO. Secondly, FRESCO overestimates cloud top pressure by on average about 50 hPa, as compared to infrared techniques. A possible reason is the fact that photon paths inside the cloud enhance the O2 A band depth. We note that for cloud correction of ozone and other trace gases, a qualitatively similar path enhancement is expected.
2..2 OCRA method
OCRA was developed by [19]. It is a PMD algorithm using the "red", "green" and "blue" PMDs for cloud fraction determination. The cloud fraction is calculated from a linear interpolation of the current PMD reflectance between a minimum (cloud free) value and a maximum (totally cloudy) value, the latter being fixed by scaling factors. An average of the results of the three PMDs is used. Reflectances of cloud free scenes are stored on a global grid. They are determined once from a large set of historic data using color distances between measured PMD color and the white point in the chromaticity diagram. Reflectances with the largest distance to the white point are selected to represent the cloud free case at a certain grid point. Currently, a database calculated from GOME PMD measurements is applied. For the totally cloudy case, one scaling factor is used for each PMD, representing the maximum reflectance.
3. VALIDATION RESULTS
In this section we directly intercompare the retrieved cloud paramaters from the different cloud algorithms. More specifically, results obtained by applying the FRESCO algorithm to SCIAMACHY data are compared with the equivalent Level 2 operational cloud fraction from OCRA. Moreover, the retrieved cloud top pressure results are assessed against another satellite instrument based values (MODIS).
3..1 Cloud fraction
Firstly, Figure 2 illustrates a comparison between OCRA and FRESCO cloud fraction retrievals for the validation reference dataset. This dataset corresponds to the states shown in Figure 3 covering the period from August to October 2002. A good agreement is obtained between OCRA and FRESCO with a standard deviation of 0.1. The discrepancies at the cloud fraction value of 1.0 are due to FRESCO algorithm assumptions at high latitudes. Indeed, in these regions, the algorithm switches to snow/ice mode where an effective cloud fraction of 1.0 is assumed.
Fig. 2. Comparison of cloud fraction derived from SCIAMACHY Data between OCRA (Scia) and FRESCO (Tosomi) retrieval cloud algorithms for the validation reference dataset.
Secondly, a more specific comparison between OCRA and FRESCO cloud fraction retrievals is shown in Figure 4. This concerns the SCIAMACHY data from the reference orbit 2510 (August 23, 2002). It is clear that both cloud fractions correlate well. The linear fit gives a determination coefficient (R 2 ) of 0.95 with a slope of 0.94.
However, plotting the cloud fraction difference between OCRA and FRESCO as a function of the viewing zenith angle (Figure 5) for the same orbit produces a rather surprising parabolic response. It was found that this dependency in scanning angle is due to an inadequate definition of reflectances in OCRA, which takes the
Fig. 3. SCIAMACHY measurements locations corresponding to the validation reference dataset used in the comparison between OCRA and FRESCO cloud fractions of Figure 2. The measurements date from the period from August to October 2002.
cosine of this angle into account.
Furthermore, in Figure 6 the retrieved cloud fractions from both FRESCO and the O2-O2 method are compared with OCRA values in the case of the orbit 2510, corroborating the previous results.
The good correlation in the retrieved cloud fraction values between OCRA and FRESCO with the verification orbit 2510, but also 2509, is also found for SCIAMACHY data on Near-Real-Time orbits since April 28, 2004 (Figures 7 and 8). Indeed, beforehand, an error with a Near-Real-Time Level 1-2 processor
initialisation file prevented OCRA to retrieve accurate values of cloud fraction.
Another promising cloud algorithm (HICRU) is currently applied on SCIAMACHY data to retrieve cloud fraction. First results (Figure 9) showed that the retrieved cloud fractions agree well with the values obtained from GOME data and, also, with images from Meteosat [20].
3..2 Cloud top pressure
The comparison between SCIAMACHY operational Level 2 and FRESCO cloud top pressures from the reference orbit 2510 (August 23, 2002) underlines a strong disagreement. Indeed, while FRESCO provides a consistent set of cloud parameters (simultaneous retrieval), the operational product is derived from the ISCCP monthly mean cloud top height database, which is a climatology based on measurements of clouds from satellites (MeteoSat, GMS, GOES and NOAA). However, in a future version of the operational processor, an oxygen band algorithm for cloud top pressure retrieval will be included.
This is corroborated in the comparison of the SCIAMACHY operational product (Figure 10) and FRESCO
(Figure 11) retrieved results with MODIS [21] co-located values for the orbit 2510. MODIS Level 2 granules overlapping the SCIAMACHY 2510 orbit are processed. While the operational product exhibits important differences with MODIS values, FRESCO shows a reasonable agreement with differences about 100 hPa.
Furthermore, in Figure 12, the retrieved cloud top pressures from FRESCO (blue), the O2-O2 method (red) and the operational product (black) are compared with MODIS co-located values in the case of
the orbit 2510. For FRESCO and the O2-O2 method, only the retrieved values concerning optically thick clouds are considered (cloud optical thickness of 5 or more). This improves the correlation of FRESCO with MODIS obtained in Figure 11 and confirms the slight overestimation in FRESCO retrieved values. To complete this validation, there are also other algorithms which should be employed such as SACURA (see http://www.ww.iup.physik.uni-bremen.de/scia-arc) providing cloud top pressure retrieval (dataset not yet available on-line) using SCIAMACHY data [13].
4. CONCLUSION
To validate SCIAMACHY cloud products, an intercomparison has been undertaken between the results of the operational algorithm OCRA and other algorithms such as FRESCO or the O2-O2 method. Moreover, the validation has been extended with MODIS co-located data in the case of the cloud top pressure. This shows that OCRA operational Level 2 cloud fraction product correlates well with FRESCO and the O2-O2 method using SCIAMACHY data. The accuracy of this product is about 0.1, as compared to FRESCO, and could even be improved by correcting from the scanning angle dependency. However, for the current implementation of the OCRA method in the operational SCIAMACHY processor, this is the first, and encouraging validation study. Further studies will be needed to define OCRA optimised parameter settings. In terms of cloud top pressure, FRESCO matches well the MODIS values with an ac-
curacy about 100 hPa while SCIAMACHY operational product is derived from a climatological database. Therefore, FRESCO provides a consistent set of cloud parameters by its simultaneous retrieval. The validation of these cloud products should be completed by using other available algorithms such as HICRU (cloud fraction) or SACURA (cloud top pressure) which evaluate independently cloud fraction and cloud top pressure.
Acknowledgements
The work performed for this publication is (partly) financed by the Netherlands Agency for Aerospace Programmes (NIVR).
5. REFERENCES
1. Burrows, J. P., et al., The Global Ozone Monitoring Experiment (GOME): Mission Concept and First Scientific Results, J. Atm. Sci., 56, 151–175, 1999.
2. Bovensmann H., J. P. Burrows, M. Buchwitz, J. Frerick, S. Noel, V. Rozanov, K.V. Chance and A.P.H. Goede, SCIAMACHY: Mission objectives and measurement modes', J. Atm. Sci., 56, 127–150, 1999.
3. Koelemeijer R.B.A., and P. Stammes, Effects of clouds on the ozone column retrievalfrom GOME UV measurements, J. Geophys. Res., D, 104, 8281-8294, 1999a.
4. Newchurch, M. J., X. Liu, J. H. Kim, P. K. Bhartia, On the accuracy of Total Ozone Mapping Spectrometer retrievals over tropical cloudy regions, J. Geophys. Res., 106 (D23), 32315-32326, 10.1029/2000JD000151, 2001.
5.Boersma K. F., H. J. Eskes, E. J. Brinksma, Error analysis for tropospheric NO2 retrieval from space, J. Geophys. Res., 109, doi:10.1029/2003JD003962, 2004.
6. Valks, P.J.M., A.J.M. Piters, J.C. Lambert, C. Zehner and H. Kelder, A Fast Delivery System for the retrieval of near-real time ozone columns from GOME data, Int. J. Remote Sensing, 24, 423-436, 2003a.
7. Von Bargen, A., T. P. Kurosu, K. Chance,<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.temis.nl/fresco/ESC01PS.pdf\n</url>\n<text>\nSCIAMACHY CLOUD PRODUCT VALIDATION\n\nN. Fournier ∗ (1) , P . Stammes (1) , J. R. Acarreta (1) , H. Eskes (1) , A. Piters (1) , M. Hess (2) , A. von Bargen (2) , A. Kokhanovsky (3) , and M. Grzegorski (4)\n\n(1)KNMI, Climate Research and Seismology Department, De Bilt, The Netherlands (2)DLR/IMF, German Aerospace Center, Remote Sensing Technology Institute, Wessling, Germany (3)Institute of Remote Sensing, University of Bremen, Germany (4)Institute of Environmental Physics, University of Heidelberg, Germany\n\nAbstract\n\nRadiative scattering by clouds leads to errors in the retrieval of column densities and concentration profiles of atmospheric trace gas species from satellites. The SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY (SCIAMACHY) instrument on the Envisat satellite, principally designed to retrieve trace gases in the atmosphere, is also capable of detecting clouds. Cloud fraction is retrieved using the Optical Cloud Recognition Algorithm (OCRA). In this paper, this Level 2 operational cloud product is compared to the results from other cloud algorithms such as FRESCO (Fast Retrieval Scheme for Clouds from the Oxygen A-band). It is shown that the retrieved cloud fractions correlate well between OCRA and FRESCO since the 28 th April 2004. FRESCO provides a consistent set of cloud products by retrieving simultaneously cloud fraction and cloud top pressure. Moreover, FRESCO retrievals are corroborated with cloud top pressure from MODIS. Other algorithms such as HICRU (cloud fraction) and SACURA (cloud top pressure) are also available to validate independently these cloud products.\n\nable to operate with new viewing geometries namely limb and sun, moon occultations. The primary scientific objective of SCIAMACHY is the global measurement of various trace gases on a global scale [2].\n\nKey words: FRESCO; OCRA; cloud fraction; cloud top pressure.\n\n1. INTRODUCTION\n\nSCIAMACHY (SCanning Imaging Absorption SpectroMeter for Atmospheric CHartographY) is a spaceborne spectrometer that flies on Envisat since March 2002. The instrument is a national contribution by Germany-DLR, the Netherlands-NIVR and BelgiumBUSOC to the European Space Agency satellite Envisat. SCIAMACHY measures the solar radiation reflected from the atmosphere in the wavelength range between 240 and 2380 nm. This is recorded at relatively high resolution (0.2 to 1.5 nm) over the range 240 to 1750 nm, and in selected regions between 2000 and 2400 nm. SCIAMACHY is extended as compared to its precursor GOME (Global Ozone Monitoring Experiment; [1]) with a wavelength range extending in the near IR region and\n\n∗ Corresponding author : [email protected]; Tel : +31 (0) 30 2206\n\nThe trace gases that SCIAMACHY detects, like O3, NO2, BrO, SO2, CO and CH4, occur not only in the stratosphere but also in the troposphere, where clouds reside. To detect these trace gases accurately, the presence and properties of clouds have to be known, in order to correct for the effect of clouds. The three cloud parameters that most strongly influence trace gas measurements are: cloud fraction, cloud albedo or cloud optical thickness, and cloud top pressure. Microphysical cloud parameters, like particle size and shape, are of minor importance [3].\n\nClouds affect the path of photons through the atmosphere and therefore change the interpretation of the depth of an absorption band. Taking ozone as an example, the effect of clouds on ozone retrieval can be regarded as due to two main effects [3]: (1) albedo effect: clouds act as a reflecting boundary below the ozone layer and enhance the depth of the ozone absorption bands, and (2) ghost column effect: clouds shield tropospheric ozone from observation. A third, smaller effect exists, which is the enhancement of the photon path inside clouds, causing an enhancement of the absorption line depth inside clouds [4].\n\nIn order to correct for the albedo effect of clouds, it is necessary to retrieve the cloud fraction and cloud albedo (or cloud optical thickness) or, equivalently, the product of cloud fraction and cloud albedo, which we call the effective cloud fraction. In order to correct for the ghost column effect of clouds, it is necessary to retrieve both the effective cloud fraction and the cloud top pressure.\n\nThe above cloud effects not only occur for O3 but also for other gases. Especially for NO2, much of which is residing in the troposphere in polluted circumstances, the ghost column effect is very important [5]. Therefore, a cloud detection algorithm suitable for trace gas retrievals for SCIAMACHY should be able to detect at least effective cloud fraction and cloud pressure. If the cloud\n\npressure is available, then the tropospheric ozone column can be determined by comparing cloudy and clear pixels, using the convective-cloud-differential technique [6].\n\nThis paper is devoted to the SCIAMACHY cloud products' validation. The operational Level 2 cloud fraction from OCRA is investigated and compared with the retrievals obtained from FRESCO. Moreover, the scientific cloud top pressure product from FRESCO is compared to results from the O2-O2 method and from another satellite instrument, namely MODIS on EOS/Terra.\n\n2. Cloud retrieval techniques for SCIAMACHY\n\nFor reasons of timeliness and co-location, it is most practical to retrieve cloud parameters from the SCIAMACHY data itself. To this aim various SCIAMACHY channels and atmospheric absorption bands can be chosen. In the case of GOME, the Polarisation Measurement Devices (PMDs) had been used by several groups to detect cloud fraction. The advantage of the PMDs is that they have a better spatial resolution than the spectral channels. Reference [7] have developed various cloud algorithms for GOME, among which the Optical Cloud Recognition Algorithm (OCRA) technique. This technique uses the color of PMD images to select cloud free scenes for a global database of cloud free reflectances. The difference between the current PMD reflectances and this cloud free database is used to retrieve cloud fractions. To detect cloud pressure, however, the PMDs cannot be used because they have insufficient spectral resolution to detect absorption lines of well-mixed absorbers like oxygen. In the SCIAMACHY range there are several oxygen or oxygen-oxygen absorption bands. The strongest band is the O2 A-band at 760 nm. Figure 1 shows the absorption lines of Oxygen in this region.\n\nThere is also the weaker O2 B-band around 680 nm, and several weak O2-O2 lines. The Initial Cloud Fitting Algorithm (ICFA), which is used in the operational data processing of GOME, uses the O 2 A-band [8], [9]. ICFA only produces the cloud fraction; cloud pressure is taken from a climatology. Validation of ICFA has been performed by [9], and it was shown that ICFA produces inaccurate cloud fractions. The GOME-CAT (Cloud retrieval algorithm) method [10] uses a combination of PMD data and O 2 A-band data to retrieve cloud fraction, cloud optical thickness and cloud pressure. In the results of this algorithm, however, the cloud optical thickness appears to be unreliable.\n\nRecently, an intercomparison of different cloud retrieval algorithms that exist for GOME was published by [11]. They compared ICFA, OCRA and FRESCO cloud fractions with groundbased synoptical observations. It was shown that the effective cloud fraction as used by FRESCO underestimates the real cloud fraction for optically thin clouds, as expected, but correlates well with synoptical cloud observations. Other recent cloud algorithm comparisons for GOME and SCIAMACHY have been performed. Reference [12] developed an advanced PMD technique for cloud fraction retrieval, called HICRU (Heidelberg Iterative Cloud Retrieval Utilities). SACURA (SemiAnalytical CloUd Retrieval Algorithm) from [13] determines the cloud top pressure and geometrical thickness using measurements of the cloud reflection function.\n\nApart from the O2 A-band, also the 477-nm absorption band of the collision-complex O2-O2 has been used for retrieval of cloud fraction and cloud pressure from GOME [14]. The O2-O2 method will be used as operational cloud detection method for OMI, to be launched on board of EOS-Aura in July 2004. The O2-O2 method is more sensitive to low clouds than to high clouds, due to the pressure-squared dependence.\n\nAnother atmospheric scattering process that can be used for cloud pressure retrieval is Raman scattering. Raman scattering is the inelastic part of Rayleigh scattering by nitrogen and oxygen, which fills-in solar Fraunhofer lines in scattered light from the Earth. The amount of filling-in is more or less proportional to the pressure of the cloud. Recently, this Raman method has been successfully applied to GOME data [15].\n\nIn cloud retrievals from satellite, it is very important to have a good estimate of the surface albedo. The reason is that cloud detection is usually performed by comparing the measured reflectivity with the expected reflectivity from a cloud-free scene. Recently, a new spectral surface albedo database based on 5.5 years of GOME data has been published [16]. This database is freely available and is used in FRESCO in this study.\n\n2..1 FRESCO method\n\nThe FRESCO (Fast Retrieval Scheme for Cloud Observables) method has been developed by [17] as a simple, fast, and robust algorithm to provide cloud information for cloud correction of ozone. FRESCO uses the reflectivity in three 1-nm wide windows of the O 2 A-band: 758-759 nm, 760-761 nm, and 765-766 nm. The measured reflectivity is compared to a modeled reflectivity, as computed for a simple cloud model. In this model the cloud is assumed to be a Lambertian reflector with albedo 0.8 below a clear atmosphere, in which only O 2 absorption is taken into account. To simulate the spectrum of a partly cloudy pixel, a simple atmospheric transmission model is used, in which the atmosphere above the ground surface (for the clear part of the pixel) or cloud (for the cloudy part of the pixel) is treated as a purely absorbing, non-scattering, medium. The retrieved parameters are the effective cloud fraction (between 0 and 1) and the cloud pressure. Absorption by oxygen inside the cloud is neglected.\n\nFRESCO is used in the fast-delivery processing of GOME ozone data [18] and in the SCIAMACHY ozone processor TOSOMI, which provides ozone data from SCIAMACHY within the ESA TEMIS project (see http://www.temis.nl).\n\nFRESCO has been validated regionally and globally [17], [13], [11], and is proven to be reliable. However, FRESCO overestimates the cloud fraction retrievals over the Sahara region. This is under investigation but a possible explanation could be the higher albedo over this desert, from sand and aerosols, than in the low resolution surface albedo database used by FRESCO. Secondly, FRESCO overestimates cloud top pressure by on average about 50 hPa, as compared to infrared techniques. A possible reason is the fact that photon paths inside the cloud enhance the O2 A band depth. We note that for cloud correction of ozone and other trace gases, a qualitatively similar path enhancement is expected.\n\n2..2 OCRA method\n\nOCRA was developed by [19]. It is a PMD algorithm using the \"red\", \"green\" and \"blue\" PMDs for cloud fraction determination. The cloud fraction is calculated from a linear interpolation of the current PMD reflectance between a minimum (cloud free) value and a maximum (totally cloudy) value, the latter being fixed by scaling factors. An average of the results of the three PMDs is used. Reflectances of cloud free scenes are stored on a global grid. They are determined once from a large set of historic data using color distances between measured PMD color and the white point in the chromaticity diagram. Reflectances with the largest distance to the white point are selected to represent the cloud free case at a certain grid point. Currently, a database calculated from GOME PMD measurements is applied. For the totally cloudy case, one scaling factor is used for each PMD, representing the maximum reflectance.\n\n3. VALIDATION RESULTS\n\nIn this section we directly intercompare the retrieved cloud paramaters from the different cloud algorithms. More specifically, results obtained by applying the FRESCO algorithm to SCIAMACHY data are compared with the equivalent Level 2 operational cloud fraction from OCRA. Moreover, the retrieved cloud top pressure results are assessed against another satellite instrument based values (MODIS).\n\n3..1 Cloud fraction\n\nFirstly, Figure 2 illustrates a comparison between OCRA and FRESCO cloud fraction retrievals for the validation reference dataset. This dataset corresponds to the states shown in Figure 3 covering the period from August to October 2002. A good agreement is obtained between OCRA and FRESCO with a standard deviation of 0.1. The discrepancies at the cloud fraction value of 1.0 are due to FRESCO algorithm assumptions at high latitudes. Indeed, in these regions, the algorithm switches to snow/ice mode where an effective cloud fraction of 1.0 is assumed.\n\nFig. 2. Comparison of cloud fraction derived from SCIAMACHY Data between OCRA (Scia) and FRESCO (Tosomi) retrieval cloud algorithms for the validation reference dataset.\n\nSecondly, a more specific comparison between OCRA and FRESCO cloud fraction retrievals is shown in Figure 4. This concerns the SCIAMACHY data from the reference orbit 2510 (August 23, 2002). It is clear that both cloud fractions correlate well. The linear fit gives a determination coefficient (R 2 ) of 0.95 with a slope of 0.94.\n\nHowever, plotting the cloud fraction difference between OCRA and FRESCO as a function of the viewing zenith angle (Figure 5) for the same orbit produces a rather surprising parabolic response. It was found that this dependency in scanning angle is due to an inadequate definition of reflectances in OCRA, which takes the\n\nFig. 3. SCIAMACHY measurements locations corresponding to the validation reference dataset used in the comparison between OCRA and FRESCO cloud fractions of Figure 2. The measurements date from the period from August to October 2002.\n\ncosine of this angle into account.\n\nFurthermore, in Figure 6 the retrieved cloud fractions from both FRESCO and the O2-O2 method are compared with OCRA values in the case of the orbit 2510, corroborating the previous results.\n\nThe good correlation in the retrieved cloud fraction values between OCRA and FRESCO with the verification orbit 2510, but also 2509, is also found for SCIAMACHY data on Near-Real-Time orbits since April 28, 2004 (Figures 7 and 8). Indeed, beforehand, an error with a Near-Real-Time Level 1-2 processor\n\ninitialisation file prevented OCRA to retrieve accurate values of cloud fraction.\n\nAnother promising cloud algorithm (HICRU) is currently applied on SCIAMACHY data to retrieve cloud fraction. First results (Figure 9) showed that the retrieved cloud fractions agree well with the values obtained from GOME data and, also, with images from Meteosat [20].\n\n3..2 Cloud top pressure\n\nThe comparison between SCIAMACHY operational Level 2 and FRESCO cloud top pressures from the reference orbit 2510 (August 23, 2002) underlines a strong disagreement. Indeed, while FRESCO provides a consistent set of cloud parameters (simultaneous retrieval), the operational product is derived from the ISCCP monthly mean cloud top height database, which is a climatology based on measurements of clouds from satellites (MeteoSat, GMS, GOES and NOAA). However, in a future version of the operational processor, an oxygen band algorithm for cloud top pressure retrieval will be included.\n\nThis is corroborated in the comparison of the SCIAMACHY operational product (Figure 10) and FRESCO\n\n(Figure 11) retrieved results with MODIS [21] co-located values for the orbit 2510. MODIS Level 2 granules overlapping the SCIAMACHY 2510 orbit are processed. While the operational product exhibits important differences with MODIS values, FRESCO shows a reasonable agreement with differences about 100 hPa.\n\nFurthermore, in Figure 12, the retrieved cloud top pressures from FRESCO (blue), the O2-O2 method (red) and the operational product (black) are compared with MODIS co-located values in the case of\n\nthe orbit 2510. For FRESCO and the O2-O2 method, only the retrieved values concerning optically thick clouds are considered (cloud optical thickness of 5 or more). This improves the correlation of FRESCO with MODIS obtained in Figure 11 and confirms the slight overestimation in FRESCO retrieved values. To complete this validation, there are also other algorithms which should be employed such as SACURA (see http://www.ww.iup.physik.uni-bremen.de/scia-arc) providing cloud top pressure retrieval (dataset not yet available on-line) using SCIAMACHY data [13].\n\n4. CONCLUSION\n\nTo validate SCIAMACHY cloud products, an intercomparison has been undertaken between the results of the operational algorithm OCRA and other algorithms such as FRESCO or the O2-O2 method. Moreover, the validation has been extended with MODIS co-located data in the case of the cloud top pressure. This shows that OCRA operational Level 2 cloud fraction product correlates well with FRESCO and the O2-O2 method using SCIAMACHY data. The accuracy of this product is about 0.1, as compared to FRESCO, and could even be improved by correcting from the scanning angle dependency. However, for the current implementation of the OCRA method in the operational SCIAMACHY processor, this is the first, and encouraging validation study. Further studies will be needed to define OCRA optimised parameter settings. In terms of cloud top pressure, FRESCO matches well the MODIS values with an ac-\n\ncuracy about 100 hPa while SCIAMACHY operational product is derived from a climatological database. Therefore, FRESCO provides a consistent set of cloud parameters by its simultaneous retrieval. The validation of these cloud products should be completed by using other available algorithms such as HICRU (cloud fraction) or SACURA (cloud top pressure) which evaluate independently cloud fraction and cloud top pressure.\n\nAcknowledgements\n\nThe work performed for this publication is (partly) financed by the Netherlands Agency for Aerospace Programmes (NIVR).\n\n5. REFERENCES\n\n1. Burrows, J. P., et al., The Global Ozone Monitoring Experiment (GOME): Mission Concept and First Scientific Results, J. Atm. Sci., 56, 151–175, 1999.\n2. Bovensmann H., J. P. Burrows, M. Buchwitz, J. Frerick, S. Noel, V. Rozanov, K.V. Chance and A.P.H. Goede, SCIAMACHY: Mission objectives and measurement modes', J. Atm. Sci., 56, 127–150, 1999.\n3. Koelemeijer R.B.A., and P. Stammes, Effects of clouds on the ozone column retrievalfrom GOME UV measurements, J. Geophys. Res., D, 104, 8281-8294, 1999a.\n4. Newchurch, M. J., X. Liu, J. H. Kim, P. K. Bhartia, On the accuracy of Total Ozone Mapping Spectrometer retrievals over tropical cloudy regions, J. Geophys. Res., 106 (D23), 32315-32326, 10.1029/2000JD000151, 2001.\n5.Boersma K. F., H. J. Eskes, E. J. Brinksma, Error analysis for tropospheric NO2 retrieval from space, J. Geophys. Res., 109, doi:10.1029/2003JD003962, 2004.\n6. Valks, P.J.M., A.J.M. Piters, J.C. Lambert, C. Zehner and H. Kelder, A Fast Delivery System for the retrieval of near-real time ozone columns from GOME data, Int. J. Remote Sensing, 24, 423-436, 2003a.\n7. Von Bargen, A., T. P. Kurosu, K. Chance,<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": " D.",
"role": "assistant"
}
] |
|
School of Business and Nonprofit Management Course Syllabus
Course: SBNM 5610 – Marketing Analysis and Consumer Behavior - A12
Academic Year: 2013/14 Semester/Quad: Fall A
Credit Hours: 2
Prerequisites: none
Instructor: Paul T. Backlund
Phone: 1-847-920-1345 Fax: 1-847-920-1346
Email: [email protected]
Availability:
On line any time via e-mail. I will reply within 24 hours during the week and within 48 hours on weekends. Also, if necessary, telephone conversations can be requested (send email to request times).
Course Description:
This course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-tobusiness and, to a small extent, the nonprofit sector. The survey begins in this course and is completed in SBNM 5611, Advanced Marketing Management
Introductory Comments:
Welcome to the course. I look forward to exploring marketing management with you!
Perhaps the most important thing to note at the outset is that a very widely held misconception is that marketing is simply about advertising and promotion. While, advertising and promotional activities are a very important part of marketing, they are but a portion of marketing management. The discipline that we call marketing management involves a number of things. In essence, marketing management is the process of creating customer value, delivering that value and communicating that value:
Creating Value
•Strategy &
Planning
•Market Analysis &
Research
•Loyalty Programs
•Branding
•Product Design &
Pricing
Delivering Value
•Channel Design
•Managing Retailing & Wholesaling & Logistics
Communicating Value
•Designing & Managing Sales Function
•Advertising &
Promotion
•Events & PR
•Direct &
Interactive
Marketing
•Digital Marketing
1
While the activities involved with "communicating value" are the most visible to the general observer, actually more of the marketer's combined effort goes into "creating value" and "delivering value."
Course Materials:
REQUIRED
Textbook(s):
Marketing Management (Prentice Hall 14
Philip Kotler and Kevin Keller,
ISBN: 978-0-13-210292-6
(Note, this same textbook is also used for SBNM 5611. Approximately ½ of the book is covered in SBNM 5610 and the remainder is covered in SBNM 5611.)
Cases:
Several Harvard Business School (HBS) cases are utilized in this course. These cases will be distributed via Moodle and each student will have a corresponding copyright fee of $25.00 posted to their account.
Articles:
Articles from various business publications will be assigned via Moodle. Either a copy of the article, or a link to the article, will be posted.
OPTIONAL
There may be optional references or articles noted via Moodle.
Essential IDEA Objectives:
The essential objectives of this course (per the IDEA framework, a nationally recognized assessment tool used by many higher learning institutions) are:
1. Learning fundamental principles, generalizations, or theories.
2. Learning to apply course material (to improve thinking, problem solving, and decisions).
3. Learning to analyze and critically evaluate ideas, arguments, and points of view.
Specific Course Objectives:
This course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. Modules include strategic and marketing planning, consumer behavior, marketing and advertising research, segmentation strategies, branding, competitive and marketing mix strategies, and positioning concepts. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-to-business and, to a small extent, the nonprofit sector. The survey begins in SBNM 5610 and is completed in SBNM 5611.
Upon successful completion of SBNM 5610, students will have the ability to:
- Gather and assess information about customers' needs and buying patterns, and subsequently determine a product's value to potential customers.
th
Edition)
- Given a marketing decision facing a firm, determine what type of market research would be relevant to the decision. Make recommendations about how to gather that research; determine how much money should be spent; how to analyze the results; and be able to present findings to senior management.
- Given information about a product line's history, assess market situation, industry and competition to make recommendations for future marketing decisions regarding the product.
- Given information about a firm's size, history, and organizational structure, assess industry and market situation to recommend a process for successfully bringing a new product to market.
- Assess the relevance of ethical considerations on marketing decisions.
Just to paint the complete picture, note that upon subsequent successful completion of SBNM 5611, students will have further ability to utilize information gathered through applied business research to develop a product Marketing Plan consistent with the product's position in the market:
- Gather information about a product's cost structure and the costs of any proposed marketing activities, calculate the product's unit contribution and determine the break-even point for the proposed marketing expenditures. Make recommendations for modifying the proposed marketing budget based on your analysis.
- Gather information about a product's cost structure and competition, analyze potential pricing alternatives and make a pricing recommendation.
- Weighing information about customers' needs and buying patterns and the internal capabilities of a company, design a channel strategy for specific products or services produced by that company.
- Assess a product's characteristics and selling benefits to design a sales management plan and develop hiring, training, and compensation recommendations for the sales force.
- Gather information about the external environment and a product's features & benefits, and make recommendations regarding advertising, sales promotions, and public relations.
Weekly Learning Objectives:
| Week | Topic | At conclusion of this week, students will have: |
|---|---|---|
| 1 | Marketing Management Overview Defining Marketing for the 21st Century Developing Marketing Strategies and Plans | Examined the definition of marketing Analyzed foundational marketing concepts Reviewed and discussed the importance of marketing |
| 2 | Capturing Marketing Insights Collecting Information and Forecasting Demand Conducting Marketing Research | Investigated the importance of market/customer data and assessed the need for marketing research Explored different types of marketing information systems Probed various methods of collecting, interpreting and utilizing data Analyzed the marketing research process and the various methods of collecting information |
| 3 | Connecting with Consumers Creating Long-term Loyalty Relationships Analyzing Consumer Markets | Demonstrated application of topics studied in weeks 1 & 2 via a written case study analysis Scrutinized and discussed the use of loyalty programs in customer relationship building Examined consumer behavior and the workings of customer markets |
| Week | Topic |
|---|---|
| 5 | Building Strong Brands Creating Brand Equity Crafting the Brand Positioning |
| 6 | Building Strong Brands (cont.) Competitive Dynamics |
Course Methodology:
The goal of a good management education program should be to give students the opportunity to study and practice the application of management theory. Just studying theory without the opportunity to practice the application of that theory is not very effective. Upon completing their business education, managers will be expected to be able to apply what they've learned to real-world business situations. Just as a doctor or scientist would not be unleashed into the world to practice their craft without first successfully demonstrating that they are able to apply their learnings to real-world situations, so must an aspiring business leader
Thus, this course stresses the application of core marketing principles via the use of case studies. Why utilize case studies? In short, cases have tremendous educational value. Much can be learned by analyzing real-world business dilemmas and proposing solutions.
A business case imitates or simulates a real situation. Cases are verbal representations of reality that put the reader in the role of a participant in the situation. The unit of analysis in cases varies enormously, from a single individual or organization to an entire nation or the world. Cases can range from one page to fifty or more. But they are have a common purpose: to represent reality, to convey a situation with all its cross currents and rough edges—including irrelevancies, sideshows, misconceptions, and little information or an over whelming amount of it.
Most educational texts represent the real as logical and coherent. But real business situations are fluid and inevitably involve uncertainty; they don't present selected and sorted information. Cases don't either. Real situations consist of some clarity, too much or too little information and lots of contingency— and so do cases. They provide business students with the equivalent of laboratories used for educating scientists and doctors. 1
So consider this your laboratory.
Computer Requirements:
In order to effectively participate in and successfully complete this course, each participant will need to have access to a computer and a high-speed internet connection. Please visit http://www.northpark.edu/Campus-Life-and-Services/Inf or mat ion -Tech nol og y/N etwork /M i nimum -Requirements for information on computer requirements.
Technical Skills Required:
To successfully complete the requirements of this course, students must have the technical proficiency to log into the Moodle Learning Management System, download files and open them, complete written assignments using MS WORD (or comparable word processing software with ability to convert output to a PDF format), and upload files into Moodle.
Schedule of Weekly Assignments:
| Week | Dates | Topics | Assignment(s) |
|---|---|---|---|
| 1 | Aug 26- Sept 1 | Marketing Management Overview | Read |
| | | • Defining Marketing for the 21st Century | o Chapters 1 & 2 |
| | | • Developing Marketing Strategies and Plans | o Assigned articles posted on |
| | | | Moodle |
| | | | Assignments due |
| | | | o Discussion Forum participation |
| 2 | | | |
| 3 | Sept 9-15 | Connecting with Consumers | |
| | | • Creating Long-term Loyalty Relationships | |
| | | • Analyzing Consumer Markets | |
| 4 | | | |
| 5 | Sept 23-29 | Building Strong Brands | Read |
| | | • Creating Brand Equity | o Chapters 9 & 10 |
| | | • Crafting the Brand Positioning | |
1 Ellet, W., (2007), The Case Study Handbook: How to Read, Discuss, and Write Persuasively About Cases, Boston, Massachusetts: Harvard Business School Press
| Week | Dates | Topics | Assignment(s) |
|---|---|---|---|
| | | | o Assigned articles posted on |
| | | | Moodle |
| | | | Assignments due |
| | | | o Case Analysis #2 |
| | | | o Discussion Forum participation |
| 6 | | | |
| 7 | Oct 7 - 13 | Wrap- up • Final Case Submission • Final Discussion Board | Assignments due |
| | | | o Final Case Analysis |
| | | | o Discussion Forum participation |
Grading:
There are 200 possible points in this course:
| | Week 1 | Week | Week | Week | Week | Week | Week | Total | Grade |
|---|---|---|---|---|---|---|---|---|---|
| Activity | | 2 | 3 | 4 | 5 | 6 | 7 | Points | % |
| Discussion Forum | 10 | 10 | 10 | 10 | 10 | 10 | 10 | 70 | 35% |
| Case #1 | | | | | | | | | |
| Case #2 | | | | | 40 | | | 40 | 20% |
| Final Case | | | | | | | | | |
| Weekly Point Total | 10 | 10 | 40 | 10 | 50 | 10 | 70 | 200 | |
Grade Mapping:
| | 190-200 | A (95-100%) | 160-164 | B- (80-82%) | <140 | F (<70%) |
|---|---|---|---|---|---|---|
| 180-189 A- (90-94%) | | | 155-159 C+ (77-79%) | | | |
| | 175-179 | B+ (87-89%) | 145-154 | C (73-76%) | | |
| 165-174 B (83-86%) | | | 140-144 C- (70-72%) | | | |
Assignment Grading Policies:
Assignments will be graded according to the rubrics given. Grades, and instructor feedback, will be posted in Moodle.
Please be aware that any late submission of an assignment will incur a penalty. A late submission which is received within 24-hours of the deadline will be assessed an automatic 10% point deduction, and a submission which is received 24-48 hours after the deadline will be assessed an automatic 20% point deduction. No submissions will be accepted over 48-hour past the deadline.
Student Responsibilities:
- Discussion forum participation and written assignments are required for this course. You cannot successfully complete this course without completing the weekly readings assignments. It is imperative that students complete the weekly assigned readings before participating in the discussion forums or beginning a written assignment.
- Assignments will be posted on-line. You will be asked to retrieve assignments from Moodle.
- Use proper "netiquette" (see A Guide to Netiquette in Course Information folder on Moodle).
- For a quick reply, it is best to communicate questions, concerns or issues via email. But, you may also contact me via phone.
Instructor Responsibilities:
As your instructor, I will:
- Provide updated information on relevant resources for the various topics of interest
- Read and critically assess students' assignments and provide feedback within 7-10 days of receipt
- Facilitate a participant-centered course experience, which focuses on student learning
- Respond to all student e-mails within 48 hours of receipt (target is 24 hours)
- Respond to all student phone calls within 48 hours (target is 24 hours)
ASSIGNMENT SPECIFICATIONS
Overview:
Assignments consist of readings, discussion forums and several written case analyses. Due dates are indicated in the Schedule of Weekly Assignments and in Moodle.
The "week" begins on Monday and ends on Sunday. Unless otherwise stated, assignments are due by midnight on the Sunday during the week indicated.
WEEKLY ONLINE DISCUSSION FORUM
Threaded Discussion Requirements:
Weekly forum discussions open Monday of each week and close at midnight of the next Sunday. An initial set of questions will be posted. Each week you are required to post 3 times according to the following schedule:
- You must post/respond to all the initial questions in the 1st post no later than Wednesday of each week.
- The second post must be no later than Friday of the week.
- The third post must be either Saturday or Sunday (before midnight).
Participation in the discussion forum will be graded on a weekly basis according to the following criteria:
| | Timeliness | | The initial post created by | | The initial posting created late. | Initial post not created or created |
|---|---|---|---|---|---|---|
| | | | Wednesday, allowing time for | | | after Friday of the week. |
| | | | others to respond. | | | |
| Initial Response | | Provides a thorough and insightful response to the prompt question(s). | | Post partially answers the prompt question(s). | | |
| | Integration of | | Reinforces course material or | | Refers to lesson content but | Does not refer to key points with |
| | | | challenges interpretation of | | not integrated effectively. | no evidence participant |
| | Content | | | | | |
| | | | material, and does so in a concise | | | understands the key points. Or, is |
| | (Initial & Reply | | | | | |
| | | | manner. Any references to | | | excessively long. |
| | Responses) | | external sources provide | | | |
| | | | references (URL link or page | | | |
| | | | 9 - 10 points | | 7 - 8 points | 0 - 6 points |
|---|---|---|---|---|---|---|
| | | | number in text) so others can | | | |
| | | | follow the thought process. | | | |
| Reply Responses | | Responds to the ideas presented in the original post and required number of responses posted. | | Response are loosely related to the ideas of the original post, and/or less than the required number of responses posted | | |
| | Constructive | | Is characterized by at least three | | Is characterized by two of the | Response is one or none of the |
| | | | of the following: | | following: | following: |
| | Comments | | | | | |
| | | | a. supportive | | a. supportive | a. supportive |
| | (Reply | | | | | |
| | | | b. thought-provoking | | b. thought-provoking | b. thought-provoking |
| | Responses) | | c. challenging | | c. challenging | c. challenging |
| | | | d. reflective | | d. reflective | d. reflective |
| | | | e. ties to course concepts | | e. ties to course concepts | e. ties to course concepts |
| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate but may include inconsistencies or inaccuracies. | | |
WRITTEN CASE ANALYSIS ASSIGNMENTS
Assignment Specifications:
The cases used in this course have been selected from the Harvard Business School Library. The publisher makes these cases available at a discount to educational institutions. There is a $25.00 fee per student, so each student will have the corresponding fee posted to their account.
The cases will be made available via Moodle. Students must note that these documents are copyright protected and are not to be shared or redistributed to others. The instructor will supply a list of questions, pertaining to each case. Students must submit a written case analysis, per the schedule of assignments given earlier.
Your case analysis paper is due before the end of the week in which the assignment is listed. I.e., an assignment which is shown in week 3 is due at the end of that week on Sunday at midnight. Another way to view this is to look at the specific dates listed in the schedule of assignments table. Any assignments due must be uploaded into Moodle by the ending date for that week.
Your paper should provide critical analysis of the case and your answers to the associated list of questions must be incorporated into this analysis. Case analysis papers must follow APA guidelines and should generally be 5-8 pages double spaced, but absolutely no more than 10 pages.
General guidelines for conducting a case analysis:
- You should spend more time thinking about a case than reading it!
- Initially read through the entire case, focusing on understanding the business situation more so than the minute details.
- Read the assigned questions carefully. These questions are your guide to the essential elements of the case. Think about the specific topics being addressed in the course and reflect on how these questions tie into the course content and discussion topics.
- Re-read the case, noting various details (e.g., taking notes, highlighting text, etc.) and reflect on the situation, immediate challenge and potential solutions. Also reflect on your answers to the assigned questions
- Consider yourself to be a key decision maker. Before you begin writing your analysis, make a firm decision on your assessment of the situation, your specific stance and any recommendations that you would give.
- Do not spew back the case details and events of the case in your analysis. Assume that the reader has read the case. Instead, your focus should be on providing a critical assessment of the situation outlined in the case. Summarize key points/details as you explain your rationale, citing references using APA format. But . . . do NOT take a book report approach, do NOT simply summarize or reiterate what you read in the case. View yourself as a key stakeholder in the scenario. If it helps, think of yourself as an "arm-chair quarter-back" or "passenger-seat driver" who is critiquing what the case characters have done and giving opinions, in no uncertain terms, on recommended courses of action.
- Make sure that you address each of the assigned questions in your analysis, but note that a thorough analysis consists of more than just your answers to these questions. The questions are provided as a "guiding light," but you must still navigate your way to the final destination.
- Before drawing your conclusions and making recommendations, it is often a good idea to summarize your rationale (e.g., use a table listing pros vs. cons, a table comparing options, etc.).
- Proof-read your document carefully! Use spelling and grammar checking tools. If possible, have someone else proof-read your document, giving you feedback on whether your points have been well conveyed.
Your written case analysis will be graded according to the following criteria:
| | | | 90 – 100% | | 80 - 89% | | 70 - 79% | | < 70% |
|---|---|---|---|---|---|---|---|---|---|
| | For Case #1 | | | | | | | | |
| | | | 27 - 30 points | | 24 - 26 points | | 21 - 23 points | | < 21 points |
| | max=30pts | | | | | | | | |
| | For Case #2 | | | | | | | | |
| | | | 36 - 40 points | | 32 - 35 points | | 28 - 31 points | | < 28 points |
| | max=40pts | | | | | | | | |
| | For Final Case | | | | | | | | |
| | | | 54 - 60 points | | 48 - 53 points | | 42 - 47 points | | < 42 points |
| | max=60pts | | | | | | | | |
| Content | | Effectively references course content and properly applies principles to real-world situation outlined in case. Length of paper is within the stated limit. | | References course content but application of principles is only partially appropriate for the particular case situation. | | References course content but principles not correctly applied, or unfitting to case situation. Or, paper exceeds page limit. | | Does not refer to course content. Little or no application of course principles. | |
| | Case | | Fully addresses all posed case | | Addresses all posed | | Addresses some but not | | Does not address the |
| | | | questions. Provides a | | case questions. | | all of the posed case | | posed case questions |
| | Questions | | | | | | | | |
| | | | thorough and insightful | | Responses | | questions. Responses | | |
| | | | response to the questions. | | adequate but not | | less than adequate. | | |
| | | | | | exhaustive. | | | | |
| Overall Analysis | | Thorough & concrete analysis, going beyond posed case questions. Firm position taken, with strong justification. Discussion, conclusions and recommendations demonstrate strong grasp of course content and principles. | | Solid analysis, sufficient depth. Firm position taken and justified in analysis. Conclusions and recommendations follow directly from stated rationale. | | Adequate analysis, adequate depth. Conclusions and recommendations are unclear or questionable, and/or do not correctly apply principles studied in this course. | | Poor analysis. Insufficient depth, no conclusions drawn or rationale is questionable. | |
| | Cumulative | | Final case analysis clearly | | Final case analysis | | Final case analysis only | | Final case analysis |
| | | | demonstrates grasp of, and | | adequately | | partially demonstrates | | does not demonstrate |
| | Thread (for | | | | | | | | |
| | | | properly applies, various core | | demonstrates grasp | | grasp of, and/or | | grasp of core |
| | Final Case | | | | | | | | |
| | | | marketing principles studied | | of, and properly | | questionably applies, | | marketing principles |
| | Only) | | in the course | | applies, various | | various core marketing | studied in the course, |
|---|---|---|---|---|---|---|---|---|
| | | | | | core marketing | | principles studied in the | or improperly applies |
| | | | | | principles studied in | | course | principles. |
| | | | | | the course | | | |
| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate. | | Writing is adequate but may include inaccuracies, and/or some grammatical errors. | | |
| | APA Format | | Follows APA format | | Follows APA format | | Partially follows APA | Does not follow APA |
| | | | | | | | format | format |
POLICY STATEMENTS
Academic Honesty
In keeping with our Christian heritage and commitment, North Park University and the School of Business and Nonprofit Management are committed to the highest possible ethical and moral standards. Just as we will constantly strive to live up to these high standards, we expect our students to do the same. To that end, cheating of any sort will not be tolerated. Students who are discovered cheating are subject to discipline up to and including failure of a course and expulsion.
Our definition of cheating includes but is not limited to:
1. Plagiarism – the use of another's work as one's own without giving credit to the individual. This includes using materials from the internet.
2. Copying another's answers on an examination.
3. Deliberately allowing another to copy one's answers or work.
4. Signing an attendance roster for another who is not present.
In the special instance of group work, the instructor will make clear his/her expectations with respect to individual vs. collaborative work. A violation of these expectations may be considered cheating as well. For further information on this subject you may refer to the Academic Dishonesty section of the University's online catalog.
In conclusion, it is our mission to prepare each student for a life of significance and service. Honesty and ethical behavior are the foundation upon which such lives are built. We therefore expect the highest standards of each student in this regard.
Attendance Policy for Graduate Courses
The graduate courses in the SBNM are all 7 weeks in length. Missing one class session is allowed without penalty as long as all readings and assignments are made up by the student within a reasonable time period (the following week). Failing to log into an online course site for an entire week is allowed, but a penalty may be applied at the instructor's discretion. Missing a second class session is allowed only in unusual circumstances by prior arrangement with the instructor. Since this represents almost 30% of the engagement time for the course, the student runs the risk of receiving a lower overall grade for the class. Faculty are encouraged to drop the course grade by a full letter grade in this situation. A student who misses three classes (or the equivalent 2 weeks for an online class) will automatically fail the course, unless the student drops the course before the seventh week of class. Students who drop a course will be held responsible for tuition, based upon the current North Park University policy outlined in the University Catalog (found on the NPU website).
Attendance Policy for Undergraduate Courses
Attendance and participation are vital. Thus, students are expected to attend every class session, and to arrive on time – tardiness is undesirable and disruptive to your fellow classmates. This course has a strict requirement of documented, advance notification. If you are unable to attend any class session, you are to inform me (preferably by email) prior to that session. You need to provide a reason for your absence. Failure to provide advance notification will result in an unexcused absence. Be advised that poor attendance can affect your grade adversely
APA Requirement
The School of Business and Nonprofit Management (SBNM) has adopted the Publication Manual of the American Psychological Association (APA) as the standard and required format for all written assignments in SBNM courses.
Our goal in adopting the APA Manual is to enhance student learning by:
1) Improving student's writing skills.
2) Standardizing the required format of all written assignments in all SBNM courses.
3) Emphasizing the importance of paper mechanics, grammatical constructs, and the necessity of proper citations.
4) Holding students accountable for high quality written work.
If you are unfamiliar with the requirements of the APA Manual, we recommend that you purchase the reference manual and/or that you consult one or more of the suggested resources as listed on the Student Resources section of the SBNM website. It is your responsibility to learn and ensure that all written work is formatted according to the standards of the APA Manual.
Students with Disabilities
Students with disabilities who believe that they may need accommodations in this class are encouraged to contact your program's office (Business: 773-244-6270). Please do so as soon as possible to better ensure that such accommodations are implemented in a timely manner. For further information please review the following website: http://www.northpark.edu/ada
|
<urn:uuid:22087c06-36ef-4301-9097-81095a79f96a>
|
CC-MAIN-2014-41
|
http://www.northpark.edu/~/media/Files/PDF/Academics/School%20of%20Business%20and%20Nonprofit%20Management/Syllabi/Fall%20A%202013%20Syllabi/SBNM%205610%20BACKLUND%20online.ashx
|
2014-09-23T14:23:27Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138980.37/warc/CC-MAIN-20140914011218-00113-ip-10-234-18-248.ec2.internal.warc.gz
| 700,080,086
| 6,845
|
eng_Latn
|
eng_Latn
| 0.994682
|
eng_Latn
| 0.99776
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2067,
4435,
7632,
9774,
11449,
13744,
16344,
19465,
24209,
27557,
29539
] |
School of Business and Nonprofit Management Course Syllabus
Course: SBNM 5610 – Marketing Analysis and Consumer Behavior - A12
Academic Year: 2013/14 Semester/Quad: Fall A
Credit Hours: 2
Prerequisites: none
Instructor: Paul T. Backlund
Phone: 1-847-920-1345 Fax: 1-847-920-1346
Email: [email protected]
Availability:
On line any time via e-mail. I will reply within 24 hours during the week and within 48 hours on weekends. Also, if necessary, telephone conversations can be requested (send email to request times).
Course Description:
This course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-tobusiness and, to a small extent, the nonprofit sector. The survey begins in this course and is completed in SBNM 5611, Advanced Marketing Management
Introductory Comments:
Welcome to the course. I look forward to exploring marketing management with you!
Perhaps the most important thing to note at the outset is that a very widely held misconception is that marketing is simply about advertising and promotion. While, advertising and promotional activities are a very important part of marketing, they are but a portion of marketing management. The discipline that we call marketing management involves a number of things. In essence, marketing management is the process of creating customer value, delivering that value and communicating that value:
Creating Value
•Strategy &
Planning
•Market Analysis &
Research
•Loyalty Programs
•Branding
•Product Design &
Pricing
Delivering Value
•Channel Design
•Managing Retailing & Wholesaling & Logistics
Communicating Value
•Designing & Managing Sales Function
•Advertising &
Promotion
•Events & PR
•Direct &
Interactive
Marketing
•Digital Marketing
1
While the activities involved with "communicating value" are the most visible to the general observer, actually more of the marketer's combined effort goes into "creating value" and "delivering value."
Course Materials:
REQUIRED
Textbook(s):
Marketing Management (Prentice Hall 14
Philip Kotler and Kevin Keller,
ISBN: 978-0-13-210292-6
(Note, this same textbook is also used for SBNM 5611. Approximately ½ of the book is covered in SBNM 5610 and the remainder is covered in SBNM 5611.)
Cases:
Several Harvard Business School (HBS) cases are utilized in this course. These cases will be distributed via Moodle and each student will have a corresponding copyright fee of $25.00 posted to their account.
Articles:
Articles from various business publications will be assigned via Moodle. Either a copy of the article, or a link to the article, will be posted.
OPTIONAL
There may be optional references or articles noted via Moodle.
Essential IDEA Objectives:
The essential objectives of this course (per the IDEA framework, a nationally recognized assessment tool used by many higher learning institutions) are:
1. Learning fundamental principles, generalizations, or theories.
2. Learning to apply course material (to improve thinking, problem solving, and decisions).
3. Learning to analyze and critically evaluate ideas, arguments, and points of view.
Specific Course Objectives:
This course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. Modules include strategic and marketing planning, consumer behavior, marketing and advertising research, segmentation strategies, branding, competitive and marketing mix strategies, and positioning concepts. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-to-business and, to a small extent, the nonprofit sector. The survey begins in SBNM 5610 and is completed in SBNM 5611.
Upon successful completion of SBNM 5610, students will have the ability to:
- Gather and assess information about customers' needs and buying patterns, and subsequently determine a product's value to potential customers.
th
Edition)
- Given a marketing decision facing a firm, determine what type of market research would be relevant to the decision. Make recommendations about how to gather that research; determine how much money should be spent; how to analyze the results; and be able to present findings to senior management.
- Given information about a product line's history, assess market situation, industry and competition to make recommendations for future marketing decisions regarding the product.
- Given information about a firm's size, history, and organizational structure, assess industry and market situation to recommend a process for successfully bringing a new product to market.
- Assess the relevance of ethical considerations on marketing decisions.
Just to paint the complete picture, note that upon subsequent successful completion of SBNM 5611, students will have further ability to utilize information gathered through applied business research to develop a product Marketing Plan consistent with the product's position in the market:
- Gather information about a product's cost structure and the costs of any proposed marketing activities, calculate the product's unit contribution and determine the break-even point for the proposed marketing expenditures. Make recommendations for modifying the proposed marketing budget based on your analysis.
- Gather information about a product's cost structure and competition, analyze potential pricing alternatives and make a pricing recommendation.
- Weighing information about customers' needs and buying patterns and the internal capabilities of a company, design a channel strategy for specific products or services produced by that company.
- Assess a product's characteristics and selling benefits to design a sales management plan and develop hiring, training, and compensation recommendations for the sales force.
- Gather information about the external environment and a product's features & benefits, and make recommendations regarding advertising, sales promotions, and public relations.
Weekly Learning Objectives:
| Week | Topic | At conclusion of this week, students will have: |
|---|---|---|
| 1 | Marketing Management Overview Defining Marketing for the 21st Century Developing Marketing Strategies and Plans | Examined the definition of marketing Analyzed foundational marketing concepts Reviewed and discussed the importance of marketing |
| 2 | Capturing Marketing Insights Collecting Information and Forecasting Demand Conducting Marketing Research | Investigated the importance of market/customer data and assessed the need for marketing research Explored different types of marketing information systems Probed various methods of collecting, interpreting and utilizing data Analyzed the marketing research process and the various methods of collecting information |
| 3 | Connecting with Consumers Creating Long-term Loyalty Relationships Analyzing Consumer Markets | Demonstrated application of topics studied in weeks 1 & 2 via a written case study analysis Scrutinized and discussed the use of loyalty programs in customer relationship building Examined consumer behavior and the workings of customer markets |
| Week | Topic |
|---|---|
| 5 | Building Strong Brands Creating Brand Equity Crafting the Brand Positioning |
| 6 | Building Strong Brands (cont.) Competitive Dynamics |
Course Methodology:
The goal of a good management education program should be to give students the opportunity to study and practice the application of management theory. Just studying theory without the opportunity to practice the application of that theory is not very effective. Upon completing their business education, managers will be expected to be able to apply what they've learned to real-world business situations. Just as a doctor or scientist would not be unleashed into the world to practice their craft without first successfully demonstrating that they are able to apply their learnings to real-world situations, so must an aspiring business leader
Thus, this course stresses the application of core marketing principles via the use of case studies. Why utilize case studies? In short, cases have tremendous educational value. Much can be learned by analyzing real-world business dilemmas and proposing solutions.
A business case imitates or simulates a real situation. Cases are verbal representations of reality that put the reader in the role of a participant in the situation. The unit of analysis in cases varies enormously, from a single individual or organization to an entire nation or the world. Cases can range from one page to fifty or more. But they are have a common purpose: to represent reality, to convey a situation with all its cross currents and rough edges—including irrelevancies, sideshows, misconceptions, and little information or an over whelming amount of it.
Most educational texts represent the real as logical and coherent. But real business situations are fluid and inevitably involve uncertainty; they don't present selected and sorted information. Cases don't either. Real situations consist of some clarity, too much or too little information and lots of contingency— and so do cases. They provide business students with the equivalent of laboratories used for educating scientists and doctors. 1
So consider this your laboratory.
Computer Requirements:
In order to effectively participate in and successfully complete this course, each participant will need to have access to a computer and a high-speed internet connection. Please visit http://www.northpark.edu/Campus-Life-and-Services/Inf or mat ion -Tech nol og y/N etwork /M i nimum -Requirements for information on computer requirements.
Technical Skills Required:
To successfully complete the requirements of this course, students must have the technical proficiency to log into the Moodle Learning Management System, download files and open them, complete written assignments using MS WORD (or comparable word processing software with ability to convert output to a PDF format), and upload files into Moodle.
Schedule of Weekly Assignments:
| Week | Dates | Topics | Assignment(s) |
|---|---|---|---|
| 1 | Aug 26- Sept 1 | Marketing Management Overview | Read |
| | | • Defining Marketing for the 21st Century | o Chapters 1 & 2 |
| | | • Developing Marketing Strategies and Plans | o Assigned articles posted on |
| | | | Moodle |
| | | | Assignments due |
| | | | o Discussion Forum participation |
| 2 | | | |
| 3 | Sept 9-15 | Connecting with Consumers | |
| | | • Creating Long-term Loyalty Relationships | |
| | | • Analyzing Consumer Markets | |
| 4 | | | |
| 5 | Sept 23-29 | Building Strong Brands | Read |
| | | • Creating Brand Equity | o Chapters 9 & 10 |
| | | • Crafting the Brand Positioning | |
1 Ellet, W., (2007), The Case Study Handbook: How to Read, Discuss, and Write Persuasively About Cases, Boston, Massachusetts: Harvard Business School Press
| Week | Dates | Topics | Assignment(s) |
|---|---|---|---|
| | | | o Assigned articles posted on |
| | | | Moodle |
| | | | Assignments due |
| | | | o Case Analysis #2 |
| | | | o Discussion Forum participation |
| 6 | | | |
| 7 | Oct 7 - 13 | Wrap- up • Final Case Submission • Final Discussion Board | Assignments due |
| | | | o Final Case Analysis |
| | | | o Discussion Forum participation |
Grading:
There are 200 possible points in this course:
| | Week 1 | Week | Week | Week | Week | Week | Week | Total | Grade |
|---|---|---|---|---|---|---|---|---|---|
| Activity | | 2 | 3 | 4 | 5 | 6 | 7 | Points | % |
| Discussion Forum | 10 | 10 | 10 | 10 | 10 | 10 | 10 | 70 | 35% |
| Case #1 | | | | | | | | | |
| Case #2 | | | | | 40 | | | 40 | 20% |
| Final Case | | | | | | | | | |
| Weekly Point Total | 10 | 10 | 40 | 10 | 50 | 10 | 70 | 200 | |
Grade Mapping:
| | 190-200 | A (95-100%) | 160-164 | B- (80-82%) | <140 | F (<70%) |
|---|---|---|---|---|---|---|
| 180-189 A- (90-94%) | | | 155-159 C+ (77-79%) | | | |
| | 175-179 | B+ (87-89%) | 145-154 | C (73-76%) | | |
| 165-174 B (83-86%) | | | 140-144 C- (70-72%) | | | |
Assignment Grading Policies:
Assignments will be graded according to the rubrics given. Grades, and instructor feedback, will be posted in Moodle.
Please be aware that any late submission of an assignment will incur a penalty. A late submission which is received within 24-hours of the deadline will be assessed an automatic 10% point deduction, and a submission which is received 24-48 hours after the deadline will be assessed an automatic 20% point deduction. No submissions will be accepted over 48-hour past the deadline.
Student Responsibilities:
- Discussion forum participation and written assignments are required for this course. You cannot successfully complete this course without completing the weekly readings assignments. It is imperative that students complete the weekly assigned readings before participating in the discussion forums or beginning a written assignment.
- Assignments will be posted on-line. You will be asked to retrieve assignments from Moodle.
- Use proper "netiquette" (see A Guide to Netiquette in Course Information folder on Moodle).
- For a quick reply, it is best to communicate questions, concerns or issues via email. But, you may also contact me via phone.
Instructor Responsibilities:
As your instructor, I will:
- Provide updated information on relevant resources for the various topics of interest
- Read and critically assess students' assignments and provide feedback within 7-10 days of receipt
- Facilitate a participant-centered course experience, which focuses on student learning
- Respond to all student e-mails within 48 hours of receipt (target is 24 hours)
- Respond to all student phone calls within 48 hours (target is 24 hours)
ASSIGNMENT SPECIFICATIONS
Overview:
Assignments consist of readings, discussion forums and several written case analyses. Due dates are indicated in the Schedule of Weekly Assignments and in Moodle.
The "week" begins on Monday and ends on Sunday. Unless otherwise stated, assignments are due by midnight on the Sunday during the week indicated.
WEEKLY ONLINE DISCUSSION FORUM
Threaded Discussion Requirements:
Weekly forum discussions open Monday of each week and close at midnight of the next Sunday. An initial set of questions will be posted. Each week you are required to post 3 times according to the following schedule:
- You must post/respond to all the initial questions in the 1st post no later than Wednesday of each week.
- The second post must be no later than Friday of the week.
- The third post must be either Saturday or Sunday (before midnight).
Participation in the discussion forum will be graded on a weekly basis according to the following criteria:
| | Timeliness | | The initial post created by | | The initial posting created late. | Initial post not created or created |
|---|---|---|---|---|---|---|
| | | | Wednesday, allowing time for | | | after Friday of the week. |
| | | | others to respond. | | | |
| Initial Response | | Provides a thorough and insightful response to the prompt question(s). | | Post partially answers the prompt question(s). | | |
| | Integration of | | Reinforces course material or | | Refers to lesson content but | Does not refer to key points with |
| | | | challenges interpretation of | | not integrated effectively. | no evidence participant |
| | Content | | | | | |
| | | | material, and does so in a concise | | | understands the key points. Or, is |
| | (Initial & Reply | | | | | |
| | | | manner. Any references to | | | excessively long. |
| | Responses) | | external sources provide | | | |
| | | | references (URL link or page | | | |
| | | | 9 - 10 points | | 7 - 8 points | 0 - 6 points |
|---|---|---|---|---|---|---|
| | | | number in text) so others can | | | |
| | | | follow the thought process. | | | |
| Reply Responses | | Responds to the ideas presented in the original post and required number of responses posted. | | Response are loosely related to the ideas of the original post, and/or less than the required number of responses posted | | |
| | Constructive | | Is characterized by at least three | | Is characterized by two of the | Response is one or none of the |
| | | | of the following: | | following: | following: |
| | Comments | | | | | |
| | | | a. supportive | | a. supportive | a. supportive |
| | (Reply | | | | | |
| | | | b. thought-provoking | | b. thought-provoking | b. thought-provoking |
| | Responses) | | c. challenging | | c. challenging | c. challenging |
| | | | d. reflective | | d. reflective | d. reflective |
| | | | e. ties to course concepts | | e. ties to course concepts | e. ties to course concepts |
| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate but may include inconsistencies or inaccuracies. | | |
WRITTEN CASE ANALYSIS ASSIGNMENTS
Assignment Specifications:
The cases used in this course have been selected from the Harvard Business School Library. The publisher makes these cases available at a discount to educational institutions. There is a $25.00 fee per student, so each student will have the corresponding fee posted to their account.
The cases will be made available via Moodle. Students must note that these documents are copyright protected and are not to be shared or redistributed to others. The instructor will supply a list of questions, pertaining to each case. Students must submit a written case analysis, per the schedule of assignments given earlier.
Your case analysis paper is due before the end of the week in which the assignment is listed. I.e., an assignment which is shown in week 3 is due at the end of that week on Sunday at midnight. Another way to view this is to look at the specific dates listed in the schedule of assignments table. Any assignments due must be uploaded into Moodle by the ending date for that week.
Your paper should provide critical analysis of the case and your answers to the associated list of questions must be incorporated into this analysis. Case analysis papers must follow APA guidelines and should generally be 5-8 pages double spaced, but absolutely no more than 10 pages.
General guidelines for conducting a case analysis:
- You should spend more time thinking about a case than reading it!
- Initially read through the entire case, focusing on understanding the business situation more so than the minute details.
- Read the assigned questions carefully. These questions are your guide to the essential elements of the case. Think about the specific topics being addressed in the course and reflect on how these questions tie into the course content and discussion topics.
- Re-read the case, noting various details (e.g., taking notes, highlighting text, etc.) and reflect on the situation, immediate challenge and potential solutions. Also reflect on your answers to the assigned questions
- Consider yourself to be a key decision maker. Before you begin writing your analysis, make a firm decision on your assessment of the situation, your specific stance and any recommendations that you would give.
- Do not spew back the case details and events of the case in your analysis. Assume that the reader has read the case. Instead, your focus should be on providing a critical assessment of the situation outlined in the case. Summarize key points/details as you explain your rationale, citing references using APA format. But . . . do NOT take a book report approach, do NOT simply summarize or reiterate what you read in the case. View yourself as a key stakeholder in the scenario. If it helps, think of yourself as an "arm-chair quarter-back" or "passenger-seat driver" who is critiquing what the case characters have done and giving opinions, in no uncertain terms, on recommended courses of action.
- Make sure that you address each of the assigned questions in your analysis, but note that a thorough analysis consists of more than just your answers to these questions. The questions are provided as a "guiding light," but you must still navigate your way to the final destination.
- Before drawing your conclusions and making recommendations, it is often a good idea to summarize your rationale (e.g., use a table listing pros vs. cons, a table comparing options, etc.).
- Proof-read your document carefully! Use spelling and grammar checking tools. If possible, have someone else proof-read your document, giving you feedback on whether your points have been well conveyed.
Your written case analysis will be graded according to the following criteria:
| | | | 90 – 100% | | 80 - 89% | | 70 - 79% | | < 70% |
|---|---|---|---|---|---|---|---|---|---|
| | For Case #1 | | | | | | | | |
| | | | 27 - 30 points | | 24 - 26 points | | 21 - 23 points | | < 21 points |
| | max=30pts | | | | | | | | |
| | For Case #2 | | | | | | | | |
| | | | 36 - 40 points | | 32 - 35 points | | 28 - 31 points | | < 28 points |
| | max=40pts | | | | | | | | |
| | For Final Case | | | | | | | | |
| | | | 54 - 60 points | | 48 - 53 points | | 42 - 47 points | | < 42 points |
| | max=60pts | | | | | | | | |
| Content | | Effectively references course content and properly applies principles to real-world situation outlined in case. Length of paper is within the stated limit. | | References course content but application of principles is only partially appropriate for the particular case situation. | | References course content but principles not correctly applied, or unfitting to case situation. Or, paper exceeds page limit. | | Does not refer to course content. Little or no application of course principles. | |
| | Case | | Fully addresses all posed case | | Addresses all posed | | Addresses some but not | | Does not address the |
| | | | questions. Provides a | | case questions. | | all of the posed case | | posed case questions |
| | Questions | | | | | | | | |
| | | | thorough and insightful | | Responses | | questions. Responses | | |
| | | | response to the questions. | | adequate but not | | less than adequate. | | |
| | | | | | exhaustive. | | | | |
| Overall Analysis | | Thorough &
|
concrete analysis, going beyond posed case questions.
|
Firm position taken, with strong justification. Discussion, conclusions and recommendations demonstrate strong grasp of course content and principles. | | Solid analysis, sufficient depth. Firm position taken and justified in analysis. Conclusions and recommendations follow directly from stated rationale. | | Adequate analysis, adequate depth. Conclusions and recommendations are unclear or questionable, and/or do not correctly apply principles studied in this course. | | Poor analysis. Insufficient depth, no conclusions drawn or rationale is questionable. | |
| | Cumulative | | Final case analysis clearly | | Final case analysis | | Final case analysis only | | Final case analysis |
| | | | demonstrates grasp of, and | | adequately | | partially demonstrates | | does not demonstrate |
| | Thread (for | | | | | | | | |
| | | | properly applies, various core | | demonstrates grasp | | grasp of, and/or | | grasp of core |
| | Final Case | | | | | | | | |
| | | | marketing principles studied | | of, and properly | | questionably applies, | | marketing principles |
| | Only) | | in the course | | applies, various | | various core marketing | studied in the course, |
|---|---|---|---|---|---|---|---|---|
| | | | | | core marketing | | principles studied in the | or improperly applies |
| | | | | | principles studied in | | course | principles. |
| | | | | | the course | | | |
| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate. | | Writing is adequate but may include inaccuracies, and/or some grammatical errors. | | |
| | APA Format | | Follows APA format | | Follows APA format | | Partially follows APA | Does not follow APA |
| | | | | | | | format | format |
POLICY STATEMENTS
Academic Honesty
In keeping with our Christian heritage and commitment, North Park University and the School of Business and Nonprofit Management are committed to the highest possible ethical and moral standards. Just as we will constantly strive to live up to these high standards, we expect our students to do the same. To that end, cheating of any sort will not be tolerated. Students who are discovered cheating are subject to discipline up to and including failure of a course and expulsion.
Our definition of cheating includes but is not limited to:
1. Plagiarism – the use of another's work as one's own without giving credit to the individual. This includes using materials from the internet.
2. Copying another's answers on an examination.
3. Deliberately allowing another to copy one's answers or work.
4. Signing an attendance roster for another who is not present.
In the special instance of group work, the instructor will make clear his/her expectations with respect to individual vs. collaborative work. A violation of these expectations may be considered cheating as well. For further information on this subject you may refer to the Academic Dishonesty section of the University's online catalog.
In conclusion, it is our mission to prepare each student for a life of significance and service. Honesty and ethical behavior are the foundation upon which such lives are built. We therefore expect the highest standards of each student in this regard.
Attendance Policy for Graduate Courses
The graduate courses in the SBNM are all 7 weeks in length. Missing one class session is allowed without penalty as long as all readings and assignments are made up by the student within a reasonable time period (the following week). Failing to log into an online course site for an entire week is allowed, but a penalty may be applied at the instructor's discretion. Missing a second class session is allowed only in unusual circumstances by prior arrangement with the instructor. Since this represents almost 30% of the engagement time for the course, the student runs the risk of receiving a lower overall grade for the class. Faculty are encouraged to drop the course grade by a full letter grade in this situation. A student who misses three classes (or the equivalent 2 weeks for an online class) will automatically fail the course, unless the student drops the course before the seventh week of class. Students who drop a course will be held responsible for tuition, based upon the current North Park University policy outlined in the University Catalog (found on the NPU website).
Attendance Policy for Undergraduate Courses
Attendance and participation are vital. Thus, students are expected to attend every class session, and to arrive on time – tardiness is undesirable and disruptive to your fellow classmates. This course has a strict requirement of documented, advance notification. If you are unable to attend any class session, you are to inform me (preferably by email) prior to that session. You need to provide a reason for your absence. Failure to provide advance notification will result in an unexcused absence. Be advised that poor attendance can affect your grade adversely
APA Requirement
The School of Business and Nonprofit Management (SBNM) has adopted the Publication Manual of the American Psychological Association (APA) as the standard and required format for all written assignments in SBNM courses.
Our goal in adopting the APA Manual is to enhance student learning by:
1) Improving student's writing skills.
2) Standardizing the required format of all written assignments in all SBNM courses.
3) Emphasizing the importance of paper mechanics, grammatical constructs, and the necessity of proper citations.
4) Holding students accountable for high quality written work.
If you are unfamiliar with the requirements of the APA Manual, we recommend that you purchase the reference manual and/or that you consult one or more of the suggested resources as listed on the Student Resources section of the SBNM website. It is your responsibility to learn and ensure that all written work is formatted according to the standards of the APA Manual.
Students with Disabilities
Students with disabilities who believe that they may need accommodations in this class are encouraged to contact your program's office (Business: 773-244-6270). Please do so as soon as possible to better ensure that such accommodations are implemented in a timely manner. For further information please review the following website: http://www.northpark.edu/ada
| 23,047
|
end_of_word
|
&
|
remove_one_sentence
|
<url>
http://www.northpark.edu/~/media/Files/PDF/Academics/School%20of%20Business%20and%20Nonprofit%20Management/Syllabi/Fall%20A%202013%20Syllabi/SBNM%205610%20BACKLUND%20online.ashx
</url>
<text>
School of Business and Nonprofit Management Course Syllabus
Course: SBNM 5610 – Marketing Analysis and Consumer Behavior - A12
Academic Year: 2013/14 Semester/Quad: Fall A
Credit Hours: 2
Prerequisites: none
Instructor: Paul T. Backlund
Phone: 1-847-920-1345 Fax: 1-847-920-1346
Email: [email protected]
Availability:
On line any time via e-mail. I will reply within 24 hours during the week and within 48 hours on weekends. Also, if necessary, telephone conversations can be requested (send email to request times).
Course Description:
This course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-tobusiness and, to a small extent, the nonprofit sector. The survey begins in this course and is completed in SBNM 5611, Advanced Marketing Management
Introductory Comments:
Welcome to the course. I look forward to exploring marketing management with you!
Perhaps the most important thing to note at the outset is that a very widely held misconception is that marketing is simply about advertising and promotion. While, advertising and promotional activities are a very important part of marketing, they are but a portion of marketing management. The discipline that we call marketing management involves a number of things. In essence, marketing management is the process of creating customer value, delivering that value and communicating that value:
Creating Value
•Strategy &
Planning
•Market Analysis &
Research
•Loyalty Programs
•Branding
•Product Design &
Pricing
Delivering Value
•Channel Design
•Managing Retailing & Wholesaling & Logistics
Communicating Value
•Designing & Managing Sales Function
•Advertising &
Promotion
•Events & PR
•Direct &
Interactive
Marketing
•Digital Marketing
1
While the activities involved with "communicating value" are the most visible to the general observer, actually more of the marketer's combined effort goes into "creating value" and "delivering value."
Course Materials:
REQUIRED
Textbook(s):
Marketing Management (Prentice Hall 14
Philip Kotler and Kevin Keller,
ISBN: 978-0-13-210292-6
(Note, this same textbook is also used for SBNM 5611. Approximately ½ of the book is covered in SBNM 5610 and the remainder is covered in SBNM 5611.)
Cases:
Several Harvard Business School (HBS) cases are utilized in this course. These cases will be distributed via Moodle and each student will have a corresponding copyright fee of $25.00 posted to their account.
Articles:
Articles from various business publications will be assigned via Moodle. Either a copy of the article, or a link to the article, will be posted.
OPTIONAL
There may be optional references or articles noted via Moodle.
Essential IDEA Objectives:
The essential objectives of this course (per the IDEA framework, a nationally recognized assessment tool used by many higher learning institutions) are:
1. Learning fundamental principles, generalizations, or theories.
2. Learning to apply course material (to improve thinking, problem solving, and decisions).
3. Learning to analyze and critically evaluate ideas, arguments, and points of view.
Specific Course Objectives:
This course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. Modules include strategic and marketing planning, consumer behavior, marketing and advertising research, segmentation strategies, branding, competitive and marketing mix strategies, and positioning concepts. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-to-business and, to a small extent, the nonprofit sector. The survey begins in SBNM 5610 and is completed in SBNM 5611.
Upon successful completion of SBNM 5610, students will have the ability to:
- Gather and assess information about customers' needs and buying patterns, and subsequently determine a product's value to potential customers.
th
Edition)
- Given a marketing decision facing a firm, determine what type of market research would be relevant to the decision. Make recommendations about how to gather that research; determine how much money should be spent; how to analyze the results; and be able to present findings to senior management.
- Given information about a product line's history, assess market situation, industry and competition to make recommendations for future marketing decisions regarding the product.
- Given information about a firm's size, history, and organizational structure, assess industry and market situation to recommend a process for successfully bringing a new product to market.
- Assess the relevance of ethical considerations on marketing decisions.
Just to paint the complete picture, note that upon subsequent successful completion of SBNM 5611, students will have further ability to utilize information gathered through applied business research to develop a product Marketing Plan consistent with the product's position in the market:
- Gather information about a product's cost structure and the costs of any proposed marketing activities, calculate the product's unit contribution and determine the break-even point for the proposed marketing expenditures. Make recommendations for modifying the proposed marketing budget based on your analysis.
- Gather information about a product's cost structure and competition, analyze potential pricing alternatives and make a pricing recommendation.
- Weighing information about customers' needs and buying patterns and the internal capabilities of a company, design a channel strategy for specific products or services produced by that company.
- Assess a product's characteristics and selling benefits to design a sales management plan and develop hiring, training, and compensation recommendations for the sales force.
- Gather information about the external environment and a product's features & benefits, and make recommendations regarding advertising, sales promotions, and public relations.
Weekly Learning Objectives:
| Week | Topic | At conclusion of this week, students will have: |
|---|---|---|
| 1 | Marketing Management Overview Defining Marketing for the 21st Century Developing Marketing Strategies and Plans | Examined the definition of marketing Analyzed foundational marketing concepts Reviewed and discussed the importance of marketing |
| 2 | Capturing Marketing Insights Collecting Information and Forecasting Demand Conducting Marketing Research | Investigated the importance of market/customer data and assessed the need for marketing research Explored different types of marketing information systems Probed various methods of collecting, interpreting and utilizing data Analyzed the marketing research process and the various methods of collecting information |
| 3 | Connecting with Consumers Creating Long-term Loyalty Relationships Analyzing Consumer Markets | Demonstrated application of topics studied in weeks 1 & 2 via a written case study analysis Scrutinized and discussed the use of loyalty programs in customer relationship building Examined consumer behavior and the workings of customer markets |
| Week | Topic |
|---|---|
| 5 | Building Strong Brands Creating Brand Equity Crafting the Brand Positioning |
| 6 | Building Strong Brands (cont.) Competitive Dynamics |
Course Methodology:
The goal of a good management education program should be to give students the opportunity to study and practice the application of management theory. Just studying theory without the opportunity to practice the application of that theory is not very effective. Upon completing their business education, managers will be expected to be able to apply what they've learned to real-world business situations. Just as a doctor or scientist would not be unleashed into the world to practice their craft without first successfully demonstrating that they are able to apply their learnings to real-world situations, so must an aspiring business leader
Thus, this course stresses the application of core marketing principles via the use of case studies. Why utilize case studies? In short, cases have tremendous educational value. Much can be learned by analyzing real-world business dilemmas and proposing solutions.
A business case imitates or simulates a real situation. Cases are verbal representations of reality that put the reader in the role of a participant in the situation. The unit of analysis in cases varies enormously, from a single individual or organization to an entire nation or the world. Cases can range from one page to fifty or more. But they are have a common purpose: to represent reality, to convey a situation with all its cross currents and rough edges—including irrelevancies, sideshows, misconceptions, and little information or an over whelming amount of it.
Most educational texts represent the real as logical and coherent. But real business situations are fluid and inevitably involve uncertainty; they don't present selected and sorted information. Cases don't either. Real situations consist of some clarity, too much or too little information and lots of contingency— and so do cases. They provide business students with the equivalent of laboratories used for educating scientists and doctors. 1
So consider this your laboratory.
Computer Requirements:
In order to effectively participate in and successfully complete this course, each participant will need to have access to a computer and a high-speed internet connection. Please visit http://www.northpark.edu/Campus-Life-and-Services/Inf or mat ion -Tech nol og y/N etwork /M i nimum -Requirements for information on computer requirements.
Technical Skills Required:
To successfully complete the requirements of this course, students must have the technical proficiency to log into the Moodle Learning Management System, download files and open them, complete written assignments using MS WORD (or comparable word processing software with ability to convert output to a PDF format), and upload files into Moodle.
Schedule of Weekly Assignments:
| Week | Dates | Topics | Assignment(s) |
|---|---|---|---|
| 1 | Aug 26- Sept 1 | Marketing Management Overview | Read |
| | | • Defining Marketing for the 21st Century | o Chapters 1 & 2 |
| | | • Developing Marketing Strategies and Plans | o Assigned articles posted on |
| | | | Moodle |
| | | | Assignments due |
| | | | o Discussion Forum participation |
| 2 | | | |
| 3 | Sept 9-15 | Connecting with Consumers | |
| | | • Creating Long-term Loyalty Relationships | |
| | | • Analyzing Consumer Markets | |
| 4 | | | |
| 5 | Sept 23-29 | Building Strong Brands | Read |
| | | • Creating Brand Equity | o Chapters 9 & 10 |
| | | • Crafting the Brand Positioning | |
1 Ellet, W., (2007), The Case Study Handbook: How to Read, Discuss, and Write Persuasively About Cases, Boston, Massachusetts: Harvard Business School Press
| Week | Dates | Topics | Assignment(s) |
|---|---|---|---|
| | | | o Assigned articles posted on |
| | | | Moodle |
| | | | Assignments due |
| | | | o Case Analysis #2 |
| | | | o Discussion Forum participation |
| 6 | | | |
| 7 | Oct 7 - 13 | Wrap- up • Final Case Submission • Final Discussion Board | Assignments due |
| | | | o Final Case Analysis |
| | | | o Discussion Forum participation |
Grading:
There are 200 possible points in this course:
| | Week 1 | Week | Week | Week | Week | Week | Week | Total | Grade |
|---|---|---|---|---|---|---|---|---|---|
| Activity | | 2 | 3 | 4 | 5 | 6 | 7 | Points | % |
| Discussion Forum | 10 | 10 | 10 | 10 | 10 | 10 | 10 | 70 | 35% |
| Case #1 | | | | | | | | | |
| Case #2 | | | | | 40 | | | 40 | 20% |
| Final Case | | | | | | | | | |
| Weekly Point Total | 10 | 10 | 40 | 10 | 50 | 10 | 70 | 200 | |
Grade Mapping:
| | 190-200 | A (95-100%) | 160-164 | B- (80-82%) | <140 | F (<70%) |
|---|---|---|---|---|---|---|
| 180-189 A- (90-94%) | | | 155-159 C+ (77-79%) | | | |
| | 175-179 | B+ (87-89%) | 145-154 | C (73-76%) | | |
| 165-174 B (83-86%) | | | 140-144 C- (70-72%) | | | |
Assignment Grading Policies:
Assignments will be graded according to the rubrics given. Grades, and instructor feedback, will be posted in Moodle.
Please be aware that any late submission of an assignment will incur a penalty. A late submission which is received within 24-hours of the deadline will be assessed an automatic 10% point deduction, and a submission which is received 24-48 hours after the deadline will be assessed an automatic 20% point deduction. No submissions will be accepted over 48-hour past the deadline.
Student Responsibilities:
- Discussion forum participation and written assignments are required for this course. You cannot successfully complete this course without completing the weekly readings assignments. It is imperative that students complete the weekly assigned readings before participating in the discussion forums or beginning a written assignment.
- Assignments will be posted on-line. You will be asked to retrieve assignments from Moodle.
- Use proper "netiquette" (see A Guide to Netiquette in Course Information folder on Moodle).
- For a quick reply, it is best to communicate questions, concerns or issues via email. But, you may also contact me via phone.
Instructor Responsibilities:
As your instructor, I will:
- Provide updated information on relevant resources for the various topics of interest
- Read and critically assess students' assignments and provide feedback within 7-10 days of receipt
- Facilitate a participant-centered course experience, which focuses on student learning
- Respond to all student e-mails within 48 hours of receipt (target is 24 hours)
- Respond to all student phone calls within 48 hours (target is 24 hours)
ASSIGNMENT SPECIFICATIONS
Overview:
Assignments consist of readings, discussion forums and several written case analyses. Due dates are indicated in the Schedule of Weekly Assignments and in Moodle.
The "week" begins on Monday and ends on Sunday. Unless otherwise stated, assignments are due by midnight on the Sunday during the week indicated.
WEEKLY ONLINE DISCUSSION FORUM
Threaded Discussion Requirements:
Weekly forum discussions open Monday of each week and close at midnight of the next Sunday. An initial set of questions will be posted. Each week you are required to post 3 times according to the following schedule:
- You must post/respond to all the initial questions in the 1st post no later than Wednesday of each week.
- The second post must be no later than Friday of the week.
- The third post must be either Saturday or Sunday (before midnight).
Participation in the discussion forum will be graded on a weekly basis according to the following criteria:
| | Timeliness | | The initial post created by | | The initial posting created late. | Initial post not created or created |
|---|---|---|---|---|---|---|
| | | | Wednesday, allowing time for | | | after Friday of the week. |
| | | | others to respond. | | | |
| Initial Response | | Provides a thorough and insightful response to the prompt question(s). | | Post partially answers the prompt question(s). | | |
| | Integration of | | Reinforces course material or | | Refers to lesson content but | Does not refer to key points with |
| | | | challenges interpretation of | | not integrated effectively. | no evidence participant |
| | Content | | | | | |
| | | | material, and does so in a concise | | | understands the key points. Or, is |
| | (Initial & Reply | | | | | |
| | | | manner. Any references to | | | excessively long. |
| | Responses) | | external sources provide | | | |
| | | | references (URL link or page | | | |
| | | | 9 - 10 points | | 7 - 8 points | 0 - 6 points |
|---|---|---|---|---|---|---|
| | | | number in text) so others can | | | |
| | | | follow the thought process. | | | |
| Reply Responses | | Responds to the ideas presented in the original post and required number of responses posted. | | Response are loosely related to the ideas of the original post, and/or less than the required number of responses posted | | |
| | Constructive | | Is characterized by at least three | | Is characterized by two of the | Response is one or none of the |
| | | | of the following: | | following: | following: |
| | Comments | | | | | |
| | | | a. supportive | | a. supportive | a. supportive |
| | (Reply | | | | | |
| | | | b. thought-provoking | | b. thought-provoking | b. thought-provoking |
| | Responses) | | c. challenging | | c. challenging | c. challenging |
| | | | d. reflective | | d. reflective | d. reflective |
| | | | e. ties to course concepts | | e. ties to course concepts | e. ties to course concepts |
| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate but may include inconsistencies or inaccuracies. | | |
WRITTEN CASE ANALYSIS ASSIGNMENTS
Assignment Specifications:
The cases used in this course have been selected from the Harvard Business School Library. The publisher makes these cases available at a discount to educational institutions. There is a $25.00 fee per student, so each student will have the corresponding fee posted to their account.
The cases will be made available via Moodle. Students must note that these documents are copyright protected and are not to be shared or redistributed to others. The instructor will supply a list of questions, pertaining to each case. Students must submit a written case analysis, per the schedule of assignments given earlier.
Your case analysis paper is due before the end of the week in which the assignment is listed. I.e., an assignment which is shown in week 3 is due at the end of that week on Sunday at midnight. Another way to view this is to look at the specific dates listed in the schedule of assignments table. Any assignments due must be uploaded into Moodle by the ending date for that week.
Your paper should provide critical analysis of the case and your answers to the associated list of questions must be incorporated into this analysis. Case analysis papers must follow APA guidelines and should generally be 5-8 pages double spaced, but absolutely no more than 10 pages.
General guidelines for conducting a case analysis:
- You should spend more time thinking about a case than reading it!
- Initially read through the entire case, focusing on understanding the business situation more so than the minute details.
- Read the assigned questions carefully. These questions are your guide to the essential elements of the case. Think about the specific topics being addressed in the course and reflect on how these questions tie into the course content and discussion topics.
- Re-read the case, noting various details (e.g., taking notes, highlighting text, etc.) and reflect on the situation, immediate challenge and potential solutions. Also reflect on your answers to the assigned questions
- Consider yourself to be a key decision maker. Before you begin writing your analysis, make a firm decision on your assessment of the situation, your specific stance and any recommendations that you would give.
- Do not spew back the case details and events of the case in your analysis. Assume that the reader has read the case. Instead, your focus should be on providing a critical assessment of the situation outlined in the case. Summarize key points/details as you explain your rationale, citing references using APA format. But . . . do NOT take a book report approach, do NOT simply summarize or reiterate what you read in the case. View yourself as a key stakeholder in the scenario. If it helps, think of yourself as an "arm-chair quarter-back" or "passenger-seat driver" who is critiquing what the case characters have done and giving opinions, in no uncertain terms, on recommended courses of action.
- Make sure that you address each of the assigned questions in your analysis, but note that a thorough analysis consists of more than just your answers to these questions. The questions are provided as a "guiding light," but you must still navigate your way to the final destination.
- Before drawing your conclusions and making recommendations, it is often a good idea to summarize your rationale (e.g., use a table listing pros vs. cons, a table comparing options, etc.).
- Proof-read your document carefully! Use spelling and grammar checking tools. If possible, have someone else proof-read your document, giving you feedback on whether your points have been well conveyed.
Your written case analysis will be graded according to the following criteria:
| | | | 90 – 100% | | 80 - 89% | | 70 - 79% | | < 70% |
|---|---|---|---|---|---|---|---|---|---|
| | For Case #1 | | | | | | | | |
| | | | 27 - 30 points | | 24 - 26 points | | 21 - 23 points | | < 21 points |
| | max=30pts | | | | | | | | |
| | For Case #2 | | | | | | | | |
| | | | 36 - 40 points | | 32 - 35 points | | 28 - 31 points | | < 28 points |
| | max=40pts | | | | | | | | |
| | For Final Case | | | | | | | | |
| | | | 54 - 60 points | | 48 - 53 points | | 42 - 47 points | | < 42 points |
| | max=60pts | | | | | | | | |
| Content | | Effectively references course content and properly applies principles to real-world situation outlined in case. Length of paper is within the stated limit. | | References course content but application of principles is only partially appropriate for the particular case situation. | | References course content but principles not correctly applied, or unfitting to case situation. Or, paper exceeds page limit. | | Does not refer to course content. Little or no application of course principles. | |
| | Case | | Fully addresses all posed case | | Addresses all posed | | Addresses some but not | | Does not address the |
| | | | questions. Provides a | | case questions. | | all of the posed case | | posed case questions |
| | Questions | | | | | | | | |
| | | | thorough and insightful | | Responses | | questions. Responses | | |
| | | | response to the questions. | | adequate but not | | less than adequate. | | |
| | | | | | exhaustive. | | | | |
| Overall Analysis | | Thorough &<cursor_is_here> Firm position taken, with strong justification. Discussion, conclusions and recommendations demonstrate strong grasp of course content and principles. | | Solid analysis, sufficient depth. Firm position taken and justified in analysis. Conclusions and recommendations follow directly from stated rationale. | | Adequate analysis, adequate depth. Conclusions and recommendations are unclear or questionable, and/or do not correctly apply principles studied in this course. | | Poor analysis. Insufficient depth, no conclusions drawn or rationale is questionable. | |
| | Cumulative | | Final case analysis clearly | | Final case analysis | | Final case analysis only | | Final case analysis |
| | | | demonstrates grasp of, and | | adequately | | partially demonstrates | | does not demonstrate |
| | Thread (for | | | | | | | | |
| | | | properly applies, various core | | demonstrates grasp | | grasp of, and/or | | grasp of core |
| | Final Case | | | | | | | | |
| | | | marketing principles studied | | of, and properly | | questionably applies, | | marketing principles |
| | Only) | | in the course | | applies, various | | various core marketing | studied in the course, |
|---|---|---|---|---|---|---|---|---|
| | | | | | core marketing | | principles studied in the | or improperly applies |
| | | | | | principles studied in | | course | principles. |
| | | | | | the course | | | |
| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate. | | Writing is adequate but may include inaccuracies, and/or some grammatical errors. | | |
| | APA Format | | Follows APA format | | Follows APA format | | Partially follows APA | Does not follow APA |
| | | | | | | | format | format |
POLICY STATEMENTS
Academic Honesty
In keeping with our Christian heritage and commitment, North Park University and the School of Business and Nonprofit Management are committed to the highest possible ethical and moral standards. Just as we will constantly strive to live up to these high standards, we expect our students to do the same. To that end, cheating of any sort will not be tolerated. Students who are discovered cheating are subject to discipline up to and including failure of a course and expulsion.
Our definition of cheating includes but is not limited to:
1. Plagiarism – the use of another's work as one's own without giving credit to the individual. This includes using materials from the internet.
2. Copying another's answers on an examination.
3. Deliberately allowing another to copy one's answers or work.
4. Signing an attendance roster for another who is not present.
In the special instance of group work, the instructor will make clear his/her expectations with respect to individual vs. collaborative work. A violation of these expectations may be considered cheating as well. For further information on this subject you may refer to the Academic Dishonesty section of the University's online catalog.
In conclusion, it is our mission to prepare each student for a life of significance and service. Honesty and ethical behavior are the foundation upon which such lives are built. We therefore expect the highest standards of each student in this regard.
Attendance Policy for Graduate Courses
The graduate courses in the SBNM are all 7 weeks in length. Missing one class session is allowed without penalty as long as all readings and assignments are made up by the student within a reasonable time period (the following week). Failing to log into an online course site for an entire week is allowed, but a penalty may be applied at the instructor's discretion. Missing a second class session is allowed only in unusual circumstances by prior arrangement with the instructor. Since this represents almost 30% of the engagement time for the course, the student runs the risk of receiving a lower overall grade for the class. Faculty are encouraged to drop the course grade by a full letter grade in this situation. A student who misses three classes (or the equivalent 2 weeks for an online class) will automatically fail the course, unless the student drops the course before the seventh week of class. Students who drop a course will be held responsible for tuition, based upon the current North Park University policy outlined in the University Catalog (found on the NPU website).
Attendance Policy for Undergraduate Courses
Attendance and participation are vital. Thus, students are expected to attend every class session, and to arrive on time – tardiness is undesirable and disruptive to your fellow classmates. This course has a strict requirement of documented, advance notification. If you are unable to attend any class session, you are to inform me (preferably by email) prior to that session. You need to provide a reason for your absence. Failure to provide advance notification will result in an unexcused absence. Be advised that poor attendance can affect your grade adversely
APA Requirement
The School of Business and Nonprofit Management (SBNM) has adopted the Publication Manual of the American Psychological Association (APA) as the standard and required format for all written assignments in SBNM courses.
Our goal in adopting the APA Manual is to enhance student learning by:
1) Improving student's writing skills.
2) Standardizing the required format of all written assignments in all SBNM courses.
3) Emphasizing the importance of paper mechanics, grammatical constructs, and the necessity of proper citations.
4) Holding students accountable for high quality written work.
If you are unfamiliar with the requirements of the APA Manual, we recommend that you purchase the reference manual and/or that you consult one or more of the suggested resources as listed on the Student Resources section of the SBNM website. It is your responsibility to learn and ensure that all written work is formatted according to the standards of the APA Manual.
Students with Disabilities
Students with disabilities who believe that they may need accommodations in this class are encouraged to contact your program's office (Business: 773-244-6270). Please do so as soon as possible to better ensure that such accommodations are implemented in a timely manner. For further information please review the following website: http://www.northpark.edu/ada
</text>
|
[
{
"content": "<url>\nhttp://www.northpark.edu/~/media/Files/PDF/Academics/School%20of%20Business%20and%20Nonprofit%20Management/Syllabi/Fall%20A%202013%20Syllabi/SBNM%205610%20BACKLUND%20online.ashx\n</url>\n<text>\nSchool of Business and Nonprofit Management Course Syllabus\n\nCourse: SBNM 5610 – Marketing Analysis and Consumer Behavior - A12\n\nAcademic Year: 2013/14 Semester/Quad: Fall A\n\nCredit Hours: 2\n\nPrerequisites: none\n\nInstructor: Paul T. Backlund\n\nPhone: 1-847-920-1345 Fax: 1-847-920-1346\n\nEmail: [email protected]\n\nAvailability:\n\nOn line any time via e-mail. I will reply within 24 hours during the week and within 48 hours on weekends. Also, if necessary, telephone conversations can be requested (send email to request times).\n\nCourse Description:\n\nThis course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-tobusiness and, to a small extent, the nonprofit sector. The survey begins in this course and is completed in SBNM 5611, Advanced Marketing Management\n\nIntroductory Comments:\n\nWelcome to the course. I look forward to exploring marketing management with you!\n\nPerhaps the most important thing to note at the outset is that a very widely held misconception is that marketing is simply about advertising and promotion. While, advertising and promotional activities are a very important part of marketing, they are but a portion of marketing management. The discipline that we call marketing management involves a number of things. In essence, marketing management is the process of creating customer value, delivering that value and communicating that value:\n\nCreating Value\n•Strategy &\nPlanning\n•Market Analysis &\nResearch\n•Loyalty Programs\n•Branding\n•Product Design &\nPricing\nDelivering Value\n•Channel Design\n•Managing Retailing & Wholesaling & Logistics\nCommunicating Value\n•Designing & Managing Sales Function\n•Advertising &\nPromotion\n•Events & PR\n•Direct &\nInteractive\nMarketing\n•Digital Marketing\n\n1\n\nWhile the activities involved with \"communicating value\" are the most visible to the general observer, actually more of the marketer's combined effort goes into \"creating value\" and \"delivering value.\"\n\nCourse Materials:\n\nREQUIRED\n\nTextbook(s):\n\nMarketing Management (Prentice Hall 14\n\nPhilip Kotler and Kevin Keller,\n\nISBN: 978-0-13-210292-6\n\n(Note, this same textbook is also used for SBNM 5611. Approximately ½ of the book is covered in SBNM 5610 and the remainder is covered in SBNM 5611.)\n\nCases:\n\nSeveral Harvard Business School (HBS) cases are utilized in this course. These cases will be distributed via Moodle and each student will have a corresponding copyright fee of $25.00 posted to their account.\n\nArticles:\n\nArticles from various business publications will be assigned via Moodle. Either a copy of the article, or a link to the article, will be posted.\n\nOPTIONAL\n\nThere may be optional references or articles noted via Moodle.\n\nEssential IDEA Objectives:\n\nThe essential objectives of this course (per the IDEA framework, a nationally recognized assessment tool used by many higher learning institutions) are:\n\n1. Learning fundamental principles, generalizations, or theories.\n2. Learning to apply course material (to improve thinking, problem solving, and decisions).\n3. Learning to analyze and critically evaluate ideas, arguments, and points of view.\n\nSpecific Course Objectives:\n\nThis course is designed to provide students with an overview of the field of marketing management. This is done via a survey of the various responsibilities that comprise typical product/brand management roles in industry. Modules include strategic and marketing planning, consumer behavior, marketing and advertising research, segmentation strategies, branding, competitive and marketing mix strategies, and positioning concepts. The course will use a mix of scholarly works and practical applications. Marketing management will be explored within the traditional packaged goods arena as well as business-to-business and, to a small extent, the nonprofit sector. The survey begins in SBNM 5610 and is completed in SBNM 5611.\n\nUpon successful completion of SBNM 5610, students will have the ability to:\n\n- Gather and assess information about customers' needs and buying patterns, and subsequently determine a product's value to potential customers.\n\nth\n\nEdition)\n\n- Given a marketing decision facing a firm, determine what type of market research would be relevant to the decision. Make recommendations about how to gather that research; determine how much money should be spent; how to analyze the results; and be able to present findings to senior management.\n- Given information about a product line's history, assess market situation, industry and competition to make recommendations for future marketing decisions regarding the product.\n- Given information about a firm's size, history, and organizational structure, assess industry and market situation to recommend a process for successfully bringing a new product to market.\n- Assess the relevance of ethical considerations on marketing decisions.\n\nJust to paint the complete picture, note that upon subsequent successful completion of SBNM 5611, students will have further ability to utilize information gathered through applied business research to develop a product Marketing Plan consistent with the product's position in the market:\n\n- Gather information about a product's cost structure and the costs of any proposed marketing activities, calculate the product's unit contribution and determine the break-even point for the proposed marketing expenditures. Make recommendations for modifying the proposed marketing budget based on your analysis.\n- Gather information about a product's cost structure and competition, analyze potential pricing alternatives and make a pricing recommendation.\n- Weighing information about customers' needs and buying patterns and the internal capabilities of a company, design a channel strategy for specific products or services produced by that company.\n- Assess a product's characteristics and selling benefits to design a sales management plan and develop hiring, training, and compensation recommendations for the sales force.\n- Gather information about the external environment and a product's features & benefits, and make recommendations regarding advertising, sales promotions, and public relations.\n\nWeekly Learning Objectives:\n\n| Week | Topic | At conclusion of this week, students will have: |\n|---|---|---|\n| 1 | Marketing Management Overview Defining Marketing for the 21st Century Developing Marketing Strategies and Plans | Examined the definition of marketing Analyzed foundational marketing concepts Reviewed and discussed the importance of marketing |\n| 2 | Capturing Marketing Insights Collecting Information and Forecasting Demand Conducting Marketing Research | Investigated the importance of market/customer data and assessed the need for marketing research Explored different types of marketing information systems Probed various methods of collecting, interpreting and utilizing data Analyzed the marketing research process and the various methods of collecting information |\n| 3 | Connecting with Consumers Creating Long-term Loyalty Relationships Analyzing Consumer Markets | Demonstrated application of topics studied in weeks 1 & 2 via a written case study analysis Scrutinized and discussed the use of loyalty programs in customer relationship building Examined consumer behavior and the workings of customer markets |\n\n| Week | Topic |\n|---|---|\n| 5 | Building Strong Brands Creating Brand Equity Crafting the Brand Positioning |\n| 6 | Building Strong Brands (cont.) Competitive Dynamics |\n\nCourse Methodology:\n\nThe goal of a good management education program should be to give students the opportunity to study and practice the application of management theory. Just studying theory without the opportunity to practice the application of that theory is not very effective. Upon completing their business education, managers will be expected to be able to apply what they've learned to real-world business situations. Just as a doctor or scientist would not be unleashed into the world to practice their craft without first successfully demonstrating that they are able to apply their learnings to real-world situations, so must an aspiring business leader\n\nThus, this course stresses the application of core marketing principles via the use of case studies. Why utilize case studies? In short, cases have tremendous educational value. Much can be learned by analyzing real-world business dilemmas and proposing solutions.\n\nA business case imitates or simulates a real situation. Cases are verbal representations of reality that put the reader in the role of a participant in the situation. The unit of analysis in cases varies enormously, from a single individual or organization to an entire nation or the world. Cases can range from one page to fifty or more. But they are have a common purpose: to represent reality, to convey a situation with all its cross currents and rough edges—including irrelevancies, sideshows, misconceptions, and little information or an over whelming amount of it.\n\nMost educational texts represent the real as logical and coherent. But real business situations are fluid and inevitably involve uncertainty; they don't present selected and sorted information. Cases don't either. Real situations consist of some clarity, too much or too little information and lots of contingency— and so do cases. They provide business students with the equivalent of laboratories used for educating scientists and doctors. 1\n\nSo consider this your laboratory.\n\nComputer Requirements:\n\nIn order to effectively participate in and successfully complete this course, each participant will need to have access to a computer and a high-speed internet connection. Please visit http://www.northpark.edu/Campus-Life-and-Services/Inf or mat ion -Tech nol og y/N etwork /M i nimum -Requirements for information on computer requirements.\n\nTechnical Skills Required:\n\nTo successfully complete the requirements of this course, students must have the technical proficiency to log into the Moodle Learning Management System, download files and open them, complete written assignments using MS WORD (or comparable word processing software with ability to convert output to a PDF format), and upload files into Moodle.\n\nSchedule of Weekly Assignments:\n\n| Week | Dates | Topics | Assignment(s) |\n|---|---|---|---|\n| 1 | Aug 26- Sept 1 | Marketing Management Overview | Read |\n| | | • Defining Marketing for the 21st Century | o Chapters 1 & 2 |\n| | | • Developing Marketing Strategies and Plans | o Assigned articles posted on |\n| | | | Moodle |\n| | | | Assignments due |\n| | | | o Discussion Forum participation |\n| 2 | | | |\n| 3 | Sept 9-15 | Connecting with Consumers | |\n| | | • Creating Long-term Loyalty Relationships | |\n| | | • Analyzing Consumer Markets | |\n| 4 | | | |\n| 5 | Sept 23-29 | Building Strong Brands | Read |\n| | | • Creating Brand Equity | o Chapters 9 & 10 |\n| | | • Crafting the Brand Positioning | |\n\n1 Ellet, W., (2007), The Case Study Handbook: How to Read, Discuss, and Write Persuasively About Cases, Boston, Massachusetts: Harvard Business School Press\n\n| Week | Dates | Topics | Assignment(s) |\n|---|---|---|---|\n| | | | o Assigned articles posted on |\n| | | | Moodle |\n| | | | Assignments due |\n| | | | o Case Analysis #2 |\n| | | | o Discussion Forum participation |\n| 6 | | | |\n| 7 | Oct 7 - 13 | Wrap- up • Final Case Submission • Final Discussion Board | Assignments due |\n| | | | o Final Case Analysis |\n| | | | o Discussion Forum participation |\n\nGrading:\n\nThere are 200 possible points in this course:\n\n| | Week 1 | Week | Week | Week | Week | Week | Week | Total | Grade |\n|---|---|---|---|---|---|---|---|---|---|\n| Activity | | 2 | 3 | 4 | 5 | 6 | 7 | Points | % |\n| Discussion Forum | 10 | 10 | 10 | 10 | 10 | 10 | 10 | 70 | 35% |\n| Case #1 | | | | | | | | | |\n| Case #2 | | | | | 40 | | | 40 | 20% |\n| Final Case | | | | | | | | | |\n| Weekly Point Total | 10 | 10 | 40 | 10 | 50 | 10 | 70 | 200 | |\n\nGrade Mapping:\n\n| | 190-200 | A (95-100%) | 160-164 | B- (80-82%) | <140 | F (<70%) |\n|---|---|---|---|---|---|---|\n| 180-189 A- (90-94%) | | | 155-159 C+ (77-79%) | | | |\n| | 175-179 | B+ (87-89%) | 145-154 | C (73-76%) | | |\n| 165-174 B (83-86%) | | | 140-144 C- (70-72%) | | | |\n\nAssignment Grading Policies:\n\nAssignments will be graded according to the rubrics given. Grades, and instructor feedback, will be posted in Moodle.\n\nPlease be aware that any late submission of an assignment will incur a penalty. A late submission which is received within 24-hours of the deadline will be assessed an automatic 10% point deduction, and a submission which is received 24-48 hours after the deadline will be assessed an automatic 20% point deduction. No submissions will be accepted over 48-hour past the deadline.\n\nStudent Responsibilities:\n\n- Discussion forum participation and written assignments are required for this course. You cannot successfully complete this course without completing the weekly readings assignments. It is imperative that students complete the weekly assigned readings before participating in the discussion forums or beginning a written assignment.\n- Assignments will be posted on-line. You will be asked to retrieve assignments from Moodle.\n- Use proper \"netiquette\" (see A Guide to Netiquette in Course Information folder on Moodle).\n\n- For a quick reply, it is best to communicate questions, concerns or issues via email. But, you may also contact me via phone.\n\nInstructor Responsibilities:\n\nAs your instructor, I will:\n\n- Provide updated information on relevant resources for the various topics of interest\n- Read and critically assess students' assignments and provide feedback within 7-10 days of receipt\n- Facilitate a participant-centered course experience, which focuses on student learning\n- Respond to all student e-mails within 48 hours of receipt (target is 24 hours)\n- Respond to all student phone calls within 48 hours (target is 24 hours)\n\nASSIGNMENT SPECIFICATIONS\n\nOverview:\n\nAssignments consist of readings, discussion forums and several written case analyses. Due dates are indicated in the Schedule of Weekly Assignments and in Moodle.\n\nThe \"week\" begins on Monday and ends on Sunday. Unless otherwise stated, assignments are due by midnight on the Sunday during the week indicated.\n\nWEEKLY ONLINE DISCUSSION FORUM\n\nThreaded Discussion Requirements:\n\nWeekly forum discussions open Monday of each week and close at midnight of the next Sunday. An initial set of questions will be posted. Each week you are required to post 3 times according to the following schedule:\n\n- You must post/respond to all the initial questions in the 1st post no later than Wednesday of each week.\n- The second post must be no later than Friday of the week.\n- The third post must be either Saturday or Sunday (before midnight).\n\nParticipation in the discussion forum will be graded on a weekly basis according to the following criteria:\n\n| | Timeliness | | The initial post created by | | The initial posting created late. | Initial post not created or created |\n|---|---|---|---|---|---|---|\n| | | | Wednesday, allowing time for | | | after Friday of the week. |\n| | | | others to respond. | | | |\n| Initial Response | | Provides a thorough and insightful response to the prompt question(s). | | Post partially answers the prompt question(s). | | |\n| | Integration of | | Reinforces course material or | | Refers to lesson content but | Does not refer to key points with |\n| | | | challenges interpretation of | | not integrated effectively. | no evidence participant |\n| | Content | | | | | |\n| | | | material, and does so in a concise | | | understands the key points. Or, is |\n| | (Initial & Reply | | | | | |\n| | | | manner. Any references to | | | excessively long. |\n| | Responses) | | external sources provide | | | |\n| | | | references (URL link or page | | | |\n\n| | | | 9 - 10 points | | 7 - 8 points | 0 - 6 points |\n|---|---|---|---|---|---|---|\n| | | | number in text) so others can | | | |\n| | | | follow the thought process. | | | |\n| Reply Responses | | Responds to the ideas presented in the original post and required number of responses posted. | | Response are loosely related to the ideas of the original post, and/or less than the required number of responses posted | | |\n| | Constructive | | Is characterized by at least three | | Is characterized by two of the | Response is one or none of the |\n| | | | of the following: | | following: | following: |\n| | Comments | | | | | |\n| | | | a. supportive | | a. supportive | a. supportive |\n| | (Reply | | | | | |\n| | | | b. thought-provoking | | b. thought-provoking | b. thought-provoking |\n| | Responses) | | c. challenging | | c. challenging | c. challenging |\n| | | | d. reflective | | d. reflective | d. reflective |\n| | | | e. ties to course concepts | | e. ties to course concepts | e. ties to course concepts |\n| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate but may include inconsistencies or inaccuracies. | | |\n\nWRITTEN CASE ANALYSIS ASSIGNMENTS\n\nAssignment Specifications:\n\nThe cases used in this course have been selected from the Harvard Business School Library. The publisher makes these cases available at a discount to educational institutions. There is a $25.00 fee per student, so each student will have the corresponding fee posted to their account.\n\nThe cases will be made available via Moodle. Students must note that these documents are copyright protected and are not to be shared or redistributed to others. The instructor will supply a list of questions, pertaining to each case. Students must submit a written case analysis, per the schedule of assignments given earlier.\n\nYour case analysis paper is due before the end of the week in which the assignment is listed. I.e., an assignment which is shown in week 3 is due at the end of that week on Sunday at midnight. Another way to view this is to look at the specific dates listed in the schedule of assignments table. Any assignments due must be uploaded into Moodle by the ending date for that week.\n\nYour paper should provide critical analysis of the case and your answers to the associated list of questions must be incorporated into this analysis. Case analysis papers must follow APA guidelines and should generally be 5-8 pages double spaced, but absolutely no more than 10 pages.\n\nGeneral guidelines for conducting a case analysis:\n\n- You should spend more time thinking about a case than reading it!\n- Initially read through the entire case, focusing on understanding the business situation more so than the minute details.\n- Read the assigned questions carefully. These questions are your guide to the essential elements of the case. Think about the specific topics being addressed in the course and reflect on how these questions tie into the course content and discussion topics.\n\n- Re-read the case, noting various details (e.g., taking notes, highlighting text, etc.) and reflect on the situation, immediate challenge and potential solutions. Also reflect on your answers to the assigned questions\n- Consider yourself to be a key decision maker. Before you begin writing your analysis, make a firm decision on your assessment of the situation, your specific stance and any recommendations that you would give.\n- Do not spew back the case details and events of the case in your analysis. Assume that the reader has read the case. Instead, your focus should be on providing a critical assessment of the situation outlined in the case. Summarize key points/details as you explain your rationale, citing references using APA format. But . . . do NOT take a book report approach, do NOT simply summarize or reiterate what you read in the case. View yourself as a key stakeholder in the scenario. If it helps, think of yourself as an \"arm-chair quarter-back\" or \"passenger-seat driver\" who is critiquing what the case characters have done and giving opinions, in no uncertain terms, on recommended courses of action.\n- Make sure that you address each of the assigned questions in your analysis, but note that a thorough analysis consists of more than just your answers to these questions. The questions are provided as a \"guiding light,\" but you must still navigate your way to the final destination.\n- Before drawing your conclusions and making recommendations, it is often a good idea to summarize your rationale (e.g., use a table listing pros vs. cons, a table comparing options, etc.).\n- Proof-read your document carefully! Use spelling and grammar checking tools. If possible, have someone else proof-read your document, giving you feedback on whether your points have been well conveyed.\n\nYour written case analysis will be graded according to the following criteria:\n\n| | | | 90 – 100% | | 80 - 89% | | 70 - 79% | | < 70% |\n|---|---|---|---|---|---|---|---|---|---|\n| | For Case #1 | | | | | | | | |\n| | | | 27 - 30 points | | 24 - 26 points | | 21 - 23 points | | < 21 points |\n| | max=30pts | | | | | | | | |\n| | For Case #2 | | | | | | | | |\n| | | | 36 - 40 points | | 32 - 35 points | | 28 - 31 points | | < 28 points |\n| | max=40pts | | | | | | | | |\n| | For Final Case | | | | | | | | |\n| | | | 54 - 60 points | | 48 - 53 points | | 42 - 47 points | | < 42 points |\n| | max=60pts | | | | | | | | |\n| Content | | Effectively references course content and properly applies principles to real-world situation outlined in case. Length of paper is within the stated limit. | | References course content but application of principles is only partially appropriate for the particular case situation. | | References course content but principles not correctly applied, or unfitting to case situation. Or, paper exceeds page limit. | | Does not refer to course content. Little or no application of course principles. | |\n| | Case | | Fully addresses all posed case | | Addresses all posed | | Addresses some but not | | Does not address the |\n| | | | questions. Provides a | | case questions. | | all of the posed case | | posed case questions |\n| | Questions | | | | | | | | |\n| | | | thorough and insightful | | Responses | | questions. Responses | | |\n| | | | response to the questions. | | adequate but not | | less than adequate. | | |\n| | | | | | exhaustive. | | | | |\n| Overall Analysis | | Thorough &<cursor_is_here> Firm position taken, with strong justification. Discussion, conclusions and recommendations demonstrate strong grasp of course content and principles. | | Solid analysis, sufficient depth. Firm position taken and justified in analysis. Conclusions and recommendations follow directly from stated rationale. | | Adequate analysis, adequate depth. Conclusions and recommendations are unclear or questionable, and/or do not correctly apply principles studied in this course. | | Poor analysis. Insufficient depth, no conclusions drawn or rationale is questionable. | |\n| | Cumulative | | Final case analysis clearly | | Final case analysis | | Final case analysis only | | Final case analysis |\n| | | | demonstrates grasp of, and | | adequately | | partially demonstrates | | does not demonstrate |\n| | Thread (for | | | | | | | | |\n| | | | properly applies, various core | | demonstrates grasp | | grasp of, and/or | | grasp of core |\n| | Final Case | | | | | | | | |\n| | | | marketing principles studied | | of, and properly | | questionably applies, | | marketing principles |\n\n| | Only) | | in the course | | applies, various | | various core marketing | studied in the course, |\n|---|---|---|---|---|---|---|---|---|\n| | | | | | core marketing | | principles studied in the | or improperly applies |\n| | | | | | principles studied in | | course | principles. |\n| | | | | | the course | | | |\n| Clear Writing | | Organized, concise, grammatically correct, clearly written in understandable language. | | Writing is adequate. | | Writing is adequate but may include inaccuracies, and/or some grammatical errors. | | |\n| | APA Format | | Follows APA format | | Follows APA format | | Partially follows APA | Does not follow APA |\n| | | | | | | | format | format |\n\nPOLICY STATEMENTS\n\nAcademic Honesty\n\nIn keeping with our Christian heritage and commitment, North Park University and the School of Business and Nonprofit Management are committed to the highest possible ethical and moral standards. Just as we will constantly strive to live up to these high standards, we expect our students to do the same. To that end, cheating of any sort will not be tolerated. Students who are discovered cheating are subject to discipline up to and including failure of a course and expulsion.\n\nOur definition of cheating includes but is not limited to:\n\n1. Plagiarism – the use of another's work as one's own without giving credit to the individual. This includes using materials from the internet.\n2. Copying another's answers on an examination.\n3. Deliberately allowing another to copy one's answers or work.\n4. Signing an attendance roster for another who is not present.\n\nIn the special instance of group work, the instructor will make clear his/her expectations with respect to individual vs. collaborative work. A violation of these expectations may be considered cheating as well. For further information on this subject you may refer to the Academic Dishonesty section of the University's online catalog.\n\nIn conclusion, it is our mission to prepare each student for a life of significance and service. Honesty and ethical behavior are the foundation upon which such lives are built. We therefore expect the highest standards of each student in this regard.\n\nAttendance Policy for Graduate Courses\n\nThe graduate courses in the SBNM are all 7 weeks in length. Missing one class session is allowed without penalty as long as all readings and assignments are made up by the student within a reasonable time period (the following week). Failing to log into an online course site for an entire week is allowed, but a penalty may be applied at the instructor's discretion. Missing a second class session is allowed only in unusual circumstances by prior arrangement with the instructor. Since this represents almost 30% of the engagement time for the course, the student runs the risk of receiving a lower overall grade for the class. Faculty are encouraged to drop the course grade by a full letter grade in this situation. A student who misses three classes (or the equivalent 2 weeks for an online class) will automatically fail the course, unless the student drops the course before the seventh week of class. Students who drop a course will be held responsible for tuition, based upon the current North Park University policy outlined in the University Catalog (found on the NPU website).\n\nAttendance Policy for Undergraduate Courses\n\nAttendance and participation are vital. Thus, students are expected to attend every class session, and to arrive on time – tardiness is undesirable and disruptive to your fellow classmates. This course has a strict requirement of documented, advance notification. If you are unable to attend any class session, you are to inform me (preferably by email) prior to that session. You need to provide a reason for your absence. Failure to provide advance notification will result in an unexcused absence. Be advised that poor attendance can affect your grade adversely\n\nAPA Requirement\n\nThe School of Business and Nonprofit Management (SBNM) has adopted the Publication Manual of the American Psychological Association (APA) as the standard and required format for all written assignments in SBNM courses.\n\nOur goal in adopting the APA Manual is to enhance student learning by:\n\n1) Improving student's writing skills.\n2) Standardizing the required format of all written assignments in all SBNM courses.\n3) Emphasizing the importance of paper mechanics, grammatical constructs, and the necessity of proper citations.\n4) Holding students accountable for high quality written work.\n\nIf you are unfamiliar with the requirements of the APA Manual, we recommend that you purchase the reference manual and/or that you consult one or more of the suggested resources as listed on the Student Resources section of the SBNM website. It is your responsibility to learn and ensure that all written work is formatted according to the standards of the APA Manual.\n\nStudents with Disabilities\n\nStudents with disabilities who believe that they may need accommodations in this class are encouraged to contact your program's office (Business: 773-244-6270). Please do so as soon as possible to better ensure that such accommodations are implemented in a timely manner. For further information please review the following website: http://www.northpark.edu/ada\n</text>\n",
"role": "user"
},
{
"content": " concrete analysis, going beyond posed case questions.",
"role": "assistant"
}
] |
F.C.J. Secondary School Bunclody - History (1861 – 2009)
Bunclody, a small town in Co. Wexford was called Newtownbarry when the F.C.J.sisters came in 1861. Bunclody was the original name of the town but it was renamed Newtownbarry when the Barry family became the local landlords. Following a local referendum in 1950, the town reverted to its original name.
Following the famine years in Ireland, there was great poverty and basic education was much needed by the youth in the towns and villages. Father Parle, the curate in Bunclody was very aware of this and determined to do what he could to improve the educational facilities in his parish. Strong oral tradition in the Convent and in the area suggests that Fr. Parle first encountered the Sisters when he was a student in the seminary in Paris. At any rate he applied to the Superior General of the Sisters, Faithful Companions of Jesus to send Sisters to provide much needed education for the children of the area.
The Superior General agreed to send Sisters and so Reverend Mother Josephine Petit, Superior General and Mother Marie de Bussy, Assistant General arrived on the 5 August 1861. They were assisted by the Provincial Superior of the Irish houses at Laurel Hill and Bruff together with two other Sisters. Father Parle's house, adjacent to the parish church was transformed into a convent and an annexe added to house a community. Five Sisters: Lucy Fletcher, Ellen Blacket, Mary Philomena Parsons, Teresa Ann Murray, Elizabeth Graham, Mary Redman and Frances Sheehan formed the first community. They immediately took over the running of the girl's primary school but they did not limit their work to primary education.
The F.C.J. sisters had a tradition of working with boarders, having a number of such schools in their Society, on the Continent, in England and more recently in Limerick. So it seemed the most suitable way of providing post primary education in the South Leinster area. We know little about the early days. However we do know that on August 10, 1861, five days after the arrival of the Faithful Companions of Jesus in Bunclody, a notice appeared in "The People" newspaper announcing the Sisters' intention of opening a Boarding School. "to afford to parents an opportunity of giving to their children a good religious education". We know that the school must have thrived from the beginning as the records show that in 1864, the community consisted of ten sisters but two years later this number rose to sixteen and from 1877 there were twenty five sisters in the Convent. We do not know for sure if day pupils were taken from the beginning but school records of 1865 give 54 as the number of students; 39 boarders and 15 day-students. Oral tradition tells us that the day pupils were the children of Church of Ireland families in the area and that Catholic day students were not taken until much later. What is certainly true is that Church of Ireland students were always part of the day pupil intake and there were always very harmonious relations with the local Church of Ireland community with a significant number of Church of Ireland students attending the school.
One of the sisters who had a deep and lasting influence on the life of the Convent in Bunclody was Mother Victoire Henahan. She had come to the convent as Superior in 1883 at the age of twenty nine and she was also in charge of the secondary school for a number of years. There is little doubt that it is no small coincidence that her arrival coincides with a period of expansion and building both in the primary and secondary schools. In 1894, a refectory (dining room), study hall and dormitory were built. In 1898, the lady Chapel, junior study and linen room were added. In 1906, a science laboratory, art room and domestic science kitchen were built to accommodate new curriculum requirements. Finally in 1909, recreation rooms, music rooms and extra dormitories were built. It was under the guidance of Mother Victoire also that the Golden Jubilee celebrations of 1911 were celebrated with great style and ceremony.
1
The Halldare family were the local landlord family and following the marriage of the heir to a wealthy young woman it was decided to build a house in keeping with their wealthy status and so began the building of the present demesne house "Ballinapark House". There were no suitable tradesmen in the area for the building of the proposed house so after a long search, tradesmen of the needed high standard were brought from Wales to do the work. The house took several years to build. The Hughes family did the building and the Roberts family were responsible for the carpentry. As the work neared completion the Halldare family were anxious to reduce the number on the work force but the men were having none of this and declared that they would all return together to Wales. However, Mother Victoire needed carpenters and builders and so the dilemma of the families was solved as the workers transferred across the road to begin the extension. The buildings erected were remarkably similar to the Halldare building though less elaborate. The wood panelling, the tiling and the windows were identical. Both families then settled in the area for good. Today and for many years in the past, the descendents of these families have attended the secondary school.
The school continued to flourish during the years that followed and earned a strong reputation for its high academic standards- a reputation richly deserved. The F.C.J. Sisters who taught in the school were very committed teachers and anxious that the students in their care would do well as they knew that these students would have to earn their own living when they left school. It was also an incentive that many of the brothers of the students in the school were boarders in St. Peter's school in Wexford and it was important that the students there were not seen to outdo their sisters in St. Mary's Bunclody in public academic achievement!
The only building that took place in the intervening years was in 1964 when a concert hall, locker rooms and classrooms were built. Secondary education, though State funded was not free, and only a limited section of the population could avail of it so there was no demand for further expansion in the years that followed. During these years, Ireland underwent a long period of economic stagnation, following the emergence of the Free State. The "Economic War" between Ireland and England from 1932 to 1938, though politically popular, led to an agricultural stagnation that seriously affected the country and money was very scarce indeed. There was little growth during the 1950's; indeed these years are often referred to as the 'hungry fifties'. It was only in the late 1950's under the enlightened leadership of Sean Lemass that economic growth took off.
From 1967, the Irish Education scene changed dramatically thanks to the courage and insight of Donncadha O'Malley, Minister of Education, who introduced 'Free Secondary Education' in that year. While the dramatic announcement of 'Free Education' took the population at large by total
2
surprise and was the talk of the summer of 1967, it was both popular and much needed if economic progress was to expand and be sustained. Not only was education to be free in all secondary schools that opted for it (over 95%) but free buses were provided in September for the students who attended these schools. Dramatic expansion of schools followed including St. Mary's in Bunclody.
In 1969, boys were enrolled for the first time. It was the beginning of a new era that was to profoundly affect the development and character of the school. In today's era of consultation with the need for setting up of committees and sub-committees, such a marked initiative would appear to have necessitated wide consultation and planning. But it was not so. Secondary education for boys was not available in the town – the vocational school established in 1950 only offered the Group Cert – an examination taken after two years, which was the normal entry requirement to the trades of carpentry, plumbing etc. So boys who wished to avail of a secondary school education had either the choice of cycling eleven miles to Enniscorthy to the Christian Brothers' school, or attending the boarding school in St. Peter's College in Wexford.
Sr. Barbara Kennedy, who was a teacher in the Secondary school was also sacristan in the Parish Church and among many other duties trained the altar boys. She asked the boys who were 6 th class students in the local primary school where they were going to school in September and they replied that they were going to St. Peter's but that they would prefer to go to the Convent. She suggested that they would go up to the Convent and ask Reverend Mother to go to school there. Three or four boys presented at the Convent, asked for Reverend Mother and made their request to her. Reverend Mother, Sr. Zoe O'Connell, had taught and worked for most of her life in Canada and the U.S. and was used to co-education. She looked at the boys who were 'dressed up' for the visit to the Convent and pronounced that they looked like nice boys and she was sure they were nice boys and that they would be very welcome in September. They went home to spread the word of their welcome and she went to the Principal, Sr. Margaret (Gonzague) Hayes, and told her that she had said the boys would be welcome. Sr. Margaret, an emminently practical woman, made no comment other than to say that boy's toilets would be needed and she sent for Andy Mahon, a local builder, who was always called on when need arose. Fourteen boys presented in September. Today, in 2009, boys number 390 and form fifth percent of the student body.
Until 1986, apart from the occasional part-time lay teacher, the school was staffed by members of the F.C.J. Society mainly because lay teachers were few in number and unwilling to come to a rural school, which had very poor public transport. In 1968 Laura Lennon who had married locally was appointed as a fulltime lay teacher. Then, to the relief of the Principal, three young local people qualified as teachers and were promptly employed by the school. Kathleen MacMullan (née Murphy), Mary Nagle (née O'Leary) and Tony O'Loughlin. From that time onwards, more and more lay teachers were employed. In 2008, Sr. Madeleine Ryan retired and since there was no F.C.J. to replace her as Principal, the position was advertised nationally and Ms Frances Threadgold, the Deputy Principal was appointed by the Board of Management to replace her. Today in 2009, there are fifty lay-teachers, one full-time FC.J. Sister and one part – time F.C.J. Sister teaching in the school.
A prefabricated building was also erected during 1968 which added classrooms, a cloakroom, science laboratory and art room to the school. At this time of writing, a framed photograph in the reception room in the school shows the official opening of that building which was attended by Dr. Herlihy, Bishop of Ferns. In that photograph is a young teacher, Tony O'Loughlin, who was the first fulltime male teacher. In 1975, he was appointed Vice-Principal; the first such appointment in the school and a role he continued to occupy until his appointment as Principal of the Christian Brother's Secondary School, Carlow, in 1986.
With student enrolment increasing annually (1961: 135 students; 1971: 262 students; 1981: 540 students, 1991: 578 students, 2001: 701 students and today 2009: 779 students) additional accommodation became a priority from the end of the 1970's. Ten prefabricated classrooms were first provided with the aid of a Department of Education grant and F.C.J. community resources. In 1986 the new red brick building opened (now named St. Patrick's), providing classrooms, cloakrooms, offices & staff room, biology & physics laboratories, sports hall, language laboratory, art room, library, domestic science kitchen and sewing room. Funding was provided by the Department. of Education and fundraising in the school catchment area. Around this time too, the school, though officially known as "St. Mary's" was much more commonly known as 'the Convent'. At a Staff Meeting, the name 'F.C.J. Secondary School' was suggested and adapted and soon it became so widely and popularly accepted that many would not believe it could have ever had another name.
As the number in the school grew, the number of active Sisters in the Community declined in number and a decision was taken at the time of a General Visitation by the Superior General of the F.C.J. Society in 1981 to close the boarding school. This closure took place over five years and each year, vacated dormitories were occupied by the school as general classrooms. In June 1986 the boarding school finally closed after 125 years. That autumn there was a big re-union of past-pupils, mainly boarders, who wished to meet and reminisce about time spent in the school.
Meanwhile the school continued to thrive. Academic achievement continued to be very important in the school but many other activities were initiated. Musicals, drama productions, orchestra and a variety of games including hurling, football, camogie and basketball continued to be important to the life of the school.
By 1990, change was in the air as the Department of Education began a process of modernisation. Schools were encouraged to set up Boards of Management to reflect the various parties with a vested interest in the education of the students in schools. So in 1996 the first Board of Management was established with Mr. Tim Geraghty, Principal of St. Tiernan's Community School in Dundrum, as Chairperson.
As the number of boys increased, it became evident that more practical subjects were needed to accommodate their natural aptitudes and interests. In 1998 new construction studies and engineering rooms [St. Aidan's Building] were erected and funded by the F.C.J. Society. Teachers were also employed to teach these subjects. The old boarding school, which had increasingly accommodated students since 1982 was in a very poor state of repair by 1990 and it was clear that it would have to be extensively renovated or replaced. A Department of Education official visited and declared the building was unsuitable for renovation and said a new building was the only way forward. So began the long and protracted negotiation with the Department of Education to fund a replacement building. This was made all the more urgent as the old boarding school had become increasingly dilapidated and fears for the safety of the students had grown. Finally permission was given and in October 2001, tenders were accepted for a new extension to replace the Boarding School. In early 2003,
4
the new building, 'St. Victoire's was completed and occupied and the old boarding school was vacated.
Since the original building was planned, the numbers in the school had increased and space was very tight. So when the old Boarding School was demolished, a new extension replaced it, which was funded by the F.C.J. Society. This building is known as 'the d'Houet Building'. The 2003 St. Victoire building was located on the tennis / basket-ball courts but the Department of Education refused to replace them, citing lack of funds. So new basketball / tennis courts, funded by the F.C.J. Society, were provided and the library was converted to music tuition rooms, an office and resource room. The library is now located in room 46 in the d'Houet building. Finally the home economics kitchen & room 68 were refurbished over the summer of 2007. The kitchen (Room 24 - St. Patrick's Building), was in use since 1986 and needed modernising and replacement / renovation of many of the fittings and furniture. Room 68 (St. Victoire's Building) was only built in 2002, but had to be updated to cater for the new Leaving Certificate subject, "Design & Communications Graphics", which has replaced Technical Drawing. Much of the work in this new subject is done on computers so the drawing desks, etc. were replaced by computer work stations. This refurbishment was paid from school savings.
Nationally, the number of religious sisters working in schools throughout the country had seriously declined and it was becoming very evident that the different religious Congregations would not be able to continue the trusteeship of their schools. Facing this reality, twelve religious Congregations, each of whom had only a small number of schools in Ireland, came together to provide a solution to their situation. The F.C.J. Society was one of these Congregations. 'Le Chéile' was established to form a single trusteeship to protect the ethos and interests of their schools and was officially launched in May 2009 in Mullingar and so the school is now at the beginning of a new era in the history of Irish education.
Sr. Madeleine Ryan FCJ
2009
5
|
<urn:uuid:c00e069a-a8d7-4364-b035-f46a6dd87c7c>
|
CC-MAIN-2020-40
|
https://d3bokmeplpq5n0.cloudfront.net/prod/uploads/2018/11/History_of__Bunclody_School.pdf
|
2020-09-28T18:46:58+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00232-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 322,114,446
| 3,644
|
eng_Latn
|
eng_Latn
| 0.99938
|
eng_Latn
| 0.999431
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4097,
7161,
11400,
14824,
16976
] |
F.C.J. Secondary School Bunclody - History (1861 – 2009)
Bunclody, a small town in Co. Wexford was called Newtownbarry when the F.C.J.sisters came in 1861. Bunclody was the original name of the town but it was renamed Newtownbarry when the Barry family became the local landlords. Following a local referendum in 1950, the town reverted to its original name.
Following the famine years in Ireland, there was great poverty and basic education was much needed by the youth in the towns and villages. Father Parle, the curate in Bunclody was very aware of this and determined to do what he could to improve the educational facilities in his parish. Strong oral tradition in the Convent and in the area suggests that Fr. Parle first encountered the Sisters when he was a student in the seminary in Paris. At any rate he applied to the Superior General of the Sisters, Faithful Companions of Jesus to send Sisters to provide much needed education for the children of the area.
The Superior General agreed to send Sisters and so Reverend Mother Josephine Petit, Superior General and Mother Marie de Bussy, Assistant General arrived on the 5 August 1861. They were assisted by the Provincial Superior of the Irish houses at Laurel Hill and Bruff together with two other Sisters. Father Parle's house, adjacent to the parish church was transformed into a convent and an annexe added to house a community. Five Sisters: Lucy Fletcher, Ellen Blacket, Mary Philomena Parsons, Teresa Ann Murray, Elizabeth Graham, Mary Redman and Frances Sheehan formed the first community. They immediately took over the running of the girl's primary school but they did not limit their work to primary education.
The F.C.J. sisters had a tradition of working with boarders, having a number of such schools in their Society, on the Continent, in England and more recently in Limerick. So it seemed the most suitable way of providing post primary education in the South Leinster area. We know little about the early days. However we do know that on August 10, 1861, five days after the arrival of the Faithful Companions of Jesus in Bunclody, a notice appeared in "The People" newspaper announcing the Sisters' intention of opening a Boarding School. "to afford to parents an opportunity of giving to their children a good religious education". We know that the school must have thrived from the beginning as the records show that in 1864, the community consisted of ten sisters but two years later this number rose to sixteen and from 1877 there were twenty five sisters in the Convent. We do not know for sure if day pupils were taken from the beginning but school records of 1865 give 54 as the number of students; 39 boarders and 15 day-students. Oral tradition tells us that the day pupils were the children of Church of Ireland families in the area and that Catholic day students were not taken until much later. What is certainly true is that Church of Ireland students were always part of the day pupil intake and there were always very harmonious relations with the local Church of Ireland community with a significant number of Church of Ireland students attending the school.
One of the sisters who had a deep and lasting influence on the life of the Convent in Bunclody was Mother Victoire Henahan. She had come to the convent as Superior in 1883 at the age of twenty nine and she was also in charge of the secondary school for a number of years. There is little doubt that it is no small coincidence that her arrival coincides with a period of expansion and building both in the primary and secondary schools. In 1894, a refectory (dining room), study hall and dormitory were built. In 1898, the lady Chapel, junior study and linen room were added. In 1906, a science laboratory, art room and domestic science kitchen were built to accommodate new curriculum requirements. Finally in 1909, recreation rooms, music rooms and extra dormitories were built. It was under the guidance of Mother Victoire also that the Golden Jubilee celebrations of 1911 were celebrated with great style and ceremony.
1
The Halldare family were the local landlord family and following the marriage of the heir to a wealthy young woman it was decided to build a house in keeping with their wealthy status and so began the building of the present demesne house "Ballinapark House". There were no suitable tradesmen in the area for the building of the proposed house so after a long search, tradesmen of the needed high standard were brought from Wales to do the work. The house took several years to build. The Hughes family did the building and the Roberts family were responsible for the carpentry. As the work neared completion the Halldare family were anxious to reduce the number on the work force but the men were having none of this and declared that they would all return together to Wales. However, Mother Victoire needed carpenters and builders and
|
so the dilemma of the families was solved as the workers transferred across the road to begin the extension.
|
The buildings erected were remarkably similar to the Halldare building though less elaborate. The wood panelling, the tiling and the windows were identical. Both families then settled in the area for good. Today and for many years in the past, the descendents of these families have attended the secondary school.
The school continued to flourish during the years that followed and earned a strong reputation for its high academic standards- a reputation richly deserved. The F.C.J. Sisters who taught in the school were very committed teachers and anxious that the students in their care would do well as they knew that these students would have to earn their own living when they left school. It was also an incentive that many of the brothers of the students in the school were boarders in St. Peter's school in Wexford and it was important that the students there were not seen to outdo their sisters in St. Mary's Bunclody in public academic achievement!
The only building that took place in the intervening years was in 1964 when a concert hall, locker rooms and classrooms were built. Secondary education, though State funded was not free, and only a limited section of the population could avail of it so there was no demand for further expansion in the years that followed. During these years, Ireland underwent a long period of economic stagnation, following the emergence of the Free State. The "Economic War" between Ireland and England from 1932 to 1938, though politically popular, led to an agricultural stagnation that seriously affected the country and money was very scarce indeed. There was little growth during the 1950's; indeed these years are often referred to as the 'hungry fifties'. It was only in the late 1950's under the enlightened leadership of Sean Lemass that economic growth took off.
From 1967, the Irish Education scene changed dramatically thanks to the courage and insight of Donncadha O'Malley, Minister of Education, who introduced 'Free Secondary Education' in that year. While the dramatic announcement of 'Free Education' took the population at large by total
2
surprise and was the talk of the summer of 1967, it was both popular and much needed if economic progress was to expand and be sustained. Not only was education to be free in all secondary schools that opted for it (over 95%) but free buses were provided in September for the students who attended these schools. Dramatic expansion of schools followed including St. Mary's in Bunclody.
In 1969, boys were enrolled for the first time. It was the beginning of a new era that was to profoundly affect the development and character of the school. In today's era of consultation with the need for setting up of committees and sub-committees, such a marked initiative would appear to have necessitated wide consultation and planning. But it was not so. Secondary education for boys was not available in the town – the vocational school established in 1950 only offered the Group Cert – an examination taken after two years, which was the normal entry requirement to the trades of carpentry, plumbing etc. So boys who wished to avail of a secondary school education had either the choice of cycling eleven miles to Enniscorthy to the Christian Brothers' school, or attending the boarding school in St. Peter's College in Wexford.
Sr. Barbara Kennedy, who was a teacher in the Secondary school was also sacristan in the Parish Church and among many other duties trained the altar boys. She asked the boys who were 6 th class students in the local primary school where they were going to school in September and they replied that they were going to St. Peter's but that they would prefer to go to the Convent. She suggested that they would go up to the Convent and ask Reverend Mother to go to school there. Three or four boys presented at the Convent, asked for Reverend Mother and made their request to her. Reverend Mother, Sr. Zoe O'Connell, had taught and worked for most of her life in Canada and the U.S. and was used to co-education. She looked at the boys who were 'dressed up' for the visit to the Convent and pronounced that they looked like nice boys and she was sure they were nice boys and that they would be very welcome in September. They went home to spread the word of their welcome and she went to the Principal, Sr. Margaret (Gonzague) Hayes, and told her that she had said the boys would be welcome. Sr. Margaret, an emminently practical woman, made no comment other than to say that boy's toilets would be needed and she sent for Andy Mahon, a local builder, who was always called on when need arose. Fourteen boys presented in September. Today, in 2009, boys number 390 and form fifth percent of the student body.
Until 1986, apart from the occasional part-time lay teacher, the school was staffed by members of the F.C.J. Society mainly because lay teachers were few in number and unwilling to come to a rural school, which had very poor public transport. In 1968 Laura Lennon who had married locally was appointed as a fulltime lay teacher. Then, to the relief of the Principal, three young local people qualified as teachers and were promptly employed by the school. Kathleen MacMullan (née Murphy), Mary Nagle (née O'Leary) and Tony O'Loughlin. From that time onwards, more and more lay teachers were employed. In 2008, Sr. Madeleine Ryan retired and since there was no F.C.J. to replace her as Principal, the position was advertised nationally and Ms Frances Threadgold, the Deputy Principal was appointed by the Board of Management to replace her. Today in 2009, there are fifty lay-teachers, one full-time FC.J. Sister and one part – time F.C.J. Sister teaching in the school.
A prefabricated building was also erected during 1968 which added classrooms, a cloakroom, science laboratory and art room to the school. At this time of writing, a framed photograph in the reception room in the school shows the official opening of that building which was attended by Dr. Herlihy, Bishop of Ferns. In that photograph is a young teacher, Tony O'Loughlin, who was the first fulltime male teacher. In 1975, he was appointed Vice-Principal; the first such appointment in the school and a role he continued to occupy until his appointment as Principal of the Christian Brother's Secondary School, Carlow, in 1986.
With student enrolment increasing annually (1961: 135 students; 1971: 262 students; 1981: 540 students, 1991: 578 students, 2001: 701 students and today 2009: 779 students) additional accommodation became a priority from the end of the 1970's. Ten prefabricated classrooms were first provided with the aid of a Department of Education grant and F.C.J. community resources. In 1986 the new red brick building opened (now named St. Patrick's), providing classrooms, cloakrooms, offices & staff room, biology & physics laboratories, sports hall, language laboratory, art room, library, domestic science kitchen and sewing room. Funding was provided by the Department. of Education and fundraising in the school catchment area. Around this time too, the school, though officially known as "St. Mary's" was much more commonly known as 'the Convent'. At a Staff Meeting, the name 'F.C.J. Secondary School' was suggested and adapted and soon it became so widely and popularly accepted that many would not believe it could have ever had another name.
As the number in the school grew, the number of active Sisters in the Community declined in number and a decision was taken at the time of a General Visitation by the Superior General of the F.C.J. Society in 1981 to close the boarding school. This closure took place over five years and each year, vacated dormitories were occupied by the school as general classrooms. In June 1986 the boarding school finally closed after 125 years. That autumn there was a big re-union of past-pupils, mainly boarders, who wished to meet and reminisce about time spent in the school.
Meanwhile the school continued to thrive. Academic achievement continued to be very important in the school but many other activities were initiated. Musicals, drama productions, orchestra and a variety of games including hurling, football, camogie and basketball continued to be important to the life of the school.
By 1990, change was in the air as the Department of Education began a process of modernisation. Schools were encouraged to set up Boards of Management to reflect the various parties with a vested interest in the education of the students in schools. So in 1996 the first Board of Management was established with Mr. Tim Geraghty, Principal of St. Tiernan's Community School in Dundrum, as Chairperson.
As the number of boys increased, it became evident that more practical subjects were needed to accommodate their natural aptitudes and interests. In 1998 new construction studies and engineering rooms [St. Aidan's Building] were erected and funded by the F.C.J. Society. Teachers were also employed to teach these subjects. The old boarding school, which had increasingly accommodated students since 1982 was in a very poor state of repair by 1990 and it was clear that it would have to be extensively renovated or replaced. A Department of Education official visited and declared the building was unsuitable for renovation and said a new building was the only way forward. So began the long and protracted negotiation with the Department of Education to fund a replacement building. This was made all the more urgent as the old boarding school had become increasingly dilapidated and fears for the safety of the students had grown. Finally permission was given and in October 2001, tenders were accepted for a new extension to replace the Boarding School. In early 2003,
4
the new building, 'St. Victoire's was completed and occupied and the old boarding school was vacated.
Since the original building was planned, the numbers in the school had increased and space was very tight. So when the old Boarding School was demolished, a new extension replaced it, which was funded by the F.C.J. Society. This building is known as 'the d'Houet Building'. The 2003 St. Victoire building was located on the tennis / basket-ball courts but the Department of Education refused to replace them, citing lack of funds. So new basketball / tennis courts, funded by the F.C.J. Society, were provided and the library was converted to music tuition rooms, an office and resource room. The library is now located in room 46 in the d'Houet building. Finally the home economics kitchen & room 68 were refurbished over the summer of 2007. The kitchen (Room 24 - St. Patrick's Building), was in use since 1986 and needed modernising and replacement / renovation of many of the fittings and furniture. Room 68 (St. Victoire's Building) was only built in 2002, but had to be updated to cater for the new Leaving Certificate subject, "Design & Communications Graphics", which has replaced Technical Drawing. Much of the work in this new subject is done on computers so the drawing desks, etc. were replaced by computer work stations. This refurbishment was paid from school savings.
Nationally, the number of religious sisters working in schools throughout the country had seriously declined and it was becoming very evident that the different religious Congregations would not be able to continue the trusteeship of their schools. Facing this reality, twelve religious Congregations, each of whom had only a small number of schools in Ireland, came together to provide a solution to their situation. The F.C.J. Society was one of these Congregations. 'Le Chéile' was established to form a single trusteeship to protect the ethos and interests of their schools and was officially launched in May 2009 in Mullingar and so the school is now at the beginning of a new era in the history of Irish education.
Sr. Madeleine Ryan FCJ
2009
5
| 4,939
|
beginning_of_word
|
so
|
remove_one_sentence
|
<url>
https://d3bokmeplpq5n0.cloudfront.net/prod/uploads/2018/11/History_of__Bunclody_School.pdf
</url>
<text>
F.C.J. Secondary School Bunclody - History (1861 – 2009)
Bunclody, a small town in Co. Wexford was called Newtownbarry when the F.C.J.sisters came in 1861. Bunclody was the original name of the town but it was renamed Newtownbarry when the Barry family became the local landlords. Following a local referendum in 1950, the town reverted to its original name.
Following the famine years in Ireland, there was great poverty and basic education was much needed by the youth in the towns and villages. Father Parle, the curate in Bunclody was very aware of this and determined to do what he could to improve the educational facilities in his parish. Strong oral tradition in the Convent and in the area suggests that Fr. Parle first encountered the Sisters when he was a student in the seminary in Paris. At any rate he applied to the Superior General of the Sisters, Faithful Companions of Jesus to send Sisters to provide much needed education for the children of the area.
The Superior General agreed to send Sisters and so Reverend Mother Josephine Petit, Superior General and Mother Marie de Bussy, Assistant General arrived on the 5 August 1861. They were assisted by the Provincial Superior of the Irish houses at Laurel Hill and Bruff together with two other Sisters. Father Parle's house, adjacent to the parish church was transformed into a convent and an annexe added to house a community. Five Sisters: Lucy Fletcher, Ellen Blacket, Mary Philomena Parsons, Teresa Ann Murray, Elizabeth Graham, Mary Redman and Frances Sheehan formed the first community. They immediately took over the running of the girl's primary school but they did not limit their work to primary education.
The F.C.J. sisters had a tradition of working with boarders, having a number of such schools in their Society, on the Continent, in England and more recently in Limerick. So it seemed the most suitable way of providing post primary education in the South Leinster area. We know little about the early days. However we do know that on August 10, 1861, five days after the arrival of the Faithful Companions of Jesus in Bunclody, a notice appeared in "The People" newspaper announcing the Sisters' intention of opening a Boarding School. "to afford to parents an opportunity of giving to their children a good religious education". We know that the school must have thrived from the beginning as the records show that in 1864, the community consisted of ten sisters but two years later this number rose to sixteen and from 1877 there were twenty five sisters in the Convent. We do not know for sure if day pupils were taken from the beginning but school records of 1865 give 54 as the number of students; 39 boarders and 15 day-students. Oral tradition tells us that the day pupils were the children of Church of Ireland families in the area and that Catholic day students were not taken until much later. What is certainly true is that Church of Ireland students were always part of the day pupil intake and there were always very harmonious relations with the local Church of Ireland community with a significant number of Church of Ireland students attending the school.
One of the sisters who had a deep and lasting influence on the life of the Convent in Bunclody was Mother Victoire Henahan. She had come to the convent as Superior in 1883 at the age of twenty nine and she was also in charge of the secondary school for a number of years. There is little doubt that it is no small coincidence that her arrival coincides with a period of expansion and building both in the primary and secondary schools. In 1894, a refectory (dining room), study hall and dormitory were built. In 1898, the lady Chapel, junior study and linen room were added. In 1906, a science laboratory, art room and domestic science kitchen were built to accommodate new curriculum requirements. Finally in 1909, recreation rooms, music rooms and extra dormitories were built. It was under the guidance of Mother Victoire also that the Golden Jubilee celebrations of 1911 were celebrated with great style and ceremony.
1
The Halldare family were the local landlord family and following the marriage of the heir to a wealthy young woman it was decided to build a house in keeping with their wealthy status and so began the building of the present demesne house "Ballinapark House". There were no suitable tradesmen in the area for the building of the proposed house so after a long search, tradesmen of the needed high standard were brought from Wales to do the work. The house took several years to build. The Hughes family did the building and the Roberts family were responsible for the carpentry. As the work neared completion the Halldare family were anxious to reduce the number on the work force but the men were having none of this and declared that they would all return together to Wales. However, Mother Victoire needed carpenters and builders and <cursor_is_here> The buildings erected were remarkably similar to the Halldare building though less elaborate. The wood panelling, the tiling and the windows were identical. Both families then settled in the area for good. Today and for many years in the past, the descendents of these families have attended the secondary school.
The school continued to flourish during the years that followed and earned a strong reputation for its high academic standards- a reputation richly deserved. The F.C.J. Sisters who taught in the school were very committed teachers and anxious that the students in their care would do well as they knew that these students would have to earn their own living when they left school. It was also an incentive that many of the brothers of the students in the school were boarders in St. Peter's school in Wexford and it was important that the students there were not seen to outdo their sisters in St. Mary's Bunclody in public academic achievement!
The only building that took place in the intervening years was in 1964 when a concert hall, locker rooms and classrooms were built. Secondary education, though State funded was not free, and only a limited section of the population could avail of it so there was no demand for further expansion in the years that followed. During these years, Ireland underwent a long period of economic stagnation, following the emergence of the Free State. The "Economic War" between Ireland and England from 1932 to 1938, though politically popular, led to an agricultural stagnation that seriously affected the country and money was very scarce indeed. There was little growth during the 1950's; indeed these years are often referred to as the 'hungry fifties'. It was only in the late 1950's under the enlightened leadership of Sean Lemass that economic growth took off.
From 1967, the Irish Education scene changed dramatically thanks to the courage and insight of Donncadha O'Malley, Minister of Education, who introduced 'Free Secondary Education' in that year. While the dramatic announcement of 'Free Education' took the population at large by total
2
surprise and was the talk of the summer of 1967, it was both popular and much needed if economic progress was to expand and be sustained. Not only was education to be free in all secondary schools that opted for it (over 95%) but free buses were provided in September for the students who attended these schools. Dramatic expansion of schools followed including St. Mary's in Bunclody.
In 1969, boys were enrolled for the first time. It was the beginning of a new era that was to profoundly affect the development and character of the school. In today's era of consultation with the need for setting up of committees and sub-committees, such a marked initiative would appear to have necessitated wide consultation and planning. But it was not so. Secondary education for boys was not available in the town – the vocational school established in 1950 only offered the Group Cert – an examination taken after two years, which was the normal entry requirement to the trades of carpentry, plumbing etc. So boys who wished to avail of a secondary school education had either the choice of cycling eleven miles to Enniscorthy to the Christian Brothers' school, or attending the boarding school in St. Peter's College in Wexford.
Sr. Barbara Kennedy, who was a teacher in the Secondary school was also sacristan in the Parish Church and among many other duties trained the altar boys. She asked the boys who were 6 th class students in the local primary school where they were going to school in September and they replied that they were going to St. Peter's but that they would prefer to go to the Convent. She suggested that they would go up to the Convent and ask Reverend Mother to go to school there. Three or four boys presented at the Convent, asked for Reverend Mother and made their request to her. Reverend Mother, Sr. Zoe O'Connell, had taught and worked for most of her life in Canada and the U.S. and was used to co-education. She looked at the boys who were 'dressed up' for the visit to the Convent and pronounced that they looked like nice boys and she was sure they were nice boys and that they would be very welcome in September. They went home to spread the word of their welcome and she went to the Principal, Sr. Margaret (Gonzague) Hayes, and told her that she had said the boys would be welcome. Sr. Margaret, an emminently practical woman, made no comment other than to say that boy's toilets would be needed and she sent for Andy Mahon, a local builder, who was always called on when need arose. Fourteen boys presented in September. Today, in 2009, boys number 390 and form fifth percent of the student body.
Until 1986, apart from the occasional part-time lay teacher, the school was staffed by members of the F.C.J. Society mainly because lay teachers were few in number and unwilling to come to a rural school, which had very poor public transport. In 1968 Laura Lennon who had married locally was appointed as a fulltime lay teacher. Then, to the relief of the Principal, three young local people qualified as teachers and were promptly employed by the school. Kathleen MacMullan (née Murphy), Mary Nagle (née O'Leary) and Tony O'Loughlin. From that time onwards, more and more lay teachers were employed. In 2008, Sr. Madeleine Ryan retired and since there was no F.C.J. to replace her as Principal, the position was advertised nationally and Ms Frances Threadgold, the Deputy Principal was appointed by the Board of Management to replace her. Today in 2009, there are fifty lay-teachers, one full-time FC.J. Sister and one part – time F.C.J. Sister teaching in the school.
A prefabricated building was also erected during 1968 which added classrooms, a cloakroom, science laboratory and art room to the school. At this time of writing, a framed photograph in the reception room in the school shows the official opening of that building which was attended by Dr. Herlihy, Bishop of Ferns. In that photograph is a young teacher, Tony O'Loughlin, who was the first fulltime male teacher. In 1975, he was appointed Vice-Principal; the first such appointment in the school and a role he continued to occupy until his appointment as Principal of the Christian Brother's Secondary School, Carlow, in 1986.
With student enrolment increasing annually (1961: 135 students; 1971: 262 students; 1981: 540 students, 1991: 578 students, 2001: 701 students and today 2009: 779 students) additional accommodation became a priority from the end of the 1970's. Ten prefabricated classrooms were first provided with the aid of a Department of Education grant and F.C.J. community resources. In 1986 the new red brick building opened (now named St. Patrick's), providing classrooms, cloakrooms, offices & staff room, biology & physics laboratories, sports hall, language laboratory, art room, library, domestic science kitchen and sewing room. Funding was provided by the Department. of Education and fundraising in the school catchment area. Around this time too, the school, though officially known as "St. Mary's" was much more commonly known as 'the Convent'. At a Staff Meeting, the name 'F.C.J. Secondary School' was suggested and adapted and soon it became so widely and popularly accepted that many would not believe it could have ever had another name.
As the number in the school grew, the number of active Sisters in the Community declined in number and a decision was taken at the time of a General Visitation by the Superior General of the F.C.J. Society in 1981 to close the boarding school. This closure took place over five years and each year, vacated dormitories were occupied by the school as general classrooms. In June 1986 the boarding school finally closed after 125 years. That autumn there was a big re-union of past-pupils, mainly boarders, who wished to meet and reminisce about time spent in the school.
Meanwhile the school continued to thrive. Academic achievement continued to be very important in the school but many other activities were initiated. Musicals, drama productions, orchestra and a variety of games including hurling, football, camogie and basketball continued to be important to the life of the school.
By 1990, change was in the air as the Department of Education began a process of modernisation. Schools were encouraged to set up Boards of Management to reflect the various parties with a vested interest in the education of the students in schools. So in 1996 the first Board of Management was established with Mr. Tim Geraghty, Principal of St. Tiernan's Community School in Dundrum, as Chairperson.
As the number of boys increased, it became evident that more practical subjects were needed to accommodate their natural aptitudes and interests. In 1998 new construction studies and engineering rooms [St. Aidan's Building] were erected and funded by the F.C.J. Society. Teachers were also employed to teach these subjects. The old boarding school, which had increasingly accommodated students since 1982 was in a very poor state of repair by 1990 and it was clear that it would have to be extensively renovated or replaced. A Department of Education official visited and declared the building was unsuitable for renovation and said a new building was the only way forward. So began the long and protracted negotiation with the Department of Education to fund a replacement building. This was made all the more urgent as the old boarding school had become increasingly dilapidated and fears for the safety of the students had grown. Finally permission was given and in October 2001, tenders were accepted for a new extension to replace the Boarding School. In early 2003,
4
the new building, 'St. Victoire's was completed and occupied and the old boarding school was vacated.
Since the original building was planned, the numbers in the school had increased and space was very tight. So when the old Boarding School was demolished, a new extension replaced it, which was funded by the F.C.J. Society. This building is known as 'the d'Houet Building'. The 2003 St. Victoire building was located on the tennis / basket-ball courts but the Department of Education refused to replace them, citing lack of funds. So new basketball / tennis courts, funded by the F.C.J. Society, were provided and the library was converted to music tuition rooms, an office and resource room. The library is now located in room 46 in the d'Houet building. Finally the home economics kitchen & room 68 were refurbished over the summer of 2007. The kitchen (Room 24 - St. Patrick's Building), was in use since 1986 and needed modernising and replacement / renovation of many of the fittings and furniture. Room 68 (St. Victoire's Building) was only built in 2002, but had to be updated to cater for the new Leaving Certificate subject, "Design & Communications Graphics", which has replaced Technical Drawing. Much of the work in this new subject is done on computers so the drawing desks, etc. were replaced by computer work stations. This refurbishment was paid from school savings.
Nationally, the number of religious sisters working in schools throughout the country had seriously declined and it was becoming very evident that the different religious Congregations would not be able to continue the trusteeship of their schools. Facing this reality, twelve religious Congregations, each of whom had only a small number of schools in Ireland, came together to provide a solution to their situation. The F.C.J. Society was one of these Congregations. 'Le Chéile' was established to form a single trusteeship to protect the ethos and interests of their schools and was officially launched in May 2009 in Mullingar and so the school is now at the beginning of a new era in the history of Irish education.
Sr. Madeleine Ryan FCJ
2009
5
</text>
|
[
{
"content": "<url>\nhttps://d3bokmeplpq5n0.cloudfront.net/prod/uploads/2018/11/History_of__Bunclody_School.pdf\n</url>\n<text>\nF.C.J. Secondary School Bunclody - History (1861 – 2009)\n\nBunclody, a small town in Co. Wexford was called Newtownbarry when the F.C.J.sisters came in 1861. Bunclody was the original name of the town but it was renamed Newtownbarry when the Barry family became the local landlords. Following a local referendum in 1950, the town reverted to its original name.\n\nFollowing the famine years in Ireland, there was great poverty and basic education was much needed by the youth in the towns and villages. Father Parle, the curate in Bunclody was very aware of this and determined to do what he could to improve the educational facilities in his parish. Strong oral tradition in the Convent and in the area suggests that Fr. Parle first encountered the Sisters when he was a student in the seminary in Paris. At any rate he applied to the Superior General of the Sisters, Faithful Companions of Jesus to send Sisters to provide much needed education for the children of the area.\n\nThe Superior General agreed to send Sisters and so Reverend Mother Josephine Petit, Superior General and Mother Marie de Bussy, Assistant General arrived on the 5 August 1861. They were assisted by the Provincial Superior of the Irish houses at Laurel Hill and Bruff together with two other Sisters. Father Parle's house, adjacent to the parish church was transformed into a convent and an annexe added to house a community. Five Sisters: Lucy Fletcher, Ellen Blacket, Mary Philomena Parsons, Teresa Ann Murray, Elizabeth Graham, Mary Redman and Frances Sheehan formed the first community. They immediately took over the running of the girl's primary school but they did not limit their work to primary education.\n\nThe F.C.J. sisters had a tradition of working with boarders, having a number of such schools in their Society, on the Continent, in England and more recently in Limerick. So it seemed the most suitable way of providing post primary education in the South Leinster area. We know little about the early days. However we do know that on August 10, 1861, five days after the arrival of the Faithful Companions of Jesus in Bunclody, a notice appeared in \"The People\" newspaper announcing the Sisters' intention of opening a Boarding School. \"to afford to parents an opportunity of giving to their children a good religious education\". We know that the school must have thrived from the beginning as the records show that in 1864, the community consisted of ten sisters but two years later this number rose to sixteen and from 1877 there were twenty five sisters in the Convent. We do not know for sure if day pupils were taken from the beginning but school records of 1865 give 54 as the number of students; 39 boarders and 15 day-students. Oral tradition tells us that the day pupils were the children of Church of Ireland families in the area and that Catholic day students were not taken until much later. What is certainly true is that Church of Ireland students were always part of the day pupil intake and there were always very harmonious relations with the local Church of Ireland community with a significant number of Church of Ireland students attending the school.\n\nOne of the sisters who had a deep and lasting influence on the life of the Convent in Bunclody was Mother Victoire Henahan. She had come to the convent as Superior in 1883 at the age of twenty nine and she was also in charge of the secondary school for a number of years. There is little doubt that it is no small coincidence that her arrival coincides with a period of expansion and building both in the primary and secondary schools. In 1894, a refectory (dining room), study hall and dormitory were built. In 1898, the lady Chapel, junior study and linen room were added. In 1906, a science laboratory, art room and domestic science kitchen were built to accommodate new curriculum requirements. Finally in 1909, recreation rooms, music rooms and extra dormitories were built. It was under the guidance of Mother Victoire also that the Golden Jubilee celebrations of 1911 were celebrated with great style and ceremony.\n\n1\n\nThe Halldare family were the local landlord family and following the marriage of the heir to a wealthy young woman it was decided to build a house in keeping with their wealthy status and so began the building of the present demesne house \"Ballinapark House\". There were no suitable tradesmen in the area for the building of the proposed house so after a long search, tradesmen of the needed high standard were brought from Wales to do the work. The house took several years to build. The Hughes family did the building and the Roberts family were responsible for the carpentry. As the work neared completion the Halldare family were anxious to reduce the number on the work force but the men were having none of this and declared that they would all return together to Wales. However, Mother Victoire needed carpenters and builders and <cursor_is_here> The buildings erected were remarkably similar to the Halldare building though less elaborate. The wood panelling, the tiling and the windows were identical. Both families then settled in the area for good. Today and for many years in the past, the descendents of these families have attended the secondary school.\n\nThe school continued to flourish during the years that followed and earned a strong reputation for its high academic standards- a reputation richly deserved. The F.C.J. Sisters who taught in the school were very committed teachers and anxious that the students in their care would do well as they knew that these students would have to earn their own living when they left school. It was also an incentive that many of the brothers of the students in the school were boarders in St. Peter's school in Wexford and it was important that the students there were not seen to outdo their sisters in St. Mary's Bunclody in public academic achievement!\n\nThe only building that took place in the intervening years was in 1964 when a concert hall, locker rooms and classrooms were built. Secondary education, though State funded was not free, and only a limited section of the population could avail of it so there was no demand for further expansion in the years that followed. During these years, Ireland underwent a long period of economic stagnation, following the emergence of the Free State. The \"Economic War\" between Ireland and England from 1932 to 1938, though politically popular, led to an agricultural stagnation that seriously affected the country and money was very scarce indeed. There was little growth during the 1950's; indeed these years are often referred to as the 'hungry fifties'. It was only in the late 1950's under the enlightened leadership of Sean Lemass that economic growth took off.\n\nFrom 1967, the Irish Education scene changed dramatically thanks to the courage and insight of Donncadha O'Malley, Minister of Education, who introduced 'Free Secondary Education' in that year. While the dramatic announcement of 'Free Education' took the population at large by total\n\n2\n\nsurprise and was the talk of the summer of 1967, it was both popular and much needed if economic progress was to expand and be sustained. Not only was education to be free in all secondary schools that opted for it (over 95%) but free buses were provided in September for the students who attended these schools. Dramatic expansion of schools followed including St. Mary's in Bunclody.\n\nIn 1969, boys were enrolled for the first time. It was the beginning of a new era that was to profoundly affect the development and character of the school. In today's era of consultation with the need for setting up of committees and sub-committees, such a marked initiative would appear to have necessitated wide consultation and planning. But it was not so. Secondary education for boys was not available in the town – the vocational school established in 1950 only offered the Group Cert – an examination taken after two years, which was the normal entry requirement to the trades of carpentry, plumbing etc. So boys who wished to avail of a secondary school education had either the choice of cycling eleven miles to Enniscorthy to the Christian Brothers' school, or attending the boarding school in St. Peter's College in Wexford.\n\nSr. Barbara Kennedy, who was a teacher in the Secondary school was also sacristan in the Parish Church and among many other duties trained the altar boys. She asked the boys who were 6 th class students in the local primary school where they were going to school in September and they replied that they were going to St. Peter's but that they would prefer to go to the Convent. She suggested that they would go up to the Convent and ask Reverend Mother to go to school there. Three or four boys presented at the Convent, asked for Reverend Mother and made their request to her. Reverend Mother, Sr. Zoe O'Connell, had taught and worked for most of her life in Canada and the U.S. and was used to co-education. She looked at the boys who were 'dressed up' for the visit to the Convent and pronounced that they looked like nice boys and she was sure they were nice boys and that they would be very welcome in September. They went home to spread the word of their welcome and she went to the Principal, Sr. Margaret (Gonzague) Hayes, and told her that she had said the boys would be welcome. Sr. Margaret, an emminently practical woman, made no comment other than to say that boy's toilets would be needed and she sent for Andy Mahon, a local builder, who was always called on when need arose. Fourteen boys presented in September. Today, in 2009, boys number 390 and form fifth percent of the student body.\n\nUntil 1986, apart from the occasional part-time lay teacher, the school was staffed by members of the F.C.J. Society mainly because lay teachers were few in number and unwilling to come to a rural school, which had very poor public transport. In 1968 Laura Lennon who had married locally was appointed as a fulltime lay teacher. Then, to the relief of the Principal, three young local people qualified as teachers and were promptly employed by the school. Kathleen MacMullan (née Murphy), Mary Nagle (née O'Leary) and Tony O'Loughlin. From that time onwards, more and more lay teachers were employed. In 2008, Sr. Madeleine Ryan retired and since there was no F.C.J. to replace her as Principal, the position was advertised nationally and Ms Frances Threadgold, the Deputy Principal was appointed by the Board of Management to replace her. Today in 2009, there are fifty lay-teachers, one full-time FC.J. Sister and one part – time F.C.J. Sister teaching in the school.\n\nA prefabricated building was also erected during 1968 which added classrooms, a cloakroom, science laboratory and art room to the school. At this time of writing, a framed photograph in the reception room in the school shows the official opening of that building which was attended by Dr. Herlihy, Bishop of Ferns. In that photograph is a young teacher, Tony O'Loughlin, who was the first fulltime male teacher. In 1975, he was appointed Vice-Principal; the first such appointment in the school and a role he continued to occupy until his appointment as Principal of the Christian Brother's Secondary School, Carlow, in 1986.\n\nWith student enrolment increasing annually (1961: 135 students; 1971: 262 students; 1981: 540 students, 1991: 578 students, 2001: 701 students and today 2009: 779 students) additional accommodation became a priority from the end of the 1970's. Ten prefabricated classrooms were first provided with the aid of a Department of Education grant and F.C.J. community resources. In 1986 the new red brick building opened (now named St. Patrick's), providing classrooms, cloakrooms, offices & staff room, biology & physics laboratories, sports hall, language laboratory, art room, library, domestic science kitchen and sewing room. Funding was provided by the Department. of Education and fundraising in the school catchment area. Around this time too, the school, though officially known as \"St. Mary's\" was much more commonly known as 'the Convent'. At a Staff Meeting, the name 'F.C.J. Secondary School' was suggested and adapted and soon it became so widely and popularly accepted that many would not believe it could have ever had another name.\n\nAs the number in the school grew, the number of active Sisters in the Community declined in number and a decision was taken at the time of a General Visitation by the Superior General of the F.C.J. Society in 1981 to close the boarding school. This closure took place over five years and each year, vacated dormitories were occupied by the school as general classrooms. In June 1986 the boarding school finally closed after 125 years. That autumn there was a big re-union of past-pupils, mainly boarders, who wished to meet and reminisce about time spent in the school.\n\nMeanwhile the school continued to thrive. Academic achievement continued to be very important in the school but many other activities were initiated. Musicals, drama productions, orchestra and a variety of games including hurling, football, camogie and basketball continued to be important to the life of the school.\n\nBy 1990, change was in the air as the Department of Education began a process of modernisation. Schools were encouraged to set up Boards of Management to reflect the various parties with a vested interest in the education of the students in schools. So in 1996 the first Board of Management was established with Mr. Tim Geraghty, Principal of St. Tiernan's Community School in Dundrum, as Chairperson.\n\nAs the number of boys increased, it became evident that more practical subjects were needed to accommodate their natural aptitudes and interests. In 1998 new construction studies and engineering rooms [St. Aidan's Building] were erected and funded by the F.C.J. Society. Teachers were also employed to teach these subjects. The old boarding school, which had increasingly accommodated students since 1982 was in a very poor state of repair by 1990 and it was clear that it would have to be extensively renovated or replaced. A Department of Education official visited and declared the building was unsuitable for renovation and said a new building was the only way forward. So began the long and protracted negotiation with the Department of Education to fund a replacement building. This was made all the more urgent as the old boarding school had become increasingly dilapidated and fears for the safety of the students had grown. Finally permission was given and in October 2001, tenders were accepted for a new extension to replace the Boarding School. In early 2003,\n\n4\n\nthe new building, 'St. Victoire's was completed and occupied and the old boarding school was vacated.\n\nSince the original building was planned, the numbers in the school had increased and space was very tight. So when the old Boarding School was demolished, a new extension replaced it, which was funded by the F.C.J. Society. This building is known as 'the d'Houet Building'. The 2003 St. Victoire building was located on the tennis / basket-ball courts but the Department of Education refused to replace them, citing lack of funds. So new basketball / tennis courts, funded by the F.C.J. Society, were provided and the library was converted to music tuition rooms, an office and resource room. The library is now located in room 46 in the d'Houet building. Finally the home economics kitchen & room 68 were refurbished over the summer of 2007. The kitchen (Room 24 - St. Patrick's Building), was in use since 1986 and needed modernising and replacement / renovation of many of the fittings and furniture. Room 68 (St. Victoire's Building) was only built in 2002, but had to be updated to cater for the new Leaving Certificate subject, \"Design & Communications Graphics\", which has replaced Technical Drawing. Much of the work in this new subject is done on computers so the drawing desks, etc. were replaced by computer work stations. This refurbishment was paid from school savings.\n\nNationally, the number of religious sisters working in schools throughout the country had seriously declined and it was becoming very evident that the different religious Congregations would not be able to continue the trusteeship of their schools. Facing this reality, twelve religious Congregations, each of whom had only a small number of schools in Ireland, came together to provide a solution to their situation. The F.C.J. Society was one of these Congregations. 'Le Chéile' was established to form a single trusteeship to protect the ethos and interests of their schools and was officially launched in May 2009 in Mullingar and so the school is now at the beginning of a new era in the history of Irish education.\n\nSr. Madeleine Ryan FCJ\n\n2009\n\n5\n</text>\n",
"role": "user"
},
{
"content": "so the dilemma of the families was solved as the workers transferred across the road to begin the extension.",
"role": "assistant"
}
] |
IN THE CIRCUIT COURT OF THE SECOND JUDICIAL CIRCUIT IN AND FOR LEON COUNTY, FLORIDA
RENE ROMO, et al.,
Plaintiffs,
vs.
Case No. 2012-CA-000412
KEN DETZNER, in his official capacity as Florida Secretary of State, and PAMELA JO BONDI, in her official capacity as Attorney General,
___________________________________/
THE LEAGUE OF WOMEN VOTERS OF FLORIDA, et al.,
Plaintiffs,
vs.
Case No. 2012-CA-000490
KEN DETZNER, in his official capacity as Florida Secretary of State, et al.,
Defendants.
___________________________________/
THE FLORIDA SENATE'S DISCLOSURE OF PROPOSED REMEDIAL PLANS
In accordance with this Court's instructions at the September 11, 2015 case management conference, the Florida Senate and Andy Gardiner, in his official capacity as President of the Florida Senate, give notice of serving their two proposed remedial congressional plans: Plan S026C9062 and Plan S026C9066. In accordance with this Court's instructions, the Senate and President Gardiner also identify below every person involved in drawing, reviewing, directing, or approving the proposed remedial plans.
Romo, et al. v. Detzner, et al.
League of Women Voters, et al. v. Detzner, et al.
Case No. 2012-CA-000490
I.
Plan S026C9062
Plan S026C9062 is the product of an iterative legislative process that began when
President Gardiner and Speaker Steve Crisafulli directed professional staff of the Senate
Committee on Reapportionment and the House Select Committee on Redistricting to work with legal counsel to develop a base congressional map that complies with the Florida Supreme
Court's redistricting decisions and all other relevant legal standards. Jay Ferrin, the staff director of the Senate Committee on Reapportionment, Jason Poreda, the staff director of the House
Select Committee on Redistricting, and Jeff Takacs, a special advisor to the House (collectively, "Professional Staff") drew a base map (Plan H000C9065) with direction from counsel for the
House, including Matthew Carson, George Meros, and Andy Bardos (collectively, "House
Counsel"), and counsel for the Senate, including George Levesque, Raoul Cantero, and Jason
Zakia (collectively, "Senate Counsel"). House and Senate Counsel reviewed the base map before its public release on August 5, 2015. On August 10, Representative Jose Oliva introduced
Plan H000C9065 as House Bill 1-B, and Senator Bill Galvano introduced the same plan as
Senate Bill 2-B. The House passed the plan on August 18.
On August 16, Senator Tom Lee directed and approved Plan S0249054, which was drawn by Jay Ferrin, for filing as an amendment to Senate Bill 2-B. The Senate Committee on
Reapportionment adopted the amendment on the same day. The Senate passed Plan S024C9054 as Senate Amendment 876908 to House Bill 1-B on August 19, 2015 in a 28-8 vote. Plan
S024C9054 modified Districts 9, 10, 11, 15, 16, and 17 in the base map; the remaining 21
districts were unchanged.
2
On August 20, the House approved House Amendment 179133 (Plan H110C9071) to Senate Amendment 876908, restoring its versions of Districts 10 and 16 and modifying Districts 9, 11, 15, 17, 18, 20, 21, 22, and 23.
On August 21, Senator Bill Galvano directed and approved Plan S0269062, which was drawn by Jay Ferrin, for filing as an amendment. Plan S0269062 merged the changes made to the base map by the House in plan H110C9071 (Districts 18, 20, 21, 22, and 23) and the changes made to the base map by the Senate in plan S024C9054 (Districts 9, 10, 11, 15, 16, and 17). Plan S026C9062 retained 16 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 12, 13, 14, 19, 24, 25, 26, and 27) as they were originally drawn by Professional Staff in the base map. In a 23-5 vote, the Senate approved and passed Plan S0269062 as Senate Amendment 284802 to House Amendment 179133. The Senators who voted in favor of Plan S0269062 were:
* Thad Altman
* Aaron Bean
* Lizbeth Benacquisto
* Rob Bradley
* Jeff Brandes
* Charles Dean
* Nancy Detert
* Greg Evers
* Anitere Flores
* Don Gaetz
* Bill Galvano
* Andy Gardiner
Romo, et al. v. Detzner, et al.
* Denise Grimsley
* Dorothy Hukill
* Travis Hutson
* Tom Lee
* Joe Negron
* Garrett Richter
* Maria Sachs
* David Simmons
* Darren Soto
* Kelli Stargel
* Geraldine Thompson
The House decided not to concur in the amendment, and the special session of the Legislature adjourned on August 21.
II. Plan S026C9066
On August 27, six days after the Legislature adjourned without passing a plan, Senator Galvano submitted Plan S026C9066 in an effort to reach a compromise between the House and Senate. Jay Ferrin drew Plan S026C9066 at Senator Galvano's direction, and both Senator Galvano and Senate Counsel reviewed Plan S026C9066 before its public release. Plan S026C9066 incorporates all the changes made to the base map by the House in Plan H110C9071 (Districts 11, 18, 20, 21, 22, 23), but alters the configuration of Districts 9, 15, 16, and 17. Twenty-three of the 27 districts in Plan S026C9066 are identical to districts in the last map passed by the House, H110C9071. Plan S026C9066 also retains 17 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 13, 14, 19, 24, 25, 26, and 27) in the base plan.
4
Case No. 2012-CA-000412
Respectfully submitted,
/s/ Raoul G. Cantero
Raoul G. Cantero
Florida Bar No. 552356
Jason N. Zakia
Florida Bar No. 698121
Jesse L. Green
Florida Bar No. 95591
White & Case LLP
Southeast Financial Center
200 S. Biscayne Blvd., Suite 4900
Miami, Florida 33131-2352
Telephone: 305-371-2700
Facsimile: 305-358-5744
Email: [email protected]
Email: [email protected]
Email: [email protected]
George T. Levesque
Florida Bar No. 555541
General Counsel, The Florida Senate
305 Senate Office Building
404 South Monroe Street
Tallahassee, Florida 32399-1100
Telephone: (850) 487-5237
E-mail: [email protected]
Attorneys for Defendants, Florida Senate and President Andy Gardiner
Case No. 2012-CA-000412
Case No. 2012-CA-000490
Case No. 2012-CA-000412
Case No. 2012-CA-000490
CERTIFICATE OF SERVICE
I certify that a copy of the foregoing was served by electronic transmission on September 14, 2015, to the persons listed on the following Service List.
By: /s/ Raoul G. Cantero
Raoul G. Cantero
Abha Khanna
Kevin J. Hamilton
Ryan Spear
Perkins Coie, LLP
1201 Third Avenue, Ste. 4800
Seattle, WA 98101-3099
Telephone: (206) 359-8000
Facsimile: (206) 359-9000
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
Mark Herron
Robert Telfer
Angelina Perez
Messer Caparello & Self, P.A.
Post Office Box 1876
Tallahassee, FL 32302-1876
Telephone: 850-222-0720
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
Attorneys for Plaintiffs Rene Romo, Benjamin Weaver, William Everett Warinner, Jessica Barrett, June Keener, Richard Quinn Boylan and Bonita Agan
SERVICE LIST
John M. Devaney
Mark Erik Elias
Elisabeth C. Frost
Perkins Coie, LLP
700 Thirteenth Street, NW, Ste. 700
Washington, DC 20005
Telephone: (202) 654-6200
Facsimile: (202) 654-6211
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
Case No. 2012-CA-000412
Case No. 2012-CA-000490
Gerald E. Greenberg Adam M. Schachter Gelber Schachter & Greenberg, P.A. 1441 Brickell Avenue, Suite 1420 Miami, FL 33131
Telephone: (305) 728-0950
Facsimile: (305) 728-0951
E-mail: [email protected]
E-mail: [email protected]
Jessica Ring Amunson Paul Smith Michael B. DeSanctis Kristen M. Rogers Christopher Deal Jenner & Block LLP 1099 New York Ave, N.W., Ste. 900
Washington, DC 20001-4412
Telephone: (202) 639-6023
Facsimile: (202) 661-4993
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
J. Gerald Hebert 191 Somervelle Street, #405 Alexandria, VA 22304
Telephone: (703) 628-4673
E-mail: [email protected]
Attorneys for Plaintiffs The League of Women Voters of Florida, The National Council of La Raza, Common Cause Florida; Robert Allen Schaeffer, Brenda Ann Holt, Roland SanchezMedina, Jr., and John Steele Olmstead
Case No. 2012-CA-000412
Case No. 2012-CA-000490
David B. King Thomas A. Zehnder Frederick S. Wermuth Vincent Falcone III King Blackwell Zehnder Wermuth PA 25 E Pine St Orlando, FL 32802-1631 Telephone: (407) 422-2472
E-mail: [email protected]
E-mail: [email protected]
Ronald Meyer Lynn Hearn Meyer, Brooks, Demma and Blohm, P.A. 131 North Gadsden Street Post Office Box 1547 (32302) Tallahassee, FL 32301
Telephone: (850) 878-5212
Facsimile: (850) 656-6750
E-mail: [email protected]
E-mail: [email protected]
Romo, et al. v. Detzner, et al. League of Women Voters, et al. v. Detzner, et al.
Adam S. Tanenbaum
David A. Fugett
Florida Department Of State
R.A. Gray Building
500 S. Bronough Street
Tallahassee, FL 32399
Telephone: (850) 245-6536
E-mail: [email protected]
E-mail: [email protected]
Attorneys for Defendant Ken Detzner, in his Official Capacity as Florida Secretary of State
Blaine H. Winship
Office Of Attorney General
Capitol, Pl-01
Tallahassee, FL 32399-1050
Telephone: (850) 414-3300
Facsimile: (850) 401-1630
E-Mail: [email protected]
Attorneys for Defendant Pam Bondi, in her capacity as Florida Attorney General
Harry O. Thomas
Christopher B. Lunny
Radey, Thomas, Yon & Clark, PA
301 South Bronough Street
Suite 200
Tallahassee, FL 32301-1722
Telephone: (850) 425-6654
Facsimile: (850) 425-6694
E-mail: [email protected]
E-mail: [email protected]
Attorneys for Bill Negron, Anthony Suarez, Luis Rodriguez, Father Nelson Pinder; N.Y. Nathiri; Mayor Bruce B. Mount, Pastor Willie Barnes, Mable Butler, and Judith A. Wise
Michael A. Carvin
Louis K. Fisher
Jones Day
51 Louisiana Avenue, N.W.
Washington, DC 20001
Telephone: (202) 879-7643
Facsimile: (202) 626-1700
E-mail: [email protected]
E-mail: [email protected]
Attorneys for the Florida Senate and President Andy Gardiner
Case No. 2012-CA-000412
Case No. 2012-CA-000490
Romo, et al. v. Detzner, et al. League of Women Voters, et al. v. Detzner, et al.
Case No. 2012-CA-000412
Case No. 2012-CA-000490
Victor L. Goode
Dorcas R. Gilmore
NAACP
4805 Mt. Hope Drive
Baltimore, MD 21215-3297
Telephone: (410) 580-5790
Facsimile: (410) 358-9350
E-mail: [email protected]
E-mail: [email protected]
Allison J. Riggs Anita S. Earls Southern Coalition For Social Justice 1415 West Highway 54, Ste. 101 Durham, NC 27707
Telephone: (919) 323-3380
Facsimile: (919) 323-3942
E-mail: [email protected]
E-mail: [email protected]
Nancy Abudu ACLU Found. of Fla. 4500 Biscayne Blvd., Ste. 340
Miami, FL 33137
Telephone: (786) 363-2700
E-mail: [email protected]
Attorneys for the Florida State Conference of NAACP Branches
Charles T. Wells
George N. Meros, Jr.
Jason L. Unger
Andy Bardos
Gray Robinson, P.A.
Post Office Box 11189
Tallahassee, Florida 32302
Telephone: (850) 577-9090
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
Matthew J. Carson
General Counsel, The Florida House of
Representatives
422 The Capitol
402 South Monroe Street
Tallahassee, Florida 32399-1300
Telephone: 850-717-5500
E-mail: [email protected]
Attorneys for the Florida House of Representatives and Speaker Steve Crisafulli
Florida Supreme Court [email protected]
|
<urn:uuid:fc02e7d9-c2f6-4dc6-8238-a9d8cfbf0725>
|
CC-MAIN-2017-30
|
http://floridaredistricting.org/documents/2015B/pcm/S026C9062_Notice.pdf
|
2017-07-27T14:11:44Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428257.45/warc/CC-MAIN-20170727122407-20170727142407-00581.warc.gz
| 99,962,423
| 3,697
|
eng_Latn
|
eng_Latn
| 0.540319
|
eng_Latn
| 0.70262
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"por_Latn",
"por_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1106,
2952,
4055,
5228,
5999,
6271,
7280,
8770,
10215,
11680
] |
IN THE CIRCUIT COURT OF THE SECOND JUDICIAL CIRCUIT IN AND FOR LEON COUNTY, FLORIDA
RENE ROMO, et al.,
Plaintiffs,
vs.
Case No. 2012-CA-000412
KEN DETZNER, in his official capacity as Florida Secretary of State, and PAMELA JO BONDI, in her official capacity as Attorney General,
___________________________________/
THE LEAGUE OF WOMEN VOTERS OF FLORIDA, et al.,
Plaintiffs,
vs.
Case No. 2012-CA-000490
KEN DETZNER, in his official capacity as Florida Secretary of State, et al.,
Defendants.
___________________________________/
THE FLORIDA SENATE'S DISCLOSURE OF PROPOSED REMEDIAL PLANS
In accordance with this Court's instructions at the September 11, 2015 case management conference, the Florida Senate and Andy Gardiner, in his official capacity as President of the Florida Senate, give notice of serving their two proposed remedial congressional plans: Plan S026C9062 and Plan S026C9066. In accordance with this Court's instructions, the Senate and President Gardiner also identify below every person involved in drawing, reviewing, directing, or approving the proposed remedial plans.
Romo, et al. v. Detzner, et al.
League of Women Voters, et al. v. Detzner, et al.
Case No. 2012-CA-000490
I.
Plan S026C9062
Plan S026C9062 is the product of an iterative legislative process that began when
President Gardiner and Speaker Steve Crisafulli directed professional staff of the Senate
Committee on Reapportionment and the House Select Committee on Redistricting to work with legal counsel to develop a base congressional map that complies with the Florida Supreme
Court's redistricting decisions and all other relevant legal standards. Jay Ferrin, the staff director of the Senate Committee on Reapportionment, Jason Poreda, the staff director of the House
Select Committee on Redistricting, and Jeff Takacs, a special advisor to the House (collectively, "Professional Staff") drew a base map (Plan H000C9065) with direction from counsel for the
House, including Matthew Carson, George Meros, and Andy Bardos (collectively, "House
Counsel"), and counsel for the Senate, including George Levesque, Raoul Cantero, and Jason
Zakia (collectively, "Senate Counsel"). House and Senate Counsel reviewed the base map before its public release on August 5, 2015. On August 10, Representative Jose Oliva introduced
Plan H000C9065 as House Bill 1-B, and Senator Bill Galvano introduced the same plan as
Senate Bill 2-B. The House passed the plan on August 18.
On August 16, Senator Tom Lee directed and approved Plan S0249054, which was drawn by Jay Ferrin, for filing as an amendment to Senate Bill 2-B. The Senate Committee on
Reapportionment adopted the amendment on the same day. The Senate passed Plan S024C9054 as Senate Amendment 876908 to House Bill 1-B on August 19, 2015 in a 28-8 vote. Plan
S024C9054 modified Districts 9, 10, 11, 15, 16, and 17 in the base map; the remaining 21
districts were unchanged.
2
On August 20, the House approved House Amendment 179133 (Plan H110C9071) to Senate Amendment 876908, restoring its versions of Districts 10 and 16 and modifying Districts 9, 11, 15, 17, 18, 20, 21, 22, and 23.
On August 21, Senator Bill Galvano directed and approved Plan S0269062, which was drawn by Jay Ferrin, for filing as an amendment. Plan S0269062 merged the changes made to the base map by the House in plan H110C9071 (Districts 18, 20, 21, 22, and 23) and the changes made to the base map by the Senate in plan S024C9054 (Districts 9, 10, 11, 15, 16, and 17). Plan S026C9062 retained 16 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 12, 13, 14, 19, 24, 25, 26, and 27) as they were originally drawn by Professional Staff in the base map. In a 23-5 vote, the Senate approved and passed Plan S0269062 as Senate Amendment 284802 to House Amendment 179133. The Senators who voted in favor of Plan S0269062 were:
* Thad Altman
* Aaron Bean
* Lizbeth Benacquisto
* Rob Bradley
* Jeff Brandes
* Charles Dean
* Nancy Detert
* Greg Evers
* Anitere Flores
* Don Gaetz
* Bill Galvano
* Andy Gardiner
Romo, et al. v. Detzner, et al.
* Denise Grimsley
* Dorothy Hukill
* Travis Hutson
* Tom Lee
* Joe Negron
* Garrett Richter
* Maria Sachs
* David Simmons
* Darren Soto
* Kelli Stargel
* Geraldine Thompson
The House decided not to concur in the amendment, and the special session of the Legislature adjourned on August 21.
II. Plan S026C9066
On August 27, six days after the Legislature adjourned without passing a plan, Senator Galvano submitted Plan S026C9066 in an effort to reach a compromise between the House and Senate. Jay Ferrin drew Plan S026C9066 at Senator Galvano's direction, and both Senator Galvano and Senate Counsel reviewed Plan S026C9066 before its public release. Plan S026C9066 incorporates all the changes made to the base map by the House in Plan H110C9071 (Districts 11, 18, 20, 21, 22, 23), but alters the configuration of Districts 9, 15, 16, and 17. Twenty-three of the 27 districts in Plan S026C9066 are identical to districts in the last map passed by the House, H110C9071.
|
Plan S026C9066 also retains 17 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 13, 14, 19, 24, 25, 26, and 27) in the base plan.
| 5,066
|
end_of_word
|
H110C9071.
|
remove_all
|
<url>
http://floridaredistricting.org/documents/2015B/pcm/S026C9062_Notice.pdf
</url>
<text>
IN THE CIRCUIT COURT OF THE SECOND JUDICIAL CIRCUIT IN AND FOR LEON COUNTY, FLORIDA
RENE ROMO, et al.,
Plaintiffs,
vs.
Case No. 2012-CA-000412
KEN DETZNER, in his official capacity as Florida Secretary of State, and PAMELA JO BONDI, in her official capacity as Attorney General,
___________________________________/
THE LEAGUE OF WOMEN VOTERS OF FLORIDA, et al.,
Plaintiffs,
vs.
Case No. 2012-CA-000490
KEN DETZNER, in his official capacity as Florida Secretary of State, et al.,
Defendants.
___________________________________/
THE FLORIDA SENATE'S DISCLOSURE OF PROPOSED REMEDIAL PLANS
In accordance with this Court's instructions at the September 11, 2015 case management conference, the Florida Senate and Andy Gardiner, in his official capacity as President of the Florida Senate, give notice of serving their two proposed remedial congressional plans: Plan S026C9062 and Plan S026C9066. In accordance with this Court's instructions, the Senate and President Gardiner also identify below every person involved in drawing, reviewing, directing, or approving the proposed remedial plans.
Romo, et al. v. Detzner, et al.
League of Women Voters, et al. v. Detzner, et al.
Case No. 2012-CA-000490
I.
Plan S026C9062
Plan S026C9062 is the product of an iterative legislative process that began when
President Gardiner and Speaker Steve Crisafulli directed professional staff of the Senate
Committee on Reapportionment and the House Select Committee on Redistricting to work with legal counsel to develop a base congressional map that complies with the Florida Supreme
Court's redistricting decisions and all other relevant legal standards. Jay Ferrin, the staff director of the Senate Committee on Reapportionment, Jason Poreda, the staff director of the House
Select Committee on Redistricting, and Jeff Takacs, a special advisor to the House (collectively, "Professional Staff") drew a base map (Plan H000C9065) with direction from counsel for the
House, including Matthew Carson, George Meros, and Andy Bardos (collectively, "House
Counsel"), and counsel for the Senate, including George Levesque, Raoul Cantero, and Jason
Zakia (collectively, "Senate Counsel"). House and Senate Counsel reviewed the base map before its public release on August 5, 2015. On August 10, Representative Jose Oliva introduced
Plan H000C9065 as House Bill 1-B, and Senator Bill Galvano introduced the same plan as
Senate Bill 2-B. The House passed the plan on August 18.
On August 16, Senator Tom Lee directed and approved Plan S0249054, which was drawn by Jay Ferrin, for filing as an amendment to Senate Bill 2-B. The Senate Committee on
Reapportionment adopted the amendment on the same day. The Senate passed Plan S024C9054 as Senate Amendment 876908 to House Bill 1-B on August 19, 2015 in a 28-8 vote. Plan
S024C9054 modified Districts 9, 10, 11, 15, 16, and 17 in the base map; the remaining 21
districts were unchanged.
2
On August 20, the House approved House Amendment 179133 (Plan H110C9071) to Senate Amendment 876908, restoring its versions of Districts 10 and 16 and modifying Districts 9, 11, 15, 17, 18, 20, 21, 22, and 23.
On August 21, Senator Bill Galvano directed and approved Plan S0269062, which was drawn by Jay Ferrin, for filing as an amendment. Plan S0269062 merged the changes made to the base map by the House in plan H110C9071 (Districts 18, 20, 21, 22, and 23) and the changes made to the base map by the Senate in plan S024C9054 (Districts 9, 10, 11, 15, 16, and 17). Plan S026C9062 retained 16 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 12, 13, 14, 19, 24, 25, 26, and 27) as they were originally drawn by Professional Staff in the base map. In a 23-5 vote, the Senate approved and passed Plan S0269062 as Senate Amendment 284802 to House Amendment 179133. The Senators who voted in favor of Plan S0269062 were:
* Thad Altman
* Aaron Bean
* Lizbeth Benacquisto
* Rob Bradley
* Jeff Brandes
* Charles Dean
* Nancy Detert
* Greg Evers
* Anitere Flores
* Don Gaetz
* Bill Galvano
* Andy Gardiner
Romo, et al. v. Detzner, et al.
* Denise Grimsley
* Dorothy Hukill
* Travis Hutson
* Tom Lee
* Joe Negron
* Garrett Richter
* Maria Sachs
* David Simmons
* Darren Soto
* Kelli Stargel
* Geraldine Thompson
The House decided not to concur in the amendment, and the special session of the Legislature adjourned on August 21.
II. Plan S026C9066
On August 27, six days after the Legislature adjourned without passing a plan, Senator Galvano submitted Plan S026C9066 in an effort to reach a compromise between the House and Senate. Jay Ferrin drew Plan S026C9066 at Senator Galvano's direction, and both Senator Galvano and Senate Counsel reviewed Plan S026C9066 before its public release. Plan S026C9066 incorporates all the changes made to the base map by the House in Plan H110C9071 (Districts 11, 18, 20, 21, 22, 23), but alters the configuration of Districts 9, 15, 16, and 17. Twenty-three of the 27 districts in Plan S026C9066 are identical to districts in the last map passed by the House, H110C9071. <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://floridaredistricting.org/documents/2015B/pcm/S026C9062_Notice.pdf\n</url>\n<text>\nIN THE CIRCUIT COURT OF THE SECOND JUDICIAL CIRCUIT IN AND FOR LEON COUNTY, FLORIDA\n\nRENE ROMO, et al.,\n\nPlaintiffs,\n\nvs.\n\nCase No. 2012-CA-000412\n\nKEN DETZNER, in his official capacity as Florida Secretary of State, and PAMELA JO BONDI, in her official capacity as Attorney General,\n\n___________________________________/\n\nTHE LEAGUE OF WOMEN VOTERS OF FLORIDA, et al.,\n\nPlaintiffs,\n\nvs.\n\nCase No. 2012-CA-000490\n\nKEN DETZNER, in his official capacity as Florida Secretary of State, et al.,\n\nDefendants.\n\n___________________________________/\n\nTHE FLORIDA SENATE'S DISCLOSURE OF PROPOSED REMEDIAL PLANS\n\nIn accordance with this Court's instructions at the September 11, 2015 case management conference, the Florida Senate and Andy Gardiner, in his official capacity as President of the Florida Senate, give notice of serving their two proposed remedial congressional plans: Plan S026C9062 and Plan S026C9066. In accordance with this Court's instructions, the Senate and President Gardiner also identify below every person involved in drawing, reviewing, directing, or approving the proposed remedial plans.\n\nRomo, et al. v. Detzner, et al.\n\nLeague of Women Voters, et al. v. Detzner, et al.\n\nCase No. 2012-CA-000490\n\nI.\n\nPlan S026C9062\n\nPlan S026C9062 is the product of an iterative legislative process that began when\n\nPresident Gardiner and Speaker Steve Crisafulli directed professional staff of the Senate\n\nCommittee on Reapportionment and the House Select Committee on Redistricting to work with legal counsel to develop a base congressional map that complies with the Florida Supreme\n\nCourt's redistricting decisions and all other relevant legal standards. Jay Ferrin, the staff director of the Senate Committee on Reapportionment, Jason Poreda, the staff director of the House\n\nSelect Committee on Redistricting, and Jeff Takacs, a special advisor to the House (collectively, \"Professional Staff\") drew a base map (Plan H000C9065) with direction from counsel for the\n\nHouse, including Matthew Carson, George Meros, and Andy Bardos (collectively, \"House\n\nCounsel\"), and counsel for the Senate, including George Levesque, Raoul Cantero, and Jason\n\nZakia (collectively, \"Senate Counsel\"). House and Senate Counsel reviewed the base map before its public release on August 5, 2015. On August 10, Representative Jose Oliva introduced\n\nPlan H000C9065 as House Bill 1-B, and Senator Bill Galvano introduced the same plan as\n\nSenate Bill 2-B. The House passed the plan on August 18.\n\nOn August 16, Senator Tom Lee directed and approved Plan S0249054, which was drawn by Jay Ferrin, for filing as an amendment to Senate Bill 2-B. The Senate Committee on\n\nReapportionment adopted the amendment on the same day. The Senate passed Plan S024C9054 as Senate Amendment 876908 to House Bill 1-B on August 19, 2015 in a 28-8 vote. Plan\n\nS024C9054 modified Districts 9, 10, 11, 15, 16, and 17 in the base map; the remaining 21\n\ndistricts were unchanged.\n\n2\n\nOn August 20, the House approved House Amendment 179133 (Plan H110C9071) to Senate Amendment 876908, restoring its versions of Districts 10 and 16 and modifying Districts 9, 11, 15, 17, 18, 20, 21, 22, and 23.\n\nOn August 21, Senator Bill Galvano directed and approved Plan S0269062, which was drawn by Jay Ferrin, for filing as an amendment. Plan S0269062 merged the changes made to the base map by the House in plan H110C9071 (Districts 18, 20, 21, 22, and 23) and the changes made to the base map by the Senate in plan S024C9054 (Districts 9, 10, 11, 15, 16, and 17). Plan S026C9062 retained 16 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 12, 13, 14, 19, 24, 25, 26, and 27) as they were originally drawn by Professional Staff in the base map. In a 23-5 vote, the Senate approved and passed Plan S0269062 as Senate Amendment 284802 to House Amendment 179133. The Senators who voted in favor of Plan S0269062 were:\n\n* Thad Altman\n* Aaron Bean\n* Lizbeth Benacquisto\n* Rob Bradley\n* Jeff Brandes\n* Charles Dean\n* Nancy Detert\n* Greg Evers\n* Anitere Flores\n* Don Gaetz\n* Bill Galvano\n* Andy Gardiner\n\nRomo, et al. v. Detzner, et al.\n\n* Denise Grimsley\n* Dorothy Hukill\n* Travis Hutson\n* Tom Lee\n* Joe Negron\n* Garrett Richter\n* Maria Sachs\n* David Simmons\n* Darren Soto\n* Kelli Stargel\n* Geraldine Thompson\n\nThe House decided not to concur in the amendment, and the special session of the Legislature adjourned on August 21.\n\nII. Plan S026C9066\n\nOn August 27, six days after the Legislature adjourned without passing a plan, Senator Galvano submitted Plan S026C9066 in an effort to reach a compromise between the House and Senate. Jay Ferrin drew Plan S026C9066 at Senator Galvano's direction, and both Senator Galvano and Senate Counsel reviewed Plan S026C9066 before its public release. Plan S026C9066 incorporates all the changes made to the base map by the House in Plan H110C9071 (Districts 11, 18, 20, 21, 22, 23), but alters the configuration of Districts 9, 15, 16, and 17. Twenty-three of the 27 districts in Plan S026C9066 are identical to districts in the last map passed by the House, H110C9071. <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": " Plan S026C9066 also retains 17 of the 27 districts (1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 13, 14, 19, 24, 25, 26, and 27) in the base plan.",
"role": "assistant"
}
] |
|
Investigation of Plasminogen Activator Inhibi tor-1 4G/5G Gene Polymorphisim in Patients with Pre-Diagnosed Cerebrovascular Disease, Coagulation Disorder and Hypertension
Ahmet Dönder 1 , Ragıp Balahoroğlu 1 , Mehmet Ramazan Şekeroğlu 1 , Haluk Dülger 2,3
1Yüzüncü Yıl University, Faculty of Medicine, Department of Biochemistry, Van, Turkey.
ABSTRACT
2Necmettin Erbakan University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.
3Mevlana University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.
Eur J Basic Med Sci 2013;3(3): 56-60
Received: 02-07-2013
Accepted: 18-11-2013
Correspondence (Yazışma Adresi): Ahmet Dönder PhD,
e-mail: [email protected]
Yüzüncü Yıl Üniversitesi, Tıp Fakültesi, Biyokimya Anabilim Dalı, 65100. VanTürkiye
Plasminogen activator inhibitor-1 (PAI-1); gene polymorphism is the main inhi bitor of fibrinolysis, and high levels may increase the risk of cardiovascular disease. The polymorphism of the 4G/5G gene is located in the PAI-1 gene pro moter region. In this study, our objective is to investigate the genotype and al lele distributions of PAI-1 gene polymorphisms in patients with cerebrovascular disease, coagulation disorder and those pre-diagnosed with hypertension. The results of the analysis PAI-1 gene polymorphism in 109 patients were evaluated retrospectively. These patients were divided into three groups as cerebrovas cular disease, hypertension and coagulation disorder. In the analysis, CVD T (cardiovascular disease thrombosis) stripassay kit which is based on reverse hybridization technique was used. No statistically significant difference was found between three groups in terms of genotype and allele frequencies. PAI1 4G/5G genotype in cerebrovascular disease and hypertension groups were found to be statistically significant compared with 4G/4G genotype, in terms of intra group comparison of genotype distrubutions of the group. In the group pre-diagnosed with coagulation disorder PAI-1 4G/5G genotype were found to be statistically significant compared with 4G/4G and 5G/5G. In conclusion; PAI1 4G/5G genotype may be evaluated a risk factor in patients cerebrovascular disease, coagulation disorder and hypertension.
Key Words: Plasminogen activator inhibitor-1, PCR, polymorphism, 4G/5G
Serebrovasküler Hastalık, Koagülasyon Bozukluğu ve Hipertansiyon Ön Tanısı Alan Hastalarda Plazminojen Aktivator İnhibitör-1 4G/5G Gen Polimorfizminin Araştırılması
ÖZET
Plazminojen aktivator inhibitor-1 (PAI-1) gen polimorfizmi fibrinolizis oluşmasında başlıca inhibitördür ve artan PAI-1 seviyesi kardiyovasküler hastalıkların riskini arttırabilir. 4G/5G gen polimorfizmi PAI-1 genin başlangıç bölgesinde lokalize olmuştur. Bu çalışmada amacımız; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 gen po
limorfizminin genotip ve allel dağılımlarını araştırmaktır. 109 hastanın PAI-1 gen polimorfizm analiz sonuçları retrospektif olarak değerlendirildi. Bu hastalar serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon olarak üç gruba ayrıldı. Analizde ters hib-ridizasyon yöntemini esas alan CVD T (cardiovascular disease thrombosis) stripassay kiti kullanıldı. Serebrovasküler hastalık, hipertansiyon, koagülasyon bozukluğu ön tanısı alan hastaların PAI-1 4G/5G polimorfizminin genotip frekansı açısından her üç grubun karşılaştırılmasında istatistiksel olarak bir fark olmadığı tespit edildi. Grupların genotip dağılımlarının grup içi karşılaştırmaları için serebro vasküler hastalık ve hipertansiyon gruplarında; PAI-1 4G/5G genotipi, 4G/4G genotipine göre istatistiksel olarak anlamlı olduğu tespit edildi. Koagülasyon bozukluğu ön tanısı alan grupta ise; PAI-1 4G/5G genotipi 4G/4G ve 5G/5G genoti plerine göre istatistiksel olarak anlamlı olduğu tespit edildi. Sonuç olarak; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 4G/5G geno tipi bir risk faktörü olarak değerlendirilebilir.
Anahtar Kelimeler: Plazminojen aktivator inhibitör-1, PCR, polimorfizm, 4G/5G
INTRODUCTION
Functional capacity of fibrinolytic system of plasminogen activator inhibitor-1 is an important factor on developing thrombus. Reduced fibrinolytic activity is correlated with increased PAI-1 level (1). Plasminogen activator inhibi tor-1 is a single bonded glycoprotein and has a molecular weight of 52 000 kD. It consists of 379 amino acid. Because of the fact that it doesn't have cysteine, it doesn't have disulphid bridge. It is the most important physiologic in hibitor of tissue plasminogen activator and urokinse-type plasminogen activator on human plasma. It belongs to the super family of serin proteaz inhibitor (serpin).
PAI-1 waves as an active molecule, however under physi ologic circumstances it becomes functionless spontane ously (2). Plasminogen activator inhibitor-1 gene poly morphism is formed by 9 exon and 8 intron which are localized on 7th (7q21.3-22) chromosome. 4G/5G gene polymorphism localizes PAI-1 gene on promoter zone. It is a single based insertion (5G) deletion (4G) polymor phism generated from the starting zone transcription of PAI-1 gene. PAI-1 gene has three sub genotypes. These are; 4G/4G (homozygous mutant), 4G/5G (heterozygous) and 5G/5G (normal type). 4G/4G allele carriers always carry higher level of plasmic PAI-1 activity than 4G/5G
and 5G/5G carriers (3). In the study which was carried on coroner arter patients in Indian population, Ashavaid et al. (4) found that PAI-1 4G/5G genotypes didn't effect the patients severely. In the study which was carried on patients who had myocardial infarction in Tunisian popu lation by Abbout et al. (5) it was claimed that 4G allele carrier density and plasmic PAI-1 activity was in a high level.
In this work, our aim is to study genotype and allele fre quency PAI-1 gene polymorphism on patients pre-diag nosed with cerebrovascular illness, coagulation disorder and hypertension in the city of Van and its around.
MATERIALS AND METHODS
In this work, peripherical blood samples of the patients who came from different clinics (internal disease clin ic, neurology clinic etc.) to biochemistry laboratory of medical faculty of the University of Yüzüncü Yıl were collected. All of the patients' blood samples were ob tained in terms of declaration of Helsinki. 109 patients were included in the study. In one year's time (October 2009-November 2010), the results of the cardiovascular disease thrombosis (CVD T) gene mutation analysis of the 109 patients (75 female, 34 male) were evaluated retro spectively. These patients were divided in three different groups.
Group I: The patients who were pre-diagnosed with cere brovascular illness (n= 37),
Group II: The patients who were pre-diagnosed with hy pertension (n= 31),
Group III: The patients who were pre-diagnosed with co agulation disorder (n= 41).
This study was carried out by using PCR method, using a ready commercial kits, (CVD T Stripassay, ViennaLab Labordiagnostika GmbH, Austria) based on reverse hybridization with strip test method. 3 ml blood obtained from cases were put in tubes with EDTA. The stripassay method is carried out in four levels. DNA was extract ed from peripherical leucocyte using standard method. Genomic DNA was obtained. The exon mutations which we were scanned with multiplex PCR broadened by using primers labeled with biotin. After amplification with PCR, outcomes PCR were controlled by using 3 %
Table 1. Inter-group comparisons of genotype ranges of groups.
Ci: Cerebrovascular illness H: Hypertension Cd: Coagulation disorder
agarose gel. One wild type which is immobilized on the hybridization phase of outcomes of PCR and outcomes of PCR with oligonucleotide were hybridized in one mutant zone. The hybrits were become apparent by the reaction of streptavidin alkali phosphatase and colour substrate.
(cerebrovascular illness), 52 % (hypertension), 50 % (co agulation disorder) respectively (Table 2).
Statistical Analysis
Genotype and allele frequencies were stated as num bers and percentage. In the way of genotype and allele frequencies in the comparison of groups who were prediagnosed with cerebrovascular illness, hypertension and coagulation disorder; Independent ratio comparison test was used with Z test. Statistic meaningfullness degree was taken 5 % in calculations and MINITAB for windows statistics pocket program was used for calculations.
RESULTS
The study was included 109 (75 female, 34 male) patients. 23 of these 109 patients were homozygous (4G/4G, 21.10 %), 57 of these 109 patients were heterozygous (4G/5G, 52.29 %) and 29 of these 109 patients had normal (5G/5G, 26.61 %) genotype. The patients who were pre-diagnosed with cerebrovascular illness, hypertension and coagula tion disorder were examined in the way of PAI-1 gene polymorphism genotype frequency and it was determined that these three groups had no difference statistically (p>0.05) (Table 1). The groups were observed in terms of allele frequence; 4G allele frequence was 43 % (cerebrovascular illness), 48 % (hypertension), 50 % (coagula tion disorder), respectively. 5G allele frequence was 57 %
Table 2. Allele frequency of PAI-1 gene polymorphism.
When the groups' genotype ranges were compared with in-group comparisons, the groups who were prediagnosed with cerebrovascular illness and hypertension had normal heterozygous genotype of PAI-1 gene poly morphism and in comparison with homozygous mutant group, they were statistically more meaningfull. And for the group of patients who pre-diagnosed with coagulation disorder, PAI-1 gene polymorphism was statistically more meaningfull in comparison with both 4G/4G and 5G/5G genotypes (p<0.05) (Table 3).
DISCUSSION
Main function of plasminogen activator inhibitor-1 is to decrease fibrinolysis, start the accumulation of fibrin which is correleated with thrombotic illnesses (6). The studies on people and mice has shown that PAI-1 gene polymorphism is a candidate gene for arterial hyperten sion. Martinez-Calatrava et al. (7) researched whether PAI-1 gene polymorphism is risk indicator for arterial hy pertension or not. When the results were evaluated it was found out that, without considering other factors of hypertension and plasmic PAI-1 level, the fact that high levels of incidence on PAI-1 4G/4G genotype's arterial hy pertension is a risk. In the study of Jeng (8), it was stated that hypertension patients who have genotype of 4G/4G, there was a raise on PAI-1 enzyme activity, but they need ed to be studied on a larger population of people.
Table 3. Intra-group comparisons of genotype ranges of groups (p value).
Song et al. (9) researched the effect of environmental and genetical component on PAI-1 level. They suggest ed that plasmic PAI-1 level wasn't only under control of genetic structure, but also some environmental factors. Thus there were an intristic interaction between envi ronmental factors and genetical structure. In the study of Margaglione et al. (10) on coroner arterial patients in South Italy region, they stated that PAI-1 4G/5G polymor phism had an effect on the progression of illness with other risk factors. In the study which Catto et al. (11) worked on it was stated that PAI-1 enzyme activity on patients who had stroke was a lot higher than healthy people. In their study, after they had studied 2565 pa tients, Gardemann et al. (12) stated that PAI-1 gene polymorphism was an independent risk factor on coroner atherosclerosis. In the study of Ding et al. (13) which was carried out on both white and black stroke patients, they were stressed the fact that there was no connection be tween PAI-1 gene polymorphism and stroke but genotypes of this polymorphism was effective on plasmic PAI-1 en zyme activities. Onalan et al. (14) studied Turkish popu lation and they asserted that PAI-1 4G/4G genotype was an independent indicator on proggession of myocardial infarction. In the study of Zhan et al. (15) carried out in China, the patients who were diagnosed miyocardial and cerebral infarction, PAI-1 4G/5G genotype had a high risk on these patients. In the study on swedish population by Wiklund et al. (16) between two control case, it was concluded that PAI-1 4G/4G and 4G/5G genotypes had enhanced risk factor on ischemic stroke. There are lots of researches in literature for PAI-1 gene polymorphism which was the case in this study. And these researches are the researches which seek for a connection between a present illness. In the literature review we did, we didn't find any comparison of PAI-1 gene polymorphism between three illnesses which had different etiopathogenesis. Therefore the research of three different illnesses in this study is fairly important and it has been the first re search. In this study, we expressed the genotype and al lele frequencies of patients groups as percentage. When we look at the genotype and allele frequencies of groups as paired comparison, we determined that there were no statistically difference between these three groups (p>0.05). In a study on patients, who had different types of thrombosis, Balta et al. (17) showed that PAI-1 4G/4G and 4G/5G genotypes might be correlated with throm bosis in the vessels of inner organs and especially portal vein thrombosis. In the study of Kim et al. (18) which was carried on female patients who were diagnosed with hy pertension, they asserted that PAI-1 gene polymorphism was a polymorphism which could contribute to the hy pertension, gene-environment interaction had no effect on patients who were diagnosed with hypertension and there needed to be a larger population to study. Akhter et al. (19) researched the relationship between deep vein thrombosis and PAI-1 gene polymorphism in AsianIndian population. They stated that there were a higher prevelance of 4G allele between the deep vein thrombo sis patients and control group and the data was compatible with Caucasian population.
In our study, it was determined that in-group comparisons of genotype range, the groups who were pre-diagnosed with cerebrovascular illness and hypertension had a nor mal heterozygous PAI-1 gene polymorphism and statisti cally much more meaningfull than homozygous mutant group, but the group who were pre-diagnosed with co agulation disorder had a statistically meaningfull PAI-1 gene polymorphism than both 4G/4G and 5G/5G geno types. In all of the groups we studied the 4G/5G patients were more than others but among the patients with co agulation disorder, there were more 4G/5G patients than other groups. In this sense, the research which were car ried out before support our research. The most impor tant handicap of our research is that we do not have a control group. As a result; 4G/5G genotype of PAI-1 gene polymorphism can be evaluated as a risk factor on the patients pre-diagnosed with cerebrovascular illness, hy pertension and coagulation disorder in the city of Van and its around.
REFERENCES
1. Hamsten A, Wiman B, de Faire U, Blomback M. Increased plasma levels of a rapid inhibitor of tissue plasminogen ac tivator in young survivors of myocardial infarction. N Engl J Med 1985; 313: 1557-63.
2. Dobrovolsky AB, Titaeva EV. The fibrinolysis system: regu lation of activity and phsiologic functions of its main com ponents. Biochem 2002; 67: 99-108.
3. Eriksson P, Kallin B, van't Hooft FM, Bavenholm P, Hamsten A. Allele specific increase in basal transcription of the plasminogen-activator inhibitor-1 gene is associated with myocardial infarction. Proc Natl Acad Sci USA 1995; 92: 1851-5.
4. Ashavaid TF, Todur SP, Kondkar AA, et al. Platelet poly
morphisms: frequency distribution and association with coronary artery disease in an Indian population. Platelets 2011; 22: 85-91.
5. Abboud N, Ghazouani L, Saidi S, et al. Association of PAI1 4G/5G and -844G/A gene polymorphisms and changes in PAI-1/tissue plasminogen activator levels in myocardial in farction: a case control study. Genet Test Mol Biomarkers 2010; 14: 23-7.
6. Pawse AR, Tarachand U. Clot lysis: role of plasminogen ac tivator inhibitors in haemostasis and therapy. Indian J Exp Biol 1997; 35: 545-52.
7. Martínez-Calatrava MJ, Gonzalez-Sanchez JL, Zabena C, et al. Is the plasminogen activator inhibitor-1 gene a can didate gene predisposing to hypertension? Results from a population-based study in Spain. J Hypertens 2007; 25: 773-7.
8. Jeng JR. Association of PAI-1 gene promoter 4G/5G poly morphism with plasma PAI-1 activity in Chinese patients with and without hypertension. American Journal of Hypertension 2003; 16: 290-6.
9. Song Y, Xu W, Chen Y, et al. The influences of genetic and environmental factors on plasma plasminogen activator inhibitor-1 levels in patients with essential hypertension. Zhonghua Yi Xue Yi Chuan Xue Za Zhi 1999; 16: 374-6.
10. Margaglione M, Cappucci G, Colaizzo D, et al. The PAI-1 gene locus 4G/5G polymorphism is associated with a fam ily history of coronary disease. Arteriosclerosis Thrombosis Vascular Biology 1998; 18: 152-6.
11. Catto AJ, Carter AM, Stickland M, et al. Plasminogen ac tivator inhibitor-1 (PAI-1) 4G/5G promoter polymorphism and levels in subjects with cerebrovascular disease. Thromb Haemost 1997; 77: 730-4.
12. Gardemann A, Lohre J, Katz N, et al. The 4G4G genotype of the plasminogen activator inhibitor 4G/5G gene poly
morphism is associated with coronary atherosclerosis in pa tients at high risk for this disease. Thromb Haemost 1999; 82: 1121-6 (Abstract).
13. Ding J, Nicklas BJ, Fallin MD, et al. Plasminogen activator inhibitor type-1 gene polymorphisms and haplotypes are associated with plasma plasminogen activator inhibitor type 1 levels but nor with myocardial infarction or stroke. American Heart Journals, 2006; 152: 1109-15.
14. Onalan O, Balta G, Oto A, et al. Plasminogen activator inhibitor-1 4G4G genotype is associated with myocardial infarction but not with stable coronary artery disease. J Thromb Thrombolysis 2008; 26: 211-7.
15. Zhan M, Zhou Y, Han Z. Plasminogen activator inhibitor-1 4G/5G gene polymorphism in patients with myocardial or cerebrovascular infarction in Tianjin. China Chin Med J 2003; 116: 1707-10.
16. Wiklund P, Nilsson L, Ardnor SN, et al. Plasminogen acti vator inhibitor-1 4G/5G polymorphism and risk of stroke: Replicated findings in two nested case-control studies based on independent cohorts. Stroke 2005; 36: 1661-5.
17. Balta G, Altay Ç, Gurgey A. PAI-1 Gene 4G/5G Genotype: A Risk Factor For Thrombosis in Vessels of Internal Organs. Am J Hematol 2002; 71: 89-93.
18. Kim KN, Kim KM, Kim BT, et al. Relationship of plasminogen activator inhibitor 1 gene 4G/5G polymorphisms to hyper tension in Korean women. Chin Med J 2012; 125: 1249-53.
19. Akhter MS, Biswas A, Ranjan R, et al. Plasminogen activa tor inhibitor-1 (PAI-1) gene 4G/5G promoter polymorphism is seen in higher frequency in the Indian patients with deep vein thrombosis. Clin Appl Thromb Hemost 2010; 16: 184-8.
|
<urn:uuid:61fdf93f-d81d-4645-8b80-a944368192ef>
|
CC-MAIN-2021-43
|
https://www.ejbms.net/download/investigation-of-plasminogen-activator-inhibitor-1-4g-5g-gene-polymorphisim-in-patients-with-9203.pdf
|
2021-10-20T17:45:38+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00169-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 923,457,205
| 5,211
|
eng_Latn
|
eng_Latn
| 0.866901
|
eng_Latn
| 0.967055
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2869,
7521,
10726,
15734,
19063
] |
Investigation of Plasminogen Activator Inhibi tor-1 4G/5G Gene Polymorphisim in Patients with Pre-Diagnosed Cerebrovascular Disease, Coagulation Disorder and Hypertension
Ahmet Dönder 1 , Ragıp Balahoroğlu 1 , Mehmet Ramazan Şekeroğlu 1 , Haluk Dülger 2,3
1Yüzüncü Yıl University, Faculty of Medicine, Department of Biochemistry, Van, Turkey.
ABSTRACT
2Necmettin Erbakan University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.
3Mevlana University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.
Eur J Basic Med Sci 2013;3(3): 56-60
Received: 02-07-2013
Accepted: 18-11-2013
Correspondence (Yazışma Adresi): Ahmet Dönder PhD,
e-mail: [email protected]
Yüzüncü Yıl Üniversitesi, Tıp Fakültesi, Biyokimya Anabilim Dalı, 65100. VanTürkiye
Plasminogen activator inhibitor-1 (PAI-1); gene polymorphism is the main inhi bitor of fibrinolysis, and high levels may increase the risk of cardiovascular disease. The polymorphism of the 4G/5G gene is located in the PAI-1 gene pro moter region. In this study, our objective is to investigate the genotype and al lele distributions of PAI-1 gene polymorphisms in patients with cerebrovascular disease, coagulation disorder and those pre-diagnosed with hypertension. The results of the analysis PAI-1 gene polymorphism in 109 patients were evaluated retrospectively. These patients were divided into three groups as cerebrovas cular disease, hypertension and coagulation disorder. In the analysis, CVD T (cardiovascular disease thrombosis) stripassay kit which is based on reverse hybridization technique was used. No statistically significant difference was found between three groups in terms of genotype and allele frequencies. PAI1 4G/5G genotype in cerebrovascular disease and hypertension groups were found to be statistically significant compared with 4G/4G genotype, in terms of intra group comparison of genotype distrubutions of the group. In the group pre-diagnosed with coagulation disorder PAI-1 4G/5G genotype were found to be statistically significant compared with 4G/4G and 5G/5G. In conclusion; PAI1 4G/5G genotype may be evaluated a risk factor in patients cerebrovascular disease, coagulation disorder and hypertension.
Key Words: Plasminogen activator inhibitor-1, PCR, polymorphism, 4G/5G
Serebrovasküler Hastalık, Koagülasyon Bozukluğu ve Hipertansiyon Ön Tanısı Alan Hastalarda Plazminojen Aktivator İnhibitör-1 4G/5G Gen Polimorfizminin Araştırılması
ÖZET
Plazminojen aktivator inhibitor-1 (PAI-1) gen polimorfizmi fibrinolizis oluşmasında başlıca inhibitördür ve artan PAI-1 seviyesi kardiyovasküler hastalıkların riskini arttırabilir. 4G/5G gen polimorfizmi PAI-1 genin başlangıç bölgesinde lokalize olmuştur. Bu çalışmada amacımız; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 gen po
limorfizminin genotip ve allel dağılımlarını araştırmaktır. 109 hastanın PAI-1 gen polimorfizm analiz sonuçları retrospektif olarak değerlendirildi. Bu hastalar serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon olarak üç gruba ayrıldı. Analizde ters hib-ridizasyon yöntemini esas alan CVD T (cardiovascular disease thrombosis) stripassay kiti kullanıldı. Serebrovasküler hastalık, hipertansiyon, koagülasyon bozukluğu ön tanısı alan hastaların PAI-1 4G/5G polimorfizminin genotip frekansı açısından her üç grubun karşılaştırılmasında istatistiksel olarak bir fark olmadığı tespit edildi. Grupların genotip dağılımlarının grup içi karşılaştırmaları için serebro vasküler hastalık ve hipertansiyon gruplarında; PAI-1 4G/5G genotipi, 4G/4G genotipine göre istatistiksel olarak anlamlı olduğu tespit edildi. Koagülasyon bozukluğu ön tanısı alan grupta ise; PAI-1 4G/5G genotipi 4G/4G ve 5G/5G genoti plerine göre istatistiksel olarak anlamlı olduğu tespit edildi. Sonuç olarak; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 4G/5G geno tipi bir risk faktörü olarak değerlendirilebilir.
Anahtar Kelimeler: Plazminojen aktivator inhibitör-1, PCR, polimorfizm, 4G/5G
INTRODUCTION
Functional capacity of fibrinolytic system of plasminogen activator inhibitor-1 is an important factor on developing thrombus. Reduced fibrinolytic activity is correlated with increased PAI-1 level (1). Plasminogen activator inhibi tor-1 is a single bonded glycoprotein and has a molecular weight of 52 000 kD. It consists of 379 amino acid. Because of the fact that it doesn't have cysteine, it doesn't have disulphid bridge. It is the most important physiologic in hibitor of tissue plasminogen activator and urokinse-type plasminogen activator on human plasma. It belongs to the super family of serin proteaz inhibitor (serpin).
PAI-1 waves as an active molecule, however under physi ologic circumstances it becomes functionless spontane ously (2). Plasminogen activator inhibitor-1 gene poly morphism is formed by 9 exon and 8 intron which are localized on 7th (7q21.3-22) chromosome. 4G/5G gene polymorphism localizes PAI-1 gene on promoter zone. It is a single based insertion (5G) deletion (4G) polymor phism generated from the starting zone transcription of PAI-1 gene. PAI-1 gene has three sub genotypes. These are; 4G/4G (homozygous mutant), 4G/5G (heterozygous) and 5G/5G (normal type). 4G/4G allele carriers always carry higher level of plasmic PAI-1 activity than 4G/5G
and 5G/5G carriers (3). In the study which was carried on coroner arter patients in Indian population, Ashavaid et al. (4) found that PAI-1 4G/5G genotypes didn't effect the patients severely. In the study which was carried on patients who had myocardial infarction in Tunisian popu lation by Abbout et al. (5) it was claimed that 4G allele carrier density and plasmic PAI-1 activity was in a high level.
In this work, our aim is to study genotype and allele fre quency PAI-1 gene polymorphism on patients pre-diag nosed with cerebrovascular illness, coagulation disorder and hypertension in the city of Van and its around.
MATERIALS AND METHODS
In this work, peripherical blood samples of the patients who came from different clinics (internal disease clin ic, neurology clinic etc.) to biochemistry laboratory of medical faculty of the University of Yüzüncü Yıl were collected. All of the patients' blood samples were ob tained in terms of declaration of Helsinki. 109 patients were included in the study. In one year's time (October 2009-November 2010), the results of the cardiovascular disease thrombosis (CVD T) gene mutation analysis of the 109 patients (75 female, 34 male) were evaluated retro spectively. These patients were divided in three different groups.
Group I: The patients who were pre-diagnosed with cere brovascular illness (n= 37),
Group II: The patients who were pre-diagnosed with hy pertension (n= 31),
Group III: The patients who were pre-diagnosed with co agulation disorder (n= 41).
This study was carried out by using PCR method, using a ready commercial kits, (CVD T Stripassay, ViennaLab Labordiagnostika GmbH, Austria) based on reverse hybridization with strip test method. 3 ml blood obtained from cases were put in tubes with EDTA. The stripassay method is carried out in four levels. DNA was extract ed from peripherical leucocyte using standard method. Genomic DNA was obtained. The exon mutations which we were scanned with multiplex PCR broadened by using primers labeled with biotin. After amplification with PCR, outcomes PCR were controlled by using 3 %
Table 1. Inter-group comparisons of genotype ranges of groups.
Ci: Cerebrovascular illness H: Hypertension Cd: Coagulation disorder
agarose gel. One wild type which is immobilized on the hybridization phase of outcomes of PCR and outcomes of PCR with oligonucleotide were hybridized in one mutant zone. The hybrits were become apparent by the reaction of streptavidin alkali phosphatase and colour substrate.
(cerebrovascular illness), 52 % (hypertension), 50 % (co agulation disorder) respectively (Table 2).
Statistical Analysis
Genotype and allele frequencies were stated as num bers and percentage. In the way of genotype and allele frequencies in the comparison of groups who were prediagnosed with cerebrovascular illness, hypertension and coagulation disorder; Independent ratio comparison test was used with Z test. Statistic meaningfullness degree was taken 5 % in calculations and MINITAB for windows statistics pocket program was used for calculations.
RESULTS
The study was included 109 (75 female, 34 male) patients. 23 of these 109 patients were homozygous (4G/4G, 21.10 %), 57 of these 109 patients were heterozygous (4G/5G, 52.29 %) and 29 of these 109 patients had normal (5G/5G, 26.61 %) genotype. The patients who were pre-diagnosed with cerebrovascular illness, hypertension and coagula tion disorder were examined in the way of PAI-1 gene polymorphism genotype frequency and it was determined that these three groups had no difference statistically (p>0.05) (Table 1). The groups were observed in terms of allele frequence; 4G allele frequence was 43 % (cerebrovascular illness), 48 % (hypertension), 50 % (coagula tion disorder), respectively. 5G allele frequence was 57 %
Table 2. Allele frequency of PAI-1 gene polymorphism.
When the groups' genotype ranges were compared with in-group comparisons, the groups who were prediagnosed with cerebrovascular illness and hypertension had normal heterozygous genotype of PAI-1 gene poly morphism and in comparison with homozygous mutant group, they were statistically more meaningfull. And for the group of patients who pre-diagnosed with coagulation disorder, PAI-1 gene polymorphism was statistically more meaningfull in comparison with both 4G/4G and 5G/5G genotypes (p<0.05) (Table 3).
DISCUSSION
Main function of plasminogen activator inhibitor-1 is to decrease fibrinolysis, start the accumulation of fibrin which is correleated with thrombotic illnesses (6). The studies on people and mice has shown that PAI-1 gene polymorphism is a candidate gene for arterial hyperten sion. Martinez-Calatrava et al. (7) researched whether PAI-1 gene polymorphism is risk indicator for arterial hy pertension or not. When the results were evaluated it was found out that, without considering other factors of hypertension and plasmic PAI-1 level, the fact that high levels of incidence on PAI-1 4G/4G genotype's arterial hy pertension is a risk. In the study of Jeng (8), it was stated that hypertension patients who have genotype of 4G/4G, there was a raise on PAI-1 enzyme activity, but they need ed to be studied on a larger population of people.
Table
|
3.
|
Intra-group comparisons of genotype ranges of groups (p value).
Song et al. (9) researched the effect of environmental and genetical component on PAI-1 level. They suggest ed that plasmic PAI-1 level wasn't only under control of genetic structure, but also some environmental factors. Thus there were an intristic interaction between envi ronmental factors and genetical structure. In the study of Margaglione et al. (10) on coroner arterial patients in South Italy region, they stated that PAI-1 4G/5G polymor phism had an effect on the progression of illness with other risk factors. In the study which Catto et al. (11) worked on it was stated that PAI-1 enzyme activity on patients who had stroke was a lot higher than healthy people. In their study, after they had studied 2565 pa tients, Gardemann et al. (12) stated that PAI-1 gene polymorphism was an independent risk factor on coroner atherosclerosis. In the study of Ding et al. (13) which was carried out on both white and black stroke patients, they were stressed the fact that there was no connection be tween PAI-1 gene polymorphism and stroke but genotypes of this polymorphism was effective on plasmic PAI-1 en zyme activities. Onalan et al. (14) studied Turkish popu lation and they asserted that PAI-1 4G/4G genotype was an independent indicator on proggession of myocardial infarction. In the study of Zhan et al. (15) carried out in China, the patients who were diagnosed miyocardial and cerebral infarction, PAI-1 4G/5G genotype had a high risk on these patients. In the study on swedish population by Wiklund et al. (16) between two control case, it was concluded that PAI-1 4G/4G and 4G/5G genotypes had enhanced risk factor on ischemic stroke. There are lots of researches in literature for PAI-1 gene polymorphism which was the case in this study. And these researches are the researches which seek for a connection between a present illness. In the literature review we did, we didn't find any comparison of PAI-1 gene polymorphism between three illnesses which had different etiopathogenesis. Therefore the research of three different illnesses in this study is fairly important and it has been the first re search. In this study, we expressed the genotype and al lele frequencies of patients groups as percentage. When we look at the genotype and allele frequencies of groups as paired comparison, we determined that there were no statistically difference between these three groups (p>0.05). In a study on patients, who had different types of thrombosis, Balta et al. (17) showed that PAI-1 4G/4G and 4G/5G genotypes might be correlated with throm bosis in the vessels of inner organs and especially portal vein thrombosis. In the study of Kim et al. (18) which was carried on female patients who were diagnosed with hy pertension, they asserted that PAI-1 gene polymorphism was a polymorphism which could contribute to the hy pertension, gene-environment interaction had no effect on patients who were diagnosed with hypertension and there needed to be a larger population to study. Akhter et al. (19) researched the relationship between deep vein thrombosis and PAI-1 gene polymorphism in AsianIndian population. They stated that there were a higher prevelance of 4G allele between the deep vein thrombo sis patients and control group and the data was compatible with Caucasian population.
In our study, it was determined that in-group comparisons of genotype range, the groups who were pre-diagnosed with cerebrovascular illness and hypertension had a nor mal heterozygous PAI-1 gene polymorphism and statisti cally much more meaningfull than homozygous mutant group, but the group who were pre-diagnosed with co agulation disorder had a statistically meaningfull PAI-1 gene polymorphism than both 4G/4G and 5G/5G geno types. In all of the groups we studied the 4G/5G patients were more than others but among the patients with co agulation disorder, there were more 4G/5G patients than other groups. In this sense, the research which were car ried out before support our research. The most impor tant handicap of our research is that we do not have a control group. As a result; 4G/5G genotype of PAI-1 gene polymorphism can be evaluated as a risk factor on the patients pre-diagnosed with cerebrovascular illness, hy pertension and coagulation disorder in the city of Van and its around.
REFERENCES
1. Hamsten A, Wiman B, de Faire U, Blomback M. Increased plasma levels of a rapid inhibitor of tissue plasminogen ac tivator in young survivors of myocardial infarction. N Engl J Med 1985; 313: 1557-63.
2. Dobrovolsky AB, Titaeva EV. The fibrinolysis system: regu lation of activity and phsiologic functions of its main com ponents. Biochem 2002; 67: 99-108.
3. Eriksson P, Kallin B, van't Hooft FM, Bavenholm P, Hamsten A. Allele specific increase in basal transcription of the plasminogen-activator inhibitor-1 gene is associated with myocardial infarction. Proc Natl Acad Sci USA 1995; 92: 1851-5.
4. Ashavaid TF, Todur SP, Kondkar AA, et al. Platelet poly
morphisms: frequency distribution and association with coronary artery disease in an Indian population. Platelets 2011; 22: 85-91.
5. Abboud N, Ghazouani L, Saidi S, et al. Association of PAI1 4G/5G and -844G/A gene polymorphisms and changes in PAI-1/tissue plasminogen activator levels in myocardial in farction: a case control study. Genet Test Mol Biomarkers 2010; 14: 23-7.
6. Pawse AR, Tarachand U. Clot lysis: role of plasminogen ac tivator inhibitors in haemostasis and therapy. Indian J Exp Biol 1997; 35: 545-52.
7. Martínez-Calatrava MJ, Gonzalez-Sanchez JL, Zabena C, et al. Is the plasminogen activator inhibitor-1 gene a can didate gene predisposing to hypertension? Results from a population-based study in Spain. J Hypertens 2007; 25: 773-7.
8. Jeng JR. Association of PAI-1 gene promoter 4G/5G poly morphism with plasma PAI-1 activity in Chinese patients with and without hypertension. American Journal of Hypertension 2003; 16: 290-6.
9. Song Y, Xu W, Chen Y, et al. The influences of genetic and environmental factors on plasma plasminogen activator inhibitor-1 levels in patients with essential hypertension. Zhonghua Yi Xue Yi Chuan Xue Za Zhi 1999; 16: 374-6.
10. Margaglione M, Cappucci G, Colaizzo D, et al. The PAI-1 gene locus 4G/5G polymorphism is associated with a fam ily history of coronary disease. Arteriosclerosis Thrombosis Vascular Biology 1998; 18: 152-6.
11. Catto AJ, Carter AM, Stickland M, et al. Plasminogen ac tivator inhibitor-1 (PAI-1) 4G/5G promoter polymorphism and levels in subjects with cerebrovascular disease. Thromb Haemost 1997; 77: 730-4.
12. Gardemann A, Lohre J, Katz N, et al. The 4G4G genotype of the plasminogen activator inhibitor 4G/5G gene poly
morphism is associated with coronary atherosclerosis in pa tients at high risk for this disease. Thromb Haemost 1999; 82: 1121-6 (Abstract).
13. Ding J, Nicklas BJ, Fallin MD, et al. Plasminogen activator inhibitor type-1 gene polymorphisms and haplotypes are associated with plasma plasminogen activator inhibitor type 1 levels but nor with myocardial infarction or stroke. American Heart Journals, 2006; 152: 1109-15.
14. Onalan O, Balta G, Oto A, et al. Plasminogen activator inhibitor-1 4G4G genotype is associated with myocardial infarction but not with stable coronary artery disease. J Thromb Thrombolysis 2008; 26: 211-7.
15. Zhan M, Zhou Y, Han Z. Plasminogen activator inhibitor-1 4G/5G gene polymorphism in patients with myocardial or cerebrovascular infarction in Tianjin. China Chin Med J 2003; 116: 1707-10.
16. Wiklund P, Nilsson L, Ardnor SN, et al. Plasminogen acti vator inhibitor-1 4G/5G polymorphism and risk of stroke: Replicated findings in two nested case-control studies based on independent cohorts. Stroke 2005; 36: 1661-5.
17. Balta G, Altay Ç, Gurgey A. PAI-1 Gene 4G/5G Genotype: A Risk Factor For Thrombosis in Vessels of Internal Organs. Am J Hematol 2002; 71: 89-93.
18. Kim KN, Kim KM, Kim BT, et al. Relationship of plasminogen activator inhibitor 1 gene 4G/5G polymorphisms to hyper tension in Korean women. Chin Med J 2012; 125: 1249-53.
19. Akhter MS, Biswas A, Ranjan R, et al. Plasminogen activa tor inhibitor-1 (PAI-1) gene 4G/5G promoter polymorphism is seen in higher frequency in the Indian patients with deep vein thrombosis. Clin Appl Thromb Hemost 2010; 16: 184-8.
| 10,652
|
inside_word
|
3.
|
remove_one_sentence
|
<url>
https://www.ejbms.net/download/investigation-of-plasminogen-activator-inhibitor-1-4g-5g-gene-polymorphisim-in-patients-with-9203.pdf
</url>
<text>
Investigation of Plasminogen Activator Inhibi tor-1 4G/5G Gene Polymorphisim in Patients with Pre-Diagnosed Cerebrovascular Disease, Coagulation Disorder and Hypertension
Ahmet Dönder 1 , Ragıp Balahoroğlu 1 , Mehmet Ramazan Şekeroğlu 1 , Haluk Dülger 2,3
1Yüzüncü Yıl University, Faculty of Medicine, Department of Biochemistry, Van, Turkey.
ABSTRACT
2Necmettin Erbakan University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.
3Mevlana University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.
Eur J Basic Med Sci 2013;3(3): 56-60
Received: 02-07-2013
Accepted: 18-11-2013
Correspondence (Yazışma Adresi): Ahmet Dönder PhD,
e-mail: [email protected]
Yüzüncü Yıl Üniversitesi, Tıp Fakültesi, Biyokimya Anabilim Dalı, 65100. VanTürkiye
Plasminogen activator inhibitor-1 (PAI-1); gene polymorphism is the main inhi bitor of fibrinolysis, and high levels may increase the risk of cardiovascular disease. The polymorphism of the 4G/5G gene is located in the PAI-1 gene pro moter region. In this study, our objective is to investigate the genotype and al lele distributions of PAI-1 gene polymorphisms in patients with cerebrovascular disease, coagulation disorder and those pre-diagnosed with hypertension. The results of the analysis PAI-1 gene polymorphism in 109 patients were evaluated retrospectively. These patients were divided into three groups as cerebrovas cular disease, hypertension and coagulation disorder. In the analysis, CVD T (cardiovascular disease thrombosis) stripassay kit which is based on reverse hybridization technique was used. No statistically significant difference was found between three groups in terms of genotype and allele frequencies. PAI1 4G/5G genotype in cerebrovascular disease and hypertension groups were found to be statistically significant compared with 4G/4G genotype, in terms of intra group comparison of genotype distrubutions of the group. In the group pre-diagnosed with coagulation disorder PAI-1 4G/5G genotype were found to be statistically significant compared with 4G/4G and 5G/5G. In conclusion; PAI1 4G/5G genotype may be evaluated a risk factor in patients cerebrovascular disease, coagulation disorder and hypertension.
Key Words: Plasminogen activator inhibitor-1, PCR, polymorphism, 4G/5G
Serebrovasküler Hastalık, Koagülasyon Bozukluğu ve Hipertansiyon Ön Tanısı Alan Hastalarda Plazminojen Aktivator İnhibitör-1 4G/5G Gen Polimorfizminin Araştırılması
ÖZET
Plazminojen aktivator inhibitor-1 (PAI-1) gen polimorfizmi fibrinolizis oluşmasında başlıca inhibitördür ve artan PAI-1 seviyesi kardiyovasküler hastalıkların riskini arttırabilir. 4G/5G gen polimorfizmi PAI-1 genin başlangıç bölgesinde lokalize olmuştur. Bu çalışmada amacımız; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 gen po
limorfizminin genotip ve allel dağılımlarını araştırmaktır. 109 hastanın PAI-1 gen polimorfizm analiz sonuçları retrospektif olarak değerlendirildi. Bu hastalar serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon olarak üç gruba ayrıldı. Analizde ters hib-ridizasyon yöntemini esas alan CVD T (cardiovascular disease thrombosis) stripassay kiti kullanıldı. Serebrovasküler hastalık, hipertansiyon, koagülasyon bozukluğu ön tanısı alan hastaların PAI-1 4G/5G polimorfizminin genotip frekansı açısından her üç grubun karşılaştırılmasında istatistiksel olarak bir fark olmadığı tespit edildi. Grupların genotip dağılımlarının grup içi karşılaştırmaları için serebro vasküler hastalık ve hipertansiyon gruplarında; PAI-1 4G/5G genotipi, 4G/4G genotipine göre istatistiksel olarak anlamlı olduğu tespit edildi. Koagülasyon bozukluğu ön tanısı alan grupta ise; PAI-1 4G/5G genotipi 4G/4G ve 5G/5G genoti plerine göre istatistiksel olarak anlamlı olduğu tespit edildi. Sonuç olarak; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 4G/5G geno tipi bir risk faktörü olarak değerlendirilebilir.
Anahtar Kelimeler: Plazminojen aktivator inhibitör-1, PCR, polimorfizm, 4G/5G
INTRODUCTION
Functional capacity of fibrinolytic system of plasminogen activator inhibitor-1 is an important factor on developing thrombus. Reduced fibrinolytic activity is correlated with increased PAI-1 level (1). Plasminogen activator inhibi tor-1 is a single bonded glycoprotein and has a molecular weight of 52 000 kD. It consists of 379 amino acid. Because of the fact that it doesn't have cysteine, it doesn't have disulphid bridge. It is the most important physiologic in hibitor of tissue plasminogen activator and urokinse-type plasminogen activator on human plasma. It belongs to the super family of serin proteaz inhibitor (serpin).
PAI-1 waves as an active molecule, however under physi ologic circumstances it becomes functionless spontane ously (2). Plasminogen activator inhibitor-1 gene poly morphism is formed by 9 exon and 8 intron which are localized on 7th (7q21.3-22) chromosome. 4G/5G gene polymorphism localizes PAI-1 gene on promoter zone. It is a single based insertion (5G) deletion (4G) polymor phism generated from the starting zone transcription of PAI-1 gene. PAI-1 gene has three sub genotypes. These are; 4G/4G (homozygous mutant), 4G/5G (heterozygous) and 5G/5G (normal type). 4G/4G allele carriers always carry higher level of plasmic PAI-1 activity than 4G/5G
and 5G/5G carriers (3). In the study which was carried on coroner arter patients in Indian population, Ashavaid et al. (4) found that PAI-1 4G/5G genotypes didn't effect the patients severely. In the study which was carried on patients who had myocardial infarction in Tunisian popu lation by Abbout et al. (5) it was claimed that 4G allele carrier density and plasmic PAI-1 activity was in a high level.
In this work, our aim is to study genotype and allele fre quency PAI-1 gene polymorphism on patients pre-diag nosed with cerebrovascular illness, coagulation disorder and hypertension in the city of Van and its around.
MATERIALS AND METHODS
In this work, peripherical blood samples of the patients who came from different clinics (internal disease clin ic, neurology clinic etc.) to biochemistry laboratory of medical faculty of the University of Yüzüncü Yıl were collected. All of the patients' blood samples were ob tained in terms of declaration of Helsinki. 109 patients were included in the study. In one year's time (October 2009-November 2010), the results of the cardiovascular disease thrombosis (CVD T) gene mutation analysis of the 109 patients (75 female, 34 male) were evaluated retro spectively. These patients were divided in three different groups.
Group I: The patients who were pre-diagnosed with cere brovascular illness (n= 37),
Group II: The patients who were pre-diagnosed with hy pertension (n= 31),
Group III: The patients who were pre-diagnosed with co agulation disorder (n= 41).
This study was carried out by using PCR method, using a ready commercial kits, (CVD T Stripassay, ViennaLab Labordiagnostika GmbH, Austria) based on reverse hybridization with strip test method. 3 ml blood obtained from cases were put in tubes with EDTA. The stripassay method is carried out in four levels. DNA was extract ed from peripherical leucocyte using standard method. Genomic DNA was obtained. The exon mutations which we were scanned with multiplex PCR broadened by using primers labeled with biotin. After amplification with PCR, outcomes PCR were controlled by using 3 %
Table 1. Inter-group comparisons of genotype ranges of groups.
Ci: Cerebrovascular illness H: Hypertension Cd: Coagulation disorder
agarose gel. One wild type which is immobilized on the hybridization phase of outcomes of PCR and outcomes of PCR with oligonucleotide were hybridized in one mutant zone. The hybrits were become apparent by the reaction of streptavidin alkali phosphatase and colour substrate.
(cerebrovascular illness), 52 % (hypertension), 50 % (co agulation disorder) respectively (Table 2).
Statistical Analysis
Genotype and allele frequencies were stated as num bers and percentage. In the way of genotype and allele frequencies in the comparison of groups who were prediagnosed with cerebrovascular illness, hypertension and coagulation disorder; Independent ratio comparison test was used with Z test. Statistic meaningfullness degree was taken 5 % in calculations and MINITAB for windows statistics pocket program was used for calculations.
RESULTS
The study was included 109 (75 female, 34 male) patients. 23 of these 109 patients were homozygous (4G/4G, 21.10 %), 57 of these 109 patients were heterozygous (4G/5G, 52.29 %) and 29 of these 109 patients had normal (5G/5G, 26.61 %) genotype. The patients who were pre-diagnosed with cerebrovascular illness, hypertension and coagula tion disorder were examined in the way of PAI-1 gene polymorphism genotype frequency and it was determined that these three groups had no difference statistically (p>0.05) (Table 1). The groups were observed in terms of allele frequence; 4G allele frequence was 43 % (cerebrovascular illness), 48 % (hypertension), 50 % (coagula tion disorder), respectively. 5G allele frequence was 57 %
Table 2. Allele frequency of PAI-1 gene polymorphism.
When the groups' genotype ranges were compared with in-group comparisons, the groups who were prediagnosed with cerebrovascular illness and hypertension had normal heterozygous genotype of PAI-1 gene poly morphism and in comparison with homozygous mutant group, they were statistically more meaningfull. And for the group of patients who pre-diagnosed with coagulation disorder, PAI-1 gene polymorphism was statistically more meaningfull in comparison with both 4G/4G and 5G/5G genotypes (p<0.05) (Table 3).
DISCUSSION
Main function of plasminogen activator inhibitor-1 is to decrease fibrinolysis, start the accumulation of fibrin which is correleated with thrombotic illnesses (6). The studies on people and mice has shown that PAI-1 gene polymorphism is a candidate gene for arterial hyperten sion. Martinez-Calatrava et al. (7) researched whether PAI-1 gene polymorphism is risk indicator for arterial hy pertension or not. When the results were evaluated it was found out that, without considering other factors of hypertension and plasmic PAI-1 level, the fact that high levels of incidence on PAI-1 4G/4G genotype's arterial hy pertension is a risk. In the study of Jeng (8), it was stated that hypertension patients who have genotype of 4G/4G, there was a raise on PAI-1 enzyme activity, but they need ed to be studied on a larger population of people.
Table <cursor_is_here> Intra-group comparisons of genotype ranges of groups (p value).
Song et al. (9) researched the effect of environmental and genetical component on PAI-1 level. They suggest ed that plasmic PAI-1 level wasn't only under control of genetic structure, but also some environmental factors. Thus there were an intristic interaction between envi ronmental factors and genetical structure. In the study of Margaglione et al. (10) on coroner arterial patients in South Italy region, they stated that PAI-1 4G/5G polymor phism had an effect on the progression of illness with other risk factors. In the study which Catto et al. (11) worked on it was stated that PAI-1 enzyme activity on patients who had stroke was a lot higher than healthy people. In their study, after they had studied 2565 pa tients, Gardemann et al. (12) stated that PAI-1 gene polymorphism was an independent risk factor on coroner atherosclerosis. In the study of Ding et al. (13) which was carried out on both white and black stroke patients, they were stressed the fact that there was no connection be tween PAI-1 gene polymorphism and stroke but genotypes of this polymorphism was effective on plasmic PAI-1 en zyme activities. Onalan et al. (14) studied Turkish popu lation and they asserted that PAI-1 4G/4G genotype was an independent indicator on proggession of myocardial infarction. In the study of Zhan et al. (15) carried out in China, the patients who were diagnosed miyocardial and cerebral infarction, PAI-1 4G/5G genotype had a high risk on these patients. In the study on swedish population by Wiklund et al. (16) between two control case, it was concluded that PAI-1 4G/4G and 4G/5G genotypes had enhanced risk factor on ischemic stroke. There are lots of researches in literature for PAI-1 gene polymorphism which was the case in this study. And these researches are the researches which seek for a connection between a present illness. In the literature review we did, we didn't find any comparison of PAI-1 gene polymorphism between three illnesses which had different etiopathogenesis. Therefore the research of three different illnesses in this study is fairly important and it has been the first re search. In this study, we expressed the genotype and al lele frequencies of patients groups as percentage. When we look at the genotype and allele frequencies of groups as paired comparison, we determined that there were no statistically difference between these three groups (p>0.05). In a study on patients, who had different types of thrombosis, Balta et al. (17) showed that PAI-1 4G/4G and 4G/5G genotypes might be correlated with throm bosis in the vessels of inner organs and especially portal vein thrombosis. In the study of Kim et al. (18) which was carried on female patients who were diagnosed with hy pertension, they asserted that PAI-1 gene polymorphism was a polymorphism which could contribute to the hy pertension, gene-environment interaction had no effect on patients who were diagnosed with hypertension and there needed to be a larger population to study. Akhter et al. (19) researched the relationship between deep vein thrombosis and PAI-1 gene polymorphism in AsianIndian population. They stated that there were a higher prevelance of 4G allele between the deep vein thrombo sis patients and control group and the data was compatible with Caucasian population.
In our study, it was determined that in-group comparisons of genotype range, the groups who were pre-diagnosed with cerebrovascular illness and hypertension had a nor mal heterozygous PAI-1 gene polymorphism and statisti cally much more meaningfull than homozygous mutant group, but the group who were pre-diagnosed with co agulation disorder had a statistically meaningfull PAI-1 gene polymorphism than both 4G/4G and 5G/5G geno types. In all of the groups we studied the 4G/5G patients were more than others but among the patients with co agulation disorder, there were more 4G/5G patients than other groups. In this sense, the research which were car ried out before support our research. The most impor tant handicap of our research is that we do not have a control group. As a result; 4G/5G genotype of PAI-1 gene polymorphism can be evaluated as a risk factor on the patients pre-diagnosed with cerebrovascular illness, hy pertension and coagulation disorder in the city of Van and its around.
REFERENCES
1. Hamsten A, Wiman B, de Faire U, Blomback M. Increased plasma levels of a rapid inhibitor of tissue plasminogen ac tivator in young survivors of myocardial infarction. N Engl J Med 1985; 313: 1557-63.
2. Dobrovolsky AB, Titaeva EV. The fibrinolysis system: regu lation of activity and phsiologic functions of its main com ponents. Biochem 2002; 67: 99-108.
3. Eriksson P, Kallin B, van't Hooft FM, Bavenholm P, Hamsten A. Allele specific increase in basal transcription of the plasminogen-activator inhibitor-1 gene is associated with myocardial infarction. Proc Natl Acad Sci USA 1995; 92: 1851-5.
4. Ashavaid TF, Todur SP, Kondkar AA, et al. Platelet poly
morphisms: frequency distribution and association with coronary artery disease in an Indian population. Platelets 2011; 22: 85-91.
5. Abboud N, Ghazouani L, Saidi S, et al. Association of PAI1 4G/5G and -844G/A gene polymorphisms and changes in PAI-1/tissue plasminogen activator levels in myocardial in farction: a case control study. Genet Test Mol Biomarkers 2010; 14: 23-7.
6. Pawse AR, Tarachand U. Clot lysis: role of plasminogen ac tivator inhibitors in haemostasis and therapy. Indian J Exp Biol 1997; 35: 545-52.
7. Martínez-Calatrava MJ, Gonzalez-Sanchez JL, Zabena C, et al. Is the plasminogen activator inhibitor-1 gene a can didate gene predisposing to hypertension? Results from a population-based study in Spain. J Hypertens 2007; 25: 773-7.
8. Jeng JR. Association of PAI-1 gene promoter 4G/5G poly morphism with plasma PAI-1 activity in Chinese patients with and without hypertension. American Journal of Hypertension 2003; 16: 290-6.
9. Song Y, Xu W, Chen Y, et al. The influences of genetic and environmental factors on plasma plasminogen activator inhibitor-1 levels in patients with essential hypertension. Zhonghua Yi Xue Yi Chuan Xue Za Zhi 1999; 16: 374-6.
10. Margaglione M, Cappucci G, Colaizzo D, et al. The PAI-1 gene locus 4G/5G polymorphism is associated with a fam ily history of coronary disease. Arteriosclerosis Thrombosis Vascular Biology 1998; 18: 152-6.
11. Catto AJ, Carter AM, Stickland M, et al. Plasminogen ac tivator inhibitor-1 (PAI-1) 4G/5G promoter polymorphism and levels in subjects with cerebrovascular disease. Thromb Haemost 1997; 77: 730-4.
12. Gardemann A, Lohre J, Katz N, et al. The 4G4G genotype of the plasminogen activator inhibitor 4G/5G gene poly
morphism is associated with coronary atherosclerosis in pa tients at high risk for this disease. Thromb Haemost 1999; 82: 1121-6 (Abstract).
13. Ding J, Nicklas BJ, Fallin MD, et al. Plasminogen activator inhibitor type-1 gene polymorphisms and haplotypes are associated with plasma plasminogen activator inhibitor type 1 levels but nor with myocardial infarction or stroke. American Heart Journals, 2006; 152: 1109-15.
14. Onalan O, Balta G, Oto A, et al. Plasminogen activator inhibitor-1 4G4G genotype is associated with myocardial infarction but not with stable coronary artery disease. J Thromb Thrombolysis 2008; 26: 211-7.
15. Zhan M, Zhou Y, Han Z. Plasminogen activator inhibitor-1 4G/5G gene polymorphism in patients with myocardial or cerebrovascular infarction in Tianjin. China Chin Med J 2003; 116: 1707-10.
16. Wiklund P, Nilsson L, Ardnor SN, et al. Plasminogen acti vator inhibitor-1 4G/5G polymorphism and risk of stroke: Replicated findings in two nested case-control studies based on independent cohorts. Stroke 2005; 36: 1661-5.
17. Balta G, Altay Ç, Gurgey A. PAI-1 Gene 4G/5G Genotype: A Risk Factor For Thrombosis in Vessels of Internal Organs. Am J Hematol 2002; 71: 89-93.
18. Kim KN, Kim KM, Kim BT, et al. Relationship of plasminogen activator inhibitor 1 gene 4G/5G polymorphisms to hyper tension in Korean women. Chin Med J 2012; 125: 1249-53.
19. Akhter MS, Biswas A, Ranjan R, et al. Plasminogen activa tor inhibitor-1 (PAI-1) gene 4G/5G promoter polymorphism is seen in higher frequency in the Indian patients with deep vein thrombosis. Clin Appl Thromb Hemost 2010; 16: 184-8.
</text>
|
[
{
"content": "<url>\nhttps://www.ejbms.net/download/investigation-of-plasminogen-activator-inhibitor-1-4g-5g-gene-polymorphisim-in-patients-with-9203.pdf\n</url>\n<text>\nInvestigation of Plasminogen Activator Inhibi tor-1 4G/5G Gene Polymorphisim in Patients with Pre-Diagnosed Cerebrovascular Disease, Coagulation Disorder and Hypertension\n\nAhmet Dönder 1 , Ragıp Balahoroğlu 1 , Mehmet Ramazan Şekeroğlu 1 , Haluk Dülger 2,3\n\n1Yüzüncü Yıl University, Faculty of Medicine, Department of Biochemistry, Van, Turkey.\n\nABSTRACT\n\n2Necmettin Erbakan University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.\n\n3Mevlana University, Faculty of Medicine, Department of Biochemistry, Konya, Türkiye.\n\nEur J Basic Med Sci 2013;3(3): 56-60\n\nReceived: 02-07-2013\n\nAccepted: 18-11-2013\n\nCorrespondence (Yazışma Adresi): Ahmet Dönder PhD,\n\ne-mail: [email protected]\n\nYüzüncü Yıl Üniversitesi, Tıp Fakültesi, Biyokimya Anabilim Dalı, 65100. VanTürkiye\n\nPlasminogen activator inhibitor-1 (PAI-1); gene polymorphism is the main inhi bitor of fibrinolysis, and high levels may increase the risk of cardiovascular disease. The polymorphism of the 4G/5G gene is located in the PAI-1 gene pro moter region. In this study, our objective is to investigate the genotype and al lele distributions of PAI-1 gene polymorphisms in patients with cerebrovascular disease, coagulation disorder and those pre-diagnosed with hypertension. The results of the analysis PAI-1 gene polymorphism in 109 patients were evaluated retrospectively. These patients were divided into three groups as cerebrovas cular disease, hypertension and coagulation disorder. In the analysis, CVD T (cardiovascular disease thrombosis) stripassay kit which is based on reverse hybridization technique was used. No statistically significant difference was found between three groups in terms of genotype and allele frequencies. PAI1 4G/5G genotype in cerebrovascular disease and hypertension groups were found to be statistically significant compared with 4G/4G genotype, in terms of intra group comparison of genotype distrubutions of the group. In the group pre-diagnosed with coagulation disorder PAI-1 4G/5G genotype were found to be statistically significant compared with 4G/4G and 5G/5G. In conclusion; PAI1 4G/5G genotype may be evaluated a risk factor in patients cerebrovascular disease, coagulation disorder and hypertension.\n\nKey Words: Plasminogen activator inhibitor-1, PCR, polymorphism, 4G/5G\n\nSerebrovasküler Hastalık, Koagülasyon Bozukluğu ve Hipertansiyon Ön Tanısı Alan Hastalarda Plazminojen Aktivator İnhibitör-1 4G/5G Gen Polimorfizminin Araştırılması\n\nÖZET\n\nPlazminojen aktivator inhibitor-1 (PAI-1) gen polimorfizmi fibrinolizis oluşmasında başlıca inhibitördür ve artan PAI-1 seviyesi kardiyovasküler hastalıkların riskini arttırabilir. 4G/5G gen polimorfizmi PAI-1 genin başlangıç bölgesinde lokalize olmuştur. Bu çalışmada amacımız; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 gen po\n\nlimorfizminin genotip ve allel dağılımlarını araştırmaktır. 109 hastanın PAI-1 gen polimorfizm analiz sonuçları retrospektif olarak değerlendirildi. Bu hastalar serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon olarak üç gruba ayrıldı. Analizde ters hib-ridizasyon yöntemini esas alan CVD T (cardiovascular disease thrombosis) stripassay kiti kullanıldı. Serebrovasküler hastalık, hipertansiyon, koagülasyon bozukluğu ön tanısı alan hastaların PAI-1 4G/5G polimorfizminin genotip frekansı açısından her üç grubun karşılaştırılmasında istatistiksel olarak bir fark olmadığı tespit edildi. Grupların genotip dağılımlarının grup içi karşılaştırmaları için serebro vasküler hastalık ve hipertansiyon gruplarında; PAI-1 4G/5G genotipi, 4G/4G genotipine göre istatistiksel olarak anlamlı olduğu tespit edildi. Koagülasyon bozukluğu ön tanısı alan grupta ise; PAI-1 4G/5G genotipi 4G/4G ve 5G/5G genoti plerine göre istatistiksel olarak anlamlı olduğu tespit edildi. Sonuç olarak; serebrovasküler hastalık, koagülasyon bozukluğu ve hipertansiyon ön tanısı alan hastalarda PAI-1 4G/5G geno tipi bir risk faktörü olarak değerlendirilebilir.\n\nAnahtar Kelimeler: Plazminojen aktivator inhibitör-1, PCR, polimorfizm, 4G/5G\n\nINTRODUCTION\n\nFunctional capacity of fibrinolytic system of plasminogen activator inhibitor-1 is an important factor on developing thrombus. Reduced fibrinolytic activity is correlated with increased PAI-1 level (1). Plasminogen activator inhibi tor-1 is a single bonded glycoprotein and has a molecular weight of 52 000 kD. It consists of 379 amino acid. Because of the fact that it doesn't have cysteine, it doesn't have disulphid bridge. It is the most important physiologic in hibitor of tissue plasminogen activator and urokinse-type plasminogen activator on human plasma. It belongs to the super family of serin proteaz inhibitor (serpin).\n\nPAI-1 waves as an active molecule, however under physi ologic circumstances it becomes functionless spontane ously (2). Plasminogen activator inhibitor-1 gene poly morphism is formed by 9 exon and 8 intron which are localized on 7th (7q21.3-22) chromosome. 4G/5G gene polymorphism localizes PAI-1 gene on promoter zone. It is a single based insertion (5G) deletion (4G) polymor phism generated from the starting zone transcription of PAI-1 gene. PAI-1 gene has three sub genotypes. These are; 4G/4G (homozygous mutant), 4G/5G (heterozygous) and 5G/5G (normal type). 4G/4G allele carriers always carry higher level of plasmic PAI-1 activity than 4G/5G\n\nand 5G/5G carriers (3). In the study which was carried on coroner arter patients in Indian population, Ashavaid et al. (4) found that PAI-1 4G/5G genotypes didn't effect the patients severely. In the study which was carried on patients who had myocardial infarction in Tunisian popu lation by Abbout et al. (5) it was claimed that 4G allele carrier density and plasmic PAI-1 activity was in a high level.\n\nIn this work, our aim is to study genotype and allele fre quency PAI-1 gene polymorphism on patients pre-diag nosed with cerebrovascular illness, coagulation disorder and hypertension in the city of Van and its around.\n\nMATERIALS AND METHODS\n\nIn this work, peripherical blood samples of the patients who came from different clinics (internal disease clin ic, neurology clinic etc.) to biochemistry laboratory of medical faculty of the University of Yüzüncü Yıl were collected. All of the patients' blood samples were ob tained in terms of declaration of Helsinki. 109 patients were included in the study. In one year's time (October 2009-November 2010), the results of the cardiovascular disease thrombosis (CVD T) gene mutation analysis of the 109 patients (75 female, 34 male) were evaluated retro spectively. These patients were divided in three different groups.\n\nGroup I: The patients who were pre-diagnosed with cere brovascular illness (n= 37),\n\nGroup II: The patients who were pre-diagnosed with hy pertension (n= 31),\n\nGroup III: The patients who were pre-diagnosed with co agulation disorder (n= 41).\n\nThis study was carried out by using PCR method, using a ready commercial kits, (CVD T Stripassay, ViennaLab Labordiagnostika GmbH, Austria) based on reverse hybridization with strip test method. 3 ml blood obtained from cases were put in tubes with EDTA. The stripassay method is carried out in four levels. DNA was extract ed from peripherical leucocyte using standard method. Genomic DNA was obtained. The exon mutations which we were scanned with multiplex PCR broadened by using primers labeled with biotin. After amplification with PCR, outcomes PCR were controlled by using 3 %\n\nTable 1. Inter-group comparisons of genotype ranges of groups.\n\nCi: Cerebrovascular illness H: Hypertension Cd: Coagulation disorder\n\nagarose gel. One wild type which is immobilized on the hybridization phase of outcomes of PCR and outcomes of PCR with oligonucleotide were hybridized in one mutant zone. The hybrits were become apparent by the reaction of streptavidin alkali phosphatase and colour substrate.\n\n(cerebrovascular illness), 52 % (hypertension), 50 % (co agulation disorder) respectively (Table 2).\n\nStatistical Analysis\n\nGenotype and allele frequencies were stated as num bers and percentage. In the way of genotype and allele frequencies in the comparison of groups who were prediagnosed with cerebrovascular illness, hypertension and coagulation disorder; Independent ratio comparison test was used with Z test. Statistic meaningfullness degree was taken 5 % in calculations and MINITAB for windows statistics pocket program was used for calculations.\n\nRESULTS\n\nThe study was included 109 (75 female, 34 male) patients. 23 of these 109 patients were homozygous (4G/4G, 21.10 %), 57 of these 109 patients were heterozygous (4G/5G, 52.29 %) and 29 of these 109 patients had normal (5G/5G, 26.61 %) genotype. The patients who were pre-diagnosed with cerebrovascular illness, hypertension and coagula tion disorder were examined in the way of PAI-1 gene polymorphism genotype frequency and it was determined that these three groups had no difference statistically (p>0.05) (Table 1). The groups were observed in terms of allele frequence; 4G allele frequence was 43 % (cerebrovascular illness), 48 % (hypertension), 50 % (coagula tion disorder), respectively. 5G allele frequence was 57 %\n\nTable 2. Allele frequency of PAI-1 gene polymorphism.\n\nWhen the groups' genotype ranges were compared with in-group comparisons, the groups who were prediagnosed with cerebrovascular illness and hypertension had normal heterozygous genotype of PAI-1 gene poly morphism and in comparison with homozygous mutant group, they were statistically more meaningfull. And for the group of patients who pre-diagnosed with coagulation disorder, PAI-1 gene polymorphism was statistically more meaningfull in comparison with both 4G/4G and 5G/5G genotypes (p<0.05) (Table 3).\n\nDISCUSSION\n\nMain function of plasminogen activator inhibitor-1 is to decrease fibrinolysis, start the accumulation of fibrin which is correleated with thrombotic illnesses (6). The studies on people and mice has shown that PAI-1 gene polymorphism is a candidate gene for arterial hyperten sion. Martinez-Calatrava et al. (7) researched whether PAI-1 gene polymorphism is risk indicator for arterial hy pertension or not. When the results were evaluated it was found out that, without considering other factors of hypertension and plasmic PAI-1 level, the fact that high levels of incidence on PAI-1 4G/4G genotype's arterial hy pertension is a risk. In the study of Jeng (8), it was stated that hypertension patients who have genotype of 4G/4G, there was a raise on PAI-1 enzyme activity, but they need ed to be studied on a larger population of people.\n\nTable <cursor_is_here> Intra-group comparisons of genotype ranges of groups (p value).\n\nSong et al. (9) researched the effect of environmental and genetical component on PAI-1 level. They suggest ed that plasmic PAI-1 level wasn't only under control of genetic structure, but also some environmental factors. Thus there were an intristic interaction between envi ronmental factors and genetical structure. In the study of Margaglione et al. (10) on coroner arterial patients in South Italy region, they stated that PAI-1 4G/5G polymor phism had an effect on the progression of illness with other risk factors. In the study which Catto et al. (11) worked on it was stated that PAI-1 enzyme activity on patients who had stroke was a lot higher than healthy people. In their study, after they had studied 2565 pa tients, Gardemann et al. (12) stated that PAI-1 gene polymorphism was an independent risk factor on coroner atherosclerosis. In the study of Ding et al. (13) which was carried out on both white and black stroke patients, they were stressed the fact that there was no connection be tween PAI-1 gene polymorphism and stroke but genotypes of this polymorphism was effective on plasmic PAI-1 en zyme activities. Onalan et al. (14) studied Turkish popu lation and they asserted that PAI-1 4G/4G genotype was an independent indicator on proggession of myocardial infarction. In the study of Zhan et al. (15) carried out in China, the patients who were diagnosed miyocardial and cerebral infarction, PAI-1 4G/5G genotype had a high risk on these patients. In the study on swedish population by Wiklund et al. (16) between two control case, it was concluded that PAI-1 4G/4G and 4G/5G genotypes had enhanced risk factor on ischemic stroke. There are lots of researches in literature for PAI-1 gene polymorphism which was the case in this study. And these researches are the researches which seek for a connection between a present illness. In the literature review we did, we didn't find any comparison of PAI-1 gene polymorphism between three illnesses which had different etiopathogenesis. Therefore the research of three different illnesses in this study is fairly important and it has been the first re search. In this study, we expressed the genotype and al lele frequencies of patients groups as percentage. When we look at the genotype and allele frequencies of groups as paired comparison, we determined that there were no statistically difference between these three groups (p>0.05). In a study on patients, who had different types of thrombosis, Balta et al. (17) showed that PAI-1 4G/4G and 4G/5G genotypes might be correlated with throm bosis in the vessels of inner organs and especially portal vein thrombosis. In the study of Kim et al. (18) which was carried on female patients who were diagnosed with hy pertension, they asserted that PAI-1 gene polymorphism was a polymorphism which could contribute to the hy pertension, gene-environment interaction had no effect on patients who were diagnosed with hypertension and there needed to be a larger population to study. Akhter et al. (19) researched the relationship between deep vein thrombosis and PAI-1 gene polymorphism in AsianIndian population. They stated that there were a higher prevelance of 4G allele between the deep vein thrombo sis patients and control group and the data was compatible with Caucasian population.\n\nIn our study, it was determined that in-group comparisons of genotype range, the groups who were pre-diagnosed with cerebrovascular illness and hypertension had a nor mal heterozygous PAI-1 gene polymorphism and statisti cally much more meaningfull than homozygous mutant group, but the group who were pre-diagnosed with co agulation disorder had a statistically meaningfull PAI-1 gene polymorphism than both 4G/4G and 5G/5G geno types. In all of the groups we studied the 4G/5G patients were more than others but among the patients with co agulation disorder, there were more 4G/5G patients than other groups. In this sense, the research which were car ried out before support our research. The most impor tant handicap of our research is that we do not have a control group. As a result; 4G/5G genotype of PAI-1 gene polymorphism can be evaluated as a risk factor on the patients pre-diagnosed with cerebrovascular illness, hy pertension and coagulation disorder in the city of Van and its around.\n\nREFERENCES\n\n1. Hamsten A, Wiman B, de Faire U, Blomback M. Increased plasma levels of a rapid inhibitor of tissue plasminogen ac tivator in young survivors of myocardial infarction. N Engl J Med 1985; 313: 1557-63.\n2. Dobrovolsky AB, Titaeva EV. The fibrinolysis system: regu lation of activity and phsiologic functions of its main com ponents. Biochem 2002; 67: 99-108.\n3. Eriksson P, Kallin B, van't Hooft FM, Bavenholm P, Hamsten A. Allele specific increase in basal transcription of the plasminogen-activator inhibitor-1 gene is associated with myocardial infarction. Proc Natl Acad Sci USA 1995; 92: 1851-5.\n4. Ashavaid TF, Todur SP, Kondkar AA, et al. Platelet poly\n\nmorphisms: frequency distribution and association with coronary artery disease in an Indian population. Platelets 2011; 22: 85-91.\n5. Abboud N, Ghazouani L, Saidi S, et al. Association of PAI1 4G/5G and -844G/A gene polymorphisms and changes in PAI-1/tissue plasminogen activator levels in myocardial in farction: a case control study. Genet Test Mol Biomarkers 2010; 14: 23-7.\n6. Pawse AR, Tarachand U. Clot lysis: role of plasminogen ac tivator inhibitors in haemostasis and therapy. Indian J Exp Biol 1997; 35: 545-52.\n7. Martínez-Calatrava MJ, Gonzalez-Sanchez JL, Zabena C, et al. Is the plasminogen activator inhibitor-1 gene a can didate gene predisposing to hypertension? Results from a population-based study in Spain. J Hypertens 2007; 25: 773-7.\n8. Jeng JR. Association of PAI-1 gene promoter 4G/5G poly morphism with plasma PAI-1 activity in Chinese patients with and without hypertension. American Journal of Hypertension 2003; 16: 290-6.\n9. Song Y, Xu W, Chen Y, et al. The influences of genetic and environmental factors on plasma plasminogen activator inhibitor-1 levels in patients with essential hypertension. Zhonghua Yi Xue Yi Chuan Xue Za Zhi 1999; 16: 374-6.\n10. Margaglione M, Cappucci G, Colaizzo D, et al. The PAI-1 gene locus 4G/5G polymorphism is associated with a fam ily history of coronary disease. Arteriosclerosis Thrombosis Vascular Biology 1998; 18: 152-6.\n11. Catto AJ, Carter AM, Stickland M, et al. Plasminogen ac tivator inhibitor-1 (PAI-1) 4G/5G promoter polymorphism and levels in subjects with cerebrovascular disease. Thromb Haemost 1997; 77: 730-4.\n12. Gardemann A, Lohre J, Katz N, et al. The 4G4G genotype of the plasminogen activator inhibitor 4G/5G gene poly\nmorphism is associated with coronary atherosclerosis in pa tients at high risk for this disease. Thromb Haemost 1999; 82: 1121-6 (Abstract).\n13. Ding J, Nicklas BJ, Fallin MD, et al. Plasminogen activator inhibitor type-1 gene polymorphisms and haplotypes are associated with plasma plasminogen activator inhibitor type 1 levels but nor with myocardial infarction or stroke. American Heart Journals, 2006; 152: 1109-15.\n14. Onalan O, Balta G, Oto A, et al. Plasminogen activator inhibitor-1 4G4G genotype is associated with myocardial infarction but not with stable coronary artery disease. J Thromb Thrombolysis 2008; 26: 211-7.\n15. Zhan M, Zhou Y, Han Z. Plasminogen activator inhibitor-1 4G/5G gene polymorphism in patients with myocardial or cerebrovascular infarction in Tianjin. China Chin Med J 2003; 116: 1707-10.\n16. Wiklund P, Nilsson L, Ardnor SN, et al. Plasminogen acti vator inhibitor-1 4G/5G polymorphism and risk of stroke: Replicated findings in two nested case-control studies based on independent cohorts. Stroke 2005; 36: 1661-5.\n17. Balta G, Altay Ç, Gurgey A. PAI-1 Gene 4G/5G Genotype: A Risk Factor For Thrombosis in Vessels of Internal Organs. Am J Hematol 2002; 71: 89-93.\n18. Kim KN, Kim KM, Kim BT, et al. Relationship of plasminogen activator inhibitor 1 gene 4G/5G polymorphisms to hyper tension in Korean women. Chin Med J 2012; 125: 1249-53.\n19. Akhter MS, Biswas A, Ranjan R, et al. Plasminogen activa tor inhibitor-1 (PAI-1) gene 4G/5G promoter polymorphism is seen in higher frequency in the Indian patients with deep vein thrombosis. Clin Appl Thromb Hemost 2010; 16: 184-8.\n</text>\n",
"role": "user"
},
{
"content": "3.",
"role": "assistant"
}
] |
Colorado Scientific Society
The objective of the Society is to promote the knowledge and understanding of Earth science, and its application to human needs
Annual Student Night — Competition —
Featuring FOUR knock-out talks!! (See abstracts on pages 2 and 3.)
University of Wyoming, Laramie
vs.
Colorado School of Mines
Get off the sofa and support our Rocky Mtn. students! Join us!
Thursday, November 20, 2008 American Mountaineering Center 710 10th Street (NE corner 10th and Washington) Golden, Colorado Social half-hour – 6:30 p.m. Meeting time – 7:00 p.m.
Abstracts—2008 Student Night Finalists
Late Miocene through Pliocene evolution of the An gastaco basin (NW Argentina):
Implications for the tectono-climate evolution of the Eastern Cordillera in the late Cenozoic
Sharon Bywater (University of Wyoming), Master's candidate in Geology
The Angastaco basin is located in the Calchaquí valley in NW Argentina between the Eastern Cordil lera (EC) to the west, and Santa Barbara (SB) system to the east. Uplift of the eastern basin-bounding range, the Sierra de los Colorados of the SB, and development of an orographic effect, is postulated to have occurred between 3.4 and 2.4 Ma (Coutand et al., 2006). The Angastaco basin-fill consists of four formations: the Quebrada de los Colorados, the Angastaco, the Palo Pintado, and the San Felipe (Díaz & Malizzia, 1983). The Pliocene San Felipe Formation holds key infor mation concerning the tectono-climate evolution of this part of the Andes, including: timing of uplift of the eastern basin-bounding range as well as timing of development of an orographic barrier and subsequent onset of aridity. Lithofacies interpretations derived from measured stratigraphic sections for the upper ~1 km of the late Miocene Palo Pintado Formation and throughout the San Felipe Formation are consistent overall with previous studies: the Palo Pintado For mation is interpreted as fluvial to lacustrine deposits, whereas the Pliocene San Felipe Formation is inter preted as braided stream and alluvial fan deposits (Díaz & Malizzia, 1983; Coutand et al., 2006). Lithofacies associations suggest a transitional boundary between the two formations.
Preliminary U-Pb SIMS dating of zircons from an ash layer near the Palo Pintado-San Felipe transition confirms ca. 5 Ma as the transition age. Provenance data document a decrease of western (EC) sources up section and a final switch to eastern (SB) sources within the uppermost San Felipe Formation. These data constrain exhumation of the eastern basin-bounding range to upper San Felipe time (ca. 2–3 Ma), support ing the model of Coutand et al. (2006). Paleocurrent data show an axial NNE-flowing drainage during upper Palo Pintado deposition, an E-flowing drainage dur ing San Felipe deposition, and a SW-flowing drainage during uppermost San Felipe deposition. Stable isotope data ( 13 C and 18 O) from paleosol carbonates suggest a woodland or montane grassland environment (Cerling,
2
1992) during Palo Pintado deposition trending towards more arid conditions by the Palo Pintado-San Felipe transition. These data suggest arid conditions within the basin prior to exhumation of the eastern basinbounding range. The mismatch between timing of onset of aridity (ca. 5 Ma) and exhumation of the range previously thought to be responsible for the orographic effect (ca. 2–3 Ma; Coutand et al., 2006) suggests either that climatic variability is not controlled by local uplift of basin-bounding ranges, or that ranges farther east are responsible for the orographic effect.
A refined interpretation of the Medicine Bow oroge ny, southeastern Wyoming: Implications for regional tectonics and crustal growth
Daniel Jones (University of Wyoming),
Ph.D. candidate
New SHRIMP ages from the Big Creek gneiss, southern Sierra Madre, southeastern Wyoming, indicate a complex Paleoproterozoic magmatic-tectonic history. The analyzed rocks have been interpreted as part of the Paleoproterozoic Green Mountain arc. The accretion of this arc, together with syn- to post-collisional granitic rocks (e.g., Sierra Madre granite), has been referred to as the ca. 1.78–1.75 Medicine Bow orogeny.
The new SHRIMP ages consist of 161 points (9 samples) from a representative suite of (meta)igne ous rocks from the Big Creek gneiss. The oldest ages (~1.78 Ga) are from metagabbroic and granitic gneiss that are correlated with the Green Mountain Forma tion and related intrusions. The zircons contained no older, xenocrystic cores. The lack of significant spread in the arc-related ages suggests that the arc accreted shortly after crystallization of these rocks, perhaps by slab rollback related to a southward-dipping subduction zone. Two samples of augen gneiss and two samples of Fe-rich mafic rocks (one partially mingled with augen gneiss) yielded ages of ca. 1,767 Ma, corresponding to the massive phase of the Sierra Madre granite. This episode of bimodal magmatism may correspond to the breakoff of the subducted slab and represent a second phase of juvenile magmatic addition to the crust. Final ly, zircons from a paragneiss leucosome, interpreted as having crystallized from a syntectonic, in-situ anatectic melt, yielded an age of ca. 1,750–1,745 Ma, coeval with metamorphic zircon rims from other gneissic samples.
Abstracts—2008 Student Night Finalists (cont.)
This metamorphic and deformational event likely records a tectonic event to the south, possibly due to a southward jump in active subduction.
In summary, the Medicine Bow orogeny appar ently comprises three tectonic events: (1) accretion of the Green Mountain arc at ~1,780–1,775 Ma; (2) slab breakoff at ~1,763 Ma; and (3) inferred contraction from the south at ~1,750–1,740 Ma.
High-resolution geo-cellular modeling of Upper Morrow "A" Sands at Postle Field, Texas County, Oklahoma
Dawn Jobe (Colorado School of Mines), Reservoir Characterization Project (RCP)
Pennsylvanian-aged Morrow valley-fill sand stones are prolific producers of oil and gas in the mid-continent. Upper Morrowan reservoirs are par ticularly attractive because of their abundant reserves, good production history, and shallow depths; but are often poorly developed because of severe heterogene ity caused by rapid and extreme changes in facies and grain size. Understanding the reservoir heterogeneity has direct implications for interpretation of flow units and ultimately increased recovery and efficiency.
Postle Field, Texas County, Okla., produces from the Upper Morrow "A" sands and has over 300 million barrels of original oil in place. Today, only 40% of the OOIP has been produced. The small recovery is due to the difficulty of production caused by the extreme het erogeneity in the field. The goal for RCP's Phase XII study at Postle is to identify and characterize the reser voir architecture, which is highly complex and changes over very short lateral and vertical distances.
The study area is a 6.25-square-mile block within Pestle Field, over which a multi-component 3-D seis mic survey was shot in March of 2008. The study area includes 63 wells of which log data was available as well as 4 cored wells. Detailed core descriptions and facies determinations, as well as well-log correlations, were integrated with seismic interpretation to produce a new depositional model for the area.
A high-resolution geo-cellular model that incor porated cores, vertical proportion curves, and seismic attributes was then created. Integration of different scales of data into the facies modeling maintained the heterogeneity and yielded a more accurate distribution
3
of facies and reservoir properties. The model was then up-scaled and history matched for future use in geomechanical and fluid flow simulation.
Soil respiration following pulse precipitation events in a semiarid grassland
Tyler Benton 1,2 , Seth M. Munson 3,4 , William K. Lauen roth 3,4 , and Ingrid C. Burke 3,4
1Colorado School of Mines
2SGS-LTER Research Experience for Undergraduates, Colo rado State University (CSU), Fort Collins; 3 Dept. of Forest, Rangeland, and Watershed Stewardship, CSU, Fort Collins; 4Graduate Degree Program in Ecology, CSU, Fort Collins
Semiarid and arid ecosystems are pulse-driven systems. At the daily time scale, the nearly continuous dry soil is irregularly interrupted by brief wet periods. The duration of these wet periods depends on the size of the precipitation event. The precipitation regimes in semiarid and arid environments, and therefore the pulsing regimes, are dominated by small events (≤ 10 mm). The goal of our research was to determine how small precipitation events (2mm, 5mm, and 10mm) affected the dynamics of soil respiration and water loss in the shortgrass steppe. Because land-use change has resulted in a patchwork of large-scale disturbances in this region, we estimated respiration and water loss from sites that varied in time since cultivation distur bance (4 and 20 years after cultivation, and undisturbed shortgrass steppe).
Total carbon respired and duration of elevated soil respiration increased as event size increased in all sites. Total carbon loss ranged from 0.3 g C/m 2 (0.01% of carbon in ANPP) after a 2mm pulse in a field 20 years after cultivation to 3 g C/m 2 (6% of carbon in ANPP) after a 10mm pulse in undisturbed shortgrass steppe. Time since cultivation did not significantly affect the total carbon respired for 2mm pulses, but increased in importance as event size increased. The smallest events (2mm and 5mm) caused a respiration response that lasted longer than it took soils to lose water from the pulses, whereas for the largest event (10mm), respira tion returned to baseline before the added water had been depleted.
Our results suggest that water is the most limiting factor to soil respiration rates for the smallest events, but becomes less limiting for events above 5 mm. Small precipitation events have the potential for large short-term losses of carbon in the shortgrass steppe.
"Keg Night"—The History of CSS Student Night,
by Beth Simmons (with a few asides by the ed.)
The first "student (keg) night"—according to old CSS newsletters—was held on 29 October 1984, from 7 to 9 p.m. in the
Colorado School of Mines (CSM) Green Center.
"We've never attempted this type of meeting before, so come prepared to relax and enjoy mixing with the students, and to hear some good papers. The beer is free, but if you feel so inclined, bring along a chilled 6-pack of your favorite brew—any such donations are welcome."
Five papers were chosen from a field of twelve submissions from Colorado and Wyoming students. The winner was Ernest Duebendorfer for his talk, "Metamorphism, Deformation, and Tectonic Significance of the Cheyenne Belt, Medicine Bow Mountains, Wyoming." He was awarded a prize of $100.
The following year, the "student night" was held as a regular meeting at the CSM Green Center–Metals Hall. The news letter listed the rules, the selection committee, and the nominees:
"Student lectures will be judged for content and presentation. The winner and runner-up will receive prizes of $100 and $50, respectively. From the abstracts submitted, six were selected by a committee composed of Bob Pearson, Bill Scott, Ernie Anderson, Jim MacLachlan, Platt Bradbury, and Doug Nichols. Beer and soft drinks will be furnished by the Society." (Thus the KEG)
That year's winner was Linda Gaye Martin for her talk, "Preliminary Foraminiferal Biostratigraphy of the Smoky Hill Chalk Member of the Niobrara Shale (Upper Cretaceous) in West-Central Kansas." Al Merewether, Ken Pierce, and Dwight Schmidt secretly served as judges. Second place went to the future "Ms. Fire Science/Debris Flow expert," Sue "sound bite" Cannon.
It appears that these two marathon sessions wore out the CSS members and judges, for there is no evidence of another student night until eleven years later in October of 1996. The session included only three 15-minute talks, with winners receiving the traditional monetary prizes PLUS membership to the Society. Sharon Diehl took the top prize with her talk on, "Geochemical and Petrographic Evidence for Fluid Flow and Dissolution in Some Low-Angle Normal Faults, Utah and Nevada." The Tommyknocker (Charlie Sturdevant) and Wynkoop Breweries (John Hickenlooper) donated the refreshments. (The leftover brew found its way to a grateful Halloween party crowd!)
In 1997, the event was held in the Ben Parker Student Union ballroom at CSM. There were five 15-minute presentations, including another one by Aaron Kullman, the previous year's 3rd place finisher. Mike Kaplan won best presentation for his "Late Quaternary glacial history of the mid-outer Cumberland Sound, eastern Canadian Arctic." From whence came the beer? Golden City Brewery (Charlie and Janine Sturdavant). (And, once again the leftovers went to a deftly timed party.)
In 1998, CSS tried a new format, hosting "semi-final" presentations at various colleges in Colorado and Wyoming where cash prizes were awarded to each section's winners. The top place winners from each school then presented to the Society at the Sheraton in Lakewood, vying for additional cash awards of $125 for the winner, $75 for the runner-ups, and a one-year complimentary membership to the Society. The winner was David Winterbourne, "Geology, Alteration, and Mineralization of the Cerro San Pedro Gold-Silver Deposit, San
Luis Potosi, Mexico."
That was ten years ago. Since then, student night has become a tradition, with minor changes in the way papers are submitted and prizes awarded, but the students still come forth with their research! Join us for this year's "student night" (but no longer "KEG night").
(Also in the history notes, there is evidence that CSS once had paperweights. Does anyone have one for the archives? And we should save a speaker's mug, too.)
It may seem like a turkey of a story, but it really rocks!
By Matt Morgan
With November here and Thanksgiving fast ap proaching, I was trying to find a connection be tween geology and this traditional North American holiday. It dawned on me: Plymouth Rock! Al though we can challenge when and where the first Thanksgiving was actually held (St. Augustine, Fla., in 1565 or Plymouth Plantation, Mass., in 1621), it has become a traditional tale in American culture that the Pilgrims, seeking freedom from religious persecution, landed at Plymouth Rock in November of 1620 and shared a "Thanksgiving" meal. So what about the rock?
The "celebrated" Plymouth Rock (no one knows where the actual rock is located) lies within Pilgrim Memorial State Park in Massachusetts, where it is visited by 1 million visitors each year. It is a piece of the Dedham granodiorite (quartz + microcline + plagioclase + perthite + chlorite + epidote) that has been dated to 622 Ma. It is part of the Avalon Terrane that was accreted to the eastern margin of Laurentia between 425 and 370 Ma. Like the Pilgrim's journey across the Atlantic Ocean, the Avalon Terrane was rifted from Gond wana (~465 Ma) and made its own way across a proto-Atlantic Ocean before colliding with Lau rentia.
The piece of the Dedham granodiorite that eventually became the famous Plymouth Rock was plucked from its outcrop by glaciers approxi mately 20,000 years ago. It was transported some unknown distance until it ended up at the foot of Cole's Hill on the coast of Cape Cod.
In 1741, while plans were being made for constructing a wharf at the approximate location of the Pilgrims landing site, a 94-year-old Elder named Thomas Faunce reportedly identified the exact rock that his father told him the Pilgrims set foot upon. Regrettably, we now know the Pilgrims landed near present-day Provincetown, Mass., in November of 1620 located 30 miles east of Plymouth Rock. The location of the exact outcrop they set foot is unknown. However, the now famous Plymouth Rock is located only 650 feet away from the first Pilgrim settlement.
Over the years, many pieces of the Rock have been removed for souvenirs. Today, about 1/3 of the top half of the Rock remains exposed and estimates suggest that the original Rock weighed approximately 20,000 pounds but is now roughly half that size, measuring approxi mately 6 feet x 4 feet.
So when you are sitting down at Thanksgiv ing dinner, think of the Pilgrims and the Rock in a slightly different, more geological way…both took a long journey, across a great ocean, and met a new world on the other side.
Happy Thanksgiving!
Sources: About.com; Wikipedia.org
Nevins, Erin, and Krol, M.A., 2005, Multiple episodes of magmatism, deformation, and metamorphism in the Avalon Terrane of eastern Massachusetts, Geological Society of America Abstract with Programs.
It's Time to Pay Dues for 2009...
Membership dues for the coming year (2009) are now due. You will find a dues payment form in our next issue of the news letter, or you can download the form from the CSS website: www.coloscisoc.org/membership/dues.html. You will also see a reminder in the mail or e-mail this month. Dues payments have increased to $20 for regular members; $10 for correspond ing members (outside the Colorado Front Range area), and $5 for students. You may pay your dues by mailing a check to the CSS, or you can pay with a credit card using PayPal on the CSS website. If you are uncertain if you owe dues or of your member status, contact CSS Treasurer Don Sweetkind by phone at 303–236–1828 or by e-mail at [email protected].
As you pay your dues, please consider making an additional contribution to one of our Memorial Funds, which support our student research grants program, or the Endowment Fund, which we use to defray operating costs. Any contributions made in calendar year 2008 (checks dated before 1 January 2009), will be credited toward the 2008 tax year.
Please remember that your entire contribution goes towards generating interest for the grants and that your contribution is 100% tax deductible because the Society is a non-profit Section 501 (c)(3) organization. Through interest income generated by our Memorial Funds, we have awarded over $125,000 in research grant funding to more than 165 students. This year we also supported the participation of about a dozen students on our field trips through the Pillmore Fund.
Help us cultivate our scientists of the future by generously supporting the Colorado Scientific Society. Thank you.
Earth Science Meetings and Talks
Newsletter items must be received by the 25th of each month.
Colorado Scientific Society's regular meetings are held the 3rd Thursday of the month at the American Mountaineering
Center in Golden (unless otherwise advertised). Social time begins at 6:30 p.m. and talks start at 7:00 p.m.
For more information, contact Matt Morgan, at 303-866-2066, [email protected]
AIPG Every 3rd Tuesday, 11:30–1:30 p.m., University Club, 1673 Sherman St., Denver, make reservations with David Ab bott at 303-394-0321 or [email protected], $30 in advance, $35 at the door; Nov. 18, Michael Wireman, EPA, "Hydrogeo logic characterization of ground waters, mine pools and the Leadville mine drainage tunnel, Leadville, Colorado.
Café Scientifique Wynkoop Brewery, evening science talks at 6:30. Free, except for beer. http://www.cafescicolorado.org
CSM Microscopy short course, Dec. 15–19, 2008, 9 a.m.–5 p.m. Use of reflecting microsope, ID of 40 common ore miner als, study of ore mineral suites. $995. Taught by John Lufkin, 303-997-7365, [email protected]. Class limit of 10.
Colorado School of Mines, Van Tuyl Lectures Thursdays from 4–5 p.m. in Berthoud Hall room 108. Nov. 13—Vince Matthews, Colorado Geological Survey, "China's and India's Ravenous Appetite for Natural Resources and Its Impact on Colorado School of Mines." http://www.mines.edu/academic/geology
Colorado State University, Dept of Geosciences, Rm 320 Warner College of Natural Resources Bldg., Mondays, 4:00 pm. 970-491-5661. http://welcome.warnercnr.colostate.edu/geo-training/index.php
Denver Mining Club meets every Monday at the Littleton Country Buffet near Bowles and Wadsworth (8100 W. Crestline Ave., in the shopping center) 11:30–1:00. Purchase of lunch required. Nov. 10—No Meeting; Nov. 17—Greg Roush, Presi dent, and Heather Justus, Senior Project Geologist, Leonard Rice Engineers, Inc., "Geohydrology and Engineering Hydrology as They Relate to Mining in Colorado"; Nov. 24—Jim Burnell, Colorado Geological Survey, Annual Summary of Colorado Mining and Mineral Activity. http://www.denverminingclub.org
Denver Museum of Nature and Science Nov. 20, 6:30 p.m., Ken Carpenter, "The Life and Times of T. rex" Ricketson Au ditorium. $12 member, $15 non-member. http://www.dmns.org/main/en/General/Education/AdultProgram/Lectures
Denver Region Exploration Geologists' Society (DREGS) meets in the Mutual Consolidated Water Building, 12700 West 27th Avenue, Lakewood. Social 6:00-7:00 p.m. Presentation at 7:00 p.m. Meetings are normally scheduled for the first Mon day of each month. Nov. 3, Bill Bond and Paul Bartos, Esperanza Silver Corp., Geology and discovery of the Cerro Jumil Gold Skarn, Morelos, Mexico. For information contact Jim Piper, (303) 932-0137, or the website http://www.dregs.org
Denver Well Logging Society (DWLS) meets on the third Tuesday of each month, Sept. through May. Lunch and a technical talk at the Wynkoop Brewery begins at 11:30 a.m., 18th and Wynkoop Sts. in Denver. Call Sarah Voight at 720-946-1374 by prior Thursday for reservations. Web page: http://dwls.spwla.org Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Columbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837
Friends of Dinosaur Ridge http://www.dinoridge.org. Admission is free, but donations are welcome. 16831 W. Alameda Parkway. Talks at 7:00 p.m. Visitor Center (303) 697-3466 or contact Beth Simmons at [email protected] for info.
Rocky Mountain Association of Geologists (RMAG) Reception at 11:30, lunch at noon, talk at 12:30. Reservations by recording at 303-623-5396 until 10:30 a.m., prior Wed. Luncheon $30. Talk only (no res.)—$5. Location: Denver Marriott, 17th & California. http://www.rmag.org/events. Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Col umbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837
Rocky Mountain SEPM Reception at 11:30, lunch at noon, speaker at 12:30. Reservations: [email protected], before noon of preceding Friday. $20.00 lunch, $3 talk only. Wynkoop Brewing Company, 1634 18th St., Denver. http://www. rmssepm.org/NewFiles/lunch.html
USGS Geologic Division Colloquium Thursdays, 1:30, Foord Room, Building 20, Denver Federal Center. For more infor mation contact: Peter J. Modreski, USGS, Denver, tel. 303-202-4766, fax 303-202-4767, email [email protected]
Univ. of Colorado, Boulder, Geol. Sciences Colloquium Weds., 4:00 p.m., Rm. 380. Refreshments at 3:30 p.m. on the 3rd floor. Nov. 12—TBA; Nov. 19—Doug Yule, Univ. of Calif., Megaquakes of the Himalaya." http://www.colorado.edu/GeolSci
Colorado Scientific Society P.O. Box 150495 Lakewood, CO 80215-0495
http://www.coloscisoc.org
OFFICERS
President:
Matt Morgan, CGS, 303-866-2066 [email protected]
President-Elect: Don Sweetkind, USGS, 303-236-1828, [email protected]
Treasurer:
Jeremy McCreary 303-744-0907 [email protected]
Secretary:
Lisa Fisher, CSM, 303-478-9427 (c), [email protected]
Past President: Bill Nesse, UNC, 970-330-7183, [email protected]
COUNCILORS
2007-2010: Jeremy McCreary 303-744-0907 [email protected]
2007-2010: Tim McIntyre
2006-2009: Scott Minor, USGS, 303-236-0303, [email protected]
2008-2011: Cal Ruleman, USGS, [email protected]
2008-2011: Lee Shropshire, UNC, 970-352-8778, [email protected]
COMMITTEE CHAIRPERSONS
Best Paper Award: Matt Morgan, CGS, 303-866-2066, [email protected]
Database Manager: Erik Oerter, CGS, [email protected]
Field Trips:
Karl Kellogg, [email protected]
Graphics:
Karen Morgan, CGS, 303-866-3529, [email protected]
History:
Beth Simmons, [email protected]
Membership: Thom Fisher, Libby Prueher, TC Wait, Eric Nelson, Beth Simmons
Memorial Funds: Bill Nesse, 970-330-7183, [email protected]
Newsletter Editor: Lisa Rukstales, [email protected]
Outreach:
Sue Hirschfeld, 720-565-9302, [email protected]
Program:
Emmett Evanoff, 303-444-2644, [email protected], Libby Prueher, Christine Turner
Publicity:
Emily Taylor, [email protected]
Science Fair:
Chuck Weisenberg, 303-238-8806, [email protected]
Webmaster:
John M. Ghist, 303-875-9671 [email protected] or [email protected]
** STOP! Do NOT recycle this until after the talk! Please help us with publicity by posting at least the front page of this Newsletter on a bulletin board. Thank you!
|
<urn:uuid:6a9f269f-cd27-47ca-892a-30188b9176bd>
|
CC-MAIN-2018-34
|
http://coloscisoc.org/wp-content/uploads/2014/01/Nov08CSSnews.pdf
|
2018-08-16T04:21:32Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210413.14/warc/CC-MAIN-20180816034902-20180816054902-00265.warc.gz
| 101,697,681
| 6,310
|
eng_Latn
|
eng_Latn
| 0.886197
|
eng_Latn
| 0.987275
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
574,
5345,
10062,
13944,
16833,
18525,
23242,
25015
] |
Colorado Scientific Society
The objective of the Society is to promote the knowledge and understanding of Earth science, and its application to human needs
Annual Student Night — Competition —
Featuring FOUR knock-out talks!! (See abstracts on pages 2 and 3.)
University of Wyoming, Laramie
vs.
Colorado School of Mines
Get off the sofa and support our Rocky Mtn. students! Join us!
Thursday, November 20, 2008 American Mountaineering Center 710 10th Street (NE corner 10th and Washington) Golden, Colorado Social half-hour – 6:30 p.m. Meeting time – 7:00 p.m.
Abstracts—2008 Student Night Finalists
Late Miocene through Pliocene evolution of the An gastaco basin (NW Argentina):
Implications for the tectono-climate evolution of the Eastern Cordillera in the late Cenozoic
Sharon Bywater (University of Wyoming), Master's candidate in Geology
The Angastaco basin is located in the Calchaquí valley in NW Argentina between the Eastern Cordil lera (EC) to the west, and Santa Barbara (SB) system to the east. Uplift of the eastern basin-bounding range, the Sierra de los Colorados of the SB, and development of an orographic effect, is postulated to have occurred between 3.4 and 2.4 Ma (Coutand et al., 2006). The Angastaco basin-fill consists of four formations: the Quebrada de los Colorados, the Angastaco, the Palo Pintado, and the San Felipe (Díaz & Malizzia, 1983). The Pliocene San Felipe Formation holds key infor mation concerning the tectono-climate evolution of this part of the Andes, including: timing of uplift of the eastern basin-bounding range as well as timing of development of an orographic barrier and subsequent onset of aridity. Lithofacies interpretations derived from measured stratigraphic sections for the upper ~1 km of the late Miocene Palo Pintado Formation and throughout the San Felipe Formation are consistent overall with previous studies: the Palo Pintado For mation is interpreted as fluvial to lacustrine deposits, whereas the Pliocene San Felipe Formation is inter preted as braided stream and alluvial fan deposits (Díaz & Malizzia, 1983; Coutand et al., 2006). Lithofacies associations suggest a transitional boundary between the two formations.
Preliminary U-Pb SIMS dating of zircons from an ash layer near the Palo Pintado-San Felipe transition confirms ca. 5 Ma as the transition age. Provenance data document a decrease of western (EC) sources up section and a final switch to eastern (SB) sources within the uppermost San Felipe Formation. These data constrain exhumation of the eastern basin-bounding range to upper San Felipe time (ca. 2–3 Ma), support ing the model of Coutand et al. (2006). Paleocurrent data show an axial NNE-flowing drainage during upper Palo Pintado deposition, an E-flowing drainage dur ing San Felipe deposition, and a SW-flowing drainage during uppermost San Felipe deposition. Stable isotope data ( 13 C and 18 O) from paleosol carbonates suggest a woodland or montane grassland environment (Cerling,
2
1992) during Palo Pintado deposition trending towards more arid conditions by the Palo Pintado-San Felipe transition. These data suggest arid conditions within the basin prior to exhumation of the eastern basinbounding range. The mismatch between timing of onset of aridity (ca. 5 Ma) and exhumation of the range previously thought to be responsible for the orographic effect (ca. 2–3 Ma; Coutand et al., 2006) suggests either that climatic variability is not controlled by local uplift of basin-bounding ranges, or that ranges farther east are responsible for the orographic effect.
A refined interpretation of the Medicine Bow oroge ny, southeastern Wyoming: Implications for regional tectonics and crustal growth
Daniel Jones (University of Wyoming),
Ph.D. candidate
New SHRIMP ages from the Big Creek gneiss, southern Sierra Madre, southeastern Wyoming, indicate a complex Paleoproterozoic magmatic-tectonic history. The analyzed rocks have been interpreted as part of the Paleoproterozoic Green Mountain arc. The accretion of this arc, together with syn- to post-collisional granitic rocks (e.g., Sierra Madre granite), has been referred to as the ca. 1.78–1.75 Medicine Bow orogeny.
The new SHRIMP ages consist of 161 points (9 samples) from a representative suite of (meta)igne ous rocks from the Big Creek gneiss. The oldest ages (~1.78 Ga) are from metagabbroic and granitic gneiss that are correlated with the Green Mountain Forma tion and related intrusions. The zircons contained no older, xenocrystic cores. The lack of significant spread in the arc-related ages suggests that the arc accreted shortly after crystallization of these rocks, perhaps by slab rollback related to a southward-dipping subduction zone. Two samples of augen gneiss and two samples of Fe-rich mafic rocks (one partially mingled with augen gneiss) yielded ages of ca. 1,767 Ma, corresponding to the massive phase of the Sierra Madre granite. This episode of bimodal magmatism may correspond to the breakoff of the subducted slab and represent a second phase of juvenile magmatic addition to the crust. Final ly, zircons from a paragneiss leucosome, interpreted as having crystallized from a syntectonic, in-situ anatectic melt, yielded an age of ca. 1,750–1,745 Ma, coeval with metamorphic zircon rims from other gneissic samples.
Abstracts—2008 Student Night Finalists (cont.)
This metamorphic and deformational event likely records a tectonic event to the south, possibly due to a southward jump in active subduction.
In summary, the Medicine Bow orogeny appar ently comprises three tectonic events: (1) accretion of the Green Mountain arc at ~1,780–1,775 Ma; (2) slab breakoff at ~1,763 Ma; and (3) inferred contraction from the south at ~1,750–1,740 Ma.
High-resolution geo-cellular modeling of Upper Morrow "A" Sands at Postle Field, Texas County, Oklahoma
Dawn Jobe (Colorado School of Mines), Reservoir Characterization Project (RCP)
Pennsylvanian-aged Morrow valley-fill sand stones are prolific producers of oil and gas in the mid-continent. Upper Morrowan reservoirs are par ticularly attractive because of their abundant reserves, good production history, and shallow depths; but are often poorly developed because of severe heterogene ity caused by rapid and extreme changes in facies and grain size. Understanding the reservoir heterogeneity has direct implications for interpretation of flow units and ultimately increased recovery and efficiency.
Postle Field, Texas County, Okla., produces from the Upper Morrow "A" sands and has over 300 million barrels of original oil in place. Today, only 40% of the OOIP has been produced. The small recovery is due to the difficulty of production caused by the extreme het erogeneity in the field. The goal for RCP's Phase XII study at Postle is to identify and characterize the reser voir architecture, which is highly complex and changes over very short lateral and vertical distances.
The study area is a 6.25-square-mile block within Pestle Field, over which a multi-component 3-D seis mic survey was shot in March of 2008. The study area includes 63 wells of which log data was available as well as 4 cored wells. Detailed core descriptions and facies determinations, as well as well-log correlations, were integrated with seismic interpretation to produce a new depositional model for the area.
A high-resolution geo-cellular model that incor porated cores, vertical proportion curves, and seismic attributes was then created. Integration of different scales of data into the facies modeling maintained the heterogeneity and yielded a more accurate distribution
3
of facies and reservoir properties. The model was then up-scaled and history matched for future use in geomechanical and fluid flow simulation.
Soil respiration following pulse precipitation events in a semiarid grassland
Tyler Benton 1,2 , Seth M. Munson 3,4 , William K. Lauen roth 3,4 , and Ingrid C. Burke 3,4
1Colorado School of Mines
2SGS-LTER Research Experience for Undergraduates, Colo rado State University (CSU), Fort Collins; 3 Dept. of Forest, Rangeland, and Watershed Stewardship, CSU, Fort Collins; 4Graduate Degree Program in Ecology, CSU, Fort Collins
Semiarid and arid ecosystems are pulse-driven systems. At the daily time scale, the nearly continuous dry soil is irregularly interrupted by brief wet periods. The duration of these wet periods depends on the size of the precipitation event. The precipitation regimes in semiarid and arid environments, and therefore the pulsing regimes, are dominated by small events (≤
|
10 mm).
|
The goal of our research was to determine how small precipitation events (2mm, 5mm, and 10mm) affected the dynamics of soil respiration and water loss in the shortgrass steppe. Because land-use change has resulted in a patchwork of large-scale disturbances in this region, we estimated respiration and water loss from sites that varied in time since cultivation distur bance (4 and 20 years after cultivation, and undisturbed shortgrass steppe).
Total carbon respired and duration of elevated soil respiration increased as event size increased in all sites. Total carbon loss ranged from 0.3 g C/m 2 (0.01% of carbon in ANPP) after a 2mm pulse in a field 20 years after cultivation to 3 g C/m 2 (6% of carbon in ANPP) after a 10mm pulse in undisturbed shortgrass steppe. Time since cultivation did not significantly affect the total carbon respired for 2mm pulses, but increased in importance as event size increased. The smallest events (2mm and 5mm) caused a respiration response that lasted longer than it took soils to lose water from the pulses, whereas for the largest event (10mm), respira tion returned to baseline before the added water had been depleted.
Our results suggest that water is the most limiting factor to soil respiration rates for the smallest events, but becomes less limiting for events above 5 mm. Small precipitation events have the potential for large short-term losses of carbon in the shortgrass steppe.
"Keg Night"—The History of CSS Student Night,
by Beth Simmons (with a few asides by the ed.)
The first "student (keg) night"—according to old CSS newsletters—was held on 29 October 1984, from 7 to 9 p.m. in the
Colorado School of Mines (CSM) Green Center.
"We've never attempted this type of meeting before, so come prepared to relax and enjoy mixing with the students, and to hear some good papers. The beer is free, but if you feel so inclined, bring along a chilled 6-pack of your favorite brew—any such donations are welcome."
Five papers were chosen from a field of twelve submissions from Colorado and Wyoming students. The winner was Ernest Duebendorfer for his talk, "Metamorphism, Deformation, and Tectonic Significance of the Cheyenne Belt, Medicine Bow Mountains, Wyoming." He was awarded a prize of $100.
The following year, the "student night" was held as a regular meeting at the CSM Green Center–Metals Hall. The news letter listed the rules, the selection committee, and the nominees:
"Student lectures will be judged for content and presentation. The winner and runner-up will receive prizes of $100 and $50, respectively. From the abstracts submitted, six were selected by a committee composed of Bob Pearson, Bill Scott, Ernie Anderson, Jim MacLachlan, Platt Bradbury, and Doug Nichols. Beer and soft drinks will be furnished by the Society." (Thus the KEG)
That year's winner was Linda Gaye Martin for her talk, "Preliminary Foraminiferal Biostratigraphy of the Smoky Hill Chalk Member of the Niobrara Shale (Upper Cretaceous) in West-Central Kansas." Al Merewether, Ken Pierce, and Dwight Schmidt secretly served as judges. Second place went to the future "Ms. Fire Science/Debris Flow expert," Sue "sound bite" Cannon.
It appears that these two marathon sessions wore out the CSS members and judges, for there is no evidence of another student night until eleven years later in October of 1996. The session included only three 15-minute talks, with winners receiving the traditional monetary prizes PLUS membership to the Society. Sharon Diehl took the top prize with her talk on, "Geochemical and Petrographic Evidence for Fluid Flow and Dissolution in Some Low-Angle Normal Faults, Utah and Nevada." The Tommyknocker (Charlie Sturdevant) and Wynkoop Breweries (John Hickenlooper) donated the refreshments. (The leftover brew found its way to a grateful Halloween party crowd!)
In 1997, the event was held in the Ben Parker Student Union ballroom at CSM. There were five 15-minute presentations, including another one by Aaron Kullman, the previous year's 3rd place finisher. Mike Kaplan won best presentation for his "Late Quaternary glacial history of the mid-outer Cumberland Sound, eastern Canadian Arctic." From whence came the beer? Golden City Brewery (Charlie and Janine Sturdavant). (And, once again the leftovers went to a deftly timed party.)
In 1998, CSS tried a new format, hosting "semi-final" presentations at various colleges in Colorado and Wyoming where cash prizes were awarded to each section's winners. The top place winners from each school then presented to the Society at the Sheraton in Lakewood, vying for additional cash awards of $125 for the winner, $75 for the runner-ups, and a one-year complimentary membership to the Society. The winner was David Winterbourne, "Geology, Alteration, and Mineralization of the Cerro San Pedro Gold-Silver Deposit, San
Luis Potosi, Mexico."
That was ten years ago. Since then, student night has become a tradition, with minor changes in the way papers are submitted and prizes awarded, but the students still come forth with their research! Join us for this year's "student night" (but no longer "KEG night").
(Also in the history notes, there is evidence that CSS once had paperweights. Does anyone have one for the archives? And we should save a speaker's mug, too.)
It may seem like a turkey of a story, but it really rocks!
By Matt Morgan
With November here and Thanksgiving fast ap proaching, I was trying to find a connection be tween geology and this traditional North American holiday. It dawned on me: Plymouth Rock! Al though we can challenge when and where the first Thanksgiving was actually held (St. Augustine, Fla., in 1565 or Plymouth Plantation, Mass., in 1621), it has become a traditional tale in American culture that the Pilgrims, seeking freedom from religious persecution, landed at Plymouth Rock in November of 1620 and shared a "Thanksgiving" meal. So what about the rock?
The "celebrated" Plymouth Rock (no one knows where the actual rock is located) lies within Pilgrim Memorial State Park in Massachusetts, where it is visited by 1 million visitors each year. It is a piece of the Dedham granodiorite (quartz + microcline + plagioclase + perthite + chlorite + epidote) that has been dated to 622 Ma. It is part of the Avalon Terrane that was accreted to the eastern margin of Laurentia between 425 and 370 Ma. Like the Pilgrim's journey across the Atlantic Ocean, the Avalon Terrane was rifted from Gond wana (~465 Ma) and made its own way across a proto-Atlantic Ocean before colliding with Lau rentia.
The piece of the Dedham granodiorite that eventually became the famous Plymouth Rock was plucked from its outcrop by glaciers approxi mately 20,000 years ago. It was transported some unknown distance until it ended up at the foot of Cole's Hill on the coast of Cape Cod.
In 1741, while plans were being made for constructing a wharf at the approximate location of the Pilgrims landing site, a 94-year-old Elder named Thomas Faunce reportedly identified the exact rock that his father told him the Pilgrims set foot upon. Regrettably, we now know the Pilgrims landed near present-day Provincetown, Mass., in November of 1620 located 30 miles east of Plymouth Rock. The location of the exact outcrop they set foot is unknown. However, the now famous Plymouth Rock is located only 650 feet away from the first Pilgrim settlement.
Over the years, many pieces of the Rock have been removed for souvenirs. Today, about 1/3 of the top half of the Rock remains exposed and estimates suggest that the original Rock weighed approximately 20,000 pounds but is now roughly half that size, measuring approxi mately 6 feet x 4 feet.
So when you are sitting down at Thanksgiv ing dinner, think of the Pilgrims and the Rock in a slightly different, more geological way…both took a long journey, across a great ocean, and met a new world on the other side.
Happy Thanksgiving!
Sources: About.com; Wikipedia.org
Nevins, Erin, and Krol, M.A., 2005, Multiple episodes of magmatism, deformation, and metamorphism in the Avalon Terrane of eastern Massachusetts, Geological Society of America Abstract with Programs.
It's Time to Pay Dues for 2009...
Membership dues for the coming year (2009) are now due. You will find a dues payment form in our next issue of the news letter, or you can download the form from the CSS website: www.coloscisoc.org/membership/dues.html. You will also see a reminder in the mail or e-mail this month. Dues payments have increased to $20 for regular members; $10 for correspond ing members (outside the Colorado Front Range area), and $5 for students. You may pay your dues by mailing a check to the CSS, or you can pay with a credit card using PayPal on the CSS website. If you are uncertain if you owe dues or of your member status, contact CSS Treasurer Don Sweetkind by phone at 303–236–1828 or by e-mail at [email protected].
As you pay your dues, please consider making an additional contribution to one of our Memorial Funds, which support our student research grants program, or the Endowment Fund, which we use to defray operating costs. Any contributions made in calendar year 2008 (checks dated before 1 January 2009), will be credited toward the 2008 tax year.
Please remember that your entire contribution goes towards generating interest for the grants and that your contribution is 100% tax deductible because the Society is a non-profit Section 501 (c)(3) organization. Through interest income generated by our Memorial Funds, we have awarded over $125,000 in research grant funding to more than 165 students. This year we also supported the participation of about a dozen students on our field trips through the Pillmore Fund.
Help us cultivate our scientists of the future by generously supporting the Colorado Scientific Society. Thank you.
Earth Science Meetings and Talks
Newsletter items must be received by the 25th of each month.
Colorado Scientific Society's regular meetings are held the 3rd Thursday of the month at the American Mountaineering
Center in Golden (unless otherwise advertised). Social time begins at 6:30 p.m. and talks start at 7:00 p.m.
For more information, contact Matt Morgan, at 303-866-2066, [email protected]
AIPG Every 3rd Tuesday, 11:30–1:30 p.m., University Club, 1673 Sherman St., Denver, make reservations with David Ab bott at 303-394-0321 or [email protected], $30 in advance, $35 at the door; Nov. 18, Michael Wireman, EPA, "Hydrogeo logic characterization of ground waters, mine pools and the Leadville mine drainage tunnel, Leadville, Colorado.
Café Scientifique Wynkoop Brewery, evening science talks at 6:30. Free, except for beer. http://www.cafescicolorado.org
CSM Microscopy short course, Dec. 15–19, 2008, 9 a.m.–5 p.m. Use of reflecting microsope, ID of 40 common ore miner als, study of ore mineral suites. $995. Taught by John Lufkin, 303-997-7365, [email protected]. Class limit of 10.
Colorado School of Mines, Van Tuyl Lectures Thursdays from 4–5 p.m. in Berthoud Hall room 108. Nov. 13—Vince Matthews, Colorado Geological Survey, "China's and India's Ravenous Appetite for Natural Resources and Its Impact on Colorado School of Mines." http://www.mines.edu/academic/geology
Colorado State University, Dept of Geosciences, Rm 320 Warner College of Natural Resources Bldg., Mondays, 4:00 pm. 970-491-5661. http://welcome.warnercnr.colostate.edu/geo-training/index.php
Denver Mining Club meets every Monday at the Littleton Country Buffet near Bowles and Wadsworth (8100 W. Crestline Ave., in the shopping center) 11:30–1:00. Purchase of lunch required. Nov. 10—No Meeting; Nov. 17—Greg Roush, Presi dent, and Heather Justus, Senior Project Geologist, Leonard Rice Engineers, Inc., "Geohydrology and Engineering Hydrology as They Relate to Mining in Colorado"; Nov. 24—Jim Burnell, Colorado Geological Survey, Annual Summary of Colorado Mining and Mineral Activity. http://www.denverminingclub.org
Denver Museum of Nature and Science Nov. 20, 6:30 p.m., Ken Carpenter, "The Life and Times of T. rex" Ricketson Au ditorium. $12 member, $15 non-member. http://www.dmns.org/main/en/General/Education/AdultProgram/Lectures
Denver Region Exploration Geologists' Society (DREGS) meets in the Mutual Consolidated Water Building, 12700 West 27th Avenue, Lakewood. Social 6:00-7:00 p.m. Presentation at 7:00 p.m. Meetings are normally scheduled for the first Mon day of each month. Nov. 3, Bill Bond and Paul Bartos, Esperanza Silver Corp., Geology and discovery of the Cerro Jumil Gold Skarn, Morelos, Mexico. For information contact Jim Piper, (303) 932-0137, or the website http://www.dregs.org
Denver Well Logging Society (DWLS) meets on the third Tuesday of each month, Sept. through May. Lunch and a technical talk at the Wynkoop Brewery begins at 11:30 a.m., 18th and Wynkoop Sts. in Denver. Call Sarah Voight at 720-946-1374 by prior Thursday for reservations. Web page: http://dwls.spwla.org Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Columbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837
Friends of Dinosaur Ridge http://www.dinoridge.org. Admission is free, but donations are welcome. 16831 W. Alameda Parkway. Talks at 7:00 p.m. Visitor Center (303) 697-3466 or contact Beth Simmons at [email protected] for info.
Rocky Mountain Association of Geologists (RMAG) Reception at 11:30, lunch at noon, talk at 12:30. Reservations by recording at 303-623-5396 until 10:30 a.m., prior Wed. Luncheon $30. Talk only (no res.)—$5. Location: Denver Marriott, 17th & California. http://www.rmag.org/events. Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Col umbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837
Rocky Mountain SEPM Reception at 11:30, lunch at noon, speaker at 12:30. Reservations: [email protected], before noon of preceding Friday. $20.00 lunch, $3 talk only. Wynkoop Brewing Company, 1634 18th St., Denver. http://www. rmssepm.org/NewFiles/lunch.html
USGS Geologic Division Colloquium Thursdays, 1:30, Foord Room, Building 20, Denver Federal Center. For more infor mation contact: Peter J. Modreski, USGS, Denver, tel. 303-202-4766, fax 303-202-4767, email [email protected]
Univ. of Colorado, Boulder, Geol. Sciences Colloquium Weds., 4:00 p.m., Rm. 380. Refreshments at 3:30 p.m. on the 3rd floor. Nov. 12—TBA; Nov. 19—Doug Yule, Univ. of Calif., Megaquakes of the Himalaya." http://www.colorado.edu/GeolSci
Colorado Scientific Society P.O. Box 150495 Lakewood, CO 80215-0495
http://www.coloscisoc.org
OFFICERS
President:
Matt Morgan, CGS, 303-866-2066 [email protected]
President-Elect: Don Sweetkind, USGS, 303-236-1828, [email protected]
Treasurer:
Jeremy McCreary 303-744-0907 [email protected]
Secretary:
Lisa Fisher, CSM, 303-478-9427 (c), [email protected]
Past President: Bill Nesse, UNC, 970-330-7183, [email protected]
COUNCILORS
2007-2010: Jeremy McCreary 303-744-0907 [email protected]
2007-2010: Tim McIntyre
2006-2009: Scott Minor, USGS, 303-236-0303, [email protected]
2008-2011: Cal Ruleman, USGS, [email protected]
2008-2011: Lee Shropshire, UNC, 970-352-8778, [email protected]
COMMITTEE CHAIRPERSONS
Best Paper Award: Matt Morgan, CGS, 303-866-2066, [email protected]
Database Manager: Erik Oerter, CGS, [email protected]
Field Trips:
Karl Kellogg, [email protected]
Graphics:
Karen Morgan, CGS, 303-866-3529, [email protected]
History:
Beth Simmons, [email protected]
Membership: Thom Fisher, Libby Prueher, TC Wait, Eric Nelson, Beth Simmons
Memorial Funds: Bill Nesse, 970-330-7183, [email protected]
Newsletter Editor: Lisa Rukstales, [email protected]
Outreach:
Sue Hirschfeld, 720-565-9302, [email protected]
Program:
Emmett Evanoff, 303-444-2644, [email protected], Libby Prueher, Christine Turner
Publicity:
Emily Taylor, [email protected]
Science Fair:
Chuck Weisenberg, 303-238-8806, [email protected]
Webmaster:
John M. Ghist, 303-875-9671 [email protected] or [email protected]
** STOP! Do NOT recycle this until after the talk! Please help us with publicity by posting at least the front page of this Newsletter on a bulletin board. Thank you!
| 8,614
|
inside_word
|
10
|
remove_one_sentence
|
<url>
http://coloscisoc.org/wp-content/uploads/2014/01/Nov08CSSnews.pdf
</url>
<text>
Colorado Scientific Society
The objective of the Society is to promote the knowledge and understanding of Earth science, and its application to human needs
Annual Student Night — Competition —
Featuring FOUR knock-out talks!! (See abstracts on pages 2 and 3.)
University of Wyoming, Laramie
vs.
Colorado School of Mines
Get off the sofa and support our Rocky Mtn. students! Join us!
Thursday, November 20, 2008 American Mountaineering Center 710 10th Street (NE corner 10th and Washington) Golden, Colorado Social half-hour – 6:30 p.m. Meeting time – 7:00 p.m.
Abstracts—2008 Student Night Finalists
Late Miocene through Pliocene evolution of the An gastaco basin (NW Argentina):
Implications for the tectono-climate evolution of the Eastern Cordillera in the late Cenozoic
Sharon Bywater (University of Wyoming), Master's candidate in Geology
The Angastaco basin is located in the Calchaquí valley in NW Argentina between the Eastern Cordil lera (EC) to the west, and Santa Barbara (SB) system to the east. Uplift of the eastern basin-bounding range, the Sierra de los Colorados of the SB, and development of an orographic effect, is postulated to have occurred between 3.4 and 2.4 Ma (Coutand et al., 2006). The Angastaco basin-fill consists of four formations: the Quebrada de los Colorados, the Angastaco, the Palo Pintado, and the San Felipe (Díaz & Malizzia, 1983). The Pliocene San Felipe Formation holds key infor mation concerning the tectono-climate evolution of this part of the Andes, including: timing of uplift of the eastern basin-bounding range as well as timing of development of an orographic barrier and subsequent onset of aridity. Lithofacies interpretations derived from measured stratigraphic sections for the upper ~1 km of the late Miocene Palo Pintado Formation and throughout the San Felipe Formation are consistent overall with previous studies: the Palo Pintado For mation is interpreted as fluvial to lacustrine deposits, whereas the Pliocene San Felipe Formation is inter preted as braided stream and alluvial fan deposits (Díaz & Malizzia, 1983; Coutand et al., 2006). Lithofacies associations suggest a transitional boundary between the two formations.
Preliminary U-Pb SIMS dating of zircons from an ash layer near the Palo Pintado-San Felipe transition confirms ca. 5 Ma as the transition age. Provenance data document a decrease of western (EC) sources up section and a final switch to eastern (SB) sources within the uppermost San Felipe Formation. These data constrain exhumation of the eastern basin-bounding range to upper San Felipe time (ca. 2–3 Ma), support ing the model of Coutand et al. (2006). Paleocurrent data show an axial NNE-flowing drainage during upper Palo Pintado deposition, an E-flowing drainage dur ing San Felipe deposition, and a SW-flowing drainage during uppermost San Felipe deposition. Stable isotope data ( 13 C and 18 O) from paleosol carbonates suggest a woodland or montane grassland environment (Cerling,
2
1992) during Palo Pintado deposition trending towards more arid conditions by the Palo Pintado-San Felipe transition. These data suggest arid conditions within the basin prior to exhumation of the eastern basinbounding range. The mismatch between timing of onset of aridity (ca. 5 Ma) and exhumation of the range previously thought to be responsible for the orographic effect (ca. 2–3 Ma; Coutand et al., 2006) suggests either that climatic variability is not controlled by local uplift of basin-bounding ranges, or that ranges farther east are responsible for the orographic effect.
A refined interpretation of the Medicine Bow oroge ny, southeastern Wyoming: Implications for regional tectonics and crustal growth
Daniel Jones (University of Wyoming),
Ph.D. candidate
New SHRIMP ages from the Big Creek gneiss, southern Sierra Madre, southeastern Wyoming, indicate a complex Paleoproterozoic magmatic-tectonic history. The analyzed rocks have been interpreted as part of the Paleoproterozoic Green Mountain arc. The accretion of this arc, together with syn- to post-collisional granitic rocks (e.g., Sierra Madre granite), has been referred to as the ca. 1.78–1.75 Medicine Bow orogeny.
The new SHRIMP ages consist of 161 points (9 samples) from a representative suite of (meta)igne ous rocks from the Big Creek gneiss. The oldest ages (~1.78 Ga) are from metagabbroic and granitic gneiss that are correlated with the Green Mountain Forma tion and related intrusions. The zircons contained no older, xenocrystic cores. The lack of significant spread in the arc-related ages suggests that the arc accreted shortly after crystallization of these rocks, perhaps by slab rollback related to a southward-dipping subduction zone. Two samples of augen gneiss and two samples of Fe-rich mafic rocks (one partially mingled with augen gneiss) yielded ages of ca. 1,767 Ma, corresponding to the massive phase of the Sierra Madre granite. This episode of bimodal magmatism may correspond to the breakoff of the subducted slab and represent a second phase of juvenile magmatic addition to the crust. Final ly, zircons from a paragneiss leucosome, interpreted as having crystallized from a syntectonic, in-situ anatectic melt, yielded an age of ca. 1,750–1,745 Ma, coeval with metamorphic zircon rims from other gneissic samples.
Abstracts—2008 Student Night Finalists (cont.)
This metamorphic and deformational event likely records a tectonic event to the south, possibly due to a southward jump in active subduction.
In summary, the Medicine Bow orogeny appar ently comprises three tectonic events: (1) accretion of the Green Mountain arc at ~1,780–1,775 Ma; (2) slab breakoff at ~1,763 Ma; and (3) inferred contraction from the south at ~1,750–1,740 Ma.
High-resolution geo-cellular modeling of Upper Morrow "A" Sands at Postle Field, Texas County, Oklahoma
Dawn Jobe (Colorado School of Mines), Reservoir Characterization Project (RCP)
Pennsylvanian-aged Morrow valley-fill sand stones are prolific producers of oil and gas in the mid-continent. Upper Morrowan reservoirs are par ticularly attractive because of their abundant reserves, good production history, and shallow depths; but are often poorly developed because of severe heterogene ity caused by rapid and extreme changes in facies and grain size. Understanding the reservoir heterogeneity has direct implications for interpretation of flow units and ultimately increased recovery and efficiency.
Postle Field, Texas County, Okla., produces from the Upper Morrow "A" sands and has over 300 million barrels of original oil in place. Today, only 40% of the OOIP has been produced. The small recovery is due to the difficulty of production caused by the extreme het erogeneity in the field. The goal for RCP's Phase XII study at Postle is to identify and characterize the reser voir architecture, which is highly complex and changes over very short lateral and vertical distances.
The study area is a 6.25-square-mile block within Pestle Field, over which a multi-component 3-D seis mic survey was shot in March of 2008. The study area includes 63 wells of which log data was available as well as 4 cored wells. Detailed core descriptions and facies determinations, as well as well-log correlations, were integrated with seismic interpretation to produce a new depositional model for the area.
A high-resolution geo-cellular model that incor porated cores, vertical proportion curves, and seismic attributes was then created. Integration of different scales of data into the facies modeling maintained the heterogeneity and yielded a more accurate distribution
3
of facies and reservoir properties. The model was then up-scaled and history matched for future use in geomechanical and fluid flow simulation.
Soil respiration following pulse precipitation events in a semiarid grassland
Tyler Benton 1,2 , Seth M. Munson 3,4 , William K. Lauen roth 3,4 , and Ingrid C. Burke 3,4
1Colorado School of Mines
2SGS-LTER Research Experience for Undergraduates, Colo rado State University (CSU), Fort Collins; 3 Dept. of Forest, Rangeland, and Watershed Stewardship, CSU, Fort Collins; 4Graduate Degree Program in Ecology, CSU, Fort Collins
Semiarid and arid ecosystems are pulse-driven systems. At the daily time scale, the nearly continuous dry soil is irregularly interrupted by brief wet periods. The duration of these wet periods depends on the size of the precipitation event. The precipitation regimes in semiarid and arid environments, and therefore the pulsing regimes, are dominated by small events (≤ <cursor_is_here> The goal of our research was to determine how small precipitation events (2mm, 5mm, and 10mm) affected the dynamics of soil respiration and water loss in the shortgrass steppe. Because land-use change has resulted in a patchwork of large-scale disturbances in this region, we estimated respiration and water loss from sites that varied in time since cultivation distur bance (4 and 20 years after cultivation, and undisturbed shortgrass steppe).
Total carbon respired and duration of elevated soil respiration increased as event size increased in all sites. Total carbon loss ranged from 0.3 g C/m 2 (0.01% of carbon in ANPP) after a 2mm pulse in a field 20 years after cultivation to 3 g C/m 2 (6% of carbon in ANPP) after a 10mm pulse in undisturbed shortgrass steppe. Time since cultivation did not significantly affect the total carbon respired for 2mm pulses, but increased in importance as event size increased. The smallest events (2mm and 5mm) caused a respiration response that lasted longer than it took soils to lose water from the pulses, whereas for the largest event (10mm), respira tion returned to baseline before the added water had been depleted.
Our results suggest that water is the most limiting factor to soil respiration rates for the smallest events, but becomes less limiting for events above 5 mm. Small precipitation events have the potential for large short-term losses of carbon in the shortgrass steppe.
"Keg Night"—The History of CSS Student Night,
by Beth Simmons (with a few asides by the ed.)
The first "student (keg) night"—according to old CSS newsletters—was held on 29 October 1984, from 7 to 9 p.m. in the
Colorado School of Mines (CSM) Green Center.
"We've never attempted this type of meeting before, so come prepared to relax and enjoy mixing with the students, and to hear some good papers. The beer is free, but if you feel so inclined, bring along a chilled 6-pack of your favorite brew—any such donations are welcome."
Five papers were chosen from a field of twelve submissions from Colorado and Wyoming students. The winner was Ernest Duebendorfer for his talk, "Metamorphism, Deformation, and Tectonic Significance of the Cheyenne Belt, Medicine Bow Mountains, Wyoming." He was awarded a prize of $100.
The following year, the "student night" was held as a regular meeting at the CSM Green Center–Metals Hall. The news letter listed the rules, the selection committee, and the nominees:
"Student lectures will be judged for content and presentation. The winner and runner-up will receive prizes of $100 and $50, respectively. From the abstracts submitted, six were selected by a committee composed of Bob Pearson, Bill Scott, Ernie Anderson, Jim MacLachlan, Platt Bradbury, and Doug Nichols. Beer and soft drinks will be furnished by the Society." (Thus the KEG)
That year's winner was Linda Gaye Martin for her talk, "Preliminary Foraminiferal Biostratigraphy of the Smoky Hill Chalk Member of the Niobrara Shale (Upper Cretaceous) in West-Central Kansas." Al Merewether, Ken Pierce, and Dwight Schmidt secretly served as judges. Second place went to the future "Ms. Fire Science/Debris Flow expert," Sue "sound bite" Cannon.
It appears that these two marathon sessions wore out the CSS members and judges, for there is no evidence of another student night until eleven years later in October of 1996. The session included only three 15-minute talks, with winners receiving the traditional monetary prizes PLUS membership to the Society. Sharon Diehl took the top prize with her talk on, "Geochemical and Petrographic Evidence for Fluid Flow and Dissolution in Some Low-Angle Normal Faults, Utah and Nevada." The Tommyknocker (Charlie Sturdevant) and Wynkoop Breweries (John Hickenlooper) donated the refreshments. (The leftover brew found its way to a grateful Halloween party crowd!)
In 1997, the event was held in the Ben Parker Student Union ballroom at CSM. There were five 15-minute presentations, including another one by Aaron Kullman, the previous year's 3rd place finisher. Mike Kaplan won best presentation for his "Late Quaternary glacial history of the mid-outer Cumberland Sound, eastern Canadian Arctic." From whence came the beer? Golden City Brewery (Charlie and Janine Sturdavant). (And, once again the leftovers went to a deftly timed party.)
In 1998, CSS tried a new format, hosting "semi-final" presentations at various colleges in Colorado and Wyoming where cash prizes were awarded to each section's winners. The top place winners from each school then presented to the Society at the Sheraton in Lakewood, vying for additional cash awards of $125 for the winner, $75 for the runner-ups, and a one-year complimentary membership to the Society. The winner was David Winterbourne, "Geology, Alteration, and Mineralization of the Cerro San Pedro Gold-Silver Deposit, San
Luis Potosi, Mexico."
That was ten years ago. Since then, student night has become a tradition, with minor changes in the way papers are submitted and prizes awarded, but the students still come forth with their research! Join us for this year's "student night" (but no longer "KEG night").
(Also in the history notes, there is evidence that CSS once had paperweights. Does anyone have one for the archives? And we should save a speaker's mug, too.)
It may seem like a turkey of a story, but it really rocks!
By Matt Morgan
With November here and Thanksgiving fast ap proaching, I was trying to find a connection be tween geology and this traditional North American holiday. It dawned on me: Plymouth Rock! Al though we can challenge when and where the first Thanksgiving was actually held (St. Augustine, Fla., in 1565 or Plymouth Plantation, Mass., in 1621), it has become a traditional tale in American culture that the Pilgrims, seeking freedom from religious persecution, landed at Plymouth Rock in November of 1620 and shared a "Thanksgiving" meal. So what about the rock?
The "celebrated" Plymouth Rock (no one knows where the actual rock is located) lies within Pilgrim Memorial State Park in Massachusetts, where it is visited by 1 million visitors each year. It is a piece of the Dedham granodiorite (quartz + microcline + plagioclase + perthite + chlorite + epidote) that has been dated to 622 Ma. It is part of the Avalon Terrane that was accreted to the eastern margin of Laurentia between 425 and 370 Ma. Like the Pilgrim's journey across the Atlantic Ocean, the Avalon Terrane was rifted from Gond wana (~465 Ma) and made its own way across a proto-Atlantic Ocean before colliding with Lau rentia.
The piece of the Dedham granodiorite that eventually became the famous Plymouth Rock was plucked from its outcrop by glaciers approxi mately 20,000 years ago. It was transported some unknown distance until it ended up at the foot of Cole's Hill on the coast of Cape Cod.
In 1741, while plans were being made for constructing a wharf at the approximate location of the Pilgrims landing site, a 94-year-old Elder named Thomas Faunce reportedly identified the exact rock that his father told him the Pilgrims set foot upon. Regrettably, we now know the Pilgrims landed near present-day Provincetown, Mass., in November of 1620 located 30 miles east of Plymouth Rock. The location of the exact outcrop they set foot is unknown. However, the now famous Plymouth Rock is located only 650 feet away from the first Pilgrim settlement.
Over the years, many pieces of the Rock have been removed for souvenirs. Today, about 1/3 of the top half of the Rock remains exposed and estimates suggest that the original Rock weighed approximately 20,000 pounds but is now roughly half that size, measuring approxi mately 6 feet x 4 feet.
So when you are sitting down at Thanksgiv ing dinner, think of the Pilgrims and the Rock in a slightly different, more geological way…both took a long journey, across a great ocean, and met a new world on the other side.
Happy Thanksgiving!
Sources: About.com; Wikipedia.org
Nevins, Erin, and Krol, M.A., 2005, Multiple episodes of magmatism, deformation, and metamorphism in the Avalon Terrane of eastern Massachusetts, Geological Society of America Abstract with Programs.
It's Time to Pay Dues for 2009...
Membership dues for the coming year (2009) are now due. You will find a dues payment form in our next issue of the news letter, or you can download the form from the CSS website: www.coloscisoc.org/membership/dues.html. You will also see a reminder in the mail or e-mail this month. Dues payments have increased to $20 for regular members; $10 for correspond ing members (outside the Colorado Front Range area), and $5 for students. You may pay your dues by mailing a check to the CSS, or you can pay with a credit card using PayPal on the CSS website. If you are uncertain if you owe dues or of your member status, contact CSS Treasurer Don Sweetkind by phone at 303–236–1828 or by e-mail at [email protected].
As you pay your dues, please consider making an additional contribution to one of our Memorial Funds, which support our student research grants program, or the Endowment Fund, which we use to defray operating costs. Any contributions made in calendar year 2008 (checks dated before 1 January 2009), will be credited toward the 2008 tax year.
Please remember that your entire contribution goes towards generating interest for the grants and that your contribution is 100% tax deductible because the Society is a non-profit Section 501 (c)(3) organization. Through interest income generated by our Memorial Funds, we have awarded over $125,000 in research grant funding to more than 165 students. This year we also supported the participation of about a dozen students on our field trips through the Pillmore Fund.
Help us cultivate our scientists of the future by generously supporting the Colorado Scientific Society. Thank you.
Earth Science Meetings and Talks
Newsletter items must be received by the 25th of each month.
Colorado Scientific Society's regular meetings are held the 3rd Thursday of the month at the American Mountaineering
Center in Golden (unless otherwise advertised). Social time begins at 6:30 p.m. and talks start at 7:00 p.m.
For more information, contact Matt Morgan, at 303-866-2066, [email protected]
AIPG Every 3rd Tuesday, 11:30–1:30 p.m., University Club, 1673 Sherman St., Denver, make reservations with David Ab bott at 303-394-0321 or [email protected], $30 in advance, $35 at the door; Nov. 18, Michael Wireman, EPA, "Hydrogeo logic characterization of ground waters, mine pools and the Leadville mine drainage tunnel, Leadville, Colorado.
Café Scientifique Wynkoop Brewery, evening science talks at 6:30. Free, except for beer. http://www.cafescicolorado.org
CSM Microscopy short course, Dec. 15–19, 2008, 9 a.m.–5 p.m. Use of reflecting microsope, ID of 40 common ore miner als, study of ore mineral suites. $995. Taught by John Lufkin, 303-997-7365, [email protected]. Class limit of 10.
Colorado School of Mines, Van Tuyl Lectures Thursdays from 4–5 p.m. in Berthoud Hall room 108. Nov. 13—Vince Matthews, Colorado Geological Survey, "China's and India's Ravenous Appetite for Natural Resources and Its Impact on Colorado School of Mines." http://www.mines.edu/academic/geology
Colorado State University, Dept of Geosciences, Rm 320 Warner College of Natural Resources Bldg., Mondays, 4:00 pm. 970-491-5661. http://welcome.warnercnr.colostate.edu/geo-training/index.php
Denver Mining Club meets every Monday at the Littleton Country Buffet near Bowles and Wadsworth (8100 W. Crestline Ave., in the shopping center) 11:30–1:00. Purchase of lunch required. Nov. 10—No Meeting; Nov. 17—Greg Roush, Presi dent, and Heather Justus, Senior Project Geologist, Leonard Rice Engineers, Inc., "Geohydrology and Engineering Hydrology as They Relate to Mining in Colorado"; Nov. 24—Jim Burnell, Colorado Geological Survey, Annual Summary of Colorado Mining and Mineral Activity. http://www.denverminingclub.org
Denver Museum of Nature and Science Nov. 20, 6:30 p.m., Ken Carpenter, "The Life and Times of T. rex" Ricketson Au ditorium. $12 member, $15 non-member. http://www.dmns.org/main/en/General/Education/AdultProgram/Lectures
Denver Region Exploration Geologists' Society (DREGS) meets in the Mutual Consolidated Water Building, 12700 West 27th Avenue, Lakewood. Social 6:00-7:00 p.m. Presentation at 7:00 p.m. Meetings are normally scheduled for the first Mon day of each month. Nov. 3, Bill Bond and Paul Bartos, Esperanza Silver Corp., Geology and discovery of the Cerro Jumil Gold Skarn, Morelos, Mexico. For information contact Jim Piper, (303) 932-0137, or the website http://www.dregs.org
Denver Well Logging Society (DWLS) meets on the third Tuesday of each month, Sept. through May. Lunch and a technical talk at the Wynkoop Brewery begins at 11:30 a.m., 18th and Wynkoop Sts. in Denver. Call Sarah Voight at 720-946-1374 by prior Thursday for reservations. Web page: http://dwls.spwla.org Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Columbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837
Friends of Dinosaur Ridge http://www.dinoridge.org. Admission is free, but donations are welcome. 16831 W. Alameda Parkway. Talks at 7:00 p.m. Visitor Center (303) 697-3466 or contact Beth Simmons at [email protected] for info.
Rocky Mountain Association of Geologists (RMAG) Reception at 11:30, lunch at noon, talk at 12:30. Reservations by recording at 303-623-5396 until 10:30 a.m., prior Wed. Luncheon $30. Talk only (no res.)—$5. Location: Denver Marriott, 17th & California. http://www.rmag.org/events. Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Col umbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837
Rocky Mountain SEPM Reception at 11:30, lunch at noon, speaker at 12:30. Reservations: [email protected], before noon of preceding Friday. $20.00 lunch, $3 talk only. Wynkoop Brewing Company, 1634 18th St., Denver. http://www. rmssepm.org/NewFiles/lunch.html
USGS Geologic Division Colloquium Thursdays, 1:30, Foord Room, Building 20, Denver Federal Center. For more infor mation contact: Peter J. Modreski, USGS, Denver, tel. 303-202-4766, fax 303-202-4767, email [email protected]
Univ. of Colorado, Boulder, Geol. Sciences Colloquium Weds., 4:00 p.m., Rm. 380. Refreshments at 3:30 p.m. on the 3rd floor. Nov. 12—TBA; Nov. 19—Doug Yule, Univ. of Calif., Megaquakes of the Himalaya." http://www.colorado.edu/GeolSci
Colorado Scientific Society P.O. Box 150495 Lakewood, CO 80215-0495
http://www.coloscisoc.org
OFFICERS
President:
Matt Morgan, CGS, 303-866-2066 [email protected]
President-Elect: Don Sweetkind, USGS, 303-236-1828, [email protected]
Treasurer:
Jeremy McCreary 303-744-0907 [email protected]
Secretary:
Lisa Fisher, CSM, 303-478-9427 (c), [email protected]
Past President: Bill Nesse, UNC, 970-330-7183, [email protected]
COUNCILORS
2007-2010: Jeremy McCreary 303-744-0907 [email protected]
2007-2010: Tim McIntyre
2006-2009: Scott Minor, USGS, 303-236-0303, [email protected]
2008-2011: Cal Ruleman, USGS, [email protected]
2008-2011: Lee Shropshire, UNC, 970-352-8778, [email protected]
COMMITTEE CHAIRPERSONS
Best Paper Award: Matt Morgan, CGS, 303-866-2066, [email protected]
Database Manager: Erik Oerter, CGS, [email protected]
Field Trips:
Karl Kellogg, [email protected]
Graphics:
Karen Morgan, CGS, 303-866-3529, [email protected]
History:
Beth Simmons, [email protected]
Membership: Thom Fisher, Libby Prueher, TC Wait, Eric Nelson, Beth Simmons
Memorial Funds: Bill Nesse, 970-330-7183, [email protected]
Newsletter Editor: Lisa Rukstales, [email protected]
Outreach:
Sue Hirschfeld, 720-565-9302, [email protected]
Program:
Emmett Evanoff, 303-444-2644, [email protected], Libby Prueher, Christine Turner
Publicity:
Emily Taylor, [email protected]
Science Fair:
Chuck Weisenberg, 303-238-8806, [email protected]
Webmaster:
John M. Ghist, 303-875-9671 [email protected] or [email protected]
** STOP! Do NOT recycle this until after the talk! Please help us with publicity by posting at least the front page of this Newsletter on a bulletin board. Thank you!
</text>
|
[
{
"content": "<url>\nhttp://coloscisoc.org/wp-content/uploads/2014/01/Nov08CSSnews.pdf\n</url>\n<text>\nColorado Scientific Society\n\nThe objective of the Society is to promote the knowledge and understanding of Earth science, and its application to human needs\n\nAnnual Student Night — Competition —\n\nFeaturing FOUR knock-out talks!! (See abstracts on pages 2 and 3.)\n\nUniversity of Wyoming, Laramie\n\nvs.\n\nColorado School of Mines\n\nGet off the sofa and support our Rocky Mtn. students! Join us!\n\nThursday, November 20, 2008 American Mountaineering Center 710 10th Street (NE corner 10th and Washington) Golden, Colorado Social half-hour – 6:30 p.m. Meeting time – 7:00 p.m.\n\nAbstracts—2008 Student Night Finalists\n\nLate Miocene through Pliocene evolution of the An gastaco basin (NW Argentina):\n\nImplications for the tectono-climate evolution of the Eastern Cordillera in the late Cenozoic\n\nSharon Bywater (University of Wyoming), Master's candidate in Geology\n\nThe Angastaco basin is located in the Calchaquí valley in NW Argentina between the Eastern Cordil lera (EC) to the west, and Santa Barbara (SB) system to the east. Uplift of the eastern basin-bounding range, the Sierra de los Colorados of the SB, and development of an orographic effect, is postulated to have occurred between 3.4 and 2.4 Ma (Coutand et al., 2006). The Angastaco basin-fill consists of four formations: the Quebrada de los Colorados, the Angastaco, the Palo Pintado, and the San Felipe (Díaz & Malizzia, 1983). The Pliocene San Felipe Formation holds key infor mation concerning the tectono-climate evolution of this part of the Andes, including: timing of uplift of the eastern basin-bounding range as well as timing of development of an orographic barrier and subsequent onset of aridity. Lithofacies interpretations derived from measured stratigraphic sections for the upper ~1 km of the late Miocene Palo Pintado Formation and throughout the San Felipe Formation are consistent overall with previous studies: the Palo Pintado For mation is interpreted as fluvial to lacustrine deposits, whereas the Pliocene San Felipe Formation is inter preted as braided stream and alluvial fan deposits (Díaz & Malizzia, 1983; Coutand et al., 2006). Lithofacies associations suggest a transitional boundary between the two formations.\n\nPreliminary U-Pb SIMS dating of zircons from an ash layer near the Palo Pintado-San Felipe transition confirms ca. 5 Ma as the transition age. Provenance data document a decrease of western (EC) sources up section and a final switch to eastern (SB) sources within the uppermost San Felipe Formation. These data constrain exhumation of the eastern basin-bounding range to upper San Felipe time (ca. 2–3 Ma), support ing the model of Coutand et al. (2006). Paleocurrent data show an axial NNE-flowing drainage during upper Palo Pintado deposition, an E-flowing drainage dur ing San Felipe deposition, and a SW-flowing drainage during uppermost San Felipe deposition. Stable isotope data ( 13 C and 18 O) from paleosol carbonates suggest a woodland or montane grassland environment (Cerling,\n\n2\n\n1992) during Palo Pintado deposition trending towards more arid conditions by the Palo Pintado-San Felipe transition. These data suggest arid conditions within the basin prior to exhumation of the eastern basinbounding range. The mismatch between timing of onset of aridity (ca. 5 Ma) and exhumation of the range previously thought to be responsible for the orographic effect (ca. 2–3 Ma; Coutand et al., 2006) suggests either that climatic variability is not controlled by local uplift of basin-bounding ranges, or that ranges farther east are responsible for the orographic effect.\n\nA refined interpretation of the Medicine Bow oroge ny, southeastern Wyoming: Implications for regional tectonics and crustal growth\n\nDaniel Jones (University of Wyoming),\n\nPh.D. candidate\n\nNew SHRIMP ages from the Big Creek gneiss, southern Sierra Madre, southeastern Wyoming, indicate a complex Paleoproterozoic magmatic-tectonic history. The analyzed rocks have been interpreted as part of the Paleoproterozoic Green Mountain arc. The accretion of this arc, together with syn- to post-collisional granitic rocks (e.g., Sierra Madre granite), has been referred to as the ca. 1.78–1.75 Medicine Bow orogeny.\n\nThe new SHRIMP ages consist of 161 points (9 samples) from a representative suite of (meta)igne ous rocks from the Big Creek gneiss. The oldest ages (~1.78 Ga) are from metagabbroic and granitic gneiss that are correlated with the Green Mountain Forma tion and related intrusions. The zircons contained no older, xenocrystic cores. The lack of significant spread in the arc-related ages suggests that the arc accreted shortly after crystallization of these rocks, perhaps by slab rollback related to a southward-dipping subduction zone. Two samples of augen gneiss and two samples of Fe-rich mafic rocks (one partially mingled with augen gneiss) yielded ages of ca. 1,767 Ma, corresponding to the massive phase of the Sierra Madre granite. This episode of bimodal magmatism may correspond to the breakoff of the subducted slab and represent a second phase of juvenile magmatic addition to the crust. Final ly, zircons from a paragneiss leucosome, interpreted as having crystallized from a syntectonic, in-situ anatectic melt, yielded an age of ca. 1,750–1,745 Ma, coeval with metamorphic zircon rims from other gneissic samples.\n\nAbstracts—2008 Student Night Finalists (cont.)\n\nThis metamorphic and deformational event likely records a tectonic event to the south, possibly due to a southward jump in active subduction.\n\nIn summary, the Medicine Bow orogeny appar ently comprises three tectonic events: (1) accretion of the Green Mountain arc at ~1,780–1,775 Ma; (2) slab breakoff at ~1,763 Ma; and (3) inferred contraction from the south at ~1,750–1,740 Ma.\n\nHigh-resolution geo-cellular modeling of Upper Morrow \"A\" Sands at Postle Field, Texas County, Oklahoma\n\nDawn Jobe (Colorado School of Mines), Reservoir Characterization Project (RCP)\n\nPennsylvanian-aged Morrow valley-fill sand stones are prolific producers of oil and gas in the mid-continent. Upper Morrowan reservoirs are par ticularly attractive because of their abundant reserves, good production history, and shallow depths; but are often poorly developed because of severe heterogene ity caused by rapid and extreme changes in facies and grain size. Understanding the reservoir heterogeneity has direct implications for interpretation of flow units and ultimately increased recovery and efficiency.\n\nPostle Field, Texas County, Okla., produces from the Upper Morrow \"A\" sands and has over 300 million barrels of original oil in place. Today, only 40% of the OOIP has been produced. The small recovery is due to the difficulty of production caused by the extreme het erogeneity in the field. The goal for RCP's Phase XII study at Postle is to identify and characterize the reser voir architecture, which is highly complex and changes over very short lateral and vertical distances.\n\nThe study area is a 6.25-square-mile block within Pestle Field, over which a multi-component 3-D seis mic survey was shot in March of 2008. The study area includes 63 wells of which log data was available as well as 4 cored wells. Detailed core descriptions and facies determinations, as well as well-log correlations, were integrated with seismic interpretation to produce a new depositional model for the area.\n\nA high-resolution geo-cellular model that incor porated cores, vertical proportion curves, and seismic attributes was then created. Integration of different scales of data into the facies modeling maintained the heterogeneity and yielded a more accurate distribution\n\n3\n\nof facies and reservoir properties. The model was then up-scaled and history matched for future use in geomechanical and fluid flow simulation.\n\nSoil respiration following pulse precipitation events in a semiarid grassland\n\nTyler Benton 1,2 , Seth M. Munson 3,4 , William K. Lauen roth 3,4 , and Ingrid C. Burke 3,4\n\n1Colorado School of Mines\n\n2SGS-LTER Research Experience for Undergraduates, Colo rado State University (CSU), Fort Collins; 3 Dept. of Forest, Rangeland, and Watershed Stewardship, CSU, Fort Collins; 4Graduate Degree Program in Ecology, CSU, Fort Collins\n\nSemiarid and arid ecosystems are pulse-driven systems. At the daily time scale, the nearly continuous dry soil is irregularly interrupted by brief wet periods. The duration of these wet periods depends on the size of the precipitation event. The precipitation regimes in semiarid and arid environments, and therefore the pulsing regimes, are dominated by small events (≤ <cursor_is_here> The goal of our research was to determine how small precipitation events (2mm, 5mm, and 10mm) affected the dynamics of soil respiration and water loss in the shortgrass steppe. Because land-use change has resulted in a patchwork of large-scale disturbances in this region, we estimated respiration and water loss from sites that varied in time since cultivation distur bance (4 and 20 years after cultivation, and undisturbed shortgrass steppe).\n\nTotal carbon respired and duration of elevated soil respiration increased as event size increased in all sites. Total carbon loss ranged from 0.3 g C/m 2 (0.01% of carbon in ANPP) after a 2mm pulse in a field 20 years after cultivation to 3 g C/m 2 (6% of carbon in ANPP) after a 10mm pulse in undisturbed shortgrass steppe. Time since cultivation did not significantly affect the total carbon respired for 2mm pulses, but increased in importance as event size increased. The smallest events (2mm and 5mm) caused a respiration response that lasted longer than it took soils to lose water from the pulses, whereas for the largest event (10mm), respira tion returned to baseline before the added water had been depleted.\n\nOur results suggest that water is the most limiting factor to soil respiration rates for the smallest events, but becomes less limiting for events above 5 mm. Small precipitation events have the potential for large short-term losses of carbon in the shortgrass steppe.\n\n\"Keg Night\"—The History of CSS Student Night,\n\nby Beth Simmons (with a few asides by the ed.)\n\nThe first \"student (keg) night\"—according to old CSS newsletters—was held on 29 October 1984, from 7 to 9 p.m. in the\n\nColorado School of Mines (CSM) Green Center.\n\n\"We've never attempted this type of meeting before, so come prepared to relax and enjoy mixing with the students, and to hear some good papers. The beer is free, but if you feel so inclined, bring along a chilled 6-pack of your favorite brew—any such donations are welcome.\"\n\nFive papers were chosen from a field of twelve submissions from Colorado and Wyoming students. The winner was Ernest Duebendorfer for his talk, \"Metamorphism, Deformation, and Tectonic Significance of the Cheyenne Belt, Medicine Bow Mountains, Wyoming.\" He was awarded a prize of $100.\n\nThe following year, the \"student night\" was held as a regular meeting at the CSM Green Center–Metals Hall. The news letter listed the rules, the selection committee, and the nominees:\n\n\"Student lectures will be judged for content and presentation. The winner and runner-up will receive prizes of $100 and $50, respectively. From the abstracts submitted, six were selected by a committee composed of Bob Pearson, Bill Scott, Ernie Anderson, Jim MacLachlan, Platt Bradbury, and Doug Nichols. Beer and soft drinks will be furnished by the Society.\" (Thus the KEG)\n\nThat year's winner was Linda Gaye Martin for her talk, \"Preliminary Foraminiferal Biostratigraphy of the Smoky Hill Chalk Member of the Niobrara Shale (Upper Cretaceous) in West-Central Kansas.\" Al Merewether, Ken Pierce, and Dwight Schmidt secretly served as judges. Second place went to the future \"Ms. Fire Science/Debris Flow expert,\" Sue \"sound bite\" Cannon.\n\nIt appears that these two marathon sessions wore out the CSS members and judges, for there is no evidence of another student night until eleven years later in October of 1996. The session included only three 15-minute talks, with winners receiving the traditional monetary prizes PLUS membership to the Society. Sharon Diehl took the top prize with her talk on, \"Geochemical and Petrographic Evidence for Fluid Flow and Dissolution in Some Low-Angle Normal Faults, Utah and Nevada.\" The Tommyknocker (Charlie Sturdevant) and Wynkoop Breweries (John Hickenlooper) donated the refreshments. (The leftover brew found its way to a grateful Halloween party crowd!)\n\nIn 1997, the event was held in the Ben Parker Student Union ballroom at CSM. There were five 15-minute presentations, including another one by Aaron Kullman, the previous year's 3rd place finisher. Mike Kaplan won best presentation for his \"Late Quaternary glacial history of the mid-outer Cumberland Sound, eastern Canadian Arctic.\" From whence came the beer? Golden City Brewery (Charlie and Janine Sturdavant). (And, once again the leftovers went to a deftly timed party.)\n\nIn 1998, CSS tried a new format, hosting \"semi-final\" presentations at various colleges in Colorado and Wyoming where cash prizes were awarded to each section's winners. The top place winners from each school then presented to the Society at the Sheraton in Lakewood, vying for additional cash awards of $125 for the winner, $75 for the runner-ups, and a one-year complimentary membership to the Society. The winner was David Winterbourne, \"Geology, Alteration, and Mineralization of the Cerro San Pedro Gold-Silver Deposit, San\n\nLuis Potosi, Mexico.\"\n\nThat was ten years ago. Since then, student night has become a tradition, with minor changes in the way papers are submitted and prizes awarded, but the students still come forth with their research! Join us for this year's \"student night\" (but no longer \"KEG night\").\n\n(Also in the history notes, there is evidence that CSS once had paperweights. Does anyone have one for the archives? And we should save a speaker's mug, too.)\n\nIt may seem like a turkey of a story, but it really rocks!\n\nBy Matt Morgan\n\nWith November here and Thanksgiving fast ap proaching, I was trying to find a connection be tween geology and this traditional North American holiday. It dawned on me: Plymouth Rock! Al though we can challenge when and where the first Thanksgiving was actually held (St. Augustine, Fla., in 1565 or Plymouth Plantation, Mass., in 1621), it has become a traditional tale in American culture that the Pilgrims, seeking freedom from religious persecution, landed at Plymouth Rock in November of 1620 and shared a \"Thanksgiving\" meal. So what about the rock?\n\nThe \"celebrated\" Plymouth Rock (no one knows where the actual rock is located) lies within Pilgrim Memorial State Park in Massachusetts, where it is visited by 1 million visitors each year. It is a piece of the Dedham granodiorite (quartz + microcline + plagioclase + perthite + chlorite + epidote) that has been dated to 622 Ma. It is part of the Avalon Terrane that was accreted to the eastern margin of Laurentia between 425 and 370 Ma. Like the Pilgrim's journey across the Atlantic Ocean, the Avalon Terrane was rifted from Gond wana (~465 Ma) and made its own way across a proto-Atlantic Ocean before colliding with Lau rentia.\n\nThe piece of the Dedham granodiorite that eventually became the famous Plymouth Rock was plucked from its outcrop by glaciers approxi mately 20,000 years ago. It was transported some unknown distance until it ended up at the foot of Cole's Hill on the coast of Cape Cod.\n\nIn 1741, while plans were being made for constructing a wharf at the approximate location of the Pilgrims landing site, a 94-year-old Elder named Thomas Faunce reportedly identified the exact rock that his father told him the Pilgrims set foot upon. Regrettably, we now know the Pilgrims landed near present-day Provincetown, Mass., in November of 1620 located 30 miles east of Plymouth Rock. The location of the exact outcrop they set foot is unknown. However, the now famous Plymouth Rock is located only 650 feet away from the first Pilgrim settlement.\n\nOver the years, many pieces of the Rock have been removed for souvenirs. Today, about 1/3 of the top half of the Rock remains exposed and estimates suggest that the original Rock weighed approximately 20,000 pounds but is now roughly half that size, measuring approxi mately 6 feet x 4 feet.\n\nSo when you are sitting down at Thanksgiv ing dinner, think of the Pilgrims and the Rock in a slightly different, more geological way…both took a long journey, across a great ocean, and met a new world on the other side.\n\nHappy Thanksgiving!\n\nSources: About.com; Wikipedia.org\n\nNevins, Erin, and Krol, M.A., 2005, Multiple episodes of magmatism, deformation, and metamorphism in the Avalon Terrane of eastern Massachusetts, Geological Society of America Abstract with Programs.\n\nIt's Time to Pay Dues for 2009...\n\nMembership dues for the coming year (2009) are now due. You will find a dues payment form in our next issue of the news letter, or you can download the form from the CSS website: www.coloscisoc.org/membership/dues.html. You will also see a reminder in the mail or e-mail this month. Dues payments have increased to $20 for regular members; $10 for correspond ing members (outside the Colorado Front Range area), and $5 for students. You may pay your dues by mailing a check to the CSS, or you can pay with a credit card using PayPal on the CSS website. If you are uncertain if you owe dues or of your member status, contact CSS Treasurer Don Sweetkind by phone at 303–236–1828 or by e-mail at [email protected].\n\nAs you pay your dues, please consider making an additional contribution to one of our Memorial Funds, which support our student research grants program, or the Endowment Fund, which we use to defray operating costs. Any contributions made in calendar year 2008 (checks dated before 1 January 2009), will be credited toward the 2008 tax year.\n\nPlease remember that your entire contribution goes towards generating interest for the grants and that your contribution is 100% tax deductible because the Society is a non-profit Section 501 (c)(3) organization. Through interest income generated by our Memorial Funds, we have awarded over $125,000 in research grant funding to more than 165 students. This year we also supported the participation of about a dozen students on our field trips through the Pillmore Fund.\n\nHelp us cultivate our scientists of the future by generously supporting the Colorado Scientific Society. Thank you.\n\nEarth Science Meetings and Talks\n\nNewsletter items must be received by the 25th of each month.\n\nColorado Scientific Society's regular meetings are held the 3rd Thursday of the month at the American Mountaineering\n\nCenter in Golden (unless otherwise advertised). Social time begins at 6:30 p.m. and talks start at 7:00 p.m.\n\nFor more information, contact Matt Morgan, at 303-866-2066, [email protected]\n\nAIPG Every 3rd Tuesday, 11:30–1:30 p.m., University Club, 1673 Sherman St., Denver, make reservations with David Ab bott at 303-394-0321 or [email protected], $30 in advance, $35 at the door; Nov. 18, Michael Wireman, EPA, \"Hydrogeo logic characterization of ground waters, mine pools and the Leadville mine drainage tunnel, Leadville, Colorado.\n\nCafé Scientifique Wynkoop Brewery, evening science talks at 6:30. Free, except for beer. http://www.cafescicolorado.org\n\nCSM Microscopy short course, Dec. 15–19, 2008, 9 a.m.–5 p.m. Use of reflecting microsope, ID of 40 common ore miner als, study of ore mineral suites. $995. Taught by John Lufkin, 303-997-7365, [email protected]. Class limit of 10.\n\nColorado School of Mines, Van Tuyl Lectures Thursdays from 4–5 p.m. in Berthoud Hall room 108. Nov. 13—Vince Matthews, Colorado Geological Survey, \"China's and India's Ravenous Appetite for Natural Resources and Its Impact on Colorado School of Mines.\" http://www.mines.edu/academic/geology\n\nColorado State University, Dept of Geosciences, Rm 320 Warner College of Natural Resources Bldg., Mondays, 4:00 pm. 970-491-5661. http://welcome.warnercnr.colostate.edu/geo-training/index.php\n\nDenver Mining Club meets every Monday at the Littleton Country Buffet near Bowles and Wadsworth (8100 W. Crestline Ave., in the shopping center) 11:30–1:00. Purchase of lunch required. Nov. 10—No Meeting; Nov. 17—Greg Roush, Presi dent, and Heather Justus, Senior Project Geologist, Leonard Rice Engineers, Inc., \"Geohydrology and Engineering Hydrology as They Relate to Mining in Colorado\"; Nov. 24—Jim Burnell, Colorado Geological Survey, Annual Summary of Colorado Mining and Mineral Activity. http://www.denverminingclub.org\n\nDenver Museum of Nature and Science Nov. 20, 6:30 p.m., Ken Carpenter, \"The Life and Times of T. rex\" Ricketson Au ditorium. $12 member, $15 non-member. http://www.dmns.org/main/en/General/Education/AdultProgram/Lectures\n\nDenver Region Exploration Geologists' Society (DREGS) meets in the Mutual Consolidated Water Building, 12700 West 27th Avenue, Lakewood. Social 6:00-7:00 p.m. Presentation at 7:00 p.m. Meetings are normally scheduled for the first Mon day of each month. Nov. 3, Bill Bond and Paul Bartos, Esperanza Silver Corp., Geology and discovery of the Cerro Jumil Gold Skarn, Morelos, Mexico. For information contact Jim Piper, (303) 932-0137, or the website http://www.dregs.org\n\nDenver Well Logging Society (DWLS) meets on the third Tuesday of each month, Sept. through May. Lunch and a technical talk at the Wynkoop Brewery begins at 11:30 a.m., 18th and Wynkoop Sts. in Denver. Call Sarah Voight at 720-946-1374 by prior Thursday for reservations. Web page: http://dwls.spwla.org Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Columbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837\n\nFriends of Dinosaur Ridge http://www.dinoridge.org. Admission is free, but donations are welcome. 16831 W. Alameda Parkway. Talks at 7:00 p.m. Visitor Center (303) 697-3466 or contact Beth Simmons at [email protected] for info.\n\nRocky Mountain Association of Geologists (RMAG) Reception at 11:30, lunch at noon, talk at 12:30. Reservations by recording at 303-623-5396 until 10:30 a.m., prior Wed. Luncheon $30. Talk only (no res.)—$5. Location: Denver Marriott, 17th & California. http://www.rmag.org/events. Nov. 22—Rockbuster's Ball & Annual Professional Awards Banquet, Col umbine Country Club, Littleton, online registration at: http://www.eventbrite.com/event/184831837\n\nRocky Mountain SEPM Reception at 11:30, lunch at noon, speaker at 12:30. Reservations: [email protected], before noon of preceding Friday. $20.00 lunch, $3 talk only. Wynkoop Brewing Company, 1634 18th St., Denver. http://www. rmssepm.org/NewFiles/lunch.html\n\nUSGS Geologic Division Colloquium Thursdays, 1:30, Foord Room, Building 20, Denver Federal Center. For more infor mation contact: Peter J. Modreski, USGS, Denver, tel. 303-202-4766, fax 303-202-4767, email [email protected]\n\nUniv. of Colorado, Boulder, Geol. Sciences Colloquium Weds., 4:00 p.m., Rm. 380. Refreshments at 3:30 p.m. on the 3rd floor. Nov. 12—TBA; Nov. 19—Doug Yule, Univ. of Calif., Megaquakes of the Himalaya.\" http://www.colorado.edu/GeolSci\n\nColorado Scientific Society P.O. Box 150495 Lakewood, CO 80215-0495\n\nhttp://www.coloscisoc.org\n\nOFFICERS\n\nPresident:\n\nMatt Morgan, CGS, 303-866-2066 [email protected]\n\nPresident-Elect:\t Don Sweetkind, USGS, 303-236-1828, [email protected]\n\nTreasurer:\n\nJeremy McCreary 303-744-0907 [email protected]\n\nSecretary:\n\nLisa Fisher, CSM, 303-478-9427 (c), [email protected]\n\nPast President:\t Bill Nesse, UNC, 970-330-7183, [email protected]\n\nCOUNCILORS\n\n2007-2010:\t Jeremy McCreary 303-744-0907 [email protected]\n\n2007-2010:\t Tim McIntyre\n\n2006-2009:\t Scott Minor, USGS, 303-236-0303, [email protected]\n\n2008-2011:\t Cal Ruleman, USGS, [email protected]\n\n2008-2011:\t Lee Shropshire, UNC, 970-352-8778, [email protected]\n\nCOMMITTEE CHAIRPERSONS\n\nBest Paper Award:\t Matt Morgan, CGS, 303-866-2066, [email protected]\n\nDatabase Manager: Erik Oerter, CGS, [email protected]\n\nField Trips:\n\nKarl Kellogg, [email protected]\n\nGraphics:\n\nKaren Morgan, CGS, 303-866-3529, [email protected]\n\nHistory:\n\nBeth Simmons, [email protected]\n\nMembership: Thom Fisher, Libby Prueher, TC Wait, Eric Nelson, Beth Simmons\n\nMemorial Funds: Bill Nesse, 970-330-7183, [email protected]\n\nNewsletter Editor:\t Lisa Rukstales, [email protected]\n\nOutreach:\n\nSue Hirschfeld, 720-565-9302, [email protected]\n\nProgram:\n\nEmmett Evanoff, 303-444-2644, [email protected], Libby Prueher, Christine Turner\n\nPublicity:\n\nEmily Taylor, [email protected]\n\nScience Fair:\n\nChuck Weisenberg, 303-238-8806, [email protected]\n\nWebmaster:\n\nJohn M. Ghist, 303-875-9671 [email protected] or [email protected]\n\n** STOP! Do NOT recycle this until after the talk! Please help us with publicity by posting at least the front page of this Newsletter on a bulletin board. Thank you!\n</text>\n",
"role": "user"
},
{
"content": "10 mm).",
"role": "assistant"
}
] |
Focus on …
* converting a linear equation to general form
* using intercepts to graph a line
* relating the intercepts of a graph to the situation
* solving problems using equations in general form
Materials
* bottle of water
* stopwatch
* grid paper and ruler or graphing technology
General Form
The slope-intercept form of an equation is one of the most common ways to write the equation of a line. Suppose you place a transparent grid on the Canadian fl ag. Most, but not all, of the line segments in the fl ag could be expressed as equations in slope-intercept form. Can you think of a type of line that cannot be expressed in the form y = mx + b? In this section, you will explore a general way of writing the equation of any line.
Investigate Intercepts and General Form
Leora quenches her thirst after a soccer game by drinking a large glass of water at a constant rate. The straight-line graph on the following page shows how the volume of water in the glass changes with time.
general form
* the equation of a line in the form Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number. This means that A will always be positive.
x-intercept
* the x-coordinate of the point where a line or curve crosses the x-axis
* the value of x when y = 0
358 MHR •Chapter 7
1. Identify the domain and range in this situation.
2. Identify the slope of the line segment. What does the sign of the slope mean? What does the slope represent?
3. What is the y-intercept of the line segment? What does the y-intercept represent?
4. a) What is the equation of the line in slope-intercept form?
b) Rearrange the terms in the equation so that the right side is zero. This is the general form of an equation.
5. a) Identify the x-intercept of the line. What does the x-intercept represent?
b) Write the coordinates of the x-intercept and the y-intercept.
6. Time yourself while drinking a 500-mL bottle of water slowly at a constant rate.
a) Sketch a straight-line graph to show how the volume of water remaining in the bottle changes with time.
b) Compare your graph to Leora's graph. How can you tell who drank more, who fi nished fi rst, and who drank at a faster rate?
c) Write the equation of your graph in both slope-intercept form and general form.
Refl ect and Respond
a) Recall that a point on a line satisfi es the equation of the line. Are the x-intercept and y-intercept points on the line?
b) When asked to determine the x-intercept, what coordinate value do you always know? When asked to determine the y-intercept, what coordinate value do you always know? How can you use this information to help you determine the x-intercept or y-intercept?
c) Describe strategies for determining the y-intercept and x-intercept of a line if the equation is given in general form.
d) Create two linear equations. Then, identify the y-intercept and x-intercept of each line. Use graphing technology to check your answers.
8. What form is the equation x - 5 = 0 expressed in? Can you write the equation in another form? Explain.
7.
Link the Ideas
The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.
You can convert a linear equation from one form to another by applying the rules of algebra.
The x-intercept of a line is the x-coordinate of the point where the line crosses the x-axis. The y-intercept is the y-coordinate of the point where the line crosses the y-axis. To sketch a linear equation, you can draw a line joining the intercepts, (x, 0) and (0, y).
The line in the graph below has an x-intercept of 1 and a y-intercept of 2.
Example 1 Convert an Equation to General Form
Rewrite the equation y = - 2 _ 3 x + 6 in general form, Ax + By + C = 0.
Solution
Why are both sides multiplied by 3?
2x +3y -18=0
The equation written in general form is 2x + 3y - 18 = 0.
Your Turn
Rewrite the equation y = 3 _ 4 x - 2 in general form.
360 MHR •Chapter 7
Example 2 Sketch a Graph Using Intercepts
For the linear equation 2x - 3y - 6 = 0, a)
state the x-
intercept of a graph of the equation
b) state the y-intercept
c) use the intercepts to graph the line
Solution.
a) To determine the x-intercept, substitute y = 0. Then, solve for x
Why do you substitute x = 0 to fi nd the y-intercept?
The x-intercept is 3. So, the line crosses the x-axis at the point (3, 0).
b) To determine the y-intercept, substitute x = 0. Solve for y.
The y-intercept is -2. The line crosses the y-axis at the point (0, -2).
c) Locate the points (3, 0) and (0, -2) on the grid. Then, draw a line passing through these points.
How else could you graph an equation given in general form?
Your Turn
Consider the linear equation 4x + 5y - 20 = 0.
a) What is the x-intercept of a graph of the equation?
b) What is the y-intercept?
c) Use the intercepts to graph the line.
Example 3 Identify Intercepts of Horizontal or Vertical Lines
Sketch each linear relation and identify the intercepts. Then, state the domain and range.
a) y -3=0
b) x +4.5
c) y =0
Solution
a) The equation y - 3 = 0 can be written in slope-intercept form as y = 0x + 3.
The graph is a horizontal line with slope zero.
The line crosses the y-axis at the point (0, 3).
What would the values in a table representing this equation show?
The y-intercept is 3. There is no x-intercept.
The domain of the liney -3=0 is {x ∈R}.
The range of the line is {3}.
b) The equationx +4.5=
0 expressed in general form is
x +0y +4.5=0. The coeffi cient ofyis zero.
The value ofxis always-4.5.
The graph is a vertical line and crosses the x-axis at (-4.5, 0).
The x-intercept is -4.5. There is no y-intercept.
The domain of the linex +4.5=0 is {-4.5}.
The range of the line is {y ∈ R}.
0 =
362 MHR •Chapter 7
c) The equation y = 0 is a horizontal line, which represents the entire x-axis. The graph always intersects the x-axis. Therefore, there are an infi nite number of x-intercepts. The y-intercept is 0. The domain of the line y = 0 is {x ∈ R}. The range of the line is {0}.
What do the coordinates of points on this line have in common?
Your Turn
Sketch each linear relation and identify the intercepts. What are the domain and range for each relation?
a) x -3=0
b) x =0
c) y + 2 = 0
Example 4 Interpret Intercepts
Spencer has 66 GB of disk space left on his laptop to fi ll with television shows and movies that he purchases on-line.
a) Suppose a one-hour show uses 1.1 GB of disk space and a movie uses 4.4 GB. Write a linear equation that represents the number of
television shows,T, and movies,M
, that Spencer can store on his laptop.
b) Determine the T-intercept of a graph of the linear equation. What does the T-intercept represent?
c) What would the M-intercept be? What does the M-intercept represent?
d) If Spencer stores 16 television shows, how many movies does he have space for?
Solution
a) The equation is 1.1T + 4.4M = 66. Simplify the equation.
What does each term represent?
Write the coeffi cient ofTas a whole number.
11T +44M =660
Reduce the equation to lowest terms.
T +4M =60
How else could you reduce the original equation to lowest terms with the coeffi cient of T as a whole number?
The equation T + 4M = 60 represents the number of television shows and movies that Spencer can store on his laptop.
b) To determine the T-intercept, substitute M = 0. Solve for T.
T +4M =60
T +4(0) =60
T =60
The T-intercept is 60. So, if Spencer stores no movies, he can store 60 television shows.
c) To determine the M-intercept, substitute T = 0. Solve for M.
T +4M =60
0 +4M =60
M =15
The M-intercept is 15. So, Spencer can store 15 movies if he does not store any television shows.
d) Substitute T = 16 and solve for M.
T +4M =60
16 4 + M
4M
=60
=44
M =11
Spencer has space on his laptop for 11 movies.
Your Turn
Brooke wants to save $336 to decorate her bedroom. She has two part-time jobs. On weekends, she works as a snowboard instructor and earns $12 per hour. On weeknights, she earns $16 per hour working as a high-school tutor.
a) Write an equation to represent the number of hours Brooke needs to work as a snowboard instructor, S, and as a tutor, T.
b) What is the S-intercept of a graph of the equation? What does the S-intercept represent?
c) What would the T-intercept be? What does it represent?
d) Suppose Brooke works 8 h as a snowboard instructor. How many hours will she need to work as a tutor?
364 MHR •
Key Ideas
* The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.
* To graph an equation in general form, determine the intercepts, then draw a line joining the intercepts; or convert to slope-intercept form.
* To determine the x-intercept, substitute y = 0 and solve. To determine the y-intercept, substitute x = 0 and solve.
* A sketch of a linear relation may have one, two, or an infi nite number of intercepts. A line that represents an axis has an infi nite number of intercepts with that axis. A horizontal or vertical line that does not represent an axis has only one intercept.
Chapter 7
Check Your Understanding
Practise
1. Jasmine was asked to convert the equation y = - 3 _ 2 x + 4 to general form. Her work is shown.
Identify Jasmine's error. Then, correct her work.
2. Express each equation in general form, Ax + By + C = 0.
a) y = 7x - 5
b) y = -x + 8
c) y = 3 _ 2 x + 4
d) y = - 3 _ 5 x - 2
e) y = 0.25x - 0.3
f) y = - 5 _ 2 x + 1 _ 8
3. Determine the intercepts of each line. Then, graph the line.
a) 2x + y - 9 = 0
b) 4x - y - 8 = 0
c) x - 2y + 10 = 0
e) 4x + 5y + 6 = 0
d) 3x - 8y - 24 = 0
f) x = 4
g) y = 0
h) 4x - 12 = 0
4. For each line, state the domain, range, intercepts, and slope. What is the equation of each line, in general form?
366 MHR •Chapter 7
5. Graph each line using the given intercepts. What is the equation of each line?
a) an x-intercept of 3 and no y-intercept
b) a y-intercept of -5 and no x-intercept
c) an infi nite number of x-intercepts
d) an infi nite number of y-intercepts
6. Match each equation with a line labelled in the fi gure.
a) 3x + 4y = 12
b) x = 4
c) 3x - 4y = 12
d) y - 3 = 0
e) 3x - 4y + 12 = 0
f) y = -3
g) 3x + 4y + 12 = 0
h) x + 4 = 0
Apply
7. Write an equation, in general form, for each line described.
a) a vertical line passing through the point (3, 5)
b) a horizontal line passing through the point (-2, 6)
c) the x-axis
d) the y-axis
8. Write an equation, in general form, of a line that does not have a y-intercept and passes through the point (3, 6).
9. Having fi bre in your diet helps with digestion, heart health, and maintaining a healthy weight. Courtney wants to increase her fi bre intake by 21 g per day. She plans to do this by adding bran buds and one vegetable to her diet each day. Write an equation in general form that describes this situation. Courtney mixes 125 mL of bran buds in her cereal each day. What volume of green peas would she need to eat during the day? What volume of baked beans would she need to eat? Express your answers in whole millilitres.
10. An airplane fl ies directly from Saskatoon, SK, to Vancouver, BC. The graph shows the relationship between the distance from Vancouver, d, in kilometres, and the fl ying time, t, in hours.
a) State the intercepts of the line segment. What does each intercept represent?
b) State a suitable domain and range of the graph.
c)
Determine the slope of the line. What does the slope represent?
d) Write the equation of the line in general form.
e) For how many hours has the plane been fl ying when it is 200 km from Vancouver?
f) What is the distance from Vancouver when the plane has been fl ying for 45 min?
11. Luc swims as part of an active and healthy lifestyle. The number of calories burned by a swimmer of Luc's body weight is shown in the table.
a) Write a linear equation to describe the number of minutes Luc would need to swim backstroke, x, and butterfl y, y, to burn 440 cal. e d
b) What are the intercepts of the line? What does each intercept represent?
c) Suppose Luc swims butterfl y for 16 min. How long will he need to swim backstroke in order to burn 440 cal in total?
| Food | Grams of Fibre per 125 mL |
|---|---|
| Green peas | 4 |
| Baked beans | 7 |
368 MHR •Chapter 7
12. Sanding trucks spread a mixture of sand and salt on roads to improve traction in winter. The density of the salt is 1200 kg/m 3 . The density of the sand is 1800 kg/m 3 .
a) Write a linear equation to represent the volume, in cubic metres, of salt, x, and of sand, y, in a mixture with a mass of 10 000 kg.
b) For temperatures below -12 °C, the volume of sand in 10 000 kg of the mixture is 5.22 m 3 . What is the volume of salt in the mixture?
c) By mass, what percent of the mixture is salt?
13. Advance tickets for a local concert sold for $8 each. Tickets at the door were $12 each. The revenue from ticket sales was $1120.
a) Write a linear equation relating the number of advance tickets, a, to the number of tickets sold at the door, d. Express your equation in general form.
b) Describe the steps you would follow to graph this equation. Do not graph.
c) Suppose twice as many advance tickets were sold as tickets at the door. How many of each type of ticket were sold?
14. What is the value of the unknown parameter in each equation?
a) Ax + 5y - 6 = 0, passing through (-3, 2)
b) 2x + By + 7 = 0, passing through (4, -5)
c) 4x - 3y + C = 0, passing through (-2, -6)
Extend
15. The equation of a line is x + 3y - 24 = 0. Write the coordinates of a point on the line for each of the following conditions.
a) The x-coordinate is equal to the y-coordinate.
b) The x-coordinate is three times as great as the y-coordinate.
c) The y-coordinate is four greater than the x-coordinate.
16. The equation 6x + By + 5 = 0 describes a line with a slope of 3 _ 2 . What is the value of B?
17. What is the area of the triangle bounded by each set of lines?
a) the line x + 2y = 10, a line with an infi nite number of x-intercepts, and a line with an infi nite number of y-intercepts
b) a line with an infi nite number of x-intercepts, the line 2x - y = 6, and the line x = 10
Create Connections
18. a) Which form of a linear equation do you prefer to graph: y = mx + b or Ax + By + C = 0? Why?
b) Describe a situation when you might work with a linear equation in the other form.
19. The equation of a line is 2x + y - 8 = 0.
a) Explain how you could determine the x-intercept.
b) Explain two different ways to determine the y-intercept.
20. The general form of an equation is Ax + By + C = 0. Identify each line as horizontal, vertical, or oblique.
a) A ≠ 0, B = 0, and C is a real number.
b) A = 0, B ≠ 0, and C is a real number.
c) A ≠ 0, B ≠ 0, and C is a real number.
21. MINI LAB Explore the effects of changing parameters on a graph of Ax + By + C = 0.
Step 1 For each group of equations, graph the three linear relations on the same axes. Use graphing technology or sketch the graphs by hand.
a) x + y - 2 = 0 x + y - 6 = 0 x + y - 8 = 0
b) x + 2y - 6 = 0 2x + 2y - 6 = 0 3x + 2y - 6 = 0
c) 2x + y - 6 = 0 2x + 2y - 6 = 0 2x + 3y - 6 = 0
d) x + y - 2 = 0 2x + 2y - 4 = 0 3x + 3y - 6 = 0
Step 2 Compare the three graphs in each group of equations. What parameter(s) have changed? Explain how changing one or two parameters affects the slope, x-intercept, and y-intercept of the graph.
Step 3 How does changing the parameters A, B, and C affect the graph of a linear equation in general form?
7.2 General Form
Materials
* graphing technology or grid paper and ruler
* MHR 369
|
<urn:uuid:b7eb6514-f85b-494d-afbc-2c2fa4b9f073>
|
CC-MAIN-2019-09
|
http://mrsdildy.com/wp-content/uploads/2012/03/7-2.pdf
|
2019-02-22T00:44:38Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511573.67/warc/CC-MAIN-20190221233437-20190222015437-00058.warc.gz
| 196,955,401
| 4,518
|
eng_Latn
|
eng_Latn
| 0.874871
|
eng_Latn
| 0.990973
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"pol_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
990,
3087,
4014,
4937,
5829,
6951,
8512,
9228,
9896,
12266,
12353,
14248,
15660
] |
Focus on …
* converting a linear equation to general form
* using intercepts to graph a line
* relating the intercepts of a graph to the situation
* solving problems using equations in general form
Materials
* bottle of water
* stopwatch
* grid paper and ruler or graphing technology
General Form
The slope-intercept form of an equation is one of the most common ways to write the equation of a line. Suppose you place a transparent grid on the Canadian fl ag. Most, but not all, of the line segments in the fl ag could be expressed as equations in slope-intercept form. Can you think of a type of line that cannot be expressed in the form y = mx + b? In this section, you will explore a general way of writing the equation of any line.
Investigate Intercepts and General Form
Leora quenches her thirst after a soccer game by drinking a large glass of water at a constant rate. The straight-line graph on the following page shows how the volume of water in the glass changes with time.
general form
* the equation of a line in the form Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number. This means that A will always be positive.
x-intercept
* the x-coordinate of the point where a line or curve crosses the x-axis
* the value of x when y = 0
358 MHR •Chapter 7
1. Identify the domain and range in this situation.
2. Identify the slope of the line segment. What does the sign of the slope mean? What does the slope represent?
3. What is the y-intercept of the line segment? What does the y-intercept represent?
4. a) What is the equation of the line in slope-intercept form?
b) Rearrange the terms in the equation so that the right side is zero. This is the general form of an equation.
5. a) Identify the x-intercept of the line. What does the x-intercept represent?
b) Write the coordinates of the x-intercept and the y-intercept.
6. Time yourself while drinking a 500-mL bottle of water slowly at a constant rate.
a) Sketch a straight-line graph to show how the volume of water remaining in the bottle changes with time.
b) Compare your graph to Leora's graph. How can you tell who drank more, who fi nished fi rst, and who drank at a faster rate?
c) Write the equation of your graph in both slope-intercept form and general form.
Refl ect and Respond
a) Recall that a point on a line satisfi es the equation of the line. Are the x-intercept and y-intercept points on the line?
b) When asked to determine the x-intercept, what coordinate value do you always know? When asked to determine the y-intercept, what coordinate value do you always know? How can you use this information to help you determine the x-intercept or y-intercept?
c) Describe strategies for determining the y-intercept and x-intercept of a line if the equation is given in general form.
d) Create two linear equations. Then, identify the y-intercept and x-intercept of each line. Use graphing technology to check your answers.
8. What form is the equation x - 5 = 0 expressed in? Can you write the equation in another form? Explain.
7.
Link the Ideas
The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.
You can convert a linear equation from one form to another by applying the rules of algebra.
The x-intercept of a line is the x-coordinate of the point where the line crosses the x-axis. The y-intercept is the y-coordinate of the point where the line crosses the y-axis. To sketch a linear equation, you can draw a line joining the intercepts, (x, 0) and (0, y).
The line in the graph below has an x-intercept of 1 and a y-intercept of 2.
Example 1 Convert an Equation to General Form
Rewrite the equation y = - 2 _ 3 x + 6 in general form, Ax + By + C = 0.
Solution
Why are both sides multiplied by 3?
2x +3y -18=0
The equation written in general form is 2x + 3y - 18 = 0.
Your Turn
Rewrite the equation y = 3 _ 4 x - 2 in general form.
360 MHR •Chapter 7
Example 2 Sketch a Graph Using Intercepts
For the linear equation 2x - 3y - 6 = 0, a)
state the x-
intercept of a graph of the equation
b) state the y-intercept
c) use the intercepts to graph the line
Solution.
a) To determine the x-intercept, substitute y = 0. Then, solve for x
Why do you substitute x = 0 to fi nd the y-intercept?
The x-intercept is 3. So, the line crosses the x-axis at the point (3, 0).
b) To determine the y-intercept, substitute x = 0. Solve for y.
The y-intercept is -2. The line crosses the y-axis at the point (0, -2).
c) Locate the points (3, 0) and (0, -2) on the grid. Then, draw a line passing through these points.
How else could you graph an equation given in general form?
Your Turn
Consider the linear equation 4x + 5y - 20 = 0.
a) What is the x-intercept of a graph of the equation?
b) What is the y-intercept?
c) Use the intercepts to graph the line.
Example 3 Identify Intercepts of Horizontal or Vertical Lines
Sketch each linear relation and identify the intercepts. Then, state the domain and range.
a) y -3=0
b) x +4.5
c) y =0
Solution
a) The equation y - 3 = 0 can be written in slope-intercept form as y = 0x + 3.
The graph is a horizontal line with slope zero.
The line crosses the y-axis at the point (0, 3).
What would the values in a table representing this equation show?
The y-intercept is 3. There is no x-intercept.
The domain of the liney -3=0 is {x ∈R}.
The range of the line is {3}.
b) The equationx +4.5=
0 expressed in general form is
x +0y +4.5=0. The coeffi cient ofyis zero.
The value ofxis always-4.5.
The graph is a vertical line and crosses the x-axis at (-4.5, 0).
The x-intercept is -4.5. There is no y-intercept.
The domain of the linex +4.5=0 is {-4.5}.
The range of the line is {y ∈ R}.
0 =
362 MHR •Chapter 7
c) The equation y = 0 is a horizontal line, which represents the entire x-axis. The graph always intersects the x-axis. Therefore, there are an infi nite number of x-intercepts. The y-intercept is 0. The domain of the line y = 0 is {x ∈ R}. The range of the line is {0}.
What do the coordinates of points on this line have in common?
Your Turn
Sketch each linear relation and identify the intercepts. What are the domain and range for each relation?
a) x -3=0
b) x =0
c) y + 2 = 0
Example 4 Interpret Intercepts
Spencer has 66 GB of disk space left on his laptop to fi ll with television shows and movies that he purchases on-line.
a) Suppose a one-hour show uses 1.1 GB of disk space and a movie uses 4.4 GB. Write a linear equation that represents the number of
television shows,T, and movies,M
, that Spencer can store on his laptop.
b) Determine the T-intercept of a graph of the linear equation. What does the T-intercept represent?
c) What would the M-intercept be? What does the M-intercept represent?
d) If Spencer stores 16 television shows, how many movies does he have space for?
Solution
a) The equation is 1.1T + 4.4M = 66. Simplify the equation.
What does each term represent?
Write the coeffi cient ofTas a whole number.
11T +44M =660
Reduce the equation to lowest terms.
T +4M =60
How else could you reduce the original equation to lowest terms with the coeffi cient of T as a whole number?
The equation T + 4M = 60 represents the number of television shows and movies that Spencer can store on his laptop.
b) To determine the T-intercept, substitute M = 0. Solve for T.
T +4M =60
T +4(0) =60
T =60
The T-intercept is 60. So, if Spencer stores no movies, he can store 60 television shows.
c) To determine the M-intercept, substitute T = 0. Solve for M.
T +4M =60
0 +4M =60
M =15
The M-intercept is 15. So, Spencer can store 15 movies if he does not store any television shows.
d) Substitute T = 16 and solve for M.
T +4M =60
16 4 + M
4M
=60
=44
M =11
Spencer has space on his laptop for 11 movies.
Your Turn
Brooke wants to save $336 to decorate her bedroom. She has two part-time jobs. On weekends, she works as a snowboard instructor and earns $12 per hour. On weeknights, she earns $16 per hour working as a high-school tutor.
a) Write an equation to represent the number of hours Brooke needs to work as a snowboard instructor, S, and as a tutor, T.
b) What is the S-intercept of a graph of the equation? What does the S-intercept represent?
c) What would the T-intercept be? What does it represent?
d) Suppose Brooke works 8 h as a snowboard instructor. How many hours will she need to work as a tutor?
364 MHR •
Key Ideas
* The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.
* To graph an equation in general form, determine the intercepts, then draw a line joining the intercepts; or convert to slope-intercept form.
* To determine the x-intercept, substitute y = 0 and solve. To determine the y-intercept, substitute x = 0 and solve.
* A sketch of a linear relation may have one, two, or an infi nite number of intercepts. A line that represents an axis has an infi nite number of intercepts with that axis. A horizontal or vertical line that does not represent an axis has only one intercept.
Chapter 7
Check Your Understanding
Practise
1. Jasmine was asked to convert the equation y = - 3 _ 2 x + 4 to general form. Her work is shown.
Identify Jasmine's error. Then, correct her work.
2. Express each equation in general form, Ax + By + C = 0.
a) y = 7x - 5
b) y = -x + 8
c) y = 3 _ 2 x + 4
d) y = - 3 _ 5 x - 2
e) y = 0.25x - 0.3
f) y = - 5 _ 2 x + 1 _ 8
3. Determine the intercepts of each line. Then, graph the line.
a) 2x + y - 9 = 0
b) 4x - y - 8 = 0
c) x - 2y + 10 = 0
e) 4x + 5y + 6 = 0
d) 3x - 8y - 24 = 0
f) x = 4
g) y = 0
h) 4x - 12 = 0
4. For each line, state the domain, range, intercepts, and slope. What is the equation of each line, in general form?
366 MHR •Chapter 7
5. Graph each line using the given intercepts. What is the equation of each line?
a) an x-intercept of 3 and no y-intercept
b) a y-intercept of -5 and no x-intercept
c) an infi nite number of x-intercepts
d) an infi nite number of y-intercepts
6. Match each equation with a line labelled in the fi gure.
a) 3x + 4y = 12
b) x = 4
c) 3x - 4y = 12
d) y - 3 = 0
e) 3x - 4y + 12 = 0
f) y = -3
g) 3x + 4y + 12 = 0
h) x + 4 = 0
Apply
7. Write an equation, in general form, for each line described.
a) a vertical line passing through the point (3, 5)
b) a horizontal line passing through the point (-2, 6)
c) the x-axis
d) the y-axis
8. Write an equation, in general form, of a line that does not have a y-intercept and passes through the point (3, 6).
9. Having fi bre in your diet helps with digestion, heart health, and maintaining a healthy weight. Courtney wants to increase her fi bre intake by 21 g per day. She plans to do this by adding bran buds and one vegetable to her diet each day. Write an equation in general form that describes this situation. Courtney mixes 125 mL of bran buds in her cereal each day. What volume of green peas would she need to eat during the day? What volume of baked beans would she need to eat? Express your answers in whole millilitres.
10. An airplane fl ies directly from Saskatoon, SK, to Vancouver, BC. The graph shows the relationship between the distance from Vancouver, d, in kilometres, and the fl ying time, t, in hours.
a) State the intercepts of the line segment. What does each intercept represent?
b) State a suitable domain and range of the graph.
c)
Determine the slope of the line. What does the slope represent?
d) Write the equation of
|
the line in general form.
| 11,599
|
beginning_of_word
|
the
|
remove_all
|
<url>
http://mrsdildy.com/wp-content/uploads/2012/03/7-2.pdf
</url>
<text>
Focus on …
* converting a linear equation to general form
* using intercepts to graph a line
* relating the intercepts of a graph to the situation
* solving problems using equations in general form
Materials
* bottle of water
* stopwatch
* grid paper and ruler or graphing technology
General Form
The slope-intercept form of an equation is one of the most common ways to write the equation of a line. Suppose you place a transparent grid on the Canadian fl ag. Most, but not all, of the line segments in the fl ag could be expressed as equations in slope-intercept form. Can you think of a type of line that cannot be expressed in the form y = mx + b? In this section, you will explore a general way of writing the equation of any line.
Investigate Intercepts and General Form
Leora quenches her thirst after a soccer game by drinking a large glass of water at a constant rate. The straight-line graph on the following page shows how the volume of water in the glass changes with time.
general form
* the equation of a line in the form Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number. This means that A will always be positive.
x-intercept
* the x-coordinate of the point where a line or curve crosses the x-axis
* the value of x when y = 0
358 MHR •Chapter 7
1. Identify the domain and range in this situation.
2. Identify the slope of the line segment. What does the sign of the slope mean? What does the slope represent?
3. What is the y-intercept of the line segment? What does the y-intercept represent?
4. a) What is the equation of the line in slope-intercept form?
b) Rearrange the terms in the equation so that the right side is zero. This is the general form of an equation.
5. a) Identify the x-intercept of the line. What does the x-intercept represent?
b) Write the coordinates of the x-intercept and the y-intercept.
6. Time yourself while drinking a 500-mL bottle of water slowly at a constant rate.
a) Sketch a straight-line graph to show how the volume of water remaining in the bottle changes with time.
b) Compare your graph to Leora's graph. How can you tell who drank more, who fi nished fi rst, and who drank at a faster rate?
c) Write the equation of your graph in both slope-intercept form and general form.
Refl ect and Respond
a) Recall that a point on a line satisfi es the equation of the line. Are the x-intercept and y-intercept points on the line?
b) When asked to determine the x-intercept, what coordinate value do you always know? When asked to determine the y-intercept, what coordinate value do you always know? How can you use this information to help you determine the x-intercept or y-intercept?
c) Describe strategies for determining the y-intercept and x-intercept of a line if the equation is given in general form.
d) Create two linear equations. Then, identify the y-intercept and x-intercept of each line. Use graphing technology to check your answers.
8. What form is the equation x - 5 = 0 expressed in? Can you write the equation in another form? Explain.
7.
Link the Ideas
The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.
You can convert a linear equation from one form to another by applying the rules of algebra.
The x-intercept of a line is the x-coordinate of the point where the line crosses the x-axis. The y-intercept is the y-coordinate of the point where the line crosses the y-axis. To sketch a linear equation, you can draw a line joining the intercepts, (x, 0) and (0, y).
The line in the graph below has an x-intercept of 1 and a y-intercept of 2.
Example 1 Convert an Equation to General Form
Rewrite the equation y = - 2 _ 3 x + 6 in general form, Ax + By + C = 0.
Solution
Why are both sides multiplied by 3?
2x +3y -18=0
The equation written in general form is 2x + 3y - 18 = 0.
Your Turn
Rewrite the equation y = 3 _ 4 x - 2 in general form.
360 MHR •Chapter 7
Example 2 Sketch a Graph Using Intercepts
For the linear equation 2x - 3y - 6 = 0, a)
state the x-
intercept of a graph of the equation
b) state the y-intercept
c) use the intercepts to graph the line
Solution.
a) To determine the x-intercept, substitute y = 0. Then, solve for x
Why do you substitute x = 0 to fi nd the y-intercept?
The x-intercept is 3. So, the line crosses the x-axis at the point (3, 0).
b) To determine the y-intercept, substitute x = 0. Solve for y.
The y-intercept is -2. The line crosses the y-axis at the point (0, -2).
c) Locate the points (3, 0) and (0, -2) on the grid. Then, draw a line passing through these points.
How else could you graph an equation given in general form?
Your Turn
Consider the linear equation 4x + 5y - 20 = 0.
a) What is the x-intercept of a graph of the equation?
b) What is the y-intercept?
c) Use the intercepts to graph the line.
Example 3 Identify Intercepts of Horizontal or Vertical Lines
Sketch each linear relation and identify the intercepts. Then, state the domain and range.
a) y -3=0
b) x +4.5
c) y =0
Solution
a) The equation y - 3 = 0 can be written in slope-intercept form as y = 0x + 3.
The graph is a horizontal line with slope zero.
The line crosses the y-axis at the point (0, 3).
What would the values in a table representing this equation show?
The y-intercept is 3. There is no x-intercept.
The domain of the liney -3=0 is {x ∈R}.
The range of the line is {3}.
b) The equationx +4.5=
0 expressed in general form is
x +0y +4.5=0. The coeffi cient ofyis zero.
The value ofxis always-4.5.
The graph is a vertical line and crosses the x-axis at (-4.5, 0).
The x-intercept is -4.5. There is no y-intercept.
The domain of the linex +4.5=0 is {-4.5}.
The range of the line is {y ∈ R}.
0 =
362 MHR •Chapter 7
c) The equation y = 0 is a horizontal line, which represents the entire x-axis. The graph always intersects the x-axis. Therefore, there are an infi nite number of x-intercepts. The y-intercept is 0. The domain of the line y = 0 is {x ∈ R}. The range of the line is {0}.
What do the coordinates of points on this line have in common?
Your Turn
Sketch each linear relation and identify the intercepts. What are the domain and range for each relation?
a) x -3=0
b) x =0
c) y + 2 = 0
Example 4 Interpret Intercepts
Spencer has 66 GB of disk space left on his laptop to fi ll with television shows and movies that he purchases on-line.
a) Suppose a one-hour show uses 1.1 GB of disk space and a movie uses 4.4 GB. Write a linear equation that represents the number of
television shows,T, and movies,M
, that Spencer can store on his laptop.
b) Determine the T-intercept of a graph of the linear equation. What does the T-intercept represent?
c) What would the M-intercept be? What does the M-intercept represent?
d) If Spencer stores 16 television shows, how many movies does he have space for?
Solution
a) The equation is 1.1T + 4.4M = 66. Simplify the equation.
What does each term represent?
Write the coeffi cient ofTas a whole number.
11T +44M =660
Reduce the equation to lowest terms.
T +4M =60
How else could you reduce the original equation to lowest terms with the coeffi cient of T as a whole number?
The equation T + 4M = 60 represents the number of television shows and movies that Spencer can store on his laptop.
b) To determine the T-intercept, substitute M = 0. Solve for T.
T +4M =60
T +4(0) =60
T =60
The T-intercept is 60. So, if Spencer stores no movies, he can store 60 television shows.
c) To determine the M-intercept, substitute T = 0. Solve for M.
T +4M =60
0 +4M =60
M =15
The M-intercept is 15. So, Spencer can store 15 movies if he does not store any television shows.
d) Substitute T = 16 and solve for M.
T +4M =60
16 4 + M
4M
=60
=44
M =11
Spencer has space on his laptop for 11 movies.
Your Turn
Brooke wants to save $336 to decorate her bedroom. She has two part-time jobs. On weekends, she works as a snowboard instructor and earns $12 per hour. On weeknights, she earns $16 per hour working as a high-school tutor.
a) Write an equation to represent the number of hours Brooke needs to work as a snowboard instructor, S, and as a tutor, T.
b) What is the S-intercept of a graph of the equation? What does the S-intercept represent?
c) What would the T-intercept be? What does it represent?
d) Suppose Brooke works 8 h as a snowboard instructor. How many hours will she need to work as a tutor?
364 MHR •
Key Ideas
* The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.
* To graph an equation in general form, determine the intercepts, then draw a line joining the intercepts; or convert to slope-intercept form.
* To determine the x-intercept, substitute y = 0 and solve. To determine the y-intercept, substitute x = 0 and solve.
* A sketch of a linear relation may have one, two, or an infi nite number of intercepts. A line that represents an axis has an infi nite number of intercepts with that axis. A horizontal or vertical line that does not represent an axis has only one intercept.
Chapter 7
Check Your Understanding
Practise
1. Jasmine was asked to convert the equation y = - 3 _ 2 x + 4 to general form. Her work is shown.
Identify Jasmine's error. Then, correct her work.
2. Express each equation in general form, Ax + By + C = 0.
a) y = 7x - 5
b) y = -x + 8
c) y = 3 _ 2 x + 4
d) y = - 3 _ 5 x - 2
e) y = 0.25x - 0.3
f) y = - 5 _ 2 x + 1 _ 8
3. Determine the intercepts of each line. Then, graph the line.
a) 2x + y - 9 = 0
b) 4x - y - 8 = 0
c) x - 2y + 10 = 0
e) 4x + 5y + 6 = 0
d) 3x - 8y - 24 = 0
f) x = 4
g) y = 0
h) 4x - 12 = 0
4. For each line, state the domain, range, intercepts, and slope. What is the equation of each line, in general form?
366 MHR •Chapter 7
5. Graph each line using the given intercepts. What is the equation of each line?
a) an x-intercept of 3 and no y-intercept
b) a y-intercept of -5 and no x-intercept
c) an infi nite number of x-intercepts
d) an infi nite number of y-intercepts
6. Match each equation with a line labelled in the fi gure.
a) 3x + 4y = 12
b) x = 4
c) 3x - 4y = 12
d) y - 3 = 0
e) 3x - 4y + 12 = 0
f) y = -3
g) 3x + 4y + 12 = 0
h) x + 4 = 0
Apply
7. Write an equation, in general form, for each line described.
a) a vertical line passing through the point (3, 5)
b) a horizontal line passing through the point (-2, 6)
c) the x-axis
d) the y-axis
8. Write an equation, in general form, of a line that does not have a y-intercept and passes through the point (3, 6).
9. Having fi bre in your diet helps with digestion, heart health, and maintaining a healthy weight. Courtney wants to increase her fi bre intake by 21 g per day. She plans to do this by adding bran buds and one vegetable to her diet each day. Write an equation in general form that describes this situation. Courtney mixes 125 mL of bran buds in her cereal each day. What volume of green peas would she need to eat during the day? What volume of baked beans would she need to eat? Express your answers in whole millilitres.
10. An airplane fl ies directly from Saskatoon, SK, to Vancouver, BC. The graph shows the relationship between the distance from Vancouver, d, in kilometres, and the fl ying time, t, in hours.
a) State the intercepts of the line segment. What does each intercept represent?
b) State a suitable domain and range of the graph.
c)
Determine the slope of the line. What does the slope represent?
d) Write the equation of <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://mrsdildy.com/wp-content/uploads/2012/03/7-2.pdf\n</url>\n<text>\nFocus on …\n\n* converting a linear equation to general form\n* using intercepts to graph a line\n* relating the intercepts of a graph to the situation\n* solving problems using equations in general form\n\nMaterials\n\n* bottle of water\n* stopwatch\n* grid paper and ruler or graphing technology\n\nGeneral Form\n\nThe slope-intercept form of an equation is one of the most common ways to write the equation of a line. Suppose you place a transparent grid on the Canadian fl ag. Most, but not all, of the line segments in the fl ag could be expressed as equations in slope-intercept form. Can you think of a type of line that cannot be expressed in the form y = mx + b? In this section, you will explore a general way of writing the equation of any line.\n\nInvestigate Intercepts and General Form\n\nLeora quenches her thirst after a soccer game by drinking a large glass of water at a constant rate. The straight-line graph on the following page shows how the volume of water in the glass changes with time.\n\ngeneral form\n\n* the equation of a line in the form Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number. This means that A will always be positive.\n\nx-intercept\n\n* the x-coordinate of the point where a line or curve crosses the x-axis\n* the value of x when y = 0\n\n358 MHR •Chapter 7\n\n1. Identify the domain and range in this situation.\n2. Identify the slope of the line segment. What does the sign of the slope mean? What does the slope represent?\n3. What is the y-intercept of the line segment? What does the y-intercept represent?\n4. a) What is the equation of the line in slope-intercept form?\nb) Rearrange the terms in the equation so that the right side is zero. This is the general form of an equation.\n5. a) Identify the x-intercept of the line. What does the x-intercept represent?\nb) Write the coordinates of the x-intercept and the y-intercept.\n6. Time yourself while drinking a 500-mL bottle of water slowly at a constant rate.\na) Sketch a straight-line graph to show how the volume of water remaining in the bottle changes with time.\nb) Compare your graph to Leora's graph. How can you tell who drank more, who fi nished fi rst, and who drank at a faster rate?\nc) Write the equation of your graph in both slope-intercept form and general form.\n\nRefl ect and Respond\n\na) Recall that a point on a line satisfi es the equation of the line. Are the x-intercept and y-intercept points on the line?\nb) When asked to determine the x-intercept, what coordinate value do you always know? When asked to determine the y-intercept, what coordinate value do you always know? How can you use this information to help you determine the x-intercept or y-intercept?\nc) Describe strategies for determining the y-intercept and x-intercept of a line if the equation is given in general form.\nd) Create two linear equations. Then, identify the y-intercept and x-intercept of each line. Use graphing technology to check your answers.\n8. What form is the equation x - 5 = 0 expressed in? Can you write the equation in another form? Explain.\n\n7.\n\nLink the Ideas\n\nThe general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.\n\nYou can convert a linear equation from one form to another by applying the rules of algebra.\n\nThe x-intercept of a line is the x-coordinate of the point where the line crosses the x-axis. The y-intercept is the y-coordinate of the point where the line crosses the y-axis. To sketch a linear equation, you can draw a line joining the intercepts, (x, 0) and (0, y).\n\nThe line in the graph below has an x-intercept of 1 and a y-intercept of 2.\n\nExample 1 Convert an Equation to General Form\n\nRewrite the equation y = - 2 _ 3 x + 6 in general form, Ax + By + C = 0.\n\nSolution\n\nWhy are both sides multiplied by 3?\n\n2x +3y -18=0\n\nThe equation written in general form is 2x + 3y - 18 = 0.\n\nYour Turn\n\nRewrite the equation y = 3 _ 4 x - 2 in general form.\n\n360 MHR •Chapter 7\n\nExample 2 Sketch a Graph Using Intercepts\n\nFor the linear equation 2x - 3y - 6 = 0, a)\n\nstate the x-\n\nintercept of a graph of the equation\n\nb) state the y-intercept\nc) use the intercepts to graph the line\n\nSolution.\n\na) To determine the x-intercept, substitute y = 0. Then, solve for x\n\nWhy do you substitute x = 0 to fi nd the y-intercept?\n\nThe x-intercept is 3. So, the line crosses the x-axis at the point (3, 0).\n\nb) To determine the y-intercept, substitute x = 0. Solve for y.\n\nThe y-intercept is -2. The line crosses the y-axis at the point (0, -2).\n\nc) Locate the points (3, 0) and (0, -2) on the grid. Then, draw a line passing through these points.\n\nHow else could you graph an equation given in general form?\n\nYour Turn\n\nConsider the linear equation 4x + 5y - 20 = 0.\n\na) What is the x-intercept of a graph of the equation?\nb) What is the y-intercept?\nc) Use the intercepts to graph the line.\n\nExample 3 Identify Intercepts of Horizontal or Vertical Lines\n\nSketch each linear relation and identify the intercepts. Then, state the domain and range.\n\na) y -3=0\n\nb) x +4.5\n\nc) y =0\n\nSolution\n\na) The equation y - 3 = 0 can be written in slope-intercept form as y = 0x + 3.\n\nThe graph is a horizontal line with slope zero.\n\nThe line crosses the y-axis at the point (0, 3).\n\nWhat would the values in a table representing this equation show?\n\nThe y-intercept is 3. There is no x-intercept.\n\nThe domain of the liney -3=0 is {x ∈R}.\n\nThe range of the line is {3}.\n\nb) The equationx +4.5=\n\n0 expressed in general form is\n\nx +0y +4.5=0. The coeffi cient ofyis zero.\n\nThe value ofxis always-4.5.\n\nThe graph is a vertical line and crosses the x-axis at (-4.5, 0).\n\nThe x-intercept is -4.5. There is no y-intercept.\n\nThe domain of the linex +4.5=0 is {-4.5}.\n\nThe range of the line is {y ∈ R}.\n\n0 =\n\n362 MHR •Chapter 7\n\nc) The equation y = 0 is a horizontal line, which represents the entire x-axis. The graph always intersects the x-axis. Therefore, there are an infi nite number of x-intercepts. The y-intercept is 0. The domain of the line y = 0 is {x ∈ R}. The range of the line is {0}.\n\nWhat do the coordinates of points on this line have in common?\n\nYour Turn\n\nSketch each linear relation and identify the intercepts. What are the domain and range for each relation?\n\na) x -3=0\n\nb) x =0\n\nc) y + 2 = 0\n\nExample 4 Interpret Intercepts\n\nSpencer has 66 GB of disk space left on his laptop to fi ll with television shows and movies that he purchases on-line.\n\na) Suppose a one-hour show uses 1.1 GB of disk space and a movie uses 4.4 GB. Write a linear equation that represents the number of\n\ntelevision shows,T, and movies,M\n\n, that Spencer can store on his laptop.\n\nb) Determine the T-intercept of a graph of the linear equation. What does the T-intercept represent?\nc) What would the M-intercept be? What does the M-intercept represent?\nd) If Spencer stores 16 television shows, how many movies does he have space for?\n\nSolution\n\na) The equation is 1.1T + 4.4M = 66. Simplify the equation.\n\nWhat does each term represent?\n\nWrite the coeffi cient ofTas a whole number.\n\n11T +44M =660\n\nReduce the equation to lowest terms.\n\nT +4M =60\n\nHow else could you reduce the original equation to lowest terms with the coeffi cient of T as a whole number?\n\nThe equation T + 4M = 60 represents the number of television shows and movies that Spencer can store on his laptop.\n\nb) To determine the T-intercept, substitute M = 0. Solve for T.\n\nT +4M =60\n\nT +4(0) =60\n\nT =60\n\nThe T-intercept is 60. So, if Spencer stores no movies, he can store 60 television shows.\n\nc) To determine the M-intercept, substitute T = 0. Solve for M.\n\nT +4M =60\n\n0 +4M =60\n\nM =15\n\nThe M-intercept is 15. So, Spencer can store 15 movies if he does not store any television shows.\n\nd) Substitute T = 16 and solve for M.\n\nT +4M =60\n\n16 4 + M\n\n4M\n\n=60\n\n=44\n\nM =11\n\nSpencer has space on his laptop for 11 movies.\n\nYour Turn\n\nBrooke wants to save $336 to decorate her bedroom. She has two part-time jobs. On weekends, she works as a snowboard instructor and earns $12 per hour. On weeknights, she earns $16 per hour working as a high-school tutor.\n\na) Write an equation to represent the number of hours Brooke needs to work as a snowboard instructor, S, and as a tutor, T.\nb) What is the S-intercept of a graph of the equation? What does the S-intercept represent?\nc) What would the T-intercept be? What does it represent?\nd) Suppose Brooke works 8 h as a snowboard instructor. How many hours will she need to work as a tutor?\n\n364 MHR •\n\nKey Ideas\n\n* The general form of a linear equation is Ax + By + C = 0, where A, B, and C are real numbers, and A and B are not both zero. By convention, A is a whole number.\n* To graph an equation in general form, determine the intercepts, then draw a line joining the intercepts; or convert to slope-intercept form.\n* To determine the x-intercept, substitute y = 0 and solve. To determine the y-intercept, substitute x = 0 and solve.\n* A sketch of a linear relation may have one, two, or an infi nite number of intercepts. A line that represents an axis has an infi nite number of intercepts with that axis. A horizontal or vertical line that does not represent an axis has only one intercept.\n\nChapter 7\n\nCheck Your Understanding\n\nPractise\n\n1. Jasmine was asked to convert the equation y = - 3 _ 2 x + 4 to general form. Her work is shown.\n\nIdentify Jasmine's error. Then, correct her work.\n\n2. Express each equation in general form, Ax + By + C = 0.\na) y = 7x - 5\nb) y = -x + 8\nc) y = 3 _ 2 x + 4\nd) y = - 3 _ 5 x - 2\ne) y = 0.25x - 0.3\nf) y = - 5 _ 2 x + 1 _ 8\n3. Determine the intercepts of each line. Then, graph the line.\na) 2x + y - 9 = 0\nb) 4x - y - 8 = 0\nc) x - 2y + 10 = 0\ne) 4x + 5y + 6 = 0\nd) 3x - 8y - 24 = 0\nf) x = 4\ng) y = 0\nh) 4x - 12 = 0\n4. For each line, state the domain, range, intercepts, and slope. What is the equation of each line, in general form?\n\n366 MHR •Chapter 7\n\n5. Graph each line using the given intercepts. What is the equation of each line?\na) an x-intercept of 3 and no y-intercept\nb) a y-intercept of -5 and no x-intercept\nc) an infi nite number of x-intercepts\nd) an infi nite number of y-intercepts\n6. Match each equation with a line labelled in the fi gure.\na) 3x + 4y = 12\nb) x = 4\nc) 3x - 4y = 12\nd) y - 3 = 0\ne) 3x - 4y + 12 = 0\nf) y = -3\ng) 3x + 4y + 12 = 0\nh) x + 4 = 0\n\nApply\n\n7. Write an equation, in general form, for each line described.\na) a vertical line passing through the point (3, 5)\nb) a horizontal line passing through the point (-2, 6)\nc) the x-axis\nd) the y-axis\n8. Write an equation, in general form, of a line that does not have a y-intercept and passes through the point (3, 6).\n9. Having fi bre in your diet helps with digestion, heart health, and maintaining a healthy weight. Courtney wants to increase her fi bre intake by 21 g per day. She plans to do this by adding bran buds and one vegetable to her diet each day. Write an equation in general form that describes this situation. Courtney mixes 125 mL of bran buds in her cereal each day. What volume of green peas would she need to eat during the day? What volume of baked beans would she need to eat? Express your answers in whole millilitres.\n10. An airplane fl ies directly from Saskatoon, SK, to Vancouver, BC. The graph shows the relationship between the distance from Vancouver, d, in kilometres, and the fl ying time, t, in hours.\na) State the intercepts of the line segment. What does each intercept represent?\nb) State a suitable domain and range of the graph.\nc)\nDetermine the slope of the line. What does the slope represent?\nd) Write the equation of <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "the line in general form.",
"role": "assistant"
}
] |
|
2
1
User Engagement in Research Data Curation
Luis Martinez-Uribe 1 , Stuart Macdonald 2,
University of Oxford, e-Research Centre, 7 Keble Road, Oxford OX1 3QG, UK
[email protected]
University of Edinburgh, EDINA, 160 Causewayside, Edinburgh, EH9 1PR, Scotland [email protected]
Abstract. In recent years information systems such as digital repositories, built to support research practice, have struggled to encourage participation partly due to inadequate analysis of the requirements of the user communities. This paper argues that engagement of users in research data curation through an understanding of their processes, constraints and culture is a key component in the development of the data repositories that will ultimately serve them. In order to maximize the effectiveness of such technologies curation activities need to start early in the research lifecycle and therefore strong links with researchers are necessary. Moreover, this paper promotes the adoption of a pragmatic approach with the result that the use of open data as a mechanism to engage researchers may not be appropriate for all disciplinary research environments.
Keywords: digital curation, research data management, open data, digital repository services, user engagement
1 Introduction
Research methods and practice, including scholarly communication, are experiencing a radical transformation in the digital age. New tools and infrastructures make possible the generation of digital research data outputs as well as new ways to use, share and reuse them. There is a growing acceptance of the importance of curating research data in order to preserve them and make them re-usable for future generations with libraries, computing services and other service units within academic institutions working together to develop digital repositories to curate this type of research output.
We believe that engagement with researchers, the user communities in this case, is crucial in order to develop systems that will meet their needs. Whilst some argue that open data is the way forward, it is not clear that it will help engage researchers with digital curation activities. Thus this paper will attempt to answer the following research questions:
Is open data the correct concept to engage the research community? What other methods can be used to facilitate engagement in data curation?
2 Open Access Repositories and Researchers' Requirements – A Balancing Act
Open Access (OA) enthusiasts have written about the inevitability of 24 hours a day and 7 days a week access to all research papers and their citations "for free, for all and forever." [1] Primarily led by technological developments, the increase in the overall volume of research, the increasing uncertainty about content preservation and by the strong dissatisfaction of academic libraries subjected to constant increase of journal subscription prices, digital repositories were built and employed within research institutions far and wide [2]. Being content provider as well as user and reuser of these information systems, researchers can be regarded as the key user community. Nonetheless, it has been argued no formal detailed requirements analysis has taken place in order to identify and address researchers' needs and concerns related to such scholarly communication systems [3]. As a result the user community has been overlooked in the developmental phases of technology design and implementation of the information system ultimately meant to serve them. Arguably the repository infrastructure developed was not, in most cases, built to address researchers' needs but those of libraries' and librarians. This has led to a struggle to find ways to populate repositories with researchers' output. In recent times there have been an increase in the number of institutional and research funders OA mandates, the knock-on effect from which will see the requirement of significant investment in awareness raising activities in order to highlight the benefits to researchers of using and depositing research materials in such repository systems. Such a process may have been expedited had the library and research worlds been more closely involved in a more agile digital repository design and development with an iterative requirements phase.
3 Research Data Repositories - Learning From Experience
When it comes to the research data setting we have to approach the problem from a new perspective. We have to evolve and learn from previous experiences in order to develop repository services capable of dealing with the management and curation of research data by addressing researchers' needs.
Although open data is becoming a widely used term, there is not a consistent formalisation of the concept. Murray-Rust [4] suggests that the concept of open source software can be extended to that of open data in that data should be freely available for re-use and modification without restriction. The virtues of 'Open Data' have been praised and evangelized by many since OECD's declaration back in 2003 [5] however many research communities are currently not in a position to make their data available on those terms.
The JISC-funded DISC-UK DataShare project explored a number of technical, legal and cultural issues surrounding research data in repository environments. It built on the existing collaboration of data librarians and data managers from the
Universities of Edinburgh, Oxford, Southampton and LSE and investigated mechanisms for ingesting and sharing research data in existing institutional repository systems for those researchers willing to openly share them. Project partners identified a number of barriers pertaining to the researcher and the research setting that would impact on data sharing [6], including:
* Reluctance to forfeit valuable research time to prepare datasets for deposit, e.g. anonymisation, codebook creation, formatting
* Concerns over making data available to others before it has been fully exploited
* Concerns that data might be misused or misinterpreted, e.g. by non-academic users such as journalists
* Concerns over loss of ownership, commercial or competitive advantage
* Unwillingness to change working practices
* Concerns that repositories will not continue to exist over time
* Uncertainty about ownership of IPR
* Concerns over confidentiality and data protection
It may be argued that open data is a reality in some disciplines: in crystallography there are a number of established repositories including the Cambridge Crystallographic Data Centre and Crystallography.net with further discussions taking place about a federation of crystallography data repositories [7]. Molecular biologists have been sharing data through repositories like the Protein Data Bank (PDB) since the seventies [8] and geneticists have also been sharing nucleotide sequences through GenBank from the early eighties [9]. These are great examples of communities embracing the benefits of open data but it is important to highlight that these initiatives were lead by visionary researchers in those fields. There is an interesting analogy with domain specific publication repositories like arXiv or RePEc. They represented successful examples of author self-archiving repositories but this didn't translate in wide acceptance and use of open access repositories.
4 Different Approaches - Researchers' Needs Connecting Data Management and Curation
A more research inclusive and bottom up approach has been taken by data and information management activities in the Universities of Edinburgh and Oxford in order to understand better how researchers work, what are the drivers behind their information management and sharing activities and what services they require.
At Edinburgh a team of social scientists and information service specialists (respectively, from the Institute for the Study of Science, Technology and Innovation, and from Information Services at the University of Edinburgh and the Digital Curation Centre) are carrying out a RIN-funded study designed to enhance understanding of how researchers in the life sciences locate, evaluate, manage, transform and communicate information as part their research processes, in order to identify how information-related policy and practice might be improved to better meet the needs of researchers. Information diaries were completed by over 50 life-science researchers from eight sub-disciplinary research groups. An interview schedule was constructed in order to investigate further the findings from the diaries. 24 interviews were conducted across the groups followed by focus-group discussions. An in-depth study was also employed on one of the groups. Interim findings suggests that some disciplines lend themselves more than others to open data and that there's much variety, specificity and complexity in terms of research data within the examined groups. Research data created via models/simulations, observations, and experiments are intrinsically linked with the data collection methodologies and instrumentation and as such may be better placed within a Virtual Research Environment (VRE) and/or a staging repository-type environment [10] as there are often issues surrounding the unraveling of data content when sophisticated and domain-specific proprietary systems are used. In addition, certain data cannot be considered conventionally open for example: data controversial by nature (stem cell data, brain scans); data received from industrial partners, licensed data products and the ensuing derived data products, data leading to development of patents or commercial products. Other findings include:
* Most life science researchers spend much of their time searching for and organising data however data curation and/or sharing only becomes crucial to them at certain stages of the research process.
* There is an implicit feeling across the groups surveyed that only the researchers themselves have the subject knowledge necessary to curate their own research data.
* The groups investigated lack any obvious or explicitly appointed data/information managers, leaving individuals to manage their own information/data in a nonformal fashion.
* Researchers in the life sciences express a keen sense of 'ownership' and protectiveness towards their data. However there is confusion or uncertainty about their rights with respect to data ownership
In Oxford an internal scoping study [11] on research data curation took place throughout 2008 and involved the Office of the Director of IT, Computing Services, the Library and the Oxford e-Research Centre. The aim of the study was to capture the requirements for digital repository services to manage and curate research data. A requirements gathering exercise took place and around 40 researchers across disciplines were interviewed to find out about their data management practices and capture their requirements for services to help them manage data. The findings from this exercise showed that the vast majority of researchers felt that there were potential services that could help them. The following scenarios present some of the challenges, found during the scoping study, that researchers are facing with their data and represent the types of needs that data repository services should be trying to address:
* In some cases, researchers had generated data several years ago and now could not make sense of them as they had not kept enough information on how the data was created in the first place;
* In scientific disciplines research groups require secure storage for their large volume of data generated by instruments such as electronic microscopes or by computing simulations run in GRID systems;
* Many clinical research centres compiling data for decades and spending months to migrate data formats in order to avoid format obsolescence;
* In many cases researchers want to make their articles' accompanying data available online in a sustainable way and they do not have the institutional infrastructure to do this so they published the data on their departmental website.
The scoping study is now being followed up by the JISC funded Embedding Institutional Data Curation Services in Research (EIDCSR) project. This project will attempt to address the data management and curation requirements of two research groups who produce and share data. EIDCSR involves the partners of the scoping study with Research Services and IBM to integrate research workflows with the Fedora Digital Asset Management System, long-term file storage and underpinning these efforts with policy development and economic models. A key aspect of this project will be the possibility to work with researchers from the moment they generate the data, this will ensure that the necessary and appropriate curation actions are taken early in the research lifecycle.
Oxford and Edinburgh are also both involved in the development of the Data Audit Framework 1 (DAF) which helps to establish relationships with research communities around the issues of data curation. This methodology provides organisations with the means to identify, locate, describe and assess how they are managing their research data. The methodology goes some way to enabling data auditors to identify and engage researchers regarding their research data holdings. It also provides information professionals who wish to extend their support for research data within the university community with a vehicle for engaging with researchers in addition to a focus for discussion of data curation practices. This may manifest itself through local data management training exercises to equip researchers with the skills and tools to deal with funders' data management and sharing policies. Indeed, the Edinburgh Data Audit Implementation Project [12] states that 'staff had numerous comments and suggestions for improvement of data management at different levels indicating an awareness of the issues, even where it has not been made a priority to address.'
Engagement with researchers through the activities explained above provides a valuable insight into the research process at the various stages in its lifecycle. Such activities help to gain the trust of the researchers facilitating the process of data curation within data repositories at a point early on in the research lifecycle, a fundamental key to the success of these information systems. In addition to gaining the trust of the researcher such engagement offers the opportunity to acquire the researcher's own thoughts, feelings and expectations as to how information services, policies and technologies may shape the future. Issues, such as who the technology is for, how it fits in with researchers' practices or what the purpose of the technology is, require prior consultation with those with a vested interest in the technology.
1 Project led by HATII, University of Glasgow - http://www.data-audit.eu/
5 Discussion and Conclusion
In this paper we attributed the lack of researcher engagement with OA publication repositories to the fact that the main drivers behind their development were somehow distant from current research needs. This, we argue may be due to the lack of an appropriate iterative requirements analysis involving the main user community.
Research data repositories pose similar challenges. Our experience has shown that using open data as a message to engage researchers in curation activities makes it easy to become detached from current research needs in many disciplines. The heterogeneity of research practices and their datasets, some of which cannot be openly shared provides further evidence of the importance in understanding and appreciating the requirements from the different research communities. Moreover, we believe that the curation of research data requires trusted relationships achieved by working and conversing with researchers early on in their research process. This paper presents approaches from both Edinburgh and Oxford which try to articulate and understand how researchers work with data and information, the barriers they find and their priorities for services required to assist them. We argue that failure to engage with the specific needs of researchers through these initiatives, may lead to the development of data repository services that are under-exploited or indeed may not even be used.
Further work on user engagement in data curation should be pursued to explore connections with other areas such as data citation and the academic reward system, data management tools, business models as well as institutional and funders' policies.
References
1. Harnard, S.: For whom the gate tolls? How and why to free the referred research literature online through author/institution self-archiving now (2001) http://cogprints.org/1639/
2. Raym, C.: The case for institutional repositories: a SPARC position paper (2002)
3. Salo, D.: Innkeeper at the Roach Motel. Library Trends Vol. 57 No. 2 (2008)
4. Murray-Rust, P.: Open Data in science. In Nature Proceedings (2008)
5. OECD: OECD Principles and guidelines for access to research data from public funding. Paris (2007) http://www.oecd.org/dataoecd/9/61/38500813.pdf
6. Gibbs, H.: DISC-UK DataShare: State of the art review (2007) http://www.disc-uk.org/docs/state-of-the-art-review.pdf
7. Lyon, L. Coles, S., Duke, M. and Koch, T.: Scaling up: towards a federation of crystallography data repositories (2008) http://eprints.soton.ac.uk/51263/
8. Berman, H.M.: The protein Data Bank: a historical perspective. Acta Crystallographica 8895 (2008)
9. Benton, D.: Recent Changes in the GenBank online service. Nucleic Acid Research Vol. 18 No.6 (1990)
10.Steinhart, G.:DataStaR, a data staging repository for digital research data (2008) http://www.dcc.ac.uk/events/dcc-2008/programme/posters/DataStaR.pdf
11.Martinez-Uribe, L.: Findings of the scoping study and research data management workshop (2008) http://tinyurl.com/55fxgw
12. Ekmekcioglu, Ç. and Rice, R.: Edinburgh data audit implementation project: Final report (2009) http://ie-repository.jisc.ac.uk/283/
|
<urn:uuid:b6ffc2e3-a375-4de4-97df-a765835a6584>
|
CC-MAIN-2022-49
|
https://era.ed.ac.uk/bitstream/handle/1842/3206/Martinez_Macdonald_ECDL09.pdf;jsessionid=A94531D3B0641CC92A39A255A4084089?sequence=1
|
2022-12-02T03:32:26+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-49/subset=warc/part-00094-a0906200-461b-4808-9b94-6c53daf73f61.c000.gz.parquet
| 275,013,053
| 3,411
|
eng_Latn
|
eng_Latn
| 0.994488
|
eng_Latn
| 0.996211
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2399,
5443,
9695,
12133,
14974,
18142
] |
2
1
User Engagement in Research Data Curation
Luis Martinez-Uribe 1 , Stuart Macdonald 2,
University of Oxford, e-Research Centre, 7 Keble Road, Oxford OX1 3QG, UK
[email protected]
University of Edinburgh, EDINA, 160 Causewayside, Edinburgh, EH9 1PR, Scotland [email protected]
Abstract. In recent years information systems such as digital repositories, built to support research practice, have struggled to encourage participation partly due to inadequate analysis of the requirements of the user communities. This paper argues that engagement of users in research data curation through an understanding of their processes, constraints and culture is a key component in the development of the data repositories that will ultimately serve them. In order to maximize the effectiveness of such technologies curation activities need to start early in the research lifecycle and therefore strong links with researchers are necessary. Moreover, this paper promotes the adoption of a pragmatic approach with the result that the use of open data as a mechanism to engage researchers may not be appropriate for all disciplinary research environments.
Keywords: digital curation, research data management, open data, digital repository services, user engagement
1 Introduction
Research methods and practice, including scholarly communication, are experiencing a radical transformation in the digital age. New tools and infrastructures make possible the generation of digital research data outputs as well as new ways to use, share and reuse them. There is a growing acceptance of the importance of curating research data in order to preserve them and make them re-usable for future generations with libraries, computing services and other service units within academic institutions working together to develop digital repositories to curate this type of research output.
We believe that engagement with researchers, the user communities in this case, is crucial in order to develop systems that will meet their needs. Whilst some argue that open data is the way forward, it is not clear that it will help engage researchers with digital curation activities. Thus this paper will attempt to answer the following research questions:
Is open data the correct concept to engage the research community? What other methods can be used to facilitate engagement in data curation?
2 Open Access Repositories and Researchers' Requirements – A Balancing Act
Open Access (OA) enthusiasts have written about the inevitability of 24 hours a day and 7 days a week access to all research papers and their citations "for free, for all and forever." [1] Primarily led by technological developments, the increase in the overall volume of research, the increasing uncertainty about content preservation and by the strong dissatisfaction of academic libraries subjected to constant increase of journal subscription prices, digital repositories were built and employed within research institutions far and wide [2]. Being content provider as well as user and reuser of these information systems, researchers can be regarded as the key user community. Nonetheless, it has been argued no formal detailed requirements analysis has taken place in order to identify and address researchers' needs and concerns related to such scholarly communication systems [3]. As a result the user community has been overlooked in the developmental phases of technology design and implementation of the information system ultimately meant to serve them. Arguably the repository infrastructure developed was not, in most cases, built to address researchers' needs but those of libraries' and librarians. This has led to a struggle to find ways to populate repositories with researchers' output. In recent times there have been an increase in the number of institutional and research funders OA mandates, the knock-on effect from which will see the requirement of significant investment in awareness raising activities in order to highlight the benefits to researchers of using and depositing research materials in such repository systems. Such a process may have been expedited had the library and research worlds been more closely involved in a more agile digital repository design and development with an iterative requirements phase.
3 Research Data Repositories - Learning From Experience
When it comes to the research data setting we have to approach the problem from a new perspective. We have to evolve and learn from previous experiences in order to develop repository services capable of dealing with the management and curation of research data by addressing researchers' needs.
Although open data is becoming a widely used term, there is not a consistent formalisation of the concept. Murray-Rust [4] suggests that the concept of open source software can be extended to that of open data in that data should be freely available for re-use and modification without restriction. The virtues of 'Open Data' have been praised and evangelized by many since OECD's declaration back in 2003 [5] however many research communities are currently not in a position to make their data available on those terms.
The JISC-funded DISC-UK DataShare project explored a number of technical, legal and cultural issues surrounding research data in repository environments. It built on the existing collaboration of data librarians and data managers from the
Universities of Edinburgh, Oxford, Southampton and LSE and investigated mechanisms for ingesting and sharing research data in existing institutional repository systems for those researchers willing to openly share them. Project partners identified a number of barriers pertaining to the researcher and the research setting that would impact on data sharing [6], including:
* Reluctance to forfeit valuable research time to prepare datasets for deposit, e.g. anonymisation, codebook creation, formatting
* Concerns over making data available to others before it has been fully exploited
* Concerns that data might be misused or misinterpreted, e.g. by non-academic users such as journalists
* Concerns over loss of ownership, commercial or competitive advantage
* Unwillingness to change working practices
* Concerns that repositories will not continue to exist over time
* Uncertainty about ownership of IPR
* Concerns over confidentiality and data protection
It may be argued that open data is a reality in some disciplines: in crystallography there are a number of established repositories including the Cambridge Crystallographic Data Centre and Crystallography.net with further discussions taking place about a federation of crystallography data repositories [7]. Molecular biologists have been sharing data through repositories like the Protein Data Bank (PDB) since the seventies [8] and geneticists have also been sharing nucleotide sequences through GenBank from the early eighties [9]. These are great examples of communities embracing the benefits of open data but it is important to highlight that these initiatives were lead by visionary researchers in those fields. There is an interesting analogy with domain specific publication repositories like arXiv or RePEc. They represented successful examples of author self-archiving repositories but this didn't translate in wide acceptance and use of open access repositories.
4 Different Approaches - Researchers' Needs Connecting Data Management and Curation
A more research inclusive and bottom up approach has been taken by data and information management activities in the Universities of Edinburgh and Oxford in order to understand better how researchers work, what are the drivers behind their information management and sharing activities and what services they require.
At Edinburgh a team of social scientists and information service specialists (respectively, from the Institute for the Study of Science, Technology and Innovation, and from Information Services at the University of Edinburgh and the Digital Curation Centre) are carrying out a RIN-funded study designed to enhance understanding of how researchers in the life sciences locate, evaluate, manage, transform and communicate information as part their research processes, in order to identify how information-related policy and practice might be improved to better meet the needs of researchers. Information diaries were completed by over 50 life-science researchers from eight sub-disciplinary research groups. An interview schedule was constructed in order to investigate further the findings from the diaries. 24 interviews were conducted across the groups followed by focus-group discussions. An in-depth study was also employed on one of the groups. Interim findings suggests that some disciplines lend themselves more than others to open data and that there's much variety, specificity and complexity in terms of research data within the examined groups. Research data created via models/simulations, observations, and experiments are intrinsically linked with the data collection methodologies and instrumentation and as such may be better placed within a Virtual Research Environment (VRE) and/or a staging repository-type environment [10] as there are often issues surrounding the unraveling of data content when sophisticated and domain-specific proprietary systems are used. In addition, certain data cannot be considered conventionally open for example: data controversial by nature (stem cell data, brain scans); data received from industrial partners, licensed data products and the ensuing derived data products, data leading to development of patents or commercial products. Other findings
|
include:
* Most life science researchers spend much of their time searching for and organising data however data curation and/or sharing only becomes crucial to them at certain stages of the research process.
|
* There is an implicit feeling across the groups surveyed that only the researchers themselves have the subject knowledge necessary to curate their own research data.
* The groups investigated lack any obvious or explicitly appointed data/information managers, leaving individuals to manage their own information/data in a nonformal fashion.
* Researchers in the life sciences express a keen sense of 'ownership' and protectiveness towards their data. However there is confusion or uncertainty about their rights with respect to data ownership
In Oxford an internal scoping study [11] on research data curation took place throughout 2008 and involved the Office of the Director of IT, Computing Services, the Library and the Oxford e-Research Centre. The aim of the study was to capture the requirements for digital repository services to manage and curate research data. A requirements gathering exercise took place and around 40 researchers across disciplines were interviewed to find out about their data management practices and capture their requirements for services to help them manage data. The findings from this exercise showed that the vast majority of researchers felt that there were potential services that could help them. The following scenarios present some of the challenges, found during the scoping study, that researchers are facing with their data and represent the types of needs that data repository services should be trying to address:
* In some cases, researchers had generated data several years ago and now could not make sense of them as they had not kept enough information on how the data was created in the first place;
* In scientific disciplines research groups require secure storage for their large volume of data generated by instruments such as electronic microscopes or by computing simulations run in GRID systems;
* Many clinical research centres compiling data for decades and spending months to migrate data formats in order to avoid format obsolescence;
* In many cases researchers want to make their articles' accompanying data available online in a sustainable way and they do not have the institutional infrastructure to do this so they published the data on their departmental website.
The scoping study is now being followed up by the JISC funded Embedding Institutional Data Curation Services in Research (EIDCSR) project. This project will attempt to address the data management and curation requirements of two research groups who produce and share data. EIDCSR involves the partners of the scoping study with Research Services and IBM to integrate research workflows with the Fedora Digital Asset Management System, long-term file storage and underpinning these efforts with policy development and economic models. A key aspect of this project will be the possibility to work with researchers from the moment they generate the data, this will ensure that the necessary and appropriate curation actions are taken early in the research lifecycle.
Oxford and Edinburgh are also both involved in the development of the Data Audit Framework 1 (DAF) which helps to establish relationships with research communities around the issues of data curation. This methodology provides organisations with the means to identify, locate, describe and assess how they are managing their research data. The methodology goes some way to enabling data auditors to identify and engage researchers regarding their research data holdings. It also provides information professionals who wish to extend their support for research data within the university community with a vehicle for engaging with researchers in addition to a focus for discussion of data curation practices. This may manifest itself through local data management training exercises to equip researchers with the skills and tools to deal with funders' data management and sharing policies. Indeed, the Edinburgh Data Audit Implementation Project [12] states that 'staff had numerous comments and suggestions for improvement of data management at different levels indicating an awareness of the issues, even where it has not been made a priority to address.'
Engagement with researchers through the activities explained above provides a valuable insight into the research process at the various stages in its lifecycle. Such activities help to gain the trust of the researchers facilitating the process of data curation within data repositories at a point early on in the research lifecycle, a fundamental key to the success of these information systems. In addition to gaining the trust of the researcher such engagement offers the opportunity to acquire the researcher's own thoughts, feelings and expectations as to how information services, policies and technologies may shape the future. Issues, such as who the technology is for, how it fits in with researchers' practices or what the purpose of the technology is, require prior consultation with those with a vested interest in the technology.
1 Project led by HATII, University of Glasgow - http://www.data-audit.eu/
5 Discussion and Conclusion
In this paper we attributed the lack of researcher engagement with OA publication repositories to the fact that the main drivers behind their development were somehow distant from current research needs. This, we argue may be due to the lack of an appropriate iterative requirements analysis involving the main user community.
Research data repositories pose similar challenges. Our experience has shown that using open data as a message to engage researchers in curation activities makes it easy to become detached from current research needs in many disciplines. The heterogeneity of research practices and their datasets, some of which cannot be openly shared provides further evidence of the importance in understanding and appreciating the requirements from the different research communities. Moreover, we believe that the curation of research data requires trusted relationships achieved by working and conversing with researchers early on in their research process. This paper presents approaches from both Edinburgh and Oxford which try to articulate and understand how researchers work with data and information, the barriers they find and their priorities for services required to assist them. We argue that failure to engage with the specific needs of researchers through these initiatives, may lead to the development of data repository services that are under-exploited or indeed may not even be used.
Further work on user engagement in data curation should be pursued to explore connections with other areas such as data citation and the academic reward system, data management tools, business models as well as institutional and funders' policies.
References
1. Harnard, S.: For whom the gate tolls? How and why to free the referred research literature online through author/institution self-archiving now (2001) http://cogprints.org/1639/
2. Raym, C.: The case for institutional repositories: a SPARC position paper (2002)
3. Salo, D.: Innkeeper at the Roach Motel. Library Trends Vol. 57 No. 2 (2008)
4. Murray-Rust, P.: Open Data in science. In Nature Proceedings (2008)
5. OECD: OECD Principles and guidelines for access to research data from public funding. Paris (2007) http://www.oecd.org/dataoecd/9/61/38500813.pdf
6. Gibbs, H.: DISC-UK DataShare: State of the art review (2007) http://www.disc-uk.org/docs/state-of-the-art-review.pdf
7. Lyon, L. Coles, S., Duke, M. and Koch, T.: Scaling up: towards a federation of crystallography data repositories (2008) http://eprints.soton.ac.uk/51263/
8. Berman, H.M.: The protein Data Bank: a historical perspective. Acta Crystallographica 8895 (2008)
9. Benton, D.: Recent Changes in the GenBank online service. Nucleic Acid Research Vol. 18 No.6 (1990)
10.Steinhart, G.:DataStaR, a data staging repository for digital research data (2008) http://www.dcc.ac.uk/events/dcc-2008/programme/posters/DataStaR.pdf
11.Martinez-Uribe, L.: Findings of the scoping study and research data management workshop (2008) http://tinyurl.com/55fxgw
12. Ekmekcioglu, Ç. and Rice, R.: Edinburgh data audit implementation project: Final report (2009) http://ie-repository.jisc.ac.uk/283/
| 9,675
|
end_of_word
|
findings
|
remove_one_sentence
|
<url>
https://era.ed.ac.uk/bitstream/handle/1842/3206/Martinez_Macdonald_ECDL09.pdf;jsessionid=A94531D3B0641CC92A39A255A4084089?sequence=1
</url>
<text>
2
1
User Engagement in Research Data Curation
Luis Martinez-Uribe 1 , Stuart Macdonald 2,
University of Oxford, e-Research Centre, 7 Keble Road, Oxford OX1 3QG, UK
[email protected]
University of Edinburgh, EDINA, 160 Causewayside, Edinburgh, EH9 1PR, Scotland [email protected]
Abstract. In recent years information systems such as digital repositories, built to support research practice, have struggled to encourage participation partly due to inadequate analysis of the requirements of the user communities. This paper argues that engagement of users in research data curation through an understanding of their processes, constraints and culture is a key component in the development of the data repositories that will ultimately serve them. In order to maximize the effectiveness of such technologies curation activities need to start early in the research lifecycle and therefore strong links with researchers are necessary. Moreover, this paper promotes the adoption of a pragmatic approach with the result that the use of open data as a mechanism to engage researchers may not be appropriate for all disciplinary research environments.
Keywords: digital curation, research data management, open data, digital repository services, user engagement
1 Introduction
Research methods and practice, including scholarly communication, are experiencing a radical transformation in the digital age. New tools and infrastructures make possible the generation of digital research data outputs as well as new ways to use, share and reuse them. There is a growing acceptance of the importance of curating research data in order to preserve them and make them re-usable for future generations with libraries, computing services and other service units within academic institutions working together to develop digital repositories to curate this type of research output.
We believe that engagement with researchers, the user communities in this case, is crucial in order to develop systems that will meet their needs. Whilst some argue that open data is the way forward, it is not clear that it will help engage researchers with digital curation activities. Thus this paper will attempt to answer the following research questions:
Is open data the correct concept to engage the research community? What other methods can be used to facilitate engagement in data curation?
2 Open Access Repositories and Researchers' Requirements – A Balancing Act
Open Access (OA) enthusiasts have written about the inevitability of 24 hours a day and 7 days a week access to all research papers and their citations "for free, for all and forever." [1] Primarily led by technological developments, the increase in the overall volume of research, the increasing uncertainty about content preservation and by the strong dissatisfaction of academic libraries subjected to constant increase of journal subscription prices, digital repositories were built and employed within research institutions far and wide [2]. Being content provider as well as user and reuser of these information systems, researchers can be regarded as the key user community. Nonetheless, it has been argued no formal detailed requirements analysis has taken place in order to identify and address researchers' needs and concerns related to such scholarly communication systems [3]. As a result the user community has been overlooked in the developmental phases of technology design and implementation of the information system ultimately meant to serve them. Arguably the repository infrastructure developed was not, in most cases, built to address researchers' needs but those of libraries' and librarians. This has led to a struggle to find ways to populate repositories with researchers' output. In recent times there have been an increase in the number of institutional and research funders OA mandates, the knock-on effect from which will see the requirement of significant investment in awareness raising activities in order to highlight the benefits to researchers of using and depositing research materials in such repository systems. Such a process may have been expedited had the library and research worlds been more closely involved in a more agile digital repository design and development with an iterative requirements phase.
3 Research Data Repositories - Learning From Experience
When it comes to the research data setting we have to approach the problem from a new perspective. We have to evolve and learn from previous experiences in order to develop repository services capable of dealing with the management and curation of research data by addressing researchers' needs.
Although open data is becoming a widely used term, there is not a consistent formalisation of the concept. Murray-Rust [4] suggests that the concept of open source software can be extended to that of open data in that data should be freely available for re-use and modification without restriction. The virtues of 'Open Data' have been praised and evangelized by many since OECD's declaration back in 2003 [5] however many research communities are currently not in a position to make their data available on those terms.
The JISC-funded DISC-UK DataShare project explored a number of technical, legal and cultural issues surrounding research data in repository environments. It built on the existing collaboration of data librarians and data managers from the
Universities of Edinburgh, Oxford, Southampton and LSE and investigated mechanisms for ingesting and sharing research data in existing institutional repository systems for those researchers willing to openly share them. Project partners identified a number of barriers pertaining to the researcher and the research setting that would impact on data sharing [6], including:
* Reluctance to forfeit valuable research time to prepare datasets for deposit, e.g. anonymisation, codebook creation, formatting
* Concerns over making data available to others before it has been fully exploited
* Concerns that data might be misused or misinterpreted, e.g. by non-academic users such as journalists
* Concerns over loss of ownership, commercial or competitive advantage
* Unwillingness to change working practices
* Concerns that repositories will not continue to exist over time
* Uncertainty about ownership of IPR
* Concerns over confidentiality and data protection
It may be argued that open data is a reality in some disciplines: in crystallography there are a number of established repositories including the Cambridge Crystallographic Data Centre and Crystallography.net with further discussions taking place about a federation of crystallography data repositories [7]. Molecular biologists have been sharing data through repositories like the Protein Data Bank (PDB) since the seventies [8] and geneticists have also been sharing nucleotide sequences through GenBank from the early eighties [9]. These are great examples of communities embracing the benefits of open data but it is important to highlight that these initiatives were lead by visionary researchers in those fields. There is an interesting analogy with domain specific publication repositories like arXiv or RePEc. They represented successful examples of author self-archiving repositories but this didn't translate in wide acceptance and use of open access repositories.
4 Different Approaches - Researchers' Needs Connecting Data Management and Curation
A more research inclusive and bottom up approach has been taken by data and information management activities in the Universities of Edinburgh and Oxford in order to understand better how researchers work, what are the drivers behind their information management and sharing activities and what services they require.
At Edinburgh a team of social scientists and information service specialists (respectively, from the Institute for the Study of Science, Technology and Innovation, and from Information Services at the University of Edinburgh and the Digital Curation Centre) are carrying out a RIN-funded study designed to enhance understanding of how researchers in the life sciences locate, evaluate, manage, transform and communicate information as part their research processes, in order to identify how information-related policy and practice might be improved to better meet the needs of researchers. Information diaries were completed by over 50 life-science researchers from eight sub-disciplinary research groups. An interview schedule was constructed in order to investigate further the findings from the diaries. 24 interviews were conducted across the groups followed by focus-group discussions. An in-depth study was also employed on one of the groups. Interim findings suggests that some disciplines lend themselves more than others to open data and that there's much variety, specificity and complexity in terms of research data within the examined groups. Research data created via models/simulations, observations, and experiments are intrinsically linked with the data collection methodologies and instrumentation and as such may be better placed within a Virtual Research Environment (VRE) and/or a staging repository-type environment [10] as there are often issues surrounding the unraveling of data content when sophisticated and domain-specific proprietary systems are used. In addition, certain data cannot be considered conventionally open for example: data controversial by nature (stem cell data, brain scans); data received from industrial partners, licensed data products and the ensuing derived data products, data leading to development of patents or commercial products. Other findings<cursor_is_here>
* There is an implicit feeling across the groups surveyed that only the researchers themselves have the subject knowledge necessary to curate their own research data.
* The groups investigated lack any obvious or explicitly appointed data/information managers, leaving individuals to manage their own information/data in a nonformal fashion.
* Researchers in the life sciences express a keen sense of 'ownership' and protectiveness towards their data. However there is confusion or uncertainty about their rights with respect to data ownership
In Oxford an internal scoping study [11] on research data curation took place throughout 2008 and involved the Office of the Director of IT, Computing Services, the Library and the Oxford e-Research Centre. The aim of the study was to capture the requirements for digital repository services to manage and curate research data. A requirements gathering exercise took place and around 40 researchers across disciplines were interviewed to find out about their data management practices and capture their requirements for services to help them manage data. The findings from this exercise showed that the vast majority of researchers felt that there were potential services that could help them. The following scenarios present some of the challenges, found during the scoping study, that researchers are facing with their data and represent the types of needs that data repository services should be trying to address:
* In some cases, researchers had generated data several years ago and now could not make sense of them as they had not kept enough information on how the data was created in the first place;
* In scientific disciplines research groups require secure storage for their large volume of data generated by instruments such as electronic microscopes or by computing simulations run in GRID systems;
* Many clinical research centres compiling data for decades and spending months to migrate data formats in order to avoid format obsolescence;
* In many cases researchers want to make their articles' accompanying data available online in a sustainable way and they do not have the institutional infrastructure to do this so they published the data on their departmental website.
The scoping study is now being followed up by the JISC funded Embedding Institutional Data Curation Services in Research (EIDCSR) project. This project will attempt to address the data management and curation requirements of two research groups who produce and share data. EIDCSR involves the partners of the scoping study with Research Services and IBM to integrate research workflows with the Fedora Digital Asset Management System, long-term file storage and underpinning these efforts with policy development and economic models. A key aspect of this project will be the possibility to work with researchers from the moment they generate the data, this will ensure that the necessary and appropriate curation actions are taken early in the research lifecycle.
Oxford and Edinburgh are also both involved in the development of the Data Audit Framework 1 (DAF) which helps to establish relationships with research communities around the issues of data curation. This methodology provides organisations with the means to identify, locate, describe and assess how they are managing their research data. The methodology goes some way to enabling data auditors to identify and engage researchers regarding their research data holdings. It also provides information professionals who wish to extend their support for research data within the university community with a vehicle for engaging with researchers in addition to a focus for discussion of data curation practices. This may manifest itself through local data management training exercises to equip researchers with the skills and tools to deal with funders' data management and sharing policies. Indeed, the Edinburgh Data Audit Implementation Project [12] states that 'staff had numerous comments and suggestions for improvement of data management at different levels indicating an awareness of the issues, even where it has not been made a priority to address.'
Engagement with researchers through the activities explained above provides a valuable insight into the research process at the various stages in its lifecycle. Such activities help to gain the trust of the researchers facilitating the process of data curation within data repositories at a point early on in the research lifecycle, a fundamental key to the success of these information systems. In addition to gaining the trust of the researcher such engagement offers the opportunity to acquire the researcher's own thoughts, feelings and expectations as to how information services, policies and technologies may shape the future. Issues, such as who the technology is for, how it fits in with researchers' practices or what the purpose of the technology is, require prior consultation with those with a vested interest in the technology.
1 Project led by HATII, University of Glasgow - http://www.data-audit.eu/
5 Discussion and Conclusion
In this paper we attributed the lack of researcher engagement with OA publication repositories to the fact that the main drivers behind their development were somehow distant from current research needs. This, we argue may be due to the lack of an appropriate iterative requirements analysis involving the main user community.
Research data repositories pose similar challenges. Our experience has shown that using open data as a message to engage researchers in curation activities makes it easy to become detached from current research needs in many disciplines. The heterogeneity of research practices and their datasets, some of which cannot be openly shared provides further evidence of the importance in understanding and appreciating the requirements from the different research communities. Moreover, we believe that the curation of research data requires trusted relationships achieved by working and conversing with researchers early on in their research process. This paper presents approaches from both Edinburgh and Oxford which try to articulate and understand how researchers work with data and information, the barriers they find and their priorities for services required to assist them. We argue that failure to engage with the specific needs of researchers through these initiatives, may lead to the development of data repository services that are under-exploited or indeed may not even be used.
Further work on user engagement in data curation should be pursued to explore connections with other areas such as data citation and the academic reward system, data management tools, business models as well as institutional and funders' policies.
References
1. Harnard, S.: For whom the gate tolls? How and why to free the referred research literature online through author/institution self-archiving now (2001) http://cogprints.org/1639/
2. Raym, C.: The case for institutional repositories: a SPARC position paper (2002)
3. Salo, D.: Innkeeper at the Roach Motel. Library Trends Vol. 57 No. 2 (2008)
4. Murray-Rust, P.: Open Data in science. In Nature Proceedings (2008)
5. OECD: OECD Principles and guidelines for access to research data from public funding. Paris (2007) http://www.oecd.org/dataoecd/9/61/38500813.pdf
6. Gibbs, H.: DISC-UK DataShare: State of the art review (2007) http://www.disc-uk.org/docs/state-of-the-art-review.pdf
7. Lyon, L. Coles, S., Duke, M. and Koch, T.: Scaling up: towards a federation of crystallography data repositories (2008) http://eprints.soton.ac.uk/51263/
8. Berman, H.M.: The protein Data Bank: a historical perspective. Acta Crystallographica 8895 (2008)
9. Benton, D.: Recent Changes in the GenBank online service. Nucleic Acid Research Vol. 18 No.6 (1990)
10.Steinhart, G.:DataStaR, a data staging repository for digital research data (2008) http://www.dcc.ac.uk/events/dcc-2008/programme/posters/DataStaR.pdf
11.Martinez-Uribe, L.: Findings of the scoping study and research data management workshop (2008) http://tinyurl.com/55fxgw
12. Ekmekcioglu, Ç. and Rice, R.: Edinburgh data audit implementation project: Final report (2009) http://ie-repository.jisc.ac.uk/283/
</text>
|
[
{
"content": "<url>\nhttps://era.ed.ac.uk/bitstream/handle/1842/3206/Martinez_Macdonald_ECDL09.pdf;jsessionid=A94531D3B0641CC92A39A255A4084089?sequence=1\n</url>\n<text>\n2\n\n1\n\nUser Engagement in Research Data Curation\n\nLuis Martinez-Uribe 1 , Stuart Macdonald 2,\n\nUniversity of Oxford, e-Research Centre, 7 Keble Road, Oxford OX1 3QG, UK\n\[email protected]\n\nUniversity of Edinburgh, EDINA, 160 Causewayside, Edinburgh, EH9 1PR, Scotland [email protected]\n\nAbstract. In recent years information systems such as digital repositories, built to support research practice, have struggled to encourage participation partly due to inadequate analysis of the requirements of the user communities. This paper argues that engagement of users in research data curation through an understanding of their processes, constraints and culture is a key component in the development of the data repositories that will ultimately serve them. In order to maximize the effectiveness of such technologies curation activities need to start early in the research lifecycle and therefore strong links with researchers are necessary. Moreover, this paper promotes the adoption of a pragmatic approach with the result that the use of open data as a mechanism to engage researchers may not be appropriate for all disciplinary research environments.\n\nKeywords: digital curation, research data management, open data, digital repository services, user engagement\n\n1 Introduction\n\nResearch methods and practice, including scholarly communication, are experiencing a radical transformation in the digital age. New tools and infrastructures make possible the generation of digital research data outputs as well as new ways to use, share and reuse them. There is a growing acceptance of the importance of curating research data in order to preserve them and make them re-usable for future generations with libraries, computing services and other service units within academic institutions working together to develop digital repositories to curate this type of research output.\n\nWe believe that engagement with researchers, the user communities in this case, is crucial in order to develop systems that will meet their needs. Whilst some argue that open data is the way forward, it is not clear that it will help engage researchers with digital curation activities. Thus this paper will attempt to answer the following research questions:\n\nIs open data the correct concept to engage the research community? What other methods can be used to facilitate engagement in data curation?\n\n2 Open Access Repositories and Researchers' Requirements – A Balancing Act\n\nOpen Access (OA) enthusiasts have written about the inevitability of 24 hours a day and 7 days a week access to all research papers and their citations \"for free, for all and forever.\" [1] Primarily led by technological developments, the increase in the overall volume of research, the increasing uncertainty about content preservation and by the strong dissatisfaction of academic libraries subjected to constant increase of journal subscription prices, digital repositories were built and employed within research institutions far and wide [2]. Being content provider as well as user and reuser of these information systems, researchers can be regarded as the key user community. Nonetheless, it has been argued no formal detailed requirements analysis has taken place in order to identify and address researchers' needs and concerns related to such scholarly communication systems [3]. As a result the user community has been overlooked in the developmental phases of technology design and implementation of the information system ultimately meant to serve them. Arguably the repository infrastructure developed was not, in most cases, built to address researchers' needs but those of libraries' and librarians. This has led to a struggle to find ways to populate repositories with researchers' output. In recent times there have been an increase in the number of institutional and research funders OA mandates, the knock-on effect from which will see the requirement of significant investment in awareness raising activities in order to highlight the benefits to researchers of using and depositing research materials in such repository systems. Such a process may have been expedited had the library and research worlds been more closely involved in a more agile digital repository design and development with an iterative requirements phase.\n\n3 Research Data Repositories - Learning From Experience\n\nWhen it comes to the research data setting we have to approach the problem from a new perspective. We have to evolve and learn from previous experiences in order to develop repository services capable of dealing with the management and curation of research data by addressing researchers' needs.\n\nAlthough open data is becoming a widely used term, there is not a consistent formalisation of the concept. Murray-Rust [4] suggests that the concept of open source software can be extended to that of open data in that data should be freely available for re-use and modification without restriction. The virtues of 'Open Data' have been praised and evangelized by many since OECD's declaration back in 2003 [5] however many research communities are currently not in a position to make their data available on those terms.\n\nThe JISC-funded DISC-UK DataShare project explored a number of technical, legal and cultural issues surrounding research data in repository environments. It built on the existing collaboration of data librarians and data managers from the\n\nUniversities of Edinburgh, Oxford, Southampton and LSE and investigated mechanisms for ingesting and sharing research data in existing institutional repository systems for those researchers willing to openly share them. Project partners identified a number of barriers pertaining to the researcher and the research setting that would impact on data sharing [6], including:\n\n* Reluctance to forfeit valuable research time to prepare datasets for deposit, e.g. anonymisation, codebook creation, formatting\n* Concerns over making data available to others before it has been fully exploited\n* Concerns that data might be misused or misinterpreted, e.g. by non-academic users such as journalists\n* Concerns over loss of ownership, commercial or competitive advantage\n* Unwillingness to change working practices\n* Concerns that repositories will not continue to exist over time\n* Uncertainty about ownership of IPR\n* Concerns over confidentiality and data protection\n\nIt may be argued that open data is a reality in some disciplines: in crystallography there are a number of established repositories including the Cambridge Crystallographic Data Centre and Crystallography.net with further discussions taking place about a federation of crystallography data repositories [7]. Molecular biologists have been sharing data through repositories like the Protein Data Bank (PDB) since the seventies [8] and geneticists have also been sharing nucleotide sequences through GenBank from the early eighties [9]. These are great examples of communities embracing the benefits of open data but it is important to highlight that these initiatives were lead by visionary researchers in those fields. There is an interesting analogy with domain specific publication repositories like arXiv or RePEc. They represented successful examples of author self-archiving repositories but this didn't translate in wide acceptance and use of open access repositories.\n\n4 Different Approaches - Researchers' Needs Connecting Data Management and Curation\n\nA more research inclusive and bottom up approach has been taken by data and information management activities in the Universities of Edinburgh and Oxford in order to understand better how researchers work, what are the drivers behind their information management and sharing activities and what services they require.\n\nAt Edinburgh a team of social scientists and information service specialists (respectively, from the Institute for the Study of Science, Technology and Innovation, and from Information Services at the University of Edinburgh and the Digital Curation Centre) are carrying out a RIN-funded study designed to enhance understanding of how researchers in the life sciences locate, evaluate, manage, transform and communicate information as part their research processes, in order to identify how information-related policy and practice might be improved to better meet the needs of researchers. Information diaries were completed by over 50 life-science researchers from eight sub-disciplinary research groups. An interview schedule was constructed in order to investigate further the findings from the diaries. 24 interviews were conducted across the groups followed by focus-group discussions. An in-depth study was also employed on one of the groups. Interim findings suggests that some disciplines lend themselves more than others to open data and that there's much variety, specificity and complexity in terms of research data within the examined groups. Research data created via models/simulations, observations, and experiments are intrinsically linked with the data collection methodologies and instrumentation and as such may be better placed within a Virtual Research Environment (VRE) and/or a staging repository-type environment [10] as there are often issues surrounding the unraveling of data content when sophisticated and domain-specific proprietary systems are used. In addition, certain data cannot be considered conventionally open for example: data controversial by nature (stem cell data, brain scans); data received from industrial partners, licensed data products and the ensuing derived data products, data leading to development of patents or commercial products. Other findings<cursor_is_here>\n* There is an implicit feeling across the groups surveyed that only the researchers themselves have the subject knowledge necessary to curate their own research data.\n* The groups investigated lack any obvious or explicitly appointed data/information managers, leaving individuals to manage their own information/data in a nonformal fashion.\n* Researchers in the life sciences express a keen sense of 'ownership' and protectiveness towards their data. However there is confusion or uncertainty about their rights with respect to data ownership\n\nIn Oxford an internal scoping study [11] on research data curation took place throughout 2008 and involved the Office of the Director of IT, Computing Services, the Library and the Oxford e-Research Centre. The aim of the study was to capture the requirements for digital repository services to manage and curate research data. A requirements gathering exercise took place and around 40 researchers across disciplines were interviewed to find out about their data management practices and capture their requirements for services to help them manage data. The findings from this exercise showed that the vast majority of researchers felt that there were potential services that could help them. The following scenarios present some of the challenges, found during the scoping study, that researchers are facing with their data and represent the types of needs that data repository services should be trying to address:\n\n* In some cases, researchers had generated data several years ago and now could not make sense of them as they had not kept enough information on how the data was created in the first place;\n* In scientific disciplines research groups require secure storage for their large volume of data generated by instruments such as electronic microscopes or by computing simulations run in GRID systems;\n* Many clinical research centres compiling data for decades and spending months to migrate data formats in order to avoid format obsolescence;\n* In many cases researchers want to make their articles' accompanying data available online in a sustainable way and they do not have the institutional infrastructure to do this so they published the data on their departmental website.\n\nThe scoping study is now being followed up by the JISC funded Embedding Institutional Data Curation Services in Research (EIDCSR) project. This project will attempt to address the data management and curation requirements of two research groups who produce and share data. EIDCSR involves the partners of the scoping study with Research Services and IBM to integrate research workflows with the Fedora Digital Asset Management System, long-term file storage and underpinning these efforts with policy development and economic models. A key aspect of this project will be the possibility to work with researchers from the moment they generate the data, this will ensure that the necessary and appropriate curation actions are taken early in the research lifecycle.\n\nOxford and Edinburgh are also both involved in the development of the Data Audit Framework 1 (DAF) which helps to establish relationships with research communities around the issues of data curation. This methodology provides organisations with the means to identify, locate, describe and assess how they are managing their research data. The methodology goes some way to enabling data auditors to identify and engage researchers regarding their research data holdings. It also provides information professionals who wish to extend their support for research data within the university community with a vehicle for engaging with researchers in addition to a focus for discussion of data curation practices. This may manifest itself through local data management training exercises to equip researchers with the skills and tools to deal with funders' data management and sharing policies. Indeed, the Edinburgh Data Audit Implementation Project [12] states that 'staff had numerous comments and suggestions for improvement of data management at different levels indicating an awareness of the issues, even where it has not been made a priority to address.'\n\nEngagement with researchers through the activities explained above provides a valuable insight into the research process at the various stages in its lifecycle. Such activities help to gain the trust of the researchers facilitating the process of data curation within data repositories at a point early on in the research lifecycle, a fundamental key to the success of these information systems. In addition to gaining the trust of the researcher such engagement offers the opportunity to acquire the researcher's own thoughts, feelings and expectations as to how information services, policies and technologies may shape the future. Issues, such as who the technology is for, how it fits in with researchers' practices or what the purpose of the technology is, require prior consultation with those with a vested interest in the technology.\n\n1 Project led by HATII, University of Glasgow - http://www.data-audit.eu/\n\n5 Discussion and Conclusion\n\nIn this paper we attributed the lack of researcher engagement with OA publication repositories to the fact that the main drivers behind their development were somehow distant from current research needs. This, we argue may be due to the lack of an appropriate iterative requirements analysis involving the main user community.\n\nResearch data repositories pose similar challenges. Our experience has shown that using open data as a message to engage researchers in curation activities makes it easy to become detached from current research needs in many disciplines. The heterogeneity of research practices and their datasets, some of which cannot be openly shared provides further evidence of the importance in understanding and appreciating the requirements from the different research communities. Moreover, we believe that the curation of research data requires trusted relationships achieved by working and conversing with researchers early on in their research process. This paper presents approaches from both Edinburgh and Oxford which try to articulate and understand how researchers work with data and information, the barriers they find and their priorities for services required to assist them. We argue that failure to engage with the specific needs of researchers through these initiatives, may lead to the development of data repository services that are under-exploited or indeed may not even be used.\n\nFurther work on user engagement in data curation should be pursued to explore connections with other areas such as data citation and the academic reward system, data management tools, business models as well as institutional and funders' policies.\n\nReferences\n\n1. Harnard, S.: For whom the gate tolls? How and why to free the referred research literature online through author/institution self-archiving now (2001) http://cogprints.org/1639/\n2. Raym, C.: The case for institutional repositories: a SPARC position paper (2002)\n3. Salo, D.: Innkeeper at the Roach Motel. Library Trends Vol. 57 No. 2 (2008)\n4. Murray-Rust, P.: Open Data in science. In Nature Proceedings (2008)\n5. OECD: OECD Principles and guidelines for access to research data from public funding. Paris (2007) http://www.oecd.org/dataoecd/9/61/38500813.pdf\n6. Gibbs, H.: DISC-UK DataShare: State of the art review (2007) http://www.disc-uk.org/docs/state-of-the-art-review.pdf\n7. Lyon, L. Coles, S., Duke, M. and Koch, T.: Scaling up: towards a federation of crystallography data repositories (2008) http://eprints.soton.ac.uk/51263/\n8. Berman, H.M.: The protein Data Bank: a historical perspective. Acta Crystallographica 8895 (2008)\n9. Benton, D.: Recent Changes in the GenBank online service. Nucleic Acid Research Vol. 18 No.6 (1990)\n10.Steinhart, G.:DataStaR, a data staging repository for digital research data (2008) http://www.dcc.ac.uk/events/dcc-2008/programme/posters/DataStaR.pdf\n11.Martinez-Uribe, L.: Findings of the scoping study and research data management workshop (2008) http://tinyurl.com/55fxgw\n12. Ekmekcioglu, Ç. and Rice, R.: Edinburgh data audit implementation project: Final report (2009) http://ie-repository.jisc.ac.uk/283/\n</text>\n",
"role": "user"
},
{
"content": " include:\n\n* Most life science researchers spend much of their time searching for and organising data however data curation and/or sharing only becomes crucial to them at certain stages of the research process.",
"role": "assistant"
}
] |
Global Information Assurance Certification Paper
Copyright SANS Institute Author Retains Full Rights
This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
Interested in learning more?
Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec
An Introduction to TEMPEST
For many years, TEMPEST was shrouded in secrecy. Government documents concerned with this were classified, which obviously gave rise to many speculative theories.
During the 1950s, the U.S. government became concerned that "compromising emanations" from computers could be captured and then reconstructed. Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, disclose the classified information transmitted. Research showed that it was possible to capture emanations from a distance, and as a response, the TEMPEST program was started.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In his 1986 book, Spycatcher, Peter Wright (ex-MI5) revealed how he had spied on messages sent by the French during Britain's negotiations to join the European Economic Community. In 1960, Britain was negotiating to join the EEC, and the Prime Minister was worried that De Gaulle would block Britain's entry. He therefore asked the intelligence community to determine the French negotiating position. They tried to break the French diplomatic cipher and failed. However, Wright and his assistant noticed that the enciphered traffic carried a faint secondary signal, and constructed equipment to recover it. It turned out to be plaintext, which somehow leaked through the cipher machine.
So what is TEMPEST?
TEMPEST is the name of a technology involving the monitoring (and shielding) of devices that emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data. The term's origin is believed to simply be a code word used by the U.S. government in the late 1960s, but at a later stage it apparently became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. Some sources insist that it is an acronym for Transient Electromagnetic Pulse Emanation STandard.
National Communications Security Committee Directive 4 sets U.S. TEMPEST standards. The requirements are set out in document NACSIM 5100A, which is classified. TEMPEST certification for private sector usage is extremely expensive and, as a result, it has led to a newer standard, called ZONE, which is more cost effective, though somewhat less secure. Approved TEMPEST-shielded devices are classed into 3 categories. Type 1 is extremely secure and available only to the U.S. government and approved contractors, who must undergo strict vetting. Type 2 is somewhat less secure, but still requires government approval to use. Type 3 is for general commercial use. For more information on TEMPEST certification, see the NSA TEMPEST Endorsement Program.
NATO has a similar standard called the AMSG 720B Compromising Emanations Laboratory Test Standard. In Germany, the TEMPEST program is administered by the National Telecom Board. In the UK, Government Communications Headquarters (GCHQ), the equivalent of the NSA, has their own program.
TEMPEST is also sometimes referred to an 'Van Eck Phreaking' after the Dutch Scientist Wim van Eck who in 1985 demonstrated that he could easily pick up nearby computer monitor emissions and display them on a TV monitor. His research paper entitled Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? described the TEMPEST problem like this:
© SANS Institute 2000 - 2002, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 It is well known that electronic equipment produces electromagnetic fields, which may cause interference to radio and television reception. However, interference is not the only problem caused by electromagnetic radiation. It is possible in some cases to obtain information on the signals used inside the equipment when the radiation is picked up and the received signals are decoded. Especially in the case of digital equipment this possibility constitutes a problem, because remote reconstruction of signals inside the equipment may enable reconstruction of the data that the equipment is processing.
Some of his conclusions caused quite a stir:
A normal TV receiver made suitable for this purpose will in some cases be able to restore the information displayed on a video display unit or terminal on its own screen, when this field is picked up. Depending on the type of video display unit or terminal, this reconstruction may under optimum conditions be feasible from distances of up to 1 km.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 People were alarmed at the apparent ease with which data could be captured by relatively simple means. Although van Eck was deliberately vague/misleading on the technical details of the experiments, there were quite a few attempts to reproduce the results, with varying degrees of success. How does TEMPEST work? Every electronic, electro-optical or electromechanical device, whether or not it was designed as a transmitter, gives off some type of electromagnetic signals, or "emanations." An electric shaver, for example, may radiate strongly enough to interfere with nearby radio or television reception. Transistor radios are banned from airlines because their unintentional signals can interfere with navigational equipment. Equipment may also give off unwanted signals in the form of sound. Proper design minimizes the unintentional signals given off by a device, but some unintentional signals will always be present. When a device processes information such as printed text or voice, it may "leak" that information through unintentional signals. A common example is "crosstalk" on telephone lines. Signals "leak" from one line to another, and someone else's voice intrudes on your phone call. TEMPEST eavesdropping technology works by capturing and reconstructing the Electromagnetic Radiation given off by digital equipment. Computer monitors display information through the use of an electron gun to manipulate pixels on the screen. The electron gun shoots out pulses of electrons, which sweep across the screen striking pixels, left to right and up and down many times a second. The voltage level pushing the electrons out, rises and falls depending on whether the pixel is to be made light or dark. This process generates Electromagnetic Pulses, which in turn emit Electromagnetic Radio Waves or Electromagnetic Radiation, which emanates outward for a great distance. Hard disks are another source because data is stored in binary code, and is processed as 1s and 0s, ONs and OFFs; again causing pulses and EMR. These radio waves are as distinct as fingerprints, even in computers of the same make and model, due to minute differences in the manufacturing of the components. Computer cables, phone lines and poorly grounded electrical systems can act as both a receiver and transmitter for EMR, thus allowing the waves to be travel even further afield. These radio waves can then be captured with an Active Directional Antenna, fed into a monitor and be zeroed in on and deciphered by using a horizontal and vertical sync generator.
Monitors, microchips and devices such as printers and PCs all emit EMR into space or into some conductive medium (such as power lines, communications wires or even water pipes). The EMR that is emitted contains the information that the device is displaying, creating, storing or transmitting. With the correct equipment and techniques, it is possible to reconstruct all or a substantial portion of that data.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
TEMPEST equipment
TEMPEST monitoring equipment include various kinds of sensitive receivers, which can monitor a wide range of frequencies, and a combination of hardware and software that is capable of processing the received signals into the original data. The data that is picked up is often corrupted by things such as external EMR interference, signal
weakness over distances and partial transmission. Advanced algorithms can help provide a more complete picture of the original data.
Codex Data Systems markets a TEMPEST-type scanner called D.I.R.T. (Data Interception by Remote Transmission. Their website describes it like this:
Data Interception by Remote Transmission is a powerful remote control monitoring tool that allows stealth monitoring of all activity on one or more target computers simultaneously from a remote command center. No physical access is necessary. Application also allows agents to remotely seize and secure digital evidence prior to physically entering suspect premises.
Although the sale of TEMPEST monitoring devices to the general public is prohibited by the U.S. government, it is of course possible that non-approved organizations and individuals can acquire the technology, or even build it themselves as the designs and equipment are relatively easy to acquire. For example, see the paper Who's Listening? for a list of components for a "Radio Shack" Reader.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
How can you protect yourself against TEMPEST eavesdropping?
Shielding of devices from EMR is achieved by a number of methods. The most sophisticated devices use advanced micro-components that have been designed from scratch to minimize TEMPEST emanations. Generally, shielding involves encompassing the device in a Faraday cage that does not permit stray emanations, along with special modifications to the power source. This usually involves a heavy metal case around an object. TEMPEST shielding also involves such issues as the design of a room and placement of equipment within it, to ensure that no information can escape. Going to such lengths is obviously a very expensive business, and usually limited to government and diplomatic agencies. As with all things, the potential risk has to be weighed up against the cost.
Companies and individuals can purchase TEMPEST-certified computers but the high cost of such a secure system may be prohibitive to most consumers. For individuals who wish to be more secure against TEMPEST but cannot invest in this level of equipment, there are a few simple steps to take to reduce compromising emanations. Purchase computer equipment that meets modern standards for emission. Use only shielded cable for all system interconnections, and keep cable between components as short as possible. Block radiation from the power cords into the building wiring. To prevent your phone, fax or modem line from acting as an antenna, install a telephone line filter.
On the software side, it is also advisable to encrypt any data that you send from your computer systems so that even if the emanations were captured, they won't be easily reconstructed into anything meaningful.
For much more detailed information on ways of minimizing risk associated with compromising emanations, have a look at the Emission Security Information Guide issued by Andrews Air Force Base.
© SANS Institute 2000 - 2002, Author retains full rights.
"Soft" TEMPEST
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Two scientists from the University of Cambridge, Ross Anderson and Markus Kuhn, published a paper in 1998 discussing the techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This software can be used for both attack and defense. To attack a system, malicious code can encode stolen information in the machine's radio frequency emissions and optimize them for some combination of reception range, receiver cost and covertness. To defend a system, a trusted screen driver can display sensitive information using fonts which minimize the energy of these emissions. Using text fonts with softened edges, they say, will limit high frequency emissions – radiation which beams farthest afield from the computer. For more information, see the
full text of Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Threat or Hoax?
Seen by some as a definite threat, or as Big Brother watching, others dismiss TEMPEST monitoring as somewhat of a hoax.
In a paper entitled "Who's listening?", Ian Murphy, the President of IAM / Secure Data System Inc. gives some (dated) examples of espionage attempts using low-tech equipment, as well as many examples and explanations of electronic signals, interference and interception. He ends off with details on how to construct readers/receivers using equipment readily available from electronics stores. According to Murphy, "…. the capability of these units is well within the range of any person with the intent... The equipment is nothing of major technical wonderment, just a few simple block circuits put together, so that they work together to do the final requested product."
© SANS Institute 2000 - 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 James Atkinson, a telecommunications engineer specializing in the field of technical surveillance countermeasures (TSCM), and president of Granite Island Group (a company specializing in doing communications security work for government and defense contractors) has worked with TEMPEST for 20 years. TEMPEST is not a spying technology, he says, and anyone who says otherwise is either lying or misinformed. He says that the reason today's PCs are shielded is not to prevent their emanations from being intercepted, but to keep their electronic "noise" from leaking out and interfering with other electronic devices, such as radios and TVs. While sneaking a peak at what's on someone's computer screen from a distance is theoretically possible, Atkinson says, it is very difficult to do, extremely costly and impractical. Others like Wayne Madsen from the Electronic Privacy Information Center agrees that most people do not need to concern themselves with TEMPEST. The following comes from an interview with him by Smart Computing Magazine: "TEMPEST is the study of vulnerabilities of compromising emanations from communications and other electrical equipment that contain data. A radio receiver can be placed near an emanating machine and pick up the signals, usually harmonic frequencies, emitted by the equipment. However, today's computer equipment, unlike the type of cathode-ray tubes used in monitors more than a decade ago, has become more 'ruggedized', and is heavily shielded so that these emissions are not so easily picked up by a radio receiver." TEMPEST is not as big a problem as it once was. However, the TEMPEST engineers don't like to admit this, and they still hype the problem." However, many people disagree with these views, and insist that TEMPEST monitoring can and does occur. John Young is a New York architect who says he often designs TEMPEST security features into building for clients, such as law firms and banks. He has an active interest in TEMPEST technology and has filed several Freedom of Information requests with the U.S. government to declassify NSA documents dealing with TEMPEST. These are available for public scrutiny on his website .
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Joel McNamara, who operates The Complete Unofficial TEMPEST Information Page, has spent a lot of time to bring together an impressive number of information sources. He believes that the "security through obscurity" that surrounds TEMPEST may actually be increasing the vulnerability of U.S. business interests to economic espionage.
Closing comments
The term TEMPEST has fallen out of use, and this branch of security is now generally referred to as EMSEC. EMSEC (Emission Security) is the protection resulting from all measures taken to deny unauthorized persons information of value which might be derived from intercept and analysis of compromising emanations from cryptographic-equipment, automated information systems (AIS), and telecommunications systems.
Two other terms, which you might come across when researching TEMPEST, are NONSTOP & HIJACK.
NONSTOP is a classified code word that apparently relates to a form of compromising emanations, but involves the transmittal of signals from radio frequency devices -- handheld radios, cellular phones, pagers, alarm systems, cordless phones, wireless networks -- in proximity to a device containing secure information. There are specific guidelines for either tuning the RF device off, or keeping it a certain distance away from the secure device (PC, printer, modem etc.).
HIJACK is a classified code word that apparently relates to a form of compromising emanations, but involves digital vs. electromagnetic signals. An attack is similar in nature to a TEMPEST attack, where the adversary doesn't need to be close to the device that is being compromised. It does apparently require access to communications lines though.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
References:
Joel McNamara – The Complete, Unofficial TEMPEST Information Page http://www.eskimo.com/~joelm/tempest.html
Prof. Erhart Moller – Protective Measures Against Compromising Electro Magnetic Radiation Emitted by Video Display Terminals.
http://www.fc.net/phrack/files/p44/p44-10.html
Markus G. Kuhn and Ross J. Anderson – Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
Wim van Eck -- Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?
http://jya.com/emr.pdf
Grady Ward -- TEMPEST in a teapot http://www.eff.org/pub/Privacy/Security/tempest_monitoring.article
ANDREWS AFB Emission Security (EMSEC) Information Guide http://www.andrews.af.mil/89cg/89cs/scbsi/emsecguide.doc
Arik Hesseldahl, Forbes.com, The Tempest SurroundingTempest http://www.forbes.com/2000/08/10/mu9.html
Is Tempest A Threat Or Hoax? "Transient Electromagnetic Pulse Emanation Standard" Supposedly Reads PC Screens From A Distance; Smart Computing Magazine, April 2000• Vol.8 Issue 4
http://www.smartcomputing.com/editorial/article.asp?article=articles%2Farchive%2Fg0804%2F23g04%2F23g04%2Easp
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 New-wave spies -- Electronic eavesdropping is becoming mere child's play; New Scientist Magazine, 6 November 1999 http://www.newscientist.com/ns/19991106/newsstory6.html
WHO'S LISTENING ? Ian A Murphy, President CEO IAM / Secure Data System Inc.
http://www.ravenswoodinc.com/captwhos.htm
Upcoming Training
| SANS Prague 2017 | Prague, Czech Republic | Aug 07, 2017 - Aug 12, 2017 |
|---|---|---|
| SANS Boston 2017 | Boston, MA | Aug 07, 2017 - Aug 12, 2017 |
| Community SANS Omaha SEC401* | Omaha, NE | Aug 14, 2017 - Aug 19, 2017 |
| SANS New York City 2017 | New York City, NY | Aug 14, 2017 - Aug 19, 2017 |
| SANS Salt Lake City 2017 | Salt Lake City, UT | Aug 14, 2017 - Aug 19, 2017 |
| SANS Virginia Beach 2017 | Virginia Beach, VA | Aug 21, 2017 - Sep 01, 2017 |
| SANS Adelaide 2017 | Adelaide, Australia | Aug 21, 2017 - Aug 26, 2017 |
| Virginia Beach 2017 - SEC401: Security Essentials Bootcamp Style | Virginia Beach, VA | Aug 21, 2017 - Aug 26, 2017 |
| SANS Chicago 2017 | Chicago, IL | Aug 21, 2017 - Aug 26, 2017 |
| Community SANS Pasadena SEC401 @ NASA | Pasadena, CA | Aug 23, 2017 - Aug 30, 2017 |
| Mentor Session - SEC401 | Minneapolis, MN | Aug 29, 2017 - Oct 10, 2017 |
| SANS San Francisco Fall 2017 | San Francisco, CA | Sep 05, 2017 - Sep 10, 2017 |
| SANS Tampa - Clearwater 2017 | Clearwater, FL | Sep 05, 2017 - Sep 10, 2017 |
| Mentor Session - SEC401 | Edmonton, AB | Sep 06, 2017 - Oct 18, 2017 |
| SANS Network Security 2017 | Las Vegas, NV | Sep 10, 2017 - Sep 17, 2017 |
| Community SANS Albany SEC401 | Albany, NY | Sep 11, 2017 - Sep 16, 2017 |
| Mentor Session - SEC401 | Ventura, CA | Sep 11, 2017 - Oct 12, 2017 |
| Community SANS Columbia SEC401 | Columbia, MD | Sep 18, 2017 - Sep 23, 2017 |
| Community SANS Dallas SEC401 | Dallas, TX | Sep 18, 2017 - Sep 23, 2017 |
| Community SANS Boise SEC401 | Boise, ID | Sep 25, 2017 - Sep 30, 2017 |
| Baltimore Fall 2017 - SEC401: Security Essentials Bootcamp Style | Baltimore, MD | Sep 25, 2017 - Sep 30, 2017 |
| Community SANS New York SEC401 | New York, NY | Sep 25, 2017 - Sep 30, 2017 |
| Rocky Mountain Fall 2017 | Denver, CO | Sep 25, 2017 - Sep 30, 2017 |
| SANS London September 2017 | London, United Kingdom | Sep 25, 2017 - Sep 30, 2017 |
| SANS Baltimore Fall 2017 | Baltimore, MD | Sep 25, 2017 - Sep 30, 2017 |
| SANS Copenhagen 2017 | Copenhagen, Denmark | Sep 25, 2017 - Sep 30, 2017 |
| Community SANS Sacramento SEC401 | Sacramento, CA | Oct 02, 2017 - Oct 07, 2017 |
| SANS DFIR Prague 2017 | Prague, Czech Republic | Oct 02, 2017 - Oct 08, 2017 |
| Community SANS Charleston SEC401 | Charleston, SC | Oct 02, 2017 - Oct 07, 2017 |
| Mentor Session - SEC401 | Arlington, VA | Oct 04, 2017 - Nov 15, 2017 |
|
<urn:uuid:688c0501-35a7-4da6-88d1-c5c94936d353>
|
CC-MAIN-2017-30
|
https://www.giac.org/paper/gsec/646/introduction-tempest/101486
|
2017-07-27T00:27:50Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426693.21/warc/CC-MAIN-20170727002123-20170727022123-00101.warc.gz
| 768,665,400
| 4,914
|
eng_Latn
|
eng_Latn
| 0.986456
|
eng_Latn
| 0.995955
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
407,
4490,
8336,
12288,
15912,
18854,
21284
] |
Global Information Assurance Certification Paper
Copyright SANS Institute Author Retains Full Rights
This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
Interested in learning more?
Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec
An Introduction to TEMPEST
For many years, TEMPEST was shrouded in secrecy. Government documents concerned with this were classified, which obviously gave rise to many speculative theories.
During the 1950s, the U.S. government became concerned that "compromising emanations" from computers could be captured and then reconstructed. Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, disclose the classified information transmitted. Research showed that it was possible to capture emanations from a distance, and as a response, the TEMPEST program was started.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In his 1986 book, Spycatcher, Peter Wright (ex-MI5) revealed how he had spied on messages sent by the French during Britain's negotiations to join the European Economic Community. In 1960, Britain was negotiating to join the EEC, and the Prime Minister was worried that De Gaulle would block Britain's entry. He therefore asked the intelligence community to determine the French negotiating position. They tried to break the French diplomatic cipher and failed. However, Wright and his assistant noticed that the enciphered traffic carried a faint secondary signal, and constructed equipment to recover it. It turned out to be plaintext, which somehow leaked through the cipher machine.
So what is TEMPEST?
TEMPEST is the name of a technology involving the monitoring (and shielding) of devices that emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data. The term's origin is believed to simply be a code word used by the U.S. government in the late 1960s, but at a later stage it apparently became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. Some sources insist that it is an acronym for Transient Electromagnetic Pulse Emanation STandard.
National Communications Security Committee Directive 4 sets U.S. TEMPEST standards. The requirements are set out in document NACSIM 5100A, which is classified. TEMPEST certification for private sector usage is extremely expensive and, as a result, it has led to a newer standard, called ZONE, which is more cost effective, though somewhat less secure. Approved TEMPEST-shielded devices are classed into 3 categories. Type 1 is extremely secure and available only to the U.S. government and approved contractors, who must undergo strict vetting. Type 2 is somewhat less secure, but still requires government approval to use. Type 3 is for general commercial use. For more information on TEMPEST certification, see the NSA TEMPEST Endorsement Program.
NATO has a similar standard called the AMSG 720B Compromising Emanations Laboratory Test Standard. In Germany, the TEMPEST program is administered by the National Telecom Board. In the UK, Government Communications Headquarters (GCHQ), the equivalent of the NSA, has their own program.
TEMPEST is also sometimes referred to an 'Van Eck Phreaking' after the Dutch Scientist Wim van Eck who in 1985 demonstrated that he could easily pick up nearby computer monitor emissions and display them on a TV monitor. His research paper entitled Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? described the TEMPEST problem like this:
© SANS Institute 2000 - 2002, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 It is well known that electronic equipment produces electromagnetic fields, which may cause interference to radio and television reception. However, interference is not the only problem caused by electromagnetic radiation. It is possible in some cases to obtain information on the signals used inside the equipment when the radiation is picked up and the received signals are decoded. Especially in the case of digital equipment this possibility constitutes a problem, because remote reconstruction of signals inside the equipment may enable reconstruction of the data that the equipment is processing.
Some of his conclusions caused quite a stir:
A normal TV receiver made suitable for this purpose will in some cases be able to restore the information displayed on a video display unit or terminal on its own screen, when this field is picked up. Depending on the type of video display unit or terminal, this reconstruction may under optimum conditions be feasible from distances of up to 1 km.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 People were alarmed at the apparent ease with which data could be captured by relatively simple means. Although van Eck was deliberately vague/misleading on the technical details of the experiments, there were quite a few attempts to reproduce the results, with varying degrees of success. How does TEMPEST work? Every electronic, electro-optical
|
or electromechanical device, whether or not it was designed as a transmitter, gives off some type of electromagnetic signals, or "emanations.
| 5,303
|
inside_word
|
or
|
remove_all
|
<url>
https://www.giac.org/paper/gsec/646/introduction-tempest/101486
</url>
<text>
Global Information Assurance Certification Paper
Copyright SANS Institute Author Retains Full Rights
This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
Interested in learning more?
Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec
An Introduction to TEMPEST
For many years, TEMPEST was shrouded in secrecy. Government documents concerned with this were classified, which obviously gave rise to many speculative theories.
During the 1950s, the U.S. government became concerned that "compromising emanations" from computers could be captured and then reconstructed. Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, disclose the classified information transmitted. Research showed that it was possible to capture emanations from a distance, and as a response, the TEMPEST program was started.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In his 1986 book, Spycatcher, Peter Wright (ex-MI5) revealed how he had spied on messages sent by the French during Britain's negotiations to join the European Economic Community. In 1960, Britain was negotiating to join the EEC, and the Prime Minister was worried that De Gaulle would block Britain's entry. He therefore asked the intelligence community to determine the French negotiating position. They tried to break the French diplomatic cipher and failed. However, Wright and his assistant noticed that the enciphered traffic carried a faint secondary signal, and constructed equipment to recover it. It turned out to be plaintext, which somehow leaked through the cipher machine.
So what is TEMPEST?
TEMPEST is the name of a technology involving the monitoring (and shielding) of devices that emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data. The term's origin is believed to simply be a code word used by the U.S. government in the late 1960s, but at a later stage it apparently became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. Some sources insist that it is an acronym for Transient Electromagnetic Pulse Emanation STandard.
National Communications Security Committee Directive 4 sets U.S. TEMPEST standards. The requirements are set out in document NACSIM 5100A, which is classified. TEMPEST certification for private sector usage is extremely expensive and, as a result, it has led to a newer standard, called ZONE, which is more cost effective, though somewhat less secure. Approved TEMPEST-shielded devices are classed into 3 categories. Type 1 is extremely secure and available only to the U.S. government and approved contractors, who must undergo strict vetting. Type 2 is somewhat less secure, but still requires government approval to use. Type 3 is for general commercial use. For more information on TEMPEST certification, see the NSA TEMPEST Endorsement Program.
NATO has a similar standard called the AMSG 720B Compromising Emanations Laboratory Test Standard. In Germany, the TEMPEST program is administered by the National Telecom Board. In the UK, Government Communications Headquarters (GCHQ), the equivalent of the NSA, has their own program.
TEMPEST is also sometimes referred to an 'Van Eck Phreaking' after the Dutch Scientist Wim van Eck who in 1985 demonstrated that he could easily pick up nearby computer monitor emissions and display them on a TV monitor. His research paper entitled Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? described the TEMPEST problem like this:
© SANS Institute 2000 - 2002, Author retains full rights.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 It is well known that electronic equipment produces electromagnetic fields, which may cause interference to radio and television reception. However, interference is not the only problem caused by electromagnetic radiation. It is possible in some cases to obtain information on the signals used inside the equipment when the radiation is picked up and the received signals are decoded. Especially in the case of digital equipment this possibility constitutes a problem, because remote reconstruction of signals inside the equipment may enable reconstruction of the data that the equipment is processing.
Some of his conclusions caused quite a stir:
A normal TV receiver made suitable for this purpose will in some cases be able to restore the information displayed on a video display unit or terminal on its own screen, when this field is picked up. Depending on the type of video display unit or terminal, this reconstruction may under optimum conditions be feasible from distances of up to 1 km.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 People were alarmed at the apparent ease with which data could be captured by relatively simple means. Although van Eck was deliberately vague/misleading on the technical details of the experiments, there were quite a few attempts to reproduce the results, with varying degrees of success. How does TEMPEST work? Every electronic, electro-optical <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.giac.org/paper/gsec/646/introduction-tempest/101486\n</url>\n<text>\nGlobal Information Assurance Certification Paper\n\nCopyright SANS Institute Author Retains Full Rights\n\nThis paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.\n\nInterested in learning more?\n\nCheck out the list of upcoming events offering \"Security Essentials Bootcamp Style (Security 401)\" at http://www.giac.org/registration/gsec\n\nAn Introduction to TEMPEST\n\nFor many years, TEMPEST was shrouded in secrecy. Government documents concerned with this were classified, which obviously gave rise to many speculative theories.\n\nDuring the 1950s, the U.S. government became concerned that \"compromising emanations\" from computers could be captured and then reconstructed. Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, disclose the classified information transmitted. Research showed that it was possible to capture emanations from a distance, and as a response, the TEMPEST program was started.\n\nKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In his 1986 book, Spycatcher, Peter Wright (ex-MI5) revealed how he had spied on messages sent by the French during Britain's negotiations to join the European Economic Community. In 1960, Britain was negotiating to join the EEC, and the Prime Minister was worried that De Gaulle would block Britain's entry. He therefore asked the intelligence community to determine the French negotiating position. They tried to break the French diplomatic cipher and failed. However, Wright and his assistant noticed that the enciphered traffic carried a faint secondary signal, and constructed equipment to recover it. It turned out to be plaintext, which somehow leaked through the cipher machine.\n\nSo what is TEMPEST?\n\nTEMPEST is the name of a technology involving the monitoring (and shielding) of devices that emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data. The term's origin is believed to simply be a code word used by the U.S. government in the late 1960s, but at a later stage it apparently became an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. Some sources insist that it is an acronym for Transient Electromagnetic Pulse Emanation STandard.\n\nNational Communications Security Committee Directive 4 sets U.S. TEMPEST standards. The requirements are set out in document NACSIM 5100A, which is classified. TEMPEST certification for private sector usage is extremely expensive and, as a result, it has led to a newer standard, called ZONE, which is more cost effective, though somewhat less secure. Approved TEMPEST-shielded devices are classed into 3 categories. Type 1 is extremely secure and available only to the U.S. government and approved contractors, who must undergo strict vetting. Type 2 is somewhat less secure, but still requires government approval to use. Type 3 is for general commercial use. For more information on TEMPEST certification, see the NSA TEMPEST Endorsement Program.\n\nNATO has a similar standard called the AMSG 720B Compromising Emanations Laboratory Test Standard. In Germany, the TEMPEST program is administered by the National Telecom Board. In the UK, Government Communications Headquarters (GCHQ), the equivalent of the NSA, has their own program.\n\nTEMPEST is also sometimes referred to an 'Van Eck Phreaking' after the Dutch Scientist Wim van Eck who in 1985 demonstrated that he could easily pick up nearby computer monitor emissions and display them on a TV monitor. His research paper entitled Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? described the TEMPEST problem like this:\n\n© SANS Institute 2000 - 2002, Author retains full rights.\n\nKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 It is well known that electronic equipment produces electromagnetic fields, which may cause interference to radio and television reception. However, interference is not the only problem caused by electromagnetic radiation. It is possible in some cases to obtain information on the signals used inside the equipment when the radiation is picked up and the received signals are decoded. Especially in the case of digital equipment this possibility constitutes a problem, because remote reconstruction of signals inside the equipment may enable reconstruction of the data that the equipment is processing.\n\nSome of his conclusions caused quite a stir:\n\nA normal TV receiver made suitable for this purpose will in some cases be able to restore the information displayed on a video display unit or terminal on its own screen, when this field is picked up. Depending on the type of video display unit or terminal, this reconstruction may under optimum conditions be feasible from distances of up to 1 km.\n\nKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 People were alarmed at the apparent ease with which data could be captured by relatively simple means. Although van Eck was deliberately vague/misleading on the technical details of the experiments, there were quite a few attempts to reproduce the results, with varying degrees of success. How does TEMPEST work? Every electronic, electro-optical <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "or electromechanical device, whether or not it was designed as a transmitter, gives off some type of electromagnetic signals, or \"emanations.",
"role": "assistant"
}
] |
|
BRENTWOOD BAPTIST CHURCH
BUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013
PREPARATION
> SPEND THE WEEK STUDYING MATTHEW 5:1-16. Consult the commentary provided and any additional study tools (such as a concordance or Bible dictionary) to enhance your preparation.
> DETERMINE which discussion points and questions will work best with your group.
> PRAY for our pastors and the "But I Say" series, the upcoming group meeting, your teaching, your group members, and their receptivity to the lesson.
HIGHLIGHTS
> BIBLICAL EMPHASIS: As Moses brought the 10 Commandments to the Israelites as they approached the promised land, so Jesus brings us the expectations of the kingdom citizen in Matthew 5–7. "Because you are My children," Jesus seems to be saying, "this is how you are to live." To begin His Sermon on the Mount, Jesus described the characteristics and blessings of those who follow Him. He focused on both inner attitude and outward relationships. He then used two word pictures— salt and light—to describe the impact His followers will have on the world. These characteristics are "blessed," empowered by God. When lived out, each characteristic brings glory to God.
> LIFE APPLICATION: As a result of today's study, you will learn how to:
1. Bring glory to God in your inner attitude (5:1-6).
2. Bring glory to God in your outward relationships (5:7-12).
3. Bring glory to God in your worldwide influence (5:13-16).
INTRODUCTION
As your group time begins, use this section to help get the conversation going.
How would you define "blessed"? How would most people in the city of Brentwood define it? How would Jesus define it?
What was one specific day when you felt particularly blessed?
Being a Christ-follower isn't just a matter of thinking and doing the right things and avoiding the wrong things. Foundational to being a Christian is a personal relationship with Jesus that empowers you to live for God. That relationship is the result of God's blessing in your life, and it changes you from the inside out. God's power at work in you enables you to reflect kingdom characteristics in the way you live.
UNDERSTANDING
Unpack the biblical text to discover what Scripture says or means about a particular topic.
When we imagine the scene of the Sermon on the Mount, we typically picture Jesus perched on the side of a large hill speaking out to a crowd of people. But that's not
This curriculum was produced in collaboration with the Preaching Team, the Discipleship Team, and LifeWay Christian Resources.
what we read in Matthew 5:1. Matthew reported that Jesus saw the crowds, went up on a mountain, and sat down with His disciples. Instead of a grand speech, we see an intimate conversation with His small group of disciples. By the end of the sermon (Matthew 7:28), it becomes evident that the crowds could hear what Jesus was telling the men.
> HAVE A VOLUNTEER READ MATTHEW 5:1-6.
Matthew 5:3-10 is often referred to as the Beatitudes. They're a set of blessings set up in Hebrew poetical form. The first statement, "The poor in spirit are blessed, for the kingdom of heaven is theirs" (v. 3), bears the same reward as the last, "Those who are persecuted for righteousness are blessed, for the kingdom of heaven is theirs" (v. 10). In Hebrew poetry, the repeated theme means that everything in the middle (vv. 4-9) share a common theme. In this case, it's the attitudes by which we can recognize people who are a part of the kingdom of God.
What do you think the word "blessed" means in the context of the Beatitudes?
The Greek word for "blessed" doesn't just carry the meaning of "happy" that is often associated with it. It carries the connotation of approval or favor. We might paraphrase the first Beatitude as God approves of the poor in spirit. Jesus declared people who exhibit particular characteristics to be divinely blessed. Those characteristics identify people who, by God's grace, are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord. The Beatitudes do not describe eight separate and distinct groups of people, but eight characteristics or qualities that define kingdom people.
How do the Beatitudes in verses 3-6 relate to the promises that follow them? How would you describe the opposite of each quality?
What kind of mourning do you feel Jesus is talking about in verse 4? What causes you to mourn?
When you think of someone who is a good example of meekness (v. 5), what is that person like? What do you admire? How do they model humility?
The clear theme in verses 3-6 is that God approves of people who know they're broken, who know they're nothing without His blessing. We don't earn the kingdom of heaven by being poor in spirit. We're poor in spirit because we know that we could never earn a place in God's kingdom, but through His grace He provides a way to let us in.
> HAVE ANOTHER VOLUNTEER READ MATTHEW 5:7-12.
In the second section of the Beatitudes, we continue to see the thread of kingdom attitudes, but the focus shifts away from our spirits and toward our relationships with others.
How is the focus different from the previous section? What do the four attitudes in verses 7-12 (merciful, pure in heart, peacemaker, righteousness) have in common?
How do the Beatitudes in these verses relate to the promises that follow them? How would you describe the opposite of each quality?
These verses highlight the attitudes God's people should display externally. How we treat others flows out of the personal characteristics listed in the first set of verses. Think of it like this: People who know they need mercy will, in turn, show mercy. People who mourn their sins before God will be covered in His righteousness and made pure in their hearts. People who have spirits of gentleness won't fight for their best interests but will seek to make peace with others. And people who "hunger and thirst for righteousness" will face persecution because becoming like Christ includes joining Him in His suffering.
While grace is the act of giving a gift that is not deserved, mercy is the withholding or preventing of a negative consequence rightly deserved. What are some oppor tunities you have to show mercy on a weekly basis?
How is peace keeping different than peace making?
Do the blessings described in these verses line up with an "ideal" life by cultural standards? Why or why not? If not, what are some of the noticeable differences?
Through these statements, Jesus both encouraged and warned His disciples that as they pursued God, they would meet persecution. Although persecution is not something anyone wants to endure, it's a definite marker of a faithful life.
What are some ways you hear of people in Middle Tennessee being persecuted for their faith? People around the world?
Have you ever been persecuted in some way because of your faith in Christ? How did you respond?
Verses 11-12 transition out of the Beatitudes and into the rest of Jesus' sermon. To encourage the disciples in the face of future persecutions, Jesus compared them to the prophets who came before Him. The Old Testament prophets faithfully followed God and shared His message with the world, regardless of the world's response. By comparing Christ-followers to Old Testament prophets, Jesus encouraged His disciples to remain faithful because their reward in heaven would be great—just as it was for the prophets.
Consider the prophets in the Old Testament. Would you consider their lives and ministries successful? What was persecution like for them?
What does this idea communicate about the kingdom of God?
Have someone read James 1:2-4. Why should we rejoice about endurance? List some figures in Scripture who model this endurance.
Jesus understood that persecution would be a part of the lives of His people because of Him and His message. They would be reviled "on his account." He wanted them to rejoice in suffering because it was evidence that they would receive an award far greater than anything the world offered.
> HAVE A FINAL VOLUNTEER READ MATTHEW 5:13-16.
In verses 13-16, Jesus explained the impact a kingdom attitude can have on the world. He did so with two word pictures—salt and light. Jesus calls His followers "the salt of the earth." Salt's primary function in Jesus' day was to help preserve food (especially meat), an act that was particularly important in the Middle East due to hot temperatures and arid climate.
What is the church's role in serving and preserving culture? What part do you play in that picture?
How is the command to be salt and light related to the Beatitudes in verses 3-10?
As believers, we act as a preservative in the culture around us by maintaining high moral and spiritual standards that counteract the sin and decay of the world. Salt also serves to add flavor, which is the way we use it today. Salt is distinctly different from the things with which it's mixed. Jesus' disciples likewise are to be different from the world.
How does the message of God's kingdom add flavor to your life? to the world?
Why must God's people be distinctly different from people who don't know Him?
By referring to salt, Jesus was making a statement about what it really means to be part of the kingdom of God. People who understand their need for God and have realized His mercy toward them, who seek righteousness even amidst persecution, must not lose their saltiness. Those who follow Him can't keep that hidden, which sets up verse 14 nicely. If we're part of God's kingdom, the world can't help but notice we're different.
How have you noticed a specific change in another person's life because of his/her relationship with God? How has He made a difference in your life?
In addition to salvation, what other positive effects can God's kingdom have on the world?
The result of living out the kingdom attitudes described in Scripture is that Christ's light will shine from within us and pierce the darkness in the world. When Peter and John are told by the Jewish leaders to stop preaching, their response in Acts 4:1920 shows the impact of Jesus' teaching: "Whether it's right in the sight of God for us
to listen to you rather than to God, you decide; for we are unable to stop speaking about what we have seen and heard" (HCSB). The message of the kingdom begins with the attitude that it's better to be hated by men and loved by God than loved by men and an enemy of God.
APPLICATION
Help your group identify how the truths from the Scripture passage apply directly to their lives.
When you're part of the kingdom of God, your life looks different. The characteristics described in the beginning of Jesus' Sermon on the Mount are the foundation on which those differences are built. When our attitudes are transformed, so are our actions. Unfortunately, because we're sinners who must rely on God's grace, the right disposition isn't always present. But when our attitudes and actions focus on God's glory and spreading His light, we can't help but impact the world.
Of the eight Beatitudes, which two do you most desire in your life right now? Which of these qualities are you most tempted to avoid?
What causes us to forget about the kingdom of God and our need for Him?
How can we remind ourselves daily that we're first and foremost citizens of God's kingdom?
What fears come with being salt and light in the world?
Think of those fears in light of verses 10-12. What does this mean for Christians when it comes to defining "success." How do you define success as a citizen of God's kingdom, and how does that compare with the culture's definition?
In what areas of your life do you seek to blend into the culture rather than stand out for God's kingdom? How can you actively fight against that tendency this week?
PRAY
Today's Scripture passage forces us to honestly evaluate whether our attitudes and actions are in line with Jesus' expectations and whether our lives display God's mercy and love to the world. Close today's group session with a silent time of reflective prayer. Encourage group members to confess to God the things they've been convicted about this week and this morning. Then close the prayer by reading aloud Psalm 8.
FOLLOW UP
Midway through this week, send a follow-up e-mail to your group with some or all of the following information:
❏ Questions to consider as they continue to reflect on what they learned this week:
This past week, did you feel more blessed or stressed? What can you do to be more focused on God's blessings in your life?
How does your attitude compare with those of the Beatitudes? Ask your spouse, your small group, or a close friend to help you evaluate.
❏ A note of encouragement, following up on any specific prayer requests mentioned during your group gathering.
❏ The challenge to memorize Matthew 5:14-16.
❏ The text for next week's sermon, so group members can read it in anticipation of next weekend: Matthew 5:17-30.
BRENTWOOD BAPTIST CHURCH
BUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013
COMMENTARY
MATTHEW 5:1-12
5:1-2. Matthew 4:23-25 sets the stage for Jesus' Sermon on the Mount. People from all over Galilee and surrounding areas flocked to see and hear Him as well as to seek healing. On a particular day, when He saw the crowds, He went up to a place on a nearby mountain. Teachers of that day customarily spoke from a seated position, so He sat down with His disciples gathered around Him. Then He began to teach them (v. 2). Although His disciples and the crowd could hear Jesus (7:28), His message seems targeted mainly to those He had singled out to follow Him. Still, His words certainly reveal to all His hearers the real meaning of following Him.
5:3. Jesus declared people who exhibit particular characteristics to be divinely blessed. He was not saying that people should strive to attain those characteristics so they could earn the right to tap into God's blessings. Rather, those characteristics identify people who by God's grace are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord.
The first four Beatitudes (vv. 3-6) reflect inner attitudes, the first of which is poor in spirit. This is opposite the attitude of being arrogant and self-sufficient, a trait prized and admired by the world. No one can earn God's blessing. People who think they can please God on their own are blind to their sins and ignorant of God's high standards. Poverty of spirit is the prelude to the riches of salvation. Jesus pronounced the poor in spirit to be blessed because, as followers of Jesus, the kingdom of heaven is theirs ("kingdom of heaven" and "kingdom of God" are used interchangeably in the Gospels). While this citizenship is a present possession of believers, the full benefit of kingdom citizenship awaits Christ's return.
5:4. Those who mourn are blessed, for they will be comforted. Jesus did not specify what sort of mourning He had in mind, so it could include all mourning. In the context of the other Beatitudes, mourning over our sins of commission and omission probably should receive emphasis. When we honestly repent of our lapses into sin, we are comforted anew with the assurance our sins all have been atoned in Christ. Mourning over sin also can include the sinful attitudes and actions in cultures throughout the world and around us. We mourn sins' destructive effects on multitudes. Part of God's comfort in that arena lies in the assurance that in the end, His scales of justice will be balanced.
5:5. The next attitude is gentleness. The word translated gentle conveys the notion of being meek, humble, sensitive, considerate, and courteous. Gentleness puts the focus on others rather than self. Being gentle does not mean being a pushover. This inner attitude stems from a spiritually educated awareness of our own spiritual poverty. Scripture indicates Jesus' followers will reign with Him (2 Tim. 2:12; Rev. 5:10). That promise will be fulfilled when He establishes His kingdom in the new heavens and earth. Ruling with Him implies our attitudes will parallel His. The blessing Jesus pronounced won't be centered in ownership but in serving Him (in ways not yet revealed).
5:6. The fourth attitude is a hunger and thirst for righteousness. This righteousness is not the righteousness of Christ through which God views us believers (justification). Rather this is the inner desire to make right choices, say right words, and do right actions, which is part of God's work to make us more like Christ. We who seek to follow Christ know we don't measure up to His standards, but we want to do so. As
COMMENTARY
we walk faithfully with Him over time, He instills in us more and more the purpose and the power to please Him (Phil. 2:13). Admittedly, though we grow in right living, in this life we will never be absolutely righteous. So we are called blessed as we long for righteousness in the sense that we have the sure hope that we will be filled with righteousness (Matt. 5:6). The process has begun, and our limited progress brings encouragement. That process won't be completed, however, until Christ's second coming (1 John 3:2).
5:7. While the first four Beatitudes focus on inward attitudes, the last four concern outward relationships. Being merciful involves forgiving, but it also includes a loving response to the miserable and helpless. As God's children we have received mercy, and this equips us to extend mercy to others. The merciful will be shown mercy. Showing mercy to others demonstrates we have received God's mercy.
5:8. Jesus then described as blessed those who are pure in heart. The Pharisees were scrupulous about performing washing rituals that made them ceremonially clean. Jesus stripped away their pretense, saying that they were as beautiful tombs on the outside but filled with impurities within (23:27). Heart indicates the core of our being—our thoughts, our feelings, our intentions, our values, our longings. The word pure includes sexual purity but much more. It describes those whose hearts are cleansed by Christ and empowered by the Holy Spirit. Such hearts lead us away from acting with any kind of deceit, meanness, or selfish motives.
Will see God is future. We will see the Lord when He returns (1 John 3:2). This hope motivates us to act with pure hearts until then (v. 3). Now, however, we see Him with eyes of faith. When our hearts are clean, we see Him more and more clearly (meaning we better understand Him, His ways, His purposes).
5:9. Peacemakers are blessed, for they will be called sons of God. Sons of God is a way of saying "like father, like son." God is the supreme Peacemaker, making peace between sinners and Himself through Christ. He also leads redeemed sinners to help others be reconciled to God as well as to one another.
5:10-12. The final Beatitude seems paradoxical. Mixing persecution and blessing seems akin to mixing oil and water. Perhaps this is the reason Jesus added comments in verses 11-12. He shifted to the second person, you, apparently addressing His chosen disciples in particular. Notice first that the persecution is for righteousness, and in verse 11 Jesus defined that as because of Me. People who willfully reject Christ are prone to reject those who live for Christ. This can include insults, false accusations, slanderous gossip, and, in extreme cases, death.
In what sense are the persecuted Christians blessed? They are citizens of His kingdom. Jesus never encouraged His followers to hide their faith in Him when facing persecution, but rather to be glad and rejoice. He added that their heavenly reward would be great. He placed persecuted believers in the same category as God's persecuted prophets. Jesus wasn't giving us a list of qualities to strive for in order to be blessed. We are blessed because these qualities demonstrate that we are His followers.
MATTHEW 5:13-16
5:13. Jesus stressed believers' influence in the world by declaring, "You are the salt of the earth." Salt has several uses, but the most prominent are to preserve and to flavor.
COMMENTARY
Believers are to act as checks on the world's corruption. For salt to preserve meat it has to be rubbed into it. For salt to flavor food, it has to be added to it. We cannot impact worldly people by avoiding them. We need to be the most upright, friendly, available, thoughtful, considerate, and helpful people on the block, on the job, or on the team. Our saltiness can help check bad behavior and also can make others thirsty for Christ.
5:14-15. Since Jesus truly is "the light of the world" (John 9:5), our being the light of the world is true in the sense we reflect His life imparted to us by the indwelling Holy Spirit. Cities are built on high places to be seen not hidden. Lamps are placed on elevated stands so they will dispel the most darkness. Likewise, we believers are to be open and obvious Christians in all ordinary activities, shining the light of God's truth in a spiritually darkened world.
5:16. The word for good in good works means both good and attractive (v. 16). Such deeds are carried out in ways that are admirable, and reflect the quality of our character. They are not intended to draw the spotlight to us but to God. Jesus doesn't want us to be spiritual show-offs. He wants us to live and serve in ways through which God can show Himself.
|
<urn:uuid:726f8f17-4b47-4bde-b8c6-61819b28e89e>
|
CC-MAIN-2019-09
|
http://dc-samples.s3.amazonaws.com/BrentwoodBaptist_Sample.pdf
|
2019-02-16T10:35:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480240.25/warc/CC-MAIN-20190216085312-20190216111312-00159.warc.gz
| 70,398,366
| 4,738
|
eng_Latn
|
eng_Latn
| 0.997571
|
eng_Latn
| 0.997859
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2580,
5223,
7741,
10293,
12348,
13094,
16884,
20343,
21630
] |
BRENTWOOD BAPTIST CHURCH
BUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013
PREPARATION
> SPEND THE WEEK STUDYING MATTHEW 5:1-16. Consult the commentary provided and any additional study tools (such as a concordance or Bible dictionary) to enhance your preparation.
> DETERMINE which discussion points and questions will work best with your group.
> PRAY for our pastors and the "But I Say" series, the upcoming group meeting, your teaching, your group members, and their receptivity to the lesson.
HIGHLIGHTS
> BIBLICAL EMPHASIS: As Moses brought the 10 Commandments to the Israelites as they approached the promised land, so Jesus brings us the expectations of the kingdom citizen in Matthew 5–7. "Because you are My children," Jesus seems to be saying, "this is how you are to live." To begin His Sermon on the Mount, Jesus described the characteristics and blessings of those who follow Him. He focused on both inner attitude and outward relationships. He then used two word pictures— salt and light—to describe the impact His followers will have on the world. These characteristics are "blessed," empowered by God. When lived out, each characteristic brings glory to God.
> LIFE APPLICATION: As a result of today's study, you will learn how to:
1. Bring glory to God in your inner attitude (5:1-6).
2. Bring glory to God in your outward relationships (5:7-12).
3. Bring glory to God in your worldwide influence (5:13-16).
INTRODUCTION
As your group time begins, use this section to help get the conversation going.
How would you define "blessed"? How would most people in the city of Brentwood define it? How would Jesus define it?
What was one specific day when you felt particularly blessed?
Being a Christ-follower isn't just a matter of thinking and doing the right things and avoiding the wrong things. Foundational to being a Christian is a personal relationship with Jesus that empowers you to live for God. That relationship is the result of God's blessing in your life, and it changes you from the inside out. God's power at work in you enables you to reflect kingdom characteristics in the way you live.
UNDERSTANDING
Unpack the biblical text to discover what Scripture says or means about a particular topic.
When we imagine the scene of the Sermon on the Mount, we typically picture Jesus perched on the side of a large hill speaking out to a crowd of people. But that's not
This curriculum was produced in collaboration with the Preaching Team, the Discipleship Team, and LifeWay Christian Resources.
what we read in Matthew 5:1. Matthew reported that Jesus saw the crowds, went up on a mountain, and sat down with His disciples. Instead of a grand speech, we see an intimate conversation with His small group of disciples. By the end of the sermon (Matthew 7:28), it becomes evident that the crowds could hear what Jesus w
|
as telling the men.
|
> HAVE A VOLUNTEER READ MATTHEW 5:1-6.
Matthew 5:3-10 is often referred to as the Beatitudes. They're a set of blessings set up in Hebrew poetical form. The first statement, "The poor in spirit are blessed, for the kingdom of heaven is theirs" (v. 3), bears the same reward as the last, "Those who are persecuted for righteousness are blessed, for the kingdom of heaven is theirs" (v. 10). In Hebrew poetry, the repeated theme means that everything in the middle (vv. 4-9) share a common theme. In this case, it's the attitudes by which we can recognize people who are a part of the kingdom of God.
What do you think the word "blessed" means in the context of the Beatitudes?
The Greek word for "blessed" doesn't just carry the meaning of "happy" that is often associated with it. It carries the connotation of approval or favor. We might paraphrase the first Beatitude as God approves of the poor in spirit. Jesus declared people who exhibit particular characteristics to be divinely blessed. Those characteristics identify people who, by God's grace, are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord. The Beatitudes do not describe eight separate and distinct groups of people, but eight characteristics or qualities that define kingdom people.
How do the Beatitudes in verses 3-6 relate to the promises that follow them? How would you describe the opposite of each quality?
What kind of mourning do you feel Jesus is talking about in verse 4? What causes you to mourn?
When you think of someone who is a good example of meekness (v. 5), what is that person like? What do you admire? How do they model humility?
The clear theme in verses 3-6 is that God approves of people who know they're broken, who know they're nothing without His blessing. We don't earn the kingdom of heaven by being poor in spirit. We're poor in spirit because we know that we could never earn a place in God's kingdom, but through His grace He provides a way to let us in.
> HAVE ANOTHER VOLUNTEER READ MATTHEW 5:7-12.
In the second section of the Beatitudes, we continue to see the thread of kingdom attitudes, but the focus shifts away from our spirits and toward our relationships with others.
How is the focus different from the previous section? What do the four attitudes in verses 7-12 (merciful, pure in heart, peacemaker, righteousness) have in common?
How do the Beatitudes in these verses relate to the promises that follow them? How would you describe the opposite of each quality?
These verses highlight the attitudes God's people should display externally. How we treat others flows out of the personal characteristics listed in the first set of verses. Think of it like this: People who know they need mercy will, in turn, show mercy. People who mourn their sins before God will be covered in His righteousness and made pure in their hearts. People who have spirits of gentleness won't fight for their best interests but will seek to make peace with others. And people who "hunger and thirst for righteousness" will face persecution because becoming like Christ includes joining Him in His suffering.
While grace is the act of giving a gift that is not deserved, mercy is the withholding or preventing of a negative consequence rightly deserved. What are some oppor tunities you have to show mercy on a weekly basis?
How is peace keeping different than peace making?
Do the blessings described in these verses line up with an "ideal" life by cultural standards? Why or why not? If not, what are some of the noticeable differences?
Through these statements, Jesus both encouraged and warned His disciples that as they pursued God, they would meet persecution. Although persecution is not something anyone wants to endure, it's a definite marker of a faithful life.
What are some ways you hear of people in Middle Tennessee being persecuted for their faith? People around the world?
Have you ever been persecuted in some way because of your faith in Christ? How did you respond?
Verses 11-12 transition out of the Beatitudes and into the rest of Jesus' sermon. To encourage the disciples in the face of future persecutions, Jesus compared them to the prophets who came before Him. The Old Testament prophets faithfully followed God and shared His message with the world, regardless of the world's response. By comparing Christ-followers to Old Testament prophets, Jesus encouraged His disciples to remain faithful because their reward in heaven would be great—just as it was for the prophets.
Consider the prophets in the Old Testament. Would you consider their lives and ministries successful? What was persecution like for them?
What does this idea communicate about the kingdom of God?
Have someone read James 1:2-4. Why should we rejoice about endurance? List some figures in Scripture who model this endurance.
Jesus understood that persecution would be a part of the lives of His people because of Him and His message. They would be reviled "on his account." He wanted them to rejoice in suffering because it was evidence that they would receive an award far greater than anything the world offered.
> HAVE A FINAL VOLUNTEER READ MATTHEW 5:13-16.
In verses 13-16, Jesus explained the impact a kingdom attitude can have on the world. He did so with two word pictures—salt and light. Jesus calls His followers "the salt of the earth." Salt's primary function in Jesus' day was to help preserve food (especially meat), an act that was particularly important in the Middle East due to hot temperatures and arid climate.
What is the church's role in serving and preserving culture? What part do you play in that picture?
How is the command to be salt and light related to the Beatitudes in verses 3-10?
As believers, we act as a preservative in the culture around us by maintaining high moral and spiritual standards that counteract the sin and decay of the world. Salt also serves to add flavor, which is the way we use it today. Salt is distinctly different from the things with which it's mixed. Jesus' disciples likewise are to be different from the world.
How does the message of God's kingdom add flavor to your life? to the world?
Why must God's people be distinctly different from people who don't know Him?
By referring to salt, Jesus was making a statement about what it really means to be part of the kingdom of God. People who understand their need for God and have realized His mercy toward them, who seek righteousness even amidst persecution, must not lose their saltiness. Those who follow Him can't keep that hidden, which sets up verse 14 nicely. If we're part of God's kingdom, the world can't help but notice we're different.
How have you noticed a specific change in another person's life because of his/her relationship with God? How has He made a difference in your life?
In addition to salvation, what other positive effects can God's kingdom have on the world?
The result of living out the kingdom attitudes described in Scripture is that Christ's light will shine from within us and pierce the darkness in the world. When Peter and John are told by the Jewish leaders to stop preaching, their response in Acts 4:1920 shows the impact of Jesus' teaching: "Whether it's right in the sight of God for us
to listen to you rather than to God, you decide; for we are unable to stop speaking about what we have seen and heard" (HCSB). The message of the kingdom begins with the attitude that it's better to be hated by men and loved by God than loved by men and an enemy of God.
APPLICATION
Help your group identify how the truths from the Scripture passage apply directly to their lives.
When you're part of the kingdom of God, your life looks different. The characteristics described in the beginning of Jesus' Sermon on the Mount are the foundation on which those differences are built. When our attitudes are transformed, so are our actions. Unfortunately, because we're sinners who must rely on God's grace, the right disposition isn't always present. But when our attitudes and actions focus on God's glory and spreading His light, we can't help but impact the world.
Of the eight Beatitudes, which two do you most desire in your life right now? Which of these qualities are you most tempted to avoid?
What causes us to forget about the kingdom of God and our need for Him?
How can we remind ourselves daily that we're first and foremost citizens of God's kingdom?
What fears come with being salt and light in the world?
Think of those fears in light of verses 10-12. What does this mean for Christians when it comes to defining "success." How do you define success as a citizen of God's kingdom, and how does that compare with the culture's definition?
In what areas of your life do you seek to blend into the culture rather than stand out for God's kingdom? How can you actively fight against that tendency this week?
PRAY
Today's Scripture passage forces us to honestly evaluate whether our attitudes and actions are in line with Jesus' expectations and whether our lives display God's mercy and love to the world. Close today's group session with a silent time of reflective prayer. Encourage group members to confess to God the things they've been convicted about this week and this morning. Then close the prayer by reading aloud Psalm 8.
FOLLOW UP
Midway through this week, send a follow-up e-mail to your group with some or all of the following information:
❏ Questions to consider as they continue to reflect on what they learned this week:
This past week, did you feel more blessed or stressed? What can you do to be more focused on God's blessings in your life?
How does your attitude compare with those of the Beatitudes? Ask your spouse, your small group, or a close friend to help you evaluate.
❏ A note of encouragement, following up on any specific prayer requests mentioned during your group gathering.
❏ The challenge to memorize Matthew 5:14-16.
❏ The text for next week's sermon, so group members can read it in anticipation of next weekend: Matthew 5:17-30.
BRENTWOOD BAPTIST CHURCH
BUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013
COMMENTARY
MATTHEW 5:1-12
5:1-2. Matthew 4:23-25 sets the stage for Jesus' Sermon on the Mount. People from all over Galilee and surrounding areas flocked to see and hear Him as well as to seek healing. On a particular day, when He saw the crowds, He went up to a place on a nearby mountain. Teachers of that day customarily spoke from a seated position, so He sat down with His disciples gathered around Him. Then He began to teach them (v. 2). Although His disciples and the crowd could hear Jesus (7:28), His message seems targeted mainly to those He had singled out to follow Him. Still, His words certainly reveal to all His hearers the real meaning of following Him.
5:3. Jesus declared people who exhibit particular characteristics to be divinely blessed. He was not saying that people should strive to attain those characteristics so they could earn the right to tap into God's blessings. Rather, those characteristics identify people who by God's grace are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord.
The first four Beatitudes (vv. 3-6) reflect inner attitudes, the first of which is poor in spirit. This is opposite the attitude of being arrogant and self-sufficient, a trait prized and admired by the world. No one can earn God's blessing. People who think they can please God on their own are blind to their sins and ignorant of God's high standards. Poverty of spirit is the prelude to the riches of salvation. Jesus pronounced the poor in spirit to be blessed because, as followers of Jesus, the kingdom of heaven is theirs ("kingdom of heaven" and "kingdom of God" are used interchangeably in the Gospels). While this citizenship is a present possession of believers, the full benefit of kingdom citizenship awaits Christ's return.
5:4. Those who mourn are blessed, for they will be comforted. Jesus did not specify what sort of mourning He had in mind, so it could include all mourning. In the context of the other Beatitudes, mourning over our sins of commission and omission probably should receive emphasis. When we honestly repent of our lapses into sin, we are comforted anew with the assurance our sins all have been atoned in Christ. Mourning over sin also can include the sinful attitudes and actions in cultures throughout the world and around us. We mourn sins' destructive effects on multitudes. Part of God's comfort in that arena lies in the assurance that in the end, His scales of justice will be balanced.
5:5. The next attitude is gentleness. The word translated gentle conveys the notion of being meek, humble, sensitive, considerate, and courteous. Gentleness puts the focus on others rather than self. Being gentle does not mean being a pushover. This inner attitude stems from a spiritually educated awareness of our own spiritual poverty. Scripture indicates Jesus' followers will reign with Him (2 Tim. 2:12; Rev. 5:10). That promise will be fulfilled when He establishes His kingdom in the new heavens and earth. Ruling with Him implies our attitudes will parallel His. The blessing Jesus pronounced won't be centered in ownership but in serving Him (in ways not yet revealed).
5:6. The fourth attitude is a hunger and thirst for righteousness. This righteousness is not the righteousness of Christ through which God views us believers (justification). Rather this is the inner desire to make right choices, say right words, and do right actions, which is part of God's work to make us more like Christ. We who seek to follow Christ know we don't measure up to His standards, but we want to do so. As
COMMENTARY
we walk faithfully with Him over time, He instills in us more and more the purpose and the power to please Him (Phil. 2:13). Admittedly, though we grow in right living, in this life we will never be absolutely righteous. So we are called blessed as we long for righteousness in the sense that we have the sure hope that we will be filled with righteousness (Matt. 5:6). The process has begun, and our limited progress brings encouragement. That process won't be completed, however, until Christ's second coming (1 John 3:2).
5:7. While the first four Beatitudes focus on inward attitudes, the last four concern outward relationships. Being merciful involves forgiving, but it also includes a loving response to the miserable and helpless. As God's children we have received mercy, and this equips us to extend mercy to others. The merciful will be shown mercy. Showing mercy to others demonstrates we have received God's mercy.
5:8. Jesus then described as blessed those who are pure in heart. The Pharisees were scrupulous about performing washing rituals that made them ceremonially clean. Jesus stripped away their pretense, saying that they were as beautiful tombs on the outside but filled with impurities within (23:27). Heart indicates the core of our being—our thoughts, our feelings, our intentions, our values, our longings. The word pure includes sexual purity but much more. It describes those whose hearts are cleansed by Christ and empowered by the Holy Spirit. Such hearts lead us away from acting with any kind of deceit, meanness, or selfish motives.
Will see God is future. We will see the Lord when He returns (1 John 3:2). This hope motivates us to act with pure hearts until then (v. 3). Now, however, we see Him with eyes of faith. When our hearts are clean, we see Him more and more clearly (meaning we better understand Him, His ways, His purposes).
5:9. Peacemakers are blessed, for they will be called sons of God. Sons of God is a way of saying "like father, like son." God is the supreme Peacemaker, making peace between sinners and Himself through Christ. He also leads redeemed sinners to help others be reconciled to God as well as to one another.
5:10-12. The final Beatitude seems paradoxical. Mixing persecution and blessing seems akin to mixing oil and water. Perhaps this is the reason Jesus added comments in verses 11-12. He shifted to the second person, you, apparently addressing His chosen disciples in particular. Notice first that the persecution is for righteousness, and in verse 11 Jesus defined that as because of Me. People who willfully reject Christ are prone to reject those who live for Christ. This can include insults, false accusations, slanderous gossip, and, in extreme cases, death.
In what sense are the persecuted Christians blessed? They are citizens of His kingdom. Jesus never encouraged His followers to hide their faith in Him when facing persecution, but rather to be glad and rejoice. He added that their heavenly reward would be great. He placed persecuted believers in the same category as God's persecuted prophets. Jesus wasn't giving us a list of qualities to strive for in order to be blessed. We are blessed because these qualities demonstrate that we are His followers.
MATTHEW 5:13-16
5:13. Jesus stressed believers' influence in the world by declaring, "You are the salt of the earth." Salt has several uses, but the most prominent are to preserve and to flavor.
COMMENTARY
Believers are to act as checks on the world's corruption. For salt to preserve meat it has to be rubbed into it. For salt to flavor food, it has to be added to it. We cannot impact worldly people by avoiding them. We need to be the most upright, friendly, available, thoughtful, considerate, and helpful people on the block, on the job, or on the team. Our saltiness can help check bad behavior and also can make others thirsty for Christ.
5:14-15. Since Jesus truly is "the light of the world" (John 9:5), our being the light of the world is true in the sense we reflect His life imparted to us by the indwelling Holy Spirit. Cities are built on high places to be seen not hidden. Lamps are placed on elevated stands so they will dispel the most darkness. Likewise, we believers are to be open and obvious Christians in all ordinary activities, shining the light of God's truth in a spiritually darkened world.
5:16. The word for good in good works means both good and attractive (v. 16). Such deeds are carried out in ways that are admirable, and reflect the quality of our character. They are not intended to draw the spotlight to us but to God. Jesus doesn't want us to be spiritual show-offs. He wants us to live and serve in ways through which God can show Himself.
| 2,904
|
inside_word
|
was
|
remove_one_sentence
|
<url>
http://dc-samples.s3.amazonaws.com/BrentwoodBaptist_Sample.pdf
</url>
<text>
BRENTWOOD BAPTIST CHURCH
BUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013
PREPARATION
> SPEND THE WEEK STUDYING MATTHEW 5:1-16. Consult the commentary provided and any additional study tools (such as a concordance or Bible dictionary) to enhance your preparation.
> DETERMINE which discussion points and questions will work best with your group.
> PRAY for our pastors and the "But I Say" series, the upcoming group meeting, your teaching, your group members, and their receptivity to the lesson.
HIGHLIGHTS
> BIBLICAL EMPHASIS: As Moses brought the 10 Commandments to the Israelites as they approached the promised land, so Jesus brings us the expectations of the kingdom citizen in Matthew 5–7. "Because you are My children," Jesus seems to be saying, "this is how you are to live." To begin His Sermon on the Mount, Jesus described the characteristics and blessings of those who follow Him. He focused on both inner attitude and outward relationships. He then used two word pictures— salt and light—to describe the impact His followers will have on the world. These characteristics are "blessed," empowered by God. When lived out, each characteristic brings glory to God.
> LIFE APPLICATION: As a result of today's study, you will learn how to:
1. Bring glory to God in your inner attitude (5:1-6).
2. Bring glory to God in your outward relationships (5:7-12).
3. Bring glory to God in your worldwide influence (5:13-16).
INTRODUCTION
As your group time begins, use this section to help get the conversation going.
How would you define "blessed"? How would most people in the city of Brentwood define it? How would Jesus define it?
What was one specific day when you felt particularly blessed?
Being a Christ-follower isn't just a matter of thinking and doing the right things and avoiding the wrong things. Foundational to being a Christian is a personal relationship with Jesus that empowers you to live for God. That relationship is the result of God's blessing in your life, and it changes you from the inside out. God's power at work in you enables you to reflect kingdom characteristics in the way you live.
UNDERSTANDING
Unpack the biblical text to discover what Scripture says or means about a particular topic.
When we imagine the scene of the Sermon on the Mount, we typically picture Jesus perched on the side of a large hill speaking out to a crowd of people. But that's not
This curriculum was produced in collaboration with the Preaching Team, the Discipleship Team, and LifeWay Christian Resources.
what we read in Matthew 5:1. Matthew reported that Jesus saw the crowds, went up on a mountain, and sat down with His disciples. Instead of a grand speech, we see an intimate conversation with His small group of disciples. By the end of the sermon (Matthew 7:28), it becomes evident that the crowds could hear what Jesus w<cursor_is_here>
> HAVE A VOLUNTEER READ MATTHEW 5:1-6.
Matthew 5:3-10 is often referred to as the Beatitudes. They're a set of blessings set up in Hebrew poetical form. The first statement, "The poor in spirit are blessed, for the kingdom of heaven is theirs" (v. 3), bears the same reward as the last, "Those who are persecuted for righteousness are blessed, for the kingdom of heaven is theirs" (v. 10). In Hebrew poetry, the repeated theme means that everything in the middle (vv. 4-9) share a common theme. In this case, it's the attitudes by which we can recognize people who are a part of the kingdom of God.
What do you think the word "blessed" means in the context of the Beatitudes?
The Greek word for "blessed" doesn't just carry the meaning of "happy" that is often associated with it. It carries the connotation of approval or favor. We might paraphrase the first Beatitude as God approves of the poor in spirit. Jesus declared people who exhibit particular characteristics to be divinely blessed. Those characteristics identify people who, by God's grace, are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord. The Beatitudes do not describe eight separate and distinct groups of people, but eight characteristics or qualities that define kingdom people.
How do the Beatitudes in verses 3-6 relate to the promises that follow them? How would you describe the opposite of each quality?
What kind of mourning do you feel Jesus is talking about in verse 4? What causes you to mourn?
When you think of someone who is a good example of meekness (v. 5), what is that person like? What do you admire? How do they model humility?
The clear theme in verses 3-6 is that God approves of people who know they're broken, who know they're nothing without His blessing. We don't earn the kingdom of heaven by being poor in spirit. We're poor in spirit because we know that we could never earn a place in God's kingdom, but through His grace He provides a way to let us in.
> HAVE ANOTHER VOLUNTEER READ MATTHEW 5:7-12.
In the second section of the Beatitudes, we continue to see the thread of kingdom attitudes, but the focus shifts away from our spirits and toward our relationships with others.
How is the focus different from the previous section? What do the four attitudes in verses 7-12 (merciful, pure in heart, peacemaker, righteousness) have in common?
How do the Beatitudes in these verses relate to the promises that follow them? How would you describe the opposite of each quality?
These verses highlight the attitudes God's people should display externally. How we treat others flows out of the personal characteristics listed in the first set of verses. Think of it like this: People who know they need mercy will, in turn, show mercy. People who mourn their sins before God will be covered in His righteousness and made pure in their hearts. People who have spirits of gentleness won't fight for their best interests but will seek to make peace with others. And people who "hunger and thirst for righteousness" will face persecution because becoming like Christ includes joining Him in His suffering.
While grace is the act of giving a gift that is not deserved, mercy is the withholding or preventing of a negative consequence rightly deserved. What are some oppor tunities you have to show mercy on a weekly basis?
How is peace keeping different than peace making?
Do the blessings described in these verses line up with an "ideal" life by cultural standards? Why or why not? If not, what are some of the noticeable differences?
Through these statements, Jesus both encouraged and warned His disciples that as they pursued God, they would meet persecution. Although persecution is not something anyone wants to endure, it's a definite marker of a faithful life.
What are some ways you hear of people in Middle Tennessee being persecuted for their faith? People around the world?
Have you ever been persecuted in some way because of your faith in Christ? How did you respond?
Verses 11-12 transition out of the Beatitudes and into the rest of Jesus' sermon. To encourage the disciples in the face of future persecutions, Jesus compared them to the prophets who came before Him. The Old Testament prophets faithfully followed God and shared His message with the world, regardless of the world's response. By comparing Christ-followers to Old Testament prophets, Jesus encouraged His disciples to remain faithful because their reward in heaven would be great—just as it was for the prophets.
Consider the prophets in the Old Testament. Would you consider their lives and ministries successful? What was persecution like for them?
What does this idea communicate about the kingdom of God?
Have someone read James 1:2-4. Why should we rejoice about endurance? List some figures in Scripture who model this endurance.
Jesus understood that persecution would be a part of the lives of His people because of Him and His message. They would be reviled "on his account." He wanted them to rejoice in suffering because it was evidence that they would receive an award far greater than anything the world offered.
> HAVE A FINAL VOLUNTEER READ MATTHEW 5:13-16.
In verses 13-16, Jesus explained the impact a kingdom attitude can have on the world. He did so with two word pictures—salt and light. Jesus calls His followers "the salt of the earth." Salt's primary function in Jesus' day was to help preserve food (especially meat), an act that was particularly important in the Middle East due to hot temperatures and arid climate.
What is the church's role in serving and preserving culture? What part do you play in that picture?
How is the command to be salt and light related to the Beatitudes in verses 3-10?
As believers, we act as a preservative in the culture around us by maintaining high moral and spiritual standards that counteract the sin and decay of the world. Salt also serves to add flavor, which is the way we use it today. Salt is distinctly different from the things with which it's mixed. Jesus' disciples likewise are to be different from the world.
How does the message of God's kingdom add flavor to your life? to the world?
Why must God's people be distinctly different from people who don't know Him?
By referring to salt, Jesus was making a statement about what it really means to be part of the kingdom of God. People who understand their need for God and have realized His mercy toward them, who seek righteousness even amidst persecution, must not lose their saltiness. Those who follow Him can't keep that hidden, which sets up verse 14 nicely. If we're part of God's kingdom, the world can't help but notice we're different.
How have you noticed a specific change in another person's life because of his/her relationship with God? How has He made a difference in your life?
In addition to salvation, what other positive effects can God's kingdom have on the world?
The result of living out the kingdom attitudes described in Scripture is that Christ's light will shine from within us and pierce the darkness in the world. When Peter and John are told by the Jewish leaders to stop preaching, their response in Acts 4:1920 shows the impact of Jesus' teaching: "Whether it's right in the sight of God for us
to listen to you rather than to God, you decide; for we are unable to stop speaking about what we have seen and heard" (HCSB). The message of the kingdom begins with the attitude that it's better to be hated by men and loved by God than loved by men and an enemy of God.
APPLICATION
Help your group identify how the truths from the Scripture passage apply directly to their lives.
When you're part of the kingdom of God, your life looks different. The characteristics described in the beginning of Jesus' Sermon on the Mount are the foundation on which those differences are built. When our attitudes are transformed, so are our actions. Unfortunately, because we're sinners who must rely on God's grace, the right disposition isn't always present. But when our attitudes and actions focus on God's glory and spreading His light, we can't help but impact the world.
Of the eight Beatitudes, which two do you most desire in your life right now? Which of these qualities are you most tempted to avoid?
What causes us to forget about the kingdom of God and our need for Him?
How can we remind ourselves daily that we're first and foremost citizens of God's kingdom?
What fears come with being salt and light in the world?
Think of those fears in light of verses 10-12. What does this mean for Christians when it comes to defining "success." How do you define success as a citizen of God's kingdom, and how does that compare with the culture's definition?
In what areas of your life do you seek to blend into the culture rather than stand out for God's kingdom? How can you actively fight against that tendency this week?
PRAY
Today's Scripture passage forces us to honestly evaluate whether our attitudes and actions are in line with Jesus' expectations and whether our lives display God's mercy and love to the world. Close today's group session with a silent time of reflective prayer. Encourage group members to confess to God the things they've been convicted about this week and this morning. Then close the prayer by reading aloud Psalm 8.
FOLLOW UP
Midway through this week, send a follow-up e-mail to your group with some or all of the following information:
❏ Questions to consider as they continue to reflect on what they learned this week:
This past week, did you feel more blessed or stressed? What can you do to be more focused on God's blessings in your life?
How does your attitude compare with those of the Beatitudes? Ask your spouse, your small group, or a close friend to help you evaluate.
❏ A note of encouragement, following up on any specific prayer requests mentioned during your group gathering.
❏ The challenge to memorize Matthew 5:14-16.
❏ The text for next week's sermon, so group members can read it in anticipation of next weekend: Matthew 5:17-30.
BRENTWOOD BAPTIST CHURCH
BUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013
COMMENTARY
MATTHEW 5:1-12
5:1-2. Matthew 4:23-25 sets the stage for Jesus' Sermon on the Mount. People from all over Galilee and surrounding areas flocked to see and hear Him as well as to seek healing. On a particular day, when He saw the crowds, He went up to a place on a nearby mountain. Teachers of that day customarily spoke from a seated position, so He sat down with His disciples gathered around Him. Then He began to teach them (v. 2). Although His disciples and the crowd could hear Jesus (7:28), His message seems targeted mainly to those He had singled out to follow Him. Still, His words certainly reveal to all His hearers the real meaning of following Him.
5:3. Jesus declared people who exhibit particular characteristics to be divinely blessed. He was not saying that people should strive to attain those characteristics so they could earn the right to tap into God's blessings. Rather, those characteristics identify people who by God's grace are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord.
The first four Beatitudes (vv. 3-6) reflect inner attitudes, the first of which is poor in spirit. This is opposite the attitude of being arrogant and self-sufficient, a trait prized and admired by the world. No one can earn God's blessing. People who think they can please God on their own are blind to their sins and ignorant of God's high standards. Poverty of spirit is the prelude to the riches of salvation. Jesus pronounced the poor in spirit to be blessed because, as followers of Jesus, the kingdom of heaven is theirs ("kingdom of heaven" and "kingdom of God" are used interchangeably in the Gospels). While this citizenship is a present possession of believers, the full benefit of kingdom citizenship awaits Christ's return.
5:4. Those who mourn are blessed, for they will be comforted. Jesus did not specify what sort of mourning He had in mind, so it could include all mourning. In the context of the other Beatitudes, mourning over our sins of commission and omission probably should receive emphasis. When we honestly repent of our lapses into sin, we are comforted anew with the assurance our sins all have been atoned in Christ. Mourning over sin also can include the sinful attitudes and actions in cultures throughout the world and around us. We mourn sins' destructive effects on multitudes. Part of God's comfort in that arena lies in the assurance that in the end, His scales of justice will be balanced.
5:5. The next attitude is gentleness. The word translated gentle conveys the notion of being meek, humble, sensitive, considerate, and courteous. Gentleness puts the focus on others rather than self. Being gentle does not mean being a pushover. This inner attitude stems from a spiritually educated awareness of our own spiritual poverty. Scripture indicates Jesus' followers will reign with Him (2 Tim. 2:12; Rev. 5:10). That promise will be fulfilled when He establishes His kingdom in the new heavens and earth. Ruling with Him implies our attitudes will parallel His. The blessing Jesus pronounced won't be centered in ownership but in serving Him (in ways not yet revealed).
5:6. The fourth attitude is a hunger and thirst for righteousness. This righteousness is not the righteousness of Christ through which God views us believers (justification). Rather this is the inner desire to make right choices, say right words, and do right actions, which is part of God's work to make us more like Christ. We who seek to follow Christ know we don't measure up to His standards, but we want to do so. As
COMMENTARY
we walk faithfully with Him over time, He instills in us more and more the purpose and the power to please Him (Phil. 2:13). Admittedly, though we grow in right living, in this life we will never be absolutely righteous. So we are called blessed as we long for righteousness in the sense that we have the sure hope that we will be filled with righteousness (Matt. 5:6). The process has begun, and our limited progress brings encouragement. That process won't be completed, however, until Christ's second coming (1 John 3:2).
5:7. While the first four Beatitudes focus on inward attitudes, the last four concern outward relationships. Being merciful involves forgiving, but it also includes a loving response to the miserable and helpless. As God's children we have received mercy, and this equips us to extend mercy to others. The merciful will be shown mercy. Showing mercy to others demonstrates we have received God's mercy.
5:8. Jesus then described as blessed those who are pure in heart. The Pharisees were scrupulous about performing washing rituals that made them ceremonially clean. Jesus stripped away their pretense, saying that they were as beautiful tombs on the outside but filled with impurities within (23:27). Heart indicates the core of our being—our thoughts, our feelings, our intentions, our values, our longings. The word pure includes sexual purity but much more. It describes those whose hearts are cleansed by Christ and empowered by the Holy Spirit. Such hearts lead us away from acting with any kind of deceit, meanness, or selfish motives.
Will see God is future. We will see the Lord when He returns (1 John 3:2). This hope motivates us to act with pure hearts until then (v. 3). Now, however, we see Him with eyes of faith. When our hearts are clean, we see Him more and more clearly (meaning we better understand Him, His ways, His purposes).
5:9. Peacemakers are blessed, for they will be called sons of God. Sons of God is a way of saying "like father, like son." God is the supreme Peacemaker, making peace between sinners and Himself through Christ. He also leads redeemed sinners to help others be reconciled to God as well as to one another.
5:10-12. The final Beatitude seems paradoxical. Mixing persecution and blessing seems akin to mixing oil and water. Perhaps this is the reason Jesus added comments in verses 11-12. He shifted to the second person, you, apparently addressing His chosen disciples in particular. Notice first that the persecution is for righteousness, and in verse 11 Jesus defined that as because of Me. People who willfully reject Christ are prone to reject those who live for Christ. This can include insults, false accusations, slanderous gossip, and, in extreme cases, death.
In what sense are the persecuted Christians blessed? They are citizens of His kingdom. Jesus never encouraged His followers to hide their faith in Him when facing persecution, but rather to be glad and rejoice. He added that their heavenly reward would be great. He placed persecuted believers in the same category as God's persecuted prophets. Jesus wasn't giving us a list of qualities to strive for in order to be blessed. We are blessed because these qualities demonstrate that we are His followers.
MATTHEW 5:13-16
5:13. Jesus stressed believers' influence in the world by declaring, "You are the salt of the earth." Salt has several uses, but the most prominent are to preserve and to flavor.
COMMENTARY
Believers are to act as checks on the world's corruption. For salt to preserve meat it has to be rubbed into it. For salt to flavor food, it has to be added to it. We cannot impact worldly people by avoiding them. We need to be the most upright, friendly, available, thoughtful, considerate, and helpful people on the block, on the job, or on the team. Our saltiness can help check bad behavior and also can make others thirsty for Christ.
5:14-15. Since Jesus truly is "the light of the world" (John 9:5), our being the light of the world is true in the sense we reflect His life imparted to us by the indwelling Holy Spirit. Cities are built on high places to be seen not hidden. Lamps are placed on elevated stands so they will dispel the most darkness. Likewise, we believers are to be open and obvious Christians in all ordinary activities, shining the light of God's truth in a spiritually darkened world.
5:16. The word for good in good works means both good and attractive (v. 16). Such deeds are carried out in ways that are admirable, and reflect the quality of our character. They are not intended to draw the spotlight to us but to God. Jesus doesn't want us to be spiritual show-offs. He wants us to live and serve in ways through which God can show Himself.
</text>
|
[
{
"content": "<url>\nhttp://dc-samples.s3.amazonaws.com/BrentwoodBaptist_Sample.pdf\n</url>\n<text>\nBRENTWOOD BAPTIST CHURCH\n\nBUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013\n\nPREPARATION\n\n> SPEND THE WEEK STUDYING MATTHEW 5:1-16. Consult the commentary provided and any additional study tools (such as a concordance or Bible dictionary) to enhance your preparation.\n> DETERMINE which discussion points and questions will work best with your group.\n> PRAY for our pastors and the \"But I Say\" series, the upcoming group meeting, your teaching, your group members, and their receptivity to the lesson.\n\nHIGHLIGHTS\n\n> BIBLICAL EMPHASIS: As Moses brought the 10 Commandments to the Israelites as they approached the promised land, so Jesus brings us the expectations of the kingdom citizen in Matthew 5–7. \"Because you are My children,\" Jesus seems to be saying, \"this is how you are to live.\" To begin His Sermon on the Mount, Jesus described the characteristics and blessings of those who follow Him. He focused on both inner attitude and outward relationships. He then used two word pictures— salt and light—to describe the impact His followers will have on the world. These characteristics are \"blessed,\" empowered by God. When lived out, each characteristic brings glory to God.\n> LIFE APPLICATION: As a result of today's study, you will learn how to:\n1. Bring glory to God in your inner attitude (5:1-6).\n2. Bring glory to God in your outward relationships (5:7-12).\n3. Bring glory to God in your worldwide influence (5:13-16).\n\nINTRODUCTION\n\nAs your group time begins, use this section to help get the conversation going.\n\nHow would you define \"blessed\"? How would most people in the city of Brentwood define it? How would Jesus define it?\n\nWhat was one specific day when you felt particularly blessed?\n\nBeing a Christ-follower isn't just a matter of thinking and doing the right things and avoiding the wrong things. Foundational to being a Christian is a personal relationship with Jesus that empowers you to live for God. That relationship is the result of God's blessing in your life, and it changes you from the inside out. God's power at work in you enables you to reflect kingdom characteristics in the way you live.\n\nUNDERSTANDING\n\nUnpack the biblical text to discover what Scripture says or means about a particular topic.\n\nWhen we imagine the scene of the Sermon on the Mount, we typically picture Jesus perched on the side of a large hill speaking out to a crowd of people. But that's not\n\nThis curriculum was produced in collaboration with the Preaching Team, the Discipleship Team, and LifeWay Christian Resources.\n\nwhat we read in Matthew 5:1. Matthew reported that Jesus saw the crowds, went up on a mountain, and sat down with His disciples. Instead of a grand speech, we see an intimate conversation with His small group of disciples. By the end of the sermon (Matthew 7:28), it becomes evident that the crowds could hear what Jesus w<cursor_is_here>\n\n> HAVE A VOLUNTEER READ MATTHEW 5:1-6.\n\nMatthew 5:3-10 is often referred to as the Beatitudes. They're a set of blessings set up in Hebrew poetical form. The first statement, \"The poor in spirit are blessed, for the kingdom of heaven is theirs\" (v. 3), bears the same reward as the last, \"Those who are persecuted for righteousness are blessed, for the kingdom of heaven is theirs\" (v. 10). In Hebrew poetry, the repeated theme means that everything in the middle (vv. 4-9) share a common theme. In this case, it's the attitudes by which we can recognize people who are a part of the kingdom of God.\n\nWhat do you think the word \"blessed\" means in the context of the Beatitudes?\n\nThe Greek word for \"blessed\" doesn't just carry the meaning of \"happy\" that is often associated with it. It carries the connotation of approval or favor. We might paraphrase the first Beatitude as God approves of the poor in spirit. Jesus declared people who exhibit particular characteristics to be divinely blessed. Those characteristics identify people who, by God's grace, are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord. The Beatitudes do not describe eight separate and distinct groups of people, but eight characteristics or qualities that define kingdom people.\n\nHow do the Beatitudes in verses 3-6 relate to the promises that follow them? How would you describe the opposite of each quality?\n\nWhat kind of mourning do you feel Jesus is talking about in verse 4? What causes you to mourn?\n\nWhen you think of someone who is a good example of meekness (v. 5), what is that person like? What do you admire? How do they model humility?\n\nThe clear theme in verses 3-6 is that God approves of people who know they're broken, who know they're nothing without His blessing. We don't earn the kingdom of heaven by being poor in spirit. We're poor in spirit because we know that we could never earn a place in God's kingdom, but through His grace He provides a way to let us in.\n\n> HAVE ANOTHER VOLUNTEER READ MATTHEW 5:7-12.\n\nIn the second section of the Beatitudes, we continue to see the thread of kingdom attitudes, but the focus shifts away from our spirits and toward our relationships with others.\n\nHow is the focus different from the previous section? What do the four attitudes in verses 7-12 (merciful, pure in heart, peacemaker, righteousness) have in common?\n\nHow do the Beatitudes in these verses relate to the promises that follow them? How would you describe the opposite of each quality?\n\nThese verses highlight the attitudes God's people should display externally. How we treat others flows out of the personal characteristics listed in the first set of verses. Think of it like this: People who know they need mercy will, in turn, show mercy. People who mourn their sins before God will be covered in His righteousness and made pure in their hearts. People who have spirits of gentleness won't fight for their best interests but will seek to make peace with others. And people who \"hunger and thirst for righteousness\" will face persecution because becoming like Christ includes joining Him in His suffering.\n\nWhile grace is the act of giving a gift that is not deserved, mercy is the withholding or preventing of a negative consequence rightly deserved. What are some oppor tunities you have to show mercy on a weekly basis?\n\nHow is peace keeping different than peace making?\n\nDo the blessings described in these verses line up with an \"ideal\" life by cultural standards? Why or why not? If not, what are some of the noticeable differences?\n\nThrough these statements, Jesus both encouraged and warned His disciples that as they pursued God, they would meet persecution. Although persecution is not something anyone wants to endure, it's a definite marker of a faithful life.\n\nWhat are some ways you hear of people in Middle Tennessee being persecuted for their faith? People around the world?\n\nHave you ever been persecuted in some way because of your faith in Christ? How did you respond?\n\nVerses 11-12 transition out of the Beatitudes and into the rest of Jesus' sermon. To encourage the disciples in the face of future persecutions, Jesus compared them to the prophets who came before Him. The Old Testament prophets faithfully followed God and shared His message with the world, regardless of the world's response. By comparing Christ-followers to Old Testament prophets, Jesus encouraged His disciples to remain faithful because their reward in heaven would be great—just as it was for the prophets.\n\nConsider the prophets in the Old Testament. Would you consider their lives and ministries successful? What was persecution like for them?\n\nWhat does this idea communicate about the kingdom of God?\n\nHave someone read James 1:2-4. Why should we rejoice about endurance? List some figures in Scripture who model this endurance.\n\nJesus understood that persecution would be a part of the lives of His people because of Him and His message. They would be reviled \"on his account.\" He wanted them to rejoice in suffering because it was evidence that they would receive an award far greater than anything the world offered.\n\n> HAVE A FINAL VOLUNTEER READ MATTHEW 5:13-16.\n\nIn verses 13-16, Jesus explained the impact a kingdom attitude can have on the world. He did so with two word pictures—salt and light. Jesus calls His followers \"the salt of the earth.\" Salt's primary function in Jesus' day was to help preserve food (especially meat), an act that was particularly important in the Middle East due to hot temperatures and arid climate.\n\nWhat is the church's role in serving and preserving culture? What part do you play in that picture?\n\nHow is the command to be salt and light related to the Beatitudes in verses 3-10?\n\nAs believers, we act as a preservative in the culture around us by maintaining high moral and spiritual standards that counteract the sin and decay of the world. Salt also serves to add flavor, which is the way we use it today. Salt is distinctly different from the things with which it's mixed. Jesus' disciples likewise are to be different from the world.\n\nHow does the message of God's kingdom add flavor to your life? to the world?\n\nWhy must God's people be distinctly different from people who don't know Him?\n\nBy referring to salt, Jesus was making a statement about what it really means to be part of the kingdom of God. People who understand their need for God and have realized His mercy toward them, who seek righteousness even amidst persecution, must not lose their saltiness. Those who follow Him can't keep that hidden, which sets up verse 14 nicely. If we're part of God's kingdom, the world can't help but notice we're different.\n\nHow have you noticed a specific change in another person's life because of his/her relationship with God? How has He made a difference in your life?\n\nIn addition to salvation, what other positive effects can God's kingdom have on the world?\n\nThe result of living out the kingdom attitudes described in Scripture is that Christ's light will shine from within us and pierce the darkness in the world. When Peter and John are told by the Jewish leaders to stop preaching, their response in Acts 4:1920 shows the impact of Jesus' teaching: \"Whether it's right in the sight of God for us\n\nto listen to you rather than to God, you decide; for we are unable to stop speaking about what we have seen and heard\" (HCSB). The message of the kingdom begins with the attitude that it's better to be hated by men and loved by God than loved by men and an enemy of God.\n\nAPPLICATION\n\nHelp your group identify how the truths from the Scripture passage apply directly to their lives.\n\nWhen you're part of the kingdom of God, your life looks different. The characteristics described in the beginning of Jesus' Sermon on the Mount are the foundation on which those differences are built. When our attitudes are transformed, so are our actions. Unfortunately, because we're sinners who must rely on God's grace, the right disposition isn't always present. But when our attitudes and actions focus on God's glory and spreading His light, we can't help but impact the world.\n\nOf the eight Beatitudes, which two do you most desire in your life right now? Which of these qualities are you most tempted to avoid?\n\nWhat causes us to forget about the kingdom of God and our need for Him?\n\nHow can we remind ourselves daily that we're first and foremost citizens of God's kingdom?\n\nWhat fears come with being salt and light in the world?\n\nThink of those fears in light of verses 10-12. What does this mean for Christians when it comes to defining \"success.\" How do you define success as a citizen of God's kingdom, and how does that compare with the culture's definition?\n\nIn what areas of your life do you seek to blend into the culture rather than stand out for God's kingdom? How can you actively fight against that tendency this week?\n\nPRAY\n\nToday's Scripture passage forces us to honestly evaluate whether our attitudes and actions are in line with Jesus' expectations and whether our lives display God's mercy and love to the world. Close today's group session with a silent time of reflective prayer. Encourage group members to confess to God the things they've been convicted about this week and this morning. Then close the prayer by reading aloud Psalm 8.\n\nFOLLOW UP\n\nMidway through this week, send a follow-up e-mail to your group with some or all of the following information:\n\n❏ Questions to consider as they continue to reflect on what they learned this week:\n\nThis past week, did you feel more blessed or stressed? What can you do to be more focused on God's blessings in your life?\n\nHow does your attitude compare with those of the Beatitudes? Ask your spouse, your small group, or a close friend to help you evaluate.\n\n❏ A note of encouragement, following up on any specific prayer requests mentioned during your group gathering.\n\n❏ The challenge to memorize Matthew 5:14-16.\n\n❏ The text for next week's sermon, so group members can read it in anticipation of next weekend: Matthew 5:17-30.\n\nBRENTWOOD BAPTIST CHURCH\n\nBUT I SAY: HOW JESUS TAUGHT US TO LIVE—WEEK 1 BLESSED TO GLORIFY (MATTHEW 5:1-16) JANUARY 20, 2013\n\nCOMMENTARY\n\nMATTHEW 5:1-12\n\n5:1-2. Matthew 4:23-25 sets the stage for Jesus' Sermon on the Mount. People from all over Galilee and surrounding areas flocked to see and hear Him as well as to seek healing. On a particular day, when He saw the crowds, He went up to a place on a nearby mountain. Teachers of that day customarily spoke from a seated position, so He sat down with His disciples gathered around Him. Then He began to teach them (v. 2). Although His disciples and the crowd could hear Jesus (7:28), His message seems targeted mainly to those He had singled out to follow Him. Still, His words certainly reveal to all His hearers the real meaning of following Him.\n5:3. Jesus declared people who exhibit particular characteristics to be divinely blessed. He was not saying that people should strive to attain those characteristics so they could earn the right to tap into God's blessings. Rather, those characteristics identify people who by God's grace are citizens of the kingdom of heaven. This designation does not imply they are perfect, fully mature believers. It does indicate they have begun to follow the Lord.\n\nThe first four Beatitudes (vv. 3-6) reflect inner attitudes, the first of which is poor in spirit. This is opposite the attitude of being arrogant and self-sufficient, a trait prized and admired by the world. No one can earn God's blessing. People who think they can please God on their own are blind to their sins and ignorant of God's high standards. Poverty of spirit is the prelude to the riches of salvation. Jesus pronounced the poor in spirit to be blessed because, as followers of Jesus, the kingdom of heaven is theirs (\"kingdom of heaven\" and \"kingdom of God\" are used interchangeably in the Gospels). While this citizenship is a present possession of believers, the full benefit of kingdom citizenship awaits Christ's return.\n\n5:4. Those who mourn are blessed, for they will be comforted. Jesus did not specify what sort of mourning He had in mind, so it could include all mourning. In the context of the other Beatitudes, mourning over our sins of commission and omission probably should receive emphasis. When we honestly repent of our lapses into sin, we are comforted anew with the assurance our sins all have been atoned in Christ. Mourning over sin also can include the sinful attitudes and actions in cultures throughout the world and around us. We mourn sins' destructive effects on multitudes. Part of God's comfort in that arena lies in the assurance that in the end, His scales of justice will be balanced.\n5:5. The next attitude is gentleness. The word translated gentle conveys the notion of being meek, humble, sensitive, considerate, and courteous. Gentleness puts the focus on others rather than self. Being gentle does not mean being a pushover. This inner attitude stems from a spiritually educated awareness of our own spiritual poverty. Scripture indicates Jesus' followers will reign with Him (2 Tim. 2:12; Rev. 5:10). That promise will be fulfilled when He establishes His kingdom in the new heavens and earth. Ruling with Him implies our attitudes will parallel His. The blessing Jesus pronounced won't be centered in ownership but in serving Him (in ways not yet revealed).\n5:6. The fourth attitude is a hunger and thirst for righteousness. This righteousness is not the righteousness of Christ through which God views us believers (justification). Rather this is the inner desire to make right choices, say right words, and do right actions, which is part of God's work to make us more like Christ. We who seek to follow Christ know we don't measure up to His standards, but we want to do so. As\n\nCOMMENTARY\n\nwe walk faithfully with Him over time, He instills in us more and more the purpose and the power to please Him (Phil. 2:13). Admittedly, though we grow in right living, in this life we will never be absolutely righteous. So we are called blessed as we long for righteousness in the sense that we have the sure hope that we will be filled with righteousness (Matt. 5:6). The process has begun, and our limited progress brings encouragement. That process won't be completed, however, until Christ's second coming (1 John 3:2).\n\n5:7. While the first four Beatitudes focus on inward attitudes, the last four concern outward relationships. Being merciful involves forgiving, but it also includes a loving response to the miserable and helpless. As God's children we have received mercy, and this equips us to extend mercy to others. The merciful will be shown mercy. Showing mercy to others demonstrates we have received God's mercy.\n5:8. Jesus then described as blessed those who are pure in heart. The Pharisees were scrupulous about performing washing rituals that made them ceremonially clean. Jesus stripped away their pretense, saying that they were as beautiful tombs on the outside but filled with impurities within (23:27). Heart indicates the core of our being—our thoughts, our feelings, our intentions, our values, our longings. The word pure includes sexual purity but much more. It describes those whose hearts are cleansed by Christ and empowered by the Holy Spirit. Such hearts lead us away from acting with any kind of deceit, meanness, or selfish motives.\n\nWill see God is future. We will see the Lord when He returns (1 John 3:2). This hope motivates us to act with pure hearts until then (v. 3). Now, however, we see Him with eyes of faith. When our hearts are clean, we see Him more and more clearly (meaning we better understand Him, His ways, His purposes).\n\n5:9. Peacemakers are blessed, for they will be called sons of God. Sons of God is a way of saying \"like father, like son.\" God is the supreme Peacemaker, making peace between sinners and Himself through Christ. He also leads redeemed sinners to help others be reconciled to God as well as to one another.\n5:10-12. The final Beatitude seems paradoxical. Mixing persecution and blessing seems akin to mixing oil and water. Perhaps this is the reason Jesus added comments in verses 11-12. He shifted to the second person, you, apparently addressing His chosen disciples in particular. Notice first that the persecution is for righteousness, and in verse 11 Jesus defined that as because of Me. People who willfully reject Christ are prone to reject those who live for Christ. This can include insults, false accusations, slanderous gossip, and, in extreme cases, death.\n\nIn what sense are the persecuted Christians blessed? They are citizens of His kingdom. Jesus never encouraged His followers to hide their faith in Him when facing persecution, but rather to be glad and rejoice. He added that their heavenly reward would be great. He placed persecuted believers in the same category as God's persecuted prophets. Jesus wasn't giving us a list of qualities to strive for in order to be blessed. We are blessed because these qualities demonstrate that we are His followers.\n\nMATTHEW 5:13-16\n\n5:13. Jesus stressed believers' influence in the world by declaring, \"You are the salt of the earth.\" Salt has several uses, but the most prominent are to preserve and to flavor.\n\nCOMMENTARY\n\nBelievers are to act as checks on the world's corruption. For salt to preserve meat it has to be rubbed into it. For salt to flavor food, it has to be added to it. We cannot impact worldly people by avoiding them. We need to be the most upright, friendly, available, thoughtful, considerate, and helpful people on the block, on the job, or on the team. Our saltiness can help check bad behavior and also can make others thirsty for Christ.\n\n5:14-15. Since Jesus truly is \"the light of the world\" (John 9:5), our being the light of the world is true in the sense we reflect His life imparted to us by the indwelling Holy Spirit. Cities are built on high places to be seen not hidden. Lamps are placed on elevated stands so they will dispel the most darkness. Likewise, we believers are to be open and obvious Christians in all ordinary activities, shining the light of God's truth in a spiritually darkened world.\n\n5:16. The word for good in good works means both good and attractive (v. 16). Such deeds are carried out in ways that are admirable, and reflect the quality of our character. They are not intended to draw the spotlight to us but to God. Jesus doesn't want us to be spiritual show-offs. He wants us to live and serve in ways through which God can show Himself.\n</text>\n",
"role": "user"
},
{
"content": "as telling the men.",
"role": "assistant"
}
] |
VOL XXXI-#1
WVJS
WEST VALLEY JOGGERS & STRIDERS
May 2001
Saturday Workouts
09/08/01
Annual Handicap Race
The 3-mile warm-up starts at 7:30 AM and the event starts a little after 8 AM. We meet at the top of the West Valley track.
Upcoming Races
PA-USATF Championships
05/28/01
Zippy 5K (1)
Racer of the Year
Fastest Farwell Time
Fastest Marathon
Cumulative Saturday Races
Fastest of 2 5Ks on the track
Fastest Farwell Time
Fastest of 2 One-Miles on the track
06/17/01 Holy City Race
10/28/01Silicon Valley Half Marathon
07/01/01Capitol Mile
11/04/01 Run For The Law 5K
We may add one more race in Sep or Oct
Wednesday Night Workouts
We run Wednesday night workouts on the WVC track at 5:15 PM. We run intervals with 50% rest, rotating weekly through 12 x 400 6 x 800, 4 x 1200, and 3 x 1600s.
Sunday Runs
A group leaves from WVC parking area at 7:00 AM. They run 7-15 miles at 6:30-8:00 pace.
2001 PA/USATF Grand Prix
Open Men
Rich Hahan (735-8910) is in charge of this team. We finished 7th for 2000 and 6th in the first race for 2001. No team results have been posted by the PAUSATF since that race.
Open Women
Becki Kriege (257-9056) is in charge of this team. We finished 5th for 2000 and 5th in the first race of 2001.
40+ Men
Thanks to our winning the Christmas Relays, we won the te award in this division for the second time in the last th years. We finished 2nd behind Excelsior in the first race 2001. It appears that we also finished 2nd at Houlihan's, 3r Compaq, and 2nd at the Big Sur..
Other Popular Races
40+ Women
Sue Francis (730-1944) and Antonina Ettare (279-6034) are in charge of this team. We finished 4th for 2000.
50+ Men
Dick Chimenti (247-5650) is in charge of this team. We finished 4th for 2000.
50+ Women
60+ Men
Stan DeMartinis (867-7013) is in charge of this team. We finished first in this division for 2000.
70+ Men
Stan DeMartinis is in charge of this team. We finished first in this division for 2000 .
Ruby Hurtado (732-1018) is in charge of this team. We finished in 4th place for 2000.
Club Dues
The annual club dues of $15 per person ($1 for students) and $20 per family are now payable. Checks should be made out o the Van Zant Charitable Trust (for an Hawaiian vacation) or to the West Valley Joggers & Striders. Please give your money o Ken Napier, Walt Van Zant, or Sue Francis.
Miscellaneous Drivel
The parking fee at West Valley College is $2 per day every day of the week from 7AM to 10PM. The Fall and Spring parking fees are $30 each. The summer fee is $18. The fine or parking without a permit is $25.
Club members who won road races outright during 2000 included Rick Reitz (4 times), Brian Davis, and Ray Russell.
Remember to let Walt VanZant know as soon as possible on Saturday mornings whether or not you are going to run in the scheduled relay (when we have a relay). He skips the warm up so that he can do a better job of putting balanced teams ogether and getting the relay started as soon as possible. If you wait until you get back from the warm up and sometimes even later, it is difficult to properly place you.
Thanks to Jim Whalen for taking the time to help put this club bulletin together.
Several club members had a good year on the 2000 grand prix circuit. Howard Powers won the 70+ division. Brian Davis inished 2nd in the men's 40+ division, Ralph Poole finished 2nd n the men's 60+ division, and Becki Kriege finished 3rd in the open women's short race division. Other top 20 finishers ncluded Ray Russell (7th in 40+), Jeff Cowling (11th in 40+), Bob Pickens (17th in 40+, Neal Chappell (12th in 60+), Norm Saucedo (16th in 60+ ), Eddie Reyna (16th in 60+), Gene Antonides (18th in 60+), Stan DeMartinis (3rd in 70+), Boyce Jacques (4th in 70+), Eddie Reyna (5th in 70+), Frank Cunningham (6th in 70+), Dave Valles (11th in 70+), Marian Richard (7th in 40+), Kathy Frank (7th in 50+), Gail Campbell (9th n 50+), and Chris Hallen (15th in 50+).
Big cash winners from the grand prix included Brian Davis with $400, Becki Kriege with $375, Ralph Poole with $100, and Howard Powers with $50.
During 2000, Dimitrios Stefanidis ran 14 PRs at the Saturday workouts. Gravce Voss and Dave McIntyre had 5 PRs. Danny Moon led the PW parade with 4.
Saturday course record breakers for 2000 included Howard Powers in the 75+ division on all of the courses except Valle Vista, Becki Kriege for the open women's Triangle course, and Bob Ebert for the 45+ men on the Triangle course.
Bill Meinhardt continues to run sparingly because of a bad knee. He does a lot of biking and occasionally runs a 5K (at a pace much faster than most 60+ runners).
Jim and Maureen Whalen have moved to Pacific Grove to join the growing crowd of WVJS club members who have moved there (either full time or for the weekends). Tim and Georgia Riley have also bought a home in the Pacific Grove area.
Madelyn Moon while jogging the Valle Vista course with Linda Legregni tripped and fell for the second time in a year. This time she broke her arm and had to have surgery to place a plate in her arm.
Old-time club member Don Rebal and his wife, Marilyn, will be traveling from Montana to visit the San Jose area in mid June.
Peter and Nao Wei will be moving back to San Jose from North Carolina at the beginning of June.
Gail Campbell at the ancient age of 51 was still able to crank out fast miles at the Los Gatos all-comers meets during January. She was the top woman finisher in two meets with times of 6:13.6 and 6:14.0.
Cecil Baumgartner is presently leading the 40+ division in the ultra distance grand prix.
Stan DeMartinis has been slowed by a hamstring injury for many months. However, he continues to come out on every Saturday morning and help us with the timing. His efforts are very much appreciated.
George Maes continues to enjoy life in Las Vegas. He sends us a post card every few months, wishing us well.
Danny Moon and Kelly Emo did another good job of MCing our annual club awards dinner in January.
2
Joe Hurtado finished 2nd in the 60+ division at Boston Marathon in February – a great accomplishment in such a big ace.
65-year-old Ralph Poole won a Saturday road race (the Douglas course) in late March. It was the first time that a 60+ unner had won a club event.
Listed at the end of the club member are top 20 lists by age category for all of our Saturday courses and our all-time marathon list for times recorded as a club member.
McKayla Plank, despite being offered a scholarship to Wilcox high school, has decided to enroll at Mitty next year. She will be a great addition to their team. Some of her recent accomplishments include a 2:23.2 800M (broke the league record by 8 seconds), a 3:58.0 1200 as the second part of a double, a 4:57.7 1500, a first place finish in the St. Joseph XC invitational with a course record of 5:48 for the one mile distance, and a first place finish at the Hampton Phillips middle school 1600M.
Youth Notes
Kevin Murphy finished 3rd in his 6th grade league 800M finals with a PR of 2:34.4. Matt Grimes finished 2nd in the 7th grade 800 with a time of 2:38.2 – a significant improvement on his PR. He also finished 2nd in the 1200 with a time of 4:26.7 and 4th in the 400 with a time of 69.3, a PR.
Jim Bordoni has merged his age-group runners with our club. Some of the highlights for this group are included in the next wo paragraphs.
As most of you know we have a club web page. We have changed our address (URL): The address is: http://www.wvjs.org
2000 WVJS RACER OF THE YEAR CONTEST
Placings in this contest are based upon your best 8 performances in 15 designated events. The top finisher in each division for each event received 25 points, the second finisher received 24 points, etc. Since you could only use your best 8 performances, the maximum score was 200 points (8 x 25). The final results for 2000 for runners who competed in three events or more are as follows:
Runner of the Year Contest
Contest points were earned by giving each runner one point for every mile run during the year plus 20 points for each Saturday workout attended. Scoring 4,000 points wins a gold award, those scoring 3,000+ win a silver award, and those scoring 2,000+ earn a bronze award. Your point totals should be given to Tom Warfel for 2001. The final scores for 2000 were:
Gold Winners
The previous winners have been:
Dick Barrett Trophy Winner - Chris Hallen
Ray and Dave had a good race on this ypically cold December morning with Ray inally getting away with a quarter mile to go. Katie Spink led the ladies. Danny Moon, fresh from fattening up on his Carribean cruise, wasn't ready for his battle with Becki this morning. He hopes o lose a few pounds during the week and go after Becki on the Valle Vista course next week. Ron Nelson improved his 55+ PR by 77 seconds. Chris and Dena mproved their overall PRs by 16 and 5 seconds.
12/30/00 - All Courses Day
Doug/ Sar/ Frtvle - 2.75 Miles
Valle Vista - 3.0 Miles
1
Jeff Rohrer
6
Walt Van Zant
17:47
25:13
Farwell - 3.54 Miles
Farwell/ Herriman - 4.68 Miles
3
Dave Piazza
30:25
Triangle Run - 4.76 Miles
Dick Barrett Trophy Winner Becki Kriege
This was our traditional all-courses day, which we run on the last Saturday of the year. It was again very cold this morning (high 30s?). Becki was given the weekly trophy because she won her dual with Danny Moon. Danny now vows that he will start training seriously and will be ready for Becki in a couple of months. Rich Hahn, who turned 39 on Christmas Day, had the only PR of the day, a 12-second improvement on his Valle Vista PR. Bob Shuck, who has been injured for at least a couple of years, completed a Saturday course for the first time in a long time despite warmining up and running without gloves or a sweat shirt. Stan DeMartinis also had a birthday during December. He turned 78 but was still able to competently time our workout.
1/6/01 - 8 x 0.66-Mile Tennis Court Loop Relay
Dick Barrett Trophy Winner - Todd Hayes
Another 30+ degree morning. However, 24 hearty souls tried the workout. The Hayes team started last, grabbed the lead shortly before the end of the 7th loop and then went on to win by 15 seconds. Kristina led all of the runners with a 3:45 average. Jonathan Lee led the guys with a 3:50 average. Jim Bordoni, Rich Hahn, and Stan DeMartinis ably timed the workout.
1/13/01 - Farwell/ Herriman - 4.68
Miles
Dick Barrett Trophy Winner Georgia Riley
Dave Piazza cruised to an easy win this morning. Kristina led the ladies with a close win over Becki. There was a close race for 4th place as four runners finished within 5 seconds of each other. McKayla ran well in her first try at this course. Antonina knocked about a minute off her 45+ PR. Georgia got the weekly trophy because she knocked 90 seconds off her PR.
1/20/01 - 4 x 1.46 Mile WVC Loop Relay
Dick Barrett Trophy Winner - Jim Bordoni
Dick Barrett Trophy Winner - Slim Pickens
Again, it was very cold this morning (mid 30s?). Dave Piazza had a 30 yard lead when he turned onto Douglas from Saratoga Ave with 1.05 miles to go. However, he was unfamiliar with the course and angled up Shadow Oaks instead of Douglas. Jim Bordoni finally got Dave's attention and got him turned around. But, Dave was too tired to make up the lost ground and finished 2nd. Becki led the ladies, Todd led the 50+ men, Ralph Poole led the field of six 60+ runners, Sue Francis led the 40+ ladies, and Georgia led the 50+ ladies.
2/3/01 - 5K on the Track
Good weather this morning. The temperature was in the mid 40s and there was no rain or wind. Scott ran with Slim for about half the race before Slim gradually pulled away for the win.
2/17/01 - Short Six - 5.74 Miles
t was cold this morning (40 degrees?), which was very conducive to PWs. And many of us were down to the task as 7 PWs were recorded. Katie Spink had the best splits of the day at 8:30 and 8:26 for a 16:56 total. She was closely followed by Jim Bordoni and Dave Piazza at 16:57. Todd Hayes and Antonina ran very well to inish 37 seconds under their rating and 24 seconds in front of the second place eam. Todd's time of 17:23 was his best or this workout since April of 1994. Terri Kinsch also ran well to finish 39 seconds under her rating. Alas, her partner ran 114 seconds over his rating. Rich Hahn mproved his PR for this workout by 35 seconds with a combined time of 18:25. Todd led the 50+ men and Ralph Poole led he 60+ men. Sue Francis led the 40+ adies at 19:37 and Jutta, who is now 60, ed the 50+ ladies at 20:40. Ken Napier and Walt ran a spectacular 165 seconds over their rating. Ken got the team honors by finishing 96 seconds over his rating. Danny Moon did not run the workout, avoiding a PW. Ray Russell recorded our splits, noting at least 40% of them correctly.
1/27/01 - Farwell - 3.54 Miles
18
Joe Hurtado
26:49.3
Dick Barrett Trophy Winner - Jeff Rohrer
Good weather this morning -- 50 degrees and overcast -- and many of us took advantage of the conditions to run well. Dave Piazza scored an easy win while mproving his PR by 44 seconds and moving to #19 on the 40+ list. We have been running this course for about 27 years and have had a lot of good 40+ unners run the course. So, that is a significant accomplishment. Jeff Rohrer has been trying for 6 years to break his PR of 34:40 and finally accomplished his goal with a 9-second improvement. Todd Hayes improved his 50+ PR by 18 seconds. Ralph Poole, one month shy of 65, knocked 33 seconds off his PR. We missed wishing Ron Nelso a happy 58th birthday but he did have a happy birthday as he moved to #11 on the 55+ list with a 2+ minute improvement on his 55+ best. Cecil improved his 45+ best by a couple of minutes while moving to #47 on that list. McKayla improved her PR by 23 seconds, enabling her to move by three runners to #13 on the women's all-time list. Sue Francis ran her best time on this course in 2 years. Pauline improved her 40+ best by 34 seconds. Don Packwood ran his best ime on this course in 5 years while mproving his 60+ PR by 7 minutes. Thanks to Stan DeMartinis for again timing our workout. He was ably assisted by Danny Moon and Linda Legregni.
2/24/01 - 8 x 0.66-Mile Tennis
Court Loop Relay
Pl
Team
Strt
Finish
Dick Barrett Trophy Winner - Rich Hahn
This was a miserable morning for running -cold, windy, and a light to moderate rain. Still 18 mildly mentally disturbed runners an the workout. We were supposed to run 6 x 1600 on the track but decided instead
to run the tennis court loop relay.
Howard Powers ran in a trench coat that made him appear to be a flasher. He flung off his coat to the horror of all at the start of the last leg and the lightening of his load was just enough to enable him to hold off Bob Pickens for the win. Bob and Dave Piazza had the best cumulative times for the workout at 14:12.59 and 14:13.02. Katy Spink led the ladies at 14:51.
3/3/01 - Valle Vista - 3.0 Miles
Dick Barrett Trophy Winner Ralph Poole
The temperature was in the 30s during our warmup but increaed to the mid 40s by the time we started - not a temperature conducive to fast times but better than freezing temperatures. Dave Piazza raced neck and neck with Slim Pickens for the first mile before pulling away for the win. Arturo finished second while recording the all-time #4 time for 50+ runners. Katy Spink of the Aggies led the ladies while running 8 seconds under the club course record. Ralph Poole, 13 days short of turning 65, knocked 18 seconds off his PR while moving to #2 on the 60+ list, 11 seconds behind Norm Saucedo's record. Norm broke Ken Napier's 65+ record by 41 seconds. Cecil, the leader of the 40+ division of the ultra grand prix, improved his 45+ record by 70 seconds. Joe Hurtado's and Tim Rostege's times moved them to #s 4 and 7 on the 60+ list. Georgia moved to #2 on the women's 55+ list and Chris Hallen moved to #7 on the 50+ list. Terri Kinsch improved her 50+ best by two minutes.
3/10/01 - Triangle Run - 4.76 Miles
Dick Barrett Trophy Winner - Norm Saucedo
Good running weather this morning sunny and brisk. As can be seen, Dave Piazza ran to a whopping victory while
knocking 39 seconds off his PR. Becki ed the ladies while finishing second overall. Joe Hurtado moved to #5 on the 60+ list. Norm recorded the All-time best or 65+ runners and Howard Powers knocked 15 seconds off his 75+ course ecord. Georgia's time moved her to #2 on he women's 55+ list and Terri Kinsch mprove her 50+ PR by over three minutes.
3/17/01 - 12 x 0.33-Mile Tennis Court Loop Relay
Dick Barrett Trophy Winner Murphy Team
We had a small turnout for the relay this morning as many were saving their best or the 50+ race tomorrow. All teams started together. There was a close battle or second place. Otherwise, the competition was not close. The Murphy eam scored an easy win. Jim Bordoni at he advanced age of 48 set a PR for this workout with a total time of 9:39 (1:36.5 per run).
3/24/01 - Step Up & Step Down Relay
Dick Barrett Trophy Winner Mathias Team
All teams started even. We think that we got the correct order of finish. In any event, the Mathias team won by a fair amount.
3/31/01 - Doug/Sara/ Frtvle - 2.75 Miles
Dick Barrett Trophy Winner Ralph Poole
Having a woman win a club road run is a rare event. It has happened less than five times in the club's history. But, this morning an even more rare event occurred. A 60+ runner finished first. Ralph Poole at the advanced age of 65 led the race most of the way and then held off Ron Nelson's furious kick to win by 0.7 seconds. Ron, a kid of 58, just could not match strides with Ralph this morning. Kristina led the ladies and Demetrios led the open men.
4/7/01 - 12 x 800 Relay
Dick Barrett Trophy Winner Peterson Team
4/14/01 - Farwell/ Herriman - 4.68
Dick Barrett Trophy Winner McKayla Plank
There were a lot of good performances this morning. Jeff Rohrer won while coming within 13 seconds of his PR. McKayla Plank, an 8th-grader, knocked 76 seconds off her PR while moving to #10 on the women's all-time list. Ralph Poole improved his PR by 13 seconds while breaking the 65+ course record by over 4 minutes. Russ Kinsch ran his best time on this course in nearly 4 years. Jim Wurm did not get lost while running this course for the first time in over 15 years. Nao ran it for the first time in 10+ years.
Relay
4/28/01 - 4 x 1.46-Mile WVC Loop
34
Rich Stiller
33:47.7
Dick Barrett Trophy Winner Howard Powers
Dick Barrett Trophy Winner - Terri Kinsch
Bad handicapping and no close races this morning as the Kinch team raced to an easy win. Dave Piazza had the best cumulative time at 16:11. Jim Wurm ran somewhat slower than his best time of 15:55 in July 1979 with a 21:29.
5/5/01 - Farwell - 3.54 Miles
Slim Pickens dipped under 20 minutes for the first time with his win this morning. Demetrios missed his PR by 9 seconds because he took a wrong turn when he should have turned onto Douglas from Saratoga. Norm broke the 65+ course record by 76 seconds. Ralph Poole recorded the #2 65+ time. However, Ralph ran 23:00 back in January when he was a kid of 64. Today, he and Joe Hurtado decided to take it easy and run together. Don Packwood knocked 70 seconds off his 60+ PR. Chris Hallen moved to #7 on the women's 50+ list. Georgia Riley recorded the #3 women's 55+ time. Howard Powers broke his own 75+ course record by 41 seconds.
5/12/01 - Short Six - 5.74 Miles
There were many notable performances this morning. Slim Pickens scored an easy win with his 40+ best. Katy Spink and Becki Kriege ran together for three miles before Katy pulled away to lead the women. Ralph Poole took home the weekly trophy as he knoced 5 1/2 minutes off the men's 65+ course record. Danny Moon, although running better lately, added 84 seconds to his PW. Russ Kinsch ran his best time on this course in 3 1/2 years. Joe Hurtado recorded the #9 time by a 60+ runner. Jake White ran well while running this course for the first time in 5 years. Rick Kananen ran it for the first time in 4 years. Rich Collins ran his best time on this course in 3 years and much better than the horrible 54:32 that he ran last December. Georgia Riley moved to #2 on the women's 55+ list with her 48:08. Tim Riley added 6 minutes to his PW - a remarkable performance. Terri Kinsch continued her excellent running of late with the #8 time by a 50+ woman runner. Ed Reyna made a wrong turn and got lost.
RACE RESULTS
11/18/00 - Davis Turkey Trot 5K
Jim Bordoni
60:57
22
Don Packwood (I)
41:36
Team A, led by the outstanding
10
performances of McKayla Plank and Jim Wurm, won three boxes of Valentine candy for their win. All teams were rated to score between 50 and 52 points. McKayla ran 3 places better than estimated and Jim a whopping 5 places. Jim attributed his performance to the fact that he now only eats 6 donutes per day rather than a dozen. Danny Moon, slowed by the effects of a recent surgery, led his team to a last place finish by finishing 22 places farther back than expected. Danny was in 4th place after about 2 miles and then quickly worked his was back through the field to finish 35th. Annette had pity on him and let him finish just in front of her.
Some notable performers included Pauline Beatty, who improved by 3 1/2 minutes over last year, Kevin Murphy, who started slow and then moved through the field, easily passing Jim Wurm and Walt Van Zant going up the Sobey hill and pulling away from a pack of 4 over the last mile, Annette McPhail, who improved by 4 minutes, Georgia Riley, who improved by 4 minutes, Sue Francis, who improved by 2 1/2 minutes, and Danny who ran 12 minutes slower than last year. Pansies who failed to run because of the potential terrible weather included Ed Gavin and Grace Voss. During our breakfast discussion after the race, some felt that these DNS (did not start) should count as double points in the unknown runner contest.
2/11/01 - Jed Smith 50K
Cecil Baumgartner 3:49:27 1st50/54
2/24/01 - Almond Blossom 1 Mile
Fred Martin 5:40 1st-50+ Fred said that it was very windy and rainy during this race, accounting for his drop from 5:18 last year to 5:40 this year.
2/24/01 - Almond Blossom 8K
Fred Martin 32:53 4th-50+ The weather got even worse during the 8K, which started a few minutes after the finish of the mile. Fred was happy that he could just finish the race.
3/3/01 - Run For The Seals 4M
Ken Noel
28:58 4th-60+
Jutta McCormick 30:45 1st-60+
3/4/01 - Napa Valley Marathon
Dave McIntyre
3:56:xx
The was the first time under 4 hours for Dave -- Not bad for a 215 heavyweight runner.
3/11/01 - Mercury/News 10K
Bob Ebert
32:50
3rd-40+
Craig Whichard
45:12
Bob Pickens
33:42
6th-40+
Dan Anderson
45:15
Jeff Rohrer
45:19
11
Katy Spink
44:58
12
|
<urn:uuid:a5679fac-a4f7-4422-a777-56b492aeda67>
|
CC-MAIN-2017-26
|
http://wvjs.org/PDFs/May01.pdf
|
2017-06-29T03:55:04Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00060.warc.gz
| 441,370,978
| 6,309
|
eng_Latn
|
eng_Latn
| 0.988523
|
eng_Latn
| 0.998176
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
1560,
6054,
7991,
8432,
10961,
12979,
16303,
18540,
20638,
20770,
22994,
22998
] |
VOL XXXI-#1
WVJS
WEST VALLEY JOGGERS & STRIDERS
May 2001
Saturday Workouts
09/08/01
Annual Handicap Race
The 3-mile warm-up starts at 7:30 AM and the event starts a little after 8 AM. We meet at the top of the West Valley track.
Upcoming Races
PA-USATF Championships
05/28/01
Zippy 5K (1)
Racer of the Year
Fastest Farwell Time
Fastest Marathon
Cumulative Saturday Races
Fastest of 2 5Ks on the track
Fastest Farwell Time
Fastest of 2 One-Miles on the track
06/17/01 Holy City Race
10/28/01Silicon Valley Half Marathon
07/01/01Capitol Mile
11/04/01 Run For The Law 5K
We may add one more race in Sep or Oct
Wednesday Night Workouts
We run Wednesday night workouts on the WVC track at 5:15 PM. We run intervals with 50% rest, rotating weekly through 12 x 400 6 x 800, 4 x 1200, and 3 x 1600s.
Sunday Runs
A group leaves from WVC parking area at 7:00 AM. They run 7-15 miles at 6:30-8:00 pace.
2001 PA/USATF Grand Prix
Open Men
Rich Hahan (735-8910) is in charge of this team. We finished 7th for 2000 and 6th in the first race for 2001. No team results have been posted by the PAUSATF since that race.
Open Women
Becki Kriege (257-9056) is in charge of this team. We finished 5th for 2000 and 5th in the first race of 2001.
40+ Men
Thanks to our winning the Christmas Relays, we won the te award in this division for the second time in the last th years. We finished 2nd behind Excelsior in the first race 2001. It appears that we also finished 2nd at Houlihan's, 3r Compaq, and 2nd at the Big Sur..
Other Popular Races
40+ Women
Sue Francis (730-1944) and Antonina Ettare (279-6034) are in charge of this team. We finished 4th for 2000.
50+ Men
Dick Chimenti (247-5650) is in charge of this team. We finished 4th for 2000.
50+ Women
60+ Men
Stan DeMartinis (867-7013) is in charge of this team. We finished first in this division for 2000.
70+ Men
Stan DeMartinis is in charge of this team. We finished first in this division for 2000 .
Ruby Hurtado (732-1018) is in charge of this team. We finished in 4th place for 2000.
Club Dues
The annual club dues of $15 per person ($1 for students) and $20 per family are now payable. Checks should be made out o the Van Zant Charitable Trust (for an Hawaiian vacation) or to the West Valley Joggers & Striders. Please give your money o Ken Napier, Walt Van Zant, or Sue Francis.
Miscellaneous Drivel
The parking fee at West Valley College is $2 per day every day of the week from 7AM to 10PM. The Fall and Spring parking fees are $30 each. The summer fee is $18. The fine or parking without a permit is $25.
Club members who won road races outright during 2000 included Rick Reitz (4 times), Brian Davis, and Ray Russell.
Remember to let Walt VanZant know as soon as possible on Saturday mornings whether or not you are going to run in the scheduled relay (when we have a relay). He skips the warm up so that he can do a better job of putting balanced teams ogether and getting the relay started as soon as possible. If you wait until you get back from the warm up and sometimes even later, it is difficult to properly place you.
Thanks to Jim Whalen for taking the time to help put this club bulletin together.
Several club members had a good year on the 2000 grand prix circuit. Howard Powers won the 70+ division. Brian Davis inished 2nd in the men's 40+ division, Ralph Poole finished 2nd n the men's 60+ division, and Becki Kriege finished 3rd in the open women's short race division. Other top 20 finishers ncluded Ray Russell (7th in 40+), Jeff Cowling (11th in 40+), Bob Pickens (17th in 40+, Neal Chappell (12th in 60+), Norm Saucedo (16th in 60+ ), Eddie Reyna (16th in 60+), Gene Antonides (18th in 60+), Stan DeMartinis (3rd in 70+), Boyce Jacques (4th in 70+), Eddie Reyna (5th in 70+), Frank Cunningham (6th in 70+), Dave Valles (11th in 70+), Marian Richard (7th in 40+), Kathy Frank (7th in 50+), Gail Campbell (9th n 50+), and Chris Hallen (15th in 50+).
Big cash winners from the grand prix included Brian Davis with $400, Becki Kriege with $375, Ralph Poole with $100, and Howard Powers with $50.
During 2000, Dimitrios Stefanidis ran 14 PRs at the Saturday workouts. Gravce Voss and Dave McIntyre had 5 PRs. Danny Moon led the PW parade with 4.
Saturday course record breakers for 2000 included Howard Powers in the 75+ division on all of the courses except Valle Vista, Becki Kriege for the open women's Triangle course, and Bob Ebert for the 45+ men on the Triangle course.
Bill Meinhardt continues to run sparingly because of a bad knee. He does a lot of biking and occasionally runs a 5K (at a pace much faster than most 60+ runners).
Jim and Maureen Whalen have moved to Pacific Grove to join the growing crowd of WVJS club members who have moved there (either full time or for the weekends). Tim and Georgia Riley have also bought a home in the Pacific Grove area.
Madelyn Moon while jogging the Valle Vista course with Linda Legregni tripped and fell for the second time in a year. This time she broke her arm and had to have surgery to place a plate in her arm.
Old-time club member Don Rebal and his wife, Marilyn, will be traveling from Montana to visit the San Jose area in mid June.
Peter and Nao Wei will be moving back to San Jose from North Carolina at the beginning of June.
Gail Campbell at the ancient age of 51 was still able to crank out fast miles at the Los Gatos all-comers meets during January. She was the top woman finisher in two meets with times of 6:13.6 and 6:14.0.
Cecil Baumgartner is presently leading the 40+ division in the ultra distance grand prix.
Stan DeMartinis has been slowed by a hamstring injury for many months. However, he continues to come out on every Saturday morning and help us with the timing. His efforts are very much appreciated.
George Maes continues to enjoy life in Las Vegas. He sends us a post card every few months, wishing us well.
Danny Moon and Kelly Emo did another good job of MCing our annual club awards dinner in January.
2
Joe Hurtado finished 2nd in the 60+ division at Boston Marathon in February – a great accomplishment in such a big ace.
65-year-old Ralph Poole won a Saturday road race (the Douglas course) in late March. It was the first time that a 60+ unner had won a club event.
Listed at the end of the club member are top 20 lists by age category for all of our Saturday courses and our all-time marathon list for times recorded as a club member.
McKayla Plank, despite being offered a scholarship to Wilcox high school, has decided to enroll at Mitty next year. She will be a great addition to their team. Some of her recent accomplishments include a 2:23.2 800M (broke the league record by 8 seconds), a 3:58.0 1200 as the second part of a double, a 4:57.7 1500, a first place finish in the St. Joseph XC invitational with a course record of 5:48 for the one mile distance, and a first place finish at the Hampton Phillips middle school 1600M.
Youth Notes
Kevin Murphy finished 3rd in his 6th grade league 800M finals with a PR of 2:34.4. Matt Grimes finished 2nd in the 7th grade 800 with a time of 2:38.2 – a significant improvement on his PR. He also finished 2nd in the 1200 with a time of 4:26.7 and 4th in the 400 with a time of 69.3, a PR.
Jim Bordoni has merged his age-group runners with our club. Some of the highlights for this group are included in the next wo paragraphs.
As most of you know we have a club web page. We have changed our address (URL): The address is: http://www.wvjs.org
2000 WVJS RACER OF THE YEAR CONTEST
Placings in this contest are based upon your best 8 performances in 15 designated events. The top finisher in each division for each event received 25 points, the second finisher received 24 points, etc. Since you could only use your best 8 performances, the maximum score was 200 points (8 x 25). The final results for 2000 for runners who competed in three events or more are as follows:
Runner of the Year Contest
Contest points were earned by giving each runner one point for every mile run during the year plus 20 points for each Saturday workout attended. Scoring 4,000 points wins a gold award, those scoring 3,000+ win a silver award, and those scoring 2,000+ earn a bronze award. Your point totals should be given to Tom Warfel for 2001. The final scores for 2000 were:
Gold Winners
The previous winners have been:
Dick Barrett Trophy Winner - Chris Hallen
Ray and Dave had a good race on this ypically cold December morning with Ray inally getting away with a quarter mile to go. Katie Spink led the ladies. Danny Moon, fresh from fattening up on his Carribean cruise, wasn't ready for his battle with Becki this morning. He hopes o lose a few pounds during the week and go after Becki on the Valle Vista course next week. Ron Nelson improved his 55+ PR by 77 seconds. Chris and Dena mproved their overall PRs by 16 and 5 seconds.
12/30/00 - All Courses Day
Doug/ Sar/ Frtvle - 2.75 Miles
Valle Vista - 3.0 Miles
1
Jeff Rohrer
6
Walt Van Zant
17:47
25:13
Farwell - 3.54 Miles
Farwell/ Herriman - 4.68 Miles
3
Dave Piazza
30:25
Triangle Run - 4.76 Miles
Dick Barrett Trophy Winner Becki Kriege
This was our traditional all-courses day, which we run on the last Saturday of the year. It was again very cold this morning (high 30s?). Becki was given the weekly trophy because she won her dual with Danny Moon. Danny now vows that he will start training seriously and will be ready for Becki in a couple of months. Rich Hahn, who turned 39 on Christmas Day, had the only PR of the day, a 12-second improvement on his Valle Vista PR. Bob Shuck, who has been injured for at least a couple of years, completed a Saturday course for the first time in a long time despite warmining up and running without gloves or a sweat shirt. Stan DeMartinis also had a birthday during December. He turned 78 but was still able to competently time our workout.
1/6/01 - 8 x 0.66-Mile Tennis Court Loop Relay
Dick Barrett Trophy Winner - Todd Hayes
Another 30+ degree morning. However, 24 hearty souls tried the workout. The Hayes team started last, grabbed the lead shortly before the end of the 7th loop and then went on to win by 15 seconds. Kristina led all of the runners with a 3:45 average. Jonathan Lee led the guys with a 3:50 average. Jim Bordoni, Rich Hahn, and Stan DeMartinis ably timed the workout.
1/13/01 - Farwell/ Herriman - 4.68
Miles
Dick Barrett Trophy Winner Georgia Riley
Dave Piazza cruised to an easy win this morning. Kristina led the ladies with a close win over Becki. There was a close race for 4th place as four runners finished within 5 seconds of each other. McKayla ran well in her first try at this course. Antonina knocked about a minute off her 45+ PR. Georgia got the weekly trophy because she knocked 90 seconds off her PR.
1/20/01 - 4 x 1.46 Mile WVC Loop Relay
Dick Barrett Trophy Winner - Jim Bordoni
Dick Barrett Trophy Winner - Slim Pickens
Again, it was very cold this morning (mid 30s?). Dave Piazza had a 30 yard lead when he turned onto Douglas from Saratoga Ave with 1.05 miles to go. However, he was unfamiliar with the course and angled up Shadow Oaks instead of Douglas. Jim Bordoni finally got Dave's attention and got him turned around. But, Dave was too tired to make up the lost ground and finished 2nd. Becki led the ladies, Todd led the 50+ men, Ralph Poole led the field of six 60+ runners, Sue Francis led the 40+ ladies, and Georgia led the 50+ ladies.
2/3/01 - 5K on the Track
Good weather this morning. The temperature was in the mid 40s and there was no rain or wind. Scott ran with Slim for about half the race before Slim gradually pulled away for the win.
2/17/01
|
- Short Six - 5.
|
74 Miles
t was cold this morning (40 degrees?), which was very conducive to PWs. And many of us were down to the task as 7 PWs were recorded. Katie Spink had the best splits of the day at 8:30 and 8:26 for a 16:56 total. She was closely followed by Jim Bordoni and Dave Piazza at 16:57. Todd Hayes and Antonina ran very well to inish 37 seconds under their rating and 24 seconds in front of the second place eam. Todd's time of 17:23 was his best or this workout since April of 1994. Terri Kinsch also ran well to finish 39 seconds under her rating. Alas, her partner ran 114 seconds over his rating. Rich Hahn mproved his PR for this workout by 35 seconds with a combined time of 18:25. Todd led the 50+ men and Ralph Poole led he 60+ men. Sue Francis led the 40+ adies at 19:37 and Jutta, who is now 60, ed the 50+ ladies at 20:40. Ken Napier and Walt ran a spectacular 165 seconds over their rating. Ken got the team honors by finishing 96 seconds over his rating. Danny Moon did not run the workout, avoiding a PW. Ray Russell recorded our splits, noting at least 40% of them correctly.
1/27/01 - Farwell - 3.54 Miles
18
Joe Hurtado
26:49.3
Dick Barrett Trophy Winner - Jeff Rohrer
Good weather this morning -- 50 degrees and overcast -- and many of us took advantage of the conditions to run well. Dave Piazza scored an easy win while mproving his PR by 44 seconds and moving to #19 on the 40+ list. We have been running this course for about 27 years and have had a lot of good 40+ unners run the course. So, that is a significant accomplishment. Jeff Rohrer has been trying for 6 years to break his PR of 34:40 and finally accomplished his goal with a 9-second improvement. Todd Hayes improved his 50+ PR by 18 seconds. Ralph Poole, one month shy of 65, knocked 33 seconds off his PR. We missed wishing Ron Nelso a happy 58th birthday but he did have a happy birthday as he moved to #11 on the 55+ list with a 2+ minute improvement on his 55+ best. Cecil improved his 45+ best by a couple of minutes while moving to #47 on that list. McKayla improved her PR by 23 seconds, enabling her to move by three runners to #13 on the women's all-time list. Sue Francis ran her best time on this course in 2 years. Pauline improved her 40+ best by 34 seconds. Don Packwood ran his best ime on this course in 5 years while mproving his 60+ PR by 7 minutes. Thanks to Stan DeMartinis for again timing our workout. He was ably assisted by Danny Moon and Linda Legregni.
2/24/01 - 8 x 0.66-Mile Tennis
Court Loop Relay
Pl
Team
Strt
Finish
Dick Barrett Trophy Winner - Rich Hahn
This was a miserable morning for running -cold, windy, and a light to moderate rain. Still 18 mildly mentally disturbed runners an the workout. We were supposed to run 6 x 1600 on the track but decided instead
to run the tennis court loop relay.
Howard Powers ran in a trench coat that made him appear to be a flasher. He flung off his coat to the horror of all at the start of the last leg and the lightening of his load was just enough to enable him to hold off Bob Pickens for the win. Bob and Dave Piazza had the best cumulative times for the workout at 14:12.59 and 14:13.02. Katy Spink led the ladies at 14:51.
3/3/01 - Valle Vista - 3.0 Miles
Dick Barrett Trophy Winner Ralph Poole
The temperature was in the 30s during our warmup but increaed to the mid 40s by the time we started - not a temperature conducive to fast times but better than freezing temperatures. Dave Piazza raced neck and neck with Slim Pickens for the first mile before pulling away for the win. Arturo finished second while recording the all-time #4 time for 50+ runners. Katy Spink of the Aggies led the ladies while running 8 seconds under the club course record. Ralph Poole, 13 days short of turning 65, knocked 18 seconds off his PR while moving to #2 on the 60+ list, 11 seconds behind Norm Saucedo's record. Norm broke Ken Napier's 65+ record by 41 seconds. Cecil, the leader of the 40+ division of the ultra grand prix, improved his 45+ record by 70 seconds. Joe Hurtado's and Tim Rostege's times moved them to #s 4 and 7 on the 60+ list. Georgia moved to #2 on the women's 55+ list and Chris Hallen moved to #7 on the 50+ list. Terri Kinsch improved her 50+ best by two minutes.
3/10/01 - Triangle Run - 4.76 Miles
Dick Barrett Trophy Winner - Norm Saucedo
Good running weather this morning sunny and brisk. As can be seen, Dave Piazza ran to a whopping victory while
knocking 39 seconds off his PR. Becki ed the ladies while finishing second overall. Joe Hurtado moved to #5 on the 60+ list. Norm recorded the All-time best or 65+ runners and Howard Powers knocked 15 seconds off his 75+ course ecord. Georgia's time moved her to #2 on he women's 55+ list and Terri Kinsch mprove her 50+ PR by over three minutes.
3/17/01 - 12 x 0.33-Mile Tennis Court Loop Relay
Dick Barrett Trophy Winner Murphy Team
We had a small turnout for the relay this morning as many were saving their best or the 50+ race tomorrow. All teams started together. There was a close battle or second place. Otherwise, the competition was not close. The Murphy eam scored an easy win. Jim Bordoni at he advanced age of 48 set a PR for this workout with a total time of 9:39 (1:36.5 per run).
3/24/01 - Step Up & Step Down Relay
Dick Barrett Trophy Winner Mathias Team
All teams started even. We think that we got the correct order of finish. In any event, the Mathias team won by a fair amount.
3/31/01 - Doug/Sara/ Frtvle - 2.75 Miles
Dick Barrett Trophy Winner Ralph Poole
Having a woman win a club road run is a rare event. It has happened less than five times in the club's history. But, this morning an even more rare event occurred. A 60+ runner finished first. Ralph Poole at the advanced age of 65 led the race most of the way and then held off Ron Nelson's furious kick to win by 0.7 seconds. Ron, a kid of 58, just could not match strides with Ralph this morning. Kristina led the ladies and Demetrios led the open men.
4/7/01 - 12 x 800 Relay
Dick Barrett Trophy Winner Peterson Team
4/14/01 - Farwell/ Herriman - 4.68
Dick Barrett Trophy Winner McKayla Plank
There were a lot of good performances this morning. Jeff Rohrer won while coming within 13 seconds of his PR. McKayla Plank, an 8th-grader, knocked 76 seconds off her PR while moving to #10 on the women's all-time list. Ralph Poole improved his PR by 13 seconds while breaking the 65+ course record by over 4 minutes. Russ Kinsch ran his best time on this course in nearly 4 years. Jim Wurm did not get lost while running this course for the first time in over 15 years. Nao ran it for the first time in 10+ years.
Relay
4/28/01 - 4 x 1.46-Mile WVC Loop
34
Rich Stiller
33:47.7
Dick Barrett Trophy Winner Howard Powers
Dick Barrett Trophy Winner - Terri Kinsch
Bad handicapping and no close races this morning as the Kinch team raced to an easy win. Dave Piazza had the best cumulative time at 16:11. Jim Wurm ran somewhat slower than his best time of 15:55 in July 1979 with a 21:29.
5/5/01 - Farwell - 3.54 Miles
Slim Pickens dipped under 20 minutes for the first time with his win this morning. Demetrios missed his PR by 9 seconds because he took a wrong turn when he should have turned onto Douglas from Saratoga. Norm broke the 65+ course record by 76 seconds. Ralph Poole recorded the #2 65+ time. However, Ralph ran 23:00 back in January when he was a kid of 64. Today, he and Joe Hurtado decided to take it easy and run together. Don Packwood knocked 70 seconds off his 60+ PR. Chris Hallen moved to #7 on the women's 50+ list. Georgia Riley recorded the #3 women's 55+ time. Howard Powers broke his own 75+ course record by 41 seconds.
5/12/01 - Short Six - 5.74 Miles
There were many notable performances this morning. Slim Pickens scored an easy win with his 40+ best. Katy Spink and Becki Kriege ran together for three miles before Katy pulled away to lead the women. Ralph Poole took home the weekly trophy as he knoced 5 1/2 minutes off the men's 65+ course record. Danny Moon, although running better lately, added 84 seconds to his PW. Russ Kinsch ran his best time on this course in 3 1/2 years. Joe Hurtado recorded the #9 time by a 60+ runner. Jake White ran well while running this course for the first time in 5 years. Rick Kananen ran it for the first time in 4 years. Rich Collins ran his best time on this course in 3 years and much better than the horrible 54:32 that he ran last December. Georgia Riley moved to #2 on the women's 55+ list with her 48:08. Tim Riley added 6 minutes to his PW - a remarkable performance. Terri Kinsch continued her excellent running of late with the #8 time by a 50+ woman runner. Ed Reyna made a wrong turn and got lost.
RACE RESULTS
11/18/00 - Davis Turkey Trot 5K
Jim Bordoni
60:57
22
Don Packwood (I)
41:36
Team A, led by the outstanding
10
performances of McKayla Plank and Jim Wurm, won three boxes of Valentine candy for their win. All teams were rated to score between 50 and 52 points. McKayla ran 3 places better than estimated and Jim a whopping 5 places. Jim attributed his performance to the fact that he now only eats 6 donutes per day rather than a dozen. Danny Moon, slowed by the effects of a recent surgery, led his team to a last place finish by finishing 22 places farther back than expected. Danny was in 4th place after about 2 miles and then quickly worked his was back through the field to finish 35th. Annette had pity on him and let him finish just in front of her.
Some notable performers included Pauline Beatty, who improved by 3 1/2 minutes over last year, Kevin Murphy, who started slow and then moved through the field, easily passing Jim Wurm and Walt Van Zant going up the Sobey hill and pulling away from a pack of 4 over the last mile, Annette McPhail, who improved by 4 minutes, Georgia Riley, who improved by 4 minutes, Sue Francis, who improved by 2 1/2 minutes, and Danny who ran 12 minutes slower than last year. Pansies who failed to run because of the potential terrible weather included Ed Gavin and Grace Voss. During our breakfast discussion after the race, some felt that these DNS (did not start) should count as double points in the unknown runner contest.
2/11/01 - Jed Smith 50K
Cecil Baumgartner 3:49:27 1st50/54
2/24/01 - Almond Blossom 1 Mile
Fred Martin 5:40 1st-50+ Fred said that it was very windy and rainy during this race, accounting for his drop from 5:18 last year to 5:40 this year.
2/24/01 - Almond Blossom 8K
Fred Martin 32:53 4th-50+ The weather got even worse during the 8K, which started a few minutes after the finish of the mile. Fred was happy that he could just finish the race.
3/3/01 - Run For The Seals 4M
Ken Noel
28:58 4th-60+
Jutta McCormick 30:45 1st-60+
3/4/01 - Napa Valley Marathon
Dave McIntyre
3:56:xx
The was the first time under 4 hours for Dave -- Not bad for a 215 heavyweight runner.
3/11/01 - Mercury/News 10K
Bob Ebert
32:50
3rd-40+
Craig Whichard
45:12
Bob Pickens
33:42
6th-40+
Dan Anderson
45:15
Jeff Rohrer
45:19
11
Katy Spink
44:58
12
| 11,802
|
beginning_of_word
|
-
|
remove_one_sentence
|
<url>
http://wvjs.org/PDFs/May01.pdf
</url>
<text>
VOL XXXI-#1
WVJS
WEST VALLEY JOGGERS & STRIDERS
May 2001
Saturday Workouts
09/08/01
Annual Handicap Race
The 3-mile warm-up starts at 7:30 AM and the event starts a little after 8 AM. We meet at the top of the West Valley track.
Upcoming Races
PA-USATF Championships
05/28/01
Zippy 5K (1)
Racer of the Year
Fastest Farwell Time
Fastest Marathon
Cumulative Saturday Races
Fastest of 2 5Ks on the track
Fastest Farwell Time
Fastest of 2 One-Miles on the track
06/17/01 Holy City Race
10/28/01Silicon Valley Half Marathon
07/01/01Capitol Mile
11/04/01 Run For The Law 5K
We may add one more race in Sep or Oct
Wednesday Night Workouts
We run Wednesday night workouts on the WVC track at 5:15 PM. We run intervals with 50% rest, rotating weekly through 12 x 400 6 x 800, 4 x 1200, and 3 x 1600s.
Sunday Runs
A group leaves from WVC parking area at 7:00 AM. They run 7-15 miles at 6:30-8:00 pace.
2001 PA/USATF Grand Prix
Open Men
Rich Hahan (735-8910) is in charge of this team. We finished 7th for 2000 and 6th in the first race for 2001. No team results have been posted by the PAUSATF since that race.
Open Women
Becki Kriege (257-9056) is in charge of this team. We finished 5th for 2000 and 5th in the first race of 2001.
40+ Men
Thanks to our winning the Christmas Relays, we won the te award in this division for the second time in the last th years. We finished 2nd behind Excelsior in the first race 2001. It appears that we also finished 2nd at Houlihan's, 3r Compaq, and 2nd at the Big Sur..
Other Popular Races
40+ Women
Sue Francis (730-1944) and Antonina Ettare (279-6034) are in charge of this team. We finished 4th for 2000.
50+ Men
Dick Chimenti (247-5650) is in charge of this team. We finished 4th for 2000.
50+ Women
60+ Men
Stan DeMartinis (867-7013) is in charge of this team. We finished first in this division for 2000.
70+ Men
Stan DeMartinis is in charge of this team. We finished first in this division for 2000 .
Ruby Hurtado (732-1018) is in charge of this team. We finished in 4th place for 2000.
Club Dues
The annual club dues of $15 per person ($1 for students) and $20 per family are now payable. Checks should be made out o the Van Zant Charitable Trust (for an Hawaiian vacation) or to the West Valley Joggers & Striders. Please give your money o Ken Napier, Walt Van Zant, or Sue Francis.
Miscellaneous Drivel
The parking fee at West Valley College is $2 per day every day of the week from 7AM to 10PM. The Fall and Spring parking fees are $30 each. The summer fee is $18. The fine or parking without a permit is $25.
Club members who won road races outright during 2000 included Rick Reitz (4 times), Brian Davis, and Ray Russell.
Remember to let Walt VanZant know as soon as possible on Saturday mornings whether or not you are going to run in the scheduled relay (when we have a relay). He skips the warm up so that he can do a better job of putting balanced teams ogether and getting the relay started as soon as possible. If you wait until you get back from the warm up and sometimes even later, it is difficult to properly place you.
Thanks to Jim Whalen for taking the time to help put this club bulletin together.
Several club members had a good year on the 2000 grand prix circuit. Howard Powers won the 70+ division. Brian Davis inished 2nd in the men's 40+ division, Ralph Poole finished 2nd n the men's 60+ division, and Becki Kriege finished 3rd in the open women's short race division. Other top 20 finishers ncluded Ray Russell (7th in 40+), Jeff Cowling (11th in 40+), Bob Pickens (17th in 40+, Neal Chappell (12th in 60+), Norm Saucedo (16th in 60+ ), Eddie Reyna (16th in 60+), Gene Antonides (18th in 60+), Stan DeMartinis (3rd in 70+), Boyce Jacques (4th in 70+), Eddie Reyna (5th in 70+), Frank Cunningham (6th in 70+), Dave Valles (11th in 70+), Marian Richard (7th in 40+), Kathy Frank (7th in 50+), Gail Campbell (9th n 50+), and Chris Hallen (15th in 50+).
Big cash winners from the grand prix included Brian Davis with $400, Becki Kriege with $375, Ralph Poole with $100, and Howard Powers with $50.
During 2000, Dimitrios Stefanidis ran 14 PRs at the Saturday workouts. Gravce Voss and Dave McIntyre had 5 PRs. Danny Moon led the PW parade with 4.
Saturday course record breakers for 2000 included Howard Powers in the 75+ division on all of the courses except Valle Vista, Becki Kriege for the open women's Triangle course, and Bob Ebert for the 45+ men on the Triangle course.
Bill Meinhardt continues to run sparingly because of a bad knee. He does a lot of biking and occasionally runs a 5K (at a pace much faster than most 60+ runners).
Jim and Maureen Whalen have moved to Pacific Grove to join the growing crowd of WVJS club members who have moved there (either full time or for the weekends). Tim and Georgia Riley have also bought a home in the Pacific Grove area.
Madelyn Moon while jogging the Valle Vista course with Linda Legregni tripped and fell for the second time in a year. This time she broke her arm and had to have surgery to place a plate in her arm.
Old-time club member Don Rebal and his wife, Marilyn, will be traveling from Montana to visit the San Jose area in mid June.
Peter and Nao Wei will be moving back to San Jose from North Carolina at the beginning of June.
Gail Campbell at the ancient age of 51 was still able to crank out fast miles at the Los Gatos all-comers meets during January. She was the top woman finisher in two meets with times of 6:13.6 and 6:14.0.
Cecil Baumgartner is presently leading the 40+ division in the ultra distance grand prix.
Stan DeMartinis has been slowed by a hamstring injury for many months. However, he continues to come out on every Saturday morning and help us with the timing. His efforts are very much appreciated.
George Maes continues to enjoy life in Las Vegas. He sends us a post card every few months, wishing us well.
Danny Moon and Kelly Emo did another good job of MCing our annual club awards dinner in January.
2
Joe Hurtado finished 2nd in the 60+ division at Boston Marathon in February – a great accomplishment in such a big ace.
65-year-old Ralph Poole won a Saturday road race (the Douglas course) in late March. It was the first time that a 60+ unner had won a club event.
Listed at the end of the club member are top 20 lists by age category for all of our Saturday courses and our all-time marathon list for times recorded as a club member.
McKayla Plank, despite being offered a scholarship to Wilcox high school, has decided to enroll at Mitty next year. She will be a great addition to their team. Some of her recent accomplishments include a 2:23.2 800M (broke the league record by 8 seconds), a 3:58.0 1200 as the second part of a double, a 4:57.7 1500, a first place finish in the St. Joseph XC invitational with a course record of 5:48 for the one mile distance, and a first place finish at the Hampton Phillips middle school 1600M.
Youth Notes
Kevin Murphy finished 3rd in his 6th grade league 800M finals with a PR of 2:34.4. Matt Grimes finished 2nd in the 7th grade 800 with a time of 2:38.2 – a significant improvement on his PR. He also finished 2nd in the 1200 with a time of 4:26.7 and 4th in the 400 with a time of 69.3, a PR.
Jim Bordoni has merged his age-group runners with our club. Some of the highlights for this group are included in the next wo paragraphs.
As most of you know we have a club web page. We have changed our address (URL): The address is: http://www.wvjs.org
2000 WVJS RACER OF THE YEAR CONTEST
Placings in this contest are based upon your best 8 performances in 15 designated events. The top finisher in each division for each event received 25 points, the second finisher received 24 points, etc. Since you could only use your best 8 performances, the maximum score was 200 points (8 x 25). The final results for 2000 for runners who competed in three events or more are as follows:
Runner of the Year Contest
Contest points were earned by giving each runner one point for every mile run during the year plus 20 points for each Saturday workout attended. Scoring 4,000 points wins a gold award, those scoring 3,000+ win a silver award, and those scoring 2,000+ earn a bronze award. Your point totals should be given to Tom Warfel for 2001. The final scores for 2000 were:
Gold Winners
The previous winners have been:
Dick Barrett Trophy Winner - Chris Hallen
Ray and Dave had a good race on this ypically cold December morning with Ray inally getting away with a quarter mile to go. Katie Spink led the ladies. Danny Moon, fresh from fattening up on his Carribean cruise, wasn't ready for his battle with Becki this morning. He hopes o lose a few pounds during the week and go after Becki on the Valle Vista course next week. Ron Nelson improved his 55+ PR by 77 seconds. Chris and Dena mproved their overall PRs by 16 and 5 seconds.
12/30/00 - All Courses Day
Doug/ Sar/ Frtvle - 2.75 Miles
Valle Vista - 3.0 Miles
1
Jeff Rohrer
6
Walt Van Zant
17:47
25:13
Farwell - 3.54 Miles
Farwell/ Herriman - 4.68 Miles
3
Dave Piazza
30:25
Triangle Run - 4.76 Miles
Dick Barrett Trophy Winner Becki Kriege
This was our traditional all-courses day, which we run on the last Saturday of the year. It was again very cold this morning (high 30s?). Becki was given the weekly trophy because she won her dual with Danny Moon. Danny now vows that he will start training seriously and will be ready for Becki in a couple of months. Rich Hahn, who turned 39 on Christmas Day, had the only PR of the day, a 12-second improvement on his Valle Vista PR. Bob Shuck, who has been injured for at least a couple of years, completed a Saturday course for the first time in a long time despite warmining up and running without gloves or a sweat shirt. Stan DeMartinis also had a birthday during December. He turned 78 but was still able to competently time our workout.
1/6/01 - 8 x 0.66-Mile Tennis Court Loop Relay
Dick Barrett Trophy Winner - Todd Hayes
Another 30+ degree morning. However, 24 hearty souls tried the workout. The Hayes team started last, grabbed the lead shortly before the end of the 7th loop and then went on to win by 15 seconds. Kristina led all of the runners with a 3:45 average. Jonathan Lee led the guys with a 3:50 average. Jim Bordoni, Rich Hahn, and Stan DeMartinis ably timed the workout.
1/13/01 - Farwell/ Herriman - 4.68
Miles
Dick Barrett Trophy Winner Georgia Riley
Dave Piazza cruised to an easy win this morning. Kristina led the ladies with a close win over Becki. There was a close race for 4th place as four runners finished within 5 seconds of each other. McKayla ran well in her first try at this course. Antonina knocked about a minute off her 45+ PR. Georgia got the weekly trophy because she knocked 90 seconds off her PR.
1/20/01 - 4 x 1.46 Mile WVC Loop Relay
Dick Barrett Trophy Winner - Jim Bordoni
Dick Barrett Trophy Winner - Slim Pickens
Again, it was very cold this morning (mid 30s?). Dave Piazza had a 30 yard lead when he turned onto Douglas from Saratoga Ave with 1.05 miles to go. However, he was unfamiliar with the course and angled up Shadow Oaks instead of Douglas. Jim Bordoni finally got Dave's attention and got him turned around. But, Dave was too tired to make up the lost ground and finished 2nd. Becki led the ladies, Todd led the 50+ men, Ralph Poole led the field of six 60+ runners, Sue Francis led the 40+ ladies, and Georgia led the 50+ ladies.
2/3/01 - 5K on the Track
Good weather this morning. The temperature was in the mid 40s and there was no rain or wind. Scott ran with Slim for about half the race before Slim gradually pulled away for the win.
2/17/01 <cursor_is_here>74 Miles
t was cold this morning (40 degrees?), which was very conducive to PWs. And many of us were down to the task as 7 PWs were recorded. Katie Spink had the best splits of the day at 8:30 and 8:26 for a 16:56 total. She was closely followed by Jim Bordoni and Dave Piazza at 16:57. Todd Hayes and Antonina ran very well to inish 37 seconds under their rating and 24 seconds in front of the second place eam. Todd's time of 17:23 was his best or this workout since April of 1994. Terri Kinsch also ran well to finish 39 seconds under her rating. Alas, her partner ran 114 seconds over his rating. Rich Hahn mproved his PR for this workout by 35 seconds with a combined time of 18:25. Todd led the 50+ men and Ralph Poole led he 60+ men. Sue Francis led the 40+ adies at 19:37 and Jutta, who is now 60, ed the 50+ ladies at 20:40. Ken Napier and Walt ran a spectacular 165 seconds over their rating. Ken got the team honors by finishing 96 seconds over his rating. Danny Moon did not run the workout, avoiding a PW. Ray Russell recorded our splits, noting at least 40% of them correctly.
1/27/01 - Farwell - 3.54 Miles
18
Joe Hurtado
26:49.3
Dick Barrett Trophy Winner - Jeff Rohrer
Good weather this morning -- 50 degrees and overcast -- and many of us took advantage of the conditions to run well. Dave Piazza scored an easy win while mproving his PR by 44 seconds and moving to #19 on the 40+ list. We have been running this course for about 27 years and have had a lot of good 40+ unners run the course. So, that is a significant accomplishment. Jeff Rohrer has been trying for 6 years to break his PR of 34:40 and finally accomplished his goal with a 9-second improvement. Todd Hayes improved his 50+ PR by 18 seconds. Ralph Poole, one month shy of 65, knocked 33 seconds off his PR. We missed wishing Ron Nelso a happy 58th birthday but he did have a happy birthday as he moved to #11 on the 55+ list with a 2+ minute improvement on his 55+ best. Cecil improved his 45+ best by a couple of minutes while moving to #47 on that list. McKayla improved her PR by 23 seconds, enabling her to move by three runners to #13 on the women's all-time list. Sue Francis ran her best time on this course in 2 years. Pauline improved her 40+ best by 34 seconds. Don Packwood ran his best ime on this course in 5 years while mproving his 60+ PR by 7 minutes. Thanks to Stan DeMartinis for again timing our workout. He was ably assisted by Danny Moon and Linda Legregni.
2/24/01 - 8 x 0.66-Mile Tennis
Court Loop Relay
Pl
Team
Strt
Finish
Dick Barrett Trophy Winner - Rich Hahn
This was a miserable morning for running -cold, windy, and a light to moderate rain. Still 18 mildly mentally disturbed runners an the workout. We were supposed to run 6 x 1600 on the track but decided instead
to run the tennis court loop relay.
Howard Powers ran in a trench coat that made him appear to be a flasher. He flung off his coat to the horror of all at the start of the last leg and the lightening of his load was just enough to enable him to hold off Bob Pickens for the win. Bob and Dave Piazza had the best cumulative times for the workout at 14:12.59 and 14:13.02. Katy Spink led the ladies at 14:51.
3/3/01 - Valle Vista - 3.0 Miles
Dick Barrett Trophy Winner Ralph Poole
The temperature was in the 30s during our warmup but increaed to the mid 40s by the time we started - not a temperature conducive to fast times but better than freezing temperatures. Dave Piazza raced neck and neck with Slim Pickens for the first mile before pulling away for the win. Arturo finished second while recording the all-time #4 time for 50+ runners. Katy Spink of the Aggies led the ladies while running 8 seconds under the club course record. Ralph Poole, 13 days short of turning 65, knocked 18 seconds off his PR while moving to #2 on the 60+ list, 11 seconds behind Norm Saucedo's record. Norm broke Ken Napier's 65+ record by 41 seconds. Cecil, the leader of the 40+ division of the ultra grand prix, improved his 45+ record by 70 seconds. Joe Hurtado's and Tim Rostege's times moved them to #s 4 and 7 on the 60+ list. Georgia moved to #2 on the women's 55+ list and Chris Hallen moved to #7 on the 50+ list. Terri Kinsch improved her 50+ best by two minutes.
3/10/01 - Triangle Run - 4.76 Miles
Dick Barrett Trophy Winner - Norm Saucedo
Good running weather this morning sunny and brisk. As can be seen, Dave Piazza ran to a whopping victory while
knocking 39 seconds off his PR. Becki ed the ladies while finishing second overall. Joe Hurtado moved to #5 on the 60+ list. Norm recorded the All-time best or 65+ runners and Howard Powers knocked 15 seconds off his 75+ course ecord. Georgia's time moved her to #2 on he women's 55+ list and Terri Kinsch mprove her 50+ PR by over three minutes.
3/17/01 - 12 x 0.33-Mile Tennis Court Loop Relay
Dick Barrett Trophy Winner Murphy Team
We had a small turnout for the relay this morning as many were saving their best or the 50+ race tomorrow. All teams started together. There was a close battle or second place. Otherwise, the competition was not close. The Murphy eam scored an easy win. Jim Bordoni at he advanced age of 48 set a PR for this workout with a total time of 9:39 (1:36.5 per run).
3/24/01 - Step Up & Step Down Relay
Dick Barrett Trophy Winner Mathias Team
All teams started even. We think that we got the correct order of finish. In any event, the Mathias team won by a fair amount.
3/31/01 - Doug/Sara/ Frtvle - 2.75 Miles
Dick Barrett Trophy Winner Ralph Poole
Having a woman win a club road run is a rare event. It has happened less than five times in the club's history. But, this morning an even more rare event occurred. A 60+ runner finished first. Ralph Poole at the advanced age of 65 led the race most of the way and then held off Ron Nelson's furious kick to win by 0.7 seconds. Ron, a kid of 58, just could not match strides with Ralph this morning. Kristina led the ladies and Demetrios led the open men.
4/7/01 - 12 x 800 Relay
Dick Barrett Trophy Winner Peterson Team
4/14/01 - Farwell/ Herriman - 4.68
Dick Barrett Trophy Winner McKayla Plank
There were a lot of good performances this morning. Jeff Rohrer won while coming within 13 seconds of his PR. McKayla Plank, an 8th-grader, knocked 76 seconds off her PR while moving to #10 on the women's all-time list. Ralph Poole improved his PR by 13 seconds while breaking the 65+ course record by over 4 minutes. Russ Kinsch ran his best time on this course in nearly 4 years. Jim Wurm did not get lost while running this course for the first time in over 15 years. Nao ran it for the first time in 10+ years.
Relay
4/28/01 - 4 x 1.46-Mile WVC Loop
34
Rich Stiller
33:47.7
Dick Barrett Trophy Winner Howard Powers
Dick Barrett Trophy Winner - Terri Kinsch
Bad handicapping and no close races this morning as the Kinch team raced to an easy win. Dave Piazza had the best cumulative time at 16:11. Jim Wurm ran somewhat slower than his best time of 15:55 in July 1979 with a 21:29.
5/5/01 - Farwell - 3.54 Miles
Slim Pickens dipped under 20 minutes for the first time with his win this morning. Demetrios missed his PR by 9 seconds because he took a wrong turn when he should have turned onto Douglas from Saratoga. Norm broke the 65+ course record by 76 seconds. Ralph Poole recorded the #2 65+ time. However, Ralph ran 23:00 back in January when he was a kid of 64. Today, he and Joe Hurtado decided to take it easy and run together. Don Packwood knocked 70 seconds off his 60+ PR. Chris Hallen moved to #7 on the women's 50+ list. Georgia Riley recorded the #3 women's 55+ time. Howard Powers broke his own 75+ course record by 41 seconds.
5/12/01 - Short Six - 5.74 Miles
There were many notable performances this morning. Slim Pickens scored an easy win with his 40+ best. Katy Spink and Becki Kriege ran together for three miles before Katy pulled away to lead the women. Ralph Poole took home the weekly trophy as he knoced 5 1/2 minutes off the men's 65+ course record. Danny Moon, although running better lately, added 84 seconds to his PW. Russ Kinsch ran his best time on this course in 3 1/2 years. Joe Hurtado recorded the #9 time by a 60+ runner. Jake White ran well while running this course for the first time in 5 years. Rick Kananen ran it for the first time in 4 years. Rich Collins ran his best time on this course in 3 years and much better than the horrible 54:32 that he ran last December. Georgia Riley moved to #2 on the women's 55+ list with her 48:08. Tim Riley added 6 minutes to his PW - a remarkable performance. Terri Kinsch continued her excellent running of late with the #8 time by a 50+ woman runner. Ed Reyna made a wrong turn and got lost.
RACE RESULTS
11/18/00 - Davis Turkey Trot 5K
Jim Bordoni
60:57
22
Don Packwood (I)
41:36
Team A, led by the outstanding
10
performances of McKayla Plank and Jim Wurm, won three boxes of Valentine candy for their win. All teams were rated to score between 50 and 52 points. McKayla ran 3 places better than estimated and Jim a whopping 5 places. Jim attributed his performance to the fact that he now only eats 6 donutes per day rather than a dozen. Danny Moon, slowed by the effects of a recent surgery, led his team to a last place finish by finishing 22 places farther back than expected. Danny was in 4th place after about 2 miles and then quickly worked his was back through the field to finish 35th. Annette had pity on him and let him finish just in front of her.
Some notable performers included Pauline Beatty, who improved by 3 1/2 minutes over last year, Kevin Murphy, who started slow and then moved through the field, easily passing Jim Wurm and Walt Van Zant going up the Sobey hill and pulling away from a pack of 4 over the last mile, Annette McPhail, who improved by 4 minutes, Georgia Riley, who improved by 4 minutes, Sue Francis, who improved by 2 1/2 minutes, and Danny who ran 12 minutes slower than last year. Pansies who failed to run because of the potential terrible weather included Ed Gavin and Grace Voss. During our breakfast discussion after the race, some felt that these DNS (did not start) should count as double points in the unknown runner contest.
2/11/01 - Jed Smith 50K
Cecil Baumgartner 3:49:27 1st50/54
2/24/01 - Almond Blossom 1 Mile
Fred Martin 5:40 1st-50+ Fred said that it was very windy and rainy during this race, accounting for his drop from 5:18 last year to 5:40 this year.
2/24/01 - Almond Blossom 8K
Fred Martin 32:53 4th-50+ The weather got even worse during the 8K, which started a few minutes after the finish of the mile. Fred was happy that he could just finish the race.
3/3/01 - Run For The Seals 4M
Ken Noel
28:58 4th-60+
Jutta McCormick 30:45 1st-60+
3/4/01 - Napa Valley Marathon
Dave McIntyre
3:56:xx
The was the first time under 4 hours for Dave -- Not bad for a 215 heavyweight runner.
3/11/01 - Mercury/News 10K
Bob Ebert
32:50
3rd-40+
Craig Whichard
45:12
Bob Pickens
33:42
6th-40+
Dan Anderson
45:15
Jeff Rohrer
45:19
11
Katy Spink
44:58
12
</text>
|
[
{
"content": "<url>\nhttp://wvjs.org/PDFs/May01.pdf\n</url>\n<text>\nVOL XXXI-#1\n\nWVJS\n\nWEST VALLEY JOGGERS & STRIDERS\n\nMay 2001\n\nSaturday Workouts\n\n09/08/01\n\nAnnual Handicap Race\n\nThe 3-mile warm-up starts at 7:30 AM and the event starts a little after 8 AM. We meet at the top of the West Valley track.\n\nUpcoming Races\n\nPA-USATF Championships\n\n05/28/01\n\nZippy 5K (1)\n\nRacer of the Year\n\nFastest Farwell Time\n\nFastest Marathon\n\nCumulative Saturday Races\n\nFastest of 2 5Ks on the track\n\nFastest Farwell Time\n\nFastest of 2 One-Miles on the track\n\n06/17/01 Holy City Race\n\n10/28/01Silicon Valley Half Marathon\n\n07/01/01Capitol Mile\n\n11/04/01 Run For The Law 5K\n\nWe may add one more race in Sep or Oct\n\nWednesday Night Workouts\n\nWe run Wednesday night workouts on the WVC track at 5:15 PM. We run intervals with 50% rest, rotating weekly through 12 x 400 6 x 800, 4 x 1200, and 3 x 1600s.\n\nSunday Runs\n\nA group leaves from WVC parking area at 7:00 AM. They run 7-15 miles at 6:30-8:00 pace.\n\n2001 PA/USATF Grand Prix\n\nOpen Men\n\nRich Hahan (735-8910) is in charge of this team. We finished 7th for 2000 and 6th in the first race for 2001. No team results have been posted by the PAUSATF since that race.\n\nOpen Women\n\nBecki Kriege (257-9056) is in charge of this team. We finished 5th for 2000 and 5th in the first race of 2001.\n\n40+ Men\n\nThanks to our winning the Christmas Relays, we won the te award in this division for the second time in the last th years. We finished 2nd behind Excelsior in the first race 2001. It appears that we also finished 2nd at Houlihan's, 3r Compaq, and 2nd at the Big Sur..\n\nOther Popular Races\n\n40+ Women\n\nSue Francis (730-1944) and Antonina Ettare (279-6034) are in charge of this team. We finished 4th for 2000.\n\n50+ Men\n\nDick Chimenti (247-5650) is in charge of this team. We finished 4th for 2000.\n\n50+ Women\n\n60+ Men\n\nStan DeMartinis (867-7013) is in charge of this team. We finished first in this division for 2000.\n\n70+ Men\n\nStan DeMartinis is in charge of this team. We finished first in this division for 2000 .\n\nRuby Hurtado (732-1018) is in charge of this team. We finished in 4th place for 2000.\n\nClub Dues\n\nThe annual club dues of $15 per person ($1 for students) and $20 per family are now payable. Checks should be made out o the Van Zant Charitable Trust (for an Hawaiian vacation) or to the West Valley Joggers & Striders. Please give your money o Ken Napier, Walt Van Zant, or Sue Francis.\n\nMiscellaneous Drivel\n\nThe parking fee at West Valley College is $2 per day every day of the week from 7AM to 10PM. The Fall and Spring parking fees are $30 each. The summer fee is $18. The fine or parking without a permit is $25.\n\nClub members who won road races outright during 2000 included Rick Reitz (4 times), Brian Davis, and Ray Russell.\n\nRemember to let Walt VanZant know as soon as possible on Saturday mornings whether or not you are going to run in the scheduled relay (when we have a relay). He skips the warm up so that he can do a better job of putting balanced teams ogether and getting the relay started as soon as possible. If you wait until you get back from the warm up and sometimes even later, it is difficult to properly place you.\n\nThanks to Jim Whalen for taking the time to help put this club bulletin together.\n\nSeveral club members had a good year on the 2000 grand prix circuit. Howard Powers won the 70+ division. Brian Davis inished 2nd in the men's 40+ division, Ralph Poole finished 2nd n the men's 60+ division, and Becki Kriege finished 3rd in the open women's short race division. Other top 20 finishers ncluded Ray Russell (7th in 40+), Jeff Cowling (11th in 40+), Bob Pickens (17th in 40+, Neal Chappell (12th in 60+), Norm Saucedo (16th in 60+ ), Eddie Reyna (16th in 60+), Gene Antonides (18th in 60+), Stan DeMartinis (3rd in 70+), Boyce Jacques (4th in 70+), Eddie Reyna (5th in 70+), Frank Cunningham (6th in 70+), Dave Valles (11th in 70+), Marian Richard (7th in 40+), Kathy Frank (7th in 50+), Gail Campbell (9th n 50+), and Chris Hallen (15th in 50+).\n\nBig cash winners from the grand prix included Brian Davis with $400, Becki Kriege with $375, Ralph Poole with $100, and Howard Powers with $50.\n\nDuring 2000, Dimitrios Stefanidis ran 14 PRs at the Saturday workouts. Gravce Voss and Dave McIntyre had 5 PRs. Danny Moon led the PW parade with 4.\n\nSaturday course record breakers for 2000 included Howard Powers in the 75+ division on all of the courses except Valle Vista, Becki Kriege for the open women's Triangle course, and Bob Ebert for the 45+ men on the Triangle course.\n\nBill Meinhardt continues to run sparingly because of a bad knee. He does a lot of biking and occasionally runs a 5K (at a pace much faster than most 60+ runners).\n\nJim and Maureen Whalen have moved to Pacific Grove to join the growing crowd of WVJS club members who have moved there (either full time or for the weekends). Tim and Georgia Riley have also bought a home in the Pacific Grove area.\n\nMadelyn Moon while jogging the Valle Vista course with Linda Legregni tripped and fell for the second time in a year. This time she broke her arm and had to have surgery to place a plate in her arm.\n\nOld-time club member Don Rebal and his wife, Marilyn, will be traveling from Montana to visit the San Jose area in mid June.\n\nPeter and Nao Wei will be moving back to San Jose from North Carolina at the beginning of June.\n\nGail Campbell at the ancient age of 51 was still able to crank out fast miles at the Los Gatos all-comers meets during January. She was the top woman finisher in two meets with times of 6:13.6 and 6:14.0.\n\nCecil Baumgartner is presently leading the 40+ division in the ultra distance grand prix.\n\nStan DeMartinis has been slowed by a hamstring injury for many months. However, he continues to come out on every Saturday morning and help us with the timing. His efforts are very much appreciated.\n\nGeorge Maes continues to enjoy life in Las Vegas. He sends us a post card every few months, wishing us well.\n\nDanny Moon and Kelly Emo did another good job of MCing our annual club awards dinner in January.\n\n2\n\nJoe Hurtado finished 2nd in the 60+ division at Boston Marathon in February – a great accomplishment in such a big ace.\n\n65-year-old Ralph Poole won a Saturday road race (the Douglas course) in late March. It was the first time that a 60+ unner had won a club event.\n\nListed at the end of the club member are top 20 lists by age category for all of our Saturday courses and our all-time marathon list for times recorded as a club member.\n\nMcKayla Plank, despite being offered a scholarship to Wilcox high school, has decided to enroll at Mitty next year. She will be a great addition to their team. Some of her recent accomplishments include a 2:23.2 800M (broke the league record by 8 seconds), a 3:58.0 1200 as the second part of a double, a 4:57.7 1500, a first place finish in the St. Joseph XC invitational with a course record of 5:48 for the one mile distance, and a first place finish at the Hampton Phillips middle school 1600M.\n\nYouth Notes\n\nKevin Murphy finished 3rd in his 6th grade league 800M finals with a PR of 2:34.4. Matt Grimes finished 2nd in the 7th grade 800 with a time of 2:38.2 – a significant improvement on his PR. He also finished 2nd in the 1200 with a time of 4:26.7 and 4th in the 400 with a time of 69.3, a PR.\n\nJim Bordoni has merged his age-group runners with our club. Some of the highlights for this group are included in the next wo paragraphs.\n\nAs most of you know we have a club web page. We have changed our address (URL): The address is: http://www.wvjs.org\n\n2000 WVJS RACER OF THE YEAR CONTEST\n\nPlacings in this contest are based upon your best 8 performances in 15 designated events. The top finisher in each division for each event received 25 points, the second finisher received 24 points, etc. Since you could only use your best 8 performances, the maximum score was 200 points (8 x 25). The final results for 2000 for runners who competed in three events or more are as follows:\n\nRunner of the Year Contest\n\nContest points were earned by giving each runner one point for every mile run during the year plus 20 points for each Saturday workout attended. Scoring 4,000 points wins a gold award, those scoring 3,000+ win a silver award, and those scoring 2,000+ earn a bronze award. Your point totals should be given to Tom Warfel for 2001. The final scores for 2000 were:\n\nGold Winners\n\nThe previous winners have been:\n\nDick Barrett Trophy Winner - Chris Hallen\n\nRay and Dave had a good race on this ypically cold December morning with Ray inally getting away with a quarter mile to go. Katie Spink led the ladies. Danny Moon, fresh from fattening up on his Carribean cruise, wasn't ready for his battle with Becki this morning. He hopes o lose a few pounds during the week and go after Becki on the Valle Vista course next week. Ron Nelson improved his 55+ PR by 77 seconds. Chris and Dena mproved their overall PRs by 16 and 5 seconds.\n\n12/30/00 - All Courses Day\n\nDoug/ Sar/ Frtvle - 2.75 Miles\n\nValle Vista - 3.0 Miles\n\n1\n\nJeff Rohrer\n\n6\n\nWalt Van Zant\n\n17:47\n\n25:13\n\nFarwell - 3.54 Miles\n\nFarwell/ Herriman - 4.68 Miles\n\n3\n\nDave Piazza\n\n30:25\n\nTriangle Run - 4.76 Miles\n\nDick Barrett Trophy Winner Becki Kriege\n\nThis was our traditional all-courses day, which we run on the last Saturday of the year. It was again very cold this morning (high 30s?). Becki was given the weekly trophy because she won her dual with Danny Moon. Danny now vows that he will start training seriously and will be ready for Becki in a couple of months. Rich Hahn, who turned 39 on Christmas Day, had the only PR of the day, a 12-second improvement on his Valle Vista PR. Bob Shuck, who has been injured for at least a couple of years, completed a Saturday course for the first time in a long time despite warmining up and running without gloves or a sweat shirt. Stan DeMartinis also had a birthday during December. He turned 78 but was still able to competently time our workout.\n\n1/6/01 - 8 x 0.66-Mile Tennis Court Loop Relay\n\nDick Barrett Trophy Winner - Todd Hayes\n\nAnother 30+ degree morning. However, 24 hearty souls tried the workout. The Hayes team started last, grabbed the lead shortly before the end of the 7th loop and then went on to win by 15 seconds. Kristina led all of the runners with a 3:45 average. Jonathan Lee led the guys with a 3:50 average. Jim Bordoni, Rich Hahn, and Stan DeMartinis ably timed the workout.\n\n1/13/01 - Farwell/ Herriman - 4.68\n\nMiles\n\nDick Barrett Trophy Winner Georgia Riley\n\nDave Piazza cruised to an easy win this morning. Kristina led the ladies with a close win over Becki. There was a close race for 4th place as four runners finished within 5 seconds of each other. McKayla ran well in her first try at this course. Antonina knocked about a minute off her 45+ PR. Georgia got the weekly trophy because she knocked 90 seconds off her PR.\n\n1/20/01 - 4 x 1.46 Mile WVC Loop Relay\n\nDick Barrett Trophy Winner - Jim Bordoni\n\nDick Barrett Trophy Winner - Slim Pickens\n\nAgain, it was very cold this morning (mid 30s?). Dave Piazza had a 30 yard lead when he turned onto Douglas from Saratoga Ave with 1.05 miles to go. However, he was unfamiliar with the course and angled up Shadow Oaks instead of Douglas. Jim Bordoni finally got Dave's attention and got him turned around. But, Dave was too tired to make up the lost ground and finished 2nd. Becki led the ladies, Todd led the 50+ men, Ralph Poole led the field of six 60+ runners, Sue Francis led the 40+ ladies, and Georgia led the 50+ ladies.\n\n2/3/01 - 5K on the Track\n\nGood weather this morning. The temperature was in the mid 40s and there was no rain or wind. Scott ran with Slim for about half the race before Slim gradually pulled away for the win.\n\n2/17/01 <cursor_is_here>74 Miles\n\nt was cold this morning (40 degrees?), which was very conducive to PWs. And many of us were down to the task as 7 PWs were recorded. Katie Spink had the best splits of the day at 8:30 and 8:26 for a 16:56 total. She was closely followed by Jim Bordoni and Dave Piazza at 16:57. Todd Hayes and Antonina ran very well to inish 37 seconds under their rating and 24 seconds in front of the second place eam. Todd's time of 17:23 was his best or this workout since April of 1994. Terri Kinsch also ran well to finish 39 seconds under her rating. Alas, her partner ran 114 seconds over his rating. Rich Hahn mproved his PR for this workout by 35 seconds with a combined time of 18:25. Todd led the 50+ men and Ralph Poole led he 60+ men. Sue Francis led the 40+ adies at 19:37 and Jutta, who is now 60, ed the 50+ ladies at 20:40. Ken Napier and Walt ran a spectacular 165 seconds over their rating. Ken got the team honors by finishing 96 seconds over his rating. Danny Moon did not run the workout, avoiding a PW. Ray Russell recorded our splits, noting at least 40% of them correctly.\n\n1/27/01 - Farwell - 3.54 Miles\n\n18\n\nJoe Hurtado\n\n26:49.3\n\nDick Barrett Trophy Winner - Jeff Rohrer\n\nGood weather this morning -- 50 degrees and overcast -- and many of us took advantage of the conditions to run well. Dave Piazza scored an easy win while mproving his PR by 44 seconds and moving to #19 on the 40+ list. We have been running this course for about 27 years and have had a lot of good 40+ unners run the course. So, that is a significant accomplishment. Jeff Rohrer has been trying for 6 years to break his PR of 34:40 and finally accomplished his goal with a 9-second improvement. Todd Hayes improved his 50+ PR by 18 seconds. Ralph Poole, one month shy of 65, knocked 33 seconds off his PR. We missed wishing Ron Nelso a happy 58th birthday but he did have a happy birthday as he moved to #11 on the 55+ list with a 2+ minute improvement on his 55+ best. Cecil improved his 45+ best by a couple of minutes while moving to #47 on that list. McKayla improved her PR by 23 seconds, enabling her to move by three runners to #13 on the women's all-time list. Sue Francis ran her best time on this course in 2 years. Pauline improved her 40+ best by 34 seconds. Don Packwood ran his best ime on this course in 5 years while mproving his 60+ PR by 7 minutes. Thanks to Stan DeMartinis for again timing our workout. He was ably assisted by Danny Moon and Linda Legregni.\n\n2/24/01 - 8 x 0.66-Mile Tennis\n\nCourt Loop Relay\n\nPl\n\nTeam\n\nStrt\n\nFinish\n\nDick Barrett Trophy Winner - Rich Hahn\n\nThis was a miserable morning for running -cold, windy, and a light to moderate rain. Still 18 mildly mentally disturbed runners an the workout. We were supposed to run 6 x 1600 on the track but decided instead\n\nto run the tennis court loop relay.\n\nHoward Powers ran in a trench coat that made him appear to be a flasher. He flung off his coat to the horror of all at the start of the last leg and the lightening of his load was just enough to enable him to hold off Bob Pickens for the win. Bob and Dave Piazza had the best cumulative times for the workout at 14:12.59 and 14:13.02. Katy Spink led the ladies at 14:51.\n\n3/3/01 - Valle Vista - 3.0 Miles\n\nDick Barrett Trophy Winner Ralph Poole\n\nThe temperature was in the 30s during our warmup but increaed to the mid 40s by the time we started - not a temperature conducive to fast times but better than freezing temperatures. Dave Piazza raced neck and neck with Slim Pickens for the first mile before pulling away for the win. Arturo finished second while recording the all-time #4 time for 50+ runners. Katy Spink of the Aggies led the ladies while running 8 seconds under the club course record. Ralph Poole, 13 days short of turning 65, knocked 18 seconds off his PR while moving to #2 on the 60+ list, 11 seconds behind Norm Saucedo's record. Norm broke Ken Napier's 65+ record by 41 seconds. Cecil, the leader of the 40+ division of the ultra grand prix, improved his 45+ record by 70 seconds. Joe Hurtado's and Tim Rostege's times moved them to #s 4 and 7 on the 60+ list. Georgia moved to #2 on the women's 55+ list and Chris Hallen moved to #7 on the 50+ list. Terri Kinsch improved her 50+ best by two minutes.\n\n3/10/01 - Triangle Run - 4.76 Miles\n\nDick Barrett Trophy Winner - Norm Saucedo\n\nGood running weather this morning sunny and brisk. As can be seen, Dave Piazza ran to a whopping victory while\n\nknocking 39 seconds off his PR. Becki ed the ladies while finishing second overall. Joe Hurtado moved to #5 on the 60+ list. Norm recorded the All-time best or 65+ runners and Howard Powers knocked 15 seconds off his 75+ course ecord. Georgia's time moved her to #2 on he women's 55+ list and Terri Kinsch mprove her 50+ PR by over three minutes.\n\n3/17/01 - 12 x 0.33-Mile Tennis Court Loop Relay\n\nDick Barrett Trophy Winner Murphy Team\n\nWe had a small turnout for the relay this morning as many were saving their best or the 50+ race tomorrow. All teams started together. There was a close battle or second place. Otherwise, the competition was not close. The Murphy eam scored an easy win. Jim Bordoni at he advanced age of 48 set a PR for this workout with a total time of 9:39 (1:36.5 per run).\n\n3/24/01 - Step Up & Step Down Relay\n\nDick Barrett Trophy Winner Mathias Team\n\nAll teams started even. We think that we got the correct order of finish. In any event, the Mathias team won by a fair amount.\n\n3/31/01 - Doug/Sara/ Frtvle - 2.75 Miles\n\nDick Barrett Trophy Winner Ralph Poole\n\nHaving a woman win a club road run is a rare event. It has happened less than five times in the club's history. But, this morning an even more rare event occurred. A 60+ runner finished first. Ralph Poole at the advanced age of 65 led the race most of the way and then held off Ron Nelson's furious kick to win by 0.7 seconds. Ron, a kid of 58, just could not match strides with Ralph this morning. Kristina led the ladies and Demetrios led the open men.\n\n4/7/01 - 12 x 800 Relay\n\nDick Barrett Trophy Winner Peterson Team\n\n4/14/01 - Farwell/ Herriman - 4.68\n\nDick Barrett Trophy Winner McKayla Plank\n\nThere were a lot of good performances this morning. Jeff Rohrer won while coming within 13 seconds of his PR. McKayla Plank, an 8th-grader, knocked 76 seconds off her PR while moving to #10 on the women's all-time list. Ralph Poole improved his PR by 13 seconds while breaking the 65+ course record by over 4 minutes. Russ Kinsch ran his best time on this course in nearly 4 years. Jim Wurm did not get lost while running this course for the first time in over 15 years. Nao ran it for the first time in 10+ years.\n\nRelay\n\n4/28/01 - 4 x 1.46-Mile WVC Loop\n\n34\n\nRich Stiller\n\n33:47.7\n\nDick Barrett Trophy Winner Howard Powers\n\nDick Barrett Trophy Winner - Terri Kinsch\n\nBad handicapping and no close races this morning as the Kinch team raced to an easy win. Dave Piazza had the best cumulative time at 16:11. Jim Wurm ran somewhat slower than his best time of 15:55 in July 1979 with a 21:29.\n\n5/5/01 - Farwell - 3.54 Miles\n\nSlim Pickens dipped under 20 minutes for the first time with his win this morning. Demetrios missed his PR by 9 seconds because he took a wrong turn when he should have turned onto Douglas from Saratoga. Norm broke the 65+ course record by 76 seconds. Ralph Poole recorded the #2 65+ time. However, Ralph ran 23:00 back in January when he was a kid of 64. Today, he and Joe Hurtado decided to take it easy and run together. Don Packwood knocked 70 seconds off his 60+ PR. Chris Hallen moved to #7 on the women's 50+ list. Georgia Riley recorded the #3 women's 55+ time. Howard Powers broke his own 75+ course record by 41 seconds.\n\n5/12/01 - Short Six - 5.74 Miles\n\nThere were many notable performances this morning. Slim Pickens scored an easy win with his 40+ best. Katy Spink and Becki Kriege ran together for three miles before Katy pulled away to lead the women. Ralph Poole took home the weekly trophy as he knoced 5 1/2 minutes off the men's 65+ course record. Danny Moon, although running better lately, added 84 seconds to his PW. Russ Kinsch ran his best time on this course in 3 1/2 years. Joe Hurtado recorded the #9 time by a 60+ runner. Jake White ran well while running this course for the first time in 5 years. Rick Kananen ran it for the first time in 4 years. Rich Collins ran his best time on this course in 3 years and much better than the horrible 54:32 that he ran last December. Georgia Riley moved to #2 on the women's 55+ list with her 48:08. Tim Riley added 6 minutes to his PW - a remarkable performance. Terri Kinsch continued her excellent running of late with the #8 time by a 50+ woman runner. Ed Reyna made a wrong turn and got lost.\n\nRACE RESULTS\n\n11/18/00 - Davis Turkey Trot 5K\n\nJim Bordoni\n\n60:57\n\n22\n\nDon Packwood (I)\n\n41:36\n\nTeam A, led by the outstanding\n\n10\n\nperformances of McKayla Plank and Jim Wurm, won three boxes of Valentine candy for their win. All teams were rated to score between 50 and 52 points. McKayla ran 3 places better than estimated and Jim a whopping 5 places. Jim attributed his performance to the fact that he now only eats 6 donutes per day rather than a dozen. Danny Moon, slowed by the effects of a recent surgery, led his team to a last place finish by finishing 22 places farther back than expected. Danny was in 4th place after about 2 miles and then quickly worked his was back through the field to finish 35th. Annette had pity on him and let him finish just in front of her.\n\nSome notable performers included Pauline Beatty, who improved by 3 1/2 minutes over last year, Kevin Murphy, who started slow and then moved through the field, easily passing Jim Wurm and Walt Van Zant going up the Sobey hill and pulling away from a pack of 4 over the last mile, Annette McPhail, who improved by 4 minutes, Georgia Riley, who improved by 4 minutes, Sue Francis, who improved by 2 1/2 minutes, and Danny who ran 12 minutes slower than last year. Pansies who failed to run because of the potential terrible weather included Ed Gavin and Grace Voss. During our breakfast discussion after the race, some felt that these DNS (did not start) should count as double points in the unknown runner contest.\n\n2/11/01 - Jed Smith 50K\n\nCecil Baumgartner 3:49:27 1st50/54\n\n2/24/01 - Almond Blossom 1 Mile\n\nFred Martin 5:40 1st-50+ Fred said that it was very windy and rainy during this race, accounting for his drop from 5:18 last year to 5:40 this year.\n\n2/24/01 - Almond Blossom 8K\n\nFred Martin 32:53 4th-50+ The weather got even worse during the 8K, which started a few minutes after the finish of the mile. Fred was happy that he could just finish the race.\n\n3/3/01 - Run For The Seals 4M\n\nKen Noel\n\n28:58 4th-60+\n\nJutta McCormick 30:45 1st-60+\n\n3/4/01 - Napa Valley Marathon\n\nDave McIntyre\n\n3:56:xx\n\nThe was the first time under 4 hours for Dave -- Not bad for a 215 heavyweight runner.\n\n3/11/01 - Mercury/News 10K\n\nBob Ebert\n\n32:50\n\n3rd-40+\n\nCraig Whichard\n\n45:12\n\nBob Pickens\n\n33:42\n\n6th-40+\n\nDan Anderson\n\n45:15\n\nJeff Rohrer\n\n45:19\n\n11\n\nKaty Spink\n\n44:58\n\n12\n</text>\n",
"role": "user"
},
{
"content": "- Short Six - 5.",
"role": "assistant"
}
] |
AN OVERVIEW OF THE INTERNATIONAL CONVENTION ON LIABILITY AND COMPENSATION FOR DAMAGE IN CONNECTION WITH THE CARRIAGE OF HAZARDOUS AND NOXIOUS SUBSTANCES BY SEA, 2010 (THE 2010 HNS CONVENTION)
Explanatory note
1 The original Overview of the HNS Convention, 1996 was approved by the Legal Committee of IMO at its eighty-fourth session, held in April 2002. In 2010, an International Conference adopted a Protocol to the 1996 Convention, which was designed to address the practical problems that had been perceived to prevent many States from ratifying the Convention. This Overview is a revision of the original document, taking into account changes introduced by the 2010 Protocol.
2 Together, these treaties constitute the 2010 HNS Convention. This Overview offers straightforward but fundamental information on the key issues that fall within the scope of the 2010 HNS Convention. It should also provide a useful basis from which to answer any queries from interested parties while explaining the broad effects of the Convention as well as its purpose. The Overview is merely explanatory and therefore does not contain any recommendation to be considered a source of any legal obligation regarding the implementation of the 2010 HNS Convention.
3 The Overview is consistent with resolution A.932(22) adopted by the IMO Assembly at its twenty-second session, which, inter alia, urged States to place a high priority on working towards the Convention's implementation and resolving any practical difficulties in setting up the new regime, with the aim of ratification, acceptance and approval of, or accession to, the 2010 HNS Convention. It also responds to resolution 4 of the 2010 International Conference, which calls for revision of the original Overview to take account of the 2010 Protocol.
Main reasons for the changes introduced into the 1996 Convention by the 2010 Protocol
4 It may be an aid to the understanding of the 2010 HNS Convention to explain briefly the underlying causes inhibiting the entry into force of the HNS Convention, 1996 and the solutions adopted in the 2010 Protocol, namely:
(i) the heavy burden on States of having to report the vast range of packaged substances received by them. The remedy adopted was to differentiate between bulk and packaged HNS goods by excluding packaged goods from the definition of contributing cargo, and exempting receiving States from the obligation to make contributions to the HNS Fund for them. Nevertheless, damage caused by packaged goods remains covered under the compulsory insurance of the shipowner, and any excess is met from the HNS Fund. In order to maintain the two-tier system, in view of the exclusion from contributions to the Fund, the shipowner's limitation amount for carrying packaged goods was also increased;
(ii) in the case of Liquefied natural gas (LNG) cargoes, the HNS Convention, 1996 provided that the person responsible for making contributions should be the titleholder, who may, however, not be subject to the jurisdiction of a State Party, and the contributions may not, therefore, always be recoverable. The Protocol now shifts responsibility for payment to the receiver, unless the titleholder has agreed to assume that responsibility; and
(iii) non-submission of contributing cargo reports, on ratification of the HNS Convention, 1996 and annually thereafter, was also a serious obstacle. The solution was to require States to submit reports on contributing cargo as a condition of becoming Contracting States to the Convention, and thereafter to submit reports annually, in default of which they will be temporarily suspended from being Contracting States. States Parties failing to submit annual reports, after the entry into force of the Convention, will be unable to claim compensation until their reports are brought up to date. The only exception will be claims for deaths and personal injury.
Introduction to the 2010 HNS Convention
5 Compensation for damage caused by the carriage by sea of hazardous and noxious substances (HNS) is regulated by the 2010 HNS Convention.
6 The regime established by the 2010 HNS Convention is largely modelled on the existing regime for oil pollution from tankers set up under the International Convention on Civil Liability for Oil Pollution Damage, 1992 (CLC) and the International Convention on the Establishment of an International Fund for Compensation for Oil Pollution Damage, 1992 (Fund Convention), which covers pollution damage caused by spills of persistent oil from tankers.
7 The HNS regime is governed by the 2010 HNS Convention, the purpose of which is to provide adequate, prompt and effective compensation for loss or damage to persons, property and the environment arising from the carriage of HNS by sea. The Convention covers both pollution damage and damage caused by other risks, e.g. fire and explosion.
8 Under the 2010 HNS Convention, the shipowner is liable for the loss or damage up to a certain amount, which is covered by insurance (1 st tier). A compensation fund (the HNS Fund) will provide additional compensation when the victims do not obtain full compensation from the shipowner or its insurer (2 nd tier). The HNS Fund will be funded by those companies and other entities which receive HNS after sea transport in a Member State in excess of the thresholds laid down in the Convention.
Scope of application
9 The 2010 HNS Convention covers any damage caused by HNS in the territory or territorial sea of a State Party to the Convention. It also covers pollution damage in the exclusive economic zone, or equivalent area, of a State Party and damage (other than pollution damage) caused by HNS carried on board ships registered in, or entitled to fly, the flag of a State Party outside the territory or territorial sea of any State. The costs of preventive measures, i.e. measures to prevent or minimize damage, are also covered wherever taken.
10 The 2010 HNS Convention does not cover damage caused during the transport of HNS to or from a ship. Cover starts from the time when the HNS enter the ship's equipment or pass its rail, on loading, and the cover ends when the HNS cease to be present in any part of the ship's equipment or pass its rail on discharge.
11 The 2010 HNS Convention covers incidents involving the carriage of HNS by sea by any sea-going craft of any type whatsoever, except warships and other ships owned or operated by a State and used, for the time being, only on Government non-commercial service. The Convention allows a State to exclude from the application of the Convention, ships which do not exceed 200 gross tonnage and which carry HNS only in packaged form, and while the ships are engaged on voyages between ports of that State.
12 The 2010 HNS Convention defines the concept of HNS largely by reference to lists of individual substances that have been previously identified in a number of international Conventions and Codes designed to ensure maritime safety and prevention of pollution. The references to the codes and regulations covering these HNS substances are set out in article 1.5 of the Convention, and, with one exception, they reflect amendments made to them by IMO bodies since the HNS Convention, 1996. The exception relates to solid bulk materials possessing chemical hazards which are subject to the provisions, inter alia, of the International Maritime Dangerous Goods Code (IMDG Code) in effect in 1996, when carried in packaged form. In this respect, reference is made to IMO Circular letter No.3144, dated 6 January 2011, listing solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code and also in the IMDG Code in effect in 1996, and solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code but not in the IMDG Code in effect in 1996.
13 HNS include both bulk cargoes and packaged goods. Bulk cargoes can be solids, liquids including oils, or liquefied gases. The number of substances included is very large: the IMDG Code, for example, lists hundreds of materials which can be dangerous when shipped in packaged form. Some bulk solids such as coal and iron ore are excluded.
Damage
14 Damage includes loss of life or personal injury on board or outside the ship carrying HNS, loss of or damage to property outside the ship, loss or damage caused by contamination of the environment, loss of income in fishing and tourism, and the costs of preventive measures and further loss or damage caused by such measures. The 2010 HNS Convention defines preventive measures as any reasonable measures taken by any person after an incident has occurred to prevent or minimize damage. These include measures such as clean-up or removal of HNS from a wreck if the HNS present a hazard or pollution risk.
15 The 2010 HNS Convention does not cover pollution damage caused by persistent oil, since such damage may be covered under the existing international regime established by the 1992 CLC and Fund Convention. However, non-pollution damage caused by persistent oil, e.g. damage caused by fire or explosion, is covered by the Convention. The Convention does not apply to damage caused by radioactive material.
16 The amount available for compensation from the shipowner and the HNS Fund will be distributed among claimants in proportion to their established claims. However, claims for loss of life and personal injury have priority over other claims. Up to two thirds of the available compensation amount is reserved for such claims.
1 st tier – Liability of the shipowner
(a) Strict liability of the shipowner
17 The registered owner of the ship in question is strictly liable to pay compensation following an incident involving HNS. This means that he is liable, even in the absence of fault on his part. The fact that damage has occurred is sufficient to establish the shipowner's
liability, provided there is a causal link between the damage and the HNS carried on board the ship.
18 The shipowner is exempt from liability under the 2010 HNS Convention only if he proves that:
(a) the damage resulted from an act of war, hostilities, civil war, insurrection or a natural phenomenon of an exceptional, inevitable and irresistible character; or
(b) the damage was wholly caused by an act or omission done with the intent to cause damage by a third party; or
(c) the damage was wholly caused by the negligence or other wrongful act of any Government or other authority responsible for the maintenance of lights or other navigational aids in the exercise of that function; or
(d) the failure of the shipper or any other person to furnish information concerning the hazardous and noxious nature of the substances shipped either:
(i) has caused the damage, wholly or partly; or
(ii) has led the owner not to obtain insurance;
provided that neither the shipowner, nor his servants or agents knew, or ought reasonably to have known, of the hazardous and noxious nature of the substances shipped.
19 If the shipowner proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage, by the person who suffered the damage, or from the negligence of that person, the shipowner may be exonerated, wholly or partly, from its obligation to pay compensation to such person.
20 The 2010 HNS Convention does not impose liability on the owner of the HNS involved in the incident.
(b) Limitation of liability
21 The shipowner is normally entitled to limit his liability under the 2010 HNS Convention in respect of any one incident to an aggregate amount calculated on the basis of the units of gross tonnage (GT) of the ship, as follows:
(a) Where the damage has been caused by bulk HNS:
(i) 10 million Special Drawing Rights (SDR) 1 for a ship not exceeding 2,000 GT; and
(ii) for a ship in excess of 2000 GT, 10 million SDR plus; for each unit of tonnage from 2,001 to 50,000 GT, 1500 SDR; and for each unit of tonnage in excess of 50,000 GT, 360 SDR;
1 The Special Drawing Rights is a monetary unit established by the International Monetary Fund (IMF); as at 30 December 2010, 1 SDR = £0.997755 or US$1.54003.
provided, however, that this aggregate amount shall not in any event exceed 100 million SDR.
(b) Where the damage has been caused by packaged HNS, or where the damage has been caused by both bulk HNS and packaged HNS, or where it is not possible to determine whether the damage originating from that ship has been caused by bulk HNS or by packaged HNS:
(i) 11.5 million SDR for a ship not exceeding 2,000 GT; and
(ii) for a ship with a tonnage in excess thereof, the following amount in addition to that mentioned in (i):
for each unit of tonnage from 2,001 to 50,000 GT, 1,725 SDR; and for each unit of tonnage in excess of 50,000 GT, 414 SDR;
provided, however, that this aggregate amount shall not in any event exceed 115 million SDR.
22 The shipowner will be denied the right to limitation of liability if it is proved that the damage resulted from his personal act or omission committed either, with intent to cause damage, or recklessly and with knowledge that damage would probably result.
(c) Channelling of liability
23 As set out above, the registered shipowner is liable for pollution damage under the 2010 HNS Convention. Unless the damage resulted from their personal act or omission committed with intent to cause such damage, or recklessly and with knowledge that such damage would probably result, no claim for compensation may be made against the following persons:
(a) the servants or agents of the shipowner or members of the crew;
(b) the pilot or any other person who, without being a member of the crew, performs services for the ship;
(c) any charterer (including a bareboat charterer), manager or operator of the ship;
(d) any person performing salvage operations with the consent of the owner or on the instructions of a competent public authority;
(e) any person taking preventive measures; and
(f) all servants or agents of persons mentioned in (c), (d) and (e).
(d) Compulsory insurance
24 The owner of a ship that carries HNS is required to take out insurance, or maintain other acceptable financial security, to cover his liability under the 2010 HNS Convention.
25 The 2010 HNS Convention requires shipowners to provide evidence of insurance cover upon the ship's entry into port of any State which is party to the Convention, by production of a certificate, regardless of whether the State of the ship's registry is party to the Convention. The certificates will be issued by the State of the ship's register or, if that State is not party to the Convention, by a State Party. States Parties are required to accept any certificate issued by any other State Party.
26 Claims for compensation may be brought directly against the insurer or person providing financial security.
2 nd tier – HNS Fund
27 The HNS Fund will pay compensation when the total admissible claims exceed the shipowner's liability, i.e. the Fund pays "top up" compensation when the shipowner, or his insurer, cannot meet in full the loss or damage arising from an incident.
28 The HNS Fund also pays compensation in the following cases:
* the shipowner is exonerated from liability; or
* the shipowner liable for the damage is financially incapable of meeting his obligations.
29 To claim against the HNS Fund, the 2010 HNS Convention requires claimants to prove that there is a reasonable probability that the damage resulted from an incident involving one or more ships. The HNS Fund may, in such cases, be liable to pay compensation, even if the particular ship causing the damage cannot be identified.
30 The HNS Fund is also not liable to pay compensation if the damage was caused by an act of war, hostilities, etc., or by HNS discharged from a warship or other ship owned or operated by a State and used for the time being, only on Government non-commercial service.
31 If the HNS Fund proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage by the person who suffered the damage or from the negligence of that person, the HNS Fund may be exonerated, wholly or partly, from its obligation to pay compensation to such person. However, there shall be no such exoneration of the HNS Fund with regard to preventive measures.
Limit of compensation by the HNS Fund
32 The maximum amount payable by the HNS Fund in respect of any single incident is 250 million SDR, including the sum paid by the shipowner or his insurer. The 2010 HNS Convention also provides a simplified procedure to increase the maximum amount of compensation payable under the Convention in the future.
33 If the total amount of the admissible claims does not exceed the maximum amount available for compensation, then all claims will be paid in full. Otherwise the payments will have to be prorated, i.e. all claimants will receive an equal proportion of their admissible claims.
Shipowners' liability and Fund limit laid down in the HNS Convention
Financing of the HNS Fund
(a) Contributions to the HNS Fund
34 Compensation payments made by the HNS Fund will be financed by contributions levied on persons who have received, in a calendar year, contributing cargoes after sea transport in a Member State, in quantities above the thresholds laid down in the 2010 HNS Convention. For each contributor, the levies will be in proportion to the quantities of HNS received by that person each year.
35 For the purpose of the contribution system, not only imported cargoes, but also cargoes received after sea transport between ports in the same State are taken into account. In this respect, contributing cargo means bulk HNS. However, cargo is not considered to be contributing cargo so long as it is in transit. That is, provided that the cargo is not imported, consumed or transformed, transhipment does not lead to a requirement for the payment of a contribution to the HNS Fund.
36 The contributions to finance the HNS Fund's compensation payments will be made post-event, i.e. levies will only be due after an incident involving the HNS Fund occurs. Levies may be spread over several years in the case of a major incident.
37 The 2010 HNS Convention allows a person who physically receives HNS on behalf of a third party, e.g., a storage company, to designate that third party as the receiver for the purposes of the Convention. Both the person who physically receives the contributing cargo in a port or terminal, and the designated third party must be subject to the jurisdiction of a State Party.
38 For LNG, annual contributions shall be made by the receiver, or by the titleholder, if it has agreed with the receiver to do so, but, if the titleholder defaults in any payments, liability reverts to the receiver.
39 States are allowed to establish their own definition of "receiver" under national law. Such a definition must, however, result in the total quantity of contributing cargo received in the State in question being substantially the same as if the definition in the Convention had been applied. This allows States flexibility to implement the Convention in conjunction with existing national law, without giving any State the possibility of obtaining an unfair commercial advantage.
40 States Parties are required to inform the Director of the HNS Fund of the name and address of receivers of quantities of contributing cargo exceeding the thresholds during the preceding year, together with the quantities of cargo received by each of them. No compensation is payable by the HNS Fund until these reporting obligations have been fulfilled, except for death and personal injury. Contributing cargo is limited to bulk HNS, in contrast to the situation prior to adoption of the 2010 Protocol, when such cargo included packaged HNS goods. Nevertheless, damage caused by packaged goods remains covered under the shipowner's compulsory insurance, with any excess being met from the HNS Fund.
41 States are liable for any financial losses incurred by the HNS Fund as a result of the non-submission of reports. States also have the option of developing national regimes for the collection of contributions in respect of receipts of cargoes carried in domestic traffic (i.e. the trade by sea from one port or terminal to another within the same State).
42 When consenting to be bound by the 2010 HNS Protocol, and thereby the 2010 HNS Convention, and annually thereafter until the Protocol enters into force for a given State, Contracting States are obliged to submit information to IMO on contributing cargoes received. This will enable the Secretary-General of IMO to determine the date of the entry into force of the 2010 HNS Convention. A State that defaults in these reporting obligations shall be temporarily suspended from being a Contracting State, until it has submitted the required data. A State failing to submit annual reports after the entry into force of the Convention, will be unable to claim compensation until it has submitted the required data, except for claims for death and personal injury.
43 States which decide to become Parties to the 2010 HNS Protocol should ensure that they deposit instruments only in respect of the Protocol, without any references to the HNS Convention, 1996.
(b) HNS Fund accounts
44 The HNS Fund, when fully operational, will have four accounts:
* Oil
* Liquefied Petroleum Gas (LPG)
* Liquefied Natural Gas (LNG)
* A general account with two sectors:
[x] Other HNS.
[x] Bulk solids
45 Each account will meet the cost of compensation payments arising from damage caused by substances contributing to that account, i.e. there will be no cross-subsidization.
46 Each separate account will only come into operation when the total quantity of contributing cargo received in Member States during the preceding year, or any such year as the HNS Assembly decides, exceeds the following levels:
* 350 million tonnes for the oil account
* 15 million tonnes for the LPG account.
* 20 million tonnes for the LNG account
47 However, during the early existence of the HNS Fund, there may not be sufficient contribution basis in the form of the quantities of HNS received in Member States to set up all the four separate accounts. Initially, the separate accounts may be postponed and the HNS Fund may, therefore, have only two accounts:
* one separate account for oil
[x] LNG
* one general account including four sectors:
[x] LPG
[x] Other HNS.
[x] Bulk solids
48 In addition, the separate accounts could be suspended if the total unpaid contributions to that account exceed 10% of the most recent levy to that account. As a result, any contributions due to a separate account that has been suspended, will be paid into the general account and any relevant claims will be met from this account. Any decision to suspend or re-instate the operation of an account requires a two-thirds majority of the Assembly.
49 Receivers of HNS might have to contribute to one or more of the accounts. The levies applying to individual receivers will be calculated according to the quantities of contributing cargo received and, in the case of the general account, according to the Regulations in Annex II of the Convention. Liability to contribute to the HNS Fund will arise for a given receiver only when his annual receipts of HNS exceed the following thresholds:
Competence of courts
50 Claimants can normally only take legal action in a court in the State Party in whose territory or waters the damage occurred. In this context "waters" means the territorial sea 2 or the Exclusive Economic Zone (EEZ) 3 , or an equivalent area, of a State Party. This also applies to legal actions against any provider of insurance or financial security for the owner's liability, i.e. the shipowner's insurer.
51 Different rules apply if damage other than pollution damage to the environment occurs exclusively beyond the territorial seas of States Parties.
52 Actions against the HNS Fund should be brought before the same court as actions taken against the shipowner. However, if the shipowner is exempted from liability, or for another reason no shipowner is liable, legal action against the HNS Fund must be brought in a court which would have been competent had the shipowner been liable. Where an incident has occurred and the ship involved has not been identified, legal action may be brought against the HNS Fund only in States Parties where damage occurred.
2 The breadth of the territorial sea is established in Article 3 of the United Nations Convention on the Law of the Sea (UNCLOS) as "up to a limit not exceeding 12 nautical miles, measured from baselines determined in accordance with this Convention." The normal baseline is the low water line along the coast (Article 5 of UNCLOS).
3 The Exclusive Economic Zone is an area beyond the territorial sea defined in Article 57 of UNCLOS as not beyond 200 nautical miles from the baselines from which the breadth of the territorial sea is measured.
Administration
53 The HNS Fund will have an Assembly, a Secretariat and a Director, mirroring the organization of the International Oil Pollution Compensation Funds (IOPC Funds).
54 The Assembly will consist of all States Parties to the 2010 HNS Convention. The Assembly will have a number of functions, including approving settlements of claims against the HNS Fund, and deciding on amounts to be levied as contributions.
Entry into force of the 2010 HNS Convention
55 The 2010 HNS Convention will enter into force eighteen months after ratification of the 2010 HNS Protocol by at least twelve States, subject to the following conditions:
(i) four States must each have a registered ship's tonnage of at least 2 million GT; and
(ii) contributors in the States that have ratified the Convention must, between them, have received during the preceding calendar year a minimum of 40 million tonnes of cargo consisting of bulk solids and other HNS liable for contributions to the general account.
___________
|
<urn:uuid:7fc081ef-3315-4aa4-a0c2-2b2375fb9a91>
|
CC-MAIN-2020-24
|
http://www.imo.org/en/OurWork/Legal/Documents/HNS%20Overview.pdf
|
2020-05-28T23:00:59+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-24/subset=warc/part-00249-b4a094ce-c3a1-4796-8c26-d927e48e4b4a.c000.gz.parquet
| 175,454,256
| 5,469
|
eng_Latn
|
eng_Latn
| 0.9909
|
eng_Latn
| 0.995156
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3249,
6262,
9905,
12177,
14281,
17010,
17080,
20404,
23007,
25097,
26108
] |
AN OVERVIEW OF THE INTERNATIONAL CONVENTION ON LIABILITY AND COMPENSATION FOR DAMAGE IN CONNECTION WITH THE CARRIAGE OF HAZARDOUS AND NOXIOUS SUBSTANCES BY SEA, 2010 (THE 2010 HNS CONVENTION)
Explanatory note
1 The original Overview of the HNS Convention, 1996 was approved by the Legal Committee of IMO at its eighty-fourth session, held in April 2002. In 2010, an International Conference adopted a Protocol to the 1996 Convention, which was designed to address the practical problems that had been perceived to prevent many States from ratifying the Convention. This Overview is a revision of the original document, taking into account changes introduced by the 2010 Protocol.
2 Together, these treaties constitute the 2010 HNS Convention. This Overview offers straightforward but fundamental information on the key issues that fall within the scope of the 2010 HNS Convention. It should also provide a useful basis from which to answer any queries from interested parties while explaining the broad effects of the Convention as well as its purpose. The Overview is merely explanatory and therefore does not contain any recommendation to be considered a source of any legal obligation regarding the implementation of the 2010 HNS Convention.
3 The Overview is consistent with resolution A.932(22) adopted by the IMO Assembly at its twenty-second session, which, inter alia, urged States to place a high priority on working towards the Convention's implementation and resolving any practical difficulties in setting up the new regime, with the aim of ratification, acceptance and approval of, or accession to, the 2010 HNS Convention. It also responds to resolution 4 of the 2010 International Conference, which calls for revision of the original Overview to take account of the 2010 Protocol.
Main reasons for the changes introduced into the 1996 Convention by the 2010 Protocol
4 It may be an aid to the understanding of the 2010 HNS Convention to explain briefly the underlying causes inhibiting the entry into force of the HNS Convention, 1996 and the solutions adopted in the 2010 Protocol, namely:
(i) the heavy burden on States of having to report the vast range of packaged substances received by them. The remedy adopted was to differentiate between bulk and packaged HNS goods by excluding packaged goods from the definition of contributing cargo, and exempting receiving States from the obligation to make contributions to the HNS Fund for them. Nevertheless, damage caused by packaged goods remains covered under the compulsory insurance of the shipowner, and any excess is met from the HNS Fund. In order to maintain the two-tier system, in view of the exclusion from contributions to the Fund, the shipowner's limitation amount for carrying packaged goods was also increased;
(ii) in the case of Liquefied natural gas (LNG) cargoes, the HNS Convention, 1996 provided that the person responsible for making contributions should be the titleholder, who may, however, not be subject to the jurisdiction of a State Party, and the contributions may not, therefore, always be recoverable. The Protocol now shifts responsibility for payment to the receiver, unless the titleholder has agreed to assume that responsibility; and
(iii) non-submission of contributing cargo reports, on ratification of the HNS Convention, 1996 and annually thereafter, was also a serious obstacle. The solution was to require States to submit reports on contributing cargo as a condition of becoming Contracting States to the Convention, and thereafter to submit reports annually, in default of which they will be temporarily suspended from being Contracting States. States Parties failing to submit annual reports, after the entry into force of the Convention, will be unable to claim compensation until their reports are brought up to date. The only exception will be claims for deaths and personal injury.
Introduction to the 2010 HNS Convention
5 Compensation for damage caused by the carriage by sea of hazardous and noxious substances (HNS) is regulated by the 2010 HNS Convention.
6 The regime established by the 2010 HNS Convention is largely modelled on the existing regime for oil pollution from tankers set up under the International Convention on Civil Liability for Oil Pollution Damage, 1992 (CLC) and the International Convention on the Establishment of an International Fund for Compensation for Oil Pollution Damage, 1992 (Fund Convention), which covers pollution damage caused by spills of persistent oil from tankers.
7 The HNS regime is governed by the 2010 HNS Convention, the purpose of which is to provide adequate, prompt and effective compensation for loss or damage to persons, property and the environment arising from the carriage of HNS by sea. The Convention covers both pollution damage and damage caused by other risks, e.g. fire and explosion.
8 Under the 2010 HNS Convention, the shipowner is liable for the loss or damage up to a certain amount, which is covered by insurance (1 st tier). A compensation fund (the HNS Fund) will provide additional compensation when the victims do not obtain full compensation from the shipowner or its insurer (2 nd tier). The HNS Fund will be funded by those companies and other entities which receive HNS after sea transport in a Member State in excess of the thresholds laid down in the Convention.
Scope of application
9 The 2010 HNS Convention covers any damage caused by HNS in the territory or territorial sea of a State Party to the Convention. It also covers pollution damage in the exclusive economic zone, or equivalent area, of a State Party and damage (other than pollution damage) caused by HNS carried on board ships registered in, or entitled to fly, the flag of a State Party outside the territory or territorial sea of any State. The costs of preventive measures, i.e. measures to prevent or minimize damage, are also covered wherever taken.
10 The 2010 HNS Convention does not cover damage caused during the transport of HNS to or from a ship. Cover starts from the time when the HNS enter the ship's equipment or pass its rail, on loading, and the cover ends when the HNS cease to be present in any part of the ship's equipment or pass its rail on discharge.
11 The 2010 HNS Convention covers incidents involving the carriage of HNS by sea by any sea-going craft of any type whatsoever, except warships and other ships owned or operated by a State and used, for the time being, only on Government non-commercial service. The Convention allows a State to exclude from the application of the Convention, ships which do not exceed 200 gross tonnage and which carry HNS only in packaged form, and while the ships are engaged on voyages between ports of that State.
12 The 2010 HNS Convention defines the concept of HNS largely by reference to lists of individual substances that have been previously identified in a number of international Conventions and Codes designed to ensure maritime safety and prevention of pollution. The references to the codes and regulations covering these HNS substances are set out in article 1.5 of the Convention, and, with one exception, they reflect amendments made to them by IMO bodies since the HNS Convention, 1996. The exception relates to solid bulk materials possessing chemical hazards which are subject to the provisions, inter alia, of the International Maritime Dangerous Goods Code (IMDG Code) in effect in 1996, when carried in packaged form. In this respect, reference is made to IMO Circular letter No.3144, dated 6 January 2011, listing solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code and also in the IMDG Code in effect in 1996, and solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code but not in the IMDG Code in effect in 1996.
13 HNS include both bulk cargoes and packaged goods. Bulk cargoes can be solids, liquids including oils, or liquefied gases. The number of substances included is very large: the IMDG Code, for example, lists hundreds of materials which can be dangerous when shipped in packaged form. Some bulk solids such as coal and iron ore are excluded.
Damage
14 Damage includes loss of life or personal injury on board or outside the ship carrying HNS, loss of or damage to property outside the ship, loss or damage caused by contamination of the environment, loss of income in fishing and tourism, and the costs of preventive measures and further loss or damage caused by such measures. The 2010 HNS Convention defines preventive measures as any reasonable measures taken by any person after an incident has occurred to prevent or minimize damage. These include measures such as clean-up or removal of HNS from a wreck if the HNS present a hazard or pollution risk.
15 The 2010 HNS Convention does not cover pollution damage caused by persistent oil, since such damage may be covered under the existing international regime established by the 1992 CLC and Fund Convention. However, non-pollution damage caused by persistent oil, e.g. damage caused by fire or explosion, is covered by the Convention. The Convention does not apply to damage caused by radioactive material.
16 The amount available for compensation from the shipowner and the HNS Fund will be distributed among claimants in proportion to their established claims. However, claims for loss of life and personal injury have priority over other claims. Up to two thirds of the available compensation amount is reserved for such claims.
1 st tier – Liability of the shipowner
(a) Strict liability of the shipowner
17 The registered owner of the ship in question is strictly liable to pay compensation following an incident involving HNS. This means that he is liable, even in the absence of fault on his part. The fact that damage has occurred is sufficient to establish the shipowner's
liability, provided there is a causal link between the damage and the HNS carried on board the ship.
18 The shipowner is exempt from liability under the 2010 HNS Convention only if he proves that:
(a) the damage resulted from an act of war, hostilities, civil war, insurrection or a natural phenomenon of an exceptional, inevitable and irresistible character; or
(b) the damage was wholly caused by an act or omission done with the intent to cause damage by a third party; or
(c) the damage was wholly caused by the negligence or other wrongful act of any Government or other authority responsible for the maintenance of lights or other navigational aids in the exercise of that function; or
(d) the failure of the shipper or any other person to furnish information concerning the hazardous and noxious nature of the substances shipped either:
(i) has caused the damage, wholly or partly; or
(ii) has led the owner not to obtain insurance;
provided that neither the shipowner, nor his servants or agents knew, or ought reasonably to have known, of the hazardous and noxious nature of the substances shipped.
19 If the shipowner proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage, by the person who suffered the damage, or from the negligence of that person, the shipowner may be exonerated, wholly or partly, from its obligation to pay compensation to such person.
20 The 2010 HNS Convention does not impose liability on the owner of the HNS involved in the incident.
(b) Limitation of liability
21 The shipowner is normally entitled to limit his liability under the 2010 HNS Convention in respect of any one incident to an aggregate amount calculated on the basis of the units of gross tonnage (GT) of the ship, as follows:
(a) Where the damage has been caused by bulk HNS:
(i) 10 million Special Drawing Rights (SDR) 1 for a ship not exceeding 2,000 GT; and
(ii) for a ship in excess of 2000 GT, 10 million SDR plus; for each unit of tonnage from 2,001 to 50,000 GT, 1500 SDR; and for each unit of tonnage in excess of 50,000 GT, 360 SDR;
1 The Special Drawing Rights is a monetary unit established by the International Monetary Fund (IMF); as at 30 December 2010, 1 SDR = £0.997755 or US$1.54003.
provided, however, that this aggregate amount shall not in any event exceed 100 million SDR.
(b) Where the damage has been caused by packaged HNS, or where the damage has been caused by both bulk HNS and packaged HNS, or where it is not possible to determine whether the damage originating from that ship has been caused by bulk HNS or by packaged HNS:
(i) 11.5 million SDR for a ship not exceeding 2,000 GT; and
(ii) for a ship with a tonnage in excess thereof, the following amount in addition to that mentioned in (i):
for each unit of tonnage from 2,001 to 50,000 GT, 1,725 SDR; and for each unit of tonnage in excess of 50,000 GT, 414 SDR;
provided, however, that this aggregate amount shall not in any event exceed 115 million SDR.
22 The shipowner will be denied the right to limitation of liability if it is proved that the damage resulted from his personal act or omission committed either, with intent to cause damage, or recklessly and with knowledge that damage would probably result.
(c) Channelling of liability
23 As set out above, the registered shipowner is liable for pollution damage under the 2010 HNS Convention. Unless the damage resulted from their personal act or omission committed with intent to cause such damage, or recklessly and with knowledge that such damage would probably result, no claim for compensation may be made against the following persons:
(a) the servants or agents of the shipowner or members of the crew;
(b) the pilot or any other person who, without being a member of the crew, performs services for the ship;
(c) any charterer (including a bareboat charterer), manager or operator of the ship;
(d) any person performing salvage operations with the consent of the owner or on the instructions of a competent public authority;
(e) any person taking preventive measures; and
(f) all servants or agents of persons mentioned in (c), (d) and (e).
(d) Compulsory insurance
24 The owner of a ship that carries HNS is required to take out insurance, or maintain other acceptable financial security, to cover his liability under the 2010 HNS Convention.
25 The 2010 HNS Convention requires shipowners to provide evidence of insurance cover upon the ship's entry into port of any State which is party to the Convention, by production of a certificate, regardless of whether the State of the ship's registry is party to the Convention. The certificates will be issued by the State of the ship's register or, if that State is not party to the Convention, by a State Party. States Parties are required to accept any certificate issued by any other State Party.
26 Claims for compensation may be brought directly against the insurer or person providing financial security.
2 nd tier – HNS Fund
27 The HNS Fund will pay compensation when the total admissible claims exceed the shipowner's liability, i.e. the Fund pays "top up" compensation when the shipowner, or his insurer, cannot meet in full the loss or damage arising from an incident.
28 The HNS Fund also pays compensation in the following cases:
* the shipowner is exonerated from liability; or
* the shipowner liable for the damage is financially incapable of meeting his obligations.
29 To claim against the HNS Fund, the 2010 HNS Convention requires claimants to prove that there is a reasonable probability that the damage resulted from an incident involving one or more ships. The HNS Fund may, in such cases, be liable to pay compensation, even if the particular ship causing the damage cannot be identified.
30 The HNS Fund is also not liable to pay compensation if the damage was caused by an act of war, hostilities, etc., or by HNS discharged from a warship or other ship owned or operated by a State and used for the time being, only on Government non-commercial service.
31 If the HNS Fund proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage by the person who suffered the damage or from the negligence of that person, the HNS Fund may be exonerated, wholly or partly, from its obligation to pay compensation to such person. However, there shall be no such exoneration of the HNS Fund with regard to preventive measures.
Limit of compensation by the HNS Fund
32 The maximum amount payable by the HNS Fund in respect of any single incident is 250 million SDR, including the sum paid by the shipowner or his insurer. The 2010 HNS Convention also provides a simplified procedure to increase the maximum amount of compensation payable under the Convention in the future.
33 If the total amount of the admissible claims does not exceed the maximum amount available for compensation, then all claims will be paid in full. Otherwise the payments will have to be prorated, i.e. all claimants will receive an equal proportion of their admissible claims.
Shipowners' liability and Fund limit laid down in the HNS Convention
Financing of the HNS Fund
(a) Contributions to the HNS Fund
34 Compensation payments made by the HNS Fund will be financed by contributions levied on persons who have received, in a calendar year, contributing cargoes after sea transport in a Member State, in quantities above the thresholds laid down in the 2010 HNS Convention. For each contributor, the levies will be in proportion to the quantities of HNS received by that person each year.
35 For the purpose of the contribution system, not only imported cargoes, but also cargoes received after sea transport between ports in the same State are taken into account. In this respect, contributing cargo means bulk HNS. However, cargo is not considered to be contributing cargo so long as it is in transit. That is, provided that the cargo is not imported, consumed or transformed, transhipment does not lead to a requirement for the payment of a contribution to the HNS Fund.
36 The contributions to finance the HNS Fund's compensation payments will be made post-event, i.e. levies will only be due after an incident involving the HNS Fund occurs. Levies may be spread over several years in the case of a major incident.
37 The 2010 HNS Convention allows a person who physically receives HNS on behalf of a third party, e.g., a storage company, to designate that third party as the receiver for the purposes of the Convention. Both the person who physically receives the contributing cargo in a port or terminal, and the designated third party must be subject to the jurisdiction of a State Party.
38 For LNG, annual contributions shall be made by the receiver, or by the titleholder, if it has agreed with the receiver to do so, but, if the titleholder defaults in any payments, liability reverts to the receiver.
39 States are allowed to establish their own definition of "receiver" under national law. Such a definition must, however, result in the total quantity of contributing cargo received in the State in question being substantially the same as if the definition in the Convention had been applied. This allows States flexibility to implement the Convention in conjunction with existing national law, without giving any State the possibility of obtaining an unfair commercial advantage.
40 States Parties are required to inform the Director of the HNS Fund of the name and address of receivers of quantities of contributing cargo exceeding the thresholds during the preceding year, together with the quantities of cargo received by each of them. No compensation is payable by the HNS Fund until these reporting obligations have been fulfilled, except for death and personal injury. Contributing cargo is limited to bulk HNS, in contrast to the situation prior to adoption of the 2010 Protocol, when such cargo included packaged HNS goods. Nevertheless, damage caused by packaged goods remains covered under the shipowner's compulsory insurance, with any excess being met from the HNS Fund.
41 States are liable for any financial losses incurred by the HNS Fund as a result of the non-submission of reports. States also have the option of developing national regimes for the collection of contributions in respect of receipts of cargoes carried in domestic traffic (i.e. the trade by sea from one port or terminal to another within the same State).
42 When consenting to be bound by the 2010 HNS Protocol, and thereby the 2010 HNS Convention, and annually thereafter until the Protocol enters into force for a given State, Contracting States are obliged to submit information to IMO on contributing cargoes received. This will enable the Secretary-General of IMO to determine the date of the entry into force of the 2010 HNS Convention. A State that defaults in these reporting obligations shall be temporarily suspended from being a Contracting State, until it has submitted the required data. A State failing to submit annual reports after the entry into force of the Convention, will be unable to claim compensation until it has submitted the required data, except for claims for death and personal injury.
43 States which decide to become Parties to the 2010 HNS Protocol should ensure that they deposit instruments only in respect of the Protocol, without any references to the HNS Convention, 1996.
(b) HNS Fund accounts
44 The HNS Fund, when fully operational, will have four accounts:
* Oil
* Liquefied Petroleum Gas (LPG)
* Liquefied Natural Gas (LNG)
* A general account with two sectors:
[x] Other HNS.
[x] Bulk solids
45 Each account will meet the cost of compensation payments arising from damage caused by substances contributing to that account, i.e. there will be no cross-subsidization.
46 Each separate account will only come into operation when the total quantity of contributing cargo received in Member States during the preceding year, or any such year as the HNS Assembly decides, exceeds the following levels:
* 350 million tonnes for the oil account
* 15 million tonnes for the LPG account.
* 20 million tonnes for the LNG account
47 However, during the early existence of the HNS Fund, there may not be sufficient contribution basis in the form of the quantities of HNS received in Member States to set up all the four separate accounts. Initially, the separate accounts may be postponed and the HNS Fund may, therefore, have only two accounts:
* one separate account for oil
[x] LNG
* one general account including four sectors:
[x] LPG
[x] Other HNS.
[x] Bulk sol
|
ids
48 In addition, the separate accounts could be suspended if the total unpaid contributions to that account exceed 10% of the most recent levy to that account.
| 22,554
|
inside_word
|
solids
|
remove_all
|
<url>
http://www.imo.org/en/OurWork/Legal/Documents/HNS%20Overview.pdf
</url>
<text>
AN OVERVIEW OF THE INTERNATIONAL CONVENTION ON LIABILITY AND COMPENSATION FOR DAMAGE IN CONNECTION WITH THE CARRIAGE OF HAZARDOUS AND NOXIOUS SUBSTANCES BY SEA, 2010 (THE 2010 HNS CONVENTION)
Explanatory note
1 The original Overview of the HNS Convention, 1996 was approved by the Legal Committee of IMO at its eighty-fourth session, held in April 2002. In 2010, an International Conference adopted a Protocol to the 1996 Convention, which was designed to address the practical problems that had been perceived to prevent many States from ratifying the Convention. This Overview is a revision of the original document, taking into account changes introduced by the 2010 Protocol.
2 Together, these treaties constitute the 2010 HNS Convention. This Overview offers straightforward but fundamental information on the key issues that fall within the scope of the 2010 HNS Convention. It should also provide a useful basis from which to answer any queries from interested parties while explaining the broad effects of the Convention as well as its purpose. The Overview is merely explanatory and therefore does not contain any recommendation to be considered a source of any legal obligation regarding the implementation of the 2010 HNS Convention.
3 The Overview is consistent with resolution A.932(22) adopted by the IMO Assembly at its twenty-second session, which, inter alia, urged States to place a high priority on working towards the Convention's implementation and resolving any practical difficulties in setting up the new regime, with the aim of ratification, acceptance and approval of, or accession to, the 2010 HNS Convention. It also responds to resolution 4 of the 2010 International Conference, which calls for revision of the original Overview to take account of the 2010 Protocol.
Main reasons for the changes introduced into the 1996 Convention by the 2010 Protocol
4 It may be an aid to the understanding of the 2010 HNS Convention to explain briefly the underlying causes inhibiting the entry into force of the HNS Convention, 1996 and the solutions adopted in the 2010 Protocol, namely:
(i) the heavy burden on States of having to report the vast range of packaged substances received by them. The remedy adopted was to differentiate between bulk and packaged HNS goods by excluding packaged goods from the definition of contributing cargo, and exempting receiving States from the obligation to make contributions to the HNS Fund for them. Nevertheless, damage caused by packaged goods remains covered under the compulsory insurance of the shipowner, and any excess is met from the HNS Fund. In order to maintain the two-tier system, in view of the exclusion from contributions to the Fund, the shipowner's limitation amount for carrying packaged goods was also increased;
(ii) in the case of Liquefied natural gas (LNG) cargoes, the HNS Convention, 1996 provided that the person responsible for making contributions should be the titleholder, who may, however, not be subject to the jurisdiction of a State Party, and the contributions may not, therefore, always be recoverable. The Protocol now shifts responsibility for payment to the receiver, unless the titleholder has agreed to assume that responsibility; and
(iii) non-submission of contributing cargo reports, on ratification of the HNS Convention, 1996 and annually thereafter, was also a serious obstacle. The solution was to require States to submit reports on contributing cargo as a condition of becoming Contracting States to the Convention, and thereafter to submit reports annually, in default of which they will be temporarily suspended from being Contracting States. States Parties failing to submit annual reports, after the entry into force of the Convention, will be unable to claim compensation until their reports are brought up to date. The only exception will be claims for deaths and personal injury.
Introduction to the 2010 HNS Convention
5 Compensation for damage caused by the carriage by sea of hazardous and noxious substances (HNS) is regulated by the 2010 HNS Convention.
6 The regime established by the 2010 HNS Convention is largely modelled on the existing regime for oil pollution from tankers set up under the International Convention on Civil Liability for Oil Pollution Damage, 1992 (CLC) and the International Convention on the Establishment of an International Fund for Compensation for Oil Pollution Damage, 1992 (Fund Convention), which covers pollution damage caused by spills of persistent oil from tankers.
7 The HNS regime is governed by the 2010 HNS Convention, the purpose of which is to provide adequate, prompt and effective compensation for loss or damage to persons, property and the environment arising from the carriage of HNS by sea. The Convention covers both pollution damage and damage caused by other risks, e.g. fire and explosion.
8 Under the 2010 HNS Convention, the shipowner is liable for the loss or damage up to a certain amount, which is covered by insurance (1 st tier). A compensation fund (the HNS Fund) will provide additional compensation when the victims do not obtain full compensation from the shipowner or its insurer (2 nd tier). The HNS Fund will be funded by those companies and other entities which receive HNS after sea transport in a Member State in excess of the thresholds laid down in the Convention.
Scope of application
9 The 2010 HNS Convention covers any damage caused by HNS in the territory or territorial sea of a State Party to the Convention. It also covers pollution damage in the exclusive economic zone, or equivalent area, of a State Party and damage (other than pollution damage) caused by HNS carried on board ships registered in, or entitled to fly, the flag of a State Party outside the territory or territorial sea of any State. The costs of preventive measures, i.e. measures to prevent or minimize damage, are also covered wherever taken.
10 The 2010 HNS Convention does not cover damage caused during the transport of HNS to or from a ship. Cover starts from the time when the HNS enter the ship's equipment or pass its rail, on loading, and the cover ends when the HNS cease to be present in any part of the ship's equipment or pass its rail on discharge.
11 The 2010 HNS Convention covers incidents involving the carriage of HNS by sea by any sea-going craft of any type whatsoever, except warships and other ships owned or operated by a State and used, for the time being, only on Government non-commercial service. The Convention allows a State to exclude from the application of the Convention, ships which do not exceed 200 gross tonnage and which carry HNS only in packaged form, and while the ships are engaged on voyages between ports of that State.
12 The 2010 HNS Convention defines the concept of HNS largely by reference to lists of individual substances that have been previously identified in a number of international Conventions and Codes designed to ensure maritime safety and prevention of pollution. The references to the codes and regulations covering these HNS substances are set out in article 1.5 of the Convention, and, with one exception, they reflect amendments made to them by IMO bodies since the HNS Convention, 1996. The exception relates to solid bulk materials possessing chemical hazards which are subject to the provisions, inter alia, of the International Maritime Dangerous Goods Code (IMDG Code) in effect in 1996, when carried in packaged form. In this respect, reference is made to IMO Circular letter No.3144, dated 6 January 2011, listing solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code and also in the IMDG Code in effect in 1996, and solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code but not in the IMDG Code in effect in 1996.
13 HNS include both bulk cargoes and packaged goods. Bulk cargoes can be solids, liquids including oils, or liquefied gases. The number of substances included is very large: the IMDG Code, for example, lists hundreds of materials which can be dangerous when shipped in packaged form. Some bulk solids such as coal and iron ore are excluded.
Damage
14 Damage includes loss of life or personal injury on board or outside the ship carrying HNS, loss of or damage to property outside the ship, loss or damage caused by contamination of the environment, loss of income in fishing and tourism, and the costs of preventive measures and further loss or damage caused by such measures. The 2010 HNS Convention defines preventive measures as any reasonable measures taken by any person after an incident has occurred to prevent or minimize damage. These include measures such as clean-up or removal of HNS from a wreck if the HNS present a hazard or pollution risk.
15 The 2010 HNS Convention does not cover pollution damage caused by persistent oil, since such damage may be covered under the existing international regime established by the 1992 CLC and Fund Convention. However, non-pollution damage caused by persistent oil, e.g. damage caused by fire or explosion, is covered by the Convention. The Convention does not apply to damage caused by radioactive material.
16 The amount available for compensation from the shipowner and the HNS Fund will be distributed among claimants in proportion to their established claims. However, claims for loss of life and personal injury have priority over other claims. Up to two thirds of the available compensation amount is reserved for such claims.
1 st tier – Liability of the shipowner
(a) Strict liability of the shipowner
17 The registered owner of the ship in question is strictly liable to pay compensation following an incident involving HNS. This means that he is liable, even in the absence of fault on his part. The fact that damage has occurred is sufficient to establish the shipowner's
liability, provided there is a causal link between the damage and the HNS carried on board the ship.
18 The shipowner is exempt from liability under the 2010 HNS Convention only if he proves that:
(a) the damage resulted from an act of war, hostilities, civil war, insurrection or a natural phenomenon of an exceptional, inevitable and irresistible character; or
(b) the damage was wholly caused by an act or omission done with the intent to cause damage by a third party; or
(c) the damage was wholly caused by the negligence or other wrongful act of any Government or other authority responsible for the maintenance of lights or other navigational aids in the exercise of that function; or
(d) the failure of the shipper or any other person to furnish information concerning the hazardous and noxious nature of the substances shipped either:
(i) has caused the damage, wholly or partly; or
(ii) has led the owner not to obtain insurance;
provided that neither the shipowner, nor his servants or agents knew, or ought reasonably to have known, of the hazardous and noxious nature of the substances shipped.
19 If the shipowner proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage, by the person who suffered the damage, or from the negligence of that person, the shipowner may be exonerated, wholly or partly, from its obligation to pay compensation to such person.
20 The 2010 HNS Convention does not impose liability on the owner of the HNS involved in the incident.
(b) Limitation of liability
21 The shipowner is normally entitled to limit his liability under the 2010 HNS Convention in respect of any one incident to an aggregate amount calculated on the basis of the units of gross tonnage (GT) of the ship, as follows:
(a) Where the damage has been caused by bulk HNS:
(i) 10 million Special Drawing Rights (SDR) 1 for a ship not exceeding 2,000 GT; and
(ii) for a ship in excess of 2000 GT, 10 million SDR plus; for each unit of tonnage from 2,001 to 50,000 GT, 1500 SDR; and for each unit of tonnage in excess of 50,000 GT, 360 SDR;
1 The Special Drawing Rights is a monetary unit established by the International Monetary Fund (IMF); as at 30 December 2010, 1 SDR = £0.997755 or US$1.54003.
provided, however, that this aggregate amount shall not in any event exceed 100 million SDR.
(b) Where the damage has been caused by packaged HNS, or where the damage has been caused by both bulk HNS and packaged HNS, or where it is not possible to determine whether the damage originating from that ship has been caused by bulk HNS or by packaged HNS:
(i) 11.5 million SDR for a ship not exceeding 2,000 GT; and
(ii) for a ship with a tonnage in excess thereof, the following amount in addition to that mentioned in (i):
for each unit of tonnage from 2,001 to 50,000 GT, 1,725 SDR; and for each unit of tonnage in excess of 50,000 GT, 414 SDR;
provided, however, that this aggregate amount shall not in any event exceed 115 million SDR.
22 The shipowner will be denied the right to limitation of liability if it is proved that the damage resulted from his personal act or omission committed either, with intent to cause damage, or recklessly and with knowledge that damage would probably result.
(c) Channelling of liability
23 As set out above, the registered shipowner is liable for pollution damage under the 2010 HNS Convention. Unless the damage resulted from their personal act or omission committed with intent to cause such damage, or recklessly and with knowledge that such damage would probably result, no claim for compensation may be made against the following persons:
(a) the servants or agents of the shipowner or members of the crew;
(b) the pilot or any other person who, without being a member of the crew, performs services for the ship;
(c) any charterer (including a bareboat charterer), manager or operator of the ship;
(d) any person performing salvage operations with the consent of the owner or on the instructions of a competent public authority;
(e) any person taking preventive measures; and
(f) all servants or agents of persons mentioned in (c), (d) and (e).
(d) Compulsory insurance
24 The owner of a ship that carries HNS is required to take out insurance, or maintain other acceptable financial security, to cover his liability under the 2010 HNS Convention.
25 The 2010 HNS Convention requires shipowners to provide evidence of insurance cover upon the ship's entry into port of any State which is party to the Convention, by production of a certificate, regardless of whether the State of the ship's registry is party to the Convention. The certificates will be issued by the State of the ship's register or, if that State is not party to the Convention, by a State Party. States Parties are required to accept any certificate issued by any other State Party.
26 Claims for compensation may be brought directly against the insurer or person providing financial security.
2 nd tier – HNS Fund
27 The HNS Fund will pay compensation when the total admissible claims exceed the shipowner's liability, i.e. the Fund pays "top up" compensation when the shipowner, or his insurer, cannot meet in full the loss or damage arising from an incident.
28 The HNS Fund also pays compensation in the following cases:
* the shipowner is exonerated from liability; or
* the shipowner liable for the damage is financially incapable of meeting his obligations.
29 To claim against the HNS Fund, the 2010 HNS Convention requires claimants to prove that there is a reasonable probability that the damage resulted from an incident involving one or more ships. The HNS Fund may, in such cases, be liable to pay compensation, even if the particular ship causing the damage cannot be identified.
30 The HNS Fund is also not liable to pay compensation if the damage was caused by an act of war, hostilities, etc., or by HNS discharged from a warship or other ship owned or operated by a State and used for the time being, only on Government non-commercial service.
31 If the HNS Fund proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage by the person who suffered the damage or from the negligence of that person, the HNS Fund may be exonerated, wholly or partly, from its obligation to pay compensation to such person. However, there shall be no such exoneration of the HNS Fund with regard to preventive measures.
Limit of compensation by the HNS Fund
32 The maximum amount payable by the HNS Fund in respect of any single incident is 250 million SDR, including the sum paid by the shipowner or his insurer. The 2010 HNS Convention also provides a simplified procedure to increase the maximum amount of compensation payable under the Convention in the future.
33 If the total amount of the admissible claims does not exceed the maximum amount available for compensation, then all claims will be paid in full. Otherwise the payments will have to be prorated, i.e. all claimants will receive an equal proportion of their admissible claims.
Shipowners' liability and Fund limit laid down in the HNS Convention
Financing of the HNS Fund
(a) Contributions to the HNS Fund
34 Compensation payments made by the HNS Fund will be financed by contributions levied on persons who have received, in a calendar year, contributing cargoes after sea transport in a Member State, in quantities above the thresholds laid down in the 2010 HNS Convention. For each contributor, the levies will be in proportion to the quantities of HNS received by that person each year.
35 For the purpose of the contribution system, not only imported cargoes, but also cargoes received after sea transport between ports in the same State are taken into account. In this respect, contributing cargo means bulk HNS. However, cargo is not considered to be contributing cargo so long as it is in transit. That is, provided that the cargo is not imported, consumed or transformed, transhipment does not lead to a requirement for the payment of a contribution to the HNS Fund.
36 The contributions to finance the HNS Fund's compensation payments will be made post-event, i.e. levies will only be due after an incident involving the HNS Fund occurs. Levies may be spread over several years in the case of a major incident.
37 The 2010 HNS Convention allows a person who physically receives HNS on behalf of a third party, e.g., a storage company, to designate that third party as the receiver for the purposes of the Convention. Both the person who physically receives the contributing cargo in a port or terminal, and the designated third party must be subject to the jurisdiction of a State Party.
38 For LNG, annual contributions shall be made by the receiver, or by the titleholder, if it has agreed with the receiver to do so, but, if the titleholder defaults in any payments, liability reverts to the receiver.
39 States are allowed to establish their own definition of "receiver" under national law. Such a definition must, however, result in the total quantity of contributing cargo received in the State in question being substantially the same as if the definition in the Convention had been applied. This allows States flexibility to implement the Convention in conjunction with existing national law, without giving any State the possibility of obtaining an unfair commercial advantage.
40 States Parties are required to inform the Director of the HNS Fund of the name and address of receivers of quantities of contributing cargo exceeding the thresholds during the preceding year, together with the quantities of cargo received by each of them. No compensation is payable by the HNS Fund until these reporting obligations have been fulfilled, except for death and personal injury. Contributing cargo is limited to bulk HNS, in contrast to the situation prior to adoption of the 2010 Protocol, when such cargo included packaged HNS goods. Nevertheless, damage caused by packaged goods remains covered under the shipowner's compulsory insurance, with any excess being met from the HNS Fund.
41 States are liable for any financial losses incurred by the HNS Fund as a result of the non-submission of reports. States also have the option of developing national regimes for the collection of contributions in respect of receipts of cargoes carried in domestic traffic (i.e. the trade by sea from one port or terminal to another within the same State).
42 When consenting to be bound by the 2010 HNS Protocol, and thereby the 2010 HNS Convention, and annually thereafter until the Protocol enters into force for a given State, Contracting States are obliged to submit information to IMO on contributing cargoes received. This will enable the Secretary-General of IMO to determine the date of the entry into force of the 2010 HNS Convention. A State that defaults in these reporting obligations shall be temporarily suspended from being a Contracting State, until it has submitted the required data. A State failing to submit annual reports after the entry into force of the Convention, will be unable to claim compensation until it has submitted the required data, except for claims for death and personal injury.
43 States which decide to become Parties to the 2010 HNS Protocol should ensure that they deposit instruments only in respect of the Protocol, without any references to the HNS Convention, 1996.
(b) HNS Fund accounts
44 The HNS Fund, when fully operational, will have four accounts:
* Oil
* Liquefied Petroleum Gas (LPG)
* Liquefied Natural Gas (LNG)
* A general account with two sectors:
[x] Other HNS.
[x] Bulk solids
45 Each account will meet the cost of compensation payments arising from damage caused by substances contributing to that account, i.e. there will be no cross-subsidization.
46 Each separate account will only come into operation when the total quantity of contributing cargo received in Member States during the preceding year, or any such year as the HNS Assembly decides, exceeds the following levels:
* 350 million tonnes for the oil account
* 15 million tonnes for the LPG account.
* 20 million tonnes for the LNG account
47 However, during the early existence of the HNS Fund, there may not be sufficient contribution basis in the form of the quantities of HNS received in Member States to set up all the four separate accounts. Initially, the separate accounts may be postponed and the HNS Fund may, therefore, have only two accounts:
* one separate account for oil
[x] LNG
* one general account including four sectors:
[x] LPG
[x] Other HNS.
[x] Bulk sol<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.imo.org/en/OurWork/Legal/Documents/HNS%20Overview.pdf\n</url>\n<text>\nAN OVERVIEW OF THE INTERNATIONAL CONVENTION ON LIABILITY AND COMPENSATION FOR DAMAGE IN CONNECTION WITH THE CARRIAGE OF HAZARDOUS AND NOXIOUS SUBSTANCES BY SEA, 2010 (THE 2010 HNS CONVENTION)\n\nExplanatory note\n\n1 The original Overview of the HNS Convention, 1996 was approved by the Legal Committee of IMO at its eighty-fourth session, held in April 2002. In 2010, an International Conference adopted a Protocol to the 1996 Convention, which was designed to address the practical problems that had been perceived to prevent many States from ratifying the Convention. This Overview is a revision of the original document, taking into account changes introduced by the 2010 Protocol.\n\n2 Together, these treaties constitute the 2010 HNS Convention. This Overview offers straightforward but fundamental information on the key issues that fall within the scope of the 2010 HNS Convention. It should also provide a useful basis from which to answer any queries from interested parties while explaining the broad effects of the Convention as well as its purpose. The Overview is merely explanatory and therefore does not contain any recommendation to be considered a source of any legal obligation regarding the implementation of the 2010 HNS Convention.\n3 The Overview is consistent with resolution A.932(22) adopted by the IMO Assembly at its twenty-second session, which, inter alia, urged States to place a high priority on working towards the Convention's implementation and resolving any practical difficulties in setting up the new regime, with the aim of ratification, acceptance and approval of, or accession to, the 2010 HNS Convention. It also responds to resolution 4 of the 2010 International Conference, which calls for revision of the original Overview to take account of the 2010 Protocol.\n\nMain reasons for the changes introduced into the 1996 Convention by the 2010 Protocol\n\n4 It may be an aid to the understanding of the 2010 HNS Convention to explain briefly the underlying causes inhibiting the entry into force of the HNS Convention, 1996 and the solutions adopted in the 2010 Protocol, namely:\n(i) the heavy burden on States of having to report the vast range of packaged substances received by them. The remedy adopted was to differentiate between bulk and packaged HNS goods by excluding packaged goods from the definition of contributing cargo, and exempting receiving States from the obligation to make contributions to the HNS Fund for them. Nevertheless, damage caused by packaged goods remains covered under the compulsory insurance of the shipowner, and any excess is met from the HNS Fund. In order to maintain the two-tier system, in view of the exclusion from contributions to the Fund, the shipowner's limitation amount for carrying packaged goods was also increased;\n(ii) in the case of Liquefied natural gas (LNG) cargoes, the HNS Convention, 1996 provided that the person responsible for making contributions should be the titleholder, who may, however, not be subject to the jurisdiction of a State Party, and the contributions may not, therefore, always be recoverable. The Protocol now shifts responsibility for payment to the receiver, unless the titleholder has agreed to assume that responsibility; and\n\n(iii) non-submission of contributing cargo reports, on ratification of the HNS Convention, 1996 and annually thereafter, was also a serious obstacle. The solution was to require States to submit reports on contributing cargo as a condition of becoming Contracting States to the Convention, and thereafter to submit reports annually, in default of which they will be temporarily suspended from being Contracting States. States Parties failing to submit annual reports, after the entry into force of the Convention, will be unable to claim compensation until their reports are brought up to date. The only exception will be claims for deaths and personal injury.\n\nIntroduction to the 2010 HNS Convention\n\n5 Compensation for damage caused by the carriage by sea of hazardous and noxious substances (HNS) is regulated by the 2010 HNS Convention.\n6 The regime established by the 2010 HNS Convention is largely modelled on the existing regime for oil pollution from tankers set up under the International Convention on Civil Liability for Oil Pollution Damage, 1992 (CLC) and the International Convention on the Establishment of an International Fund for Compensation for Oil Pollution Damage, 1992 (Fund Convention), which covers pollution damage caused by spills of persistent oil from tankers.\n7 The HNS regime is governed by the 2010 HNS Convention, the purpose of which is to provide adequate, prompt and effective compensation for loss or damage to persons, property and the environment arising from the carriage of HNS by sea. The Convention covers both pollution damage and damage caused by other risks, e.g. fire and explosion.\n8 Under the 2010 HNS Convention, the shipowner is liable for the loss or damage up to a certain amount, which is covered by insurance (1 st tier). A compensation fund (the HNS Fund) will provide additional compensation when the victims do not obtain full compensation from the shipowner or its insurer (2 nd tier). The HNS Fund will be funded by those companies and other entities which receive HNS after sea transport in a Member State in excess of the thresholds laid down in the Convention.\n\nScope of application\n\n9 The 2010 HNS Convention covers any damage caused by HNS in the territory or territorial sea of a State Party to the Convention. It also covers pollution damage in the exclusive economic zone, or equivalent area, of a State Party and damage (other than pollution damage) caused by HNS carried on board ships registered in, or entitled to fly, the flag of a State Party outside the territory or territorial sea of any State. The costs of preventive measures, i.e. measures to prevent or minimize damage, are also covered wherever taken.\n10 The 2010 HNS Convention does not cover damage caused during the transport of HNS to or from a ship. Cover starts from the time when the HNS enter the ship's equipment or pass its rail, on loading, and the cover ends when the HNS cease to be present in any part of the ship's equipment or pass its rail on discharge.\n\n11 The 2010 HNS Convention covers incidents involving the carriage of HNS by sea by any sea-going craft of any type whatsoever, except warships and other ships owned or operated by a State and used, for the time being, only on Government non-commercial service. The Convention allows a State to exclude from the application of the Convention, ships which do not exceed 200 gross tonnage and which carry HNS only in packaged form, and while the ships are engaged on voyages between ports of that State.\n12 The 2010 HNS Convention defines the concept of HNS largely by reference to lists of individual substances that have been previously identified in a number of international Conventions and Codes designed to ensure maritime safety and prevention of pollution. The references to the codes and regulations covering these HNS substances are set out in article 1.5 of the Convention, and, with one exception, they reflect amendments made to them by IMO bodies since the HNS Convention, 1996. The exception relates to solid bulk materials possessing chemical hazards which are subject to the provisions, inter alia, of the International Maritime Dangerous Goods Code (IMDG Code) in effect in 1996, when carried in packaged form. In this respect, reference is made to IMO Circular letter No.3144, dated 6 January 2011, listing solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code and also in the IMDG Code in effect in 1996, and solid bulk materials possessing chemical hazards mentioned by name in the IMSBC Code but not in the IMDG Code in effect in 1996.\n13 HNS include both bulk cargoes and packaged goods. Bulk cargoes can be solids, liquids including oils, or liquefied gases. The number of substances included is very large: the IMDG Code, for example, lists hundreds of materials which can be dangerous when shipped in packaged form. Some bulk solids such as coal and iron ore are excluded.\n\nDamage\n\n14 Damage includes loss of life or personal injury on board or outside the ship carrying HNS, loss of or damage to property outside the ship, loss or damage caused by contamination of the environment, loss of income in fishing and tourism, and the costs of preventive measures and further loss or damage caused by such measures. The 2010 HNS Convention defines preventive measures as any reasonable measures taken by any person after an incident has occurred to prevent or minimize damage. These include measures such as clean-up or removal of HNS from a wreck if the HNS present a hazard or pollution risk.\n15 The 2010 HNS Convention does not cover pollution damage caused by persistent oil, since such damage may be covered under the existing international regime established by the 1992 CLC and Fund Convention. However, non-pollution damage caused by persistent oil, e.g. damage caused by fire or explosion, is covered by the Convention. The Convention does not apply to damage caused by radioactive material.\n16 The amount available for compensation from the shipowner and the HNS Fund will be distributed among claimants in proportion to their established claims. However, claims for loss of life and personal injury have priority over other claims. Up to two thirds of the available compensation amount is reserved for such claims.\n\n1 st tier – Liability of the shipowner\n\n(a) Strict liability of the shipowner\n\n17 The registered owner of the ship in question is strictly liable to pay compensation following an incident involving HNS. This means that he is liable, even in the absence of fault on his part. The fact that damage has occurred is sufficient to establish the shipowner's\n\nliability, provided there is a causal link between the damage and the HNS carried on board the ship.\n\n18 The shipowner is exempt from liability under the 2010 HNS Convention only if he proves that:\n(a) the damage resulted from an act of war, hostilities, civil war, insurrection or a natural phenomenon of an exceptional, inevitable and irresistible character; or\n(b) the damage was wholly caused by an act or omission done with the intent to cause damage by a third party; or\n(c) the damage was wholly caused by the negligence or other wrongful act of any Government or other authority responsible for the maintenance of lights or other navigational aids in the exercise of that function; or\n(d) the failure of the shipper or any other person to furnish information concerning the hazardous and noxious nature of the substances shipped either:\n(i) has caused the damage, wholly or partly; or\n(ii) has led the owner not to obtain insurance;\n\nprovided that neither the shipowner, nor his servants or agents knew, or ought reasonably to have known, of the hazardous and noxious nature of the substances shipped.\n\n19 If the shipowner proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage, by the person who suffered the damage, or from the negligence of that person, the shipowner may be exonerated, wholly or partly, from its obligation to pay compensation to such person.\n20 The 2010 HNS Convention does not impose liability on the owner of the HNS involved in the incident.\n\n(b) Limitation of liability\n\n21 The shipowner is normally entitled to limit his liability under the 2010 HNS Convention in respect of any one incident to an aggregate amount calculated on the basis of the units of gross tonnage (GT) of the ship, as follows:\n\n(a) Where the damage has been caused by bulk HNS:\n(i) 10 million Special Drawing Rights (SDR) 1 for a ship not exceeding 2,000 GT; and\n(ii) for a ship in excess of 2000 GT, 10 million SDR plus; for each unit of tonnage from 2,001 to 50,000 GT, 1500 SDR; and for each unit of tonnage in excess of 50,000 GT, 360 SDR;\n\n1 The Special Drawing Rights is a monetary unit established by the International Monetary Fund (IMF); as at 30 December 2010, 1 SDR = £0.997755 or US$1.54003.\n\nprovided, however, that this aggregate amount shall not in any event exceed 100 million SDR.\n\n(b) Where the damage has been caused by packaged HNS, or where the damage has been caused by both bulk HNS and packaged HNS, or where it is not possible to determine whether the damage originating from that ship has been caused by bulk HNS or by packaged HNS:\n(i) 11.5 million SDR for a ship not exceeding 2,000 GT; and\n(ii) for a ship with a tonnage in excess thereof, the following amount in addition to that mentioned in (i):\n\nfor each unit of tonnage from 2,001 to 50,000 GT, 1,725 SDR; and for each unit of tonnage in excess of 50,000 GT, 414 SDR;\n\nprovided, however, that this aggregate amount shall not in any event exceed 115 million SDR.\n\n22 The shipowner will be denied the right to limitation of liability if it is proved that the damage resulted from his personal act or omission committed either, with intent to cause damage, or recklessly and with knowledge that damage would probably result.\n\n(c) Channelling of liability\n\n23 As set out above, the registered shipowner is liable for pollution damage under the 2010 HNS Convention. Unless the damage resulted from their personal act or omission committed with intent to cause such damage, or recklessly and with knowledge that such damage would probably result, no claim for compensation may be made against the following persons:\n\n(a) the servants or agents of the shipowner or members of the crew;\n(b) the pilot or any other person who, without being a member of the crew, performs services for the ship;\n(c) any charterer (including a bareboat charterer), manager or operator of the ship;\n(d) any person performing salvage operations with the consent of the owner or on the instructions of a competent public authority;\n(e) any person taking preventive measures; and\n(f) all servants or agents of persons mentioned in (c), (d) and (e).\n\n(d) Compulsory insurance\n\n24 The owner of a ship that carries HNS is required to take out insurance, or maintain other acceptable financial security, to cover his liability under the 2010 HNS Convention.\n\n25 The 2010 HNS Convention requires shipowners to provide evidence of insurance cover upon the ship's entry into port of any State which is party to the Convention, by production of a certificate, regardless of whether the State of the ship's registry is party to the Convention. The certificates will be issued by the State of the ship's register or, if that State is not party to the Convention, by a State Party. States Parties are required to accept any certificate issued by any other State Party.\n26 Claims for compensation may be brought directly against the insurer or person providing financial security.\n\n2 nd tier – HNS Fund\n\n27 The HNS Fund will pay compensation when the total admissible claims exceed the shipowner's liability, i.e. the Fund pays \"top up\" compensation when the shipowner, or his insurer, cannot meet in full the loss or damage arising from an incident.\n28 The HNS Fund also pays compensation in the following cases:\n* the shipowner is exonerated from liability; or\n* the shipowner liable for the damage is financially incapable of meeting his obligations.\n29 To claim against the HNS Fund, the 2010 HNS Convention requires claimants to prove that there is a reasonable probability that the damage resulted from an incident involving one or more ships. The HNS Fund may, in such cases, be liable to pay compensation, even if the particular ship causing the damage cannot be identified.\n30 The HNS Fund is also not liable to pay compensation if the damage was caused by an act of war, hostilities, etc., or by HNS discharged from a warship or other ship owned or operated by a State and used for the time being, only on Government non-commercial service.\n31 If the HNS Fund proves that the damage resulted, wholly or partly, either from an act or omission done with intent to cause damage by the person who suffered the damage or from the negligence of that person, the HNS Fund may be exonerated, wholly or partly, from its obligation to pay compensation to such person. However, there shall be no such exoneration of the HNS Fund with regard to preventive measures.\n\nLimit of compensation by the HNS Fund\n\n32 The maximum amount payable by the HNS Fund in respect of any single incident is 250 million SDR, including the sum paid by the shipowner or his insurer. The 2010 HNS Convention also provides a simplified procedure to increase the maximum amount of compensation payable under the Convention in the future.\n33 If the total amount of the admissible claims does not exceed the maximum amount available for compensation, then all claims will be paid in full. Otherwise the payments will have to be prorated, i.e. all claimants will receive an equal proportion of their admissible claims.\n\nShipowners' liability and Fund limit laid down in the HNS Convention\n\nFinancing of the HNS Fund\n\n(a) Contributions to the HNS Fund\n\n34 Compensation payments made by the HNS Fund will be financed by contributions levied on persons who have received, in a calendar year, contributing cargoes after sea transport in a Member State, in quantities above the thresholds laid down in the 2010 HNS Convention. For each contributor, the levies will be in proportion to the quantities of HNS received by that person each year.\n35 For the purpose of the contribution system, not only imported cargoes, but also cargoes received after sea transport between ports in the same State are taken into account. In this respect, contributing cargo means bulk HNS. However, cargo is not considered to be contributing cargo so long as it is in transit. That is, provided that the cargo is not imported, consumed or transformed, transhipment does not lead to a requirement for the payment of a contribution to the HNS Fund.\n36 The contributions to finance the HNS Fund's compensation payments will be made post-event, i.e. levies will only be due after an incident involving the HNS Fund occurs. Levies may be spread over several years in the case of a major incident.\n37 The 2010 HNS Convention allows a person who physically receives HNS on behalf of a third party, e.g., a storage company, to designate that third party as the receiver for the purposes of the Convention. Both the person who physically receives the contributing cargo in a port or terminal, and the designated third party must be subject to the jurisdiction of a State Party.\n38 For LNG, annual contributions shall be made by the receiver, or by the titleholder, if it has agreed with the receiver to do so, but, if the titleholder defaults in any payments, liability reverts to the receiver.\n39 States are allowed to establish their own definition of \"receiver\" under national law. Such a definition must, however, result in the total quantity of contributing cargo received in the State in question being substantially the same as if the definition in the Convention had been applied. This allows States flexibility to implement the Convention in conjunction with existing national law, without giving any State the possibility of obtaining an unfair commercial advantage.\n40 States Parties are required to inform the Director of the HNS Fund of the name and address of receivers of quantities of contributing cargo exceeding the thresholds during the preceding year, together with the quantities of cargo received by each of them. No compensation is payable by the HNS Fund until these reporting obligations have been fulfilled, except for death and personal injury. Contributing cargo is limited to bulk HNS, in contrast to the situation prior to adoption of the 2010 Protocol, when such cargo included packaged HNS goods. Nevertheless, damage caused by packaged goods remains covered under the shipowner's compulsory insurance, with any excess being met from the HNS Fund.\n41 States are liable for any financial losses incurred by the HNS Fund as a result of the non-submission of reports. States also have the option of developing national regimes for the collection of contributions in respect of receipts of cargoes carried in domestic traffic (i.e. the trade by sea from one port or terminal to another within the same State).\n\n42 When consenting to be bound by the 2010 HNS Protocol, and thereby the 2010 HNS Convention, and annually thereafter until the Protocol enters into force for a given State, Contracting States are obliged to submit information to IMO on contributing cargoes received. This will enable the Secretary-General of IMO to determine the date of the entry into force of the 2010 HNS Convention. A State that defaults in these reporting obligations shall be temporarily suspended from being a Contracting State, until it has submitted the required data. A State failing to submit annual reports after the entry into force of the Convention, will be unable to claim compensation until it has submitted the required data, except for claims for death and personal injury.\n43 States which decide to become Parties to the 2010 HNS Protocol should ensure that they deposit instruments only in respect of the Protocol, without any references to the HNS Convention, 1996.\n\n(b) HNS Fund accounts\n\n44 The HNS Fund, when fully operational, will have four accounts:\n* Oil\n* Liquefied Petroleum Gas (LPG)\n* Liquefied Natural Gas (LNG)\n* A general account with two sectors:\n[x] Other HNS.\n[x] Bulk solids\n45 Each account will meet the cost of compensation payments arising from damage caused by substances contributing to that account, i.e. there will be no cross-subsidization.\n46 Each separate account will only come into operation when the total quantity of contributing cargo received in Member States during the preceding year, or any such year as the HNS Assembly decides, exceeds the following levels:\n* 350 million tonnes for the oil account\n* 15 million tonnes for the LPG account.\n* 20 million tonnes for the LNG account\n47 However, during the early existence of the HNS Fund, there may not be sufficient contribution basis in the form of the quantities of HNS received in Member States to set up all the four separate accounts. Initially, the separate accounts may be postponed and the HNS Fund may, therefore, have only two accounts:\n* one separate account for oil\n[x] LNG\n* one general account including four sectors:\n[x] LPG\n[x] Other HNS.\n[x] Bulk sol<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "ids\n48 In addition, the separate accounts could be suspended if the total unpaid contributions to that account exceed 10% of the most recent levy to that account.",
"role": "assistant"
}
] |
|
HOW IT FLIES
A Tundra 200 Flying Qualities Review
Ed Kolano Photos by Phil High
FLASH: Another mini-Beaver arrives in kit form from Canada. Dream Aircraft's Tundra 200 is a four-place, high-wing, taildragger/ nosedragger/floatplane with a cockpit big enough to call a cabin and plenty of volume behind the rear seats for, well, all that stuff Beaver pilots put back there. Okay, it's not that big, but it's large enough for four people's stuff.
stick pulls that arm just far enough to remove the contact.
Pulling all that stuff is a Lycoming IO-360, 200-hp engine turning a Sensenich two-blade, fixed-pitch propeller. With a 60-inch advance, the prop is a compromise between cruise- and climb-optimized.
There's a fixed step for entry. With your outside foot on the step and either hand grasping the leading edge of the door frame, it's an easy hoist onto the seat. The wide doorway and generous fore/aft seat adjustment allow a variety of entries, and none require contorted joints or result in bruises. Seat back angle is fixed, and fortunately the angle is comfortable.
Once belted in, the cockpit is roomy. A normal sitting position has your outside arm in contact with the door, but when you're doing the driving, holding the
There's a full set of controls for each pilot, and all panel controls can be easily reached by either pilot with the shoulder belt snug. The four-position flap lever lies between the seats. All the way down has the flaps reflexed 8 degrees, which netted at least 5 extra mph during this evaluation. You have to depress the button at the end of the lever to move the flaps from reflexed to zero. Increasing the deflection to 15 degrees, 25 degrees, and 40 degrees does not require the button to be pressed, but you will have to use the button to pass each detent when lowering the lever to raise the flaps. Dynamic pressure keeps the flaps from drooping past the selected deflection.
During the early part of the takeoff roll in the demonstrator, there wasn't enough air load on the flaps in their 15-degree setting, so the lever had to be held. This lasts only a few seconds, and the company has incorporated a stiffer spring in production kits to alleviate the problem.
Pitch trim is mechanical, set with a wheel protruding from
EAA Sport Aviation
39
or inconsiderate prop blast, making congested maneuvering easy and ramp-friendly.
below the center of the instrument panel. Rotating the wheel repositions a tab on the right elevator. A mechanical trim indicator is adjacent to the trim wheel.
The control sticks are shaped to allow full lateral displacement (115/8 inches stop-to-stop) without leg interference, and the foam grip seems to be right where it ought to be. Longitudinal displacement is 12 inches. The torque tube connecting the sticks for pitch is exposed in the demonstrator, and its proximity to the rudder pedals makes for awkward foot placement for the nonflying pilot. [In the final kits, this tube is now located under the cockpit floor.] Full pedal displacement puts 3-½ inches between the pedals.
A nudge of throttle starts the plane taxiing on level pavement, and even with 900 rpm, you'll need occasional brake-taps to keep the airplane at a reasonable speed. A taildragger with a big engine generally means the forward field of view is obstructed, and that's the case here. A 10-degree heading change away from your side is enough to clear the taxiway ahead, but it'll take at least 30 degrees when S-turning toward your side.
Tailwheel steering feels solid and works just fine for following the yellow line. Pivot turns take an appropriate tap on the toe brake, and bringing the now-castering tailwheel back into steering range does not require a clumsy stomp
40
AUGUST 2005
Takeoff from a 1,100-foot density altitude, paved runway takes about 12 seconds in calm wind. Using 15 degrees of flaps and holding the stick about halfway between neutral and the forward stop, the tail rises predictably as the airspeed indicator passes about 40 mph. Not forcing the tail up allows early recognition of any directional control requirements, and a few small pedal inputs keep the runway centerline stripe under the fuselage. Control forces are light throughout the takeoff, with the largest stick force being about 7 pounds of push as you wait for the tail to come up.
It appears the airplane would be happy with a variety of two-point attitudes as it accelerates, and maintaining one of them is easy. The airplane flies off from a slightly tail-low two-point attitude without additional back-stick at about 60 mph. The same trim setting for takeoff gets the airplane reasonably close to its 80 mph best rate of climb speed (VY). The company had not completed its performance testing at the time of this flight, and 80 mph is a best guess. [Flight testing showed VY to be 90 mph.]
The pitch attitude during a noflap climb is about 12 degrees nosehigh, necessitating some weaving to clear the sky ahead. Timed climbs through an average 4,160 feet den- sity altitude revealed 840 feet per minute loaded to 2,010 pounds or 540 pounds below its maximum. Center of gravity was 28 percent aft of the forward limit.
Cruising with 2450 rpm at 4,600 feet density altitude the airspeed indicator showed just over 130 mph indicated, or 140 mph true. The forward field of vision naturally improves here to 10 to 15 degrees downward over the nose. Laterally, you can see around to include about half the horizontal tail on your side and about 60 degrees behind the wing line looking cross-cockpit. The look-up through the windscreen is 30 to 40 degrees. Leaning forward to improve your look-up, which is particularly desirable when turning, doesn't offer much help if your shoulder strap is snug.
Looking out your side window, the view is almost straight down; it's about 30 degrees below horizontal looking cross-cockpit. The eyes of an average height pilot will be above the top of the side window, limiting the sideways view to approximately 5 degrees below level. Tuck your chin into your neck, and that view improves to about 5 degrees up under the wingtip.
Control Feel
The Tundra is a nice-flying airplane. Flight controls are smooth and harmonious, and have force gradients appropriate for this class of airplane. Pitch trim is, well, unusually nice. The large trim wheel allows both substantial trim changes and tiny adjustments, providing expeditious fine-tuning throughout the airspeed range without the sensitivity or insensitivity issues that sometimes accompany both electric systems and other mechanical implementations.
One to 2 pounds applied to the control stick in any direction is enough to start the plane pitching or rolling. This breakout force sounds a bit low, but no inadvertent stick inputs were noted in calm air. There's no slop in the longitudi- nal control system (zero free play), and the stick returns almost completely to its pre-displaced position upon release. This not-quite-there stick centering results in a residual hands-free pitch rate of approximately 1 degree per second. Laterally, there's also zero free play and a bit of friction that makes for a 3/8inch stick centering band, resulting in a hands-free residual roll rate of no more than 1 degree per second. So you may have to bump the stick a time or two after maneuvering to get it exactly where you want it. Rudder breakout is a light 5 to 10 pounds, and this system feels as tight as the stick.
100 mph, respectively, and 3 and 6 pounds of push to fly 140 and 150 mph. These forces are low enough for temporary off-trim flying and high enough to nail the desired offtrim airspeed without chasing it. The trim speed band, or range of airspeeds the airplane will maintain hands-free without re-trimming, is 7 mph.
The Tundra's dynamic stability characteristics are similarly well behaved. An abrupt pull or push on the stick causes the expected pitching activity without any residual wiggles—a deadbeat short period. Its long period, or phugoid, is positively damped. Pull or push the airplane off its trim speed, release the stick, and it converges back toward its trim speed with several decreasing amplitude cycles, each taking 30 seconds.
Static longitudinal stability is positive, meaning you'll have to hold the stick back to maintain an airspeed slower than the speed the plane is trimmed for and forward to increase speed. Count on 4 and 8 pounds of pull to fly 120 and
Maneuvering stability is also positive. As in the non-maneuvering case, stick force requirements increase predictably, and the airplane's response to longitudinal control inputs is probably better than you'd expect from this style of plane. A level 30-degree bank turn takes 5-6 pounds of stick pull. That increases to 8-10 pounds for 45 degrees of bank and 20 pounds for 60 degrees. These are low by general aviation standards but high enough to avoid over-controlling the airplane.
Don't expect fighter-like roll performance. That big "Hershey bar" wing provides a lot of roll damping, which in this case is a good-news/ okay-news story. The okay part is that the maximum average roll rates timed during full-stick coordinated rolls from 30 degrees of bank through 30 degrees of bank the other way are just under 60 degrees per second. The good news is the development and decay of the roll rate
EAA Sport Aviation
41
is just about perfect—short but not abrupt, so quickly capturing the desired bank angle comes easily.
Dihedral effect is positive. Step on a pedal, and the plane yaws and rolls in the direction of the applied pedal. Spiral stability—the airplane's rolling tendency when established in a bank angle—is essentially neutral, meaning you don't have to apply any lateral stick for the airplane to maintain its bank angle.
For roll rates typical during cruise flight, expect to use 7 or 8 pounds of stick force. Yank and bank if you like, but the Tundra shines doing what it was designed to do. Pack the camping gear and the family and go someplace in a smooth, comfortable airplane.
3-4 pound stick pull is necessary to maintain the 130 mph speed. If a level deceleration is the goal, ease in about 5 pounds of back-stick over the 5 seconds it takes to go from 130 mph to the 100 mph maximum speed for 15 degrees of flaps. A level acceleration requires an initial 4-5 pounds of stick push after applying full throttle. Hold that condition, and the airplane tops out at an indicated 148 mph. Never exceed speed (VNE) is 162 mph.
Power effects on pitch control fall into that same predictable and benign category as the rest of the airplane's responses. Pull the throttle to idle from its cruise setting and the nose drops 10 degrees or so and the plane accelerates slightly. A light,
Non-Stalls
Idle stalls are ho-hum affairs with the test-day loading. With the trim set for the 130 mph cruise condition, the stick pull force reaches a hefty 25-30 pounds at the aft stop.
Power
Max. take off weight
loading
75% power
@ 1500'
Stall speed
Endurance
Range
42
AUGUST 2005
15.25 lbs/pt2
14.2 lbs/bhp
That's about the one-hand limit most people find tolerable in a short duration. The airplane just nibbles at the stall with the stick in your lap. The airspeed needle points to 45 mph here, with the plane's nose a couple of degrees above the horizon. There's no pitch break, only a gentle wing-rock that rarely exceeds 10 degrees of bank in both directions. The vertical speed indicator displays a solid 800 fpm descent, and that's about it. Ailerons and rudder remain effective, although adverse yaw is pronounced. Relax the stick for the recovery. You can firewall the throttle and keep a light pull on the stick to minimize the altitude lost.
acter. But if you could have only one, what would you rather have— no warning with a benign stall or plenty of warning with a real attention-getter?
Flap speeds used for this evaluation were 100 mph for 15 degrees and 80 mph for 25 and 40 degrees. From a level-flight trimmed condition at 100 mph, pulling the flap lever from its reflexed cruise position to its 15-degree position pro- duces little pitch change. Going from 15 degrees to 25, and then 40 at 80 mph shows more pitching moment changes. Control stick force doesn't exceed 5 pounds while the airplane slows in level flight— that's easily managed with one hand while working the trim wheel with the other.
Slow-Speed Flying
Level flight at a final approach speed
Having now painted a seemingly harmless stall character, let's keep a couple of mitigators in mind. First there is no natural stall warning. No airframe buffet, warning horn, propeller percussion, significant changes in pitch attitude or wind noise—not much to cue the pilot to an approaching stall. There is the ponderously high stick force when trimmed for cruise speed, but this won't be as significant for the pilot who trims for a slower speed. There's also the insidious nature of the gently falling leaf that invites inattention to altitude.
Finally, loading the airplane to a center of gravity further aft than it was for this test should increase the elevator's effectiveness, perhaps enough to truly stall the wing instead of merely getting close to its stall angle of attack. The company says stalls at the aft center of gravity limit produce the same gentle falling leaf character, but we were unable to test that.
The final take on stalls brings us back to the glass being half-full. Recovery using only elevator is simply a matter of relaxing the backstick slightly. A normal recovery using full power turns the 800 fpm descent into a climb in less than 50 feet. Ideally, every airplane would exhibit clear stall warning and a well-defined but benign stall char-
EAA Sport Aviation
43
of 65 mph and 4,200 feet density altitude takes 1950 rpm. Control forces are lighter all around, but most noticeably in roll. Airplane responses are more sluggish at this slower airspeed, so larger displacements are required.
The airplane can still be trimmed expeditiously, but there was a peculiarity with the trim system under these conditions. When we trimmed for 65 mph in level flight, then performed a couple of climbing/ descending turns, and returned to straight and level flight at 65 mph, we found the airplane was no longer in trim. It took a couple of pounds of stick force, either fore or aft, to hold 65 mph. Despite the trim migration, the airplane remained easy to fly under landing pattern conditions. The company has since discovered an off-center bell crank in the trim system and reports that an adjustment solved the problem.
Rudder coordination is necessary to prevent substantial adverse yaw, but pedal forces are low, and accurate heading captures require no special skill. Roll rate is noticeably slower. Using full lateral stick and full rudder, timed average roll rates during 30-degree to 300-degree bank reversals were 25 degrees per second. Once established in a bank angle, the airplane maintains that angle, just as it does under cruise conditions, indicating neutral spiral stability. The pull force needed for a level, 30-degree bank turn is 34 pounds.
Although control breakout forces aren't much different from the cruise case, the lateral control stick centering band is larger. The stick returns only to within 1-1/2 inches of its pre-displaced position, leaving the airplane with a hands-free roll rate up to 5 degrees per second. The centering band and residual pitch rate in the pitch axis are about the same as the cruise situation. Neither of these imperfections consciously affects the way you fly the plane or the precision you can achieve.
Large power changes produce
44
AUGUST 2005
expected results. Chop the throttle to idle, and the draggy nature of this configuration bleeds the speed below 50 mph in 5 seconds or so, requiring a stick pull in the 12-15 pound range to hold altitude. Selecting maximum power from a level, 65 mph condition causes the nose to rise. It'll take 8-10 pounds of push to maintain the 65 mph during the resulting climb.
Dutch roll, that yaw/roll oscillation that occurs when a sideslip is introduced, is slightly more yaw than roll. Alternately depressing and releasing the pedals gets one or two swings of the plane's nose. P-factor is obvious during this exercise, with the airplane pitching slightly nose-up when a left sideslip is introduced. A large, uncoordinated aileron deflection will also initiate the Dutch roll response of a couple of mostly yaw oscillations sufficient to foil a precise heading capture. Normal rudder coordination restores roll-out accuracy.
The Tundra looks like an airplane you'd see in a hard slip during an over-the-trees approach in one of those brochure-inspiring landing sites. Although fun to perform, a full-pedal slip only increases the descent rate by about 300 fpm. Fullpedal slips generate no more than 10-12 degrees of sideslip with the airplane 8-10 degrees wing-down in the sideslip direction. Control forces are low: 25-35 pounds on the pedal, 3-4 pounds of lateral stick, and about 5 pounds of stick pull for right sideslips and the same in the push direction for left sideslips.
Idle stalls with full flaps and the airplane trimmed for 65 mph in lev- el flight are pretty much a duplicate of the clean stalls. Stick force with the stick all the way back is an estimated 30 pounds, and the stabilized rate of descent is 750 fpm with the airspeed needle between 40 and 45 mph. Alternating wing-drops of 10 degrees or less occur 1-2 seconds apart, and the plane's nose is near the horizon. Recovering with full power turns the plane around in less than 50 feet even without retracting the flaps. It'll take 8-10 pounds of stick push to hold 65 mph for the initial full-power climb-out. Turning stalls are virtually the same.
You'll have to keep the airspeed indicator in your scan all the way around the landing pattern, because stick force cues due to a change in airspeed are minimal. The view over the nose is good until halfway through the round-out for a threepoint landing, when the nose slides up to erase the runway. Even with that broad cowl, maintaining runway centerline takes only normal tailwheel landing visual technique.
Manage your power all the way through the flare, or start with some extra airspeed, because once you pull the throttle to idle it doesn't take long for the energy to bleed off, even with only 25 degrees of flaps. Despite the elevator-limited stall situation, there's plenty of elevator authority to establish a three-point landing attitude. Control forces are low throughout the landing, and directional control on the runway is what you'd expect from an airplane of this design. You'll need to use your feet, but you won't have to stop chewing your gum. Tailwheel steering picks up when rudder effectiveness fades.
The Tundra probably looks more like a tool than a toy to some, but that characterization would deprive those "some" of the airplane's recreational potential. Whether it's working for a living, flying for flying's sake, or transporting you on an odyssey to find that brochure locale, Dream Aircraft's Tundra has a lot to offer.
|
<urn:uuid:ad45746d-eac7-41f7-9c74-65b30e8cb073>
|
CC-MAIN-2024-10
|
https://www.dreamaircraft.com/site/download_file.php?id=32
|
2024-02-22T09:07:55+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00089-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 754,431,358
| 4,187
|
eng_Latn
|
eng_Latn
| 0.998392
|
eng_Latn
| 0.998436
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2296,
7462,
9370,
11079,
13758,
19175
] |
HOW IT FLIES
A Tundra 200 Flying Qualities Review
Ed Kolano Photos by Phil High
FLASH: Another mini-Beaver arrives in kit form from Canada. Dream Aircraft's Tundra 200 is a four-place, high-wing, taildragger/ nosedragger/floatplane with a cockpit big enough to call a cabin and plenty of volume behind the rear seats for, well, all that stuff Beaver pilots put back there. Okay, it's not that big, but it's large enough for four people's stuff.
stick pulls that arm just far enough to remove the contact.
Pulling all that stuff is a Lycoming IO-360, 200-hp engine turning a Sensenich two-blade, fixed-pitch propeller. With a 60-inch advance, the prop is a compromise between cruise- and climb-optimized.
There's a fixed step for entry. With your outside foot on the step and either hand grasping the leading edge of the door frame, it's an easy hoist onto the seat. The wide doorway and generous fore/aft seat adjustment allow a variety of entries, and none require contorted joints or result in bruises. Seat back angle is fixed, and fortunately the angle is comfortable.
Once belted in, the cockpit is roomy. A normal sitting position has your outside arm in contact with the door, but when you're doing the driving, holding the
There's a full set of controls for each pilot, and all panel controls can be easily reached by either pilot with the shoulder belt snug. The four-position flap lever lies between the seats. All the way down has the flaps reflexed 8 degrees, which netted at least 5 extra mph during this evaluation. You have to depress the button at the end of the lever to move the flaps from reflexed to zero. Increasing the deflection to 15 degrees, 25 degrees, and 40 degrees does not require the button to be pressed, but you will have to use the button to pass each detent when lowering the lever to raise the flaps. Dynamic pressure keeps the flaps from drooping past the selected deflection.
During the early part of the takeoff roll in the demonstrator, there wasn't enough air load on the flaps in their 15-degree setting, so the lever had to be held. This lasts only a few seconds, and the company has incorporated a stiffer spring in production kits to alleviate the problem.
Pitch trim is mechanical, set with a wheel protruding from
EAA Sport Aviation
39
or inconsiderate prop blast, making congested maneuvering easy and ramp-friendly.
below the center of the instrument panel. Rotating the wheel repositions a tab on the right elevator. A mechanical trim indicator is adjacent to the trim wheel.
The control sticks are shaped to allow full lateral displacement (115/8 inches stop-to-stop) without leg interference, and the foam grip seems to be right where it ought to be. Longitudinal displacement is 12 inches. The torque tube connecting the sticks for pitch is exposed in the demonstrator, and its proximity to the rudder pedals makes for awkward foot placement for the nonflying pilot. [In the final kits, this tube is now located under the cockpit floor.] Full pedal displacement puts 3-½ inches between the pedals.
A nudge of throttle starts the plane taxiing on level pavement, and even with 900 rpm, you'll need occasional brake-taps to keep the airplane at a reasonable speed. A taildragger with a big engine generally means the forward field of view is obstructed, and that's the case here. A 10-degree heading change away from your side is enough to clear the taxiway ahead, but it'll take at least 30 degrees when S-turning toward your side.
Tailwheel steering feels solid and works just fine for following the yellow line. Pivot turns take an appropriate tap on the toe brake, and bringing the now-castering tailwheel back into steering range does not require a clumsy stomp
40
AUGUST 2005
Takeoff from a 1,100-foot density altitude, paved runway takes about 12 seconds in calm wind. Using 15 degrees of flaps and holding the stick about halfway between neutral and the forward stop, the tail rises predictably as the airspeed indicator passes about 40 mph. Not forcing the tail up allows early recognition of any directional control requirements, and a few small pedal inputs keep the runway centerline stripe under the fuselage. Control forces are light throughout the takeoff, with the largest stick force being about 7 pounds of push as you wait for the tail to come up.
It appears the airplane would be happy with a variety of two-point attitudes as it accelerates, and maintaining one of them is easy. The airplane flies off from a slightly tail-low two-point attitude without additional back-stick at about 60 mph. The same trim setting for takeoff gets the airplane reasonably close to its 80 mph best rate of climb speed (VY). The company had not completed its performance testing at the time of this flight, and 80 mph is a best guess. [Flight testing showed VY to be 90 mph.]
The pitch attitude during a noflap climb is about 12 degrees nosehigh, necessitating some weaving to clear the sky ahead. Timed climbs through an average 4,160 feet den- sity altitude revealed 840 feet per minute loaded to 2,010 pounds or 540 pounds below its maximum. Center of gravity was 28 percent aft of the forward limit.
Cruising with 2450 rpm at 4,600 feet density altitude the airspeed indicator showed just over 130 mph indicated, or 140 mph true. The forward field of vision naturally improves here to 10 to 15 degrees downward over the nose. Laterally, you can see around to include about half the horizontal tail on your side and about 60 degrees behind the wing line looking cross-cockpit. The look-up through the windscreen is 30 to 40 degrees. Leaning forward to improve your look-up, which is particularly desirable when turning, doesn't offer much help if your shoulder strap is snug.
Looking out your side window, the view is almost straight down; it's about 30 degrees below horizontal looking cross-cockpit. The eyes of an average height pilot will be above the top of the side window, limiting the sideways view to approximately 5 degrees below level. Tuck your chin into your neck, and that view improves to about 5 degrees up under the wingtip.
Control Feel
The Tundra is a nice-flying airplane. Flight controls are smooth and harmonious, and have force gradients appropriate for this class of airplane. Pitch trim is, well, unusually nice. The large trim wheel allows both substantial trim changes and tiny adjustments, providing expeditious fine-tuning throughout the airspeed range without the sensitivity or insensitivity issues that sometimes accompany both electric systems and other mechanical implementations.
One to 2 pounds applied to the control stick in any direction is enough to start the plane pitching or rolling. This breakout force sounds a bit low, but no inadvertent stick inputs were noted in calm air. There's no slop in the longitudi- nal control system (zero free play), and the stick returns almost completely to its pre-displaced position upon release. This not-quite-there stick centering results in a residual hands-free pitch rate of approximately 1 degree per second. Laterally, there's also zero free play and a bit of friction that makes for a 3/8inch stick centering band, resulting in a hands-free residual roll rate of no more than 1 degree per second. So you may have to bump the stick a time or two after maneuvering to get it exactly where you want it. Rudder breakout is a light 5 to 10 pounds, and this system feels as tight as the stick.
100 mph, respectively, and 3 and 6 pounds of push to fly 140 and 150 mph. These forces are low enough for temporary off-trim flying and high enough to nail the desired offtrim airspeed without chasing it. The trim speed band, or range of airspeeds the airplane will maintain hands-free without re-trimming, is 7 mph.
The Tundra's dynamic stability characteristics are similarly well behaved. An abrupt pull or push on the stick causes the expected pitching activity without any residual wiggles—a deadbeat short period. Its long period, or phugoid, is positively damped. Pull or push the airplane off its trim speed, release the stick, and it converges back toward its trim speed with several decreasing amplitude cycles, each taking 30 seconds.
Static longitudinal stability is positive, meaning you'll have to hold the stick back to maintain an airspeed slower than the speed the plane is trimmed for and forward to increase speed. Count on 4 and 8 pounds of pull to fly 120 and
Maneuvering stability is also positive. As in the non-maneuvering case, stick force requirements increase predictably, and the airplane's response to longitudinal control inputs is probably better than you'd expect from this style of plane. A level 30-degree bank turn takes 5-6 pounds of stick pull. That increases to 8-10 pounds for 45 degrees of bank and 20 pounds for 60 degrees. These are low by general aviation standards but high enough to avoid over-controlling the airplane.
Don't expect fighter-like roll performance. That big "Hershey bar" wing provides a lot of roll damping, which in this case is a good-news/ okay-news story. The okay part is that the maximum average roll rates timed during full-stick coordinated rolls from 30 degrees of bank through 30 degrees of bank the other way are just under 60 degrees per second. The good news is the development and decay of the roll rate
EAA Sport Aviation
41
is just about perfect—short but not abrupt, so quickly capturing the desired bank angle comes easily.
Dihedral effect is positive. Step on a pedal
|
, and the plane yaws and rolls in the direction of the applied pedal.
|
Spiral stability—the airplane's rolling tendency when established in a bank angle—is essentially neutral, meaning you don't have to apply any lateral stick for the airplane to maintain its bank angle.
For roll rates typical during cruise flight, expect to use 7 or 8 pounds of stick force. Yank and bank if you like, but the Tundra shines doing what it was designed to do. Pack the camping gear and the family and go someplace in a smooth, comfortable airplane.
3-4 pound stick pull is necessary to maintain the 130 mph speed. If a level deceleration is the goal, ease in about 5 pounds of back-stick over the 5 seconds it takes to go from 130 mph to the 100 mph maximum speed for 15 degrees of flaps. A level acceleration requires an initial 4-5 pounds of stick push after applying full throttle. Hold that condition, and the airplane tops out at an indicated 148 mph. Never exceed speed (VNE) is 162 mph.
Power effects on pitch control fall into that same predictable and benign category as the rest of the airplane's responses. Pull the throttle to idle from its cruise setting and the nose drops 10 degrees or so and the plane accelerates slightly. A light,
Non-Stalls
Idle stalls are ho-hum affairs with the test-day loading. With the trim set for the 130 mph cruise condition, the stick pull force reaches a hefty 25-30 pounds at the aft stop.
Power
Max. take off weight
loading
75% power
@ 1500'
Stall speed
Endurance
Range
42
AUGUST 2005
15.25 lbs/pt2
14.2 lbs/bhp
That's about the one-hand limit most people find tolerable in a short duration. The airplane just nibbles at the stall with the stick in your lap. The airspeed needle points to 45 mph here, with the plane's nose a couple of degrees above the horizon. There's no pitch break, only a gentle wing-rock that rarely exceeds 10 degrees of bank in both directions. The vertical speed indicator displays a solid 800 fpm descent, and that's about it. Ailerons and rudder remain effective, although adverse yaw is pronounced. Relax the stick for the recovery. You can firewall the throttle and keep a light pull on the stick to minimize the altitude lost.
acter. But if you could have only one, what would you rather have— no warning with a benign stall or plenty of warning with a real attention-getter?
Flap speeds used for this evaluation were 100 mph for 15 degrees and 80 mph for 25 and 40 degrees. From a level-flight trimmed condition at 100 mph, pulling the flap lever from its reflexed cruise position to its 15-degree position pro- duces little pitch change. Going from 15 degrees to 25, and then 40 at 80 mph shows more pitching moment changes. Control stick force doesn't exceed 5 pounds while the airplane slows in level flight— that's easily managed with one hand while working the trim wheel with the other.
Slow-Speed Flying
Level flight at a final approach speed
Having now painted a seemingly harmless stall character, let's keep a couple of mitigators in mind. First there is no natural stall warning. No airframe buffet, warning horn, propeller percussion, significant changes in pitch attitude or wind noise—not much to cue the pilot to an approaching stall. There is the ponderously high stick force when trimmed for cruise speed, but this won't be as significant for the pilot who trims for a slower speed. There's also the insidious nature of the gently falling leaf that invites inattention to altitude.
Finally, loading the airplane to a center of gravity further aft than it was for this test should increase the elevator's effectiveness, perhaps enough to truly stall the wing instead of merely getting close to its stall angle of attack. The company says stalls at the aft center of gravity limit produce the same gentle falling leaf character, but we were unable to test that.
The final take on stalls brings us back to the glass being half-full. Recovery using only elevator is simply a matter of relaxing the backstick slightly. A normal recovery using full power turns the 800 fpm descent into a climb in less than 50 feet. Ideally, every airplane would exhibit clear stall warning and a well-defined but benign stall char-
EAA Sport Aviation
43
of 65 mph and 4,200 feet density altitude takes 1950 rpm. Control forces are lighter all around, but most noticeably in roll. Airplane responses are more sluggish at this slower airspeed, so larger displacements are required.
The airplane can still be trimmed expeditiously, but there was a peculiarity with the trim system under these conditions. When we trimmed for 65 mph in level flight, then performed a couple of climbing/ descending turns, and returned to straight and level flight at 65 mph, we found the airplane was no longer in trim. It took a couple of pounds of stick force, either fore or aft, to hold 65 mph. Despite the trim migration, the airplane remained easy to fly under landing pattern conditions. The company has since discovered an off-center bell crank in the trim system and reports that an adjustment solved the problem.
Rudder coordination is necessary to prevent substantial adverse yaw, but pedal forces are low, and accurate heading captures require no special skill. Roll rate is noticeably slower. Using full lateral stick and full rudder, timed average roll rates during 30-degree to 300-degree bank reversals were 25 degrees per second. Once established in a bank angle, the airplane maintains that angle, just as it does under cruise conditions, indicating neutral spiral stability. The pull force needed for a level, 30-degree bank turn is 34 pounds.
Although control breakout forces aren't much different from the cruise case, the lateral control stick centering band is larger. The stick returns only to within 1-1/2 inches of its pre-displaced position, leaving the airplane with a hands-free roll rate up to 5 degrees per second. The centering band and residual pitch rate in the pitch axis are about the same as the cruise situation. Neither of these imperfections consciously affects the way you fly the plane or the precision you can achieve.
Large power changes produce
44
AUGUST 2005
expected results. Chop the throttle to idle, and the draggy nature of this configuration bleeds the speed below 50 mph in 5 seconds or so, requiring a stick pull in the 12-15 pound range to hold altitude. Selecting maximum power from a level, 65 mph condition causes the nose to rise. It'll take 8-10 pounds of push to maintain the 65 mph during the resulting climb.
Dutch roll, that yaw/roll oscillation that occurs when a sideslip is introduced, is slightly more yaw than roll. Alternately depressing and releasing the pedals gets one or two swings of the plane's nose. P-factor is obvious during this exercise, with the airplane pitching slightly nose-up when a left sideslip is introduced. A large, uncoordinated aileron deflection will also initiate the Dutch roll response of a couple of mostly yaw oscillations sufficient to foil a precise heading capture. Normal rudder coordination restores roll-out accuracy.
The Tundra looks like an airplane you'd see in a hard slip during an over-the-trees approach in one of those brochure-inspiring landing sites. Although fun to perform, a full-pedal slip only increases the descent rate by about 300 fpm. Fullpedal slips generate no more than 10-12 degrees of sideslip with the airplane 8-10 degrees wing-down in the sideslip direction. Control forces are low: 25-35 pounds on the pedal, 3-4 pounds of lateral stick, and about 5 pounds of stick pull for right sideslips and the same in the push direction for left sideslips.
Idle stalls with full flaps and the airplane trimmed for 65 mph in lev- el flight are pretty much a duplicate of the clean stalls. Stick force with the stick all the way back is an estimated 30 pounds, and the stabilized rate of descent is 750 fpm with the airspeed needle between 40 and 45 mph. Alternating wing-drops of 10 degrees or less occur 1-2 seconds apart, and the plane's nose is near the horizon. Recovering with full power turns the plane around in less than 50 feet even without retracting the flaps. It'll take 8-10 pounds of stick push to hold 65 mph for the initial full-power climb-out. Turning stalls are virtually the same.
You'll have to keep the airspeed indicator in your scan all the way around the landing pattern, because stick force cues due to a change in airspeed are minimal. The view over the nose is good until halfway through the round-out for a threepoint landing, when the nose slides up to erase the runway. Even with that broad cowl, maintaining runway centerline takes only normal tailwheel landing visual technique.
Manage your power all the way through the flare, or start with some extra airspeed, because once you pull the throttle to idle it doesn't take long for the energy to bleed off, even with only 25 degrees of flaps. Despite the elevator-limited stall situation, there's plenty of elevator authority to establish a three-point landing attitude. Control forces are low throughout the landing, and directional control on the runway is what you'd expect from an airplane of this design. You'll need to use your feet, but you won't have to stop chewing your gum. Tailwheel steering picks up when rudder effectiveness fades.
The Tundra probably looks more like a tool than a toy to some, but that characterization would deprive those "some" of the airplane's recreational potential. Whether it's working for a living, flying for flying's sake, or transporting you on an odyssey to find that brochure locale, Dream Aircraft's Tundra has a lot to offer.
| 9,519
|
inside_word
|
pedal,
|
remove_one_sentence
|
<url>
https://www.dreamaircraft.com/site/download_file.php?id=32
</url>
<text>
HOW IT FLIES
A Tundra 200 Flying Qualities Review
Ed Kolano Photos by Phil High
FLASH: Another mini-Beaver arrives in kit form from Canada. Dream Aircraft's Tundra 200 is a four-place, high-wing, taildragger/ nosedragger/floatplane with a cockpit big enough to call a cabin and plenty of volume behind the rear seats for, well, all that stuff Beaver pilots put back there. Okay, it's not that big, but it's large enough for four people's stuff.
stick pulls that arm just far enough to remove the contact.
Pulling all that stuff is a Lycoming IO-360, 200-hp engine turning a Sensenich two-blade, fixed-pitch propeller. With a 60-inch advance, the prop is a compromise between cruise- and climb-optimized.
There's a fixed step for entry. With your outside foot on the step and either hand grasping the leading edge of the door frame, it's an easy hoist onto the seat. The wide doorway and generous fore/aft seat adjustment allow a variety of entries, and none require contorted joints or result in bruises. Seat back angle is fixed, and fortunately the angle is comfortable.
Once belted in, the cockpit is roomy. A normal sitting position has your outside arm in contact with the door, but when you're doing the driving, holding the
There's a full set of controls for each pilot, and all panel controls can be easily reached by either pilot with the shoulder belt snug. The four-position flap lever lies between the seats. All the way down has the flaps reflexed 8 degrees, which netted at least 5 extra mph during this evaluation. You have to depress the button at the end of the lever to move the flaps from reflexed to zero. Increasing the deflection to 15 degrees, 25 degrees, and 40 degrees does not require the button to be pressed, but you will have to use the button to pass each detent when lowering the lever to raise the flaps. Dynamic pressure keeps the flaps from drooping past the selected deflection.
During the early part of the takeoff roll in the demonstrator, there wasn't enough air load on the flaps in their 15-degree setting, so the lever had to be held. This lasts only a few seconds, and the company has incorporated a stiffer spring in production kits to alleviate the problem.
Pitch trim is mechanical, set with a wheel protruding from
EAA Sport Aviation
39
or inconsiderate prop blast, making congested maneuvering easy and ramp-friendly.
below the center of the instrument panel. Rotating the wheel repositions a tab on the right elevator. A mechanical trim indicator is adjacent to the trim wheel.
The control sticks are shaped to allow full lateral displacement (115/8 inches stop-to-stop) without leg interference, and the foam grip seems to be right where it ought to be. Longitudinal displacement is 12 inches. The torque tube connecting the sticks for pitch is exposed in the demonstrator, and its proximity to the rudder pedals makes for awkward foot placement for the nonflying pilot. [In the final kits, this tube is now located under the cockpit floor.] Full pedal displacement puts 3-½ inches between the pedals.
A nudge of throttle starts the plane taxiing on level pavement, and even with 900 rpm, you'll need occasional brake-taps to keep the airplane at a reasonable speed. A taildragger with a big engine generally means the forward field of view is obstructed, and that's the case here. A 10-degree heading change away from your side is enough to clear the taxiway ahead, but it'll take at least 30 degrees when S-turning toward your side.
Tailwheel steering feels solid and works just fine for following the yellow line. Pivot turns take an appropriate tap on the toe brake, and bringing the now-castering tailwheel back into steering range does not require a clumsy stomp
40
AUGUST 2005
Takeoff from a 1,100-foot density altitude, paved runway takes about 12 seconds in calm wind. Using 15 degrees of flaps and holding the stick about halfway between neutral and the forward stop, the tail rises predictably as the airspeed indicator passes about 40 mph. Not forcing the tail up allows early recognition of any directional control requirements, and a few small pedal inputs keep the runway centerline stripe under the fuselage. Control forces are light throughout the takeoff, with the largest stick force being about 7 pounds of push as you wait for the tail to come up.
It appears the airplane would be happy with a variety of two-point attitudes as it accelerates, and maintaining one of them is easy. The airplane flies off from a slightly tail-low two-point attitude without additional back-stick at about 60 mph. The same trim setting for takeoff gets the airplane reasonably close to its 80 mph best rate of climb speed (VY). The company had not completed its performance testing at the time of this flight, and 80 mph is a best guess. [Flight testing showed VY to be 90 mph.]
The pitch attitude during a noflap climb is about 12 degrees nosehigh, necessitating some weaving to clear the sky ahead. Timed climbs through an average 4,160 feet den- sity altitude revealed 840 feet per minute loaded to 2,010 pounds or 540 pounds below its maximum. Center of gravity was 28 percent aft of the forward limit.
Cruising with 2450 rpm at 4,600 feet density altitude the airspeed indicator showed just over 130 mph indicated, or 140 mph true. The forward field of vision naturally improves here to 10 to 15 degrees downward over the nose. Laterally, you can see around to include about half the horizontal tail on your side and about 60 degrees behind the wing line looking cross-cockpit. The look-up through the windscreen is 30 to 40 degrees. Leaning forward to improve your look-up, which is particularly desirable when turning, doesn't offer much help if your shoulder strap is snug.
Looking out your side window, the view is almost straight down; it's about 30 degrees below horizontal looking cross-cockpit. The eyes of an average height pilot will be above the top of the side window, limiting the sideways view to approximately 5 degrees below level. Tuck your chin into your neck, and that view improves to about 5 degrees up under the wingtip.
Control Feel
The Tundra is a nice-flying airplane. Flight controls are smooth and harmonious, and have force gradients appropriate for this class of airplane. Pitch trim is, well, unusually nice. The large trim wheel allows both substantial trim changes and tiny adjustments, providing expeditious fine-tuning throughout the airspeed range without the sensitivity or insensitivity issues that sometimes accompany both electric systems and other mechanical implementations.
One to 2 pounds applied to the control stick in any direction is enough to start the plane pitching or rolling. This breakout force sounds a bit low, but no inadvertent stick inputs were noted in calm air. There's no slop in the longitudi- nal control system (zero free play), and the stick returns almost completely to its pre-displaced position upon release. This not-quite-there stick centering results in a residual hands-free pitch rate of approximately 1 degree per second. Laterally, there's also zero free play and a bit of friction that makes for a 3/8inch stick centering band, resulting in a hands-free residual roll rate of no more than 1 degree per second. So you may have to bump the stick a time or two after maneuvering to get it exactly where you want it. Rudder breakout is a light 5 to 10 pounds, and this system feels as tight as the stick.
100 mph, respectively, and 3 and 6 pounds of push to fly 140 and 150 mph. These forces are low enough for temporary off-trim flying and high enough to nail the desired offtrim airspeed without chasing it. The trim speed band, or range of airspeeds the airplane will maintain hands-free without re-trimming, is 7 mph.
The Tundra's dynamic stability characteristics are similarly well behaved. An abrupt pull or push on the stick causes the expected pitching activity without any residual wiggles—a deadbeat short period. Its long period, or phugoid, is positively damped. Pull or push the airplane off its trim speed, release the stick, and it converges back toward its trim speed with several decreasing amplitude cycles, each taking 30 seconds.
Static longitudinal stability is positive, meaning you'll have to hold the stick back to maintain an airspeed slower than the speed the plane is trimmed for and forward to increase speed. Count on 4 and 8 pounds of pull to fly 120 and
Maneuvering stability is also positive. As in the non-maneuvering case, stick force requirements increase predictably, and the airplane's response to longitudinal control inputs is probably better than you'd expect from this style of plane. A level 30-degree bank turn takes 5-6 pounds of stick pull. That increases to 8-10 pounds for 45 degrees of bank and 20 pounds for 60 degrees. These are low by general aviation standards but high enough to avoid over-controlling the airplane.
Don't expect fighter-like roll performance. That big "Hershey bar" wing provides a lot of roll damping, which in this case is a good-news/ okay-news story. The okay part is that the maximum average roll rates timed during full-stick coordinated rolls from 30 degrees of bank through 30 degrees of bank the other way are just under 60 degrees per second. The good news is the development and decay of the roll rate
EAA Sport Aviation
41
is just about perfect—short but not abrupt, so quickly capturing the desired bank angle comes easily.
Dihedral effect is positive. Step on a pedal<cursor_is_here> Spiral stability—the airplane's rolling tendency when established in a bank angle—is essentially neutral, meaning you don't have to apply any lateral stick for the airplane to maintain its bank angle.
For roll rates typical during cruise flight, expect to use 7 or 8 pounds of stick force. Yank and bank if you like, but the Tundra shines doing what it was designed to do. Pack the camping gear and the family and go someplace in a smooth, comfortable airplane.
3-4 pound stick pull is necessary to maintain the 130 mph speed. If a level deceleration is the goal, ease in about 5 pounds of back-stick over the 5 seconds it takes to go from 130 mph to the 100 mph maximum speed for 15 degrees of flaps. A level acceleration requires an initial 4-5 pounds of stick push after applying full throttle. Hold that condition, and the airplane tops out at an indicated 148 mph. Never exceed speed (VNE) is 162 mph.
Power effects on pitch control fall into that same predictable and benign category as the rest of the airplane's responses. Pull the throttle to idle from its cruise setting and the nose drops 10 degrees or so and the plane accelerates slightly. A light,
Non-Stalls
Idle stalls are ho-hum affairs with the test-day loading. With the trim set for the 130 mph cruise condition, the stick pull force reaches a hefty 25-30 pounds at the aft stop.
Power
Max. take off weight
loading
75% power
@ 1500'
Stall speed
Endurance
Range
42
AUGUST 2005
15.25 lbs/pt2
14.2 lbs/bhp
That's about the one-hand limit most people find tolerable in a short duration. The airplane just nibbles at the stall with the stick in your lap. The airspeed needle points to 45 mph here, with the plane's nose a couple of degrees above the horizon. There's no pitch break, only a gentle wing-rock that rarely exceeds 10 degrees of bank in both directions. The vertical speed indicator displays a solid 800 fpm descent, and that's about it. Ailerons and rudder remain effective, although adverse yaw is pronounced. Relax the stick for the recovery. You can firewall the throttle and keep a light pull on the stick to minimize the altitude lost.
acter. But if you could have only one, what would you rather have— no warning with a benign stall or plenty of warning with a real attention-getter?
Flap speeds used for this evaluation were 100 mph for 15 degrees and 80 mph for 25 and 40 degrees. From a level-flight trimmed condition at 100 mph, pulling the flap lever from its reflexed cruise position to its 15-degree position pro- duces little pitch change. Going from 15 degrees to 25, and then 40 at 80 mph shows more pitching moment changes. Control stick force doesn't exceed 5 pounds while the airplane slows in level flight— that's easily managed with one hand while working the trim wheel with the other.
Slow-Speed Flying
Level flight at a final approach speed
Having now painted a seemingly harmless stall character, let's keep a couple of mitigators in mind. First there is no natural stall warning. No airframe buffet, warning horn, propeller percussion, significant changes in pitch attitude or wind noise—not much to cue the pilot to an approaching stall. There is the ponderously high stick force when trimmed for cruise speed, but this won't be as significant for the pilot who trims for a slower speed. There's also the insidious nature of the gently falling leaf that invites inattention to altitude.
Finally, loading the airplane to a center of gravity further aft than it was for this test should increase the elevator's effectiveness, perhaps enough to truly stall the wing instead of merely getting close to its stall angle of attack. The company says stalls at the aft center of gravity limit produce the same gentle falling leaf character, but we were unable to test that.
The final take on stalls brings us back to the glass being half-full. Recovery using only elevator is simply a matter of relaxing the backstick slightly. A normal recovery using full power turns the 800 fpm descent into a climb in less than 50 feet. Ideally, every airplane would exhibit clear stall warning and a well-defined but benign stall char-
EAA Sport Aviation
43
of 65 mph and 4,200 feet density altitude takes 1950 rpm. Control forces are lighter all around, but most noticeably in roll. Airplane responses are more sluggish at this slower airspeed, so larger displacements are required.
The airplane can still be trimmed expeditiously, but there was a peculiarity with the trim system under these conditions. When we trimmed for 65 mph in level flight, then performed a couple of climbing/ descending turns, and returned to straight and level flight at 65 mph, we found the airplane was no longer in trim. It took a couple of pounds of stick force, either fore or aft, to hold 65 mph. Despite the trim migration, the airplane remained easy to fly under landing pattern conditions. The company has since discovered an off-center bell crank in the trim system and reports that an adjustment solved the problem.
Rudder coordination is necessary to prevent substantial adverse yaw, but pedal forces are low, and accurate heading captures require no special skill. Roll rate is noticeably slower. Using full lateral stick and full rudder, timed average roll rates during 30-degree to 300-degree bank reversals were 25 degrees per second. Once established in a bank angle, the airplane maintains that angle, just as it does under cruise conditions, indicating neutral spiral stability. The pull force needed for a level, 30-degree bank turn is 34 pounds.
Although control breakout forces aren't much different from the cruise case, the lateral control stick centering band is larger. The stick returns only to within 1-1/2 inches of its pre-displaced position, leaving the airplane with a hands-free roll rate up to 5 degrees per second. The centering band and residual pitch rate in the pitch axis are about the same as the cruise situation. Neither of these imperfections consciously affects the way you fly the plane or the precision you can achieve.
Large power changes produce
44
AUGUST 2005
expected results. Chop the throttle to idle, and the draggy nature of this configuration bleeds the speed below 50 mph in 5 seconds or so, requiring a stick pull in the 12-15 pound range to hold altitude. Selecting maximum power from a level, 65 mph condition causes the nose to rise. It'll take 8-10 pounds of push to maintain the 65 mph during the resulting climb.
Dutch roll, that yaw/roll oscillation that occurs when a sideslip is introduced, is slightly more yaw than roll. Alternately depressing and releasing the pedals gets one or two swings of the plane's nose. P-factor is obvious during this exercise, with the airplane pitching slightly nose-up when a left sideslip is introduced. A large, uncoordinated aileron deflection will also initiate the Dutch roll response of a couple of mostly yaw oscillations sufficient to foil a precise heading capture. Normal rudder coordination restores roll-out accuracy.
The Tundra looks like an airplane you'd see in a hard slip during an over-the-trees approach in one of those brochure-inspiring landing sites. Although fun to perform, a full-pedal slip only increases the descent rate by about 300 fpm. Fullpedal slips generate no more than 10-12 degrees of sideslip with the airplane 8-10 degrees wing-down in the sideslip direction. Control forces are low: 25-35 pounds on the pedal, 3-4 pounds of lateral stick, and about 5 pounds of stick pull for right sideslips and the same in the push direction for left sideslips.
Idle stalls with full flaps and the airplane trimmed for 65 mph in lev- el flight are pretty much a duplicate of the clean stalls. Stick force with the stick all the way back is an estimated 30 pounds, and the stabilized rate of descent is 750 fpm with the airspeed needle between 40 and 45 mph. Alternating wing-drops of 10 degrees or less occur 1-2 seconds apart, and the plane's nose is near the horizon. Recovering with full power turns the plane around in less than 50 feet even without retracting the flaps. It'll take 8-10 pounds of stick push to hold 65 mph for the initial full-power climb-out. Turning stalls are virtually the same.
You'll have to keep the airspeed indicator in your scan all the way around the landing pattern, because stick force cues due to a change in airspeed are minimal. The view over the nose is good until halfway through the round-out for a threepoint landing, when the nose slides up to erase the runway. Even with that broad cowl, maintaining runway centerline takes only normal tailwheel landing visual technique.
Manage your power all the way through the flare, or start with some extra airspeed, because once you pull the throttle to idle it doesn't take long for the energy to bleed off, even with only 25 degrees of flaps. Despite the elevator-limited stall situation, there's plenty of elevator authority to establish a three-point landing attitude. Control forces are low throughout the landing, and directional control on the runway is what you'd expect from an airplane of this design. You'll need to use your feet, but you won't have to stop chewing your gum. Tailwheel steering picks up when rudder effectiveness fades.
The Tundra probably looks more like a tool than a toy to some, but that characterization would deprive those "some" of the airplane's recreational potential. Whether it's working for a living, flying for flying's sake, or transporting you on an odyssey to find that brochure locale, Dream Aircraft's Tundra has a lot to offer.
</text>
|
[
{
"content": "<url>\nhttps://www.dreamaircraft.com/site/download_file.php?id=32\n</url>\n<text>\n\n\nHOW IT FLIES\n\nA Tundra 200 Flying Qualities Review\n\nEd Kolano Photos by Phil High\n\nFLASH: Another mini-Beaver arrives in kit form from Canada. Dream Aircraft's Tundra 200 is a four-place, high-wing, taildragger/ nosedragger/floatplane with a cockpit big enough to call a cabin and plenty of volume behind the rear seats for, well, all that stuff Beaver pilots put back there. Okay, it's not that big, but it's large enough for four people's stuff.\n\nstick pulls that arm just far enough to remove the contact.\n\nPulling all that stuff is a Lycoming IO-360, 200-hp engine turning a Sensenich two-blade, fixed-pitch propeller. With a 60-inch advance, the prop is a compromise between cruise- and climb-optimized.\n\nThere's a fixed step for entry. With your outside foot on the step and either hand grasping the leading edge of the door frame, it's an easy hoist onto the seat. The wide doorway and generous fore/aft seat adjustment allow a variety of entries, and none require contorted joints or result in bruises. Seat back angle is fixed, and fortunately the angle is comfortable.\n\nOnce belted in, the cockpit is roomy. A normal sitting position has your outside arm in contact with the door, but when you're doing the driving, holding the\n\nThere's a full set of controls for each pilot, and all panel controls can be easily reached by either pilot with the shoulder belt snug. The four-position flap lever lies between the seats. All the way down has the flaps reflexed 8 degrees, which netted at least 5 extra mph during this evaluation. You have to depress the button at the end of the lever to move the flaps from reflexed to zero. Increasing the deflection to 15 degrees, 25 degrees, and 40 degrees does not require the button to be pressed, but you will have to use the button to pass each detent when lowering the lever to raise the flaps. Dynamic pressure keeps the flaps from drooping past the selected deflection.\n\nDuring the early part of the takeoff roll in the demonstrator, there wasn't enough air load on the flaps in their 15-degree setting, so the lever had to be held. This lasts only a few seconds, and the company has incorporated a stiffer spring in production kits to alleviate the problem.\n\nPitch trim is mechanical, set with a wheel protruding from\n\nEAA Sport Aviation\n\n39\n\nor inconsiderate prop blast, making congested maneuvering easy and ramp-friendly.\n\nbelow the center of the instrument panel. Rotating the wheel repositions a tab on the right elevator. A mechanical trim indicator is adjacent to the trim wheel.\n\nThe control sticks are shaped to allow full lateral displacement (115/8 inches stop-to-stop) without leg interference, and the foam grip seems to be right where it ought to be. Longitudinal displacement is 12 inches. The torque tube connecting the sticks for pitch is exposed in the demonstrator, and its proximity to the rudder pedals makes for awkward foot placement for the nonflying pilot. [In the final kits, this tube is now located under the cockpit floor.] Full pedal displacement puts 3-½ inches between the pedals.\n\nA nudge of throttle starts the plane taxiing on level pavement, and even with 900 rpm, you'll need occasional brake-taps to keep the airplane at a reasonable speed. A taildragger with a big engine generally means the forward field of view is obstructed, and that's the case here. A 10-degree heading change away from your side is enough to clear the taxiway ahead, but it'll take at least 30 degrees when S-turning toward your side.\n\nTailwheel steering feels solid and works just fine for following the yellow line. Pivot turns take an appropriate tap on the toe brake, and bringing the now-castering tailwheel back into steering range does not require a clumsy stomp\n\n40\n\nAUGUST 2005\n\nTakeoff from a 1,100-foot density altitude, paved runway takes about 12 seconds in calm wind. Using 15 degrees of flaps and holding the stick about halfway between neutral and the forward stop, the tail rises predictably as the airspeed indicator passes about 40 mph. Not forcing the tail up allows early recognition of any directional control requirements, and a few small pedal inputs keep the runway centerline stripe under the fuselage. Control forces are light throughout the takeoff, with the largest stick force being about 7 pounds of push as you wait for the tail to come up.\n\nIt appears the airplane would be happy with a variety of two-point attitudes as it accelerates, and maintaining one of them is easy. The airplane flies off from a slightly tail-low two-point attitude without additional back-stick at about 60 mph. The same trim setting for takeoff gets the airplane reasonably close to its 80 mph best rate of climb speed (VY). The company had not completed its performance testing at the time of this flight, and 80 mph is a best guess. [Flight testing showed VY to be 90 mph.]\n\nThe pitch attitude during a noflap climb is about 12 degrees nosehigh, necessitating some weaving to clear the sky ahead. Timed climbs through an average 4,160 feet den- sity altitude revealed 840 feet per minute loaded to 2,010 pounds or 540 pounds below its maximum. Center of gravity was 28 percent aft of the forward limit.\n\nCruising with 2450 rpm at 4,600 feet density altitude the airspeed indicator showed just over 130 mph indicated, or 140 mph true. The forward field of vision naturally improves here to 10 to 15 degrees downward over the nose. Laterally, you can see around to include about half the horizontal tail on your side and about 60 degrees behind the wing line looking cross-cockpit. The look-up through the windscreen is 30 to 40 degrees. Leaning forward to improve your look-up, which is particularly desirable when turning, doesn't offer much help if your shoulder strap is snug.\n\nLooking out your side window, the view is almost straight down; it's about 30 degrees below horizontal looking cross-cockpit. The eyes of an average height pilot will be above the top of the side window, limiting the sideways view to approximately 5 degrees below level. Tuck your chin into your neck, and that view improves to about 5 degrees up under the wingtip.\n\nControl Feel\n\nThe Tundra is a nice-flying airplane. Flight controls are smooth and harmonious, and have force gradients appropriate for this class of airplane. Pitch trim is, well, unusually nice. The large trim wheel allows both substantial trim changes and tiny adjustments, providing expeditious fine-tuning throughout the airspeed range without the sensitivity or insensitivity issues that sometimes accompany both electric systems and other mechanical implementations.\n\nOne to 2 pounds applied to the control stick in any direction is enough to start the plane pitching or rolling. This breakout force sounds a bit low, but no inadvertent stick inputs were noted in calm air. There's no slop in the longitudi- nal control system (zero free play), and the stick returns almost completely to its pre-displaced position upon release. This not-quite-there stick centering results in a residual hands-free pitch rate of approximately 1 degree per second. Laterally, there's also zero free play and a bit of friction that makes for a 3/8inch stick centering band, resulting in a hands-free residual roll rate of no more than 1 degree per second. So you may have to bump the stick a time or two after maneuvering to get it exactly where you want it. Rudder breakout is a light 5 to 10 pounds, and this system feels as tight as the stick.\n\n100 mph, respectively, and 3 and 6 pounds of push to fly 140 and 150 mph. These forces are low enough for temporary off-trim flying and high enough to nail the desired offtrim airspeed without chasing it. The trim speed band, or range of airspeeds the airplane will maintain hands-free without re-trimming, is 7 mph.\n\nThe Tundra's dynamic stability characteristics are similarly well behaved. An abrupt pull or push on the stick causes the expected pitching activity without any residual wiggles—a deadbeat short period. Its long period, or phugoid, is positively damped. Pull or push the airplane off its trim speed, release the stick, and it converges back toward its trim speed with several decreasing amplitude cycles, each taking 30 seconds.\n\nStatic longitudinal stability is positive, meaning you'll have to hold the stick back to maintain an airspeed slower than the speed the plane is trimmed for and forward to increase speed. Count on 4 and 8 pounds of pull to fly 120 and\n\nManeuvering stability is also positive. As in the non-maneuvering case, stick force requirements increase predictably, and the airplane's response to longitudinal control inputs is probably better than you'd expect from this style of plane. A level 30-degree bank turn takes 5-6 pounds of stick pull. That increases to 8-10 pounds for 45 degrees of bank and 20 pounds for 60 degrees. These are low by general aviation standards but high enough to avoid over-controlling the airplane.\n\nDon't expect fighter-like roll performance. That big \"Hershey bar\" wing provides a lot of roll damping, which in this case is a good-news/ okay-news story. The okay part is that the maximum average roll rates timed during full-stick coordinated rolls from 30 degrees of bank through 30 degrees of bank the other way are just under 60 degrees per second. The good news is the development and decay of the roll rate\n\nEAA Sport Aviation\n\n41\n\nis just about perfect—short but not abrupt, so quickly capturing the desired bank angle comes easily.\n\nDihedral effect is positive. Step on a pedal<cursor_is_here> Spiral stability—the airplane's rolling tendency when established in a bank angle—is essentially neutral, meaning you don't have to apply any lateral stick for the airplane to maintain its bank angle.\n\nFor roll rates typical during cruise flight, expect to use 7 or 8 pounds of stick force. Yank and bank if you like, but the Tundra shines doing what it was designed to do. Pack the camping gear and the family and go someplace in a smooth, comfortable airplane.\n\n3-4 pound stick pull is necessary to maintain the 130 mph speed. If a level deceleration is the goal, ease in about 5 pounds of back-stick over the 5 seconds it takes to go from 130 mph to the 100 mph maximum speed for 15 degrees of flaps. A level acceleration requires an initial 4-5 pounds of stick push after applying full throttle. Hold that condition, and the airplane tops out at an indicated 148 mph. Never exceed speed (VNE) is 162 mph.\n\nPower effects on pitch control fall into that same predictable and benign category as the rest of the airplane's responses. Pull the throttle to idle from its cruise setting and the nose drops 10 degrees or so and the plane accelerates slightly. A light,\n\nNon-Stalls\n\nIdle stalls are ho-hum affairs with the test-day loading. With the trim set for the 130 mph cruise condition, the stick pull force reaches a hefty 25-30 pounds at the aft stop.\n\nPower\n\nMax. take off weight\n\nloading\n\n75% power\n\n@ 1500'\n\nStall speed\n\nEndurance\n\nRange\n\n42\n\nAUGUST 2005\n\n15.25 lbs/pt2\n\n14.2 lbs/bhp\n\nThat's about the one-hand limit most people find tolerable in a short duration. The airplane just nibbles at the stall with the stick in your lap. The airspeed needle points to 45 mph here, with the plane's nose a couple of degrees above the horizon. There's no pitch break, only a gentle wing-rock that rarely exceeds 10 degrees of bank in both directions. The vertical speed indicator displays a solid 800 fpm descent, and that's about it. Ailerons and rudder remain effective, although adverse yaw is pronounced. Relax the stick for the recovery. You can firewall the throttle and keep a light pull on the stick to minimize the altitude lost.\n\nacter. But if you could have only one, what would you rather have— no warning with a benign stall or plenty of warning with a real attention-getter?\n\nFlap speeds used for this evaluation were 100 mph for 15 degrees and 80 mph for 25 and 40 degrees. From a level-flight trimmed condition at 100 mph, pulling the flap lever from its reflexed cruise position to its 15-degree position pro- duces little pitch change. Going from 15 degrees to 25, and then 40 at 80 mph shows more pitching moment changes. Control stick force doesn't exceed 5 pounds while the airplane slows in level flight— that's easily managed with one hand while working the trim wheel with the other.\n\nSlow-Speed Flying\n\nLevel flight at a final approach speed\n\nHaving now painted a seemingly harmless stall character, let's keep a couple of mitigators in mind. First there is no natural stall warning. No airframe buffet, warning horn, propeller percussion, significant changes in pitch attitude or wind noise—not much to cue the pilot to an approaching stall. There is the ponderously high stick force when trimmed for cruise speed, but this won't be as significant for the pilot who trims for a slower speed. There's also the insidious nature of the gently falling leaf that invites inattention to altitude.\n\nFinally, loading the airplane to a center of gravity further aft than it was for this test should increase the elevator's effectiveness, perhaps enough to truly stall the wing instead of merely getting close to its stall angle of attack. The company says stalls at the aft center of gravity limit produce the same gentle falling leaf character, but we were unable to test that.\n\nThe final take on stalls brings us back to the glass being half-full. Recovery using only elevator is simply a matter of relaxing the backstick slightly. A normal recovery using full power turns the 800 fpm descent into a climb in less than 50 feet. Ideally, every airplane would exhibit clear stall warning and a well-defined but benign stall char-\n\nEAA Sport Aviation\n\n43\n\nof 65 mph and 4,200 feet density altitude takes 1950 rpm. Control forces are lighter all around, but most noticeably in roll. Airplane responses are more sluggish at this slower airspeed, so larger displacements are required.\n\nThe airplane can still be trimmed expeditiously, but there was a peculiarity with the trim system under these conditions. When we trimmed for 65 mph in level flight, then performed a couple of climbing/ descending turns, and returned to straight and level flight at 65 mph, we found the airplane was no longer in trim. It took a couple of pounds of stick force, either fore or aft, to hold 65 mph. Despite the trim migration, the airplane remained easy to fly under landing pattern conditions. The company has since discovered an off-center bell crank in the trim system and reports that an adjustment solved the problem.\n\nRudder coordination is necessary to prevent substantial adverse yaw, but pedal forces are low, and accurate heading captures require no special skill. Roll rate is noticeably slower. Using full lateral stick and full rudder, timed average roll rates during 30-degree to 300-degree bank reversals were 25 degrees per second. Once established in a bank angle, the airplane maintains that angle, just as it does under cruise conditions, indicating neutral spiral stability. The pull force needed for a level, 30-degree bank turn is 34 pounds.\n\nAlthough control breakout forces aren't much different from the cruise case, the lateral control stick centering band is larger. The stick returns only to within 1-1/2 inches of its pre-displaced position, leaving the airplane with a hands-free roll rate up to 5 degrees per second. The centering band and residual pitch rate in the pitch axis are about the same as the cruise situation. Neither of these imperfections consciously affects the way you fly the plane or the precision you can achieve.\n\nLarge power changes produce\n\n44\n\nAUGUST 2005\n\nexpected results. Chop the throttle to idle, and the draggy nature of this configuration bleeds the speed below 50 mph in 5 seconds or so, requiring a stick pull in the 12-15 pound range to hold altitude. Selecting maximum power from a level, 65 mph condition causes the nose to rise. It'll take 8-10 pounds of push to maintain the 65 mph during the resulting climb.\n\nDutch roll, that yaw/roll oscillation that occurs when a sideslip is introduced, is slightly more yaw than roll. Alternately depressing and releasing the pedals gets one or two swings of the plane's nose. P-factor is obvious during this exercise, with the airplane pitching slightly nose-up when a left sideslip is introduced. A large, uncoordinated aileron deflection will also initiate the Dutch roll response of a couple of mostly yaw oscillations sufficient to foil a precise heading capture. Normal rudder coordination restores roll-out accuracy.\n\nThe Tundra looks like an airplane you'd see in a hard slip during an over-the-trees approach in one of those brochure-inspiring landing sites. Although fun to perform, a full-pedal slip only increases the descent rate by about 300 fpm. Fullpedal slips generate no more than 10-12 degrees of sideslip with the airplane 8-10 degrees wing-down in the sideslip direction. Control forces are low: 25-35 pounds on the pedal, 3-4 pounds of lateral stick, and about 5 pounds of stick pull for right sideslips and the same in the push direction for left sideslips.\n\nIdle stalls with full flaps and the airplane trimmed for 65 mph in lev- el flight are pretty much a duplicate of the clean stalls. Stick force with the stick all the way back is an estimated 30 pounds, and the stabilized rate of descent is 750 fpm with the airspeed needle between 40 and 45 mph. Alternating wing-drops of 10 degrees or less occur 1-2 seconds apart, and the plane's nose is near the horizon. Recovering with full power turns the plane around in less than 50 feet even without retracting the flaps. It'll take 8-10 pounds of stick push to hold 65 mph for the initial full-power climb-out. Turning stalls are virtually the same.\n\nYou'll have to keep the airspeed indicator in your scan all the way around the landing pattern, because stick force cues due to a change in airspeed are minimal. The view over the nose is good until halfway through the round-out for a threepoint landing, when the nose slides up to erase the runway. Even with that broad cowl, maintaining runway centerline takes only normal tailwheel landing visual technique.\n\nManage your power all the way through the flare, or start with some extra airspeed, because once you pull the throttle to idle it doesn't take long for the energy to bleed off, even with only 25 degrees of flaps. Despite the elevator-limited stall situation, there's plenty of elevator authority to establish a three-point landing attitude. Control forces are low throughout the landing, and directional control on the runway is what you'd expect from an airplane of this design. You'll need to use your feet, but you won't have to stop chewing your gum. Tailwheel steering picks up when rudder effectiveness fades.\n\nThe Tundra probably looks more like a tool than a toy to some, but that characterization would deprive those \"some\" of the airplane's recreational potential. Whether it's working for a living, flying for flying's sake, or transporting you on an odyssey to find that brochure locale, Dream Aircraft's Tundra has a lot to offer.\n</text>\n",
"role": "user"
},
{
"content": ", and the plane yaws and rolls in the direction of the applied pedal.",
"role": "assistant"
}
] |
All the News That's Fit to Print And More
Quick Links
Kiwanis Program - February 18, 2017
Facebook
Monday Night Bingo
Website
More About Us
Our Sponsors
Monument Hill Foundation
Contact Us
Quick Glance
Senior Meals Drivers
Trains to Cripple Creek Mel McFarland
Meal Delivery Location Mennonite Church - Hwy 105 Delivery Days Tues, Wed, Thurs
Feb 14 - RF Smith 15 Feb - Brian Bush 16 Feb - Steve Hall
Scribes
Feb 18 - Bob Evans Feb 25 - Tom Van Wormer Mar 4 - Gary Reed Mar 11 - Marian Taylor Mar 18 - Jim Head Mar 25 - Rose Fortune Apr 1 - Bob Evans Apr 8 - Dennis Beasley
Future Program Announcements
February 25, 2017
CASA Update
Joe Foreman
March 4, 2017
Colorado Law & Your Life Pit Martin
Member Concerns
Larry Young updated member concerns:
- Barrie Town told us that Ed Tomlinson's wife, Harriet went into the hospital in Hawaii a couple days ago with a kidney infection. Later communication with Ed reveals that Harriet is improving and should be released soon.
- Rich Strom said Kathy is doing great after her retina surgeries. She sees the doctor next Monday. Rich is sure she would welcome phone calls.
- Larry provided a prayer of gratefulness for living in this beautiful place and our great country. He prayed for those with health and other needs, and for our club leadership. He prayed for our efforts to support our youth and community.
Bill Stoner led the Pledge of Allegiance.
Upcoming Programs
February 18, 2017
Trains to Cripple Creek
Mel McFarland
February 25, 2017
CASA Update Joe Foreman
March 4, 2017
Colorado Law & Your Life
Pit Martin
March 11, 2017
Member BIOS
Called the meeting to order at 8:00 am.
RF's thought for the day from Mark Twain: "Be careful about reading health books - you might die of a misprint."
Visitors & Guests
Lynn Severson reintroduced Ron Westbrook who has submitted an application to become a club member. Welcome!
Rosalyn Bellis again accompanied her father Ben to the meeting. Great to have you with us!
Thanks Larry Young
Board of Directors 2015-2016
Board of Directors 2016-2017
President - RF Smith
President Elect - Barb Broshous
Immediate Past President - Rich Strom
Secretary - Mike Luginbuhl
Brian McMeekin introduced his neighbor Dean Snow. Dean has lived in the area since 1996. Both he and his wife Robin recently retired. Welcome!
ANNOUNCEMENTS
RF Smith said we received thank you cards from several organizations: Tri-Lakes Cares, Soap Box Derby, Rocky Mountain Leadership and Court Appointed Special Advocate (CASA). RF said we also received a nice Valentines Day card from the Emily Griffith Center for Children.
RF announced there is a board meeting following today's meeting. Attendance from non-board members is welcome.
Steve Hall (for Anita) and Mark Silvanic received checks as winners in the Superbowl boards.
Treasurer/ CFO- Jack Fry
Sergeant-at-Arms - Paul Short
VP - Programs - Larry Young
VP - Memberships - Bob Hayes
VP- Fundraising - Barrie Town
VP - Public Relations - Steve Stephenson
VP - Service Leadership Program - Max Williams
VP - Community Service - Cheryl Wangerman
Dir - Bingo & Raffles Mark Zeiger
Dir - Granting and External Relations - Jim Taylor
Marian Taylor gave us an update on the St. Patrick's Day member mixer (say that fast three times) planned for March 17. It will be at the Woodmoor Barn from 5:30 to about 8:30. We will have heavy hors d'oeuvre, wine, beer, soft drinks, coffee and desserts. This is a great opportunity for new and old members and spouses to meet each other.
Jack Fry provided information on two free, easy ways to donate money to the MHKC. One is by getting a gift card (available from Mike Wangeman that comes with $5 credit) for Safeway or Kings Soopers. You can then indefinitely add money to the card. Also, at Amazon.com Smile you can designate Monument Hill Service Club as your charity organization, purchase items through Smile, then Amazon donates .5% of all your purchases to our club.
Dir - Member Recognition Ron Mangiarelli
Dir - Plans, Analysis, & Resources Russ Broshous
Dir - Special Needs - Rich Munsell
Dir - Interclub & Social - Marian Taylor
Bonnie Nasser for photographs
Rich Strom updated info on the 3rd of March local-area visit of Jane Erickson, the President of Kiwanis International. One of her areas of focus are shortfalls we see in our community with children (Kiwanis International has a program known as "Step Up For Children"). Jane will participate in a panel discussion on with influential members of our community. At this panel discussion she would like to identify shortfalls we have with children, then how to address these issues in a collaborative fashion. It will occur at the Club of Flying Horse at 10 a.m. This will be an opportunity to expand our contacts. Membership attendance (with vest) is encouraged - please see Rich.
Harry Brandon updated us on the Rocky Mountain District conference that is in Ft. Collins from the 3rd to the 5th of March. Jane Erickson is the keynote speaker. Registration and agenda info is available at http://www.rmdkiwanis.com/. Still not too late to sign up!
RF Smith told us that the Kiwanis International Conference is in Paris from 13-16 July. We don't know the issues, but no show, no vote. We can send two delegates, so see RF if you want to be a delegate!
[email protected]
MHKC Service Recognition
Kiwanian of the Year
2016 Larry Young
2015 Mark Zeiger 2014 RF Smith
Rich Hicks let us know about the "Combat Paper" military related art event at PPCC Centennial Campus, February 23rd and February 24th (Thursday and Friday) from 9am4pm. This event is free and open to the public. Attend for an hour or for a day.
HAPPY BUCKS
John Spidell was happy about the big NCAA game between Baylor and Kansas. Results: the No. 3 Jayhawks had a 67-65 win against No. 4 Baylor.
Frank Bittinger gave us the latest on the Palmer Ridge High School robotics team. They have a competition today at Coronado High School with their primary robot (they are also building a second one). The robot throws whiffle balls into a hopper, then climbs a rope. Frank is a mentor for the Palmer Ridge team.
2013 Tom Nelson 2012 Ron Heard 2011 Bonnie Biggs 2010 Dennis Daugherty 2009 Ed Kinney 2008 Don Johnson 2007 Ted Bauman 2006 Glenn Scott 2005 Dick Durham 2004 Benny Nasser 2003 Sharon Williams 2002 Bill Cook 2001 Jim Taylor 2000 Rich Rima 1999 Rich Lybolt 1998 Jack Johnson 1997 Larry Cheatham 1996 Ed DeValois 1995 Paul Bacalis 1994 Jerry Losey 1993 Denny Myers 1992 Bill Tope 1991 Max Williams 1990 Dick London 1989 Len Dodson 1988 Dave Turner 1987 Charlie Emmons 1986 Bill Dudman 1985 George Goddu 1984 Jim Carroll 1983 Rev John Snyder
*Additional Sertoman of the Year or Kiwanian of the Year designates include: Dexter Peak, JoAnn Peak, Steve Hall Sunset Sertoma Club, Darlene Loudermilk & Joe Ashby
Mike McGrath just returned from a trip to Europe (Slovenia and Croatia) where he and Marlene helped the world economy. Just after returning, he flew to Texas to pin on his grandson's Navy Wings. Now four generations of Navy men!
- His dad was a Navy Lieutenant during WWII. He served in the Pacific (Papua New Guinea).
- Mike was a '62 USNA graduate serving 24 1/2 years, including Vietnam (5+ years as a POW). Mike retired as a Captain.
- Mike's son, Rick served in Desert Storm in 1991. He was in the class of '87 USNA (a classmate with Mary Kelly '87 and Skip Trahan '87). Rick is a retired Commander, now working for Lockheed-Martin here in Colorado Springs.
- Rick's son, Brian was '15 USNA. He graduated from Lewis Palmer 5 1/2 years ago. Brian got his Navy Wings last week. He will be flying the P3 out of NAS Whidbey Island, Washington.
25 Year Legion of Honor Jo Carroll, Ed DeValois, Chuck Dunham, Steve Hall, Joe Howard, Jerry Losey, Max Williams
30 Year Legion of Honor Ben Bellis , Mark O'Regan, Fred Roeming, John Snyder, Cliff Sparrow, Bud Sterling
35 Year Legion of Honor Joe Ashby, Watt Hill, John Swofford
4th of July Parade is Powered by
Integrity Bank and Trust is the Corporate Sponsor for the Monument Hill Kiwanis Club 4th of July Parade
Monument Hill Kiwanis Club Corporate Sponsors
Partners in Service
Integrity Bank
Harry Brandon had happy bucks for: 1) a lame Irish joke he had to tell 2) the term shipmate - for the Navy, shows a common experience and camaraderie - Harry said shipmate definitely applies to our group and he is proud to be part of it 3) happy to be back from California.
Rich Rima spent a couple hours with Wayne Claybaugh last week and he is doing great!
Lewis-Palmer School District 38
Tri-Lakes Chamber of Commerce Tri-Lakes Women's Club Tri-Lakes Cares
Gold Sponsors
JJ Tracks Tri-Lakes Printing Wave's End Services, LLC
Silver Sponsors
Hunter-Wolff Gallery The Wine Seller
Jack Fry was happy to join over 20 of his USAFA 1967 classmates to celebrate "100 nights before graduation" with the Class of 2017. Jack said some things have changed!
Paul Short had two happy bucks. One for Pete Peterson (and Pete's wife Vicki) for their help, and for Pete turning a youthful 74. Paul had a second buck and a Snicker bar for Stan Schneider who makes him laugh imitating "Pistol Pete."
MARCH MADNESS
Glenn Scott talked about MHKC's 15th annual NCAA Basketball Pool. It kicks off Sunday, March 12, 2017 when tournament pairings are announced. You must enter
your picks before noon, Thursday, March 16. Most of you will receive an email invitation to play this year. Registration details to be announced soon. Only $10 per entry. Half the proceeds go to the foundation and half to the winners. Please note that the theme is MAYHEM!!
BIRTHDAYS
Whistling Frank Wynne (with an attitude of gratitude) had member birthdays for the upcoming week. Frank said our meeting has now become the highlight of his week (met with laughter, wow, etc.)
Dave Whittman Gov Vaughn Happy Birthday to you both!
Progressive Drawing
Feb 18, 2017
Winner this week is:
Barb Brouhous
Kiwanis Progressive Drawing Stats:
Date of drawing: 2/18/17
Chips this drawing: 10
Carry over from last week: $0
Today's 1/2 ticket sales: $50
Total for today's drawing: $50
Amount won & donated back: $0
Amount won and kept by winner: $
Available for next week's drawing: $0
Chips remaining for next week's drawing: 10
Kiwanis Program - Feb 18, 2017
Trains to Cripple Creek
Mel McFarland
Scribe: Bob Evans
Tom Van Wormer introduced our guest speaker today, Mr. Mel McFarland, a renowned lecturer, author, historian and local railroad train expert. His subject today was the history of rail lines and trains between Colorado Springs and Cripple Creek.
They ran trains to Cripple Creek from 1895 to 1949. The trains ran through Ute Pass, and towns developed along the line. Mel noted that weather changes quickly in this part of the country, so travel could often be hazardous. Gold was first discovered at Cripple Creek in 1891, but it took until 1895 for the first train to arrive.
This is very early Cripple Creek (aka Lawrence City) before there were any railroads. This was still mainly a ranch, predominated by prospectors. A creek ran through town where many cattle were injured due to the ravine and rocks, hence the name Cripple Creek. Gold was found on the 4th of July and that mine was known as Independence Mine.
Above is Anaconda (a boom town, now underground) showing several levels of railroad activity. There was mining on every hill with Bull Hill as the main mountain in the area. This is still where much of today's mining activity is located.
Mel said there were three main railroads in the district, but that miners generally owned the rails and land to their mines. The difference between standard gauge and narrow gauge provided continuing access challenges, even in this relatively small community. Railroads: Florence Cripple Creek - narrow, Midland Terminal - standard, Colorado Springs Cripple Creek District - standard. Growth continued, and at one point a wide complex of trains and streetcars provided area transportation service every 15 minutes.
Mel pointed out that railroad grade is the slope of the track. For example, our Monument area is 2%, or two feet in elevation per 100 feet of track. The Cripple Creek District is on average 4%, while the steepest on the Pikes Peak cog railroad is 26%.
See you Saturday at:
Lewis Palmer D-38 Administration building
(a.k.a. Big Red)
146 Jefferson Street, Monument, CO 80921. Please use the West or North entrances!
|
<urn:uuid:3521c456-4b43-446e-9f11-7a043a46ca57>
|
CC-MAIN-2018-51
|
https://portalbuzzuserfiles.s3.amazonaws.com/ou-98/userfiles/files/mh_compressed(19).pdf
|
2018-12-18T19:36:19Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829568.86/warc/CC-MAIN-20181218184418-20181218210418-00286.warc.gz
| 696,991,005
| 3,075
|
eng_Latn
|
eng_Latn
| 0.9763
|
eng_Latn
| 0.996294
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
272,
1421,
1799,
2000,
2839,
3988,
5339,
6175,
7792,
8658,
9464,
10055,
10431,
11068,
11410,
12418,
12584
] |
All the News That's Fit to Print And More
Quick Links
Kiwanis Program - February 18, 2017
Facebook
Monday Night Bingo
Website
More About Us
Our Sponsors
Monument Hill Foundation
Contact Us
Quick Glance
Senior Meals Drivers
Trains to Cripple Creek Mel McFarland
Meal Delivery Location Mennonite Church - Hwy 105 Delivery Days Tues, Wed, Thurs
Feb 14 - RF Smith 15 Feb - Brian Bush 16 Feb - Steve Hall
Scribes
Feb 18 - Bob Evans Feb 25 - Tom Van Wormer Mar 4 - Gary Reed Mar 11 - Marian Taylor Mar 18 - Jim Head Mar 25 - Rose Fortune Apr 1 - Bob Evans Apr 8 - Dennis Beasley
Future Program Announcements
February 25, 2017
CASA Update
Joe Foreman
March 4, 2017
Colorado Law & Your Life Pit Martin
Member Concerns
Larry Young updated member concerns:
- Barrie Town told us that Ed Tomlinson's wife, Harriet went into the hospital in Hawaii a couple days ago with a kidney infection. Later communication with Ed reveals that Harriet is improving and should be released soon.
- Rich Strom said Kathy is doing great after her retina surgeries. She sees the doctor next Monday. Rich is sure she would welcome phone calls.
- Larry provided a prayer of gratefulness for living in this beautiful place and our great country. He prayed for those with health and other needs, and for our club leadership. He prayed for our efforts to support our youth and community.
Bill Stoner led the Pledge of Allegiance.
Upcoming Programs
February 18, 2017
Trains to Cripple Creek
Mel McFarland
February 25, 2017
CASA Update Joe Foreman
March 4, 2017
Colorado Law & Your Life
Pit Martin
March 11, 2017
Member BIOS
Called the meeting to order at 8:00 am.
RF's thought for the day from Mark Twain: "B
|
e careful about reading health books - you might die of a misprint.
|
"
Visitors & Guests
Lynn Severson reintroduced Ron Westbrook who has submitted an application to become a club member. Welcome!
Rosalyn Bellis again accompanied her father Ben to the meeting. Great to have you with us!
Thanks Larry Young
Board of Directors 2015-2016
Board of Directors 2016-2017
President - RF Smith
President Elect - Barb Broshous
Immediate Past President - Rich Strom
Secretary - Mike Luginbuhl
Brian McMeekin introduced his neighbor Dean Snow. Dean has lived in the area since 1996. Both he and his wife Robin recently retired. Welcome!
ANNOUNCEMENTS
RF Smith said we received thank you cards from several organizations: Tri-Lakes Cares, Soap Box Derby, Rocky Mountain Leadership and Court Appointed Special Advocate (CASA). RF said we also received a nice Valentines Day card from the Emily Griffith Center for Children.
RF announced there is a board meeting following today's meeting. Attendance from non-board members is welcome.
Steve Hall (for Anita) and Mark Silvanic received checks as winners in the Superbowl boards.
Treasurer/ CFO- Jack Fry
Sergeant-at-Arms - Paul Short
VP - Programs - Larry Young
VP - Memberships - Bob Hayes
VP- Fundraising - Barrie Town
VP - Public Relations - Steve Stephenson
VP - Service Leadership Program - Max Williams
VP - Community Service - Cheryl Wangerman
Dir - Bingo & Raffles Mark Zeiger
Dir - Granting and External Relations - Jim Taylor
Marian Taylor gave us an update on the St. Patrick's Day member mixer (say that fast three times) planned for March 17. It will be at the Woodmoor Barn from 5:30 to about 8:30. We will have heavy hors d'oeuvre, wine, beer, soft drinks, coffee and desserts. This is a great opportunity for new and old members and spouses to meet each other.
Jack Fry provided information on two free, easy ways to donate money to the MHKC. One is by getting a gift card (available from Mike Wangeman that comes with $5 credit) for Safeway or Kings Soopers. You can then indefinitely add money to the card. Also, at Amazon.com Smile you can designate Monument Hill Service Club as your charity organization, purchase items through Smile, then Amazon donates .5% of all your purchases to our club.
Dir - Member Recognition Ron Mangiarelli
Dir - Plans, Analysis, & Resources Russ Broshous
Dir - Special Needs - Rich Munsell
Dir - Interclub & Social - Marian Taylor
Bonnie Nasser for photographs
Rich Strom updated info on the 3rd of March local-area visit of Jane Erickson, the President of Kiwanis International. One of her areas of focus are shortfalls we see in our community with children (Kiwanis International has a program known as "Step Up For Children"). Jane will participate in a panel discussion on with influential members of our community. At this panel discussion she would like to identify shortfalls we have with children, then how to address these issues in a collaborative fashion. It will occur at the Club of Flying Horse at 10 a.m. This will be an opportunity to expand our contacts. Membership attendance (with vest) is encouraged - please see Rich.
Harry Brandon updated us on the Rocky Mountain District conference that is in Ft. Collins from the 3rd to the 5th of March. Jane Erickson is the keynote speaker. Registration and agenda info is available at http://www.rmdkiwanis.com/. Still not too late to sign up!
RF Smith told us that the Kiwanis International Conference is in Paris from 13-16 July. We don't know the issues, but no show, no vote. We can send two delegates, so see RF if you want to be a delegate!
[email protected]
MHKC Service Recognition
Kiwanian of the Year
2016 Larry Young
2015 Mark Zeiger 2014 RF Smith
Rich Hicks let us know about the "Combat Paper" military related art event at PPCC Centennial Campus, February 23rd and February 24th (Thursday and Friday) from 9am4pm. This event is free and open to the public. Attend for an hour or for a day.
HAPPY BUCKS
John Spidell was happy about the big NCAA game between Baylor and Kansas. Results: the No. 3 Jayhawks had a 67-65 win against No. 4 Baylor.
Frank Bittinger gave us the latest on the Palmer Ridge High School robotics team. They have a competition today at Coronado High School with their primary robot (they are also building a second one). The robot throws whiffle balls into a hopper, then climbs a rope. Frank is a mentor for the Palmer Ridge team.
2013 Tom Nelson 2012 Ron Heard 2011 Bonnie Biggs 2010 Dennis Daugherty 2009 Ed Kinney 2008 Don Johnson 2007 Ted Bauman 2006 Glenn Scott 2005 Dick Durham 2004 Benny Nasser 2003 Sharon Williams 2002 Bill Cook 2001 Jim Taylor 2000 Rich Rima 1999 Rich Lybolt 1998 Jack Johnson 1997 Larry Cheatham 1996 Ed DeValois 1995 Paul Bacalis 1994 Jerry Losey 1993 Denny Myers 1992 Bill Tope 1991 Max Williams 1990 Dick London 1989 Len Dodson 1988 Dave Turner 1987 Charlie Emmons 1986 Bill Dudman 1985 George Goddu 1984 Jim Carroll 1983 Rev John Snyder
*Additional Sertoman of the Year or Kiwanian of the Year designates include: Dexter Peak, JoAnn Peak, Steve Hall Sunset Sertoma Club, Darlene Loudermilk & Joe Ashby
Mike McGrath just returned from a trip to Europe (Slovenia and Croatia) where he and Marlene helped the world economy. Just after returning, he flew to Texas to pin on his grandson's Navy Wings. Now four generations of Navy men!
- His dad was a Navy Lieutenant during WWII. He served in the Pacific (Papua New Guinea).
- Mike was a '62 USNA graduate serving 24 1/2 years, including Vietnam (5+ years as a POW). Mike retired as a Captain.
- Mike's son, Rick served in Desert Storm in 1991. He was in the class of '87 USNA (a classmate with Mary Kelly '87 and Skip Trahan '87). Rick is a retired Commander, now working for Lockheed-Martin here in Colorado Springs.
- Rick's son, Brian was '15 USNA. He graduated from Lewis Palmer 5 1/2 years ago. Brian got his Navy Wings last week. He will be flying the P3 out of NAS Whidbey Island, Washington.
25 Year Legion of Honor Jo Carroll, Ed DeValois, Chuck Dunham, Steve Hall, Joe Howard, Jerry Losey, Max Williams
30 Year Legion of Honor Ben Bellis , Mark O'Regan, Fred Roeming, John Snyder, Cliff Sparrow, Bud Sterling
35 Year Legion of Honor Joe Ashby, Watt Hill, John Swofford
4th of July Parade is Powered by
Integrity Bank and Trust is the Corporate Sponsor for the Monument Hill Kiwanis Club 4th of July Parade
Monument Hill Kiwanis Club Corporate Sponsors
Partners in Service
Integrity Bank
Harry Brandon had happy bucks for: 1) a lame Irish joke he had to tell 2) the term shipmate - for the Navy, shows a common experience and camaraderie - Harry said shipmate definitely applies to our group and he is proud to be part of it 3) happy to be back from California.
Rich Rima spent a couple hours with Wayne Claybaugh last week and he is doing great!
Lewis-Palmer School District 38
Tri-Lakes Chamber of Commerce Tri-Lakes Women's Club Tri-Lakes Cares
Gold Sponsors
JJ Tracks Tri-Lakes Printing Wave's End Services, LLC
Silver Sponsors
Hunter-Wolff Gallery The Wine Seller
Jack Fry was happy to join over 20 of his USAFA 1967 classmates to celebrate "100 nights before graduation" with the Class of 2017. Jack said some things have changed!
Paul Short had two happy bucks. One for Pete Peterson (and Pete's wife Vicki) for their help, and for Pete turning a youthful 74. Paul had a second buck and a Snicker bar for Stan Schneider who makes him laugh imitating "Pistol Pete."
MARCH MADNESS
Glenn Scott talked about MHKC's 15th annual NCAA Basketball Pool. It kicks off Sunday, March 12, 2017 when tournament pairings are announced. You must enter
your picks before noon, Thursday, March 16. Most of you will receive an email invitation to play this year. Registration details to be announced soon. Only $10 per entry. Half the proceeds go to the foundation and half to the winners. Please note that the theme is MAYHEM!!
BIRTHDAYS
Whistling Frank Wynne (with an attitude of gratitude) had member birthdays for the upcoming week. Frank said our meeting has now become the highlight of his week (met with laughter, wow, etc.)
Dave Whittman Gov Vaughn Happy Birthday to you both!
Progressive Drawing
Feb 18, 2017
Winner this week is:
Barb Brouhous
Kiwanis Progressive Drawing Stats:
Date of drawing: 2/18/17
Chips this drawing: 10
Carry over from last week: $0
Today's 1/2 ticket sales: $50
Total for today's drawing: $50
Amount won & donated back: $0
Amount won and kept by winner: $
Available for next week's drawing: $0
Chips remaining for next week's drawing: 10
Kiwanis Program - Feb 18, 2017
Trains to Cripple Creek
Mel McFarland
Scribe: Bob Evans
Tom Van Wormer introduced our guest speaker today, Mr. Mel McFarland, a renowned lecturer, author, historian and local railroad train expert. His subject today was the history of rail lines and trains between Colorado Springs and Cripple Creek.
They ran trains to Cripple Creek from 1895 to 1949. The trains ran through Ute Pass, and towns developed along the line. Mel noted that weather changes quickly in this part of the country, so travel could often be hazardous. Gold was first discovered at Cripple Creek in 1891, but it took until 1895 for the first train to arrive.
This is very early Cripple Creek (aka Lawrence City) before there were any railroads. This was still mainly a ranch, predominated by prospectors. A creek ran through town where many cattle were injured due to the ravine and rocks, hence the name Cripple Creek. Gold was found on the 4th of July and that mine was known as Independence Mine.
Above is Anaconda (a boom town, now underground) showing several levels of railroad activity. There was mining on every hill with Bull Hill as the main mountain in the area. This is still where much of today's mining activity is located.
Mel said there were three main railroads in the district, but that miners generally owned the rails and land to their mines. The difference between standard gauge and narrow gauge provided continuing access challenges, even in this relatively small community. Railroads: Florence Cripple Creek - narrow, Midland Terminal - standard, Colorado Springs Cripple Creek District - standard. Growth continued, and at one point a wide complex of trains and streetcars provided area transportation service every 15 minutes.
Mel pointed out that railroad grade is the slope of the track. For example, our Monument area is 2%, or two feet in elevation per 100 feet of track. The Cripple Creek District is on average 4%, while the steepest on the Pikes Peak cog railroad is 26%.
See you Saturday at:
Lewis Palmer D-38 Administration building
(a.k.a. Big Red)
146 Jefferson Street, Monument, CO 80921. Please use the West or North entrances!
| 1,712
|
inside_word
|
"Be
|
remove_one_sentence
|
<url>
https://portalbuzzuserfiles.s3.amazonaws.com/ou-98/userfiles/files/mh_compressed(19).pdf
</url>
<text>
All the News That's Fit to Print And More
Quick Links
Kiwanis Program - February 18, 2017
Facebook
Monday Night Bingo
Website
More About Us
Our Sponsors
Monument Hill Foundation
Contact Us
Quick Glance
Senior Meals Drivers
Trains to Cripple Creek Mel McFarland
Meal Delivery Location Mennonite Church - Hwy 105 Delivery Days Tues, Wed, Thurs
Feb 14 - RF Smith 15 Feb - Brian Bush 16 Feb - Steve Hall
Scribes
Feb 18 - Bob Evans Feb 25 - Tom Van Wormer Mar 4 - Gary Reed Mar 11 - Marian Taylor Mar 18 - Jim Head Mar 25 - Rose Fortune Apr 1 - Bob Evans Apr 8 - Dennis Beasley
Future Program Announcements
February 25, 2017
CASA Update
Joe Foreman
March 4, 2017
Colorado Law & Your Life Pit Martin
Member Concerns
Larry Young updated member concerns:
- Barrie Town told us that Ed Tomlinson's wife, Harriet went into the hospital in Hawaii a couple days ago with a kidney infection. Later communication with Ed reveals that Harriet is improving and should be released soon.
- Rich Strom said Kathy is doing great after her retina surgeries. She sees the doctor next Monday. Rich is sure she would welcome phone calls.
- Larry provided a prayer of gratefulness for living in this beautiful place and our great country. He prayed for those with health and other needs, and for our club leadership. He prayed for our efforts to support our youth and community.
Bill Stoner led the Pledge of Allegiance.
Upcoming Programs
February 18, 2017
Trains to Cripple Creek
Mel McFarland
February 25, 2017
CASA Update Joe Foreman
March 4, 2017
Colorado Law & Your Life
Pit Martin
March 11, 2017
Member BIOS
Called the meeting to order at 8:00 am.
RF's thought for the day from Mark Twain: "B<cursor_is_here>"
Visitors & Guests
Lynn Severson reintroduced Ron Westbrook who has submitted an application to become a club member. Welcome!
Rosalyn Bellis again accompanied her father Ben to the meeting. Great to have you with us!
Thanks Larry Young
Board of Directors 2015-2016
Board of Directors 2016-2017
President - RF Smith
President Elect - Barb Broshous
Immediate Past President - Rich Strom
Secretary - Mike Luginbuhl
Brian McMeekin introduced his neighbor Dean Snow. Dean has lived in the area since 1996. Both he and his wife Robin recently retired. Welcome!
ANNOUNCEMENTS
RF Smith said we received thank you cards from several organizations: Tri-Lakes Cares, Soap Box Derby, Rocky Mountain Leadership and Court Appointed Special Advocate (CASA). RF said we also received a nice Valentines Day card from the Emily Griffith Center for Children.
RF announced there is a board meeting following today's meeting. Attendance from non-board members is welcome.
Steve Hall (for Anita) and Mark Silvanic received checks as winners in the Superbowl boards.
Treasurer/ CFO- Jack Fry
Sergeant-at-Arms - Paul Short
VP - Programs - Larry Young
VP - Memberships - Bob Hayes
VP- Fundraising - Barrie Town
VP - Public Relations - Steve Stephenson
VP - Service Leadership Program - Max Williams
VP - Community Service - Cheryl Wangerman
Dir - Bingo & Raffles Mark Zeiger
Dir - Granting and External Relations - Jim Taylor
Marian Taylor gave us an update on the St. Patrick's Day member mixer (say that fast three times) planned for March 17. It will be at the Woodmoor Barn from 5:30 to about 8:30. We will have heavy hors d'oeuvre, wine, beer, soft drinks, coffee and desserts. This is a great opportunity for new and old members and spouses to meet each other.
Jack Fry provided information on two free, easy ways to donate money to the MHKC. One is by getting a gift card (available from Mike Wangeman that comes with $5 credit) for Safeway or Kings Soopers. You can then indefinitely add money to the card. Also, at Amazon.com Smile you can designate Monument Hill Service Club as your charity organization, purchase items through Smile, then Amazon donates .5% of all your purchases to our club.
Dir - Member Recognition Ron Mangiarelli
Dir - Plans, Analysis, & Resources Russ Broshous
Dir - Special Needs - Rich Munsell
Dir - Interclub & Social - Marian Taylor
Bonnie Nasser for photographs
Rich Strom updated info on the 3rd of March local-area visit of Jane Erickson, the President of Kiwanis International. One of her areas of focus are shortfalls we see in our community with children (Kiwanis International has a program known as "Step Up For Children"). Jane will participate in a panel discussion on with influential members of our community. At this panel discussion she would like to identify shortfalls we have with children, then how to address these issues in a collaborative fashion. It will occur at the Club of Flying Horse at 10 a.m. This will be an opportunity to expand our contacts. Membership attendance (with vest) is encouraged - please see Rich.
Harry Brandon updated us on the Rocky Mountain District conference that is in Ft. Collins from the 3rd to the 5th of March. Jane Erickson is the keynote speaker. Registration and agenda info is available at http://www.rmdkiwanis.com/. Still not too late to sign up!
RF Smith told us that the Kiwanis International Conference is in Paris from 13-16 July. We don't know the issues, but no show, no vote. We can send two delegates, so see RF if you want to be a delegate!
[email protected]
MHKC Service Recognition
Kiwanian of the Year
2016 Larry Young
2015 Mark Zeiger 2014 RF Smith
Rich Hicks let us know about the "Combat Paper" military related art event at PPCC Centennial Campus, February 23rd and February 24th (Thursday and Friday) from 9am4pm. This event is free and open to the public. Attend for an hour or for a day.
HAPPY BUCKS
John Spidell was happy about the big NCAA game between Baylor and Kansas. Results: the No. 3 Jayhawks had a 67-65 win against No. 4 Baylor.
Frank Bittinger gave us the latest on the Palmer Ridge High School robotics team. They have a competition today at Coronado High School with their primary robot (they are also building a second one). The robot throws whiffle balls into a hopper, then climbs a rope. Frank is a mentor for the Palmer Ridge team.
2013 Tom Nelson 2012 Ron Heard 2011 Bonnie Biggs 2010 Dennis Daugherty 2009 Ed Kinney 2008 Don Johnson 2007 Ted Bauman 2006 Glenn Scott 2005 Dick Durham 2004 Benny Nasser 2003 Sharon Williams 2002 Bill Cook 2001 Jim Taylor 2000 Rich Rima 1999 Rich Lybolt 1998 Jack Johnson 1997 Larry Cheatham 1996 Ed DeValois 1995 Paul Bacalis 1994 Jerry Losey 1993 Denny Myers 1992 Bill Tope 1991 Max Williams 1990 Dick London 1989 Len Dodson 1988 Dave Turner 1987 Charlie Emmons 1986 Bill Dudman 1985 George Goddu 1984 Jim Carroll 1983 Rev John Snyder
*Additional Sertoman of the Year or Kiwanian of the Year designates include: Dexter Peak, JoAnn Peak, Steve Hall Sunset Sertoma Club, Darlene Loudermilk & Joe Ashby
Mike McGrath just returned from a trip to Europe (Slovenia and Croatia) where he and Marlene helped the world economy. Just after returning, he flew to Texas to pin on his grandson's Navy Wings. Now four generations of Navy men!
- His dad was a Navy Lieutenant during WWII. He served in the Pacific (Papua New Guinea).
- Mike was a '62 USNA graduate serving 24 1/2 years, including Vietnam (5+ years as a POW). Mike retired as a Captain.
- Mike's son, Rick served in Desert Storm in 1991. He was in the class of '87 USNA (a classmate with Mary Kelly '87 and Skip Trahan '87). Rick is a retired Commander, now working for Lockheed-Martin here in Colorado Springs.
- Rick's son, Brian was '15 USNA. He graduated from Lewis Palmer 5 1/2 years ago. Brian got his Navy Wings last week. He will be flying the P3 out of NAS Whidbey Island, Washington.
25 Year Legion of Honor Jo Carroll, Ed DeValois, Chuck Dunham, Steve Hall, Joe Howard, Jerry Losey, Max Williams
30 Year Legion of Honor Ben Bellis , Mark O'Regan, Fred Roeming, John Snyder, Cliff Sparrow, Bud Sterling
35 Year Legion of Honor Joe Ashby, Watt Hill, John Swofford
4th of July Parade is Powered by
Integrity Bank and Trust is the Corporate Sponsor for the Monument Hill Kiwanis Club 4th of July Parade
Monument Hill Kiwanis Club Corporate Sponsors
Partners in Service
Integrity Bank
Harry Brandon had happy bucks for: 1) a lame Irish joke he had to tell 2) the term shipmate - for the Navy, shows a common experience and camaraderie - Harry said shipmate definitely applies to our group and he is proud to be part of it 3) happy to be back from California.
Rich Rima spent a couple hours with Wayne Claybaugh last week and he is doing great!
Lewis-Palmer School District 38
Tri-Lakes Chamber of Commerce Tri-Lakes Women's Club Tri-Lakes Cares
Gold Sponsors
JJ Tracks Tri-Lakes Printing Wave's End Services, LLC
Silver Sponsors
Hunter-Wolff Gallery The Wine Seller
Jack Fry was happy to join over 20 of his USAFA 1967 classmates to celebrate "100 nights before graduation" with the Class of 2017. Jack said some things have changed!
Paul Short had two happy bucks. One for Pete Peterson (and Pete's wife Vicki) for their help, and for Pete turning a youthful 74. Paul had a second buck and a Snicker bar for Stan Schneider who makes him laugh imitating "Pistol Pete."
MARCH MADNESS
Glenn Scott talked about MHKC's 15th annual NCAA Basketball Pool. It kicks off Sunday, March 12, 2017 when tournament pairings are announced. You must enter
your picks before noon, Thursday, March 16. Most of you will receive an email invitation to play this year. Registration details to be announced soon. Only $10 per entry. Half the proceeds go to the foundation and half to the winners. Please note that the theme is MAYHEM!!
BIRTHDAYS
Whistling Frank Wynne (with an attitude of gratitude) had member birthdays for the upcoming week. Frank said our meeting has now become the highlight of his week (met with laughter, wow, etc.)
Dave Whittman Gov Vaughn Happy Birthday to you both!
Progressive Drawing
Feb 18, 2017
Winner this week is:
Barb Brouhous
Kiwanis Progressive Drawing Stats:
Date of drawing: 2/18/17
Chips this drawing: 10
Carry over from last week: $0
Today's 1/2 ticket sales: $50
Total for today's drawing: $50
Amount won & donated back: $0
Amount won and kept by winner: $
Available for next week's drawing: $0
Chips remaining for next week's drawing: 10
Kiwanis Program - Feb 18, 2017
Trains to Cripple Creek
Mel McFarland
Scribe: Bob Evans
Tom Van Wormer introduced our guest speaker today, Mr. Mel McFarland, a renowned lecturer, author, historian and local railroad train expert. His subject today was the history of rail lines and trains between Colorado Springs and Cripple Creek.
They ran trains to Cripple Creek from 1895 to 1949. The trains ran through Ute Pass, and towns developed along the line. Mel noted that weather changes quickly in this part of the country, so travel could often be hazardous. Gold was first discovered at Cripple Creek in 1891, but it took until 1895 for the first train to arrive.
This is very early Cripple Creek (aka Lawrence City) before there were any railroads. This was still mainly a ranch, predominated by prospectors. A creek ran through town where many cattle were injured due to the ravine and rocks, hence the name Cripple Creek. Gold was found on the 4th of July and that mine was known as Independence Mine.
Above is Anaconda (a boom town, now underground) showing several levels of railroad activity. There was mining on every hill with Bull Hill as the main mountain in the area. This is still where much of today's mining activity is located.
Mel said there were three main railroads in the district, but that miners generally owned the rails and land to their mines. The difference between standard gauge and narrow gauge provided continuing access challenges, even in this relatively small community. Railroads: Florence Cripple Creek - narrow, Midland Terminal - standard, Colorado Springs Cripple Creek District - standard. Growth continued, and at one point a wide complex of trains and streetcars provided area transportation service every 15 minutes.
Mel pointed out that railroad grade is the slope of the track. For example, our Monument area is 2%, or two feet in elevation per 100 feet of track. The Cripple Creek District is on average 4%, while the steepest on the Pikes Peak cog railroad is 26%.
See you Saturday at:
Lewis Palmer D-38 Administration building
(a.k.a. Big Red)
146 Jefferson Street, Monument, CO 80921. Please use the West or North entrances!
</text>
|
[
{
"content": "<url>\nhttps://portalbuzzuserfiles.s3.amazonaws.com/ou-98/userfiles/files/mh_compressed(19).pdf\n</url>\n<text>\nAll the News That's Fit to Print And More\n\nQuick Links\n\nKiwanis Program - February 18, 2017\n\nFacebook\n\nMonday Night Bingo\n\nWebsite\n\nMore About Us\n\nOur Sponsors\n\nMonument Hill Foundation\n\nContact Us\n\nQuick Glance\n\nSenior Meals Drivers\n\nTrains to Cripple Creek Mel McFarland\n\nMeal Delivery Location Mennonite Church - Hwy 105 Delivery Days Tues, Wed, Thurs\n\nFeb 14 - RF Smith 15 Feb - Brian Bush 16 Feb - Steve Hall\n\nScribes\n\nFeb 18 - Bob Evans Feb 25 - Tom Van Wormer Mar 4 - Gary Reed Mar 11 - Marian Taylor Mar 18 - Jim Head Mar 25 - Rose Fortune Apr 1 - Bob Evans Apr 8 - Dennis Beasley\n\nFuture Program Announcements\n\nFebruary 25, 2017\n\nCASA Update\n\nJoe Foreman\n\nMarch 4, 2017\n\nColorado Law & Your Life Pit Martin\n\nMember Concerns\n\nLarry Young updated member concerns:\n\n- Barrie Town told us that Ed Tomlinson's wife, Harriet went into the hospital in Hawaii a couple days ago with a kidney infection. Later communication with Ed reveals that Harriet is improving and should be released soon.\n- Rich Strom said Kathy is doing great after her retina surgeries. She sees the doctor next Monday. Rich is sure she would welcome phone calls.\n- Larry provided a prayer of gratefulness for living in this beautiful place and our great country. He prayed for those with health and other needs, and for our club leadership. He prayed for our efforts to support our youth and community.\n\nBill Stoner led the Pledge of Allegiance.\n\nUpcoming Programs\n\nFebruary 18, 2017\n\nTrains to Cripple Creek\n\nMel McFarland\n\nFebruary 25, 2017\n\nCASA Update Joe Foreman\n\nMarch 4, 2017\n\nColorado Law & Your Life\n\nPit Martin\n\nMarch 11, 2017\n\nMember BIOS\n\nCalled the meeting to order at 8:00 am.\n\nRF's thought for the day from Mark Twain: \"B<cursor_is_here>\"\n\nVisitors & Guests\n\nLynn Severson reintroduced Ron Westbrook who has submitted an application to become a club member. Welcome!\n\nRosalyn Bellis again accompanied her father Ben to the meeting. Great to have you with us!\n\nThanks Larry Young\n\nBoard of Directors 2015-2016\n\nBoard of Directors 2016-2017\n\nPresident - RF Smith\n\nPresident Elect - Barb Broshous\n\nImmediate Past President - Rich Strom\n\nSecretary - Mike Luginbuhl\n\nBrian McMeekin introduced his neighbor Dean Snow. Dean has lived in the area since 1996. Both he and his wife Robin recently retired. Welcome!\n\nANNOUNCEMENTS\n\nRF Smith said we received thank you cards from several organizations: Tri-Lakes Cares, Soap Box Derby, Rocky Mountain Leadership and Court Appointed Special Advocate (CASA). RF said we also received a nice Valentines Day card from the Emily Griffith Center for Children.\n\nRF announced there is a board meeting following today's meeting. Attendance from non-board members is welcome.\n\nSteve Hall (for Anita) and Mark Silvanic received checks as winners in the Superbowl boards.\n\nTreasurer/ CFO- Jack Fry\n\nSergeant-at-Arms - Paul Short\n\nVP - Programs - Larry Young\n\nVP - Memberships - Bob Hayes\n\nVP- Fundraising - Barrie Town\n\nVP - Public Relations - Steve Stephenson\n\nVP - Service Leadership Program - Max Williams\n\nVP - Community Service - Cheryl Wangerman\n\nDir - Bingo & Raffles Mark Zeiger\n\nDir - Granting and External Relations - Jim Taylor\n\nMarian Taylor gave us an update on the St. Patrick's Day member mixer (say that fast three times) planned for March 17. It will be at the Woodmoor Barn from 5:30 to about 8:30. We will have heavy hors d'oeuvre, wine, beer, soft drinks, coffee and desserts. This is a great opportunity for new and old members and spouses to meet each other.\n\nJack Fry provided information on two free, easy ways to donate money to the MHKC. One is by getting a gift card (available from Mike Wangeman that comes with $5 credit) for Safeway or Kings Soopers. You can then indefinitely add money to the card. Also, at Amazon.com Smile you can designate Monument Hill Service Club as your charity organization, purchase items through Smile, then Amazon donates .5% of all your purchases to our club.\n\nDir - Member Recognition Ron Mangiarelli\n\nDir - Plans, Analysis, & Resources Russ Broshous\n\nDir - Special Needs - Rich Munsell\n\nDir - Interclub & Social - Marian Taylor\n\nBonnie Nasser for photographs\n\nRich Strom updated info on the 3rd of March local-area visit of Jane Erickson, the President of Kiwanis International. One of her areas of focus are shortfalls we see in our community with children (Kiwanis International has a program known as \"Step Up For Children\"). Jane will participate in a panel discussion on with influential members of our community. At this panel discussion she would like to identify shortfalls we have with children, then how to address these issues in a collaborative fashion. It will occur at the Club of Flying Horse at 10 a.m. This will be an opportunity to expand our contacts. Membership attendance (with vest) is encouraged - please see Rich.\n\nHarry Brandon updated us on the Rocky Mountain District conference that is in Ft. Collins from the 3rd to the 5th of March. Jane Erickson is the keynote speaker. Registration and agenda info is available at http://www.rmdkiwanis.com/. Still not too late to sign up!\n\nRF Smith told us that the Kiwanis International Conference is in Paris from 13-16 July. We don't know the issues, but no show, no vote. We can send two delegates, so see RF if you want to be a delegate!\n\[email protected]\n\nMHKC Service Recognition\n\nKiwanian of the Year\n\n2016 Larry Young\n\n2015 Mark Zeiger 2014 RF Smith\n\nRich Hicks let us know about the \"Combat Paper\" military related art event at PPCC Centennial Campus, February 23rd and February 24th (Thursday and Friday) from 9am4pm. This event is free and open to the public. Attend for an hour or for a day.\n\nHAPPY BUCKS\n\nJohn Spidell was happy about the big NCAA game between Baylor and Kansas. Results: the No. 3 Jayhawks had a 67-65 win against No. 4 Baylor.\n\nFrank Bittinger gave us the latest on the Palmer Ridge High School robotics team. They have a competition today at Coronado High School with their primary robot (they are also building a second one). The robot throws whiffle balls into a hopper, then climbs a rope. Frank is a mentor for the Palmer Ridge team.\n\n2013 Tom Nelson 2012 Ron Heard 2011 Bonnie Biggs 2010 Dennis Daugherty 2009 Ed Kinney 2008 Don Johnson 2007 Ted Bauman 2006 Glenn Scott 2005 Dick Durham 2004 Benny Nasser 2003 Sharon Williams 2002 Bill Cook 2001 Jim Taylor 2000 Rich Rima 1999 Rich Lybolt 1998 Jack Johnson 1997 Larry Cheatham 1996 Ed DeValois 1995 Paul Bacalis 1994 Jerry Losey 1993 Denny Myers 1992 Bill Tope 1991 Max Williams 1990 Dick London 1989 Len Dodson 1988 Dave Turner 1987 Charlie Emmons 1986 Bill Dudman 1985 George Goddu 1984 Jim Carroll 1983 Rev John Snyder\n\n*Additional Sertoman of the Year or Kiwanian of the Year designates include: Dexter Peak, JoAnn Peak, Steve Hall Sunset Sertoma Club, Darlene Loudermilk & Joe Ashby\n\nMike McGrath just returned from a trip to Europe (Slovenia and Croatia) where he and Marlene helped the world economy. Just after returning, he flew to Texas to pin on his grandson's Navy Wings. Now four generations of Navy men!\n\n- His dad was a Navy Lieutenant during WWII. He served in the Pacific (Papua New Guinea).\n- Mike was a '62 USNA graduate serving 24 1/2 years, including Vietnam (5+ years as a POW). Mike retired as a Captain.\n- Mike's son, Rick served in Desert Storm in 1991. He was in the class of '87 USNA (a classmate with Mary Kelly '87 and Skip Trahan '87). Rick is a retired Commander, now working for Lockheed-Martin here in Colorado Springs.\n- Rick's son, Brian was '15 USNA. He graduated from Lewis Palmer 5 1/2 years ago. Brian got his Navy Wings last week. He will be flying the P3 out of NAS Whidbey Island, Washington.\n\n25 Year Legion of Honor Jo Carroll, Ed DeValois, Chuck Dunham, Steve Hall, Joe Howard, Jerry Losey, Max Williams\n\n30 Year Legion of Honor Ben Bellis , Mark O'Regan, Fred Roeming, John Snyder, Cliff Sparrow, Bud Sterling\n\n35 Year Legion of Honor Joe Ashby, Watt Hill, John Swofford\n\n4th of July Parade is Powered by\n\nIntegrity Bank and Trust is the Corporate Sponsor for the Monument Hill Kiwanis Club 4th of July Parade\n\nMonument Hill Kiwanis Club Corporate Sponsors\n\nPartners in Service\n\nIntegrity Bank\n\nHarry Brandon had happy bucks for: 1) a lame Irish joke he had to tell 2) the term shipmate - for the Navy, shows a common experience and camaraderie - Harry said shipmate definitely applies to our group and he is proud to be part of it 3) happy to be back from California.\n\nRich Rima spent a couple hours with Wayne Claybaugh last week and he is doing great!\n\nLewis-Palmer School District 38\n\nTri-Lakes Chamber of Commerce Tri-Lakes Women's Club Tri-Lakes Cares\n\nGold Sponsors\n\nJJ Tracks Tri-Lakes Printing Wave's End Services, LLC\n\nSilver Sponsors\n\nHunter-Wolff Gallery The Wine Seller\n\nJack Fry was happy to join over 20 of his USAFA 1967 classmates to celebrate \"100 nights before graduation\" with the Class of 2017. Jack said some things have changed!\n\nPaul Short had two happy bucks. One for Pete Peterson (and Pete's wife Vicki) for their help, and for Pete turning a youthful 74. Paul had a second buck and a Snicker bar for Stan Schneider who makes him laugh imitating \"Pistol Pete.\"\n\nMARCH MADNESS\n\nGlenn Scott talked about MHKC's 15th annual NCAA Basketball Pool. It kicks off Sunday, March 12, 2017 when tournament pairings are announced. You must enter\n\nyour picks before noon, Thursday, March 16. Most of you will receive an email invitation to play this year. Registration details to be announced soon. Only $10 per entry. Half the proceeds go to the foundation and half to the winners. Please note that the theme is MAYHEM!!\n\nBIRTHDAYS\n\nWhistling Frank Wynne (with an attitude of gratitude) had member birthdays for the upcoming week. Frank said our meeting has now become the highlight of his week (met with laughter, wow, etc.)\n\nDave Whittman Gov Vaughn Happy Birthday to you both!\n\nProgressive Drawing\n\nFeb 18, 2017\n\nWinner this week is:\n\nBarb Brouhous\n\nKiwanis Progressive Drawing Stats:\n\nDate of drawing: 2/18/17\n\nChips this drawing: 10\n\nCarry over from last week: $0\n\nToday's 1/2 ticket sales: $50\n\nTotal for today's drawing: $50\n\nAmount won & donated back: $0\n\nAmount won and kept by winner: $\n\nAvailable for next week's drawing: $0\n\nChips remaining for next week's drawing: 10\n\nKiwanis Program - Feb 18, 2017\n\nTrains to Cripple Creek\n\nMel McFarland\n\nScribe: Bob Evans\n\nTom Van Wormer introduced our guest speaker today, Mr. Mel McFarland, a renowned lecturer, author, historian and local railroad train expert. His subject today was the history of rail lines and trains between Colorado Springs and Cripple Creek.\n\nThey ran trains to Cripple Creek from 1895 to 1949. The trains ran through Ute Pass, and towns developed along the line. Mel noted that weather changes quickly in this part of the country, so travel could often be hazardous. Gold was first discovered at Cripple Creek in 1891, but it took until 1895 for the first train to arrive.\n\nThis is very early Cripple Creek (aka Lawrence City) before there were any railroads. This was still mainly a ranch, predominated by prospectors. A creek ran through town where many cattle were injured due to the ravine and rocks, hence the name Cripple Creek. Gold was found on the 4th of July and that mine was known as Independence Mine.\n\nAbove is Anaconda (a boom town, now underground) showing several levels of railroad activity. There was mining on every hill with Bull Hill as the main mountain in the area. This is still where much of today's mining activity is located.\n\nMel said there were three main railroads in the district, but that miners generally owned the rails and land to their mines. The difference between standard gauge and narrow gauge provided continuing access challenges, even in this relatively small community. Railroads: Florence Cripple Creek - narrow, Midland Terminal - standard, Colorado Springs Cripple Creek District - standard. Growth continued, and at one point a wide complex of trains and streetcars provided area transportation service every 15 minutes.\n\nMel pointed out that railroad grade is the slope of the track. For example, our Monument area is 2%, or two feet in elevation per 100 feet of track. The Cripple Creek District is on average 4%, while the steepest on the Pikes Peak cog railroad is 26%.\n\nSee you Saturday at:\n\nLewis Palmer D-38 Administration building\n\n(a.k.a. Big Red)\n\n146 Jefferson Street, Monument, CO 80921. Please use the West or North entrances!\n</text>\n",
"role": "user"
},
{
"content": "e careful about reading health books - you might die of a misprint.",
"role": "assistant"
}
] |
"As truly as God is our father, so just as truly is God our mother. In our father, God Almighty, we have our being; in our merciful mother we are re-made and restored. Our fragmented lives are knit together and made perfect. And by giving and yielding ourselves, through grace, to the Holy Spirit we are made whole."
~ Julian of Norwich
Greeting
Ed Rollins
Invitation to Worship
Meditation on the many names of God
Prelude
Call to Worship (responsive)
Creator God, we gather on this new day of your creation to worship you.
Shepherd God, we follow where you lead.
Merciful God, in your love, re-make us.
Compassionate God, bring grace and forgiveness to our lives.
Comforting God, in our grief and pain, lift us from despair.
Mothering God, gently gather your people.
Fathering God, embrace us with your unending love.
Nourishing God, feed us and strengthen us.
Weeping God, who knows our sorrow, dry our tears.
Everlasting God, you are everywhere and right here.
Open our hearts and minds to worship you, the God of many names.
The Many Names of God
Carol McEntyre
†Processional Hymn (see next page) Bring Many Names
(Please turn to face the cross as it enters)
1 Bring many names, beautiful and good,
2 Strong mother God, working night and day,
3 Warm father God, hugging every child,
4 Old, aching God, gray with endless care,
5 Young, growing God, eager, on the move,
6 Great, living God, never fully known,
(D) (Em7) (D/F#) (Em) (Asus) (A7)
Eb Fm7 Eb/G Fm Bb/sus Bb7
celebrate, in parable and story,
planning all the wonders of creation,
feeling all the strains of human living,
calmly piercing evil's new disguises,
saying no to falsehood and unkindness,
joyful darkness far beyond our seeing,
(D) (Em7) (G2) (G) (Em) (A2) (A7)
Eb Fm7 Ab2 Ab Fm Bb2 Bb7
holiness in glory, living, loving God.
setting each equation genius at play:
caring and forgiving till we're reconciled:
glad of good surprises, wiser than despair:
crying out for justice, giving all you have:
closer yet than breathing, everlasting home:
Hail and Hosanna! Bring many names!
Hail and Hosanna, strong mother God!
Hail and Hosanna, warm father God!
Hail and Hosanna, old, aching God!
Hail and Hosanna, young, growing God!
Hail and Hosanna, great, living God!
As God has given us peace through Christ,
so let us pass the peace of Christ to each other.
Lord, let it be so. Amen.
Scripture Reading
Luke 11:1-13
He was praying in a certain place, and after he had finished, one of his disciples said to him, “Lord, teach us to pray, as John taught his disciples.” He said to them, “When you pray, say:
Father, hallowed be your name.
Your kingdom come.
Give us each day our daily bread.
And forgive us our sins,
for we ourselves forgive everyone indebted to us.
And do not bring us to the time of trial.”
And he said to them, “Suppose one of you has a friend, and you go to him at midnight and say to him, ‘Friend, lend me three loaves of bread, for a friend of mine has arrived, and I have nothing to set before him.’ And he answers from within, ‘Do not bother me; the door has already been locked, and my children are with me in bed; I cannot get up and give you anything.’ I tell you, even though he will not get up and give him anything because he is his friend, at least because of his persistence he will get up and give him whatever he needs.
“So I say to you, Ask, and it will be given you; search, and you will find; knock, and the door will be opened for you. For everyone who asks receives, and everyone who searches finds, and for everyone who knocks, the door will be opened. Is there anyone among you who, if your child asks for a fish, will give a snake instead of a fish? Or if the child asks for an egg, will give a scorpion? If you then, who are evil, know how to give good gifts to your children, how much more will the heavenly Father give the Holy Spirit to those who ask him!”
The Word of the Lord.
Thanks be to God.
Prayers of the People and The Lord’s Prayer
Xhosa
Ma - ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma -
English
Your will (Your will) be done on earth, O Lord. Your
ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma - ye nzi -
will (Your will) be done on earth, O Lord. Your will be
we ’nta - ndo ya - kho. Ma - ye nzi - we ’nta -
done on earth, O Lord. Your will be done on
ndo ya - kho. Ma - ye nzi - we ’nta - ndo ya - kho.
earth, O Lord. Your will be done on earth, O Lord.
Responsive Reading:
Isaiah wrote that God is a mother to us,
comforting and carrying us in her arms:
As a mother comforts her child, so will I comfort you... (Isa. 66:13)
Loving Lord, thank you for your tender care.
Isaiah also wrote that God would never forget us.
He knows each of us, like a mother knows her own children:
Can a mother forget the baby at her breast
and have no compassion on the child she has borne?
Though she may forget, I will not forget you! (Isa.49:15)
Loving Lord, thank you for your tender care.
David wrote that in God's presence, he was quiet and at peace,
trusting his mother God like a child safe in loving arms:
But I have stilled and quietened my soul;
like a weaned child with its mother,
like a weaned child is my soul within me. (Psalm 131:2)
Loving Lord, thank you for your tender care.
Jesus spoke of himself as a mother,
longing to wrap his arms around us,
like a mother hen gathers her chicks under her wings:
O Jerusalem, Jerusalem...
how often I have longed to gather your children together,
as a hen gathers her chicks under her wings,
but you were not willing (Matthew 23:37)
Loving Lord, thank you for your tender care.
Paul writes about his missionary ministry
and likens his work to that of a nurse who looks after those in her care:
...but we were gentle among you,
like a mother caring for her little children. (1 Thessalonians 2:7)
Loving Lord, thank you for your tender care.
Hymn
Praise, My Soul, the King of Heaven
Like a loving parent caring, God knows well our feeble frame,
gladly all our burdens bearing, still to countless years the same.
Alleluia! Alleluia! All within me, praise God’s name!
Offertory Sentence
Offertory
Message
Carol McEntyre
Preparation for Communion
Chancel Choir
As Tender as a Mother Hen
As tender as a mother hen
who spreads her wings to shield her brood,
Christ Jesus stretches out his arms
and sheds his life as holy food.
We seek his pattern in our hearts,
amazed by such unselfish grace,
and tend the children of the world
in whom we see God’s face.
Courageous as a mother bear
who guards her young from danger’s path,
Christ Jesus wields his zealous love
and shows the gift of rightful wrath.
We heed his call, opposing pow’rs
that thwart the cause of life and health,
and strive to reach the prophets’ dreams
to build God’s Commonwealth.
A phoenix rising from the flames,
a mother eagle, soaring high,
Christ Jesus lifts the weary world
and conquers death for all who die.
In him, we find our strength renewed,
and, mounting up on fledgling wings,
we rise to share the gospel hope
that resurrection brings!
Gathering at the Table of Our Lord
Words of Invitation
Prayer of Thanksgiving
Words of Institution
The Bread Broken, the Cup Shared
Prayer (unison)
Source of life, and breath, and being, breathe into the dry dust of our existence. Nourished in body by bread and juice, may we strive for the nourishment of all bodies: may we work to end hunger in this creation that provides amply for all. Nourished in spirit by the Body which is within our own, may we strive for the incorporation of all: may we work to break the barriers that divide us from one another and from you. In the love that sustains us, and the Spirit that animates us, may we give all thanks and praise to you, O God of all. Amen.
†Hymn of Response Guide Me, O Thou Great Jehovah
†Benediction
Postlude
John Hall, a Deacon, has been a member of First Baptist for at least 20 years, though for about four years he and his wife Sandy were working/serving in New Zealand. Their children, Mandy and Crystal, grew up here, and both John and Sandy have taught, preached, sung or served in many areas of church life. John is a psychiatrist as well as a chaplain. He is the doting grandfather to three fine children. You may want to check out his bow tie collection!
The quote before today’s greeting is from the World in Prayer website (http://www.worldinprayer.org/).
The responsive reading is from the Barnabas in Churches website (http://www.barnabasinchurches.org.uk/)
Communion anthem text: Mary Louise Bringle, 2003: © 2006, GIA Publications, Inc.
The prayer of thanksgiving following Communion is written by Eliza Buchakjian-Tweedy, Pastor at First Church Congregational, Rochester, NH. She blogs at http://sermonizing.wordpress.com/
**Week at a Glance**
**Sunday, August 7**
- 9:15 am Awakening Worship
- Fellowship Hall
- 10:15 Sunday Morning Small Groups
- Parlor
- 11:15 Traditional Worship
- Sanctuary
- 3:00-5:00 Oakland Pool
**Tuesday, August 9**
- 5:30 pm Trustee Meeting
- Conference Room
**Thursday, August 11**
- 6:30 pm Praise Band Rehearsal
- Fellowship Hall
**Sunday, August 14**
- 9:15 am Awakening Worship
- Fellowship Hall
- 10:15 am Small Groups
- Various Classrooms
- 11:15 am Traditional Worship
- Sanctuary
Do you want to know God more?
This fall, Pastor Carol McEntyre will be leading two Covenant Groups that will focus on creating the space in our lives to hear from Christ through the spiritual practices. Specifically, the groups will focus on the Spiritual Practices of solitude, scripture reading, prayer, honoring the body, self-examination, discernment and Sabbath. Each group will meet just once a month to allow time to try out the practices. The evening group will meet the first Tuesday of every month beginning September 6. The afternoon group will meet on Thursdays beginning September 8 at 1:00 pm. The groups are capped at 10 participants each to allow for intimacy and community. It is also important that participants really commit to attending the meetings and making time for the practices between meetings. The cost for the group materials is $20 per person. If you are interested in signing up or want to know more email me at [email protected] or call the church office at 442-1149.
Join Us for Some Fun in the Sun!
First Baptist children and youth—and friends and family—will be swimming at Oakland Pool on Sunday, August 7, from 3-5 pm.
Back to School Playground Rejuvenation Event
The Child Development Center would like to invite First Baptist Church to the “Back to School Playground Rejuvenation Event.” It will be held on Tuesday, August 9, from 6-7:30 pm. A rain date is set for August 10. We will be working on flower beds, raking and spreading mulch, trimming trees, and weeding.
Safe Seminar Sexual Awareness and Family Empowerment
Save the date: September 23-25.
Beginning August 14th: Sunday Morning Small Group Opportunities at 10:15 am
The Community Small Group is an inter-generational group that focuses on God's call to live in community with one another. We meet in the conference room. We rotate facilitators and our discussion tends towards how do we, as a community of Christ's followers, live in today's world in a meaningful way. After the special summer series is concluded, we will be picking up a study by Baptist Ethics Daily titled "The Practice of Living Faithfully." We look for a curriculum that is unified, but not linear, making it easy for members to miss a week and not feel behind in the discussion. We hope that you will join our community!
The Faith Forum Class is a diverse group that likes to read the lesson for the day and share information and ask questions to learn from one another. We try to put the lesson in context to our personal lives and current events. The class does not have a teacher but all help with the learning. Charles Hunter helps guide the discussion. Anyone is welcome, any Sunday you want to stop in. We meet in E-2 by the elevator. We would love to have you visit.
Young(ish) Adult Group is made up of people who are 25-39(ish) who are single and married, with kids and without. We meet in the library outside the church offices. We will be continuing our series on Friendship First. Learning how to develop stronger friendships with each other as well as developing our relationship with God. The facilitator is Sherry Wyatt. Come join us!
On August 14, the Discussion Class will begin a 10 week study in Paul's letter to the Roman Christians. Romans has a unique place in the letters of Paul in the New Testament and has had a profound influence in the history of the Christian church. We invite you to join us for these studies.
11:15 am Traditional Worship Service
For those who may prefer a more contemporary worship experience, First Baptist Church offers Awakening worship at 9:15 a.m. each Sunday morning in the Fellowship Hall.
The flowers are given by Mimi Wingo in memory of her son, Russell.
Nursery: (ages birth-three) located on the first floor outside the sanctuary and is available from 9:15-12:15 while parents are in worship or Sunday Morning Small Groups.
Extended Session: children ages 3-5 including kindergarten may be dropped off during both worship services in the nursery for extended session, an extension of First Kids Sunday School.
10:15 Spiritual Formation Hour:
First Kids Sunday School (3 year olds through 5th grade) is on the third floor.
Youth Bible Study (grades 6-12) is on the third floor.
Adult Small Groups are combined for the summer, through August 7th, and meet in the parlor.
First Baptist Church partners in mission with the American Baptist Churches USA, Cooperative Baptist Fellowship, and Alliance of Baptists.
To view the live webcast of our 11:15 am Traditional worship service, go to www.ustream.tv.
Search for fbcwebcast (one word), and you should be able to worship from anywhere!
Songs printed in bulletin by permission, CCLI #1515189 & OneLicense.net #A-707314.
1112 E. Broadway | 573-442-1149 | www.fbc-columbia.org
Church Staff
Carol McEntyre, Senior Pastor † Ed Rollins, Associate Pastor
Michael McEntyre, Associate Pastor of Youth, College and young Adults, and Missions
Yvette Chambers, Director of Children’s Ministry
Alex Bennett, Awakening Worship Coordinator † Colleen Ostercamp, Pianist and Organist
Janet Deneke, Admin. Assistant † Brenda Rice, Project Coordinator
†Meredith Green, Nursery Director †Glenn Owings, Custodian
|
<urn:uuid:ad011850-d75d-423e-b551-fbf5e2ad63e0>
|
CC-MAIN-2019-09
|
http://7ffc9220db43b137ec33-c0a241f2f906a5e5aab3168fc1bcb7c6.r46.cf2.rackcdn.com/uploaded/t/0e5312671_1470424939_traditional-bulletin-8-7-16docx.pdf
|
2019-02-22T11:55:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247517815.83/warc/CC-MAIN-20190222114817-20190222140817-00132.warc.gz
| 4,091,343
| 3,544
|
eng_Latn
|
eng_Latn
| 0.90835
|
eng_Latn
| 0.996102
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"nso_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
419,
1183,
2258,
3942,
4423,
5855,
7036,
7811,
9262,
10270,
12693,
14469
] |
"As truly as God is our father, so just as truly is God our mother. In our father, God Almighty, we have our being; in our merciful mother we are re-made and restored. Our fragmented lives are knit together and made perfect. And by giving and yielding ourselves, through grace, to the Holy Spirit we are made whole."
~ Julian of Norwich
Greeting
Ed Rollins
Invitation to Worship
Meditation on the many names of God
Prelude
Call to Worship (responsive)
Creator God, we gather on this new day of your creation to worship you.
Shepherd God, we follow where you lead.
Merciful God, in your love, re-make us.
Compassionate God, bring grace and forgiveness to our lives.
Comforting God, in our grief and pain, lift us from despair.
Mothering God, gently gather your people.
Fathering God, embrace us with your unending love.
Nourishing God, feed us and strengthen us.
Weeping God, who knows our sorrow, dry our tears.
Everlasting God, you are everywhere and right here.
Open our hearts and minds to worship you, the God of many names.
The Many Names of God
Carol McEntyre
†Processional Hymn (see next page) Bring Many Names
(Please turn to face the cross as it enters)
1 Bring many names, beautiful and good,
2 Strong mother God, working night and day,
3 Warm father God, hugging every child,
4 Old, aching God, gray with endless care,
5 Young, growing God, eager, on the move,
6 Great, living God, never fully known,
(D) (Em7) (D/F#) (Em) (Asus) (A7)
Eb Fm7 Eb/G Fm Bb/sus Bb7
celebrate, in parable and story,
planning all the wonders of creation,
feeling all the strains of human living,
calmly piercing evil's new disguises,
saying no to falsehood and unkindness,
joyful darkness far beyond our seeing,
(D) (Em7) (G2) (G) (Em) (A2) (A7)
Eb Fm7 Ab2 Ab Fm Bb2 Bb7
holiness in glory, living, loving God.
setting each equation genius at play:
caring and forgiving till we're reconciled:
glad of good surprises, wiser than despair:
crying out for justice, giving all you have:
closer yet than breathing, everlasting home:
Hail and Hosanna! Bring many names!
Hail and Hosanna, strong mother God!
Hail and Hosanna, warm father God!
Hail and Hosanna, old, aching God!
Hail and Hosanna, young, growing God!
Hail and Hosanna, great, living God!
As God has given us peace through Christ,
so let us pass the peace of Christ to each other.
Lord, let it be so. Amen.
Scripture Reading
Luke 11:1-13
He was praying in a certain place, and after he had finished, one of his disciples said to him, “Lord, teach us to pray, as John taught his disciples.” He said to them, “When you pray, say:
Father, hallowed be your name.
Your kingdom come.
Give us each day our daily bread.
And forgive us our sins,
for we ourselves forgive everyone indebted to us.
And do not bring us to the time of trial.”
And he said to them, “Suppose one of you has a friend, and you go to him at midnight and say to him, ‘Friend, lend me three loaves of bread, for a friend of mine has arrived, and I have nothing to set before him.’ And he answers from within, ‘Do not bother me; the door has already been locked, and my children are with me in bed; I cannot get up and give you anything.’ I tell you, even though he will not get up and give him anything because he is his friend, at least because of his persistence he will get up and give him whatever he needs.
“So I say to you, Ask, and it will be given you; search, and you will find; knock, and the door will be opened for you. For everyone who asks receives, and everyone who searches finds, and for everyone who knocks, the door will be opened. Is there anyone among you who, if your child asks for a fish, will give a snake instead of a fish? Or if the child asks for an egg, will give a scorpion? If you then, who are evil, know how to give good gifts to your children, how much more will the heavenly Father give the Holy Spirit to those who ask him!”
The Word of the Lord.
Thanks be to God.
Prayers of the People and The Lord’s Prayer
Xhosa
Ma - ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma -
English
Your will (Your will) be done on earth, O Lord. Your
ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma - ye nzi -
will (Your will) be done on earth, O Lord. Your will be
we ’nta - ndo ya - kho. Ma - ye nzi - we ’nta -
done on earth, O Lord. Your will be done on
ndo ya - kho. Ma - ye nzi - we ’nta - ndo ya - kho.
earth, O Lord. Your will be done on earth, O Lord.
Responsive Reading:
Isaiah wrote that God is a mother to us,
comforting and carrying us in her arms:
As a mother comforts her child, so will I comfort you... (Isa. 66:13)
Loving Lord, thank you for your tender care.
Isaiah also wrote that God would never forget us.
He knows each of us, like a mother knows her own children:
Can a mother forget the baby at her breast
and have no compassion on the child she has borne?
Though she may forget, I will not forget you! (Isa.49:15)
Loving Lord, thank you for your tender care.
David wrote that in God's presence, he was quiet and at peace,
trusting his mother God like a child safe in loving arms:
But I have stilled and quietened my soul;
like a weaned child with its mother,
like a weaned child is my soul within me. (Psalm 131:2)
Loving Lord, thank you for your tender care.
Jesus spoke of himself as a mother,
longing to wrap his arms around us,
like a mother hen gathers her chicks under her wings:
O Jerusalem, Jerusalem...
how often I have longed to gather your children together,
as a hen gathers her chicks under her wings,
but you were not willing (Matthew 23:37)
Loving Lord, thank you for your tender care.
Paul writes about his missionary ministry
and likens his work to that of a nurse who looks after those in her care:
...but we were gentle among you,
like a mother caring for her little children. (1 Thessalonians 2:7)
Loving Lord, thank you for your tender care.
Hymn
Praise, My Soul, the King of Heaven
Like a loving parent caring, God knows well our feeble frame,
gladly all our burdens bearing, still to countless years the same.
Alleluia! Alleluia! All within me, praise God’s name!
Offertory Sentence
Offertory
Message
Carol McEntyre
Preparation for Communion
Chancel Choir
As Tender as a Mother Hen
As tender as a mother hen
who spreads her wings to shield her brood,
Christ Jesus stretches out his arms
and sheds his life as holy food.
We seek his pattern in our hearts,
amazed by such unselfish grace,
and tend the children of the world
in whom we see God’s face.
Courageous as a mother bear
who guards her young from danger’s path,
Christ Jesus wields his zealous love
and shows the gift of rightful wrath.
We heed his call, opposing pow’rs
that thwart the cause of life and health,
and strive to reach the prophets’ dreams
to build God’s Commonwealth.
A phoenix rising from the flames,
a mother eagle, soaring high,
Christ Jesus lifts the weary world
and conquers death for all who die.
In him, we find our strength renewed,
and, mounting up on fledgling wings,
we rise to share the gospel hope
that resurrection brings!
Gathering at the Table of Our Lord
Words of Invitation
Prayer of Thanksgiving
Words of Institution
The Bread Broken, the Cup Shared
Prayer (unison)
Source of life, and breath, and being, breathe into the dry dust of our existence. Nourished in body by bread and juice, may we strive for the nourishment of all bodies: may we work to end hunger in this creation that provides amply for all. Nourished in spirit by the Body which is within our own, may we strive for the incorporation of all: may we work to break the barriers that divide us from one another and from you. In the love that sustains us, and the Spirit that animates us, may we give all thanks and praise to you, O God of all. Amen.
†Hymn of Response Guide Me, O Thou Great Jehovah
†Benediction
Postlude
John Hall, a Deacon, has been a member of First Baptist for at least 20 years, though for about four years he and his wife Sandy were working/serving in New Zealand. Their children, Mandy and Crystal, grew up here, and both John and Sandy have taught, preached, sung or served in many areas of church life. John is a psychiatrist as well as a chaplain. He is the doting grandfather to three fine children. You may want to check out his bow tie collection!
The quote before today’s greeting is from the World in Prayer website (http://www.worldinprayer.org/).
The responsive reading is from the Barnabas in Churches website (http://www.barnabasinchurches.org.uk/)
Communion anthem text: Mary Louise Bringle, 2003: © 2006, GIA Publications, Inc.
The prayer of thanksgiving following Communion is written by Eliza Buchakjian-Tweedy, Pastor at First Church Congregational, Rochester, NH. She blogs at http://sermonizing.wordpress.com/
**Week at a Glance**
**Sunday, August 7**
- 9:15 am Awakening Worship
- Fellowship Hall
- 10:15 Sunday Morning Small Groups
- Parlor
- 11:15 Traditional Worship
- Sanctuary
- 3:00-5:00 Oakland Pool
**Tuesday, August 9**
- 5:30 pm Trustee Meeting
- Conference Room
**Thursday, August 11**
- 6:30 pm Praise Band Rehearsal
- Fellowship Hall
**Sunday, August 14**
- 9:15 am Awakening Worship
- Fellowship Hall
- 10:15 am Small Groups
- Various Classrooms
- 11:15 am Traditional Worship
- Sanctuary
Do you want to know God more?
This fall, Pastor Carol McEntyre will be leading two Covenant Groups that will focus on creating the space in our lives to hear from Christ through the spiritual practices. Specifically, the groups will focus on the Spiritual Practices of solitude, scripture reading, prayer, honoring the body, self-examination, discernment and Sabbath. Each group will meet just once a month to allow time to try out the practices. The evening group will meet the first Tuesday of every month beginning September 6. The afternoon group will meet on Thursdays beginning September 8 at 1:00 pm. The groups are capped at 10 participants each to allow for intimacy and community. It is also important that participants really commit to attending the meetings and making time for the practices between meetings. The cost for the group materials is $20 per person. If you are interested in signing up or want to know more email me at [email protected] or call the church office at 442-1149.
Join Us for Some Fun in the Sun!
First Baptist children and youth—and friends and family—will be swimming at Oakland Pool on Sunday, August 7, from 3-5 pm.
Back to School Playground Rejuvenation Event
The Child Development Center would like to invite First Baptist Church to the “Back to School Playground Rejuvenation Event.” It will be held on Tuesday, August 9, from 6-7:30 pm. A rain date is set for August 10. We will be working on flower beds, raking and spreading mulch, trimming trees, and weeding.
Safe Seminar Sexual Awareness and Family Empowerment
Save the date: September 23-25.
Beginning August 14th: Sunday Morning Small Group Opportunities at 10:15 am
The Community Small Group is an inter-generational group that focuses on God's call to live in community with one another. We meet in the conference room. We rotate facilitators and our discussion tends towards how do we, as a community of Christ's followers, live in today's world in a meaningful way. After the special summer series is concluded, we will be picking up a study by Baptist Ethics Daily titled "The Practice of Living Faithfully." We look for a curriculum that is unified, but not linear, making it easy for members to miss a week and not feel behind in the discussion. We h
|
ope that you will join our community!
|
The Faith Forum Class is a diverse group that likes to read the lesson for the day and share information and ask questions to learn from one another. We try to put the lesson in context to our personal lives and current events. The class does not have a teacher but all help with the learning. Charles Hunter helps guide the discussion. Anyone is welcome, any Sunday you want to stop in. We meet in E-2 by the elevator. We would love to have you visit.
Young(ish) Adult Group is made up of people who are 25-39(ish) who are single and married, with kids and without. We meet in the library outside the church offices. We will be continuing our series on Friendship First. Learning how to develop stronger friendships with each other as well as developing our relationship with God. The facilitator is Sherry Wyatt. Come join us!
On August 14, the Discussion Class will begin a 10 week study in Paul's letter to the Roman Christians. Romans has a unique place in the letters of Paul in the New Testament and has had a profound influence in the history of the Christian church. We invite you to join us for these studies.
11:15 am Traditional Worship Service
For those who may prefer a more contemporary worship experience, First Baptist Church offers Awakening worship at 9:15 a.m. each Sunday morning in the Fellowship Hall.
The flowers are given by Mimi Wingo in memory of her son, Russell.
Nursery: (ages birth-three) located on the first floor outside the sanctuary and is available from 9:15-12:15 while parents are in worship or Sunday Morning Small Groups.
Extended Session: children ages 3-5 including kindergarten may be dropped off during both worship services in the nursery for extended session, an extension of First Kids Sunday School.
10:15 Spiritual Formation Hour:
First Kids Sunday School (3 year olds through 5th grade) is on the third floor.
Youth Bible Study (grades 6-12) is on the third floor.
Adult Small Groups are combined for the summer, through August 7th, and meet in the parlor.
First Baptist Church partners in mission with the American Baptist Churches USA, Cooperative Baptist Fellowship, and Alliance of Baptists.
To view the live webcast of our 11:15 am Traditional worship service, go to www.ustream.tv.
Search for fbcwebcast (one word), and you should be able to worship from anywhere!
Songs printed in bulletin by permission, CCLI #1515189 & OneLicense.net #A-707314.
1112 E. Broadway | 573-442-1149 | www.fbc-columbia.org
Church Staff
Carol McEntyre, Senior Pastor † Ed Rollins, Associate Pastor
Michael McEntyre, Associate Pastor of Youth, College and young Adults, and Missions
Yvette Chambers, Director of Children’s Ministry
Alex Bennett, Awakening Worship Coordinator † Colleen Ostercamp, Pianist and Organist
Janet Deneke, Admin. Assistant † Brenda Rice, Project Coordinator
†Meredith Green, Nursery Director †Glenn Owings, Custodian
| 11,527
|
inside_word
|
hope
|
remove_one_sentence
|
<url>
http://7ffc9220db43b137ec33-c0a241f2f906a5e5aab3168fc1bcb7c6.r46.cf2.rackcdn.com/uploaded/t/0e5312671_1470424939_traditional-bulletin-8-7-16docx.pdf
</url>
<text>
"As truly as God is our father, so just as truly is God our mother. In our father, God Almighty, we have our being; in our merciful mother we are re-made and restored. Our fragmented lives are knit together and made perfect. And by giving and yielding ourselves, through grace, to the Holy Spirit we are made whole."
~ Julian of Norwich
Greeting
Ed Rollins
Invitation to Worship
Meditation on the many names of God
Prelude
Call to Worship (responsive)
Creator God, we gather on this new day of your creation to worship you.
Shepherd God, we follow where you lead.
Merciful God, in your love, re-make us.
Compassionate God, bring grace and forgiveness to our lives.
Comforting God, in our grief and pain, lift us from despair.
Mothering God, gently gather your people.
Fathering God, embrace us with your unending love.
Nourishing God, feed us and strengthen us.
Weeping God, who knows our sorrow, dry our tears.
Everlasting God, you are everywhere and right here.
Open our hearts and minds to worship you, the God of many names.
The Many Names of God
Carol McEntyre
†Processional Hymn (see next page) Bring Many Names
(Please turn to face the cross as it enters)
1 Bring many names, beautiful and good,
2 Strong mother God, working night and day,
3 Warm father God, hugging every child,
4 Old, aching God, gray with endless care,
5 Young, growing God, eager, on the move,
6 Great, living God, never fully known,
(D) (Em7) (D/F#) (Em) (Asus) (A7)
Eb Fm7 Eb/G Fm Bb/sus Bb7
celebrate, in parable and story,
planning all the wonders of creation,
feeling all the strains of human living,
calmly piercing evil's new disguises,
saying no to falsehood and unkindness,
joyful darkness far beyond our seeing,
(D) (Em7) (G2) (G) (Em) (A2) (A7)
Eb Fm7 Ab2 Ab Fm Bb2 Bb7
holiness in glory, living, loving God.
setting each equation genius at play:
caring and forgiving till we're reconciled:
glad of good surprises, wiser than despair:
crying out for justice, giving all you have:
closer yet than breathing, everlasting home:
Hail and Hosanna! Bring many names!
Hail and Hosanna, strong mother God!
Hail and Hosanna, warm father God!
Hail and Hosanna, old, aching God!
Hail and Hosanna, young, growing God!
Hail and Hosanna, great, living God!
As God has given us peace through Christ,
so let us pass the peace of Christ to each other.
Lord, let it be so. Amen.
Scripture Reading
Luke 11:1-13
He was praying in a certain place, and after he had finished, one of his disciples said to him, “Lord, teach us to pray, as John taught his disciples.” He said to them, “When you pray, say:
Father, hallowed be your name.
Your kingdom come.
Give us each day our daily bread.
And forgive us our sins,
for we ourselves forgive everyone indebted to us.
And do not bring us to the time of trial.”
And he said to them, “Suppose one of you has a friend, and you go to him at midnight and say to him, ‘Friend, lend me three loaves of bread, for a friend of mine has arrived, and I have nothing to set before him.’ And he answers from within, ‘Do not bother me; the door has already been locked, and my children are with me in bed; I cannot get up and give you anything.’ I tell you, even though he will not get up and give him anything because he is his friend, at least because of his persistence he will get up and give him whatever he needs.
“So I say to you, Ask, and it will be given you; search, and you will find; knock, and the door will be opened for you. For everyone who asks receives, and everyone who searches finds, and for everyone who knocks, the door will be opened. Is there anyone among you who, if your child asks for a fish, will give a snake instead of a fish? Or if the child asks for an egg, will give a scorpion? If you then, who are evil, know how to give good gifts to your children, how much more will the heavenly Father give the Holy Spirit to those who ask him!”
The Word of the Lord.
Thanks be to God.
Prayers of the People and The Lord’s Prayer
Xhosa
Ma - ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma -
English
Your will (Your will) be done on earth, O Lord. Your
ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma - ye nzi -
will (Your will) be done on earth, O Lord. Your will be
we ’nta - ndo ya - kho. Ma - ye nzi - we ’nta -
done on earth, O Lord. Your will be done on
ndo ya - kho. Ma - ye nzi - we ’nta - ndo ya - kho.
earth, O Lord. Your will be done on earth, O Lord.
Responsive Reading:
Isaiah wrote that God is a mother to us,
comforting and carrying us in her arms:
As a mother comforts her child, so will I comfort you... (Isa. 66:13)
Loving Lord, thank you for your tender care.
Isaiah also wrote that God would never forget us.
He knows each of us, like a mother knows her own children:
Can a mother forget the baby at her breast
and have no compassion on the child she has borne?
Though she may forget, I will not forget you! (Isa.49:15)
Loving Lord, thank you for your tender care.
David wrote that in God's presence, he was quiet and at peace,
trusting his mother God like a child safe in loving arms:
But I have stilled and quietened my soul;
like a weaned child with its mother,
like a weaned child is my soul within me. (Psalm 131:2)
Loving Lord, thank you for your tender care.
Jesus spoke of himself as a mother,
longing to wrap his arms around us,
like a mother hen gathers her chicks under her wings:
O Jerusalem, Jerusalem...
how often I have longed to gather your children together,
as a hen gathers her chicks under her wings,
but you were not willing (Matthew 23:37)
Loving Lord, thank you for your tender care.
Paul writes about his missionary ministry
and likens his work to that of a nurse who looks after those in her care:
...but we were gentle among you,
like a mother caring for her little children. (1 Thessalonians 2:7)
Loving Lord, thank you for your tender care.
Hymn
Praise, My Soul, the King of Heaven
Like a loving parent caring, God knows well our feeble frame,
gladly all our burdens bearing, still to countless years the same.
Alleluia! Alleluia! All within me, praise God’s name!
Offertory Sentence
Offertory
Message
Carol McEntyre
Preparation for Communion
Chancel Choir
As Tender as a Mother Hen
As tender as a mother hen
who spreads her wings to shield her brood,
Christ Jesus stretches out his arms
and sheds his life as holy food.
We seek his pattern in our hearts,
amazed by such unselfish grace,
and tend the children of the world
in whom we see God’s face.
Courageous as a mother bear
who guards her young from danger’s path,
Christ Jesus wields his zealous love
and shows the gift of rightful wrath.
We heed his call, opposing pow’rs
that thwart the cause of life and health,
and strive to reach the prophets’ dreams
to build God’s Commonwealth.
A phoenix rising from the flames,
a mother eagle, soaring high,
Christ Jesus lifts the weary world
and conquers death for all who die.
In him, we find our strength renewed,
and, mounting up on fledgling wings,
we rise to share the gospel hope
that resurrection brings!
Gathering at the Table of Our Lord
Words of Invitation
Prayer of Thanksgiving
Words of Institution
The Bread Broken, the Cup Shared
Prayer (unison)
Source of life, and breath, and being, breathe into the dry dust of our existence. Nourished in body by bread and juice, may we strive for the nourishment of all bodies: may we work to end hunger in this creation that provides amply for all. Nourished in spirit by the Body which is within our own, may we strive for the incorporation of all: may we work to break the barriers that divide us from one another and from you. In the love that sustains us, and the Spirit that animates us, may we give all thanks and praise to you, O God of all. Amen.
†Hymn of Response Guide Me, O Thou Great Jehovah
†Benediction
Postlude
John Hall, a Deacon, has been a member of First Baptist for at least 20 years, though for about four years he and his wife Sandy were working/serving in New Zealand. Their children, Mandy and Crystal, grew up here, and both John and Sandy have taught, preached, sung or served in many areas of church life. John is a psychiatrist as well as a chaplain. He is the doting grandfather to three fine children. You may want to check out his bow tie collection!
The quote before today’s greeting is from the World in Prayer website (http://www.worldinprayer.org/).
The responsive reading is from the Barnabas in Churches website (http://www.barnabasinchurches.org.uk/)
Communion anthem text: Mary Louise Bringle, 2003: © 2006, GIA Publications, Inc.
The prayer of thanksgiving following Communion is written by Eliza Buchakjian-Tweedy, Pastor at First Church Congregational, Rochester, NH. She blogs at http://sermonizing.wordpress.com/
**Week at a Glance**
**Sunday, August 7**
- 9:15 am Awakening Worship
- Fellowship Hall
- 10:15 Sunday Morning Small Groups
- Parlor
- 11:15 Traditional Worship
- Sanctuary
- 3:00-5:00 Oakland Pool
**Tuesday, August 9**
- 5:30 pm Trustee Meeting
- Conference Room
**Thursday, August 11**
- 6:30 pm Praise Band Rehearsal
- Fellowship Hall
**Sunday, August 14**
- 9:15 am Awakening Worship
- Fellowship Hall
- 10:15 am Small Groups
- Various Classrooms
- 11:15 am Traditional Worship
- Sanctuary
Do you want to know God more?
This fall, Pastor Carol McEntyre will be leading two Covenant Groups that will focus on creating the space in our lives to hear from Christ through the spiritual practices. Specifically, the groups will focus on the Spiritual Practices of solitude, scripture reading, prayer, honoring the body, self-examination, discernment and Sabbath. Each group will meet just once a month to allow time to try out the practices. The evening group will meet the first Tuesday of every month beginning September 6. The afternoon group will meet on Thursdays beginning September 8 at 1:00 pm. The groups are capped at 10 participants each to allow for intimacy and community. It is also important that participants really commit to attending the meetings and making time for the practices between meetings. The cost for the group materials is $20 per person. If you are interested in signing up or want to know more email me at [email protected] or call the church office at 442-1149.
Join Us for Some Fun in the Sun!
First Baptist children and youth—and friends and family—will be swimming at Oakland Pool on Sunday, August 7, from 3-5 pm.
Back to School Playground Rejuvenation Event
The Child Development Center would like to invite First Baptist Church to the “Back to School Playground Rejuvenation Event.” It will be held on Tuesday, August 9, from 6-7:30 pm. A rain date is set for August 10. We will be working on flower beds, raking and spreading mulch, trimming trees, and weeding.
Safe Seminar Sexual Awareness and Family Empowerment
Save the date: September 23-25.
Beginning August 14th: Sunday Morning Small Group Opportunities at 10:15 am
The Community Small Group is an inter-generational group that focuses on God's call to live in community with one another. We meet in the conference room. We rotate facilitators and our discussion tends towards how do we, as a community of Christ's followers, live in today's world in a meaningful way. After the special summer series is concluded, we will be picking up a study by Baptist Ethics Daily titled "The Practice of Living Faithfully." We look for a curriculum that is unified, but not linear, making it easy for members to miss a week and not feel behind in the discussion. We h<cursor_is_here>
The Faith Forum Class is a diverse group that likes to read the lesson for the day and share information and ask questions to learn from one another. We try to put the lesson in context to our personal lives and current events. The class does not have a teacher but all help with the learning. Charles Hunter helps guide the discussion. Anyone is welcome, any Sunday you want to stop in. We meet in E-2 by the elevator. We would love to have you visit.
Young(ish) Adult Group is made up of people who are 25-39(ish) who are single and married, with kids and without. We meet in the library outside the church offices. We will be continuing our series on Friendship First. Learning how to develop stronger friendships with each other as well as developing our relationship with God. The facilitator is Sherry Wyatt. Come join us!
On August 14, the Discussion Class will begin a 10 week study in Paul's letter to the Roman Christians. Romans has a unique place in the letters of Paul in the New Testament and has had a profound influence in the history of the Christian church. We invite you to join us for these studies.
11:15 am Traditional Worship Service
For those who may prefer a more contemporary worship experience, First Baptist Church offers Awakening worship at 9:15 a.m. each Sunday morning in the Fellowship Hall.
The flowers are given by Mimi Wingo in memory of her son, Russell.
Nursery: (ages birth-three) located on the first floor outside the sanctuary and is available from 9:15-12:15 while parents are in worship or Sunday Morning Small Groups.
Extended Session: children ages 3-5 including kindergarten may be dropped off during both worship services in the nursery for extended session, an extension of First Kids Sunday School.
10:15 Spiritual Formation Hour:
First Kids Sunday School (3 year olds through 5th grade) is on the third floor.
Youth Bible Study (grades 6-12) is on the third floor.
Adult Small Groups are combined for the summer, through August 7th, and meet in the parlor.
First Baptist Church partners in mission with the American Baptist Churches USA, Cooperative Baptist Fellowship, and Alliance of Baptists.
To view the live webcast of our 11:15 am Traditional worship service, go to www.ustream.tv.
Search for fbcwebcast (one word), and you should be able to worship from anywhere!
Songs printed in bulletin by permission, CCLI #1515189 & OneLicense.net #A-707314.
1112 E. Broadway | 573-442-1149 | www.fbc-columbia.org
Church Staff
Carol McEntyre, Senior Pastor † Ed Rollins, Associate Pastor
Michael McEntyre, Associate Pastor of Youth, College and young Adults, and Missions
Yvette Chambers, Director of Children’s Ministry
Alex Bennett, Awakening Worship Coordinator † Colleen Ostercamp, Pianist and Organist
Janet Deneke, Admin. Assistant † Brenda Rice, Project Coordinator
†Meredith Green, Nursery Director †Glenn Owings, Custodian
</text>
|
[
{
"content": "<url>\nhttp://7ffc9220db43b137ec33-c0a241f2f906a5e5aab3168fc1bcb7c6.r46.cf2.rackcdn.com/uploaded/t/0e5312671_1470424939_traditional-bulletin-8-7-16docx.pdf\n</url>\n<text>\n\"As truly as God is our father, so just as truly is God our mother. In our father, God Almighty, we have our being; in our merciful mother we are re-made and restored. Our fragmented lives are knit together and made perfect. And by giving and yielding ourselves, through grace, to the Holy Spirit we are made whole.\"\n\n~ Julian of Norwich\n\nGreeting\n\nEd Rollins\n\nInvitation to Worship\n\nMeditation on the many names of God\n\nPrelude\n\nCall to Worship (responsive)\n\nCreator God, we gather on this new day of your creation to worship you.\n\nShepherd God, we follow where you lead.\n\nMerciful God, in your love, re-make us.\n\nCompassionate God, bring grace and forgiveness to our lives.\n\nComforting God, in our grief and pain, lift us from despair.\n\nMothering God, gently gather your people.\n\nFathering God, embrace us with your unending love.\n\nNourishing God, feed us and strengthen us.\n\nWeeping God, who knows our sorrow, dry our tears.\n\nEverlasting God, you are everywhere and right here.\n\nOpen our hearts and minds to worship you, the God of many names.\n\nThe Many Names of God\n\nCarol McEntyre\n\n†Processional Hymn (see next page) Bring Many Names\n(Please turn to face the cross as it enters)\n\n1 Bring many names, beautiful and good,\n2 Strong mother God, working night and day,\n3 Warm father God, hugging every child,\n4 Old, aching God, gray with endless care,\n5 Young, growing God, eager, on the move,\n6 Great, living God, never fully known,\n\n(D) (Em7) (D/F#) (Em) (Asus) (A7)\nEb Fm7 Eb/G Fm Bb/sus Bb7\n\ncelebrate, in parable and story,\nplanning all the wonders of creation,\nfeeling all the strains of human living,\ncalmly piercing evil's new disguises,\nsaying no to falsehood and unkindness,\njoyful darkness far beyond our seeing,\n\n(D) (Em7) (G2) (G) (Em) (A2) (A7)\nEb Fm7 Ab2 Ab Fm Bb2 Bb7\n\nholiness in glory, living, loving God.\nsetting each equation genius at play:\ncaring and forgiving till we're reconciled:\nglad of good surprises, wiser than despair:\ncrying out for justice, giving all you have:\ncloser yet than breathing, everlasting home:\n\nHail and Hosanna! Bring many names!\nHail and Hosanna, strong mother God!\nHail and Hosanna, warm father God!\nHail and Hosanna, old, aching God!\nHail and Hosanna, young, growing God!\nHail and Hosanna, great, living God!\n\nAs God has given us peace through Christ,\nso let us pass the peace of Christ to each other.\n\nLord, let it be so. Amen.\n\nScripture Reading\n\nLuke 11:1-13\n\nHe was praying in a certain place, and after he had finished, one of his disciples said to him, “Lord, teach us to pray, as John taught his disciples.” He said to them, “When you pray, say:\n\nFather, hallowed be your name.\nYour kingdom come.\nGive us each day our daily bread.\nAnd forgive us our sins,\nfor we ourselves forgive everyone indebted to us.\nAnd do not bring us to the time of trial.”\n\nAnd he said to them, “Suppose one of you has a friend, and you go to him at midnight and say to him, ‘Friend, lend me three loaves of bread, for a friend of mine has arrived, and I have nothing to set before him.’ And he answers from within, ‘Do not bother me; the door has already been locked, and my children are with me in bed; I cannot get up and give you anything.’ I tell you, even though he will not get up and give him anything because he is his friend, at least because of his persistence he will get up and give him whatever he needs.\n\n“So I say to you, Ask, and it will be given you; search, and you will find; knock, and the door will be opened for you. For everyone who asks receives, and everyone who searches finds, and for everyone who knocks, the door will be opened. Is there anyone among you who, if your child asks for a fish, will give a snake instead of a fish? Or if the child asks for an egg, will give a scorpion? If you then, who are evil, know how to give good gifts to your children, how much more will the heavenly Father give the Holy Spirit to those who ask him!”\n\nThe Word of the Lord.\nThanks be to God.\n\nPrayers of the People and The Lord’s Prayer\n\nXhosa\nMa - ye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma -\n\nEnglish\nYour will (Your will) be done on earth, O Lord. Your\n\nye (Ma - ye) nzi - we ’nta - ndo ya - kho. Ma - ye nzi -\n\nwill (Your will) be done on earth, O Lord. Your will be\n\nwe ’nta - ndo ya - kho. Ma - ye nzi - we ’nta -\n\ndone on earth, O Lord. Your will be done on\n\nndo ya - kho. Ma - ye nzi - we ’nta - ndo ya - kho.\n\nearth, O Lord. Your will be done on earth, O Lord.\n\nResponsive Reading:\n\nIsaiah wrote that God is a mother to us,\ncomforting and carrying us in her arms:\nAs a mother comforts her child, so will I comfort you... (Isa. 66:13)\nLoving Lord, thank you for your tender care.\n\nIsaiah also wrote that God would never forget us.\nHe knows each of us, like a mother knows her own children:\nCan a mother forget the baby at her breast\nand have no compassion on the child she has borne?\nThough she may forget, I will not forget you! (Isa.49:15)\nLoving Lord, thank you for your tender care.\n\nDavid wrote that in God's presence, he was quiet and at peace,\ntrusting his mother God like a child safe in loving arms:\nBut I have stilled and quietened my soul;\nlike a weaned child with its mother,\nlike a weaned child is my soul within me. (Psalm 131:2)\nLoving Lord, thank you for your tender care.\n\nJesus spoke of himself as a mother,\nlonging to wrap his arms around us,\nlike a mother hen gathers her chicks under her wings:\nO Jerusalem, Jerusalem...\nhow often I have longed to gather your children together,\nas a hen gathers her chicks under her wings,\nbut you were not willing (Matthew 23:37)\nLoving Lord, thank you for your tender care.\n\nPaul writes about his missionary ministry\nand likens his work to that of a nurse who looks after those in her care:\n...but we were gentle among you,\nlike a mother caring for her little children. (1 Thessalonians 2:7)\nLoving Lord, thank you for your tender care.\n\nHymn\n\nPraise, My Soul, the King of Heaven\n\nLike a loving parent caring, God knows well our feeble frame,\ngladly all our burdens bearing, still to countless years the same.\nAlleluia! Alleluia! All within me, praise God’s name!\n\nOffertory Sentence\n\nOffertory\n\nMessage\n\nCarol McEntyre\n\nPreparation for Communion\n\nChancel Choir\n\nAs Tender as a Mother Hen\n\nAs tender as a mother hen\nwho spreads her wings to shield her brood,\nChrist Jesus stretches out his arms\nand sheds his life as holy food.\nWe seek his pattern in our hearts,\namazed by such unselfish grace,\nand tend the children of the world\nin whom we see God’s face.\n\nCourageous as a mother bear\nwho guards her young from danger’s path,\nChrist Jesus wields his zealous love\nand shows the gift of rightful wrath.\nWe heed his call, opposing pow’rs\nthat thwart the cause of life and health,\nand strive to reach the prophets’ dreams\nto build God’s Commonwealth.\n\nA phoenix rising from the flames,\na mother eagle, soaring high,\nChrist Jesus lifts the weary world\nand conquers death for all who die.\nIn him, we find our strength renewed,\nand, mounting up on fledgling wings,\nwe rise to share the gospel hope\nthat resurrection brings!\n\nGathering at the Table of Our Lord\n\nWords of Invitation\nPrayer of Thanksgiving\nWords of Institution\nThe Bread Broken, the Cup Shared\n\nPrayer (unison)\n\nSource of life, and breath, and being, breathe into the dry dust of our existence. Nourished in body by bread and juice, may we strive for the nourishment of all bodies: may we work to end hunger in this creation that provides amply for all. Nourished in spirit by the Body which is within our own, may we strive for the incorporation of all: may we work to break the barriers that divide us from one another and from you. In the love that sustains us, and the Spirit that animates us, may we give all thanks and praise to you, O God of all. Amen.\n\n†Hymn of Response Guide Me, O Thou Great Jehovah\n\n†Benediction\n\nPostlude\n\nJohn Hall, a Deacon, has been a member of First Baptist for at least 20 years, though for about four years he and his wife Sandy were working/serving in New Zealand. Their children, Mandy and Crystal, grew up here, and both John and Sandy have taught, preached, sung or served in many areas of church life. John is a psychiatrist as well as a chaplain. He is the doting grandfather to three fine children. You may want to check out his bow tie collection!\n\nThe quote before today’s greeting is from the World in Prayer website (http://www.worldinprayer.org/).\n\nThe responsive reading is from the Barnabas in Churches website (http://www.barnabasinchurches.org.uk/)\n\nCommunion anthem text: Mary Louise Bringle, 2003: © 2006, GIA Publications, Inc.\n\nThe prayer of thanksgiving following Communion is written by Eliza Buchakjian-Tweedy, Pastor at First Church Congregational, Rochester, NH. She blogs at http://sermonizing.wordpress.com/\n\n**Week at a Glance**\n\n**Sunday, August 7**\n- 9:15 am Awakening Worship\n - Fellowship Hall\n- 10:15 Sunday Morning Small Groups\n - Parlor\n- 11:15 Traditional Worship\n - Sanctuary\n- 3:00-5:00 Oakland Pool\n\n**Tuesday, August 9**\n- 5:30 pm Trustee Meeting\n - Conference Room\n\n**Thursday, August 11**\n- 6:30 pm Praise Band Rehearsal\n - Fellowship Hall\n\n**Sunday, August 14**\n- 9:15 am Awakening Worship\n - Fellowship Hall\n- 10:15 am Small Groups\n - Various Classrooms\n- 11:15 am Traditional Worship\n - Sanctuary\n\nDo you want to know God more?\n\nThis fall, Pastor Carol McEntyre will be leading two Covenant Groups that will focus on creating the space in our lives to hear from Christ through the spiritual practices. Specifically, the groups will focus on the Spiritual Practices of solitude, scripture reading, prayer, honoring the body, self-examination, discernment and Sabbath. Each group will meet just once a month to allow time to try out the practices. The evening group will meet the first Tuesday of every month beginning September 6. The afternoon group will meet on Thursdays beginning September 8 at 1:00 pm. The groups are capped at 10 participants each to allow for intimacy and community. It is also important that participants really commit to attending the meetings and making time for the practices between meetings. The cost for the group materials is $20 per person. If you are interested in signing up or want to know more email me at [email protected] or call the church office at 442-1149.\n\nJoin Us for Some Fun in the Sun!\nFirst Baptist children and youth—and friends and family—will be swimming at Oakland Pool on Sunday, August 7, from 3-5 pm.\n\nBack to School Playground Rejuvenation Event\nThe Child Development Center would like to invite First Baptist Church to the “Back to School Playground Rejuvenation Event.” It will be held on Tuesday, August 9, from 6-7:30 pm. A rain date is set for August 10. We will be working on flower beds, raking and spreading mulch, trimming trees, and weeding.\n\nSafe Seminar Sexual Awareness and Family Empowerment\nSave the date: September 23-25.\n\nBeginning August 14th: Sunday Morning Small Group Opportunities at 10:15 am\nThe Community Small Group is an inter-generational group that focuses on God's call to live in community with one another. We meet in the conference room. We rotate facilitators and our discussion tends towards how do we, as a community of Christ's followers, live in today's world in a meaningful way. After the special summer series is concluded, we will be picking up a study by Baptist Ethics Daily titled \"The Practice of Living Faithfully.\" We look for a curriculum that is unified, but not linear, making it easy for members to miss a week and not feel behind in the discussion. We h<cursor_is_here>\n\nThe Faith Forum Class is a diverse group that likes to read the lesson for the day and share information and ask questions to learn from one another. We try to put the lesson in context to our personal lives and current events. The class does not have a teacher but all help with the learning. Charles Hunter helps guide the discussion. Anyone is welcome, any Sunday you want to stop in. We meet in E-2 by the elevator. We would love to have you visit.\n\nYoung(ish) Adult Group is made up of people who are 25-39(ish) who are single and married, with kids and without. We meet in the library outside the church offices. We will be continuing our series on Friendship First. Learning how to develop stronger friendships with each other as well as developing our relationship with God. The facilitator is Sherry Wyatt. Come join us!\n\nOn August 14, the Discussion Class will begin a 10 week study in Paul's letter to the Roman Christians. Romans has a unique place in the letters of Paul in the New Testament and has had a profound influence in the history of the Christian church. We invite you to join us for these studies.\n\n11:15 am Traditional Worship Service\n\nFor those who may prefer a more contemporary worship experience, First Baptist Church offers Awakening worship at 9:15 a.m. each Sunday morning in the Fellowship Hall.\n\nThe flowers are given by Mimi Wingo in memory of her son, Russell.\n\nNursery: (ages birth-three) located on the first floor outside the sanctuary and is available from 9:15-12:15 while parents are in worship or Sunday Morning Small Groups.\nExtended Session: children ages 3-5 including kindergarten may be dropped off during both worship services in the nursery for extended session, an extension of First Kids Sunday School.\n10:15 Spiritual Formation Hour:\n First Kids Sunday School (3 year olds through 5th grade) is on the third floor.\n Youth Bible Study (grades 6-12) is on the third floor.\n Adult Small Groups are combined for the summer, through August 7th, and meet in the parlor.\n\nFirst Baptist Church partners in mission with the American Baptist Churches USA, Cooperative Baptist Fellowship, and Alliance of Baptists.\n\nTo view the live webcast of our 11:15 am Traditional worship service, go to www.ustream.tv.\nSearch for fbcwebcast (one word), and you should be able to worship from anywhere!\n\nSongs printed in bulletin by permission, CCLI #1515189 & OneLicense.net #A-707314.\n\n1112 E. Broadway | 573-442-1149 | www.fbc-columbia.org\n\nChurch Staff\nCarol McEntyre, Senior Pastor † Ed Rollins, Associate Pastor\nMichael McEntyre, Associate Pastor of Youth, College and young Adults, and Missions\nYvette Chambers, Director of Children’s Ministry\nAlex Bennett, Awakening Worship Coordinator † Colleen Ostercamp, Pianist and Organist\nJanet Deneke, Admin. Assistant † Brenda Rice, Project Coordinator\n†Meredith Green, Nursery Director †Glenn Owings, Custodian\n</text>\n",
"role": "user"
},
{
"content": "ope that you will join our community!",
"role": "assistant"
}
] |
Persuasion as Education for Computer Security
Alain Forget School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]
Sonia Chiasson School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]
Robert Biddle Human-Oriented Technology Lab
Carleton University Ottawa, Canada [email protected]
Abstract: Most organisations realise the importance of computer security, yet many struggle with how to teach and influence their users to behave securely. Despite existing research on new instructions and security measures, users create memorable but insecure passwords. In an effort to teach users how to behave more securely, we present the Persuasive Authentication Framework, which applies persuasive technology to authentication mechanisms. Furthermore, we describe some examples of how the framework can be applied to existing authentication systems.
Introduction
Despite existing research on improved instructions and authentication schemes, users still do not create secure passwords (Yan et al. 2004), either because they do not understand how to do so or because strong passwords are too difficult to remember and use. Furthermore, there are numerous social factors and pressures influencing users to behave insecurely (Weirich & Sasse 2001). Finally, security is a secondary task for most users (Whitten & Tygar 1999), often viewed as impeding the completion their primary task. Therefore, users desire security to be quick and easy.
Rather than continuing to drill users with instructions and cumbersome security measures, we propose using Persuasive Technology (PT) to teach users how to behave more securely and why it is important to do so. By applying PT principles to existing authentication methods, we can directly influence and motivate users to create more secure passwords. In doing so, we empower users to better protect themselves and their organisations from attackers. In this paper, we present the Persuasive Authentication Framework; a framework for applying PT principles to authentication schemes requiring user-chosen passwords. Our goal is to help users create stronger passwords while educating them on how to behave more securely. This applied method of coaching enables users to continue creating strong passwords even when using authentication systems that do not make use of PT.
The paper is structured as follows: We first offer some background on past efforts to help users to choose and remember more secure passwords, as well as an outline of persuasive technology and some of its current applications. Next, we describe our framework for utilising PT to educate users on how to behave more securely. The paper concludes with a general discussion and some final comments about the applicability of our framework.
Background
Usable security is a new research area combining human-computer interaction and computer security. A few inherent properties of computer security make for a challenging user interface design process and make it difficult to teach and motivate users to behave in the desired manner. While these often lead to the dismissal that "users are unmotivated", the issues require closer investigation:
* Security is a secondary task (Whitten & Tygar 1999); if the security tasks hinder users' primary tasks, they will bypass the security to accomplish said tasks.
* Users also have a poor mental model of security due to the complexity of security systems (Chiasson et al. 2006). They typically underestimate or misunderstand the consequences of insecure actions. In fact, they may not even realise that their actions put them (or others) at risk in the first place.
* Computer security also suffers from the "barn door" property (Whitten & Tygar 1999); if private information is even briefly exposed, there is no way to guarantee that it has not been compromised.
* Users are concerned about privacy and security when they can see the direct risks and impact on their lives (Shostack & Syverson 2004). Unfortunately, users typically only reach this awareness once their privacy and security has already been severely breached.
Users tend to create easily-recalled but insecure passwords (Sasse et al. 1999). While this is partially attributable to users' poor mental models of security in general, a second reason is that human memory is limited. Users are simply unable to remember a unique sequence of random characters as a password for each of their accounts. Requirements like mandatory password changes further increase the memory load. In an effort to cope, users choose very memorable but insecure passwords. Efforts at convincing users to select more secure text passwords have found only limited success. Strategies include providing instructions on the creation of secure and memorable passwords, as well as encouraging users to base their passwords on a memorable phrase (Kuo et al. 2006).
Alternative forms of authentication have been suggested to improve the memorability and security of usercreated passwords (Renaud 2005). Various forms of graphical passwords (Suo et al. 2005) have been proposed because people are better at recalling images than text (Nelson et al. 1976). For click-based graphical passwords, a password consists of clicking on a sequence of points on an image. One example is PassPoints (Wiedenbeck et al. 2005), where users clicked on five points in a given image. Unfortunately, testing found that users selected similar click-points, forming predictable "hotspots" that attackers can exploit (Thorpe et al. 2007).
Persuasive Technology is a new psychological framework proposed by B.J. Fogg at Stanford University. Fogg defines persuasive technology (PT) as "interactive computing systems designed to change people's attitudes and behaviours" (Fogg 2003). He describes sets of persuasive tools, media, and social cues that products may leverage to encourage users to behave in the desired manner. Persuasive tools render tasks quicker and easier to accomplish, persuasive media can convey messages through numerous representations, and persuasive social cues can help products appear friendly, knowledgeable, and trustworthy.
Each of the three aforementioned persuasive roles is associated with a set of persuasion strategies. Which strategies to employ depends on many factors, such as the topic, medium, target audience, and desired persuasive strength. Elements of persuasive technology are already evident in existing educational endeavours. For example, an application encouraging literacy in Chilean children (Lucero et al. 2006) utilises PT. By captivating the children's imagination through multimedia and fun activities, they can be persuaded to learn more about the characters in the application, leading the children to read and write about them.
Many other e-learning systems also apply strategies that employ persuasion. The "Clinical Nursing Practicum" (Lai et al. 2006) was taught through a mobile learning environment on students' PDAs, granting easy access to detailed information and contact with instructors as needed. The persuasive elements in this system included reduction, timely suggestions, and customisation.
Perhaps the most significant application of PT is in building thought-provoking persuasive games (Bogost 2007). Persuasive games aim to educate players about political, socio-economical, nutritional, environmental, and other topical issues. Although general persuasion has been used in various applications, PT has yet to be systematically applied to educating users about security.
The Persuasive Authentication Framework
Since current methods of assisting users to create more secure passwords have proven ineffective, we propose employing persuasive technology to educate users on creating memorable passwords that are also secure. Persuasion is a means of influencing others and is used to a certain degree in most daily interactions. With respect to computer security, our goal is to assist, motivate, influence, and educate users on:
* how to choose a password likely to be secure on any system;
* the importance of security and the actual threats and consequences to the users and their organisation;
* how to behave securely and utilise coping strategies to minimise the memory load.
Whereas it is impractical to have a human coach available at all times to influence user behaviour whenever computer security tasks arise, the computer will always be present. We therefore propose that the coaching and persuasion responsibilities be shifted to the computer. The computer also has the advantages of being consistent, persistent, precise, and potentially unobtrusive for some of the more subtle types of persuasion. Furthermore, since we are dealing with sensitive information such as passwords, having the computer provide the advice avoids having to reveal private information to another human.
Figure 1: The Persuasive Authentication Framework
The Persuasive Authentication Framework (Figure 1) consists of five principles based on Persuasive Technology. These principles guide the use of persuasion in authentication mechanisms to teach users how to authenticate more securely. While focusing on authentication, these principles are generalisable to other areas of security as well. We suggest that several principles be applied in concert, since several together will have more persuasive power than just one. We now describe each principle and give examples of how it can be applied to authentication mechanisms. For each principle, we identify the characteristics of usable security that are addressed:
The Simplification Principle: Authentication tasks should be made as simple as possible. This includes reducing the process to the smallest number of actions as well as reducing the complexity of the remaining tasks. By simplifying the task of authentication, users can more easily form an accurate mental model of the authentication process. Since the burden of completing the task has been reduced to an acceptable level, users will then be less likely to try to circumvent the security mechanisms, even though security is a secondary task. The optimal outcome of simplification is that the desired actions form the "path of least resistance", meaning it is easier for users to perform the authentication properly than it is to evade it.
A strategy often employed in usable security is to make security interfaces "transparent" (Chiasson et al. 2006) by hiding as much as possible from users. In our opinion, this is a misguided goal that often leads to more confusion as it usually translates into insufficient feedback for users. Simplification offers an alternative to transparency that reduces the burden on users without removing vital interface cues. The simplification principle is based on the PT tools of reduction and tunnelling.
For example, password managers (Yee & Sitaker 2006) reduce the burden on users by having the computer generate and remember complex passwords for them. Users are only responsible for entering one master password to activate the program, yet each of their accounts is protected by a distinct complex password generated by the password manger. This exemplifies the path-of-least-resistance concept; rather than having to deal with multiple passwords, users only have to maintain one strong password for the password manager.
The Personalisation Principle: Customised information for individual users typically offers a more personal and engaging experience, which could be more persuasive than generic information. Users are concerned with security and privacy if they understand the implications and consequences of their actions. By offering well-timed personalised advice relating to the individual's needs, preferences, or context-of-use, the system can provide details about why the users' current behaviour is insecure and how it can be modified to be more secure. Because the information is personalised, it is likely to help improve users' mental model of security and help them understand the relevance of behaving securely. The PT tools of tailoring and suggestion form the basis of the personalisation principle.
For example, users could provide some general interests (sports, music, cartoons, etc.) to a system that would customise a mnemonic phrase (Kuo et al. 2006) to help users remember a system-assigned random password. The given mnemonic phrase could further include something relating to the website or system itself, helping users to mentally link their mnemonic phrase and password to the system. This teaches users a coping strategy for remembering passwords that they can then apply to other passwords as well.
The Monitoring Principle: When aware that they are being observed, users are more likely to perform the desired behaviour. A system tracking user performance or status can report it directly to the users, who may then adjust their behaviour in accordance with security policies. The system should provide the opportunity for users to learn what should be done to start behaving more securely. This monitoring can be automated and done entirely by the system or can report to administrators who then take action. Furthermore, events that threaten security often happen in the background, over a long period of time, or as a result of a series of user actions. These events may not be obvious to users. In these cases, monitoring can help the system recognise these circumstances and bring them to the users' attention.
There is also the additional concern of the "barn door" property where even the slightest slip can compromise computer security (Whitten & Tygar 1999). These events may not be perceived by users as a cause for concern, which makes it important that the system raises an alert. It also provides the opportunity for intervention to teach how and why this behaviour is unacceptable. Users who modify their behaviour can then see the effect as their reported performance improves. The monitoring principle stems from the self-monitoring and surveillance tools described in PT.
For example, a system monitoring user activity could detect when users begin to enter a password (or other sensitive information) into a non-password field (or other risky circumstance) and warn them about the dangers of entering this sensitive information in the wrong place. Through immediate feedback, users could become more attentive when entering sensitive data, thus keeping private information secure.
The Conditioning Principle: Computer security is concerned about potential threats and risks to the system. However, most users have little direct experience with the consequences of an attack. When users perform a mental risk analysis, they do not believe that the probability of being attacked outweighs the additional burden of correctly performing the security tasks. In these cases, we need to artificially induce the correct behaviour because the users' natural environment does not support it. With user authentication, we want to convince people to use secure passwords even though it is a secondary task. Applying various forms of reinforcement can help shape the desired behaviour or convert existing behaviours into habits. For users to learn from any conditioning strategy, there should be other techniques at work to help users understand how to create effective passwords in order to receive the rewards for behaving securely. The conditioning PT tool is the foundation of the conditioning principle. Examples of conditioning inducements in authentication systems include:
* Longer sessions without requiring users to re-enter their password.
* A smiley face with encouraging messages like, "Your password is awesome! Good job!"
* A customised icon and access to extra features and benefits.
* Having faster system response.
The Social Interaction Principle: Authentication is an activity that typically occurs in isolation; users enter a secret password while sitting at their computer. In other areas of physical security, social norms influence behaviour and encourage users to behave securely. For example, someone may think twice about trying to enter a building without the proper credentials when there is a security guard or others nearby. The social interaction principle advocates repositioning user authentication as a social activity in order to leverage these social norms.
Users are more likely to be persuaded by a system that appears to share similar attitudes, traits, personality, and social membership. Such traits can be conveyed through language that best matches the users' own style, conveying a sense of "team". Positive and supportive language, such as personally greeting, befriending, and praising users, may further compel them to begin or continue behaving securely. Additionally, the system can be positioned to represent authority, potentially adding more persuasive power. The social interaction principle is based on several PT cues for computers as social actors.
For example, users can be taught that their own insecure behaviour puts others at risk. Through wording and presentation of the security system, users may develop a sense of belonging and duty towards their organisation. For example, organisation members can be told:
* Insecure accounts compromise not only their own account but the entire system.
* Their efforts at keeping the organisation secure are crucial and appreciated.
* Everyone is counting on them to do their part.
* "Other employees have passwords this strong. You don't want to be the weakest link."
Many of these principles are based in psychology because they are aimed at influencing people's behaviour. Rather than offering strictly technical solutions to authentication problems, the Persuasive Authentication Framework recognises that users play an active role in computer security and offers a means of influencing these users to behave appropriately. Since traditional methods of influencing users through education or imposing unreasonable restrictions have not been very successful, we suggest that a system that subtly persuades users and offers concrete advice may be more successful.
Applying the Persuasive Authentication Framework
We have begun applying our Persuasive Authentication Framework to security mechanisms in order to test its effectiveness. Here we give two examples of how two existing authentication mechanisms, text-based passwords and click-based graphical passwords, can be enhanced using persuasiveness.
A text-password system could adopt a "Wheel of Fortune" or "hangman" scheme during password creation where the system randomly places a small number of uncommon characters into the password (e.g. "_ _ x _ ^ _ _ V _"), allowing users to choose the remaining characters. Should the user prefer different characters in different positions, pressing a "shuffle" button would randomly choose a new set of uncommon characters and positions. The purpose of inserting random characters at random positions is to make passwords harder for attackers to guess.
A similar system could be adopted for click-based graphical passwords, such as PassPoints (Wiedenbeck et al. 2005) or Cued Click-Points (Chiasson et al. 2007b). When creating a graphical password, users could be guided in selecting their click-points by lightly shading the entire image, except for a small area known as the viewport (see Figure 2). Users can only choose a click-point within this randomly-positioned viewport. If they are unable to find a suitable click-point, they can press the "shuffle" button to randomly reposition the viewport. The most straightforward and quickest action is to select a click-point from the first viewport. However, someone determined to reach a specific click-point can repeatedly shuffle until the viewport reaches that area.
These schemes employ the following three principles from our Persuasive Authentication Framework:
* The Simplification Principle: By anchoring a few random uncommon characters in the user's text password, the system removes the immediate need for users to devise their own secure password strategy. Furthermore, users can learn by example that the insertion of random uncommon characters in passwords leads to greater security, which they can then apply to other passwords. The viewport scheme simplifies the password creation task by providing a smaller area in which users may choose a point. The viewport discourages users from choosing hotspots as their click-points since the shuffle button will likely need to be pressed numerous times before the viewport falls on the one click-point users find the most memorable. This tedious selection process for insecure click-points persuades users to choose more random, and hence more secure, click-points.
* The Personalisation Principle: Knowing the characters and their positions are random suggests to users that these selections are unique and were chosen especially for them. This leads users to feel their password is more secure, motivating them to comply with using a password with the given inserted characters, as well as possibly applying the learnt scheme themselves to their other passwords. Similarly, in the viewport scheme, users believe that the viewport's initial random position is unique and placed especially for them, leading them to feel the area is more secure. Likewise, they are motivated to choose a click-point in the initial viewport, rather than shuffle. Since users are unlikely to have ever used a click-based graphical password, they are particularly open to advice on choosing click-points. The viewport makes its suggestion at the most opportune moment; when users are first faced with creating a graphical password.
* The Conditioning Principle: Continually pressing the shuffle button, in the hopes of finding some desired set of characters and positions, or to select one particular click-point, can be very tedious. Rendering common letter combinations and hotspots unattractive choices trains users that such decisions result in poor security. Furthermore, since it is the fastest way to create a password, complying with the system's first suggestion appeals to users since it allows them to complete this secondary task as quickly as possible.
The hangman scheme guides users in selecting their password while largely preventing the use of common words, and limits password reuse since any newly created password will have different starting characters. Users learn that uncommon character combinations and randomness improves the security of their passwords; a concept that can also be applied to other passwords. Both the hangman and viewport schemes could be respectively implemented for any text-based password system or click-based graphical password system.
We have recently implemented the viewport scheme for Cued Click-Points (CCP) (Chiasson et al. 2007b), shown in Figure 2. Using data from an in-lab user study with 20 participants, where a total of 184 trials were completed, we compared the viewport-CCP click-points to those collected from our earlier PassPoints (Chiasson et al. 2007a) and CCP studies (Chiasson et al. 2007b). We found that the viewport-CCP click-points were much more uniformly distributed, reducing hotspots. Since most participants used the shuffle button sparingly, the viewport mostly remained in its initial random position, lowering the chance of participants selecting hotspots as their clickpoints. This shows that the security viewport was successful in persuading most users to choose more random clickpoints, and thus taught users to create more secure passwords.
Discussion
Through the Persuasive Authentication Framework we have described, we hope to teach users how secure passwords can be created, empowering them to continue behaving securely even when not using a frameworkenhanced authentication mechanism. There are several advantages to using PT to educate users rather than providing traditional security instructions and imposing rules:
* A security mechanism with built-in PT teaches users how to create secure passwords in the context where the password will be used. Teaching secure behaviour in a classroom or meeting room is out of context and is unlikely to be effective.
* In regular systems, users often do not understand the security rules imposed upon them and as a result of frustration, they will either try to circumvent the security mechanism or fulfill the new requirements as minimally as possible. Using persuasion, we hope users will be more willing to comply with security rules.
* PT is interactive, giving users the opportunity to learn by doing. Traditional lecturing methods do not include hands-on ways to apply knowledge in the very environment it is meant to be used.
* PT leverages our innate cognitive abilities such that users may not even be aware they are being persuaded or taught. This minimises resistance to new security measures, particularly since properly implemented PT principles should result in a system that is easier to use.
Persuasive technology must be applied with great care, because there is always a risk of annoying users to the point that they rebel against the system. One example of this is a system proposed by Brustoloni & VillamarínSalomón (2007) intended to help protect users against phishing emails (which attempt to trick users into divulging private information, such as online bank account credentials and credit card numbers). Their warning dialog boxes changed each time they were displayed, forcing users to carefully read them before deciding on the appropriate response. Furthermore, users were required to provide justification for their actions and were audited by administrators who quarantined users who behaved insecurely. Although the authors did not explicitly use PT, many of the principles presented in this paper can be seen in their system. However, these principles are being severely misused such that users will quickly become angered at the very system that is supposed to protect them. When using the Persuasive Authentication Framework and persuasive technology in general, it is crucial to employ tactics aimed to help, assist, and teach users not only how to perform the desired action, but also why such action is beneficial for them and their organisation. Employing PT to force, scare, and coerce users to do one's bidding is counter to the intended purpose of persuasive technology and our framework.
Finally, with security applications there is always the risk of leaking information to attackers. If not implemented carefully, features intended to help users and increase the usability of the system can often be leveraged by attackers to help them break into the system. Any additional cues provided to users must be fully evaluated from a security perspective to ensure that security is not compromised. This is why the viewport is placed randomly rather than purposefully placed away from hotspots. If the viewport avoided hotspots when shuffling, attackers could learn which points are most popular by simply watching the areas the viewport avoids when shuffling.
Conclusion
To date, attempts at educating users to behave securely have had only limited success. Although persuasive technology has been successful in training users in numerous other domains, we have not yet seen it applied to security. Through the Persuasive Authentication Framework, we are proposing a new methodology of utilising persuasive technology to educate users to better protect themselves from attackers. This offers a new versatile strategy for teaching and influencing users to behave more securely.
The hangman and viewport persuasion schemes are examples of how the Persuasive Authentication Framework can be applied. The viewport-CCP's preliminary user study results demonstrate that our framework shows promise as an effective tool in educating users to create more secure passwords. We look forward to further refining our implementation ideas as well as applying the framework to other forms of authentication. Persuasion need not stop at authentication however; our framework can also be utilised to educate users about security certificates, phishing, encryption, malware, and many other contemporary security issues. Although users currently have little to no understanding of how best to use the security measures employed to protect them, we hope to change that fact using our Persuasive Authentication Framework.
References
Brustoloni, J.C., & Villamarín-Salomón, R. (2007). Improving Security Decisions with Polymorphic and Audited Dialogs. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 76-87.
Chiasson, S., Biddle, R., & van Oorschot, P.C. (2007). A Second Look at the Usability of Click-based Graphical Passwords. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 1-12.
Chiasson, S., van Oorschot, P.C., & Biddle, R. (2007). Graphical Password Authentication Using Cued Click-points. 12 th European Symposium On Research In Computer Security (ESORICS), 2007, Springer-Verlag, Berlin Heidelberg, Germany.
Chiasson, S., van Oorschot, P.C., & Biddle, R. (2006). A Usability Study and Critique of Two Password Managers. 15 th USENIX Security Symposium, 2006, USENIX, Berkeley, CA, USA. 1-16.
Fogg, B.J. (2003) Persuasive Technology: Using Computers to Change What We Think and Do. San Francisco, CA, USA: Morgan Kaufmann.
Kuo, C., Romanosky, S., & Cranor. L.F. (2006). Human Selection of Mnemonic Phrase-based Passwords. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 67-78.
Lai, C., Wu, C., & Chen, S. (2006). A Mobile Learning Environment to Support the Clinical Nursing Practicum. World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn) 2006. Association for the Advancement of Computing in Education (AACE), Chesapeake, VA, USA. 695-700.
Lucero, A., Zuloaga, R., Mota, S., & Muñoz, F. (2006) Persuasive Technologies in Education: Improving Motivation to Read and Write for Children. 1 st International Conference on Persuasive Technology, 2006, Springer-Verlag, Berlin Heidelberg, Germany. 142-153.
Nelson, D.L., Reed, V.S., & Walling, J.R. (1976). Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2 (5), 523-528, 1976.
PD Photo. (2007). http://pdphoto.org/ Accessed August 2007.
Renaud, K. (2005). Evaluating Authentication Mechanisms. In Cranor, L.F., & Garfinkel, S. (Eds.), Security and Usability (pp. 103-128). O'Reilly Media, Sebastopol, CA, USA. 2004.
Sasse, M.A., Brostoff, S., & Weirich, D. (1999). Transforming the 'Weakest Link': A Human-Computer Interaction Approach to Usable and Effective Security. BT Technical Journal, 19 (3), 122-131.
Shostack, A., & P. Syverson. (2004). What Price Privacy? (and why identity theft is about neither identity nor theft). In Camp, L.J., & Lewis, S. (Eds.), Economics of Information Security (pp. 129-142). Kluwer Academic Publishers, Norwell, MA, USA. 2004.
Suo, X., Zhu, Y., & Owen, G.S. (2005). Graphical Passwords: A Survey. 21 st Annual Computer Security Applications Conference (ACSAC), 2005, IEEE Computer Society, Los Alamitos, CA, USA. 463-472.
Thorpe, J., & van Oorschot, P.C. (2007). Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. 16 th USENIX Security Symposium, 2007, USENIX, Berkeley, CA, USA. 103-118.
Weirich, D., & Sasse, M.A. (2001). Pretty Good Persuasion: A first step towards effective password security in the real world. New Security Paradigms Workshop (NSPW). 2001, ACM Press, New York, NY, USA. 137-143.
Whitten, A., & Tygar, J.D. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. 8 th USENIX Security Symposium, 1999, USENIX, Berkeley, CA, USA. 169-183.
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63 (1-2), 102-127.
Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & Privacy Magazine, Sept-Oct 2004, 2 (5), 25-31.
Yee, K., & Sitaker, K. (2006). Passpet: convenient password management and phishing protection. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 32-43.
|
<urn:uuid:7f612551-f7e8-44c9-84cf-7357a728f864>
|
CC-MAIN-2018-26
|
https://cups.cs.cmu.edu/~aforget/Forget_ELearn2007.pdf
|
2018-06-22T05:15:14Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864354.27/warc/CC-MAIN-20180622045658-20180622065658-00268.warc.gz
| 598,404,587
| 6,464
|
eng_Latn
|
eng_Latn
| 0.909006
|
eng_Latn
| 0.9967
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3751,
8362,
12258,
17091,
21823,
24110,
28594,
32575
] |
Persuasion as Education for Computer Security
Alain Forget School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]
Sonia Chiasson School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]
Robert Biddle Human-Oriented Technology Lab
Carleton University Ottawa, Canada [email protected]
Abstract: Most organisations realise the importance of computer security, yet many struggle with how to teach and influence their users to behave securely. Despite existing research on new instructions and security measures, users create memorable but insecure passwords. In an effort to teach users how to behave more securely, we present the Persuasive Authentication Framework, which applies persuasive technology to authentication mechanisms. Furthermore, we describe some examples of how the framework can be applied to existing authentication systems.
Introduction
Despite existing research on improved instructions and authentication schemes, users still do not create secure passwords (Yan et al. 2004), either because they do not understand how to do so or because strong passwords are too difficult to remember and use. Furthermore, there are numerous social factors and pressures influencing users to behave insecurely (Weirich & Sasse 2001). Finally, security is a secondary task for most users (Whitten & Tygar 1999), often viewed as impeding the completion their primary task. Therefore, users desire security to be quick and easy.
Rather than continuing to drill users with instructions and cumbersome security measures, we propose using Persuasive Technology (PT) to teach users how to behave more securely and why it is important to do so. By applying PT principles to existing authentication methods, we can directly influence and motivate users to create more secure passwords. In doing so, we empower users to better protect themselves and their organisations from attackers. In this paper, we present the Persuasive Authentication Framework; a framework for applying PT principles to authentication schemes requiring user-chosen passwords. Our goal is to help users create stronger passwords while educating them on how to behave more securely. This applied method of coaching enables users to continue creating strong passwords even when using authentication systems that do not make use of PT.
The paper is structured as follows: We first offer some background on past efforts to help users to choose and remember more secure passwords, as well as an outline of persuasive technology and some of its current applications. Next, we describe our framework for utilising PT to educate users on how to behave more securely. The paper concludes with a general discussion and some final comments about the applicability of our framework.
Background
Usable security is a new research area combining human-computer interaction and computer security. A few inherent properties of computer security make for a challenging user interface design process and make it difficult to teach and motivate users to behave in the desired manner. While these often lead to the dismissal that "users are unmotivated", the issues require closer investigation:
* Security is a secondary task (Whitten & Tygar 1999); if the security tasks hinder users' primary tasks, they will bypass the security to accomplish said tasks.
* Users also have a poor mental model of security due to the complexity of security systems (Chiasson et al. 2006). They typically underestimate or misunderstand the consequences of insecure actions. In fact, they may not even realise that their actions put them (or others) at risk in the first place.
* Computer security also suffers from the "barn door" property (Whitten & Tygar 1999); if private information is even briefly exposed, there is no way to guarantee that it has not been compromised.
* Users are concerned about privacy and security when they can see the direct risks and impact on their lives (Shostack & Syverson 2004). Unfortunately, users typically only reach this awareness once their privacy and security has already been severely breached.
Users tend to create easily-recalled but insecure passwords (Sasse et al. 1999). While this is partially attributable to users' poor mental models of security in general, a second reason is that human memory is limited. Users are simply unable to remember a unique sequence of random characters as a password for each of their accounts. Requirements like mandatory password changes further increase the memory load. In an effort to cope, users choose very memorable but insecure passwords. Efforts at convincing users to select more secure text passwords have found only limited success. Strategies include providing instructions on the creation of secure and memorable passwords, as well as encouraging users to base their passwords on a memorable phrase (Kuo et al. 2006).
Alternative forms of authentication have been suggested to improve the memorability and security of usercreated passwords (Renaud 2005). Various forms of graphical passwords (Suo et al. 2005) have been proposed because people are better at recalling images than text (Nelson et al. 1976). For click-based graphical passwords, a password consists of clicking on a sequence of points on an image. One example is PassPoints (Wiedenbeck et al. 2005), where users clicked on five points in a given image. Unfortunately, testing found that users selected similar click-points, forming predictable "hotspots" that attackers can exploit (Thorpe et al. 2007).
Persuasive Technology is a new psychological framework proposed by B.J. Fogg at Stanford University. Fogg defines persuasive technology (PT) as "interactive computing systems designed to change people's attitudes and behaviours" (Fogg 2003). He describes sets of persuasive tools, media, and social cues that products may leverage to encourage users to behave in the desired manner. Persuasive tools render tasks quicker and easier to accomplish, persuasive media can convey messages through numerous representations, and persuasive social cues can help products appear friendly, knowledgeable, and trustworthy.
Each of the three aforementioned persuasive roles is associated with a set of persuasion strategies. Which strategies to employ depends on many factors, such as the topic, medium, target audience, and desired persuasive strength. Elements of persuasive technology are already evident in existing educational endeavours. For example, an application encouraging literacy in Chilean children (Lucero et al. 2006) utilises PT. By captivating the children's imagination through multimedia and fun activities, they can be persuaded to learn more about the characters in the application, leading the children to read and write about them.
Many other e-learning systems also apply strategies that employ persuasion. The "Clinical Nursing Practicum" (Lai et al. 2006) was taught through a mobile learning environment on students' PDAs, granting easy access to detailed information and contact with instructors as needed. The persuasive elements in this system included reduction, timely suggestions, and customisation.
Perhaps the most significant application of PT is in building thought-provoking persuasive games (Bogost 2007). Persuasive games aim to educate players about political, socio-economical, nutritional, environmental, and other topical issues. Although general persuasion has been used in various applications, PT has yet to be
|
systematically applied to educating users about security.
|
The Persuasive Authentication Framework
Since current methods of assisting users to create more secure passwords have proven ineffective, we propose employing persuasive technology to educate users on creating memorable passwords that are also secure. Persuasion is a means of influencing others and is used to a certain degree in most daily interactions. With respect to computer security, our goal is to assist, motivate, influence, and educate users on:
* how to choose a password likely to be secure on any system;
* the importance of security and the actual threats and consequences to the users and their organisation;
* how to behave securely and utilise coping strategies to minimise the memory load.
Whereas it is impractical to have a human coach available at all times to influence user behaviour whenever computer security tasks arise, the computer will always be present. We therefore propose that the coaching and persuasion responsibilities be shifted to the computer. The computer also has the advantages of being consistent, persistent, precise, and potentially unobtrusive for some of the more subtle types of persuasion. Furthermore, since we are dealing with sensitive information such as passwords, having the computer provide the advice avoids having to reveal private information to another human.
Figure 1: The Persuasive Authentication Framework
The Persuasive Authentication Framework (Figure 1) consists of five principles based on Persuasive Technology. These principles guide the use of persuasion in authentication mechanisms to teach users how to authenticate more securely. While focusing on authentication, these principles are generalisable to other areas of security as well. We suggest that several principles be applied in concert, since several together will have more persuasive power than just one. We now describe each principle and give examples of how it can be applied to authentication mechanisms. For each principle, we identify the characteristics of usable security that are addressed:
The Simplification Principle: Authentication tasks should be made as simple as possible. This includes reducing the process to the smallest number of actions as well as reducing the complexity of the remaining tasks. By simplifying the task of authentication, users can more easily form an accurate mental model of the authentication process. Since the burden of completing the task has been reduced to an acceptable level, users will then be less likely to try to circumvent the security mechanisms, even though security is a secondary task. The optimal outcome of simplification is that the desired actions form the "path of least resistance", meaning it is easier for users to perform the authentication properly than it is to evade it.
A strategy often employed in usable security is to make security interfaces "transparent" (Chiasson et al. 2006) by hiding as much as possible from users. In our opinion, this is a misguided goal that often leads to more confusion as it usually translates into insufficient feedback for users. Simplification offers an alternative to transparency that reduces the burden on users without removing vital interface cues. The simplification principle is based on the PT tools of reduction and tunnelling.
For example, password managers (Yee & Sitaker 2006) reduce the burden on users by having the computer generate and remember complex passwords for them. Users are only responsible for entering one master password to activate the program, yet each of their accounts is protected by a distinct complex password generated by the password manger. This exemplifies the path-of-least-resistance concept; rather than having to deal with multiple passwords, users only have to maintain one strong password for the password manager.
The Personalisation Principle: Customised information for individual users typically offers a more personal and engaging experience, which could be more persuasive than generic information. Users are concerned with security and privacy if they understand the implications and consequences of their actions. By offering well-timed personalised advice relating to the individual's needs, preferences, or context-of-use, the system can provide details about why the users' current behaviour is insecure and how it can be modified to be more secure. Because the information is personalised, it is likely to help improve users' mental model of security and help them understand the relevance of behaving securely. The PT tools of tailoring and suggestion form the basis of the personalisation principle.
For example, users could provide some general interests (sports, music, cartoons, etc.) to a system that would customise a mnemonic phrase (Kuo et al. 2006) to help users remember a system-assigned random password. The given mnemonic phrase could further include something relating to the website or system itself, helping users to mentally link their mnemonic phrase and password to the system. This teaches users a coping strategy for remembering passwords that they can then apply to other passwords as well.
The Monitoring Principle: When aware that they are being observed, users are more likely to perform the desired behaviour. A system tracking user performance or status can report it directly to the users, who may then adjust their behaviour in accordance with security policies. The system should provide the opportunity for users to learn what should be done to start behaving more securely. This monitoring can be automated and done entirely by the system or can report to administrators who then take action. Furthermore, events that threaten security often happen in the background, over a long period of time, or as a result of a series of user actions. These events may not be obvious to users. In these cases, monitoring can help the system recognise these circumstances and bring them to the users' attention.
There is also the additional concern of the "barn door" property where even the slightest slip can compromise computer security (Whitten & Tygar 1999). These events may not be perceived by users as a cause for concern, which makes it important that the system raises an alert. It also provides the opportunity for intervention to teach how and why this behaviour is unacceptable. Users who modify their behaviour can then see the effect as their reported performance improves. The monitoring principle stems from the self-monitoring and surveillance tools described in PT.
For example, a system monitoring user activity could detect when users begin to enter a password (or other sensitive information) into a non-password field (or other risky circumstance) and warn them about the dangers of entering this sensitive information in the wrong place. Through immediate feedback, users could become more attentive when entering sensitive data, thus keeping private information secure.
The Conditioning Principle: Computer security is concerned about potential threats and risks to the system. However, most users have little direct experience with the consequences of an attack. When users perform a mental risk analysis, they do not believe that the probability of being attacked outweighs the additional burden of correctly performing the security tasks. In these cases, we need to artificially induce the correct behaviour because the users' natural environment does not support it. With user authentication, we want to convince people to use secure passwords even though it is a secondary task. Applying various forms of reinforcement can help shape the desired behaviour or convert existing behaviours into habits. For users to learn from any conditioning strategy, there should be other techniques at work to help users understand how to create effective passwords in order to receive the rewards for behaving securely. The conditioning PT tool is the foundation of the conditioning principle. Examples of conditioning inducements in authentication systems include:
* Longer sessions without requiring users to re-enter their password.
* A smiley face with encouraging messages like, "Your password is awesome! Good job!"
* A customised icon and access to extra features and benefits.
* Having faster system response.
The Social Interaction Principle: Authentication is an activity that typically occurs in isolation; users enter a secret password while sitting at their computer. In other areas of physical security, social norms influence behaviour and encourage users to behave securely. For example, someone may think twice about trying to enter a building without the proper credentials when there is a security guard or others nearby. The social interaction principle advocates repositioning user authentication as a social activity in order to leverage these social norms.
Users are more likely to be persuaded by a system that appears to share similar attitudes, traits, personality, and social membership. Such traits can be conveyed through language that best matches the users' own style, conveying a sense of "team". Positive and supportive language, such as personally greeting, befriending, and praising users, may further compel them to begin or continue behaving securely. Additionally, the system can be positioned to represent authority, potentially adding more persuasive power. The social interaction principle is based on several PT cues for computers as social actors.
For example, users can be taught that their own insecure behaviour puts others at risk. Through wording and presentation of the security system, users may develop a sense of belonging and duty towards their organisation. For example, organisation members can be told:
* Insecure accounts compromise not only their own account but the entire system.
* Their efforts at keeping the organisation secure are crucial and appreciated.
* Everyone is counting on them to do their part.
* "Other employees have passwords this strong. You don't want to be the weakest link."
Many of these principles are based in psychology because they are aimed at influencing people's behaviour. Rather than offering strictly technical solutions to authentication problems, the Persuasive Authentication Framework recognises that users play an active role in computer security and offers a means of influencing these users to behave appropriately. Since traditional methods of influencing users through education or imposing unreasonable restrictions have not been very successful, we suggest that a system that subtly persuades users and offers concrete advice may be more successful.
Applying the Persuasive Authentication Framework
We have begun applying our Persuasive Authentication Framework to security mechanisms in order to test its effectiveness. Here we give two examples of how two existing authentication mechanisms, text-based passwords and click-based graphical passwords, can be enhanced using persuasiveness.
A text-password system could adopt a "Wheel of Fortune" or "hangman" scheme during password creation where the system randomly places a small number of uncommon characters into the password (e.g. "_ _ x _ ^ _ _ V _"), allowing users to choose the remaining characters. Should the user prefer different characters in different positions, pressing a "shuffle" button would randomly choose a new set of uncommon characters and positions. The purpose of inserting random characters at random positions is to make passwords harder for attackers to guess.
A similar system could be adopted for click-based graphical passwords, such as PassPoints (Wiedenbeck et al. 2005) or Cued Click-Points (Chiasson et al. 2007b). When creating a graphical password, users could be guided in selecting their click-points by lightly shading the entire image, except for a small area known as the viewport (see Figure 2). Users can only choose a click-point within this randomly-positioned viewport. If they are unable to find a suitable click-point, they can press the "shuffle" button to randomly reposition the viewport. The most straightforward and quickest action is to select a click-point from the first viewport. However, someone determined to reach a specific click-point can repeatedly shuffle until the viewport reaches that area.
These schemes employ the following three principles from our Persuasive Authentication Framework:
* The Simplification Principle: By anchoring a few random uncommon characters in the user's text password, the system removes the immediate need for users to devise their own secure password strategy. Furthermore, users can learn by example that the insertion of random uncommon characters in passwords leads to greater security, which they can then apply to other passwords. The viewport scheme simplifies the password creation task by providing a smaller area in which users may choose a point. The viewport discourages users from choosing hotspots as their click-points since the shuffle button will likely need to be pressed numerous times before the viewport falls on the one click-point users find the most memorable. This tedious selection process for insecure click-points persuades users to choose more random, and hence more secure, click-points.
* The Personalisation Principle: Knowing the characters and their positions are random suggests to users that these selections are unique and were chosen especially for them. This leads users to feel their password is more secure, motivating them to comply with using a password with the given inserted characters, as well as possibly applying the learnt scheme themselves to their other passwords. Similarly, in the viewport scheme, users believe that the viewport's initial random position is unique and placed especially for them, leading them to feel the area is more secure. Likewise, they are motivated to choose a click-point in the initial viewport, rather than shuffle. Since users are unlikely to have ever used a click-based graphical password, they are particularly open to advice on choosing click-points. The viewport makes its suggestion at the most opportune moment; when users are first faced with creating a graphical password.
* The Conditioning Principle: Continually pressing the shuffle button, in the hopes of finding some desired set of characters and positions, or to select one particular click-point, can be very tedious. Rendering common letter combinations and hotspots unattractive choices trains users that such decisions result in poor security. Furthermore, since it is the fastest way to create a password, complying with the system's first suggestion appeals to users since it allows them to complete this secondary task as quickly as possible.
The hangman scheme guides users in selecting their password while largely preventing the use of common words, and limits password reuse since any newly created password will have different starting characters. Users learn that uncommon character combinations and randomness improves the security of their passwords; a concept that can also be applied to other passwords. Both the hangman and viewport schemes could be respectively implemented for any text-based password system or click-based graphical password system.
We have recently implemented the viewport scheme for Cued Click-Points (CCP) (Chiasson et al. 2007b), shown in Figure 2. Using data from an in-lab user study with 20 participants, where a total of 184 trials were completed, we compared the viewport-CCP click-points to those collected from our earlier PassPoints (Chiasson et al. 2007a) and CCP studies (Chiasson et al. 2007b). We found that the viewport-CCP click-points were much more uniformly distributed, reducing hotspots. Since most participants used the shuffle button sparingly, the viewport mostly remained in its initial random position, lowering the chance of participants selecting hotspots as their clickpoints. This shows that the security viewport was successful in persuading most users to choose more random clickpoints, and thus taught users to create more secure passwords.
Discussion
Through the Persuasive Authentication Framework we have described, we hope to teach users how secure passwords can be created, empowering them to continue behaving securely even when not using a frameworkenhanced authentication mechanism. There are several advantages to using PT to educate users rather than providing traditional security instructions and imposing rules:
* A security mechanism with built-in PT teaches users how to create secure passwords in the context where the password will be used. Teaching secure behaviour in a classroom or meeting room is out of context and is unlikely to be effective.
* In regular systems, users often do not understand the security rules imposed upon them and as a result of frustration, they will either try to circumvent the security mechanism or fulfill the new requirements as minimally as possible. Using persuasion, we hope users will be more willing to comply with security rules.
* PT is interactive, giving users the opportunity to learn by doing. Traditional lecturing methods do not include hands-on ways to apply knowledge in the very environment it is meant to be used.
* PT leverages our innate cognitive abilities such that users may not even be aware they are being persuaded or taught. This minimises resistance to new security measures, particularly since properly implemented PT principles should result in a system that is easier to use.
Persuasive technology must be applied with great care, because there is always a risk of annoying users to the point that they rebel against the system. One example of this is a system proposed by Brustoloni & VillamarínSalomón (2007) intended to help protect users against phishing emails (which attempt to trick users into divulging private information, such as online bank account credentials and credit card numbers). Their warning dialog boxes changed each time they were displayed, forcing users to carefully read them before deciding on the appropriate response. Furthermore, users were required to provide justification for their actions and were audited by administrators who quarantined users who behaved insecurely. Although the authors did not explicitly use PT, many of the principles presented in this paper can be seen in their system. However, these principles are being severely misused such that users will quickly become angered at the very system that is supposed to protect them. When using the Persuasive Authentication Framework and persuasive technology in general, it is crucial to employ tactics aimed to help, assist, and teach users not only how to perform the desired action, but also why such action is beneficial for them and their organisation. Employing PT to force, scare, and coerce users to do one's bidding is counter to the intended purpose of persuasive technology and our framework.
Finally, with security applications there is always the risk of leaking information to attackers. If not implemented carefully, features intended to help users and increase the usability of the system can often be leveraged by attackers to help them break into the system. Any additional cues provided to users must be fully evaluated from a security perspective to ensure that security is not compromised. This is why the viewport is placed randomly rather than purposefully placed away from hotspots. If the viewport avoided hotspots when shuffling, attackers could learn which points are most popular by simply watching the areas the viewport avoids when shuffling.
Conclusion
To date, attempts at educating users to behave securely have had only limited success. Although persuasive technology has been successful in training users in numerous other domains, we have not yet seen it applied to security. Through the Persuasive Authentication Framework, we are proposing a new methodology of utilising persuasive technology to educate users to better protect themselves from attackers. This offers a new versatile strategy for teaching and influencing users to behave more securely.
The hangman and viewport persuasion schemes are examples of how the Persuasive Authentication Framework can be applied. The viewport-CCP's preliminary user study results demonstrate that our framework shows promise as an effective tool in educating users to create more secure passwords. We look forward to further refining our implementation ideas as well as applying the framework to other forms of authentication. Persuasion need not stop at authentication however; our framework can also be utilised to educate users about security certificates, phishing, encryption, malware, and many other contemporary security issues. Although users currently have little to no understanding of how best to use the security measures employed to protect them, we hope to change that fact using our Persuasive Authentication Framework.
References
Brustoloni, J.C., & Villamarín-Salomón, R. (2007). Improving Security Decisions with Polymorphic and Audited Dialogs. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 76-87.
Chiasson, S., Biddle, R., & van Oorschot, P.C. (2007). A Second Look at the Usability of Click-based Graphical Passwords. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 1-12.
Chiasson, S., van Oorschot, P.C., & Biddle, R. (2007). Graphical Password Authentication Using Cued Click-points. 12 th European Symposium On Research In Computer Security (ESORICS), 2007, Springer-Verlag, Berlin Heidelberg, Germany.
Chiasson, S., van Oorschot, P.C., & Biddle, R. (2006). A Usability Study and Critique of Two Password Managers. 15 th USENIX Security Symposium, 2006, USENIX, Berkeley, CA, USA. 1-16.
Fogg, B.J. (2003) Persuasive Technology: Using Computers to Change What We Think and Do. San Francisco, CA, USA: Morgan Kaufmann.
Kuo, C., Romanosky, S., & Cranor. L.F. (2006). Human Selection of Mnemonic Phrase-based Passwords. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 67-78.
Lai, C., Wu, C., & Chen, S. (2006). A Mobile Learning Environment to Support the Clinical Nursing Practicum. World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn) 2006. Association for the Advancement of Computing in Education (AACE), Chesapeake, VA, USA. 695-700.
Lucero, A., Zuloaga, R., Mota, S., & Muñoz, F. (2006) Persuasive Technologies in Education: Improving Motivation to Read and Write for Children. 1 st International Conference on Persuasive Technology, 2006, Springer-Verlag, Berlin Heidelberg, Germany. 142-153.
Nelson, D.L., Reed, V.S., & Walling, J.R. (1976). Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2 (5), 523-528, 1976.
PD Photo. (2007). http://pdphoto.org/ Accessed August 2007.
Renaud, K. (2005). Evaluating Authentication Mechanisms. In Cranor, L.F., & Garfinkel, S. (Eds.), Security and Usability (pp. 103-128). O'Reilly Media, Sebastopol, CA, USA. 2004.
Sasse, M.A., Brostoff, S., & Weirich, D. (1999). Transforming the 'Weakest Link': A Human-Computer Interaction Approach to Usable and Effective Security. BT Technical Journal, 19 (3), 122-131.
Shostack, A., & P. Syverson. (2004). What Price Privacy? (and why identity theft is about neither identity nor theft). In Camp, L.J., & Lewis, S. (Eds.), Economics of Information Security (pp. 129-142). Kluwer Academic Publishers, Norwell, MA, USA. 2004.
Suo, X., Zhu, Y., & Owen, G.S. (2005). Graphical Passwords: A Survey. 21 st Annual Computer Security Applications Conference (ACSAC), 2005, IEEE Computer Society, Los Alamitos, CA, USA. 463-472.
Thorpe, J., & van Oorschot, P.C. (2007). Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. 16 th USENIX Security Symposium, 2007, USENIX, Berkeley, CA, USA. 103-118.
Weirich, D., & Sasse, M.A. (2001). Pretty Good Persuasion: A first step towards effective password security in the real world. New Security Paradigms Workshop (NSPW). 2001, ACM Press, New York, NY, USA. 137-143.
Whitten, A., & Tygar, J.D. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. 8 th USENIX Security Symposium, 1999, USENIX, Berkeley, CA, USA. 169-183.
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63 (1-2), 102-127.
Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & Privacy Magazine, Sept-Oct 2004, 2 (5), 25-31.
Yee, K., & Sitaker, K. (2006). Passpet: convenient password management and phishing protection. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 32-43.
| 7,585
|
beginning_of_word
|
systematically
|
remove_one_sentence
|
<url>
https://cups.cs.cmu.edu/~aforget/Forget_ELearn2007.pdf
</url>
<text>
Persuasion as Education for Computer Security
Alain Forget School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]
Sonia Chiasson School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]
Robert Biddle Human-Oriented Technology Lab
Carleton University Ottawa, Canada [email protected]
Abstract: Most organisations realise the importance of computer security, yet many struggle with how to teach and influence their users to behave securely. Despite existing research on new instructions and security measures, users create memorable but insecure passwords. In an effort to teach users how to behave more securely, we present the Persuasive Authentication Framework, which applies persuasive technology to authentication mechanisms. Furthermore, we describe some examples of how the framework can be applied to existing authentication systems.
Introduction
Despite existing research on improved instructions and authentication schemes, users still do not create secure passwords (Yan et al. 2004), either because they do not understand how to do so or because strong passwords are too difficult to remember and use. Furthermore, there are numerous social factors and pressures influencing users to behave insecurely (Weirich & Sasse 2001). Finally, security is a secondary task for most users (Whitten & Tygar 1999), often viewed as impeding the completion their primary task. Therefore, users desire security to be quick and easy.
Rather than continuing to drill users with instructions and cumbersome security measures, we propose using Persuasive Technology (PT) to teach users how to behave more securely and why it is important to do so. By applying PT principles to existing authentication methods, we can directly influence and motivate users to create more secure passwords. In doing so, we empower users to better protect themselves and their organisations from attackers. In this paper, we present the Persuasive Authentication Framework; a framework for applying PT principles to authentication schemes requiring user-chosen passwords. Our goal is to help users create stronger passwords while educating them on how to behave more securely. This applied method of coaching enables users to continue creating strong passwords even when using authentication systems that do not make use of PT.
The paper is structured as follows: We first offer some background on past efforts to help users to choose and remember more secure passwords, as well as an outline of persuasive technology and some of its current applications. Next, we describe our framework for utilising PT to educate users on how to behave more securely. The paper concludes with a general discussion and some final comments about the applicability of our framework.
Background
Usable security is a new research area combining human-computer interaction and computer security. A few inherent properties of computer security make for a challenging user interface design process and make it difficult to teach and motivate users to behave in the desired manner. While these often lead to the dismissal that "users are unmotivated", the issues require closer investigation:
* Security is a secondary task (Whitten & Tygar 1999); if the security tasks hinder users' primary tasks, they will bypass the security to accomplish said tasks.
* Users also have a poor mental model of security due to the complexity of security systems (Chiasson et al. 2006). They typically underestimate or misunderstand the consequences of insecure actions. In fact, they may not even realise that their actions put them (or others) at risk in the first place.
* Computer security also suffers from the "barn door" property (Whitten & Tygar 1999); if private information is even briefly exposed, there is no way to guarantee that it has not been compromised.
* Users are concerned about privacy and security when they can see the direct risks and impact on their lives (Shostack & Syverson 2004). Unfortunately, users typically only reach this awareness once their privacy and security has already been severely breached.
Users tend to create easily-recalled but insecure passwords (Sasse et al. 1999). While this is partially attributable to users' poor mental models of security in general, a second reason is that human memory is limited. Users are simply unable to remember a unique sequence of random characters as a password for each of their accounts. Requirements like mandatory password changes further increase the memory load. In an effort to cope, users choose very memorable but insecure passwords. Efforts at convincing users to select more secure text passwords have found only limited success. Strategies include providing instructions on the creation of secure and memorable passwords, as well as encouraging users to base their passwords on a memorable phrase (Kuo et al. 2006).
Alternative forms of authentication have been suggested to improve the memorability and security of usercreated passwords (Renaud 2005). Various forms of graphical passwords (Suo et al. 2005) have been proposed because people are better at recalling images than text (Nelson et al. 1976). For click-based graphical passwords, a password consists of clicking on a sequence of points on an image. One example is PassPoints (Wiedenbeck et al. 2005), where users clicked on five points in a given image. Unfortunately, testing found that users selected similar click-points, forming predictable "hotspots" that attackers can exploit (Thorpe et al. 2007).
Persuasive Technology is a new psychological framework proposed by B.J. Fogg at Stanford University. Fogg defines persuasive technology (PT) as "interactive computing systems designed to change people's attitudes and behaviours" (Fogg 2003). He describes sets of persuasive tools, media, and social cues that products may leverage to encourage users to behave in the desired manner. Persuasive tools render tasks quicker and easier to accomplish, persuasive media can convey messages through numerous representations, and persuasive social cues can help products appear friendly, knowledgeable, and trustworthy.
Each of the three aforementioned persuasive roles is associated with a set of persuasion strategies. Which strategies to employ depends on many factors, such as the topic, medium, target audience, and desired persuasive strength. Elements of persuasive technology are already evident in existing educational endeavours. For example, an application encouraging literacy in Chilean children (Lucero et al. 2006) utilises PT. By captivating the children's imagination through multimedia and fun activities, they can be persuaded to learn more about the characters in the application, leading the children to read and write about them.
Many other e-learning systems also apply strategies that employ persuasion. The "Clinical Nursing Practicum" (Lai et al. 2006) was taught through a mobile learning environment on students' PDAs, granting easy access to detailed information and contact with instructors as needed. The persuasive elements in this system included reduction, timely suggestions, and customisation.
Perhaps the most significant application of PT is in building thought-provoking persuasive games (Bogost 2007). Persuasive games aim to educate players about political, socio-economical, nutritional, environmental, and other topical issues. Although general persuasion has been used in various applications, PT has yet to be <cursor_is_here>
The Persuasive Authentication Framework
Since current methods of assisting users to create more secure passwords have proven ineffective, we propose employing persuasive technology to educate users on creating memorable passwords that are also secure. Persuasion is a means of influencing others and is used to a certain degree in most daily interactions. With respect to computer security, our goal is to assist, motivate, influence, and educate users on:
* how to choose a password likely to be secure on any system;
* the importance of security and the actual threats and consequences to the users and their organisation;
* how to behave securely and utilise coping strategies to minimise the memory load.
Whereas it is impractical to have a human coach available at all times to influence user behaviour whenever computer security tasks arise, the computer will always be present. We therefore propose that the coaching and persuasion responsibilities be shifted to the computer. The computer also has the advantages of being consistent, persistent, precise, and potentially unobtrusive for some of the more subtle types of persuasion. Furthermore, since we are dealing with sensitive information such as passwords, having the computer provide the advice avoids having to reveal private information to another human.
Figure 1: The Persuasive Authentication Framework
The Persuasive Authentication Framework (Figure 1) consists of five principles based on Persuasive Technology. These principles guide the use of persuasion in authentication mechanisms to teach users how to authenticate more securely. While focusing on authentication, these principles are generalisable to other areas of security as well. We suggest that several principles be applied in concert, since several together will have more persuasive power than just one. We now describe each principle and give examples of how it can be applied to authentication mechanisms. For each principle, we identify the characteristics of usable security that are addressed:
The Simplification Principle: Authentication tasks should be made as simple as possible. This includes reducing the process to the smallest number of actions as well as reducing the complexity of the remaining tasks. By simplifying the task of authentication, users can more easily form an accurate mental model of the authentication process. Since the burden of completing the task has been reduced to an acceptable level, users will then be less likely to try to circumvent the security mechanisms, even though security is a secondary task. The optimal outcome of simplification is that the desired actions form the "path of least resistance", meaning it is easier for users to perform the authentication properly than it is to evade it.
A strategy often employed in usable security is to make security interfaces "transparent" (Chiasson et al. 2006) by hiding as much as possible from users. In our opinion, this is a misguided goal that often leads to more confusion as it usually translates into insufficient feedback for users. Simplification offers an alternative to transparency that reduces the burden on users without removing vital interface cues. The simplification principle is based on the PT tools of reduction and tunnelling.
For example, password managers (Yee & Sitaker 2006) reduce the burden on users by having the computer generate and remember complex passwords for them. Users are only responsible for entering one master password to activate the program, yet each of their accounts is protected by a distinct complex password generated by the password manger. This exemplifies the path-of-least-resistance concept; rather than having to deal with multiple passwords, users only have to maintain one strong password for the password manager.
The Personalisation Principle: Customised information for individual users typically offers a more personal and engaging experience, which could be more persuasive than generic information. Users are concerned with security and privacy if they understand the implications and consequences of their actions. By offering well-timed personalised advice relating to the individual's needs, preferences, or context-of-use, the system can provide details about why the users' current behaviour is insecure and how it can be modified to be more secure. Because the information is personalised, it is likely to help improve users' mental model of security and help them understand the relevance of behaving securely. The PT tools of tailoring and suggestion form the basis of the personalisation principle.
For example, users could provide some general interests (sports, music, cartoons, etc.) to a system that would customise a mnemonic phrase (Kuo et al. 2006) to help users remember a system-assigned random password. The given mnemonic phrase could further include something relating to the website or system itself, helping users to mentally link their mnemonic phrase and password to the system. This teaches users a coping strategy for remembering passwords that they can then apply to other passwords as well.
The Monitoring Principle: When aware that they are being observed, users are more likely to perform the desired behaviour. A system tracking user performance or status can report it directly to the users, who may then adjust their behaviour in accordance with security policies. The system should provide the opportunity for users to learn what should be done to start behaving more securely. This monitoring can be automated and done entirely by the system or can report to administrators who then take action. Furthermore, events that threaten security often happen in the background, over a long period of time, or as a result of a series of user actions. These events may not be obvious to users. In these cases, monitoring can help the system recognise these circumstances and bring them to the users' attention.
There is also the additional concern of the "barn door" property where even the slightest slip can compromise computer security (Whitten & Tygar 1999). These events may not be perceived by users as a cause for concern, which makes it important that the system raises an alert. It also provides the opportunity for intervention to teach how and why this behaviour is unacceptable. Users who modify their behaviour can then see the effect as their reported performance improves. The monitoring principle stems from the self-monitoring and surveillance tools described in PT.
For example, a system monitoring user activity could detect when users begin to enter a password (or other sensitive information) into a non-password field (or other risky circumstance) and warn them about the dangers of entering this sensitive information in the wrong place. Through immediate feedback, users could become more attentive when entering sensitive data, thus keeping private information secure.
The Conditioning Principle: Computer security is concerned about potential threats and risks to the system. However, most users have little direct experience with the consequences of an attack. When users perform a mental risk analysis, they do not believe that the probability of being attacked outweighs the additional burden of correctly performing the security tasks. In these cases, we need to artificially induce the correct behaviour because the users' natural environment does not support it. With user authentication, we want to convince people to use secure passwords even though it is a secondary task. Applying various forms of reinforcement can help shape the desired behaviour or convert existing behaviours into habits. For users to learn from any conditioning strategy, there should be other techniques at work to help users understand how to create effective passwords in order to receive the rewards for behaving securely. The conditioning PT tool is the foundation of the conditioning principle. Examples of conditioning inducements in authentication systems include:
* Longer sessions without requiring users to re-enter their password.
* A smiley face with encouraging messages like, "Your password is awesome! Good job!"
* A customised icon and access to extra features and benefits.
* Having faster system response.
The Social Interaction Principle: Authentication is an activity that typically occurs in isolation; users enter a secret password while sitting at their computer. In other areas of physical security, social norms influence behaviour and encourage users to behave securely. For example, someone may think twice about trying to enter a building without the proper credentials when there is a security guard or others nearby. The social interaction principle advocates repositioning user authentication as a social activity in order to leverage these social norms.
Users are more likely to be persuaded by a system that appears to share similar attitudes, traits, personality, and social membership. Such traits can be conveyed through language that best matches the users' own style, conveying a sense of "team". Positive and supportive language, such as personally greeting, befriending, and praising users, may further compel them to begin or continue behaving securely. Additionally, the system can be positioned to represent authority, potentially adding more persuasive power. The social interaction principle is based on several PT cues for computers as social actors.
For example, users can be taught that their own insecure behaviour puts others at risk. Through wording and presentation of the security system, users may develop a sense of belonging and duty towards their organisation. For example, organisation members can be told:
* Insecure accounts compromise not only their own account but the entire system.
* Their efforts at keeping the organisation secure are crucial and appreciated.
* Everyone is counting on them to do their part.
* "Other employees have passwords this strong. You don't want to be the weakest link."
Many of these principles are based in psychology because they are aimed at influencing people's behaviour. Rather than offering strictly technical solutions to authentication problems, the Persuasive Authentication Framework recognises that users play an active role in computer security and offers a means of influencing these users to behave appropriately. Since traditional methods of influencing users through education or imposing unreasonable restrictions have not been very successful, we suggest that a system that subtly persuades users and offers concrete advice may be more successful.
Applying the Persuasive Authentication Framework
We have begun applying our Persuasive Authentication Framework to security mechanisms in order to test its effectiveness. Here we give two examples of how two existing authentication mechanisms, text-based passwords and click-based graphical passwords, can be enhanced using persuasiveness.
A text-password system could adopt a "Wheel of Fortune" or "hangman" scheme during password creation where the system randomly places a small number of uncommon characters into the password (e.g. "_ _ x _ ^ _ _ V _"), allowing users to choose the remaining characters. Should the user prefer different characters in different positions, pressing a "shuffle" button would randomly choose a new set of uncommon characters and positions. The purpose of inserting random characters at random positions is to make passwords harder for attackers to guess.
A similar system could be adopted for click-based graphical passwords, such as PassPoints (Wiedenbeck et al. 2005) or Cued Click-Points (Chiasson et al. 2007b). When creating a graphical password, users could be guided in selecting their click-points by lightly shading the entire image, except for a small area known as the viewport (see Figure 2). Users can only choose a click-point within this randomly-positioned viewport. If they are unable to find a suitable click-point, they can press the "shuffle" button to randomly reposition the viewport. The most straightforward and quickest action is to select a click-point from the first viewport. However, someone determined to reach a specific click-point can repeatedly shuffle until the viewport reaches that area.
These schemes employ the following three principles from our Persuasive Authentication Framework:
* The Simplification Principle: By anchoring a few random uncommon characters in the user's text password, the system removes the immediate need for users to devise their own secure password strategy. Furthermore, users can learn by example that the insertion of random uncommon characters in passwords leads to greater security, which they can then apply to other passwords. The viewport scheme simplifies the password creation task by providing a smaller area in which users may choose a point. The viewport discourages users from choosing hotspots as their click-points since the shuffle button will likely need to be pressed numerous times before the viewport falls on the one click-point users find the most memorable. This tedious selection process for insecure click-points persuades users to choose more random, and hence more secure, click-points.
* The Personalisation Principle: Knowing the characters and their positions are random suggests to users that these selections are unique and were chosen especially for them. This leads users to feel their password is more secure, motivating them to comply with using a password with the given inserted characters, as well as possibly applying the learnt scheme themselves to their other passwords. Similarly, in the viewport scheme, users believe that the viewport's initial random position is unique and placed especially for them, leading them to feel the area is more secure. Likewise, they are motivated to choose a click-point in the initial viewport, rather than shuffle. Since users are unlikely to have ever used a click-based graphical password, they are particularly open to advice on choosing click-points. The viewport makes its suggestion at the most opportune moment; when users are first faced with creating a graphical password.
* The Conditioning Principle: Continually pressing the shuffle button, in the hopes of finding some desired set of characters and positions, or to select one particular click-point, can be very tedious. Rendering common letter combinations and hotspots unattractive choices trains users that such decisions result in poor security. Furthermore, since it is the fastest way to create a password, complying with the system's first suggestion appeals to users since it allows them to complete this secondary task as quickly as possible.
The hangman scheme guides users in selecting their password while largely preventing the use of common words, and limits password reuse since any newly created password will have different starting characters. Users learn that uncommon character combinations and randomness improves the security of their passwords; a concept that can also be applied to other passwords. Both the hangman and viewport schemes could be respectively implemented for any text-based password system or click-based graphical password system.
We have recently implemented the viewport scheme for Cued Click-Points (CCP) (Chiasson et al. 2007b), shown in Figure 2. Using data from an in-lab user study with 20 participants, where a total of 184 trials were completed, we compared the viewport-CCP click-points to those collected from our earlier PassPoints (Chiasson et al. 2007a) and CCP studies (Chiasson et al. 2007b). We found that the viewport-CCP click-points were much more uniformly distributed, reducing hotspots. Since most participants used the shuffle button sparingly, the viewport mostly remained in its initial random position, lowering the chance of participants selecting hotspots as their clickpoints. This shows that the security viewport was successful in persuading most users to choose more random clickpoints, and thus taught users to create more secure passwords.
Discussion
Through the Persuasive Authentication Framework we have described, we hope to teach users how secure passwords can be created, empowering them to continue behaving securely even when not using a frameworkenhanced authentication mechanism. There are several advantages to using PT to educate users rather than providing traditional security instructions and imposing rules:
* A security mechanism with built-in PT teaches users how to create secure passwords in the context where the password will be used. Teaching secure behaviour in a classroom or meeting room is out of context and is unlikely to be effective.
* In regular systems, users often do not understand the security rules imposed upon them and as a result of frustration, they will either try to circumvent the security mechanism or fulfill the new requirements as minimally as possible. Using persuasion, we hope users will be more willing to comply with security rules.
* PT is interactive, giving users the opportunity to learn by doing. Traditional lecturing methods do not include hands-on ways to apply knowledge in the very environment it is meant to be used.
* PT leverages our innate cognitive abilities such that users may not even be aware they are being persuaded or taught. This minimises resistance to new security measures, particularly since properly implemented PT principles should result in a system that is easier to use.
Persuasive technology must be applied with great care, because there is always a risk of annoying users to the point that they rebel against the system. One example of this is a system proposed by Brustoloni & VillamarínSalomón (2007) intended to help protect users against phishing emails (which attempt to trick users into divulging private information, such as online bank account credentials and credit card numbers). Their warning dialog boxes changed each time they were displayed, forcing users to carefully read them before deciding on the appropriate response. Furthermore, users were required to provide justification for their actions and were audited by administrators who quarantined users who behaved insecurely. Although the authors did not explicitly use PT, many of the principles presented in this paper can be seen in their system. However, these principles are being severely misused such that users will quickly become angered at the very system that is supposed to protect them. When using the Persuasive Authentication Framework and persuasive technology in general, it is crucial to employ tactics aimed to help, assist, and teach users not only how to perform the desired action, but also why such action is beneficial for them and their organisation. Employing PT to force, scare, and coerce users to do one's bidding is counter to the intended purpose of persuasive technology and our framework.
Finally, with security applications there is always the risk of leaking information to attackers. If not implemented carefully, features intended to help users and increase the usability of the system can often be leveraged by attackers to help them break into the system. Any additional cues provided to users must be fully evaluated from a security perspective to ensure that security is not compromised. This is why the viewport is placed randomly rather than purposefully placed away from hotspots. If the viewport avoided hotspots when shuffling, attackers could learn which points are most popular by simply watching the areas the viewport avoids when shuffling.
Conclusion
To date, attempts at educating users to behave securely have had only limited success. Although persuasive technology has been successful in training users in numerous other domains, we have not yet seen it applied to security. Through the Persuasive Authentication Framework, we are proposing a new methodology of utilising persuasive technology to educate users to better protect themselves from attackers. This offers a new versatile strategy for teaching and influencing users to behave more securely.
The hangman and viewport persuasion schemes are examples of how the Persuasive Authentication Framework can be applied. The viewport-CCP's preliminary user study results demonstrate that our framework shows promise as an effective tool in educating users to create more secure passwords. We look forward to further refining our implementation ideas as well as applying the framework to other forms of authentication. Persuasion need not stop at authentication however; our framework can also be utilised to educate users about security certificates, phishing, encryption, malware, and many other contemporary security issues. Although users currently have little to no understanding of how best to use the security measures employed to protect them, we hope to change that fact using our Persuasive Authentication Framework.
References
Brustoloni, J.C., & Villamarín-Salomón, R. (2007). Improving Security Decisions with Polymorphic and Audited Dialogs. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 76-87.
Chiasson, S., Biddle, R., & van Oorschot, P.C. (2007). A Second Look at the Usability of Click-based Graphical Passwords. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 1-12.
Chiasson, S., van Oorschot, P.C., & Biddle, R. (2007). Graphical Password Authentication Using Cued Click-points. 12 th European Symposium On Research In Computer Security (ESORICS), 2007, Springer-Verlag, Berlin Heidelberg, Germany.
Chiasson, S., van Oorschot, P.C., & Biddle, R. (2006). A Usability Study and Critique of Two Password Managers. 15 th USENIX Security Symposium, 2006, USENIX, Berkeley, CA, USA. 1-16.
Fogg, B.J. (2003) Persuasive Technology: Using Computers to Change What We Think and Do. San Francisco, CA, USA: Morgan Kaufmann.
Kuo, C., Romanosky, S., & Cranor. L.F. (2006). Human Selection of Mnemonic Phrase-based Passwords. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 67-78.
Lai, C., Wu, C., & Chen, S. (2006). A Mobile Learning Environment to Support the Clinical Nursing Practicum. World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn) 2006. Association for the Advancement of Computing in Education (AACE), Chesapeake, VA, USA. 695-700.
Lucero, A., Zuloaga, R., Mota, S., & Muñoz, F. (2006) Persuasive Technologies in Education: Improving Motivation to Read and Write for Children. 1 st International Conference on Persuasive Technology, 2006, Springer-Verlag, Berlin Heidelberg, Germany. 142-153.
Nelson, D.L., Reed, V.S., & Walling, J.R. (1976). Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2 (5), 523-528, 1976.
PD Photo. (2007). http://pdphoto.org/ Accessed August 2007.
Renaud, K. (2005). Evaluating Authentication Mechanisms. In Cranor, L.F., & Garfinkel, S. (Eds.), Security and Usability (pp. 103-128). O'Reilly Media, Sebastopol, CA, USA. 2004.
Sasse, M.A., Brostoff, S., & Weirich, D. (1999). Transforming the 'Weakest Link': A Human-Computer Interaction Approach to Usable and Effective Security. BT Technical Journal, 19 (3), 122-131.
Shostack, A., & P. Syverson. (2004). What Price Privacy? (and why identity theft is about neither identity nor theft). In Camp, L.J., & Lewis, S. (Eds.), Economics of Information Security (pp. 129-142). Kluwer Academic Publishers, Norwell, MA, USA. 2004.
Suo, X., Zhu, Y., & Owen, G.S. (2005). Graphical Passwords: A Survey. 21 st Annual Computer Security Applications Conference (ACSAC), 2005, IEEE Computer Society, Los Alamitos, CA, USA. 463-472.
Thorpe, J., & van Oorschot, P.C. (2007). Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. 16 th USENIX Security Symposium, 2007, USENIX, Berkeley, CA, USA. 103-118.
Weirich, D., & Sasse, M.A. (2001). Pretty Good Persuasion: A first step towards effective password security in the real world. New Security Paradigms Workshop (NSPW). 2001, ACM Press, New York, NY, USA. 137-143.
Whitten, A., & Tygar, J.D. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. 8 th USENIX Security Symposium, 1999, USENIX, Berkeley, CA, USA. 169-183.
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63 (1-2), 102-127.
Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & Privacy Magazine, Sept-Oct 2004, 2 (5), 25-31.
Yee, K., & Sitaker, K. (2006). Passpet: convenient password management and phishing protection. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 32-43.
</text>
|
[
{
"content": "<url>\nhttps://cups.cs.cmu.edu/~aforget/Forget_ELearn2007.pdf\n</url>\n<text>\nPersuasion as Education for Computer Security\n\nAlain Forget School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]\n\nSonia Chiasson School of Computer Science & Human-Oriented Technology Lab Carleton University Ottawa, Canada [email protected]\n\nRobert Biddle Human-Oriented Technology Lab\n\nCarleton University Ottawa, Canada [email protected]\n\nAbstract: Most organisations realise the importance of computer security, yet many struggle with how to teach and influence their users to behave securely. Despite existing research on new instructions and security measures, users create memorable but insecure passwords. In an effort to teach users how to behave more securely, we present the Persuasive Authentication Framework, which applies persuasive technology to authentication mechanisms. Furthermore, we describe some examples of how the framework can be applied to existing authentication systems.\n\nIntroduction\n\nDespite existing research on improved instructions and authentication schemes, users still do not create secure passwords (Yan et al. 2004), either because they do not understand how to do so or because strong passwords are too difficult to remember and use. Furthermore, there are numerous social factors and pressures influencing users to behave insecurely (Weirich & Sasse 2001). Finally, security is a secondary task for most users (Whitten & Tygar 1999), often viewed as impeding the completion their primary task. Therefore, users desire security to be quick and easy.\n\nRather than continuing to drill users with instructions and cumbersome security measures, we propose using Persuasive Technology (PT) to teach users how to behave more securely and why it is important to do so. By applying PT principles to existing authentication methods, we can directly influence and motivate users to create more secure passwords. In doing so, we empower users to better protect themselves and their organisations from attackers. In this paper, we present the Persuasive Authentication Framework; a framework for applying PT principles to authentication schemes requiring user-chosen passwords. Our goal is to help users create stronger passwords while educating them on how to behave more securely. This applied method of coaching enables users to continue creating strong passwords even when using authentication systems that do not make use of PT.\n\nThe paper is structured as follows: We first offer some background on past efforts to help users to choose and remember more secure passwords, as well as an outline of persuasive technology and some of its current applications. Next, we describe our framework for utilising PT to educate users on how to behave more securely. The paper concludes with a general discussion and some final comments about the applicability of our framework.\n\nBackground\n\nUsable security is a new research area combining human-computer interaction and computer security. A few inherent properties of computer security make for a challenging user interface design process and make it difficult to teach and motivate users to behave in the desired manner. While these often lead to the dismissal that \"users are unmotivated\", the issues require closer investigation:\n\n* Security is a secondary task (Whitten & Tygar 1999); if the security tasks hinder users' primary tasks, they will bypass the security to accomplish said tasks.\n* Users also have a poor mental model of security due to the complexity of security systems (Chiasson et al. 2006). They typically underestimate or misunderstand the consequences of insecure actions. In fact, they may not even realise that their actions put them (or others) at risk in the first place.\n\n* Computer security also suffers from the \"barn door\" property (Whitten & Tygar 1999); if private information is even briefly exposed, there is no way to guarantee that it has not been compromised.\n* Users are concerned about privacy and security when they can see the direct risks and impact on their lives (Shostack & Syverson 2004). Unfortunately, users typically only reach this awareness once their privacy and security has already been severely breached.\n\nUsers tend to create easily-recalled but insecure passwords (Sasse et al. 1999). While this is partially attributable to users' poor mental models of security in general, a second reason is that human memory is limited. Users are simply unable to remember a unique sequence of random characters as a password for each of their accounts. Requirements like mandatory password changes further increase the memory load. In an effort to cope, users choose very memorable but insecure passwords. Efforts at convincing users to select more secure text passwords have found only limited success. Strategies include providing instructions on the creation of secure and memorable passwords, as well as encouraging users to base their passwords on a memorable phrase (Kuo et al. 2006).\n\nAlternative forms of authentication have been suggested to improve the memorability and security of usercreated passwords (Renaud 2005). Various forms of graphical passwords (Suo et al. 2005) have been proposed because people are better at recalling images than text (Nelson et al. 1976). For click-based graphical passwords, a password consists of clicking on a sequence of points on an image. One example is PassPoints (Wiedenbeck et al. 2005), where users clicked on five points in a given image. Unfortunately, testing found that users selected similar click-points, forming predictable \"hotspots\" that attackers can exploit (Thorpe et al. 2007).\n\nPersuasive Technology is a new psychological framework proposed by B.J. Fogg at Stanford University. Fogg defines persuasive technology (PT) as \"interactive computing systems designed to change people's attitudes and behaviours\" (Fogg 2003). He describes sets of persuasive tools, media, and social cues that products may leverage to encourage users to behave in the desired manner. Persuasive tools render tasks quicker and easier to accomplish, persuasive media can convey messages through numerous representations, and persuasive social cues can help products appear friendly, knowledgeable, and trustworthy.\n\nEach of the three aforementioned persuasive roles is associated with a set of persuasion strategies. Which strategies to employ depends on many factors, such as the topic, medium, target audience, and desired persuasive strength. Elements of persuasive technology are already evident in existing educational endeavours. For example, an application encouraging literacy in Chilean children (Lucero et al. 2006) utilises PT. By captivating the children's imagination through multimedia and fun activities, they can be persuaded to learn more about the characters in the application, leading the children to read and write about them.\n\nMany other e-learning systems also apply strategies that employ persuasion. The \"Clinical Nursing Practicum\" (Lai et al. 2006) was taught through a mobile learning environment on students' PDAs, granting easy access to detailed information and contact with instructors as needed. The persuasive elements in this system included reduction, timely suggestions, and customisation.\n\nPerhaps the most significant application of PT is in building thought-provoking persuasive games (Bogost 2007). Persuasive games aim to educate players about political, socio-economical, nutritional, environmental, and other topical issues. Although general persuasion has been used in various applications, PT has yet to be <cursor_is_here>\n\nThe Persuasive Authentication Framework\n\nSince current methods of assisting users to create more secure passwords have proven ineffective, we propose employing persuasive technology to educate users on creating memorable passwords that are also secure. Persuasion is a means of influencing others and is used to a certain degree in most daily interactions. With respect to computer security, our goal is to assist, motivate, influence, and educate users on:\n\n* how to choose a password likely to be secure on any system;\n* the importance of security and the actual threats and consequences to the users and their organisation;\n* how to behave securely and utilise coping strategies to minimise the memory load.\n\nWhereas it is impractical to have a human coach available at all times to influence user behaviour whenever computer security tasks arise, the computer will always be present. We therefore propose that the coaching and persuasion responsibilities be shifted to the computer. The computer also has the advantages of being consistent, persistent, precise, and potentially unobtrusive for some of the more subtle types of persuasion. Furthermore, since we are dealing with sensitive information such as passwords, having the computer provide the advice avoids having to reveal private information to another human.\n\nFigure 1: The Persuasive Authentication Framework\n\nThe Persuasive Authentication Framework (Figure 1) consists of five principles based on Persuasive Technology. These principles guide the use of persuasion in authentication mechanisms to teach users how to authenticate more securely. While focusing on authentication, these principles are generalisable to other areas of security as well. We suggest that several principles be applied in concert, since several together will have more persuasive power than just one. We now describe each principle and give examples of how it can be applied to authentication mechanisms. For each principle, we identify the characteristics of usable security that are addressed:\n\nThe Simplification Principle: Authentication tasks should be made as simple as possible. This includes reducing the process to the smallest number of actions as well as reducing the complexity of the remaining tasks. By simplifying the task of authentication, users can more easily form an accurate mental model of the authentication process. Since the burden of completing the task has been reduced to an acceptable level, users will then be less likely to try to circumvent the security mechanisms, even though security is a secondary task. The optimal outcome of simplification is that the desired actions form the \"path of least resistance\", meaning it is easier for users to perform the authentication properly than it is to evade it.\n\nA strategy often employed in usable security is to make security interfaces \"transparent\" (Chiasson et al. 2006) by hiding as much as possible from users. In our opinion, this is a misguided goal that often leads to more confusion as it usually translates into insufficient feedback for users. Simplification offers an alternative to transparency that reduces the burden on users without removing vital interface cues. The simplification principle is based on the PT tools of reduction and tunnelling.\n\nFor example, password managers (Yee & Sitaker 2006) reduce the burden on users by having the computer generate and remember complex passwords for them. Users are only responsible for entering one master password to activate the program, yet each of their accounts is protected by a distinct complex password generated by the password manger. This exemplifies the path-of-least-resistance concept; rather than having to deal with multiple passwords, users only have to maintain one strong password for the password manager.\n\nThe Personalisation Principle: Customised information for individual users typically offers a more personal and engaging experience, which could be more persuasive than generic information. Users are concerned with security and privacy if they understand the implications and consequences of their actions. By offering well-timed personalised advice relating to the individual's needs, preferences, or context-of-use, the system can provide details about why the users' current behaviour is insecure and how it can be modified to be more secure. Because the information is personalised, it is likely to help improve users' mental model of security and help them understand the relevance of behaving securely. The PT tools of tailoring and suggestion form the basis of the personalisation principle.\n\nFor example, users could provide some general interests (sports, music, cartoons, etc.) to a system that would customise a mnemonic phrase (Kuo et al. 2006) to help users remember a system-assigned random password. The given mnemonic phrase could further include something relating to the website or system itself, helping users to mentally link their mnemonic phrase and password to the system. This teaches users a coping strategy for remembering passwords that they can then apply to other passwords as well.\n\nThe Monitoring Principle: When aware that they are being observed, users are more likely to perform the desired behaviour. A system tracking user performance or status can report it directly to the users, who may then adjust their behaviour in accordance with security policies. The system should provide the opportunity for users to learn what should be done to start behaving more securely. This monitoring can be automated and done entirely by the system or can report to administrators who then take action. Furthermore, events that threaten security often happen in the background, over a long period of time, or as a result of a series of user actions. These events may not be obvious to users. In these cases, monitoring can help the system recognise these circumstances and bring them to the users' attention.\n\nThere is also the additional concern of the \"barn door\" property where even the slightest slip can compromise computer security (Whitten & Tygar 1999). These events may not be perceived by users as a cause for concern, which makes it important that the system raises an alert. It also provides the opportunity for intervention to teach how and why this behaviour is unacceptable. Users who modify their behaviour can then see the effect as their reported performance improves. The monitoring principle stems from the self-monitoring and surveillance tools described in PT.\n\nFor example, a system monitoring user activity could detect when users begin to enter a password (or other sensitive information) into a non-password field (or other risky circumstance) and warn them about the dangers of entering this sensitive information in the wrong place. Through immediate feedback, users could become more attentive when entering sensitive data, thus keeping private information secure.\n\nThe Conditioning Principle: Computer security is concerned about potential threats and risks to the system. However, most users have little direct experience with the consequences of an attack. When users perform a mental risk analysis, they do not believe that the probability of being attacked outweighs the additional burden of correctly performing the security tasks. In these cases, we need to artificially induce the correct behaviour because the users' natural environment does not support it. With user authentication, we want to convince people to use secure passwords even though it is a secondary task. Applying various forms of reinforcement can help shape the desired behaviour or convert existing behaviours into habits. For users to learn from any conditioning strategy, there should be other techniques at work to help users understand how to create effective passwords in order to receive the rewards for behaving securely. The conditioning PT tool is the foundation of the conditioning principle. Examples of conditioning inducements in authentication systems include:\n\n* Longer sessions without requiring users to re-enter their password.\n* A smiley face with encouraging messages like, \"Your password is awesome! Good job!\"\n* A customised icon and access to extra features and benefits.\n* Having faster system response.\n\nThe Social Interaction Principle: Authentication is an activity that typically occurs in isolation; users enter a secret password while sitting at their computer. In other areas of physical security, social norms influence behaviour and encourage users to behave securely. For example, someone may think twice about trying to enter a building without the proper credentials when there is a security guard or others nearby. The social interaction principle advocates repositioning user authentication as a social activity in order to leverage these social norms.\n\nUsers are more likely to be persuaded by a system that appears to share similar attitudes, traits, personality, and social membership. Such traits can be conveyed through language that best matches the users' own style, conveying a sense of \"team\". Positive and supportive language, such as personally greeting, befriending, and praising users, may further compel them to begin or continue behaving securely. Additionally, the system can be positioned to represent authority, potentially adding more persuasive power. The social interaction principle is based on several PT cues for computers as social actors.\n\nFor example, users can be taught that their own insecure behaviour puts others at risk. Through wording and presentation of the security system, users may develop a sense of belonging and duty towards their organisation. For example, organisation members can be told:\n\n* Insecure accounts compromise not only their own account but the entire system.\n* Their efforts at keeping the organisation secure are crucial and appreciated.\n* Everyone is counting on them to do their part.\n* \"Other employees have passwords this strong. You don't want to be the weakest link.\"\n\nMany of these principles are based in psychology because they are aimed at influencing people's behaviour. Rather than offering strictly technical solutions to authentication problems, the Persuasive Authentication Framework recognises that users play an active role in computer security and offers a means of influencing these users to behave appropriately. Since traditional methods of influencing users through education or imposing unreasonable restrictions have not been very successful, we suggest that a system that subtly persuades users and offers concrete advice may be more successful.\n\nApplying the Persuasive Authentication Framework\n\nWe have begun applying our Persuasive Authentication Framework to security mechanisms in order to test its effectiveness. Here we give two examples of how two existing authentication mechanisms, text-based passwords and click-based graphical passwords, can be enhanced using persuasiveness.\n\nA text-password system could adopt a \"Wheel of Fortune\" or \"hangman\" scheme during password creation where the system randomly places a small number of uncommon characters into the password (e.g. \"_ _ x _ ^ _ _ V _\"), allowing users to choose the remaining characters. Should the user prefer different characters in different positions, pressing a \"shuffle\" button would randomly choose a new set of uncommon characters and positions. The purpose of inserting random characters at random positions is to make passwords harder for attackers to guess.\n\nA similar system could be adopted for click-based graphical passwords, such as PassPoints (Wiedenbeck et al. 2005) or Cued Click-Points (Chiasson et al. 2007b). When creating a graphical password, users could be guided in selecting their click-points by lightly shading the entire image, except for a small area known as the viewport (see Figure 2). Users can only choose a click-point within this randomly-positioned viewport. If they are unable to find a suitable click-point, they can press the \"shuffle\" button to randomly reposition the viewport. The most straightforward and quickest action is to select a click-point from the first viewport. However, someone determined to reach a specific click-point can repeatedly shuffle until the viewport reaches that area.\n\nThese schemes employ the following three principles from our Persuasive Authentication Framework:\n\n* The Simplification Principle: By anchoring a few random uncommon characters in the user's text password, the system removes the immediate need for users to devise their own secure password strategy. Furthermore, users can learn by example that the insertion of random uncommon characters in passwords leads to greater security, which they can then apply to other passwords. The viewport scheme simplifies the password creation task by providing a smaller area in which users may choose a point. The viewport discourages users from choosing hotspots as their click-points since the shuffle button will likely need to be pressed numerous times before the viewport falls on the one click-point users find the most memorable. This tedious selection process for insecure click-points persuades users to choose more random, and hence more secure, click-points.\n* The Personalisation Principle: Knowing the characters and their positions are random suggests to users that these selections are unique and were chosen especially for them. This leads users to feel their password is more secure, motivating them to comply with using a password with the given inserted characters, as well as possibly applying the learnt scheme themselves to their other passwords. Similarly, in the viewport scheme, users believe that the viewport's initial random position is unique and placed especially for them, leading them to feel the area is more secure. Likewise, they are motivated to choose a click-point in the initial viewport, rather than shuffle. Since users are unlikely to have ever used a click-based graphical password, they are particularly open to advice on choosing click-points. The viewport makes its suggestion at the most opportune moment; when users are first faced with creating a graphical password.\n\n* The Conditioning Principle: Continually pressing the shuffle button, in the hopes of finding some desired set of characters and positions, or to select one particular click-point, can be very tedious. Rendering common letter combinations and hotspots unattractive choices trains users that such decisions result in poor security. Furthermore, since it is the fastest way to create a password, complying with the system's first suggestion appeals to users since it allows them to complete this secondary task as quickly as possible.\n\nThe hangman scheme guides users in selecting their password while largely preventing the use of common words, and limits password reuse since any newly created password will have different starting characters. Users learn that uncommon character combinations and randomness improves the security of their passwords; a concept that can also be applied to other passwords. Both the hangman and viewport schemes could be respectively implemented for any text-based password system or click-based graphical password system.\n\nWe have recently implemented the viewport scheme for Cued Click-Points (CCP) (Chiasson et al. 2007b), shown in Figure 2. Using data from an in-lab user study with 20 participants, where a total of 184 trials were completed, we compared the viewport-CCP click-points to those collected from our earlier PassPoints (Chiasson et al. 2007a) and CCP studies (Chiasson et al. 2007b). We found that the viewport-CCP click-points were much more uniformly distributed, reducing hotspots. Since most participants used the shuffle button sparingly, the viewport mostly remained in its initial random position, lowering the chance of participants selecting hotspots as their clickpoints. This shows that the security viewport was successful in persuading most users to choose more random clickpoints, and thus taught users to create more secure passwords.\n\nDiscussion\n\nThrough the Persuasive Authentication Framework we have described, we hope to teach users how secure passwords can be created, empowering them to continue behaving securely even when not using a frameworkenhanced authentication mechanism. There are several advantages to using PT to educate users rather than providing traditional security instructions and imposing rules:\n\n* A security mechanism with built-in PT teaches users how to create secure passwords in the context where the password will be used. Teaching secure behaviour in a classroom or meeting room is out of context and is unlikely to be effective.\n* In regular systems, users often do not understand the security rules imposed upon them and as a result of frustration, they will either try to circumvent the security mechanism or fulfill the new requirements as minimally as possible. Using persuasion, we hope users will be more willing to comply with security rules.\n* PT is interactive, giving users the opportunity to learn by doing. Traditional lecturing methods do not include hands-on ways to apply knowledge in the very environment it is meant to be used.\n* PT leverages our innate cognitive abilities such that users may not even be aware they are being persuaded or taught. This minimises resistance to new security measures, particularly since properly implemented PT principles should result in a system that is easier to use.\n\nPersuasive technology must be applied with great care, because there is always a risk of annoying users to the point that they rebel against the system. One example of this is a system proposed by Brustoloni & VillamarínSalomón (2007) intended to help protect users against phishing emails (which attempt to trick users into divulging private information, such as online bank account credentials and credit card numbers). Their warning dialog boxes changed each time they were displayed, forcing users to carefully read them before deciding on the appropriate response. Furthermore, users were required to provide justification for their actions and were audited by administrators who quarantined users who behaved insecurely. Although the authors did not explicitly use PT, many of the principles presented in this paper can be seen in their system. However, these principles are being severely misused such that users will quickly become angered at the very system that is supposed to protect them. When using the Persuasive Authentication Framework and persuasive technology in general, it is crucial to employ tactics aimed to help, assist, and teach users not only how to perform the desired action, but also why such action is beneficial for them and their organisation. Employing PT to force, scare, and coerce users to do one's bidding is counter to the intended purpose of persuasive technology and our framework.\n\nFinally, with security applications there is always the risk of leaking information to attackers. If not implemented carefully, features intended to help users and increase the usability of the system can often be leveraged by attackers to help them break into the system. Any additional cues provided to users must be fully evaluated from a security perspective to ensure that security is not compromised. This is why the viewport is placed randomly rather than purposefully placed away from hotspots. If the viewport avoided hotspots when shuffling, attackers could learn which points are most popular by simply watching the areas the viewport avoids when shuffling.\n\nConclusion\n\nTo date, attempts at educating users to behave securely have had only limited success. Although persuasive technology has been successful in training users in numerous other domains, we have not yet seen it applied to security. Through the Persuasive Authentication Framework, we are proposing a new methodology of utilising persuasive technology to educate users to better protect themselves from attackers. This offers a new versatile strategy for teaching and influencing users to behave more securely.\n\nThe hangman and viewport persuasion schemes are examples of how the Persuasive Authentication Framework can be applied. The viewport-CCP's preliminary user study results demonstrate that our framework shows promise as an effective tool in educating users to create more secure passwords. We look forward to further refining our implementation ideas as well as applying the framework to other forms of authentication. Persuasion need not stop at authentication however; our framework can also be utilised to educate users about security certificates, phishing, encryption, malware, and many other contemporary security issues. Although users currently have little to no understanding of how best to use the security measures employed to protect them, we hope to change that fact using our Persuasive Authentication Framework.\n\nReferences\n\nBrustoloni, J.C., & Villamarín-Salomón, R. (2007). Improving Security Decisions with Polymorphic and Audited Dialogs. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 76-87.\n\nChiasson, S., Biddle, R., & van Oorschot, P.C. (2007). A Second Look at the Usability of Click-based Graphical Passwords. 3 rd Symposium on Usable Privacy and Security (SOUPS), 2007, ACM Press, New York, NY, USA. 1-12.\n\nChiasson, S., van Oorschot, P.C., & Biddle, R. (2007). Graphical Password Authentication Using Cued Click-points. 12 th European Symposium On Research In Computer Security (ESORICS), 2007, Springer-Verlag, Berlin Heidelberg, Germany.\n\nChiasson, S., van Oorschot, P.C., & Biddle, R. (2006). A Usability Study and Critique of Two Password Managers. 15 th USENIX Security Symposium, 2006, USENIX, Berkeley, CA, USA. 1-16.\n\nFogg, B.J. (2003) Persuasive Technology: Using Computers to Change What We Think and Do. San Francisco, CA, USA: Morgan Kaufmann.\n\nKuo, C., Romanosky, S., & Cranor. L.F. (2006). Human Selection of Mnemonic Phrase-based Passwords. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 67-78.\n\nLai, C., Wu, C., & Chen, S. (2006). A Mobile Learning Environment to Support the Clinical Nursing Practicum. World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn) 2006. Association for the Advancement of Computing in Education (AACE), Chesapeake, VA, USA. 695-700.\n\nLucero, A., Zuloaga, R., Mota, S., & Muñoz, F. (2006) Persuasive Technologies in Education: Improving Motivation to Read and Write for Children. 1 st International Conference on Persuasive Technology, 2006, Springer-Verlag, Berlin Heidelberg, Germany. 142-153.\n\nNelson, D.L., Reed, V.S., & Walling, J.R. (1976). Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2 (5), 523-528, 1976.\n\nPD Photo. (2007). http://pdphoto.org/ Accessed August 2007.\n\nRenaud, K. (2005). Evaluating Authentication Mechanisms. In Cranor, L.F., & Garfinkel, S. (Eds.), Security and Usability (pp. 103-128). O'Reilly Media, Sebastopol, CA, USA. 2004.\n\nSasse, M.A., Brostoff, S., & Weirich, D. (1999). Transforming the 'Weakest Link': A Human-Computer Interaction Approach to Usable and Effective Security. BT Technical Journal, 19 (3), 122-131.\n\nShostack, A., & P. Syverson. (2004). What Price Privacy? (and why identity theft is about neither identity nor theft). In Camp, L.J., & Lewis, S. (Eds.), Economics of Information Security (pp. 129-142). Kluwer Academic Publishers, Norwell, MA, USA. 2004.\n\nSuo, X., Zhu, Y., & Owen, G.S. (2005). Graphical Passwords: A Survey. 21 st Annual Computer Security Applications Conference (ACSAC), 2005, IEEE Computer Society, Los Alamitos, CA, USA. 463-472.\n\nThorpe, J., & van Oorschot, P.C. (2007). Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. 16 th USENIX Security Symposium, 2007, USENIX, Berkeley, CA, USA. 103-118.\n\nWeirich, D., & Sasse, M.A. (2001). Pretty Good Persuasion: A first step towards effective password security in the real world. New Security Paradigms Workshop (NSPW). 2001, ACM Press, New York, NY, USA. 137-143.\n\nWhitten, A., & Tygar, J.D. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. 8 th USENIX Security Symposium, 1999, USENIX, Berkeley, CA, USA. 169-183.\n\nWiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63 (1-2), 102-127.\n\nYan, J., Blackwell, A., Anderson, R., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & Privacy Magazine, Sept-Oct 2004, 2 (5), 25-31.\n\nYee, K., & Sitaker, K. (2006). Passpet: convenient password management and phishing protection. 2 nd Symposium on Usable Privacy and Security (SOUPS), 2006, ACM Press, New York, NY, USA. 32-43.\n</text>\n",
"role": "user"
},
{
"content": "systematically applied to educating users about security.",
"role": "assistant"
}
] |
Featured in Physics
Optical Mass Spectrometry of Cold RaOH + and RaOCH3 +
M. Fan, 1,2 C. A. Holliman, 1,2 X. Shi, 1,2 H. Zhang, 3 M. W. Straus, 1,2 X. Li, 4 S. W. Buechele, 1,2 and A. M. Jayich 1,2 ,* 1 Department of Physics, University of California, Santa Barbara, California 93106, USA 2 California Institute for Quantum Entanglement, Santa Barbara, California 93106, USA 3 CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, 230026, China 4 Key Laboratory for Physical Electronics and Devices of the Ministry of Education and Shaanxi Key Laboratory of Information Photonic Technique, Xi' an Jiaotong University, Xi' an 710049, China
(Received 21 August 2020; accepted 4 November 2020; published 11 January 2021)
We present an all-optical mass spectrometry technique to identify trapped ions. The new method uses laser-cooled ions to determine the mass of a cotrapped dark ion with a sub-dalton resolution within a few seconds. We apply the method to identify the first controlled synthesis of cold, trapped RaOH þ and RaOCH3 þ . These molecules are promising for their sensitivity to time and parity violations that could constrain sources of new physics beyond the standard model. The nondestructive nature of the mass spectrometry technique may help identify molecular ions or highly charged ions prior to optical spectroscopy. Unlike previous mass spectrometry techniques for small ion crystals that rely on scanning, the method uses a Fourier transform that is inherently broadband and comparatively fast. The technique's speed provides new opportunities for studying state-resolved chemical reactions in ion traps.
DOI: 10.1103/PhysRevLett.126.023002
Introduction.—Ion traps are powerful tools because their ability to trap only depends on two properties: the mass and charge of a particle. Therefore, they can trap ionic species with rich internal structures that preclude laser cooling or fluorescence. Such dark ions include molecules, highly charged ions, and atoms with transitions that are deep in the UV. These ions can be sympathetically cooled by cotrapped laser-cooled ions, where they appear as dark ion defects in a Coulomb crystal. Dark ions have seen great successes in optical clocks, e.g., Al þ [1], constraining new physics, e.g., HfF þ [2], and studying state-resolved chemical reactions, e.g., BaCl þ [3] and RbSr þ [4]. There has also been much progress with highly charged ions, which generally lack strong fluorescence transitions, for metrology and tests of fundamental constant variations [5–7]. In this work, we have synthesized a pair of molecular ions that are promising for probing new physics: RaOH þ and RaOCH3 þ .
Recent measurements of parity (P) and time-reversal (T) violating moments are now probing physics at energy scales beyond the direct reach of the Large Hadron Collider [8]. Radium-based molecules are promising for constraining hadronic P, T-odd forces [9–11]. The heavy and octupole-deformed radium nucleus enhances sensitivity to new physics in the hadronic sector [12,13]. This sensitivity is further enhanced when radium is incorporated into molecules such as RaOH þ or RaOCH3 þ [9,10,14] that have large effective electric fields and a molecular structure that is critical for reducing systematic uncertainties. An ion trap is advantageous for working with radioactive molecules as high measurement sensitivity can be achieved with small sample sizes due to long measurement times [2,15].
For example, the long trap times combined with the high sensitivity of 225 RaOCH3 þ are sufficient for an experiment with even a single trapped molecule to set new bounds on hadronic P, T violation [16].
Because dark ions do not fluoresce, mass spectrometry techniques are commonly used for species identification. We present a new nondestructive optical mass spectrometry (OMS) technique to identify a trapped dark ion in a Coulomb crystal by measuring a motional frequency of the crystal. In this work, we use cotrapped laser-cooled ions to amplify the secular (normal mode) motion of the crystal by using coherent population trapping (CPT) in the S 1=2-P1=2-D3=2 Λ-level system [17] common to Ca þ , Sr þ , Ba þ , and Ra þ . For these ions, it is fast and straightforward to realize CPT by changing the frequency and power of the P1=2 → D3=2 repump laser from the laser cooling values with an acousto-optical modulator. With CPT, the optical spectrum of the S1=2 → P1=2 cooling transition can be modified so the ion's motion is coherently amplified [18], which modulates the scattered light at the motional frequency and its harmonics, which can then be measured with a Fourier transform. Because the motional modes of the ion crystal are set by the charge and mass of the trapped particles, motional frequencies can be used to determine the ion's mass. The OMS technique can be used with any laser-cooled ion, even without using a Λ structure, e.g., Be þ , Mg þ , or Yb þ , via "phonon lasing" with bichromatic light [19].
Many techniques have been used to identify trapped dark ions in Paul traps. The best technique for large Coulomb crystals (hundreds to thousands of ions) with multiple dark
ion species is time-of-flight mass spectrometry, but it is inherently destructive and requires a purpose-built trap and custom electronics [20–22]. In the regime of small ion crystals with a few dark ions, multiple techniques have been developed that rely on measuring a trap secular frequency, including secular motion excitation by applied electric fields (tickle scans) [23–25], optical sideband spectroscopy [26], and ion crystal phase transitions [27]. Optical sideband spectroscopy requires a narrow linewidth laser and is also slow (∼1 minute). Measuring phase transitions has limited performance due to the large mass uncertainties (∼5 daltons [27]). A tickle scan typically requires a ≥ 1 minute measurement where an electrical drive is scanned over the secular frequency, which results in a broad resonance peak due to the damping from the laser cooling that is required by the technique. The applied electric field can also destructively drive ions out of the trap. Despite these drawbacks and the need for additional electrical connections (which are a noise conduit), for small crystals the tickle scan has been the most widely used technique. A variation of the tickle scan method modulates the cooling light intensity instead of modulating an electrical drive [28]. This removes some drawbacks but with an increase in technical overhead. In order for any of these techniques to achieve reasonable measurement times (∼1 minute), a priori knowledge of the trapped dark ions is required to reduce the secular frequency scan range. In comparison to these small ion crystal mass spectrometry techniques, the reported OMS technique is faster, does not require knowledge of the dark ion's mass, is less invasive, and is a simple extension to Doppler cooling.
Secular motion amplification by coherent population trapping.—We use CPT in Ra þ to amplify the ion crystal's motion. For Doppler cooling, the cooling laser at 468 nm is red-detuned, Δ SP < 0, from the S1=2 → P1=2 transition, and a repump laser at 1079 nm is blue-detuned, Δ DP > 0, from the D3=2 → P1=2 transition that brings the population back into the cooling cycle [18] (see Fig. 1). The high scattering rate of laser cooling can be significantly reduced by the CPT that occurs when Δ SP ¼ Δ DP [29]. For CPT motional amplification, the condition is less stringent as setting Δ SP < Δ DP < 0 (see Fig. 1) heats the ion crystal because the 468 nm spectrum has a local slope that is negative due to the excitation suppression from CPT at Δ SP ¼ Δ DP. However, the heating is bounded by the 468 nm global spectrum, which has a positive slope for Δ SP < 0 that cools the heated ion's motion once it reaches a sufficient amplitude where the global cooling spectrum is Doppler shifted into resonance. The trapped ions then maintain an amplified equilibrium orbit when the optically induced "local heating" and "global cooling" effects balance [30,37].
For OMS identification of RaOH þ and RaOCH3 þ , we apply a 2.5 gauss magnetic field along the trap axial direction. The k vectors of both lasers are at 45° with
respect to all trap axes and are linearly polarized perpendicular to the magnetic field direction (see Fig. 1). Each laser's frequency and amplitude is controlled with an acousto-optical modulator. The multipeak spectrum of the cooling laser (see Fig. 2) enables "local heating, global cooling" that amplifies the ion motion up to a fixed value. The 1079 nm light, with a k vector perpendicular to the 468 nm light [see Fig. 1(c)], breaks the degeneracy between the axial and radial directions so that the CPT only amplifies motion along the axial direction (see [30]). To switch from CPT amplification to Doppler cooling,
we detune Δ DP positive so the CPT excitation suppression is far from Δ SP.
OMS of radium-based molecular ions.—We trap 226 Ra þ ions in a linear Paul trap with a radio frequency (rf) drive of Ω rf =2π ¼ 1 MHz, radial electrode to trap center distance r0 ¼ 3.0 mm, and axial electrode to trap center distance z0 ¼ 7.5 mm (for details, see [40]). For a single Ra þ , the axial secular frequency is ωz=2π ¼ 27.8 kHz. The 468 nm fluorescent photons are collected and sent to a camera and a photomultiplier tube (PMT), and the counts are time-tagged using a field-programmable gate array [41].
We laser cool three Ra þ ions and apply CPT amplification to increase the secular motion amplitude on the axial center-of-mass (COM) mode to 22ð3Þ μm. A Fourier transform of the PMT counts while the ion motion is CPT amplified gives the OMS signal. The signal is calibrated by using known (fluorescing) ions. In this case, three Ra þ ions are used for calibration (see Fig. 3). Next, either methanol vapor or the deuterated equivalent is introduced to react with the laser-cooled Ra þ . A chemical reaction produces a dark ion defect in the crystal and drops the PMT counts by roughly 1=3. If the dark ion is not in the middle of the crystal, we reorder the ions to meet this condition by blue-detuning the 468 nm light, Δ SP > 0, for ∼1 s, which heats the trapped ions. We apply OMS to find the secular frequency and with the calibration measurement we can calculate the center ion's mass [30] (see Fig. 3). Each trace is an average of ten 1=3 s long measurements. The second harmonics of the secular frequencies are used because in our experimental setup they are the strongest Fourier components.
The difference in the mass spectrum of molecules when the trapped ions are exposed to methanol versus deuterated methanol confirms that we are producing the molecular
TABLE I. Statistical results (Stat.) and systematic shifts and uncertainties (Syst.) of the radium-based molecular ion masses measured by OMS in daltons. The final molecular ion masses are calculated from a linear sum of the shifts, and the final uncertainties are given by summing the uncertainties in quadrature. See [30] for details on the systematics. For comparison the calculated molecular ion masses (Calc.) are given [46].
ions identified by mass. When methanol is introduced, only RaOCH3 þ [42–44] and RaOH þ [45] are created, while RaOCD3 þ and RaOD þ are only formed with deuterated methanol. The differences between the measured and calculated second harmonics of the secular frequencies are all within 13 Hz, corresponding to a fractional mass difference of m=Δm ∼ 800 in a 3 s measurement. We observe that with a methanol (deuterated) background pressure of ∼5 × 10 − 10 torr, RaOH þ (RaOD þ ) is not chemically stable and typically reacts in a few minutes to form RaOCH3 þ (RaOCD3 þ ), which is easily detected because the OMS technique is fast, precise, and broadband.
The OMS statistical uncertainty of 3 Hz was set by the Fourier transform resolution, which in turn comes from a 1=3 s data acquisition memory limit. The line center is found with a Lorentzian fit, which has an uncertainty (< 0.1 Hz) that is much less than the Fourier frequency resolution. We also consider systematic effects, including trap potential drift, secular motion amplitude shifts, and micromotion shifts [30]. Both the statistical and systematic effects contribute to the ion mass uncertainty or shift by much less than 1 dalton, as summarized in Table I.
OMS in a high frequency ion trap.—In a separate experimental apparatus, we confirm the OMS technique with strontium isotopes 88, 86, and 84, which we also identify with fluorescence. We demonstrate that the statistical mass sensitivity can be enhanced with a higher frequency ion trap (r 0 ¼ 0.6 mm, z0 ¼ 2.5 mm, Ω rf =2π ¼ 22 MHz). The axial secular frequency for a single 88 Sr þ is ωz=2π ¼ 91.7 kHz. We trap two-ion crystals with one 88 Sr þ and one 88 ; 87 ; 86 ; 84 Sr þ , and measure the axial COM secular frequencies of the crystal by OMS with CPT amplification applied to the 88 Sr þ . 87 Sr þ is identified only with OMS.
The Fourier spectra of second harmonics of the axial COM secular frequency are shown in Fig. 4. The mass labels are calibrated using two 88 Sr þ ions [30]. Each trace is an average of ten 0.5 s measurements. The corresponding statistical mass resolution is m=Δm stat ∼ 20000. The sub 1 dalton discrepancies between measured and calculated
masses are primarily due to temporal drift of the trap potential.
Conclusion.—We have produced 226 RaOH þ and 226 RaOCH3 þ molecules in this work. Their isotopologues 225 RaOH þ and 225 RaOCH3 þ are proposed for nuclear Schiff moment measurements [9,10] and can be produced with trapped 225 Ra þ and methanol. The production, sympathetic cooling, and fast nondestructive identification of these radioactive polyatomic molecular ions enables studying their internal structure with techniques such as photodissociation spectroscopy [47] or quantum logic spectroscopy [48,49].
The short measurement time and sub-dalton mass resolution could enable detection of short-lived molecular ions, as demonstrated in this Letter using RaOH þ and RaOD þ , which are metastable when in the presence of a methanol background. We note that the measurement time can be further reduced to 0.1 s or less with an iris to selectively collect ion fluorescence on one end of the amplified ion motion. With such a short measurement time, it is possible to apply this technique to study the dissociation channels of radium-based molecular ions. For example, Ra þ in the D5=2 state (lifetime 0.3 s [50]) is optically indistinguishable from a radium-based molecular ion, as neither of them fluoresce during Ra þ Doppler cooling, but can be distinguished with mass spectrometry. This provides a new tool to study the electronic states of chemical reaction products. The simultaneous determination of product and reactant states can be achieved by combining this method with optical pumping, which will help investigate full reaction pathways with single particles [4,51]. The technique may also be used to rapidly characterize the motional frequencies of an ion trap. For example, it could be incorporated into a feedback loop for the long-term stabilization of trap motional frequencies [52].
We thank W. Campbell, N. Hutzler, and D. Patterson for helpful discussions. This research was performed under the sponsorship of the NSF Grant No. PHY-1912665 and the University of California Office of the President (Grant No. MRP-19-601445).
* Corresponding author. [email protected]
[1] S. M. Brewer, J.-S. Chen, A. M. Hankin, E. R. Clements, C. W. Chou, D. J. Wineland, D. B. Hume, and D. R. Leibrandt, Phys. Rev. Lett. 123 , 033201 (2019).
[2] W. B. Cairncross, D. N. Gresh, M. Grau, K. C. Cossel, T. S. Roussy, Y. Ni, Y. Zhou, J. Ye, and E. A. Cornell, Phys. Rev. Lett. 119 , 153001 (2017).
[3] P. Puri, M. Mills, I. Simbotin, J. A. Montgomery, R. Côt´e, C. Schneider, A. G. Suits, and E. R. Hudson, Nat. Chem. 11 , 615 (2019).
[4] T. Sikorsky, Z. Meir, R. Ben-shlomi, N. Akerman, and R. Ozeri, Nat. Commun. 9 , 920 (2018).
[5] M. S. Safronova, V. A. Dzuba, V. V. Flambaum, U. I. Safronova, S. G. Porsev, and M. G. Kozlov, Phys. Rev. Lett. 113 , 030801 (2014).
[6] M. G. Kozlov, M. S. Safronova, J. R. C. López-Urrutia, and P. O. Schmidt, Rev. Mod. Phys. 90 , 045005 (2018).
[7] P. Micke, T. Leopold, S. A. King, E. Benkler, L. J. Spieß, L. Schmöger, M. Schwarz, J. R. C. López-Urrutia, and P. O. Schmidt, Nature (London) 578 , 60 (2020).
[8] V. Andreev, D. G. Ang, D. DeMille, J. M. Doyle, G. Gabrielse, J. Haefner, N. R. Hutzler, Z. Lasner, C. Meisenhelder, B. R. O'Leary, C. D. Panda, A. D. West, E. P. West, and X. Wu (A. C. M. E. Collaboration), Nature (London) 562 , 355 (2018).
[9] V. V. Flambaum, Phys. Rev. C , 035501 (2019).
99
[10] I. Kozyryev and N. R. Hutzler, Phys. Rev. Lett. 119 , 133002 (2017).
[12] L. P. Gaffney et al., Nature (London) 497 , 199 (2013).
[11] R. F. G. Ruiz et al., Nature (London) 581 , 396 (2020).
[13] B. Graner, Y. Chen, E. G. Lindahl, and B. R. Heckel, Phys. Rev. Lett. 116 , 161601 (2016).
[14] A. D. Kudashov, A. N. Petrov, L. V. Skripnikov, N. S. Mosyagin, T. A. Isaev, R. Berger, and A. V. Titov, Phys. Rev. A 90 , 052513 (2014).
[15] Y. Zhou, Y. Shagam, W. B. Cairncross, K. B. Ng, T. S. Roussy, T. Grogan, K. Boyce, A. Vigil, M. Pettine, T. Zelevinsky, J. Ye, and E. A. Cornell, Phys. Rev. Lett. 124 , 053201 (2020).
[16] P. Yu and N. R. Hutzler, following Letter, Phys. Rev. Lett. 126 , 023003 (2021)..
[18] D. J. Berkeland and M. G. Boshier, Phys. Rev. A 65 , 033413 (2002).
[17] X. Chen, Y.-W. Lin, and B. C. Odom, New J. Phys. 17 , 043037 (2015).
[19] K. Vahala, M. Herrmann, S. Knünz, V. Batteiger, G. Saathoff, T. W. Hänsch, and T. Udem, Nat. Phys. 5 , 682 (2009).
[20] C. Schneider, S. J. Schowalter, K. Chen, S. T. Sullivan, and E. R. Hudson, Phys. Rev. Applied 2 , 034013 (2014).
[21] N. Deb, L. L. Pollum, A. D. Smith, M. Keller, C. J. Rennick, B. R. Heazlewood, and T. P. Softley, Phys. Rev. A 91 , 033408 (2015).
[22] P. C. Schmid, J. Greenberg, M. I. Miller, K. Loeffler, and H. J. Lewandowski, Rev. Sci. Instrum. 88 , 123107 (2017).
[23] P. F. Staanum, K. Højbjerre, R. Wester, and M. Drewsen, Phys. Rev. Lett. 100 , 243003 (2008).
[24] S. Willitsch, M. T. Bell, A. D. Gingell, S. R. Procter, and T. P. Softley, Phys. Rev. Lett. 100 , 043203 (2008).
[25] A. D. Gingell, M. T. Bell, J. M. Oldham, T. P. Softley, and J. N. Harvey, J. Chem. Phys. 133 , 194302 (2010).
[26] J. E. Goeders, C. R. Clark, G. Vittorini, K. Wright, C. R. Viteri, and K. R. Brown, J. Phys. Chem. A 117 , 9725 (2013).
[27] K. Groot-Berning, F. Stopp, G. Jacob, D. Budker, R. Haas, D. Renisch, J. Runke, P. Thörle-Pospiech, C. E. Düllmann, and F. Schmidt-Kaler, Phys. Rev. A 99 , 023420 (2019).
[28] M. Drewsen, A. Mortensen, R. Martinussen, P. Staanum, and J. L. Sørensen, Phys. Rev. Lett. 93 , 243201 (2004).
[29] G. Janik, W. Nagourney, and H. Dehmelt, J. Opt. Soc. Am. B 2 , 1251 (1985).
[30] See Supplemental Material, which includes Refs. [31–36], at http://link.aps.org/supplemental/10.1103/PhysRevLett .126.023002 for further discussion of ion motional amplification, secular frequency calculations, and OMS systematic effects.
[31] P. D. Lett, W. D. Phillips, S. L. Rolston, C. E. Tanner, R. N. Watts, and C. I. Westbrook, J. Opt. Soc. Am. B 6 , 2084 (1989).
[32] U. Kemiktarak, M. Durand, M. Metcalfe, and J. Lawall, Phys. Rev. Lett. 113 , 030802 (2014).
[33] D. J. Berkeland, J. D. Miller, J. C. Bergquist, W. M. Itano, and D. J. Wineland, J. Appl. Phys. 83 , 5025 (1998).
[34] G. Morigi and H. Walther, Eur. Phys. J. D 13 , 261 (2001).
[35] D. Kielpinski, B. E. King, C. J. Myatt, C. A. Sackett, Q. A. Turchette, W. M. Itano, C. Monroe, D. J. Wineland, and W. H. Zurek, Phys. Rev. A 61 , 032310 (2000).
[36] N. Akerman, S. Kotler, Y. Glickman, Y. Dallal, A. Keselman, and R. Ozeri, Phys. Rev. A 82 , 061402(R) (2010).
[37] R. Blümel, C. Kappler, W. Quint, and H. Walther, Phys. Rev. A 40 , 808 (1989).
[38] H. Oberst, Master's Thesis, University of Innsbruck, 1999.
[39] J. Roßnagel, K. N. Tolazzi, F. Schmidt-Kaler, and K. Singer, New J. Phys. 17 , 045004 (2015).
[40] M. Fan, C. A. Holliman, A. L. Wang, and A. M. Jayich, Phys. Rev. Lett. 122 , 223001 (2019).
[42] W. Lu and S. Yang, J. Phys. Chem. A 102 , 825 (1998).
[41] T. Pruttivarasin and H. Katori, Rev. Sci. Instrum. 86 , 115106 (2015).
[43] J. I. Lee and J. M. Farrar, J. Phys. Chem. A 106 , 11882 (2002).
[44] P. Puri, M. Mills, C. Schneider, I. Simbotin, J. A. Montgomery, R. Côt´e, A. G. Suits, and E. R. Hudson, Science 357 , 1370, (2017).
[45] B. L. Augenbraun, Z. D. Lasner, A. Frenett, H. Sawaoka, C. Miller, T. C. Steimle, and J. M. Doyle, New J. Phys. 22 , 022003 (2020).
[46] J. S. Coursey, D. J. Schwab, J. J. Tsai, and R. A. Dragoset, Atomic weights and isotopic compositions (version 4.1), National Institute of Standards and Technology, Gaithersburg, MD, 2015. [Online] Available: http://physics.nist.gov/ Comp [2020 Mar 11].
[47] N. B. Khanyile, G. Shu, and K. R. Brown, Nat. Commun. 6 , 7825 (2015).
[48] P. O. Schmidt, T. Rosenband, C. Langer, W. M. Itano, J. C. Bergquist, and D. J. Wineland, Science 309 , 749 (2005).
[49] F. Wolf, Y. Wan, J. C. Heip, F. Gebert, C. Shi, and P. O. Schmidt, Nature (London) 530 , 457 (2016).
[50] R. Pal, D. Jiang, M. S. Safronova, and U. I. Safronova, Phys. Rev. A 79 , 062505 (2009).
[51] L. Ratschbacher, C. Zipkes, C. Sias, and M. Köhl, Nat. Phys. 8 , 649 (2012).
[52] K. G. Johnson, J. D. Wong-Campos, A. Restelli, K. A. Landsman, B. Neyenhuis, J. Mizrahi, and C. Monroe, Rev. Sci. Instrum. 87 , 053110 (2016).
|
<urn:uuid:d7546487-00c9-4d25-a2fd-c98cb5500f1d>
|
CC-MAIN-2021-43
|
https://jayich.io/pdfs/papers/fan-2021-oms-radium-molecules.pdf
|
2021-10-17T16:12:57+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00167-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 436,301,022
| 6,307
|
eng_Latn
|
eng_Latn
| 0.733077
|
eng_Latn
| 0.944988
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
5201,
8907,
13395,
18040,
21641
] |
Featured in Physics
Optical Mass Spectrometry of Cold RaOH + and RaOCH3 +
M. Fan, 1,2 C. A. Holliman, 1,2 X. Shi, 1,2 H. Zhang, 3 M. W. Straus, 1,2 X. Li, 4 S. W. Buechele, 1,2 and A. M. Jayich 1,2 ,* 1 Department of Physics, University of California, Santa Barbara, California 93106, USA 2 California Institute for Quantum Entanglement, Santa Barbara, California 93106, USA 3 CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, 230026, China 4 Key Laboratory for Physical Electronics and Devices of the Ministry of Education and Shaanxi Key Laboratory of Information Photonic Technique, Xi' an Jiaotong University, Xi' an 710049, China
(Received 21 August 2020; accepted 4 November 2020; published 11 January 2021)
We present an all-optical mass spectrometry technique to identify trapped ions. The new method uses laser-cooled ions to determine the mass of a cotrapped dark ion with a sub-dalton resolution within a few seconds. We apply the method to identify the first controlled synthesis of cold, trapped RaOH þ and RaOCH3 þ . These molecules are promising for their sensitivity to time and parity violations that could constrain sources of new physics beyond the standard model. The nondestructive nature of the mass spectrometry technique may help identify molecular ions or highly charged ions prior to optical spectroscopy. Unlike previous mass spectrometry techniques for small ion crystals that rely on scanning, the method uses a Fourier transform that is inherently broadband and comparatively fast. The technique's speed provides new opportunities for studying state-resolved chemical reactions in ion traps.
DOI: 10.1103/PhysRevLett.126.023002
Introduction.—Ion traps are powerful tools because their ability to trap only depends on two properties: the mass and charge of a particle. Therefore, they can trap ionic species with rich internal structures that preclude laser cooling or fluorescence. Such dark ions include molecules, highly charged ions, and atoms with transitions that are deep in the UV. These ions can be sympathetically cooled by cotrapped laser-cooled ions, where they appear as dark ion defects in a Coulomb crystal. Dark ions have seen great successes in optical clocks, e.g., Al þ [1], constraining new physics, e.g., HfF þ [2], and studying state-resolved chemical reactions, e.g., BaCl þ [3] and RbSr þ [4]. There has also been much progress with highly charged ions, which generally lack strong fluorescence transitions, for metrology and tests of fundamental constant variations [5–7]. In this work, we have synthesized a pair of molecular ions that are promising for probing new physics: RaOH þ and RaOCH3 þ .
Recent measurements of parity (P) and time-reversal (T) violating moments are now probing physics at energy scales beyond the direct reach of the Large Hadron Collider [8]. Radium-based molecules are promising for constraining hadronic P, T-odd forces [9–11]. The heavy and octupole-deformed radium nucleus enhances sensitivity to new physics in the hadronic sector [12,13]. This sensitivity is further enhanced when radium is incorporated into molecules such as RaOH þ or RaOCH3 þ [9,10,14] that have large effective electric fields and a molecular structure that is critical for reducing systematic uncertainties. An ion trap is advantageous for working with radioactive molecules as high measurement sensitivity can be achieved with small sample sizes due to long measurement times [2,15].
For example, the long trap times combined with the high sensitivity of 225 RaOCH3 þ are sufficient for an experiment with even a single trapped molecule to set new bounds on hadronic P, T violation [16].
Because dark ions do not fluoresce, mass spectrometry techniques are commonly used for species identification. We present a new nondestructive optical mass spectrometry (OMS) technique to identify a trapped dark ion in a Coulomb crystal by measuring a motional frequency of the crystal. In this work, we use cotrapped laser-cooled ions to amplify the secular (normal mode) motion of the crystal by using coherent population trapping (CPT) in the S 1=2-P1=2-D3=2 Λ-level system [17] common to Ca þ , Sr þ , Ba þ , and Ra þ . For these ions, it is fast and straightforward to realize CPT by changing the frequency and power of the P1=2 → D3=2 repump laser from the laser cooling values with an acousto-optical modulator. With CPT, the optical spectrum of the S1=2 → P1=2 cooling transition can be modified so the ion's motion is coherently amplified [18], which modulates the scattered light at the motional frequency and its harmonics, which can then be measured with a Fourier transform. Because the motional modes of the ion crystal are set by the charge and mass of the trapped particles, motional frequencies can be used to determine the ion's mass. The OMS technique can be used with any laser-cooled ion, even without using a Λ structure, e.g., Be þ , Mg þ , or Yb þ , via "phonon lasing" with bichromatic light [19].
Many techniques have been used to identify trapped dark ions in Paul traps. The best technique for large Coulomb crystals (hundreds to thousands of ions) with multiple dark
ion species is time-of-flight mass spectrometry, but it is inherently destructive and requires a purpose-built trap and custom electronics [20–22]. In the regime of small ion crystals with a few dark ions, multiple techniques have been developed that rely on measuring a trap secular frequency, including secular motion excitation by applied electric fields (tickle scans) [23–25], optical sideband spectroscopy [26], and ion crystal phase transitions [27]. Optical sideband spectroscopy requires a narrow linewidth laser and is also slow (∼1 minute). Measuring phase transitions has limited performance due to the large mass uncertainties (∼5 daltons [27]). A tickle scan typically requires a ≥ 1 minute measurement where an electrical drive is scanned over the secular frequency, which results in a broad resonance peak due to the damping from the laser cooling that is required by the technique. The applied electric field can also destructively drive ions out of the trap. Despite these drawbacks and the need for additional electrical connections (which are a noise conduit), for small crystals the tickle scan has been the most widely used technique. A variation of the tickle scan method modulates the cooling light intensity instead of modulating an electrical drive [28]. This removes some drawbacks but with an increase in technical overhead. In order for any of these techniques to achieve reasonable measurement times (∼1 minute), a priori knowledge of the trapped dark ions is required to reduce the secular frequency scan range. In comparison to these small ion crystal mass spectrometry techniques, the reported OMS technique is faster, does not require knowledge of the dark ion's mass, is less invasive, and is a simple extension to Doppler cooling.
Secular motion amplification by coherent population trapping.—We use CPT in Ra þ to amplify the ion crystal's motion. For Doppler cooling, the cooling laser at 468 nm is red-detuned, Δ SP < 0, from the S1=2 → P1=2 transition, and a repump laser at 1079 nm is blue-detuned, Δ DP > 0, from the D3=2 → P1=2 transition that brings the population back into the cooling cycle [18] (see Fig. 1). The high scattering rate of laser cooling can be significantly reduced by the CPT that occurs when Δ SP ¼ Δ DP [29]. For CPT motional amplification, the condition is less stringent as setting Δ SP < Δ DP < 0 (see Fig. 1) heats the ion crystal because the 468 nm spectrum has a local slope that is negative due to the excitation suppression from CPT at Δ SP ¼ Δ DP. However, the heating is bounded by the 468 nm global spectrum, which has a positive slope for Δ SP < 0 that cools the heated ion's motion once it reaches a sufficient amplitude where the global cooling spectrum is Doppler shifted into resonance. The trapped ions then maintain an amplified equilibrium orbit when the optically induced "local heating" and "global cooling" effects balance [30,37].
For OMS identification of RaOH þ and RaOCH3 þ , we apply a 2.5 gauss magnetic field along the trap axial direction. The k vectors of both lasers are at 45° with
respect to all trap axes and are linearly polarized perpendicular to the magnetic field direction (see Fig. 1). Each laser's frequency and amplitude is controlled with an acousto-optical modulator. The multipeak spectrum of the cooling laser (see Fig. 2) enables "local heating, global cooling" that amplifies the ion motion up to a fixed value. The 1079 nm light, with a k vector perpendicular to the 468 nm light [see Fig. 1(c)], breaks t
|
he degeneracy between the axial and radial directions so that the CPT only amplifies motion along the axial direction (see [30]).
| 8,725
|
inside_word
|
the
|
remove_all
|
<url>
https://jayich.io/pdfs/papers/fan-2021-oms-radium-molecules.pdf
</url>
<text>
Featured in Physics
Optical Mass Spectrometry of Cold RaOH + and RaOCH3 +
M. Fan, 1,2 C. A. Holliman, 1,2 X. Shi, 1,2 H. Zhang, 3 M. W. Straus, 1,2 X. Li, 4 S. W. Buechele, 1,2 and A. M. Jayich 1,2 ,* 1 Department of Physics, University of California, Santa Barbara, California 93106, USA 2 California Institute for Quantum Entanglement, Santa Barbara, California 93106, USA 3 CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, 230026, China 4 Key Laboratory for Physical Electronics and Devices of the Ministry of Education and Shaanxi Key Laboratory of Information Photonic Technique, Xi' an Jiaotong University, Xi' an 710049, China
(Received 21 August 2020; accepted 4 November 2020; published 11 January 2021)
We present an all-optical mass spectrometry technique to identify trapped ions. The new method uses laser-cooled ions to determine the mass of a cotrapped dark ion with a sub-dalton resolution within a few seconds. We apply the method to identify the first controlled synthesis of cold, trapped RaOH þ and RaOCH3 þ . These molecules are promising for their sensitivity to time and parity violations that could constrain sources of new physics beyond the standard model. The nondestructive nature of the mass spectrometry technique may help identify molecular ions or highly charged ions prior to optical spectroscopy. Unlike previous mass spectrometry techniques for small ion crystals that rely on scanning, the method uses a Fourier transform that is inherently broadband and comparatively fast. The technique's speed provides new opportunities for studying state-resolved chemical reactions in ion traps.
DOI: 10.1103/PhysRevLett.126.023002
Introduction.—Ion traps are powerful tools because their ability to trap only depends on two properties: the mass and charge of a particle. Therefore, they can trap ionic species with rich internal structures that preclude laser cooling or fluorescence. Such dark ions include molecules, highly charged ions, and atoms with transitions that are deep in the UV. These ions can be sympathetically cooled by cotrapped laser-cooled ions, where they appear as dark ion defects in a Coulomb crystal. Dark ions have seen great successes in optical clocks, e.g., Al þ [1], constraining new physics, e.g., HfF þ [2], and studying state-resolved chemical reactions, e.g., BaCl þ [3] and RbSr þ [4]. There has also been much progress with highly charged ions, which generally lack strong fluorescence transitions, for metrology and tests of fundamental constant variations [5–7]. In this work, we have synthesized a pair of molecular ions that are promising for probing new physics: RaOH þ and RaOCH3 þ .
Recent measurements of parity (P) and time-reversal (T) violating moments are now probing physics at energy scales beyond the direct reach of the Large Hadron Collider [8]. Radium-based molecules are promising for constraining hadronic P, T-odd forces [9–11]. The heavy and octupole-deformed radium nucleus enhances sensitivity to new physics in the hadronic sector [12,13]. This sensitivity is further enhanced when radium is incorporated into molecules such as RaOH þ or RaOCH3 þ [9,10,14] that have large effective electric fields and a molecular structure that is critical for reducing systematic uncertainties. An ion trap is advantageous for working with radioactive molecules as high measurement sensitivity can be achieved with small sample sizes due to long measurement times [2,15].
For example, the long trap times combined with the high sensitivity of 225 RaOCH3 þ are sufficient for an experiment with even a single trapped molecule to set new bounds on hadronic P, T violation [16].
Because dark ions do not fluoresce, mass spectrometry techniques are commonly used for species identification. We present a new nondestructive optical mass spectrometry (OMS) technique to identify a trapped dark ion in a Coulomb crystal by measuring a motional frequency of the crystal. In this work, we use cotrapped laser-cooled ions to amplify the secular (normal mode) motion of the crystal by using coherent population trapping (CPT) in the S 1=2-P1=2-D3=2 Λ-level system [17] common to Ca þ , Sr þ , Ba þ , and Ra þ . For these ions, it is fast and straightforward to realize CPT by changing the frequency and power of the P1=2 → D3=2 repump laser from the laser cooling values with an acousto-optical modulator. With CPT, the optical spectrum of the S1=2 → P1=2 cooling transition can be modified so the ion's motion is coherently amplified [18], which modulates the scattered light at the motional frequency and its harmonics, which can then be measured with a Fourier transform. Because the motional modes of the ion crystal are set by the charge and mass of the trapped particles, motional frequencies can be used to determine the ion's mass. The OMS technique can be used with any laser-cooled ion, even without using a Λ structure, e.g., Be þ , Mg þ , or Yb þ , via "phonon lasing" with bichromatic light [19].
Many techniques have been used to identify trapped dark ions in Paul traps. The best technique for large Coulomb crystals (hundreds to thousands of ions) with multiple dark
ion species is time-of-flight mass spectrometry, but it is inherently destructive and requires a purpose-built trap and custom electronics [20–22]. In the regime of small ion crystals with a few dark ions, multiple techniques have been developed that rely on measuring a trap secular frequency, including secular motion excitation by applied electric fields (tickle scans) [23–25], optical sideband spectroscopy [26], and ion crystal phase transitions [27]. Optical sideband spectroscopy requires a narrow linewidth laser and is also slow (∼1 minute). Measuring phase transitions has limited performance due to the large mass uncertainties (∼5 daltons [27]). A tickle scan typically requires a ≥ 1 minute measurement where an electrical drive is scanned over the secular frequency, which results in a broad resonance peak due to the damping from the laser cooling that is required by the technique. The applied electric field can also destructively drive ions out of the trap. Despite these drawbacks and the need for additional electrical connections (which are a noise conduit), for small crystals the tickle scan has been the most widely used technique. A variation of the tickle scan method modulates the cooling light intensity instead of modulating an electrical drive [28]. This removes some drawbacks but with an increase in technical overhead. In order for any of these techniques to achieve reasonable measurement times (∼1 minute), a priori knowledge of the trapped dark ions is required to reduce the secular frequency scan range. In comparison to these small ion crystal mass spectrometry techniques, the reported OMS technique is faster, does not require knowledge of the dark ion's mass, is less invasive, and is a simple extension to Doppler cooling.
Secular motion amplification by coherent population trapping.—We use CPT in Ra þ to amplify the ion crystal's motion. For Doppler cooling, the cooling laser at 468 nm is red-detuned, Δ SP < 0, from the S1=2 → P1=2 transition, and a repump laser at 1079 nm is blue-detuned, Δ DP > 0, from the D3=2 → P1=2 transition that brings the population back into the cooling cycle [18] (see Fig. 1). The high scattering rate of laser cooling can be significantly reduced by the CPT that occurs when Δ SP ¼ Δ DP [29]. For CPT motional amplification, the condition is less stringent as setting Δ SP < Δ DP < 0 (see Fig. 1) heats the ion crystal because the 468 nm spectrum has a local slope that is negative due to the excitation suppression from CPT at Δ SP ¼ Δ DP. However, the heating is bounded by the 468 nm global spectrum, which has a positive slope for Δ SP < 0 that cools the heated ion's motion once it reaches a sufficient amplitude where the global cooling spectrum is Doppler shifted into resonance. The trapped ions then maintain an amplified equilibrium orbit when the optically induced "local heating" and "global cooling" effects balance [30,37].
For OMS identification of RaOH þ and RaOCH3 þ , we apply a 2.5 gauss magnetic field along the trap axial direction. The k vectors of both lasers are at 45° with
respect to all trap axes and are linearly polarized perpendicular to the magnetic field direction (see Fig. 1). Each laser's frequency and amplitude is controlled with an acousto-optical modulator. The multipeak spectrum of the cooling laser (see Fig. 2) enables "local heating, global cooling" that amplifies the ion motion up to a fixed value. The 1079 nm light, with a k vector perpendicular to the 468 nm light [see Fig. 1(c)], breaks t<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://jayich.io/pdfs/papers/fan-2021-oms-radium-molecules.pdf\n</url>\n<text>\nFeatured in Physics\n\nOptical Mass Spectrometry of Cold RaOH + and RaOCH3 +\n\nM. Fan, 1,2 C. A. Holliman, 1,2 X. Shi, 1,2 H. Zhang, 3 M. W. Straus, 1,2 X. Li, 4 S. W. Buechele, 1,2 and A. M. Jayich 1,2 ,* 1 Department of Physics, University of California, Santa Barbara, California 93106, USA 2 California Institute for Quantum Entanglement, Santa Barbara, California 93106, USA 3 CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, 230026, China 4 Key Laboratory for Physical Electronics and Devices of the Ministry of Education and Shaanxi Key Laboratory of Information Photonic Technique, Xi' an Jiaotong University, Xi' an 710049, China\n\n(Received 21 August 2020; accepted 4 November 2020; published 11 January 2021)\n\nWe present an all-optical mass spectrometry technique to identify trapped ions. The new method uses laser-cooled ions to determine the mass of a cotrapped dark ion with a sub-dalton resolution within a few seconds. We apply the method to identify the first controlled synthesis of cold, trapped RaOH þ and RaOCH3 þ . These molecules are promising for their sensitivity to time and parity violations that could constrain sources of new physics beyond the standard model. The nondestructive nature of the mass spectrometry technique may help identify molecular ions or highly charged ions prior to optical spectroscopy. Unlike previous mass spectrometry techniques for small ion crystals that rely on scanning, the method uses a Fourier transform that is inherently broadband and comparatively fast. The technique's speed provides new opportunities for studying state-resolved chemical reactions in ion traps.\n\nDOI: 10.1103/PhysRevLett.126.023002\n\nIntroduction.—Ion traps are powerful tools because their ability to trap only depends on two properties: the mass and charge of a particle. Therefore, they can trap ionic species with rich internal structures that preclude laser cooling or fluorescence. Such dark ions include molecules, highly charged ions, and atoms with transitions that are deep in the UV. These ions can be sympathetically cooled by cotrapped laser-cooled ions, where they appear as dark ion defects in a Coulomb crystal. Dark ions have seen great successes in optical clocks, e.g., Al þ [1], constraining new physics, e.g., HfF þ [2], and studying state-resolved chemical reactions, e.g., BaCl þ [3] and RbSr þ [4]. There has also been much progress with highly charged ions, which generally lack strong fluorescence transitions, for metrology and tests of fundamental constant variations [5–7]. In this work, we have synthesized a pair of molecular ions that are promising for probing new physics: RaOH þ and RaOCH3 þ .\n\nRecent measurements of parity (P) and time-reversal (T) violating moments are now probing physics at energy scales beyond the direct reach of the Large Hadron Collider [8]. Radium-based molecules are promising for constraining hadronic P, T-odd forces [9–11]. The heavy and octupole-deformed radium nucleus enhances sensitivity to new physics in the hadronic sector [12,13]. This sensitivity is further enhanced when radium is incorporated into molecules such as RaOH þ or RaOCH3 þ [9,10,14] that have large effective electric fields and a molecular structure that is critical for reducing systematic uncertainties. An ion trap is advantageous for working with radioactive molecules as high measurement sensitivity can be achieved with small sample sizes due to long measurement times [2,15].\n\nFor example, the long trap times combined with the high sensitivity of 225 RaOCH3 þ are sufficient for an experiment with even a single trapped molecule to set new bounds on hadronic P, T violation [16].\n\nBecause dark ions do not fluoresce, mass spectrometry techniques are commonly used for species identification. We present a new nondestructive optical mass spectrometry (OMS) technique to identify a trapped dark ion in a Coulomb crystal by measuring a motional frequency of the crystal. In this work, we use cotrapped laser-cooled ions to amplify the secular (normal mode) motion of the crystal by using coherent population trapping (CPT) in the S 1=2-P1=2-D3=2 Λ-level system [17] common to Ca þ , Sr þ , Ba þ , and Ra þ . For these ions, it is fast and straightforward to realize CPT by changing the frequency and power of the P1=2 → D3=2 repump laser from the laser cooling values with an acousto-optical modulator. With CPT, the optical spectrum of the S1=2 → P1=2 cooling transition can be modified so the ion's motion is coherently amplified [18], which modulates the scattered light at the motional frequency and its harmonics, which can then be measured with a Fourier transform. Because the motional modes of the ion crystal are set by the charge and mass of the trapped particles, motional frequencies can be used to determine the ion's mass. The OMS technique can be used with any laser-cooled ion, even without using a Λ structure, e.g., Be þ , Mg þ , or Yb þ , via \"phonon lasing\" with bichromatic light [19].\n\nMany techniques have been used to identify trapped dark ions in Paul traps. The best technique for large Coulomb crystals (hundreds to thousands of ions) with multiple dark\n\nion species is time-of-flight mass spectrometry, but it is inherently destructive and requires a purpose-built trap and custom electronics [20–22]. In the regime of small ion crystals with a few dark ions, multiple techniques have been developed that rely on measuring a trap secular frequency, including secular motion excitation by applied electric fields (tickle scans) [23–25], optical sideband spectroscopy [26], and ion crystal phase transitions [27]. Optical sideband spectroscopy requires a narrow linewidth laser and is also slow (∼1 minute). Measuring phase transitions has limited performance due to the large mass uncertainties (∼5 daltons [27]). A tickle scan typically requires a ≥ 1 minute measurement where an electrical drive is scanned over the secular frequency, which results in a broad resonance peak due to the damping from the laser cooling that is required by the technique. The applied electric field can also destructively drive ions out of the trap. Despite these drawbacks and the need for additional electrical connections (which are a noise conduit), for small crystals the tickle scan has been the most widely used technique. A variation of the tickle scan method modulates the cooling light intensity instead of modulating an electrical drive [28]. This removes some drawbacks but with an increase in technical overhead. In order for any of these techniques to achieve reasonable measurement times (∼1 minute), a priori knowledge of the trapped dark ions is required to reduce the secular frequency scan range. In comparison to these small ion crystal mass spectrometry techniques, the reported OMS technique is faster, does not require knowledge of the dark ion's mass, is less invasive, and is a simple extension to Doppler cooling.\n\nSecular motion amplification by coherent population trapping.—We use CPT in Ra þ to amplify the ion crystal's motion. For Doppler cooling, the cooling laser at 468 nm is red-detuned, Δ SP < 0, from the S1=2 → P1=2 transition, and a repump laser at 1079 nm is blue-detuned, Δ DP > 0, from the D3=2 → P1=2 transition that brings the population back into the cooling cycle [18] (see Fig. 1). The high scattering rate of laser cooling can be significantly reduced by the CPT that occurs when Δ SP ¼ Δ DP [29]. For CPT motional amplification, the condition is less stringent as setting Δ SP < Δ DP < 0 (see Fig. 1) heats the ion crystal because the 468 nm spectrum has a local slope that is negative due to the excitation suppression from CPT at Δ SP ¼ Δ DP. However, the heating is bounded by the 468 nm global spectrum, which has a positive slope for Δ SP < 0 that cools the heated ion's motion once it reaches a sufficient amplitude where the global cooling spectrum is Doppler shifted into resonance. The trapped ions then maintain an amplified equilibrium orbit when the optically induced \"local heating\" and \"global cooling\" effects balance [30,37].\n\nFor OMS identification of RaOH þ and RaOCH3 þ , we apply a 2.5 gauss magnetic field along the trap axial direction. The k vectors of both lasers are at 45° with\n\nrespect to all trap axes and are linearly polarized perpendicular to the magnetic field direction (see Fig. 1). Each laser's frequency and amplitude is controlled with an acousto-optical modulator. The multipeak spectrum of the cooling laser (see Fig. 2) enables \"local heating, global cooling\" that amplifies the ion motion up to a fixed value. The 1079 nm light, with a k vector perpendicular to the 468 nm light [see Fig. 1(c)], breaks t<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "he degeneracy between the axial and radial directions so that the CPT only amplifies motion along the axial direction (see [30]).",
"role": "assistant"
}
] |
|
Modeling Malthusian Dynamics in Pre-industrial Societies
Sergey A. Nefedov
Ural Federal University, Ekaterinburg
ABSTRACT
The discussion about the Malthusian character of pre-industrial economies that has arisen in the recent years extensively uses simple mathematical models. This article analyzes some of these models to determine their conformity with Malthusian postulates. The author suggests two models that are more adequate for the description of the Malthusian patterns.
Until recently, most economic historians were inclined to think that the medieval economies in Eurasia had a Malthusian nature (Allen 2008: 951). However, following the publication of Lee and Anderson's work (Lee and Anderson 2002), many came to dispute this opinion. A discussion has arisen about how the available data confirm the Malthusian relationship between demographic dynamics and consumption (i.e., real wages). This discussion has largely involved simple mathematical models of the Malthusian economy.
In 1980, Lee published the first and most popular of these models. This model describes the relationship between the real wage, wt (consumption), and labor resources, Nt (population), using the following equation:
Or, in the logarithmic form:
Here, t is time; μ, ρ, η are some non-negative constants; and εt is a variable that takes into account the climatic effect and other exogenous parameters. The factor ρ describes the capital increase and technological advances, thus the Malthusian economy features ρ = 0.
Social Evolution & History, Vol. 13 No. 1, March 2014 172–184
2014 'Uchitel' Publishing House
If we take into account that in the ideal case εt = 0, the model can be expressed with quite a simple equation: wt = С Nt -η, where С is a certain constant. The drawbacks of this equation are evident: a small population Nt results in a consumption rate close to infinity, while in a large population the consumption becomes too small to ensure subsistence. Besides, this equation only shows the relationship between population and consumption. The model contains no feedback to demonstrate in what way the consumption influences population growth.
Wood (1998) suggests a feedback option for which he derives an equation basing on the same equation (1) as Lee, but formulates it as follows:
Here, θ is the minimum per capita consumption rate, and St is the maximum population that can subsist in the given territory when the consumption equals θ. St can grow with technological advances, but the Malthusian case features a constant St, St = S0. Wood believes that the birth rate bt and death rate dt can be described with the following equations:
where β0 , β1 , β2, δ0, δ1, and δ2 are certain constants. Thus, the equation below describes population growth:
Deriving bt and dt from the system of Equations (3)–(4) and inserting them into (5) yields:
where с0 and с1 here produces:
are certain constants. Substituting equation (1a)
where с2 and с3 are certain constants. The differential equation (6) has the time-independent solution Nt = N0 = exp(–с2/с3); its chart will be a horizontal line. According to the theorem of the unique existence of the solution, no other solutions (integral curves) may cross this horizontal line. The derivative dNt /dt is positive below this line, in the area 0 < Nt < N0; the solutions monotonically increase and the integral curves approximate the horizontal line. The derivative dNt /dt is negative above this line; the solutions monotonically decrease and the integral curves approximate
the horizontal line from above. Finally, the solutions cannot oscillate: the population cannot first feature growth and then loss due to 'the Malthusian crises'. Wood justifies this behavior of his model stating that the Malthusian crises 'are not a necessary feature of Malthusian systems… This conclusion is contrary to the belief of many economic historians (e.g., Le Roy Ladurie 1974: passim; Postan and Hatcher 1985: 69) though not to anything that Malthus himself ever wrote' (Wood 1998: 110).
However, Malthus did write about population loss and depopulation:
The power of population is so superior to the power of the earth to produce subsistence for man that premature death must in some shape or other visit the human race. The vices of mankind are active and able ministers of depopulation. They are the precursors in the great army of destruction, and often finish the dreadful work themselves. But should they fail in this war of extermination, sickly seasons, epidemics, pestilence, and plague advance in terrific array, and sweep off their thousands and tens of thousands. Should success be still incomplete, gigantic inevitable famine stalks in the rear, and with one mighty blow levels the population with the food of the world (Malthus 1798: 61).
Wood's model does not, therefore, describe the population dynamics envisioned by Malthus himself. Nevertheless, it is used in many studies devoted to the analysis of the Malthusian economy in traditional societies.
Sometimes an iterative version of this model is used, implying calculations on an annual basis. Equation (1a) in the version put forth by Møller and Sharp (2009) has logarithmic form:
Birth and death rates are calculated from the simplified equations:
The population Nt is related to the population Nt-1 in the previous year through the following relationship:
here, A, c0, c1 , a0 … a3 are certain constants. Inserting (3a) and (4a) into (7) gives:
where u and v are certain constants. The resulting equation is:
This equation generates a series of population values. If the population at the initial moment equals a million (i.e., N1 =1), then N2 = v, N3 equals v raised to a power of 1+u; N3 equals to v raised to a power of 1 + u + u 2 , etc. If ׀u > ׀1, then Nt → ∞, which is impossible under the condition of limited resources in the Malthusian theory. If 0 < u < 1, then Nt monotonically tends to a finite bound. Finally, the case –1 < u <0 produces a very specific series in which the population increases in even years and decreases in odd years (or vice versa). Thus, the Møller-Sharp model has the same drawback as Wood's initial model: it cannot describe longterm population oscillations.
Another iterative version of the model is the one developed by Ashraf and Galor (2011). Beginning with equation (1a), the authors of this model take into consideration the number of adults and children, and optimize expenses. They, nevertheless, ultimately come to the same equation (8).
One more version of Wood's model is that of Voigtlander and Voth (2009). They use equation (1a), but replace equations (3) and (4) with (3a) and (4a):
where b0 and d0 are certain constants. Inserting (1a) into equation (5) yields:
where p and q are certain constants. The differential equation (6a) has the time-independent solution Nt = N0 = p 1/η(m – n) , which represents a horizontal line. As with the above model, the solution curves that are beneath this line monotonically increase and those lying above the line – monotonically decrease. Thus, this model has the same limitation as Wood's model and its other derivatives: it does not offer oscillating solutions.
Brander and Taylor (1998) have suggested another popular model. This model analyzes some abstract renewable resource consumed in the course of human activities. For example, it might be forest resources or soil yield. St is the available amount of this resource (in year t), and K denotes its reserve in nature. The equation for consumption of this resource is as follows:
where r and u are certain constants. The first term on the right side describes the process of natural resource renewal; the second term describes resource depletion owing to economic activity. The population number is given by the following equation:
Brander and Taylor have shown that the system of equations (8)–(9) has oscillating solutions: when the resource is abundant the population grows, when it is exhausted the population decreases until the resource is renewed. Brander and Taylor refer to their model as 'Malthusian-Ricardian'. Initially, the model was intended to describe the economy of Easter Island, but afterwards it got wider application as a sufficiently general model of the Malthusian economy (e.g., Maxwell and Reuveny 2000; D'Alessandro 2007). It is essential to note, however, that resource St in the Brander–Taylor model is not the harvest gathered by farmers. According to Brander and Taylor, the crop is denoted by the term uStNt and it is deducted from the resource St. According to Szulga (2012), such a model describes a society of gatherers (or hunters) rather than an agrarian society. Meanwhile, Malthus mainly studied agricultural economies. Thus, Brander-Taylor model cannot be referred to as a 'Malthusian-Ricardian' one.
where d and v are constants, and d < 0 in this case. This equation shows that natural population growth depends on the availability of resource St.
Up to this point, I have confined my discussion to the analysis of simple models of the Malthusian economy that consist of no more than two differential equations. Naturally, there exist more complicated models (e.g., Usher 1989; Komlos and Artzrouni 1990; Chu and Lee 1994; Galor and Weil 2000; Lee and Tuljapurkar 2008) that allow for better behavioral freedom and offer oscillating solutions, as well. Many such models have been constructed within the framework of cliodynamic research actively performed in Russia and the USA (e.g., Tsirel 2004; Korotayev, Malkov, and Khaltourina 2005, 2006; Korotayev, Malkov, and Grinin 2007;
Turchin 2007, 2009; Malkov 2009). However, almost all models described in literature have the same drawback: they contain uncertain coefficients whose values are unknown and cannot be determined in principle. The more complicated is a model, the more uncertain coefficients it contains. Meanwhile, these coefficients determine the behavior of the model, and different coefficient values result in different population dynamics. Thus, an uncertainty originates: as coefficient values are unknown, it is also uncertain which of the possible behavioral variants corresponds to historical reality and which of them could not possibly be realized.
In the remainder of this article, I would like to discuss two simple models that contain no uncertain parameters and, in my opinion, are sufficiently adequate for the description of the Malthusian population dynamics. Within the first model, Nt is the population in the year t, as above; Kt is the grain stock after the harvest estimated in terms of minimum annual per caput grain consumption rates (rate of consumption is assumed about 240 kg); and r is the natality under favorable conditions. The area under cultivation and the harvest depend on the population, and with the population growth they tend to the constant determined by the maximum area under cultivation maintained by the agricultural community. We will consider that the harvest is determined by the equation Pt=aNt /(Nt+d), where a and d are certain constants. To describe the population dynamics we use the standard logistic equation:
Kt in this logistic equation denotes the carrying capacity (i.e., the maximum size of population that may live in this territory). In our case, this population size corresponds to the number of minimum annual consumption rates in storage. Annually, Nt consumption rates are consumed, and the stock growth will be equal to:
If N in the equation for dP/dN tends to 0, we will obtain the harvest a/d (number of consumption rates) gathered by one farmer in favorable conditions (when the population is small and he or she is able to cultivate the maximum area). Thus, the value q = a/d shows how many households one farming family can support. The history
Thus, we have the simplest system of two differential equations (10)–(11). This system has an equilibrium state, when the population and stock remain constant, namely, when K0 = = N0 = a – d.
of agricultural societies shows that q usually varies within the limits 1.2 < q < 2. We can express a and d in terms of q and N0:
N0 can be conventionally set equal to 1 and thus, there are two constants in this model, r and q, which have physical significance and vary within the known limits: 0.01 < r < 0.02, and 1.2 < q < 2. The common methods used for investigation of dynamic systems allow us to determine that system (10)–(11) describes dying oscillations. The first oscillations can have different periods; however, when the curve approaches the equilibrium state, the period is close to:
The period T decreases when r and q increase, and increases, respectively, when these values decrease (Table 1 and Fig. 1).
Table 1
Period of oscillations with various r and q (in years)
Thus, the period of oscillations in this model is comparable to the duration of secular demographic cycles observed in the history of many states (Turchin and Nefedov 2009).
The dynamics of the agricultural population according to this model have an oscillating nature. In theory these oscillations die
out and the system tends to the equilibrium state, but various random impacts and influences neglected herein (e.g., catastrophic crop failure) disturb the system equilibrium, after which there starts a new series of dying oscillations. The peculiar feature of the agricultural society is that its economic dynamics substantially depend on such a random value as the crop yield. The random factors that impact such systems are generally assumed to be exogenous; however, the dependence on crop yield variations is an intrinsic, endogenous feature of agricultural production. Therefore, one arrives at the conclusion that a special random value describing crop yield must be incorporated into the ideal model of the Malthusian cycle. This can be conveniently done within the iterative model where the calculations are made from year to year.
For convenience, I consider production years to start with the harvest, not a specific calendar date. The population number Nt at the beginning of year t is expressed in terms of the number of households or families (conventionally assuming that a household contains five people). In theory (i.e., when there is enough land for cultivation), a farming household cultivates a standard parcel of land (e.g., a Middle Eastern 'çiftlik') and one can measure the maximum possible area of arable land in terms of standard parcels S. When the number of households Nt exceeds S, two families can live on some parcels.
Let at represent the annual crop yield t, expressed in terms of minimum family grain consumption rates that can be gathered on a standard parcel. We will express the crop yield in the form at= a0 + + dt, where a0 is the average crop yield, dt is a random value that accepts values from the segment (–а1, а1). The value а1 is less than a0 and the crop yield at varies within the interval of a0 – а1 to a0 + а1. With the units of measure that I have assumed, the harvest Yt (number of consumption rates) can be expressed in the following simple form:
If there is a grain surplus in the year t, that is per-capita production yt =Yt/Nt exceeds the 'satisfactory consumption' p 1 (p 1 > 1), then the farmers do not consume all produced grain, but store up the surplus (for the sake of simplicity we will assume that they store half of the surplus). However, it is worth noting that, owing to the storage conditions, the household stock Zt cannot grow to infinity and is
limited by certain value Z 0 . If there are surpluses exceeding this value, they all are consumed. If the year is lean and the production yt falls below the level p 1 , the farmers take grain from the stock, increasing the consumption, if possible, up to the level p 1 . If the stock is not sufficient, it is consumed to the full.
The population growth rate rt is determined as the ratio of the population Nt+1 in the following year to the population Nt in the previous year. The growth rate rt depends on the consumption pt. When the consumption is equal to the minimum normal rate (pt =1), the population remains constant (rt = 1). I designate the maximum natural growth r 0 , and the consumption rate needed to ensure it as p 0 . I believe that r 0 = 1.02, that the maximum annual population growth is two per cent. When 1 < pt < p 0 , population growth is linearly dependent on consumption, and in the case when pt > p 0 , it does not increase (r = r 0 ). For pt < 1, the dependence of rt on pt is taken as rt = pt (i.e., in case of crop failure the surviving population will be equal to the number of consumption rates and all people that do not have a sufficient annual food reserve will perish from starvation). Consequently, the population in the following year will be Nt+1 = rt Nt.
Considering the typical case from the Middle East or Russia from the sixteenth to the eighteenth centuries, when every family could obtain two minimal consumption rations from one standard parcel, one can assume a0 = 2 for the numerical experiment. The scatter of crop yield (ratio а1/a0) was large enough (e.g., it was about 60 per cent of average crop yield in Egypt). Hence, it appears that one can assume а1 = 1.2. As for the random value dt , it may be approximated using squared uniform distribution: if w is a value uniformly distributed over the segment (–1.1), then this random value can be taken as dt = а1 w 2 sign(w) (Nefedov and Turchin 2007). The maximum number of standard parcels S can be conventionally assumed to equal one million, and the maximum stock to equal ten-year ones (Z 0 = 10). Here, I consider a case in which farmers call upon the experience gained by preceding generations and start laying the crop up in storage as soon as the per-capita production exceeds 1.05 of the minimum level (p 1 = 1.05). This calculation has an idealized character, allowing one to assume N1 = 0.8 as the initial population value (in year t = 1). As the calculation results depend on a random value (i.e., crop yield), they can vary with each program run. Despite this variation, one can qualitatively observe a pattern of demographic cycles that seems typical: population growth periods alternate with demographic catastrophes. The duration of this cycle is, as in the previous model, 80–150 years (Fig. 2).
Naturally, this model describes just the basic mechanism of the demographic cycle omitting many details (e.g., the existence of the state and military elite, the emergence of large landowners). Such factors are taken into account in other models (e.g., Nefedov and Turchin 2007) and the calculations made using these models show that the qualitative cyclic pattern changes insignificantly compared to the suggested model. On the whole, it seems quite certain that the availability of grain stock in farms contributes to a long-term economic stabilization. However, the population growth results in the stock depletion, and, sooner or later, major harvest failures provoke catastrophic starvations followed by events like epidemics, uprisings of starving people, and/or invasions by external enemies seeking to take advantage. As a result, the population size can decrease even by half and a new demographic cycle starts. While the model calculations suggest that this new cycle might start immediately after the catastrophe, in real life such crises as wars and uprisings have some inertia and impede economic revival. In such cases, stabilization is delayed.
Finally, it is worth noting that after the publication of Wood's model economic historians came to consider the Malthusian economy as a system where the population size cannot exceed the carrying capacity and, consequently, the 'Malthusian crisis' is impossible. For example, Read and LeBlanc (2003: 59) suggest that
… there is a standard model for the pattern of human population growth and its relationship to carrying capacity (K), namely, that most of the time human populations have low to nonexistent rates of growth… The model is often implicit and may simply assert that, until recently, population sizes have always been well below K and growth rates very low.
But Le Roy Ladurie, Postan, Hatcher, and many other economic historians insist that 'the Malthusian crises' were quite common phenomena in lived history, a fact acknowledged by Wood himself. The models described in this article show that the inevitability of similar crises arises from the simple laws that rule the functioning of agrarian economies.
REFERENCES
Allen, R. 2008. A Review of Gregory Clark's A Farewell to Alms: A Brief Economic History of the World. Journal of Economic Literature 46: 946–973.
Ashraf, Q., and Galor, O. 2011. Dynamics and Stagnation in the Malthusian Epoch. American Economic Review 101(5): 2003–2041.
Brander, J., and Taylor, M. 1998. The Simple Economics of Easter Island: A Ricardo-Malthus Model of Renewable Resource Use. The American Economic Review 88: 119–138.
Chu, C. Y. C., and Lee, R. D. 1994. Famine, Revolt, and the Dynastic Cycle. Journal of Population Economics 7(4): 351–378.
D'Alessandro, S. 2007. Non-linear Dynamics of Population and Natural Resources: The Emergence of Different Patterns of Development. Ecological Economics 62: 473–481.
Galor, O., and Weil, D. N. 2000. Population, Technology, and Growth: From Malthusian Stagnation to the Demographic Transition and Beyond. The American Economic Review 90(4): 806–828.
Komlos, J., and Artzrouni, M. 1990. Mathematical Investigations of the Escape from the Malthusian Trap. Mathematical Population Studies 2: 269–287.
Korotayev, A., Malkov, S., and Grinin, L. (eds.) 2007. History and Mathematics: Analysis and Modeling of Socio-Historical Processes. Moscow: URSS. In Russian (Коротаев А., Малков С., Гринин Л. (ред.) История и Математика: Анализ и моделирование социальноисторических процессов. М.: УРСС).
Korotayev, A., Malkov, A., and Khaltourina, D. 2005. Laws of History. Mathematical Modeling of Historical Macro-Processes: Demography, the Economy, Wars. Moscow: URSS. In Russian (Коротаев А. В., Малков А. С., Халтурина Д. А. Законы истории. Математическое моделирование исторических макропроцессов. Демография, экономика, войны. М.: УРСС).
Korotayev, A., Malkov, A., and Khaltourina, D. 2006. Introduction to Social Macrodynamics: Secular Cycles and Millennial Trends. Moscow: Komkniga.
Le Roy Ladurie, E. 1974. The Peasants of Languedoc. Urbana, IL: University of Illinois Press.
Lee, R. 1980. A Historical Perspective on Economic Aspects of the Population Explosion: The Case of Preindustrial England. In Easterlin, R. A. (ed.), Population and Economic Change in Developing Countries (pp. 517–566). Chicago, IL: University of Chicago Press.
Lee, R., and Anderson, M. 2002. Malthus in State Space: Macro Economic-Demographic Relations in English History, 1540–1870. Journal of Population Economics 15(2): 195–220.
Lee, C. T., and Tuljapurkar, S. 2008. Population and Prehistory I: Food-Dependent Population Growth in Constant Environments. Theoretical Population Biology 73: 473–482.
Malkov, S. 2009. Social Self-Organization and the Historical Process: The Possibilities of Mathematical Modeling. Moscow: URSS. In Russian (Малков С. Ю. Социальная самоорганизация и исторический процесс: Возможности математического моделирования. М.: УРСС).
Malthus, T. R. 1798. An Essay on the Principle of Population. London: J. Johnson.
Maxwell, J., and Reuveny, R. 2000. Resource Scarcity and Conflict in Developing Countries. Journal of Peace Research 37(3): 301–322.
Møller, N., and Sharp, P. 2009. Malthus in Cointegration Space: A New Look at Living Standards and Population in Pre-industrial England. Discussion Paper No. 08-16. Copenhagen: Department of Economics, University of Copenhagen.
Nefedov, S. A., and Turchin, P. V. 2007. The Experience of Modeling Demographic and Structural Cycles. In Malkov S., Grinin L., and Korotayev A. (eds.), History and Mathematics: Macro-Historical Dynamics of Society and the State (рр. 153–167). Moscow: URSS. In Russian (Нефедов, С. А., Турчин, П. В. Опыт моделирования демографическиструктурных циклов. В Малков, С. Ю., Гринин, Л. Е., Коротаев А. В. (ред.) История и математика: Макроисторическая динамика общества и государства, c. 153–167. М.: УРСС).
Postan, M. M., and Hatcher, J. 1985. Population and Class Relations in Feudal Society. In Aston, T., and Philpin, C. H. E. (eds.), The Brenner Debate: Agrarian Class Structure and Economic Development in PreIndustrial Europe (pp. 65–78). Cambridge: Cambridge University Press.
Read, D. W., and LeBlanc, S. A. 2003. Population Growth, Carrying Capacity, and Conflict. Current Anthropology 44(1): 59–85.
Szulga, R. S. 2012. Endogenous Population and Resource Cycles in Historical Hunter-Gatherer Economies. Cliodynamics 3(2).
Tsirel, S. V. 2004. On the Possible Reasons for the Hyperexponential Growth of the Earth Population. In Dmitriev, M., and Petrov, A. (eds.), Mathematical Modeling of Social and Economic Dynamics (pр. 367– 369). Moscow: Russian State Social University.
Turchin, P. 2007. Historical Dynamics: Towards a Theoretical History. Moscow: LKI. In Russian (Турчин, Р. Историческая динамика. На пути к теоретической истории. М.: ЛКИ).
Turchin, P. 2009. Long-Term Population Cycles in Human Societies. Annals of the New York Academy of Science 1162: 1–17.
Turchin, P., and Nefedov, S. A. 2009. Secular Cycles. Princeton, NJ: Princeton University Press.
Usher, D. 1989. The Dynastic Cycle and the Stationary State. The American Economic Review 79(5): 1031–1044.
Voigtlander, N., and Voth, H. J. 2009. Malthusian Dynamism and the Rise of Europe: Make War, not Love. American Economic Review: Papers & Proceedings 99(2): 248–254.
Wood, J. W. 1998. A Theory of Preindustrial Population Dynamics, Demography, Economy, and Well-being in Malthusian Systems. Current Anthropology 39: 99–135.
|
<urn:uuid:01c08fc3-3f8f-46c5-bc0f-47fa1a357bc7>
|
CC-MAIN-2019-43
|
https://www.sociostudies.org/journal/files/seh/2014_1/172-184.pdf
|
2019-10-23T02:05:20Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987828425.99/warc/CC-MAIN-20191023015841-20191023043341-00021.warc.gz
| 1,058,566,904
| 6,143
|
eng_Latn
|
eng_Latn
| 0.853931
|
eng_Latn
| 0.98011
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"sco_Latn",
"sco_Latn"
] | false
|
rolmOCR
|
[
1610,
3543,
5481,
7320,
9616,
12013,
13107,
15527,
18079,
19501,
21602,
23992,
25899
] |
Modeling Malthusian Dynamics in Pre-industrial Societies
Sergey A. Nefedov
Ural Federal University, Ekaterinburg
ABSTRACT
The discussion about the Malthusian character of pre-industrial economies that has arisen in the recent years extensively uses simple mathematical models. This article analyzes some of these models to determine their conformity with Malthusian postulates. The author suggests two models that are more adequate for the description of the Malthusian patterns.
Until recently, most economic historians were inclined to think that the medieval economies in Eurasia had a Malthusian nature (Allen 2008: 951). However, following the publication of Lee and Anderson's work (Lee and Anderson 2002), many came to dispute this opinion. A discussion has arisen about how the available data confirm the Malthusian relationship between demographic dynamics and consumption (i.e., real wages). This discussion has largely involved simple mathematical models of the Malthusian economy.
In 1980, Lee published the first and most popular of these models. This model describes the relationship between the real wage, wt (consumption), and labor resources, Nt (population), using the following equation:
Or, in the logarithmic form:
Here, t is time; μ, ρ, η are some non-negative constants; and εt is a variable that takes into account the climatic effect and other exogenous parameters. The factor ρ describes the capital increase and technological advances, thus the Malthusian economy features ρ = 0.
Social Evolution & History, Vol. 13 No. 1, March 2014 172–184
2014 'Uchitel' Publishing House
If we take into account that in the ideal case εt = 0, the model can be expressed with quite a simple equation: wt = С Nt -η, where С is a certain constant. The drawbacks of this equation are evident: a small population Nt results in a consumption rate close to infinity, while in a large population the consumption becomes too small to ensure subsistence. Besides, this equation only shows the relationship between population and consumption. The model contains no feedback to demonstrate in what way the consumption influences population growth.
Wood (1998) suggests a feedback option for which he derives an equation basing on the same equation (1) as Lee, but formulates it as follows:
Here, θ is the minimum per capita consumption rate, and St is the maximum population that can subsist in the given territory when the consumption equals θ. St can grow with technological advances, but the Malthusian case features a constant St, St = S0. Wood believes that the birth rate bt and death rate dt can be described with the following equations:
where β0 , β1 , β2, δ0, δ1, and δ2 are certain constants. Thus, the equation below describes population growth:
Deriving bt and dt from the system of Equations (3)–(4) and inserting them into (5) yields:
where с0 and с1 here produces:
are certain constants. Substituting equation (1a)
where с2 and с3 are certain constants. The differential equation (6) has the time-independent solution Nt = N0 = exp(–с2/с3); its chart will be a horizontal line. According to the theorem of the unique existence of the solution, no other solutions (integral curves) may cross this horizontal line. The derivative dNt /dt is positive below this line, in the area 0 < Nt < N0; the solutions monotonically increase and the integral curves approximate the horizontal line. The derivative dNt /dt is negative above this line; the solutions monotonically decrease and the integral curves approximate
the horizontal line from above. Finally, the solutions cannot oscillate: the population cannot first feature growth and then loss due to 'the Malthusian crises'. Wood justifies this behavior of his model stating that the Malthusian crises 'are not a necessary feature of Malthusian systems… This conclusion is contrary to the belief of many economic historians (e.g., Le Roy Ladurie 1974: passim; Postan and Hatcher 1985: 69) though not to anything that Malthus himself ever wrote' (Wood 1998: 110).
However, Malthus did write about population loss and depopulation:
The power of population is so superior to the power of the earth to produce subsistence for man that premature death must in some shape or other visit the human race. The vices of mankind are active and able ministers of depopulation. They are the precursors in the great army of destruction, and often finish the dreadful work themselves. But should they fail in this war of extermination, sickly seasons, epidemics, pestilence, and plague advance in terrific array, and sweep off their thousands and tens of thousands. Should success be still incomplete, gigantic inevitable famine stalks in the rear, and with one mighty blow levels the population with the food of the world (Malthus 1798: 61).
Wood's model does not, therefore, describe the population dynamics envisioned by Malthus himself. Nevertheless, it is used in many studies devoted to the analysis of the Malthusian economy in traditional societies.
Sometimes an iterative version of this model is used, implying calculations on an annual basis. Equation (1a) in the version put forth by Møller and Sharp (2009) has logarithmic form:
Birth and death rates are calculated from the simplified equations:
The population Nt is related to the population Nt-1 in the previous year through the following relationship:
here, A, c0, c1 , a0 … a3 are certain constants. Inserting (3a) and (4a) into (7) gives:
where u and v are certain constants. The resulting equation is:
This equation generates a series of population values. If the population at the initial moment equals a million (i.e., N1 =1), then N2 = v, N3 equals v raised to a power of 1+u; N3 equals to v raised to a power of 1 + u + u 2 , etc. If ׀u > ׀1, then Nt → ∞, which is impossible under the condition of limited resources in the Malthusian theory. If 0 < u < 1, then Nt monotonically tends to a finite bound. Finally, the case –1 < u <0 produces a very specific series in which the population increases in even years and decreases in odd years (or vice versa). Thus, the Møller-Sharp model has the same drawback as Wood's initial model: it cannot describe longterm population oscillations.
Another iterative version of the model is the one developed by Ashraf and Galor (2011). Beginning with equation (1a), the authors of this model take into consideration the number of adults and children, and optimize expenses. They, nevertheless, ultimately come to the same equation (8).
One more version of Wood's model is that of Voigtlander and Voth (2009). They use equation (1a), but replace equations (3) and (4) with (3a) and (4a):
where b0 and d0 are certain constants. Inserting (1a) into equation (5) yields:
where p and q are certain constants. The differential equation (6a) has the time-independent solution Nt = N0 = p 1/η(m – n) , which represents a horizontal line. As with the above model, the solution curves that are beneath this line monotonically increase and those lying above the line – monotonically decrease. Thus, this model has the same limitation as Wood's model and its other derivatives: it does not offer oscillating solutions.
Brander and Taylor (1998) have suggested another popular model. This model analyzes some abstract renewable resource consumed in the course of human activities. For example, it might be forest resources or soil yield. St is the available amount of this resource (in year t), and K denotes its reserve in nature. The equation for consumption of this resource is as follows:
where r and u are certain constants. The first term on the right side describes the process of natural resource renewal; the second term describes resource depletion owing to economic activity. The population number is given by the following equation:
Brander and Taylor have shown that the system of equations (8)–(9) has oscillating solutions: when the resource is abundant the population grows, when it is exhausted the population decreases until the resource is renewed. Brander and Taylor refer to their model as 'Malthusian-Ricardian'. Initially, the model was intended to describe the economy of Easter Island, but afterwards it got wider application as a sufficiently general model of the Malthusian economy (e.g., Maxwell and Reuveny 2000; D'Alessandro 2007). It is essential to note, however, that resource St in the Brander–Taylor model is not the harvest gathered by farmers. According to Brander and Taylor, the crop is denoted by the term uStNt and it is deducted from the resource St. According to Szulga (2012), such a model describes a society of gatherers (or hunters) rather than an agrarian society. Meanwhile, Malthus mainly studied agricultural economies. Thus, Brander-Taylor model cannot be referred to as a 'Malthusian-Ricardian' one.
where d and v are constants, and d < 0 in this case. This equation shows that natural population growth depends on the availability of resource St.
Up to this point, I have confined my discussion to the analysis of simple models of the Malthusian economy that consist of no more than two differential equations. Naturally, there exist more complicated models (e.g., Usher 1989; Komlos and Artzrouni 1990; Chu and Lee 1994; Galor and Weil 2000; Lee and Tuljapurkar 2008) that allow for better behavioral freedom and offer oscillating solutions, as well. Many such models have been constructed within the framework of cliodynamic research actively performed in Russia and the USA (e.g., Tsirel 2004; Korotayev, Malkov, and Khaltourina 2005, 2006; Korotayev, Malkov, and Grinin 2007;
Turchin 2007, 2009; Malkov 2009). However, almost all models described in literature have the same drawback: they contain uncertain coefficients whose values are unknown and cannot be determined in principle. The more complicated is a model, the more uncertain coefficients it contains. Meanwhile, these coefficients determine the behavior of the model, and different coefficient values result in different population dynamics. Thus, an uncertainty originates: as coefficient values are unknown, it is also uncertain which of the possible behavioral variants corresponds to historical reality and which of them could not possibly be realized.
In the remainder of this article, I would like to discuss two simple models that contain no uncertain parameters and, in my opinion, are sufficiently adequate for the description of the Malthusian population dynamics. Within the first model, Nt is the population in the year t, as above; Kt is the grain stock after the harvest estimated in terms of minimum annual per caput grain consumption rates (rate of consumption is assumed about 240 kg); and r is the natality under favorable conditions. The area under cultivation and the harvest depend on the population, and with the population growth they tend to the constant determined by the maximum area under cultivation maintained by the agricultural community. We will conside
|
r that the harvest is determined by the equation Pt=aNt /(Nt+d), where a and d are certain constants.
|
To describe the population dynamics we use the standard logistic equation:
Kt in this logistic equation denotes the carrying capacity (i.e., the maximum size of population that may live in this territory). In our case, this population size corresponds to the number of minimum annual consumption rates in storage. Annually, Nt consumption rates are consumed, and the stock growth will be equal to:
If N in the equation for dP/dN tends to 0, we will obtain the harvest a/d (number of consumption rates) gathered by one farmer in favorable conditions (when the population is small and he or she is able to cultivate the maximum area). Thus, the value q = a/d shows how many households one farming family can support. The history
Thus, we have the simplest system of two differential equations (10)–(11). This system has an equilibrium state, when the population and stock remain constant, namely, when K0 = = N0 = a – d.
of agricultural societies shows that q usually varies within the limits 1.2 < q < 2. We can express a and d in terms of q and N0:
N0 can be conventionally set equal to 1 and thus, there are two constants in this model, r and q, which have physical significance and vary within the known limits: 0.01 < r < 0.02, and 1.2 < q < 2. The common methods used for investigation of dynamic systems allow us to determine that system (10)–(11) describes dying oscillations. The first oscillations can have different periods; however, when the curve approaches the equilibrium state, the period is close to:
The period T decreases when r and q increase, and increases, respectively, when these values decrease (Table 1 and Fig. 1).
Table 1
Period of oscillations with various r and q (in years)
Thus, the period of oscillations in this model is comparable to the duration of secular demographic cycles observed in the history of many states (Turchin and Nefedov 2009).
The dynamics of the agricultural population according to this model have an oscillating nature. In theory these oscillations die
out and the system tends to the equilibrium state, but various random impacts and influences neglected herein (e.g., catastrophic crop failure) disturb the system equilibrium, after which there starts a new series of dying oscillations. The peculiar feature of the agricultural society is that its economic dynamics substantially depend on such a random value as the crop yield. The random factors that impact such systems are generally assumed to be exogenous; however, the dependence on crop yield variations is an intrinsic, endogenous feature of agricultural production. Therefore, one arrives at the conclusion that a special random value describing crop yield must be incorporated into the ideal model of the Malthusian cycle. This can be conveniently done within the iterative model where the calculations are made from year to year.
For convenience, I consider production years to start with the harvest, not a specific calendar date. The population number Nt at the beginning of year t is expressed in terms of the number of households or families (conventionally assuming that a household contains five people). In theory (i.e., when there is enough land for cultivation), a farming household cultivates a standard parcel of land (e.g., a Middle Eastern 'çiftlik') and one can measure the maximum possible area of arable land in terms of standard parcels S. When the number of households Nt exceeds S, two families can live on some parcels.
Let at represent the annual crop yield t, expressed in terms of minimum family grain consumption rates that can be gathered on a standard parcel. We will express the crop yield in the form at= a0 + + dt, where a0 is the average crop yield, dt is a random value that accepts values from the segment (–а1, а1). The value а1 is less than a0 and the crop yield at varies within the interval of a0 – а1 to a0 + а1. With the units of measure that I have assumed, the harvest Yt (number of consumption rates) can be expressed in the following simple form:
If there is a grain surplus in the year t, that is per-capita production yt =Yt/Nt exceeds the 'satisfactory consumption' p 1 (p 1 > 1), then the farmers do not consume all produced grain, but store up the surplus (for the sake of simplicity we will assume that they store half of the surplus). However, it is worth noting that, owing to the storage conditions, the household stock Zt cannot grow to infinity and is
limited by certain value Z 0 . If there are surpluses exceeding this value, they all are consumed. If the year is lean and the production yt falls below the level p 1 , the farmers take grain from the stock, increasing the consumption, if possible, up to the level p 1 . If the stock is not sufficient, it is consumed to the full.
The population growth rate rt is determined as the ratio of the population Nt+1 in the following year to the population Nt in the previous year. The growth rate rt depends on the consumption pt. When the consumption is equal to the minimum normal rate (pt =1), the population remains constant (rt = 1). I designate the maximum natural growth r 0 , and the consumption rate needed to ensure it as p 0 . I believe that r 0 = 1.02, that the maximum annual population growth is two per cent. When 1 < pt < p 0 , population growth is linearly dependent on consumption, and in the case when pt > p 0 , it does not increase (r = r 0 ). For pt < 1, the dependence of rt on pt is taken as rt = pt (i.e., in case of crop failure the surviving population will be equal to the number of consumption rates and all people that do not have a sufficient annual food reserve will perish from starvation). Consequently, the population in the following year will be Nt+1 = rt Nt.
Considering the typical case from the Middle East or Russia from the sixteenth to the eighteenth centuries, when every family could obtain two minimal consumption rations from one standard parcel, one can assume a0 = 2 for the numerical experiment. The scatter of crop yield (ratio а1/a0) was large enough (e.g., it was about 60 per cent of average crop yield in Egypt). Hence, it appears that one can assume а1 = 1.2. As for the random value dt , it may be approximated using squared uniform distribution: if w is a value uniformly distributed over the segment (–1.1), then this random value can be taken as dt = а1 w 2 sign(w) (Nefedov and Turchin 2007). The maximum number of standard parcels S can be conventionally assumed to equal one million, and the maximum stock to equal ten-year ones (Z 0 = 10). Here, I consider a case in which farmers call upon the experience gained by preceding generations and start laying the crop up in storage as soon as the per-capita production exceeds 1.05 of the minimum level (p 1 = 1.05). This calculation has an idealized character, allowing one to assume N1 = 0.8 as the initial population value (in year t = 1). As the calculation results depend on a random value (i.e., crop yield), they can vary with each program run. Despite this variation, one can qualitatively observe a pattern of demographic cycles that seems typical: population growth periods alternate with demographic catastrophes. The duration of this cycle is, as in the previous model, 80–150 years (Fig. 2).
Naturally, this model describes just the basic mechanism of the demographic cycle omitting many details (e.g., the existence of the state and military elite, the emergence of large landowners). Such factors are taken into account in other models (e.g., Nefedov and Turchin 2007) and the calculations made using these models show that the qualitative cyclic pattern changes insignificantly compared to the suggested model. On the whole, it seems quite certain that the availability of grain stock in farms contributes to a long-term economic stabilization. However, the population growth results in the stock depletion, and, sooner or later, major harvest failures provoke catastrophic starvations followed by events like epidemics, uprisings of starving people, and/or invasions by external enemies seeking to take advantage. As a result, the population size can decrease even by half and a new demographic cycle starts. While the model calculations suggest that this new cycle might start immediately after the catastrophe, in real life such crises as wars and uprisings have some inertia and impede economic revival. In such cases, stabilization is delayed.
Finally, it is worth noting that after the publication of Wood's model economic historians came to consider the Malthusian economy as a system where the population size cannot exceed the carrying capacity and, consequently, the 'Malthusian crisis' is impossible. For example, Read and LeBlanc (2003: 59) suggest that
… there is a standard model for the pattern of human population growth and its relationship to carrying capacity (K), namely, that most of the time human populations have low to nonexistent rates of growth… The model is often implicit and may simply assert that, until recently, population sizes have always been well below K and growth rates very low.
But Le Roy Ladurie, Postan, Hatcher, and many other economic historians insist that 'the Malthusian crises' were quite common phenomena in lived history, a fact acknowledged by Wood himself. The models described in this article show that the inevitability of similar crises arises from the simple laws that rule the functioning of agrarian economies.
REFERENCES
Allen, R. 2008. A Review of Gregory Clark's A Farewell to Alms: A Brief Economic History of the World. Journal of Economic Literature 46: 946–973.
Ashraf, Q., and Galor, O. 2011. Dynamics and Stagnation in the Malthusian Epoch. American Economic Review 101(5): 2003–2041.
Brander, J., and Taylor, M. 1998. The Simple Economics of Easter Island: A Ricardo-Malthus Model of Renewable Resource Use. The American Economic Review 88: 119–138.
Chu, C. Y. C., and Lee, R. D. 1994. Famine, Revolt, and the Dynastic Cycle. Journal of Population Economics 7(4): 351–378.
D'Alessandro, S. 2007. Non-linear Dynamics of Population and Natural Resources: The Emergence of Different Patterns of Development. Ecological Economics 62: 473–481.
Galor, O., and Weil, D. N. 2000. Population, Technology, and Growth: From Malthusian Stagnation to the Demographic Transition and Beyond. The American Economic Review 90(4): 806–828.
Komlos, J., and Artzrouni, M. 1990. Mathematical Investigations of the Escape from the Malthusian Trap. Mathematical Population Studies 2: 269–287.
Korotayev, A., Malkov, S., and Grinin, L. (eds.) 2007. History and Mathematics: Analysis and Modeling of Socio-Historical Processes. Moscow: URSS. In Russian (Коротаев А., Малков С., Гринин Л. (ред.) История и Математика: Анализ и моделирование социальноисторических процессов. М.: УРСС).
Korotayev, A., Malkov, A., and Khaltourina, D. 2005. Laws of History. Mathematical Modeling of Historical Macro-Processes: Demography, the Economy, Wars. Moscow: URSS. In Russian (Коротаев А. В., Малков А. С., Халтурина Д. А. Законы истории. Математическое моделирование исторических макропроцессов. Демография, экономика, войны. М.: УРСС).
Korotayev, A., Malkov, A., and Khaltourina, D. 2006. Introduction to Social Macrodynamics: Secular Cycles and Millennial Trends. Moscow: Komkniga.
Le Roy Ladurie, E. 1974. The Peasants of Languedoc. Urbana, IL: University of Illinois Press.
Lee, R. 1980. A Historical Perspective on Economic Aspects of the Population Explosion: The Case of Preindustrial England. In Easterlin, R. A. (ed.), Population and Economic Change in Developing Countries (pp. 517–566). Chicago, IL: University of Chicago Press.
Lee, R., and Anderson, M. 2002. Malthus in State Space: Macro Economic-Demographic Relations in English History, 1540–1870. Journal of Population Economics 15(2): 195–220.
Lee, C. T., and Tuljapurkar, S. 2008. Population and Prehistory I: Food-Dependent Population Growth in Constant Environments. Theoretical Population Biology 73: 473–482.
Malkov, S. 2009. Social Self-Organization and the Historical Process: The Possibilities of Mathematical Modeling. Moscow: URSS. In Russian (Малков С. Ю. Социальная самоорганизация и исторический процесс: Возможности математического моделирования. М.: УРСС).
Malthus, T. R. 1798. An Essay on the Principle of Population. London: J. Johnson.
Maxwell, J., and Reuveny, R. 2000. Resource Scarcity and Conflict in Developing Countries. Journal of Peace Research 37(3): 301–322.
Møller, N., and Sharp, P. 2009. Malthus in Cointegration Space: A New Look at Living Standards and Population in Pre-industrial England. Discussion Paper No. 08-16. Copenhagen: Department of Economics, University of Copenhagen.
Nefedov, S. A., and Turchin, P. V. 2007. The Experience of Modeling Demographic and Structural Cycles. In Malkov S., Grinin L., and Korotayev A. (eds.), History and Mathematics: Macro-Historical Dynamics of Society and the State (рр. 153–167). Moscow: URSS. In Russian (Нефедов, С. А., Турчин, П. В. Опыт моделирования демографическиструктурных циклов. В Малков, С. Ю., Гринин, Л. Е., Коротаев А. В. (ред.) История и математика: Макроисторическая динамика общества и государства, c. 153–167. М.: УРСС).
Postan, M. M., and Hatcher, J. 1985. Population and Class Relations in Feudal Society. In Aston, T., and Philpin, C. H. E. (eds.), The Brenner Debate: Agrarian Class Structure and Economic Development in PreIndustrial Europe (pp. 65–78). Cambridge: Cambridge University Press.
Read, D. W., and LeBlanc, S. A. 2003. Population Growth, Carrying Capacity, and Conflict. Current Anthropology 44(1): 59–85.
Szulga, R. S. 2012. Endogenous Population and Resource Cycles in Historical Hunter-Gatherer Economies. Cliodynamics 3(2).
Tsirel, S. V. 2004. On the Possible Reasons for the Hyperexponential Growth of the Earth Population. In Dmitriev, M., and Petrov, A. (eds.), Mathematical Modeling of Social and Economic Dynamics (pр. 367– 369). Moscow: Russian State Social University.
Turchin, P. 2007. Historical Dynamics: Towards a Theoretical History. Moscow: LKI. In Russian (Турчин, Р. Историческая динамика. На пути к теоретической истории. М.: ЛКИ).
Turchin, P. 2009. Long-Term Population Cycles in Human Societies. Annals of the New York Academy of Science 1162: 1–17.
Turchin, P., and Nefedov, S. A. 2009. Secular Cycles. Princeton, NJ: Princeton University Press.
Usher, D. 1989. The Dynastic Cycle and the Stationary State. The American Economic Review 79(5): 1031–1044.
Voigtlander, N., and Voth, H. J. 2009. Malthusian Dynamism and the Rise of Europe: Make War, not Love. American Economic Review: Papers & Proceedings 99(2): 248–254.
Wood, J. W. 1998. A Theory of Preindustrial Population Dynamics, Demography, Economy, and Well-being in Malthusian Systems. Current Anthropology 39: 99–135.
| 10,990
|
inside_word
|
consider
|
remove_one_sentence
|
<url>
https://www.sociostudies.org/journal/files/seh/2014_1/172-184.pdf
</url>
<text>
Modeling Malthusian Dynamics in Pre-industrial Societies
Sergey A. Nefedov
Ural Federal University, Ekaterinburg
ABSTRACT
The discussion about the Malthusian character of pre-industrial economies that has arisen in the recent years extensively uses simple mathematical models. This article analyzes some of these models to determine their conformity with Malthusian postulates. The author suggests two models that are more adequate for the description of the Malthusian patterns.
Until recently, most economic historians were inclined to think that the medieval economies in Eurasia had a Malthusian nature (Allen 2008: 951). However, following the publication of Lee and Anderson's work (Lee and Anderson 2002), many came to dispute this opinion. A discussion has arisen about how the available data confirm the Malthusian relationship between demographic dynamics and consumption (i.e., real wages). This discussion has largely involved simple mathematical models of the Malthusian economy.
In 1980, Lee published the first and most popular of these models. This model describes the relationship between the real wage, wt (consumption), and labor resources, Nt (population), using the following equation:
Or, in the logarithmic form:
Here, t is time; μ, ρ, η are some non-negative constants; and εt is a variable that takes into account the climatic effect and other exogenous parameters. The factor ρ describes the capital increase and technological advances, thus the Malthusian economy features ρ = 0.
Social Evolution & History, Vol. 13 No. 1, March 2014 172–184
2014 'Uchitel' Publishing House
If we take into account that in the ideal case εt = 0, the model can be expressed with quite a simple equation: wt = С Nt -η, where С is a certain constant. The drawbacks of this equation are evident: a small population Nt results in a consumption rate close to infinity, while in a large population the consumption becomes too small to ensure subsistence. Besides, this equation only shows the relationship between population and consumption. The model contains no feedback to demonstrate in what way the consumption influences population growth.
Wood (1998) suggests a feedback option for which he derives an equation basing on the same equation (1) as Lee, but formulates it as follows:
Here, θ is the minimum per capita consumption rate, and St is the maximum population that can subsist in the given territory when the consumption equals θ. St can grow with technological advances, but the Malthusian case features a constant St, St = S0. Wood believes that the birth rate bt and death rate dt can be described with the following equations:
where β0 , β1 , β2, δ0, δ1, and δ2 are certain constants. Thus, the equation below describes population growth:
Deriving bt and dt from the system of Equations (3)–(4) and inserting them into (5) yields:
where с0 and с1 here produces:
are certain constants. Substituting equation (1a)
where с2 and с3 are certain constants. The differential equation (6) has the time-independent solution Nt = N0 = exp(–с2/с3); its chart will be a horizontal line. According to the theorem of the unique existence of the solution, no other solutions (integral curves) may cross this horizontal line. The derivative dNt /dt is positive below this line, in the area 0 < Nt < N0; the solutions monotonically increase and the integral curves approximate the horizontal line. The derivative dNt /dt is negative above this line; the solutions monotonically decrease and the integral curves approximate
the horizontal line from above. Finally, the solutions cannot oscillate: the population cannot first feature growth and then loss due to 'the Malthusian crises'. Wood justifies this behavior of his model stating that the Malthusian crises 'are not a necessary feature of Malthusian systems… This conclusion is contrary to the belief of many economic historians (e.g., Le Roy Ladurie 1974: passim; Postan and Hatcher 1985: 69) though not to anything that Malthus himself ever wrote' (Wood 1998: 110).
However, Malthus did write about population loss and depopulation:
The power of population is so superior to the power of the earth to produce subsistence for man that premature death must in some shape or other visit the human race. The vices of mankind are active and able ministers of depopulation. They are the precursors in the great army of destruction, and often finish the dreadful work themselves. But should they fail in this war of extermination, sickly seasons, epidemics, pestilence, and plague advance in terrific array, and sweep off their thousands and tens of thousands. Should success be still incomplete, gigantic inevitable famine stalks in the rear, and with one mighty blow levels the population with the food of the world (Malthus 1798: 61).
Wood's model does not, therefore, describe the population dynamics envisioned by Malthus himself. Nevertheless, it is used in many studies devoted to the analysis of the Malthusian economy in traditional societies.
Sometimes an iterative version of this model is used, implying calculations on an annual basis. Equation (1a) in the version put forth by Møller and Sharp (2009) has logarithmic form:
Birth and death rates are calculated from the simplified equations:
The population Nt is related to the population Nt-1 in the previous year through the following relationship:
here, A, c0, c1 , a0 … a3 are certain constants. Inserting (3a) and (4a) into (7) gives:
where u and v are certain constants. The resulting equation is:
This equation generates a series of population values. If the population at the initial moment equals a million (i.e., N1 =1), then N2 = v, N3 equals v raised to a power of 1+u; N3 equals to v raised to a power of 1 + u + u 2 , etc. If ׀u > ׀1, then Nt → ∞, which is impossible under the condition of limited resources in the Malthusian theory. If 0 < u < 1, then Nt monotonically tends to a finite bound. Finally, the case –1 < u <0 produces a very specific series in which the population increases in even years and decreases in odd years (or vice versa). Thus, the Møller-Sharp model has the same drawback as Wood's initial model: it cannot describe longterm population oscillations.
Another iterative version of the model is the one developed by Ashraf and Galor (2011). Beginning with equation (1a), the authors of this model take into consideration the number of adults and children, and optimize expenses. They, nevertheless, ultimately come to the same equation (8).
One more version of Wood's model is that of Voigtlander and Voth (2009). They use equation (1a), but replace equations (3) and (4) with (3a) and (4a):
where b0 and d0 are certain constants. Inserting (1a) into equation (5) yields:
where p and q are certain constants. The differential equation (6a) has the time-independent solution Nt = N0 = p 1/η(m – n) , which represents a horizontal line. As with the above model, the solution curves that are beneath this line monotonically increase and those lying above the line – monotonically decrease. Thus, this model has the same limitation as Wood's model and its other derivatives: it does not offer oscillating solutions.
Brander and Taylor (1998) have suggested another popular model. This model analyzes some abstract renewable resource consumed in the course of human activities. For example, it might be forest resources or soil yield. St is the available amount of this resource (in year t), and K denotes its reserve in nature. The equation for consumption of this resource is as follows:
where r and u are certain constants. The first term on the right side describes the process of natural resource renewal; the second term describes resource depletion owing to economic activity. The population number is given by the following equation:
Brander and Taylor have shown that the system of equations (8)–(9) has oscillating solutions: when the resource is abundant the population grows, when it is exhausted the population decreases until the resource is renewed. Brander and Taylor refer to their model as 'Malthusian-Ricardian'. Initially, the model was intended to describe the economy of Easter Island, but afterwards it got wider application as a sufficiently general model of the Malthusian economy (e.g., Maxwell and Reuveny 2000; D'Alessandro 2007). It is essential to note, however, that resource St in the Brander–Taylor model is not the harvest gathered by farmers. According to Brander and Taylor, the crop is denoted by the term uStNt and it is deducted from the resource St. According to Szulga (2012), such a model describes a society of gatherers (or hunters) rather than an agrarian society. Meanwhile, Malthus mainly studied agricultural economies. Thus, Brander-Taylor model cannot be referred to as a 'Malthusian-Ricardian' one.
where d and v are constants, and d < 0 in this case. This equation shows that natural population growth depends on the availability of resource St.
Up to this point, I have confined my discussion to the analysis of simple models of the Malthusian economy that consist of no more than two differential equations. Naturally, there exist more complicated models (e.g., Usher 1989; Komlos and Artzrouni 1990; Chu and Lee 1994; Galor and Weil 2000; Lee and Tuljapurkar 2008) that allow for better behavioral freedom and offer oscillating solutions, as well. Many such models have been constructed within the framework of cliodynamic research actively performed in Russia and the USA (e.g., Tsirel 2004; Korotayev, Malkov, and Khaltourina 2005, 2006; Korotayev, Malkov, and Grinin 2007;
Turchin 2007, 2009; Malkov 2009). However, almost all models described in literature have the same drawback: they contain uncertain coefficients whose values are unknown and cannot be determined in principle. The more complicated is a model, the more uncertain coefficients it contains. Meanwhile, these coefficients determine the behavior of the model, and different coefficient values result in different population dynamics. Thus, an uncertainty originates: as coefficient values are unknown, it is also uncertain which of the possible behavioral variants corresponds to historical reality and which of them could not possibly be realized.
In the remainder of this article, I would like to discuss two simple models that contain no uncertain parameters and, in my opinion, are sufficiently adequate for the description of the Malthusian population dynamics. Within the first model, Nt is the population in the year t, as above; Kt is the grain stock after the harvest estimated in terms of minimum annual per caput grain consumption rates (rate of consumption is assumed about 240 kg); and r is the natality under favorable conditions. The area under cultivation and the harvest depend on the population, and with the population growth they tend to the constant determined by the maximum area under cultivation maintained by the agricultural community. We will conside<cursor_is_here> To describe the population dynamics we use the standard logistic equation:
Kt in this logistic equation denotes the carrying capacity (i.e., the maximum size of population that may live in this territory). In our case, this population size corresponds to the number of minimum annual consumption rates in storage. Annually, Nt consumption rates are consumed, and the stock growth will be equal to:
If N in the equation for dP/dN tends to 0, we will obtain the harvest a/d (number of consumption rates) gathered by one farmer in favorable conditions (when the population is small and he or she is able to cultivate the maximum area). Thus, the value q = a/d shows how many households one farming family can support. The history
Thus, we have the simplest system of two differential equations (10)–(11). This system has an equilibrium state, when the population and stock remain constant, namely, when K0 = = N0 = a – d.
of agricultural societies shows that q usually varies within the limits 1.2 < q < 2. We can express a and d in terms of q and N0:
N0 can be conventionally set equal to 1 and thus, there are two constants in this model, r and q, which have physical significance and vary within the known limits: 0.01 < r < 0.02, and 1.2 < q < 2. The common methods used for investigation of dynamic systems allow us to determine that system (10)–(11) describes dying oscillations. The first oscillations can have different periods; however, when the curve approaches the equilibrium state, the period is close to:
The period T decreases when r and q increase, and increases, respectively, when these values decrease (Table 1 and Fig. 1).
Table 1
Period of oscillations with various r and q (in years)
Thus, the period of oscillations in this model is comparable to the duration of secular demographic cycles observed in the history of many states (Turchin and Nefedov 2009).
The dynamics of the agricultural population according to this model have an oscillating nature. In theory these oscillations die
out and the system tends to the equilibrium state, but various random impacts and influences neglected herein (e.g., catastrophic crop failure) disturb the system equilibrium, after which there starts a new series of dying oscillations. The peculiar feature of the agricultural society is that its economic dynamics substantially depend on such a random value as the crop yield. The random factors that impact such systems are generally assumed to be exogenous; however, the dependence on crop yield variations is an intrinsic, endogenous feature of agricultural production. Therefore, one arrives at the conclusion that a special random value describing crop yield must be incorporated into the ideal model of the Malthusian cycle. This can be conveniently done within the iterative model where the calculations are made from year to year.
For convenience, I consider production years to start with the harvest, not a specific calendar date. The population number Nt at the beginning of year t is expressed in terms of the number of households or families (conventionally assuming that a household contains five people). In theory (i.e., when there is enough land for cultivation), a farming household cultivates a standard parcel of land (e.g., a Middle Eastern 'çiftlik') and one can measure the maximum possible area of arable land in terms of standard parcels S. When the number of households Nt exceeds S, two families can live on some parcels.
Let at represent the annual crop yield t, expressed in terms of minimum family grain consumption rates that can be gathered on a standard parcel. We will express the crop yield in the form at= a0 + + dt, where a0 is the average crop yield, dt is a random value that accepts values from the segment (–а1, а1). The value а1 is less than a0 and the crop yield at varies within the interval of a0 – а1 to a0 + а1. With the units of measure that I have assumed, the harvest Yt (number of consumption rates) can be expressed in the following simple form:
If there is a grain surplus in the year t, that is per-capita production yt =Yt/Nt exceeds the 'satisfactory consumption' p 1 (p 1 > 1), then the farmers do not consume all produced grain, but store up the surplus (for the sake of simplicity we will assume that they store half of the surplus). However, it is worth noting that, owing to the storage conditions, the household stock Zt cannot grow to infinity and is
limited by certain value Z 0 . If there are surpluses exceeding this value, they all are consumed. If the year is lean and the production yt falls below the level p 1 , the farmers take grain from the stock, increasing the consumption, if possible, up to the level p 1 . If the stock is not sufficient, it is consumed to the full.
The population growth rate rt is determined as the ratio of the population Nt+1 in the following year to the population Nt in the previous year. The growth rate rt depends on the consumption pt. When the consumption is equal to the minimum normal rate (pt =1), the population remains constant (rt = 1). I designate the maximum natural growth r 0 , and the consumption rate needed to ensure it as p 0 . I believe that r 0 = 1.02, that the maximum annual population growth is two per cent. When 1 < pt < p 0 , population growth is linearly dependent on consumption, and in the case when pt > p 0 , it does not increase (r = r 0 ). For pt < 1, the dependence of rt on pt is taken as rt = pt (i.e., in case of crop failure the surviving population will be equal to the number of consumption rates and all people that do not have a sufficient annual food reserve will perish from starvation). Consequently, the population in the following year will be Nt+1 = rt Nt.
Considering the typical case from the Middle East or Russia from the sixteenth to the eighteenth centuries, when every family could obtain two minimal consumption rations from one standard parcel, one can assume a0 = 2 for the numerical experiment. The scatter of crop yield (ratio а1/a0) was large enough (e.g., it was about 60 per cent of average crop yield in Egypt). Hence, it appears that one can assume а1 = 1.2. As for the random value dt , it may be approximated using squared uniform distribution: if w is a value uniformly distributed over the segment (–1.1), then this random value can be taken as dt = а1 w 2 sign(w) (Nefedov and Turchin 2007). The maximum number of standard parcels S can be conventionally assumed to equal one million, and the maximum stock to equal ten-year ones (Z 0 = 10). Here, I consider a case in which farmers call upon the experience gained by preceding generations and start laying the crop up in storage as soon as the per-capita production exceeds 1.05 of the minimum level (p 1 = 1.05). This calculation has an idealized character, allowing one to assume N1 = 0.8 as the initial population value (in year t = 1). As the calculation results depend on a random value (i.e., crop yield), they can vary with each program run. Despite this variation, one can qualitatively observe a pattern of demographic cycles that seems typical: population growth periods alternate with demographic catastrophes. The duration of this cycle is, as in the previous model, 80–150 years (Fig. 2).
Naturally, this model describes just the basic mechanism of the demographic cycle omitting many details (e.g., the existence of the state and military elite, the emergence of large landowners). Such factors are taken into account in other models (e.g., Nefedov and Turchin 2007) and the calculations made using these models show that the qualitative cyclic pattern changes insignificantly compared to the suggested model. On the whole, it seems quite certain that the availability of grain stock in farms contributes to a long-term economic stabilization. However, the population growth results in the stock depletion, and, sooner or later, major harvest failures provoke catastrophic starvations followed by events like epidemics, uprisings of starving people, and/or invasions by external enemies seeking to take advantage. As a result, the population size can decrease even by half and a new demographic cycle starts. While the model calculations suggest that this new cycle might start immediately after the catastrophe, in real life such crises as wars and uprisings have some inertia and impede economic revival. In such cases, stabilization is delayed.
Finally, it is worth noting that after the publication of Wood's model economic historians came to consider the Malthusian economy as a system where the population size cannot exceed the carrying capacity and, consequently, the 'Malthusian crisis' is impossible. For example, Read and LeBlanc (2003: 59) suggest that
… there is a standard model for the pattern of human population growth and its relationship to carrying capacity (K), namely, that most of the time human populations have low to nonexistent rates of growth… The model is often implicit and may simply assert that, until recently, population sizes have always been well below K and growth rates very low.
But Le Roy Ladurie, Postan, Hatcher, and many other economic historians insist that 'the Malthusian crises' were quite common phenomena in lived history, a fact acknowledged by Wood himself. The models described in this article show that the inevitability of similar crises arises from the simple laws that rule the functioning of agrarian economies.
REFERENCES
Allen, R. 2008. A Review of Gregory Clark's A Farewell to Alms: A Brief Economic History of the World. Journal of Economic Literature 46: 946–973.
Ashraf, Q., and Galor, O. 2011. Dynamics and Stagnation in the Malthusian Epoch. American Economic Review 101(5): 2003–2041.
Brander, J., and Taylor, M. 1998. The Simple Economics of Easter Island: A Ricardo-Malthus Model of Renewable Resource Use. The American Economic Review 88: 119–138.
Chu, C. Y. C., and Lee, R. D. 1994. Famine, Revolt, and the Dynastic Cycle. Journal of Population Economics 7(4): 351–378.
D'Alessandro, S. 2007. Non-linear Dynamics of Population and Natural Resources: The Emergence of Different Patterns of Development. Ecological Economics 62: 473–481.
Galor, O., and Weil, D. N. 2000. Population, Technology, and Growth: From Malthusian Stagnation to the Demographic Transition and Beyond. The American Economic Review 90(4): 806–828.
Komlos, J., and Artzrouni, M. 1990. Mathematical Investigations of the Escape from the Malthusian Trap. Mathematical Population Studies 2: 269–287.
Korotayev, A., Malkov, S., and Grinin, L. (eds.) 2007. History and Mathematics: Analysis and Modeling of Socio-Historical Processes. Moscow: URSS. In Russian (Коротаев А., Малков С., Гринин Л. (ред.) История и Математика: Анализ и моделирование социальноисторических процессов. М.: УРСС).
Korotayev, A., Malkov, A., and Khaltourina, D. 2005. Laws of History. Mathematical Modeling of Historical Macro-Processes: Demography, the Economy, Wars. Moscow: URSS. In Russian (Коротаев А. В., Малков А. С., Халтурина Д. А. Законы истории. Математическое моделирование исторических макропроцессов. Демография, экономика, войны. М.: УРСС).
Korotayev, A., Malkov, A., and Khaltourina, D. 2006. Introduction to Social Macrodynamics: Secular Cycles and Millennial Trends. Moscow: Komkniga.
Le Roy Ladurie, E. 1974. The Peasants of Languedoc. Urbana, IL: University of Illinois Press.
Lee, R. 1980. A Historical Perspective on Economic Aspects of the Population Explosion: The Case of Preindustrial England. In Easterlin, R. A. (ed.), Population and Economic Change in Developing Countries (pp. 517–566). Chicago, IL: University of Chicago Press.
Lee, R., and Anderson, M. 2002. Malthus in State Space: Macro Economic-Demographic Relations in English History, 1540–1870. Journal of Population Economics 15(2): 195–220.
Lee, C. T., and Tuljapurkar, S. 2008. Population and Prehistory I: Food-Dependent Population Growth in Constant Environments. Theoretical Population Biology 73: 473–482.
Malkov, S. 2009. Social Self-Organization and the Historical Process: The Possibilities of Mathematical Modeling. Moscow: URSS. In Russian (Малков С. Ю. Социальная самоорганизация и исторический процесс: Возможности математического моделирования. М.: УРСС).
Malthus, T. R. 1798. An Essay on the Principle of Population. London: J. Johnson.
Maxwell, J., and Reuveny, R. 2000. Resource Scarcity and Conflict in Developing Countries. Journal of Peace Research 37(3): 301–322.
Møller, N., and Sharp, P. 2009. Malthus in Cointegration Space: A New Look at Living Standards and Population in Pre-industrial England. Discussion Paper No. 08-16. Copenhagen: Department of Economics, University of Copenhagen.
Nefedov, S. A., and Turchin, P. V. 2007. The Experience of Modeling Demographic and Structural Cycles. In Malkov S., Grinin L., and Korotayev A. (eds.), History and Mathematics: Macro-Historical Dynamics of Society and the State (рр. 153–167). Moscow: URSS. In Russian (Нефедов, С. А., Турчин, П. В. Опыт моделирования демографическиструктурных циклов. В Малков, С. Ю., Гринин, Л. Е., Коротаев А. В. (ред.) История и математика: Макроисторическая динамика общества и государства, c. 153–167. М.: УРСС).
Postan, M. M., and Hatcher, J. 1985. Population and Class Relations in Feudal Society. In Aston, T., and Philpin, C. H. E. (eds.), The Brenner Debate: Agrarian Class Structure and Economic Development in PreIndustrial Europe (pp. 65–78). Cambridge: Cambridge University Press.
Read, D. W., and LeBlanc, S. A. 2003. Population Growth, Carrying Capacity, and Conflict. Current Anthropology 44(1): 59–85.
Szulga, R. S. 2012. Endogenous Population and Resource Cycles in Historical Hunter-Gatherer Economies. Cliodynamics 3(2).
Tsirel, S. V. 2004. On the Possible Reasons for the Hyperexponential Growth of the Earth Population. In Dmitriev, M., and Petrov, A. (eds.), Mathematical Modeling of Social and Economic Dynamics (pр. 367– 369). Moscow: Russian State Social University.
Turchin, P. 2007. Historical Dynamics: Towards a Theoretical History. Moscow: LKI. In Russian (Турчин, Р. Историческая динамика. На пути к теоретической истории. М.: ЛКИ).
Turchin, P. 2009. Long-Term Population Cycles in Human Societies. Annals of the New York Academy of Science 1162: 1–17.
Turchin, P., and Nefedov, S. A. 2009. Secular Cycles. Princeton, NJ: Princeton University Press.
Usher, D. 1989. The Dynastic Cycle and the Stationary State. The American Economic Review 79(5): 1031–1044.
Voigtlander, N., and Voth, H. J. 2009. Malthusian Dynamism and the Rise of Europe: Make War, not Love. American Economic Review: Papers & Proceedings 99(2): 248–254.
Wood, J. W. 1998. A Theory of Preindustrial Population Dynamics, Demography, Economy, and Well-being in Malthusian Systems. Current Anthropology 39: 99–135.
</text>
|
[
{
"content": "<url>\nhttps://www.sociostudies.org/journal/files/seh/2014_1/172-184.pdf\n</url>\n<text>\nModeling Malthusian Dynamics in Pre-industrial Societies\n\nSergey A. Nefedov\n\nUral Federal University, Ekaterinburg\n\nABSTRACT\n\nThe discussion about the Malthusian character of pre-industrial economies that has arisen in the recent years extensively uses simple mathematical models. This article analyzes some of these models to determine their conformity with Malthusian postulates. The author suggests two models that are more adequate for the description of the Malthusian patterns.\n\nUntil recently, most economic historians were inclined to think that the medieval economies in Eurasia had a Malthusian nature (Allen 2008: 951). However, following the publication of Lee and Anderson's work (Lee and Anderson 2002), many came to dispute this opinion. A discussion has arisen about how the available data confirm the Malthusian relationship between demographic dynamics and consumption (i.e., real wages). This discussion has largely involved simple mathematical models of the Malthusian economy.\n\nIn 1980, Lee published the first and most popular of these models. This model describes the relationship between the real wage, wt (consumption), and labor resources, Nt (population), using the following equation:\n\nOr, in the logarithmic form:\n\nHere, t is time; μ, ρ, η are some non-negative constants; and εt is a variable that takes into account the climatic effect and other exogenous parameters. The factor ρ describes the capital increase and technological advances, thus the Malthusian economy features ρ = 0.\n\nSocial Evolution & History, Vol. 13 No. 1, March 2014 172–184\n\n2014 'Uchitel' Publishing House\n\nIf we take into account that in the ideal case εt = 0, the model can be expressed with quite a simple equation: wt = С Nt -η, where С is a certain constant. The drawbacks of this equation are evident: a small population Nt results in a consumption rate close to infinity, while in a large population the consumption becomes too small to ensure subsistence. Besides, this equation only shows the relationship between population and consumption. The model contains no feedback to demonstrate in what way the consumption influences population growth.\n\nWood (1998) suggests a feedback option for which he derives an equation basing on the same equation (1) as Lee, but formulates it as follows:\n\nHere, θ is the minimum per capita consumption rate, and St is the maximum population that can subsist in the given territory when the consumption equals θ. St can grow with technological advances, but the Malthusian case features a constant St, St = S0. Wood believes that the birth rate bt and death rate dt can be described with the following equations:\n\nwhere β0 , β1 , β2, δ0, δ1, and δ2 are certain constants. Thus, the equation below describes population growth:\n\nDeriving bt and dt from the system of Equations (3)–(4) and inserting them into (5) yields:\n\nwhere с0 and с1 here produces:\n\nare certain constants. Substituting equation (1a)\n\nwhere с2 and с3 are certain constants. The differential equation (6) has the time-independent solution Nt = N0 = exp(–с2/с3); its chart will be a horizontal line. According to the theorem of the unique existence of the solution, no other solutions (integral curves) may cross this horizontal line. The derivative dNt /dt is positive below this line, in the area 0 < Nt < N0; the solutions monotonically increase and the integral curves approximate the horizontal line. The derivative dNt /dt is negative above this line; the solutions monotonically decrease and the integral curves approximate\n\nthe horizontal line from above. Finally, the solutions cannot oscillate: the population cannot first feature growth and then loss due to 'the Malthusian crises'. Wood justifies this behavior of his model stating that the Malthusian crises 'are not a necessary feature of Malthusian systems… This conclusion is contrary to the belief of many economic historians (e.g., Le Roy Ladurie 1974: passim; Postan and Hatcher 1985: 69) though not to anything that Malthus himself ever wrote' (Wood 1998: 110).\n\nHowever, Malthus did write about population loss and depopulation:\n\nThe power of population is so superior to the power of the earth to produce subsistence for man that premature death must in some shape or other visit the human race. The vices of mankind are active and able ministers of depopulation. They are the precursors in the great army of destruction, and often finish the dreadful work themselves. But should they fail in this war of extermination, sickly seasons, epidemics, pestilence, and plague advance in terrific array, and sweep off their thousands and tens of thousands. Should success be still incomplete, gigantic inevitable famine stalks in the rear, and with one mighty blow levels the population with the food of the world (Malthus 1798: 61).\n\nWood's model does not, therefore, describe the population dynamics envisioned by Malthus himself. Nevertheless, it is used in many studies devoted to the analysis of the Malthusian economy in traditional societies.\n\nSometimes an iterative version of this model is used, implying calculations on an annual basis. Equation (1a) in the version put forth by Møller and Sharp (2009) has logarithmic form:\n\nBirth and death rates are calculated from the simplified equations:\n\nThe population Nt is related to the population Nt-1 in the previous year through the following relationship:\n\nhere, A, c0, c1 , a0 … a3 are certain constants. Inserting (3a) and (4a) into (7) gives:\n\nwhere u and v are certain constants. The resulting equation is:\n\nThis equation generates a series of population values. If the population at the initial moment equals a million (i.e., N1 =1), then N2 = v, N3 equals v raised to a power of 1+u; N3 equals to v raised to a power of 1 + u + u 2 , etc. If ׀u > ׀1, then Nt → ∞, which is impossible under the condition of limited resources in the Malthusian theory. If 0 < u < 1, then Nt monotonically tends to a finite bound. Finally, the case –1 < u <0 produces a very specific series in which the population increases in even years and decreases in odd years (or vice versa). Thus, the Møller-Sharp model has the same drawback as Wood's initial model: it cannot describe longterm population oscillations.\n\nAnother iterative version of the model is the one developed by Ashraf and Galor (2011). Beginning with equation (1a), the authors of this model take into consideration the number of adults and children, and optimize expenses. They, nevertheless, ultimately come to the same equation (8).\n\nOne more version of Wood's model is that of Voigtlander and Voth (2009). They use equation (1a), but replace equations (3) and (4) with (3a) and (4a):\n\nwhere b0 and d0 are certain constants. Inserting (1a) into equation (5) yields:\n\nwhere p and q are certain constants. The differential equation (6a) has the time-independent solution Nt = N0 = p 1/η(m – n) , which represents a horizontal line. As with the above model, the solution curves that are beneath this line monotonically increase and those lying above the line – monotonically decrease. Thus, this model has the same limitation as Wood's model and its other derivatives: it does not offer oscillating solutions.\n\nBrander and Taylor (1998) have suggested another popular model. This model analyzes some abstract renewable resource consumed in the course of human activities. For example, it might be forest resources or soil yield. St is the available amount of this resource (in year t), and K denotes its reserve in nature. The equation for consumption of this resource is as follows:\n\nwhere r and u are certain constants. The first term on the right side describes the process of natural resource renewal; the second term describes resource depletion owing to economic activity. The population number is given by the following equation:\n\nBrander and Taylor have shown that the system of equations (8)–(9) has oscillating solutions: when the resource is abundant the population grows, when it is exhausted the population decreases until the resource is renewed. Brander and Taylor refer to their model as 'Malthusian-Ricardian'. Initially, the model was intended to describe the economy of Easter Island, but afterwards it got wider application as a sufficiently general model of the Malthusian economy (e.g., Maxwell and Reuveny 2000; D'Alessandro 2007). It is essential to note, however, that resource St in the Brander–Taylor model is not the harvest gathered by farmers. According to Brander and Taylor, the crop is denoted by the term uStNt and it is deducted from the resource St. According to Szulga (2012), such a model describes a society of gatherers (or hunters) rather than an agrarian society. Meanwhile, Malthus mainly studied agricultural economies. Thus, Brander-Taylor model cannot be referred to as a 'Malthusian-Ricardian' one.\n\nwhere d and v are constants, and d < 0 in this case. This equation shows that natural population growth depends on the availability of resource St.\n\nUp to this point, I have confined my discussion to the analysis of simple models of the Malthusian economy that consist of no more than two differential equations. Naturally, there exist more complicated models (e.g., Usher 1989; Komlos and Artzrouni 1990; Chu and Lee 1994; Galor and Weil 2000; Lee and Tuljapurkar 2008) that allow for better behavioral freedom and offer oscillating solutions, as well. Many such models have been constructed within the framework of cliodynamic research actively performed in Russia and the USA (e.g., Tsirel 2004; Korotayev, Malkov, and Khaltourina 2005, 2006; Korotayev, Malkov, and Grinin 2007;\n\nTurchin 2007, 2009; Malkov 2009). However, almost all models described in literature have the same drawback: they contain uncertain coefficients whose values are unknown and cannot be determined in principle. The more complicated is a model, the more uncertain coefficients it contains. Meanwhile, these coefficients determine the behavior of the model, and different coefficient values result in different population dynamics. Thus, an uncertainty originates: as coefficient values are unknown, it is also uncertain which of the possible behavioral variants corresponds to historical reality and which of them could not possibly be realized.\n\nIn the remainder of this article, I would like to discuss two simple models that contain no uncertain parameters and, in my opinion, are sufficiently adequate for the description of the Malthusian population dynamics. Within the first model, Nt is the population in the year t, as above; Kt is the grain stock after the harvest estimated in terms of minimum annual per caput grain consumption rates (rate of consumption is assumed about 240 kg); and r is the natality under favorable conditions. The area under cultivation and the harvest depend on the population, and with the population growth they tend to the constant determined by the maximum area under cultivation maintained by the agricultural community. We will conside<cursor_is_here> To describe the population dynamics we use the standard logistic equation:\n\nKt in this logistic equation denotes the carrying capacity (i.e., the maximum size of population that may live in this territory). In our case, this population size corresponds to the number of minimum annual consumption rates in storage. Annually, Nt consumption rates are consumed, and the stock growth will be equal to:\n\nIf N in the equation for dP/dN tends to 0, we will obtain the harvest a/d (number of consumption rates) gathered by one farmer in favorable conditions (when the population is small and he or she is able to cultivate the maximum area). Thus, the value q = a/d shows how many households one farming family can support. The history\n\nThus, we have the simplest system of two differential equations (10)–(11). This system has an equilibrium state, when the population and stock remain constant, namely, when K0 = = N0 = a – d.\n\nof agricultural societies shows that q usually varies within the limits 1.2 < q < 2. We can express a and d in terms of q and N0:\n\nN0 can be conventionally set equal to 1 and thus, there are two constants in this model, r and q, which have physical significance and vary within the known limits: 0.01 < r < 0.02, and 1.2 < q < 2. The common methods used for investigation of dynamic systems allow us to determine that system (10)–(11) describes dying oscillations. The first oscillations can have different periods; however, when the curve approaches the equilibrium state, the period is close to:\n\nThe period T decreases when r and q increase, and increases, respectively, when these values decrease (Table 1 and Fig. 1).\n\nTable 1\n\nPeriod of oscillations with various r and q (in years)\n\nThus, the period of oscillations in this model is comparable to the duration of secular demographic cycles observed in the history of many states (Turchin and Nefedov 2009).\n\nThe dynamics of the agricultural population according to this model have an oscillating nature. In theory these oscillations die\n\nout and the system tends to the equilibrium state, but various random impacts and influences neglected herein (e.g., catastrophic crop failure) disturb the system equilibrium, after which there starts a new series of dying oscillations. The peculiar feature of the agricultural society is that its economic dynamics substantially depend on such a random value as the crop yield. The random factors that impact such systems are generally assumed to be exogenous; however, the dependence on crop yield variations is an intrinsic, endogenous feature of agricultural production. Therefore, one arrives at the conclusion that a special random value describing crop yield must be incorporated into the ideal model of the Malthusian cycle. This can be conveniently done within the iterative model where the calculations are made from year to year.\n\nFor convenience, I consider production years to start with the harvest, not a specific calendar date. The population number Nt at the beginning of year t is expressed in terms of the number of households or families (conventionally assuming that a household contains five people). In theory (i.e., when there is enough land for cultivation), a farming household cultivates a standard parcel of land (e.g., a Middle Eastern 'çiftlik') and one can measure the maximum possible area of arable land in terms of standard parcels S. When the number of households Nt exceeds S, two families can live on some parcels.\n\nLet at represent the annual crop yield t, expressed in terms of minimum family grain consumption rates that can be gathered on a standard parcel. We will express the crop yield in the form at= a0 + + dt, where a0 is the average crop yield, dt is a random value that accepts values from the segment (–а1, а1). The value а1 is less than a0 and the crop yield at varies within the interval of a0 – а1 to a0 + а1. With the units of measure that I have assumed, the harvest Yt (number of consumption rates) can be expressed in the following simple form:\n\nIf there is a grain surplus in the year t, that is per-capita production yt =Yt/Nt exceeds the 'satisfactory consumption' p 1 (p 1 > 1), then the farmers do not consume all produced grain, but store up the surplus (for the sake of simplicity we will assume that they store half of the surplus). However, it is worth noting that, owing to the storage conditions, the household stock Zt cannot grow to infinity and is\n\nlimited by certain value Z 0 . If there are surpluses exceeding this value, they all are consumed. If the year is lean and the production yt falls below the level p 1 , the farmers take grain from the stock, increasing the consumption, if possible, up to the level p 1 . If the stock is not sufficient, it is consumed to the full.\n\nThe population growth rate rt is determined as the ratio of the population Nt+1 in the following year to the population Nt in the previous year. The growth rate rt depends on the consumption pt. When the consumption is equal to the minimum normal rate (pt =1), the population remains constant (rt = 1). I designate the maximum natural growth r 0 , and the consumption rate needed to ensure it as p 0 . I believe that r 0 = 1.02, that the maximum annual population growth is two per cent. When 1 < pt < p 0 , population growth is linearly dependent on consumption, and in the case when pt > p 0 , it does not increase (r = r 0 ). For pt < 1, the dependence of rt on pt is taken as rt = pt (i.e., in case of crop failure the surviving population will be equal to the number of consumption rates and all people that do not have a sufficient annual food reserve will perish from starvation). Consequently, the population in the following year will be Nt+1 = rt Nt.\n\nConsidering the typical case from the Middle East or Russia from the sixteenth to the eighteenth centuries, when every family could obtain two minimal consumption rations from one standard parcel, one can assume a0 = 2 for the numerical experiment. The scatter of crop yield (ratio а1/a0) was large enough (e.g., it was about 60 per cent of average crop yield in Egypt). Hence, it appears that one can assume а1 = 1.2. As for the random value dt , it may be approximated using squared uniform distribution: if w is a value uniformly distributed over the segment (–1.1), then this random value can be taken as dt = а1 w 2 sign(w) (Nefedov and Turchin 2007). The maximum number of standard parcels S can be conventionally assumed to equal one million, and the maximum stock to equal ten-year ones (Z 0 = 10). Here, I consider a case in which farmers call upon the experience gained by preceding generations and start laying the crop up in storage as soon as the per-capita production exceeds 1.05 of the minimum level (p 1 = 1.05). This calculation has an idealized character, allowing one to assume N1 = 0.8 as the initial population value (in year t = 1). As the calculation results depend on a random value (i.e., crop yield), they can vary with each program run. Despite this variation, one can qualitatively observe a pattern of demographic cycles that seems typical: population growth periods alternate with demographic catastrophes. The duration of this cycle is, as in the previous model, 80–150 years (Fig. 2).\n\nNaturally, this model describes just the basic mechanism of the demographic cycle omitting many details (e.g., the existence of the state and military elite, the emergence of large landowners). Such factors are taken into account in other models (e.g., Nefedov and Turchin 2007) and the calculations made using these models show that the qualitative cyclic pattern changes insignificantly compared to the suggested model. On the whole, it seems quite certain that the availability of grain stock in farms contributes to a long-term economic stabilization. However, the population growth results in the stock depletion, and, sooner or later, major harvest failures provoke catastrophic starvations followed by events like epidemics, uprisings of starving people, and/or invasions by external enemies seeking to take advantage. As a result, the population size can decrease even by half and a new demographic cycle starts. While the model calculations suggest that this new cycle might start immediately after the catastrophe, in real life such crises as wars and uprisings have some inertia and impede economic revival. In such cases, stabilization is delayed.\n\nFinally, it is worth noting that after the publication of Wood's model economic historians came to consider the Malthusian economy as a system where the population size cannot exceed the carrying capacity and, consequently, the 'Malthusian crisis' is impossible. For example, Read and LeBlanc (2003: 59) suggest that\n\n… there is a standard model for the pattern of human population growth and its relationship to carrying capacity (K), namely, that most of the time human populations have low to nonexistent rates of growth… The model is often implicit and may simply assert that, until recently, population sizes have always been well below K and growth rates very low.\n\nBut Le Roy Ladurie, Postan, Hatcher, and many other economic historians insist that 'the Malthusian crises' were quite common phenomena in lived history, a fact acknowledged by Wood himself. The models described in this article show that the inevitability of similar crises arises from the simple laws that rule the functioning of agrarian economies.\n\nREFERENCES\n\nAllen, R. 2008. A Review of Gregory Clark's A Farewell to Alms: A Brief Economic History of the World. Journal of Economic Literature 46: 946–973.\n\nAshraf, Q., and Galor, O. 2011. Dynamics and Stagnation in the Malthusian Epoch. American Economic Review 101(5): 2003–2041.\n\nBrander, J., and Taylor, M. 1998. The Simple Economics of Easter Island: A Ricardo-Malthus Model of Renewable Resource Use. The American Economic Review 88: 119–138.\n\nChu, C. Y. C., and Lee, R. D. 1994. Famine, Revolt, and the Dynastic Cycle. Journal of Population Economics 7(4): 351–378.\n\nD'Alessandro, S. 2007. Non-linear Dynamics of Population and Natural Resources: The Emergence of Different Patterns of Development. Ecological Economics 62: 473–481.\n\nGalor, O., and Weil, D. N. 2000. Population, Technology, and Growth: From Malthusian Stagnation to the Demographic Transition and Beyond. The American Economic Review 90(4): 806–828.\n\nKomlos, J., and Artzrouni, M. 1990. Mathematical Investigations of the Escape from the Malthusian Trap. Mathematical Population Studies 2: 269–287.\n\nKorotayev, A., Malkov, S., and Grinin, L. (eds.) 2007. History and Mathematics: Analysis and Modeling of Socio-Historical Processes. Moscow: URSS. In Russian (Коротаев А., Малков С., Гринин Л. (ред.) История и Математика: Анализ и моделирование социальноисторических процессов. М.: УРСС).\n\nKorotayev, A., Malkov, A., and Khaltourina, D. 2005. Laws of History. Mathematical Modeling of Historical Macro-Processes: Demography, the Economy, Wars. Moscow: URSS. In Russian (Коротаев А. В., Малков А. С., Халтурина Д. А. Законы истории. Математическое моделирование исторических макропроцессов. Демография, экономика, войны. М.: УРСС).\n\nKorotayev, A., Malkov, A., and Khaltourina, D. 2006. Introduction to Social Macrodynamics: Secular Cycles and Millennial Trends. Moscow: Komkniga.\n\nLe Roy Ladurie, E. 1974. The Peasants of Languedoc. Urbana, IL: University of Illinois Press.\n\nLee, R. 1980. A Historical Perspective on Economic Aspects of the Population Explosion: The Case of Preindustrial England. In Easterlin, R. A. (ed.), Population and Economic Change in Developing Countries (pp. 517–566). Chicago, IL: University of Chicago Press.\n\nLee, R., and Anderson, M. 2002. Malthus in State Space: Macro Economic-Demographic Relations in English History, 1540–1870. Journal of Population Economics 15(2): 195–220.\n\nLee, C. T., and Tuljapurkar, S. 2008. Population and Prehistory I: Food-Dependent Population Growth in Constant Environments. Theoretical Population Biology 73: 473–482.\n\nMalkov, S. 2009. Social Self-Organization and the Historical Process: The Possibilities of Mathematical Modeling. Moscow: URSS. In Russian (Малков С. Ю. Социальная самоорганизация и исторический процесс: Возможности математического моделирования. М.: УРСС).\n\nMalthus, T. R. 1798. An Essay on the Principle of Population. London: J. Johnson.\n\nMaxwell, J., and Reuveny, R. 2000. Resource Scarcity and Conflict in Developing Countries. Journal of Peace Research 37(3): 301–322.\n\nMøller, N., and Sharp, P. 2009. Malthus in Cointegration Space: A New Look at Living Standards and Population in Pre-industrial England. Discussion Paper No. 08-16. Copenhagen: Department of Economics, University of Copenhagen.\n\nNefedov, S. A., and Turchin, P. V. 2007. The Experience of Modeling Demographic and Structural Cycles. In Malkov S., Grinin L., and Korotayev A. (eds.), History and Mathematics: Macro-Historical Dynamics of Society and the State (рр. 153–167). Moscow: URSS. In Russian (Нефедов, С. А., Турчин, П. В. Опыт моделирования демографическиструктурных циклов. В Малков, С. Ю., Гринин, Л. Е., Коротаев А. В. (ред.) История и математика: Макроисторическая динамика общества и государства, c. 153–167. М.: УРСС).\n\nPostan, M. M., and Hatcher, J. 1985. Population and Class Relations in Feudal Society. In Aston, T., and Philpin, C. H. E. (eds.), The Brenner Debate: Agrarian Class Structure and Economic Development in PreIndustrial Europe (pp. 65–78). Cambridge: Cambridge University Press.\n\nRead, D. W., and LeBlanc, S. A. 2003. Population Growth, Carrying Capacity, and Conflict. Current Anthropology 44(1): 59–85.\n\nSzulga, R. S. 2012. Endogenous Population and Resource Cycles in Historical Hunter-Gatherer Economies. Cliodynamics 3(2).\n\nTsirel, S. V. 2004. On the Possible Reasons for the Hyperexponential Growth of the Earth Population. In Dmitriev, M., and Petrov, A. (eds.), Mathematical Modeling of Social and Economic Dynamics (pр. 367– 369). Moscow: Russian State Social University.\n\nTurchin, P. 2007. Historical Dynamics: Towards a Theoretical History. Moscow: LKI. In Russian (Турчин, Р. Историческая динамика. На пути к теоретической истории. М.: ЛКИ).\n\nTurchin, P. 2009. Long-Term Population Cycles in Human Societies. Annals of the New York Academy of Science 1162: 1–17.\n\nTurchin, P., and Nefedov, S. A. 2009. Secular Cycles. Princeton, NJ: Princeton University Press.\n\nUsher, D. 1989. The Dynastic Cycle and the Stationary State. The American Economic Review 79(5): 1031–1044.\n\nVoigtlander, N., and Voth, H. J. 2009. Malthusian Dynamism and the Rise of Europe: Make War, not Love. American Economic Review: Papers & Proceedings 99(2): 248–254.\n\nWood, J. W. 1998. A Theory of Preindustrial Population Dynamics, Demography, Economy, and Well-being in Malthusian Systems. Current Anthropology 39: 99–135.\n</text>\n",
"role": "user"
},
{
"content": "r that the harvest is determined by the equation Pt=aNt /(Nt+d), where a and d are certain constants.",
"role": "assistant"
}
] |
MEETINGS:
NO. OF REGULAR:
VILLAGE BOARD OF TRUSTEES OF THE VILLAGE OF DEPEW February 24, 2020 7:00PM
ROLL CALL: Trustee Jakubowski – Pr
Trustee Stempniak - Absent
Trustee Hamernik - Pr
Mayor Peterson– Pr
ON A MOTION BY, Trustee Jakubowski, and seconded by Trustee Hamernik the February 10, 2020 Village Board Minutes were approved.
ON A MOTION BY, Trustee Hamernik, and seconded by Trustee Jakubowski the February 13, 2020 Zoning Board Minutes were accepted.
1. Lisa Marie Palma - 64 Hawro Place. Requesting permit to erect a 4ft chain link fence within the required side setbacks (at east & south property lines) on a corner lot as required by the Village Ordinance. – Granted
PUBLIC COMMENT – none
AUTHORIZE ADMINISTRATOR TO ADVERTISE FOR PUBLIC HEARING TAX CAP OVERRIDE – LOCAL LAW 2 OF 2020
Trustee Hamernik, offered the following resolution and moved for its adoption:
Be It Resolved, the Village Administrator is authorized to advertise for a public hearing. The public hearing will be held on Monday March 23, 2020 at 7:00 pm in the Council Chambers. The purpose of this hearing is to consider Local Law 2 of 2020 authorizing a property tax levy in excess of the limit established in General Municipal Law Section 3-c. If adopted, the proposed local law shall read as follows:
Section 1. Legislative Intent
It is the intent of this local law to allow the Village of Depew to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the "tax levy limit" as defined by General Municipal Law Section 3-c.
Section 2. Authority
This local law is adopted pursuant to subdivision 5 of General Municipal Law Section 3-c, which expressly authorizes a local government's governing body to override the property tax cap for the coming fiscal year by the adoption of a local law approved by a vote of sixty percent (60%) of said governing body.
Section 3: Tax Levy Limit Override
The Board of Trustees of the Village of Depew, County of Erie, is hereby authorized to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the amount otherwise prescribed in General Municipal Law Section 3-c.
Section 4: Severability
If a court determines that any clause, sentence, paragraph, subdivision, or part of this local law or the application thereof to any person, firm or corporation, or circumstance is invalid or unconstitutional, the court's order or judgment shall not affect, impair, or invalidate the remainder of this local law, but shall be confined in its operation to the clause, sentence, paragraph, subdivision, or part of this local law or in its application to the person, individual, form or corporation or circumstance, directly involved in the controversy in which such judgment or order shall be rendered.
Section 5: Effective date
This local law shall take effect immediately upon filing with the Secretary of State.
The foregoing resolution was seconded by Trustee Jakubowksi and duly put to a roll call vote which resulted in the following:
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
APPOINT DEPUTY MAYOR
Pursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson, do hereby appoint Erica Stempniak to the position of Deputy Mayor effective February 24, 2020, for the term to expire at noon on the first Monday in April 2020, at no additional salary.
Trustee Jakubowski - Y
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
ACCEPT RESIGNATION – EMERGENCY MANAGER
Trustee Jakubowski, offered the following resolution and moved for its adoption:
BE IT RESOLVED, the resignation of Judith A. Michaels from the Emergency Manager position effective February 24, 2020 is accepted.
The foregoing resolution was seconded by Trustee Hamernik and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
APPOINT TRUSTEE TO FILL VACANCIES
Pursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson do hereby appoint Judith A. Michaels to the position of Village Trustee to fill the vacancy on the Village Board, said term is to begin effective February 24, 2020 and for the term to expire at noon on the first Monday in April 2020.
Trustee Jakubowski - Y
Trustee HamernikY
Trustee Stempniak -Y
Mayor Peterson - Y
APPOINT PART TIME PUBLIC SAFETY DISPATCHER POLICE
Pursuant to Section 4-400 of Village Law, I Mayor Kevin Peterson, do hereby appoint
Timothy Schaefer to the position of Part Time Public Safety Dispatcher Police effective February 25, 2020.
The forgoing nomination was acted upon in the following manner by the Board of Trustees:
Trustee Jakubowski -Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson – Y
COMMITTEES
Trustee Jakubowski, offered the following resolution and moved for its adoption:
BE IT RESOLVED, upon recommendation of Mayor Kevin Peterson the following Standing Committees for the official year 2020, consisting of the following members of the Village Board are hereby appointed, the first named Chairman:
Michaels, Jakubowski
Disaster Preparedness & Public Safety Michaels, Stempniak
Zoning & Community Development Michaels, Stempniak
Personnel Jakubowski, Hamernik
Public Works & Solid Waste Michaels, Jakubowski
Intermunicipal Co-operation Stempniak, Hamernik
Recreation, Seniors & Veterans
Stempniak, Jakubowski
Depew Business Liaisons
Jakubowski, Hamernik
The foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
AWARD BID- SEWER BID
Trustee Hamernik, offered the following resolution and moved for its adoption:
BE IT RESOLVED, that upon the recommendation of the Village Engineer, the bid for the Phase 4 Main St & Manitou St. from the bid opening February 6, 2020 in the bid amount of $1,141,105.00 be awarded to:
Kenyon Pipeline Inspection
68 Park Rd.
Queensbury, NY 12804
The following resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson –Y
SEQR Type II Determination
Trustee Jakubowski, offered the following resolution and moved for its adoption:
Whereas, 6 NYCRR Section 617.5 (Title 6 of the New York Code of Rules and Regulations) under the state Environmental Quality Review Act (SEQR) provides that certain actions identified in subdivision (c ) of that section are not subject to environmental review under the Environmental Conversation Law;
NOW, THEREFORE BE IT RESOLVED, that the Village of Depew hereby determines that the proposed engineers study for the comprehensive evaluation of I/I within the Sewer Collection System is a Type II action in accordance with 6 NYCRR Section 617.5 (C ) 1(8) which constitutes the information collection including basic data collection and engineering studies that do not commit the agency to undertake, fund or approve any Type I or Unlisted action, and is therefore not subject to review under 6 NYCRR part 617.
The foregoing resolution was seconded by Hamernik, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik- Y
Trustee Stempniak -ABS
Mayor Peterson - Y
Authorization for Mayor to sign Grant Agreement
Trustee Michaels offered the following resolution and moved for its adoption:
BE IT RESOLVED, that the Mayor is authorized to execute a Grant Agreement with the NYS Environmental Facilities Corporation and any and all other contracts, documents and instruments necessary to bring about the Project – I&I investigation of Phase 6 sewershed area (Rehm Road) and to fulfill the Village Of Depew's obligation under the Engineering Planning Grant Agreement
The foregoing resolution was seconded by Trustee Jakubowski, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
APPROVE CAYUGA HEIGHTS SCHOOL SPEED ZONE
Trustee Jakubowski offered the following resolution and moved for its adoption:
WHEREAS, the Village of Depew reviewed a request and it was determined that the criteria for establishing a school speed zone is met in accordance with NYSDOT Traffic Engineering Directive OS 03-002; and
WHEREAS, the section of Como Park Blvd in front Cayuga Heights School under the jurisdictions of Erie County, and
WHEREAS, by referral, Erie County Department of Transportation reviewed the request and determined that it will establish a 25 mile per hour school speed limit on Como Park Blvd in front of Cayuga Heights School between the hours of 7:00 AM – and 6:00 PM; and
WHEREAS, the Village of Depew confirmed through conversations with Erie County Department of Public Works (ECDPW) that these signs may be posted along Como Park Blvd upon adoption of a Village Board Resolution and execution of a Village permit; and
THEREFORE, BE IT RESOLVED, the Depew Village Board respectfully requests that ECDPW establish a 25 MPH school speed zone on Como Park Blvd; and
THEREFORE, BE IT FURTHER RESOLVED; the school speed zone shall be effective only on school days between the hours of 7:00AM – 6:00 PM; and
The foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Michaels –Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
PERMISSION 15 K RACE and LIVE MUSIC WITH A BEER TENT
Trustee Hamernik, offered the following resolution and moved for its adoption:
WHEREAS, St. Martha's Parish requested permission to hold their 5K Race on Friday May 1, 2020 starting at 6:00 PM.
WHEREAS, said race route and traffic enforcement will be authorized by the Police Department.
WHEREAS, traffic enforcement will be provided by the Depew Fire Department.
WHEREAS, there will be a beer tent with music from 6:30 PM -10:30 PM on St. Martha's grounds.
BE IT RESOLVED, the race is approved. The race will last about one hour.
BE IT FURTHER RESOLVED, the Chief of Police must be provided the list of security officers and their credentials at least two weeks prior to the event. The Fire Department must approve site and Village code must be adhered to. The Tent Structure Permit needs to be applied for and the application fee will be waived.
The forgoing resolution was seconded by Trustee Michaels and CARRIED.
PERMISSION – MEMBERSHIP – DEPEW FIRE DEPARTMENT
Trustee Michaels, offered the following resolution and moved for its adoption:
BE IT RESOLVED, membership is hereby granted to the following in the Depew Fire Department pending the passing of their physicals
Depew Hose Co. #1
Christopher Wrobel Kora L. Daege
The foregoing resolution was seconded by Trustee Jakubowski and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak -ABS
Mayor Peterson - Y
PERMISSION – FIRE DEPARTMENT
Trustee Michaels, offered the following resolution and moved for its adoption:
WHEREAS, Depew Fire Department Hook & Ladder Company is requesting permission to take Ladder #5 to The Buffalo Niagara International Airport, 4200 Genesee St, Buffalo, NY 14225 for a joint drill with Lancaster and the BNIA FD on Wednesday February 26, 2020 from 6:30 PM – 9:30 PM.
And
WHEREAS, Depew Fire Department is requesting permission to take Engine #2 to The Erie County Training Facility, 3359 Broadway # 2, Buffalo, NY 14227 for a state interior Firefighters Operations Course on Sunday April 19, 2020 from 8:00 AM – 4:30 PM
THEREFORE, BE IT RESOLVED: The above foregoing resolutions were seconded by Trustee Jakubowski and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski -Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
EMPLOYMENT APPLICATIONS – Rec Dept – Michael Alberti, Nathan LeFever,
David Thompson
DEPARTMENT HEAD REPORTS – Police – January 2020
UNFINISHED AND OTHER BUSINESS - None
PUBLIC CONCERNS AND COMMENTS
Elizabeth, wanted to send Assembly Member Monica Wallace's congratulations to Trustee Judy Michaels on her appointment to the Village Board.
CEO – Attended the Zombie Foreclosure task force meeting downtown a few weeks ago. The Village has made a lot of progress with the help of the organization. Tony is always open to residents to call with their concerns of properties in your areas regarding this subject. Years ago the Village had about 109 zombie properties and today we are down to approximately 25-30.
PD – Cantalician Center speed zone was introduced today and the reason this reductions was put into place is to prevent a tragedy with any student that attends the school. The students have different levels of being handicap and we are trying to keep all of them safe. Social Media has portrayed the reason for this reduction in a different manner and the Chief wants everyone to be aware of the real reason for it. Mayor Peterson asked Elizabeth to thank Monica Wallace and Senator Kennedy for their help with this matter. The department is still working on the Reveal Mandate to try and make it easier for his staff to meet the requirements.
Trustee Michaels read the Fire Department update from the Chief
DPW – Working on general clean up, sewer flushing and tree removal. Potholes are also being addressed. Trustee Jakubowski thanked the department on the outstanding job they do with tree removal, "wouldn't even know the guys were there they do such a nice job of cleaning up".
Attorney Alba – A DEC meeting is scheduled to discuss the Village's clean-up plan. Will be working on amending the Tote Law.
Trustee Jakubowski is waiting to hear from his contact at NEST to finalize 2019's yearly recycling report. Hopes to hear tomorrow and get the report submitted soon.
Trustee Hamernik thanked the Lancaster Sun for the nice article they wrote on the 55 adopted soldiers the Village is collecting items for. There are a lot of items that will be packed up and mailed tomorrow.
Trustee Michaels thanked the department heads and said she looks forward to working with them as a board member. She is looking forward to continue to serve the community in her new role, which she held 25 years ago. Judy thanked her family for their support as well.
Mayor Peterson welcomed everyone to the next community meeting which will be held on March 2 nd at 7pm at the West End Fire Hall on George Urban. Everyone is welcome to come, ask questions and voice their concerns.
CLAIMS AND ACCOUNTS
ON A MOTION BY Trustee and seconded by Trustee, the following claims are to be paid: $304,190.77 General, $992.00 Sewer, $19,876.05 Capital Projects, $13,586.00 Capital Project – Building Reno, $215,000.00 Capital Projects – Street Sweeper and $553,644.82 Capital was CARRIED.
ADJOURNMENT
ON A MOTION BY Trustee Jakubowski, seconded by Trustee Michaels, the meeting was adjourned with a moment of silence for Todd Pacer of Pacer Funeral Home
On a lighter note, my Grand Daughter was born on Jan.10, 2020. Her name is Olivia Jakubowski. Father is my son Jaime and mother is Jenna.
Meeting then adjourned at 7:52 PM. The motion was CARRIED.
Respectfully submitted,
Teresa Wachowiak Village Administrator
|
<urn:uuid:cad05028-8021-4a81-903b-ab049200c35e>
|
CC-MAIN-2020-16
|
https://villageofdepew.org/files/documents/minutes/Board_Meeting_Minutes_2-24-2020.pdf
|
2020-04-07T00:48:39+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-16/subset=warc/part-00259-5e0433ee-fa15-4837-b2dc-d6f38301af97.c000.gz.parquet
| 770,300,030
| 3,684
|
eng_Latn
|
eng_Latn
| 0.96202
|
eng_Latn
| 0.986687
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3090,
5176,
7310,
9646,
11913,
14671,
15618
] |
MEETINGS:
NO. OF REGULAR:
VILLAGE BOARD OF TRUSTEES OF THE VILLAGE OF DEPEW February 24, 2020 7:00PM
ROLL CALL: Trustee Jakubowski – Pr
Trustee Stempniak - Absent
Trustee Hamernik - Pr
Mayor Peterson– Pr
ON A MOTION BY, Trustee Jakubowski, and seconded by Trustee Hamernik the February 10, 2020 Village Board Minutes were approved.
ON A MOTION BY, Trustee Hamernik, and seconded by Trustee Jakubowski the February 13, 2020 Zoning Board Minutes were accepted.
1. Lisa Marie Palma - 64 Hawro Place. Requesting permit to erect a 4ft chain link fence within the required side setbacks (at east & south property lines) on a corner lot as required by the Village Ordinance. – Granted
PUBLIC COMMENT – none
AUTHORIZE ADMINISTRATOR TO ADVERTISE FOR PUBLIC HEARING TAX CAP OVERRIDE – LOCAL LAW 2 OF 2020
Trustee Hamernik, offered the following resolution and moved for its adoption:
Be It Resolved, the Village Administrator is authorized to advertise for a public hearing. The public hearing will be held on Monday March 23, 2020 at 7:00 pm in the Council Chambers. The purpose of this hearing is to consider Local Law 2 of 2020 authorizing a property tax levy in excess of the limit established in General Municipal Law Section 3-c. If adopted, the proposed local law shall read as follows:
Section 1. Legislative Intent
It is the intent of this local law to allow the Village of Depew to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the "tax levy limit" as defined by General Municipal Law Section 3-c.
Section 2. Authority
This local law is adopted pursuant to subdivision 5 of General Municipal Law Section 3-c, which expressly authorizes a local government's governing body to override the property tax cap for the coming fiscal year by the adoption of a local law approved by a vote of sixty percent (60%) of said governing body.
Section 3: Tax Levy Limit Override
The Board of Trustees of the Village of Depew, County of Erie, is hereby authorized to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the amount otherwise prescribed in General Municipal Law Section 3-c.
Section 4: Severability
If a court determines that any clause, sentence, paragraph, subdivision, or part of this local law or the application thereof to any person, firm or corporation, or circumstance is invalid or unconstitutional, the court's order or judgment shall not affect, impair, or invalidate the remainder of this local law, but shall be confined in its operation to the clause, sentence, paragraph, subdivision, or part of this local law or in its application to the person, individual, form or corporation or circumstance, directly involved in the controversy in which such judgment or order shall be rendered.
Section 5: Effective date
This local law shall take effect immediately upon filing with the Secretary of State.
The foregoing resolution was seconded by Trustee Jakubowksi and duly put to a roll call vote which resulted in the following:
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
APPOINT DEPUTY MAYOR
Pursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson, do hereby appoint Erica Stempniak to the position of Deputy Mayor effective February 24, 2020, for the term to expire at noon on the first Monday in April 2020, at no additional salary.
Trustee Jakubowski - Y
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
ACCEPT RESIGNATION – EMERGENCY MANAGER
Trustee Jakubowski, offered the following resolution and moved for its adoption:
BE IT RESOLVED, the resignation of Judith A. Michaels from the Emergency Manager position effective February 24, 2020 is accepted.
The foregoing resolution was seconded by Trustee Hamernik and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
APPOINT TRUSTEE TO FILL VACANCIES
Pursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson do hereby appoint Judith A. Michaels to the position of Village Trustee to fill the vacancy on the Village Board, said term is to begin effective February 24, 2020 and for the term to expire at noon on the first Monday in April 2020.
Trustee Jakubowski - Y
Trustee HamernikY
Trustee Stempniak -Y
Mayor Peterson - Y
APPOINT PART TIME PUBLIC SAFETY DISPATCHER POLICE
Pursuant to Section 4-400 of Village Law, I Mayor Kevin Peterson, do hereby appoint
Timothy Schaefer to the position of Part Time Public Safety Dispatcher Police effective February 25, 2020.
The forgoing nomination was acted upon in the following manner by the Board of Trustees:
Trustee Jakubowski -Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson – Y
COMMITTEES
Trustee Jakubowski, offered the following resolution and moved for its adoption:
BE IT RESOLVED, upon recommendation of Mayor Kevin Peterson the following Standing Committees for the official year 2020, consisting of the following members of the Village Board are hereby appointed, the first named Chairman:
Michaels, Jakubowski
Disaster Preparedness & Public Safety Michaels, Stempniak
Zoning & Community Development Michaels, Stempniak
Personnel Jakubowski, Hamernik
Public Works & Solid Waste Michaels, Jakubowski
Intermunicipal Co-operation Stempniak, Hamernik
Recreation, Seniors & Veterans
Stempniak, Jakubowski
Depew Business Liaisons
Jakubowski, Hamernik
The foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
AWARD BID- SEWER BID
Trustee Hamernik, offered the following resolution and moved for its adoption:
BE IT RESOLVED, that upon the recommendation of the Village Engineer, the bid for the Phase 4 Main St & Manitou St. from the bid opening February 6, 2020 in the bid amount of $1,141,105.00 be awarded to:
Kenyon Pipeline Inspection
68 Park Rd.
Queensbury, NY 12804
The following resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson –Y
SEQR Type II Determination
Trustee Jakubowski, offered the following resolution and moved for its adoption:
Whereas, 6 NYCRR Section 617.5 (Title 6 of the New York Code of Rules and Regulations) under the state Environmental Quality Review Act (SEQR) provides that certain actions identified in subdivision (c ) of that section are not subject to environmental review under the Environmental Conversation Law;
NOW, THEREFORE BE IT RESOLVED, that the Village of Depew hereby determines that the proposed engineers study for the comprehensive evaluation of I/I within the Sewer Collection System is a Type II action in accordance with 6 NYCRR Section 617.5 (C ) 1(8) which constitutes the information collection including basic data collection and engineering studies that do not commit the agency to undertake, fund or approve any Type I or Unlisted action, and is therefore not subject to review under 6 NYCRR part 617.
The foregoing resolution was seconded by Hamernik, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik- Y
Trustee Stempniak -ABS
Mayor Peterson - Y
Authorization for Mayor to sign Grant Agreement
Trustee Michaels offered the following resolution and moved for its adoption:
BE IT RESOLVED, that the Mayor is authorized to execute a Grant Agreement with the NYS Environmental Facilities Corporation and any and all other contracts, documents and instruments necessary to bring about the Project – I&I investigation of Phase 6 sewershed area (Rehm Road) and to fulfill the Village Of Depew's obligation under the Engineering Planning Grant Agreement
The foregoing resolution was seconded by Trustee Jakubowski, and duly put to a roll call
|
vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
APPROVE CAYUGA HEIGHTS SCHOOL SPEED ZONE
Trustee Jakubowski offered the following resolution and moved for its adoption:
WHEREAS, the Village of Depew reviewed a request and it was determined that the criteria for establishing a school speed zone is met in accordance with NYSDOT Traffic Engineering Directive OS 03-002; and
WHEREAS, the section of Como Park Blvd in front Cayuga Heights School under the jurisdictions of Erie County, and
WHEREAS, by referral, Erie County Department of Transportation reviewed the request and determined that it will establish a 25 mile per hour school speed limit on Como Park Blvd in front of Cayuga Heights School between the hours of 7:00 AM – and 6:00 PM; and
WHEREAS, the Village of Depew confirmed through conversations with Erie County Department of Public Works (ECDPW) that these signs may be posted along Como Park Blvd upon adoption of a Village Board Resolution and execution of a Village permit; and
THEREFORE, BE IT RESOLVED, the Depew Village Board respectfully requests that ECDPW establish a 25 MPH school speed zone on Como Park Blvd; and
THEREFORE, BE IT FURTHER RESOLVED; the school speed zone shall be effective only on school days between the hours of 7:00AM – 6:00 PM; and
The foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Michaels –Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
PERMISSION 15 K RACE and LIVE MUSIC WITH A BEER TENT
Trustee Hamernik, offered the following resolution and moved for its adoption:
WHEREAS, St.
| 8,131
|
end_of_word
|
call
|
remove_all
|
<url>
https://villageofdepew.org/files/documents/minutes/Board_Meeting_Minutes_2-24-2020.pdf
</url>
<text>
MEETINGS:
NO. OF REGULAR:
VILLAGE BOARD OF TRUSTEES OF THE VILLAGE OF DEPEW February 24, 2020 7:00PM
ROLL CALL: Trustee Jakubowski – Pr
Trustee Stempniak - Absent
Trustee Hamernik - Pr
Mayor Peterson– Pr
ON A MOTION BY, Trustee Jakubowski, and seconded by Trustee Hamernik the February 10, 2020 Village Board Minutes were approved.
ON A MOTION BY, Trustee Hamernik, and seconded by Trustee Jakubowski the February 13, 2020 Zoning Board Minutes were accepted.
1. Lisa Marie Palma - 64 Hawro Place. Requesting permit to erect a 4ft chain link fence within the required side setbacks (at east & south property lines) on a corner lot as required by the Village Ordinance. – Granted
PUBLIC COMMENT – none
AUTHORIZE ADMINISTRATOR TO ADVERTISE FOR PUBLIC HEARING TAX CAP OVERRIDE – LOCAL LAW 2 OF 2020
Trustee Hamernik, offered the following resolution and moved for its adoption:
Be It Resolved, the Village Administrator is authorized to advertise for a public hearing. The public hearing will be held on Monday March 23, 2020 at 7:00 pm in the Council Chambers. The purpose of this hearing is to consider Local Law 2 of 2020 authorizing a property tax levy in excess of the limit established in General Municipal Law Section 3-c. If adopted, the proposed local law shall read as follows:
Section 1. Legislative Intent
It is the intent of this local law to allow the Village of Depew to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the "tax levy limit" as defined by General Municipal Law Section 3-c.
Section 2. Authority
This local law is adopted pursuant to subdivision 5 of General Municipal Law Section 3-c, which expressly authorizes a local government's governing body to override the property tax cap for the coming fiscal year by the adoption of a local law approved by a vote of sixty percent (60%) of said governing body.
Section 3: Tax Levy Limit Override
The Board of Trustees of the Village of Depew, County of Erie, is hereby authorized to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the amount otherwise prescribed in General Municipal Law Section 3-c.
Section 4: Severability
If a court determines that any clause, sentence, paragraph, subdivision, or part of this local law or the application thereof to any person, firm or corporation, or circumstance is invalid or unconstitutional, the court's order or judgment shall not affect, impair, or invalidate the remainder of this local law, but shall be confined in its operation to the clause, sentence, paragraph, subdivision, or part of this local law or in its application to the person, individual, form or corporation or circumstance, directly involved in the controversy in which such judgment or order shall be rendered.
Section 5: Effective date
This local law shall take effect immediately upon filing with the Secretary of State.
The foregoing resolution was seconded by Trustee Jakubowksi and duly put to a roll call vote which resulted in the following:
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
APPOINT DEPUTY MAYOR
Pursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson, do hereby appoint Erica Stempniak to the position of Deputy Mayor effective February 24, 2020, for the term to expire at noon on the first Monday in April 2020, at no additional salary.
Trustee Jakubowski - Y
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
ACCEPT RESIGNATION – EMERGENCY MANAGER
Trustee Jakubowski, offered the following resolution and moved for its adoption:
BE IT RESOLVED, the resignation of Judith A. Michaels from the Emergency Manager position effective February 24, 2020 is accepted.
The foregoing resolution was seconded by Trustee Hamernik and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Stempniak -ABS
Trustee Hamernik -Y
Mayor Peterson – Y
APPOINT TRUSTEE TO FILL VACANCIES
Pursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson do hereby appoint Judith A. Michaels to the position of Village Trustee to fill the vacancy on the Village Board, said term is to begin effective February 24, 2020 and for the term to expire at noon on the first Monday in April 2020.
Trustee Jakubowski - Y
Trustee HamernikY
Trustee Stempniak -Y
Mayor Peterson - Y
APPOINT PART TIME PUBLIC SAFETY DISPATCHER POLICE
Pursuant to Section 4-400 of Village Law, I Mayor Kevin Peterson, do hereby appoint
Timothy Schaefer to the position of Part Time Public Safety Dispatcher Police effective February 25, 2020.
The forgoing nomination was acted upon in the following manner by the Board of Trustees:
Trustee Jakubowski -Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson – Y
COMMITTEES
Trustee Jakubowski, offered the following resolution and moved for its adoption:
BE IT RESOLVED, upon recommendation of Mayor Kevin Peterson the following Standing Committees for the official year 2020, consisting of the following members of the Village Board are hereby appointed, the first named Chairman:
Michaels, Jakubowski
Disaster Preparedness & Public Safety Michaels, Stempniak
Zoning & Community Development Michaels, Stempniak
Personnel Jakubowski, Hamernik
Public Works & Solid Waste Michaels, Jakubowski
Intermunicipal Co-operation Stempniak, Hamernik
Recreation, Seniors & Veterans
Stempniak, Jakubowski
Depew Business Liaisons
Jakubowski, Hamernik
The foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson - Y
AWARD BID- SEWER BID
Trustee Hamernik, offered the following resolution and moved for its adoption:
BE IT RESOLVED, that upon the recommendation of the Village Engineer, the bid for the Phase 4 Main St & Manitou St. from the bid opening February 6, 2020 in the bid amount of $1,141,105.00 be awarded to:
Kenyon Pipeline Inspection
68 Park Rd.
Queensbury, NY 12804
The following resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik - Y
Trustee Stempniak - ABS
Mayor Peterson –Y
SEQR Type II Determination
Trustee Jakubowski, offered the following resolution and moved for its adoption:
Whereas, 6 NYCRR Section 617.5 (Title 6 of the New York Code of Rules and Regulations) under the state Environmental Quality Review Act (SEQR) provides that certain actions identified in subdivision (c ) of that section are not subject to environmental review under the Environmental Conversation Law;
NOW, THEREFORE BE IT RESOLVED, that the Village of Depew hereby determines that the proposed engineers study for the comprehensive evaluation of I/I within the Sewer Collection System is a Type II action in accordance with 6 NYCRR Section 617.5 (C ) 1(8) which constitutes the information collection including basic data collection and engineering studies that do not commit the agency to undertake, fund or approve any Type I or Unlisted action, and is therefore not subject to review under 6 NYCRR part 617.
The foregoing resolution was seconded by Hamernik, and duly put to a roll call vote which resulted in the following:
Trustee Jakubowski - Y
Trustee Michaels -Y
Trustee Hamernik- Y
Trustee Stempniak -ABS
Mayor Peterson - Y
Authorization for Mayor to sign Grant Agreement
Trustee Michaels offered the following resolution and moved for its adoption:
BE IT RESOLVED, that the Mayor is authorized to execute a Grant Agreement with the NYS Environmental Facilities Corporation and any and all other contracts, documents and instruments necessary to bring about the Project – I&I investigation of Phase 6 sewershed area (Rehm Road) and to fulfill the Village Of Depew's obligation under the Engineering Planning Grant Agreement
The foregoing resolution was seconded by Trustee Jakubowski, and duly put to a roll call<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://villageofdepew.org/files/documents/minutes/Board_Meeting_Minutes_2-24-2020.pdf\n</url>\n<text>\nMEETINGS:\n\nNO. OF REGULAR:\n\nVILLAGE BOARD OF TRUSTEES OF THE VILLAGE OF DEPEW February 24, 2020 7:00PM\n\nROLL CALL: Trustee Jakubowski – Pr\n\nTrustee Stempniak - Absent\n\nTrustee Hamernik - Pr\n\nMayor Peterson– Pr\n\nON A MOTION BY, Trustee Jakubowski, and seconded by Trustee Hamernik the February 10, 2020 Village Board Minutes were approved.\n\nON A MOTION BY, Trustee Hamernik, and seconded by Trustee Jakubowski the February 13, 2020 Zoning Board Minutes were accepted.\n\n1. Lisa Marie Palma - 64 Hawro Place. Requesting permit to erect a 4ft chain link fence within the required side setbacks (at east & south property lines) on a corner lot as required by the Village Ordinance. – Granted\n\nPUBLIC COMMENT – none\n\nAUTHORIZE ADMINISTRATOR TO ADVERTISE FOR PUBLIC HEARING TAX CAP OVERRIDE – LOCAL LAW 2 OF 2020\n\nTrustee Hamernik, offered the following resolution and moved for its adoption:\n\nBe It Resolved, the Village Administrator is authorized to advertise for a public hearing. The public hearing will be held on Monday March 23, 2020 at 7:00 pm in the Council Chambers. The purpose of this hearing is to consider Local Law 2 of 2020 authorizing a property tax levy in excess of the limit established in General Municipal Law Section 3-c. If adopted, the proposed local law shall read as follows:\n\nSection 1. Legislative Intent\n\nIt is the intent of this local law to allow the Village of Depew to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the \"tax levy limit\" as defined by General Municipal Law Section 3-c.\n\nSection 2. Authority\n\nThis local law is adopted pursuant to subdivision 5 of General Municipal Law Section 3-c, which expressly authorizes a local government's governing body to override the property tax cap for the coming fiscal year by the adoption of a local law approved by a vote of sixty percent (60%) of said governing body.\n\nSection 3: Tax Levy Limit Override\n\nThe Board of Trustees of the Village of Depew, County of Erie, is hereby authorized to adopt a budget for the fiscal year commencing June 1, 2020 that requires a real property tax levy in excess of the amount otherwise prescribed in General Municipal Law Section 3-c.\n\nSection 4: Severability\n\nIf a court determines that any clause, sentence, paragraph, subdivision, or part of this local law or the application thereof to any person, firm or corporation, or circumstance is invalid or unconstitutional, the court's order or judgment shall not affect, impair, or invalidate the remainder of this local law, but shall be confined in its operation to the clause, sentence, paragraph, subdivision, or part of this local law or in its application to the person, individual, form or corporation or circumstance, directly involved in the controversy in which such judgment or order shall be rendered.\n\nSection 5: Effective date\n\nThis local law shall take effect immediately upon filing with the Secretary of State.\n\nThe foregoing resolution was seconded by Trustee Jakubowksi and duly put to a roll call vote which resulted in the following:\n\nTrustee Stempniak -ABS\n\nTrustee Hamernik -Y\n\nMayor Peterson – Y\n\nAPPOINT DEPUTY MAYOR\n\nPursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson, do hereby appoint Erica Stempniak to the position of Deputy Mayor effective February 24, 2020, for the term to expire at noon on the first Monday in April 2020, at no additional salary.\n\nTrustee Jakubowski - Y\n\nTrustee Stempniak -ABS\n\nTrustee Hamernik -Y\n\nMayor Peterson – Y\n\nACCEPT RESIGNATION – EMERGENCY MANAGER\n\nTrustee Jakubowski, offered the following resolution and moved for its adoption:\n\nBE IT RESOLVED, the resignation of Judith A. Michaels from the Emergency Manager position effective February 24, 2020 is accepted.\n\nThe foregoing resolution was seconded by Trustee Hamernik and duly put to a roll call vote which resulted in the following:\n\nTrustee Jakubowski - Y\n\nTrustee Stempniak -ABS\n\nTrustee Hamernik -Y\n\nMayor Peterson – Y\n\nAPPOINT TRUSTEE TO FILL VACANCIES\n\nPursuant to Section 4-400 of Village Law, I, Mayor Kevin Peterson do hereby appoint Judith A. Michaels to the position of Village Trustee to fill the vacancy on the Village Board, said term is to begin effective February 24, 2020 and for the term to expire at noon on the first Monday in April 2020.\n\nTrustee Jakubowski - Y\n\nTrustee HamernikY\n\nTrustee Stempniak -Y\n\nMayor Peterson - Y\n\nAPPOINT PART TIME PUBLIC SAFETY DISPATCHER POLICE\n\nPursuant to Section 4-400 of Village Law, I Mayor Kevin Peterson, do hereby appoint\n\nTimothy Schaefer to the position of Part Time Public Safety Dispatcher Police effective February 25, 2020.\n\nThe forgoing nomination was acted upon in the following manner by the Board of Trustees:\n\nTrustee Jakubowski -Y\n\nTrustee Michaels -Y\n\nTrustee Hamernik - Y\n\nTrustee Stempniak - ABS\n\nMayor Peterson – Y\n\nCOMMITTEES\n\nTrustee Jakubowski, offered the following resolution and moved for its adoption:\n\nBE IT RESOLVED, upon recommendation of Mayor Kevin Peterson the following Standing Committees for the official year 2020, consisting of the following members of the Village Board are hereby appointed, the first named Chairman:\n\nMichaels, Jakubowski\n\nDisaster Preparedness & Public Safety Michaels, Stempniak\n\nZoning & Community Development Michaels, Stempniak\n\nPersonnel Jakubowski, Hamernik\n\nPublic Works & Solid Waste Michaels, Jakubowski\n\nIntermunicipal Co-operation Stempniak, Hamernik\n\nRecreation, Seniors & Veterans\n\nStempniak, Jakubowski\n\nDepew Business Liaisons\n\nJakubowski, Hamernik\n\nThe foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:\n\nTrustee Jakubowski - Y\n\nTrustee Michaels -Y\n\nTrustee Hamernik - Y\n\nTrustee Stempniak - ABS\n\nMayor Peterson - Y\n\nAWARD BID- SEWER BID\n\nTrustee Hamernik, offered the following resolution and moved for its adoption:\n\nBE IT RESOLVED, that upon the recommendation of the Village Engineer, the bid for the Phase 4 Main St & Manitou St. from the bid opening February 6, 2020 in the bid amount of $1,141,105.00 be awarded to:\n\nKenyon Pipeline Inspection\n\n68 Park Rd.\n\nQueensbury, NY 12804\n\nThe following resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:\n\nTrustee Jakubowski - Y\n\nTrustee Michaels -Y\n\nTrustee Hamernik - Y\n\nTrustee Stempniak - ABS\n\nMayor Peterson –Y\n\nSEQR Type II Determination\n\nTrustee Jakubowski, offered the following resolution and moved for its adoption:\n\nWhereas, 6 NYCRR Section 617.5 (Title 6 of the New York Code of Rules and Regulations) under the state Environmental Quality Review Act (SEQR) provides that certain actions identified in subdivision (c ) of that section are not subject to environmental review under the Environmental Conversation Law;\n\nNOW, THEREFORE BE IT RESOLVED, that the Village of Depew hereby determines that the proposed engineers study for the comprehensive evaluation of I/I within the Sewer Collection System is a Type II action in accordance with 6 NYCRR Section 617.5 (C ) 1(8) which constitutes the information collection including basic data collection and engineering studies that do not commit the agency to undertake, fund or approve any Type I or Unlisted action, and is therefore not subject to review under 6 NYCRR part 617.\n\nThe foregoing resolution was seconded by Hamernik, and duly put to a roll call vote which resulted in the following:\n\nTrustee Jakubowski - Y\n\nTrustee Michaels -Y\n\nTrustee Hamernik- Y\n\nTrustee Stempniak -ABS\n\nMayor Peterson - Y\n\nAuthorization for Mayor to sign Grant Agreement\n\nTrustee Michaels offered the following resolution and moved for its adoption:\n\nBE IT RESOLVED, that the Mayor is authorized to execute a Grant Agreement with the NYS Environmental Facilities Corporation and any and all other contracts, documents and instruments necessary to bring about the Project – I&I investigation of Phase 6 sewershed area (Rehm Road) and to fulfill the Village Of Depew's obligation under the Engineering Planning Grant Agreement\n\nThe foregoing resolution was seconded by Trustee Jakubowski, and duly put to a roll call<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": " vote which resulted in the following:\n\nTrustee Jakubowski - Y\n\nTrustee Michaels -Y\n\nTrustee Hamernik - Y\n\nTrustee Stempniak - ABS\n\nMayor Peterson - Y\n\nAPPROVE CAYUGA HEIGHTS SCHOOL SPEED ZONE\n\nTrustee Jakubowski offered the following resolution and moved for its adoption:\n\nWHEREAS, the Village of Depew reviewed a request and it was determined that the criteria for establishing a school speed zone is met in accordance with NYSDOT Traffic Engineering Directive OS 03-002; and\n\nWHEREAS, the section of Como Park Blvd in front Cayuga Heights School under the jurisdictions of Erie County, and\n\nWHEREAS, by referral, Erie County Department of Transportation reviewed the request and determined that it will establish a 25 mile per hour school speed limit on Como Park Blvd in front of Cayuga Heights School between the hours of 7:00 AM – and 6:00 PM; and\n\nWHEREAS, the Village of Depew confirmed through conversations with Erie County Department of Public Works (ECDPW) that these signs may be posted along Como Park Blvd upon adoption of a Village Board Resolution and execution of a Village permit; and\n\nTHEREFORE, BE IT RESOLVED, the Depew Village Board respectfully requests that ECDPW establish a 25 MPH school speed zone on Como Park Blvd; and\n\nTHEREFORE, BE IT FURTHER RESOLVED; the school speed zone shall be effective only on school days between the hours of 7:00AM – 6:00 PM; and\n\nThe foregoing resolution was seconded by Trustee Michaels, and duly put to a roll call vote which resulted in the following:\n\nTrustee Michaels –Y\n\nTrustee Hamernik - Y\n\nTrustee Stempniak - ABS\n\nMayor Peterson - Y\n\nPERMISSION 15 K RACE and LIVE MUSIC WITH A BEER TENT\n\nTrustee Hamernik, offered the following resolution and moved for its adoption:\n\nWHEREAS, St.",
"role": "assistant"
}
] |
|
Summer 2013
Highlights
Page 1: FCC Bars High Rates For Long Distance Phone Calls
Page 2: New Parole Law
Page 3: DOC contracts with Jpay
Page 4: Virginia CURE Annual Meeting
Page 5: National News
Directors Corner
It is a beautiful dry, sunny day as I write this note, but many CURE families can't help thinking of their family members housed in non air-conditioned facilities and suffering through this summer in terrible heat. We have expressed concern in the past about the warming temperatures and lack of air- conditioning in some of our prisons. Now, Greensville Correctional Center is being retrofitted with air- conditioning and
DOC may soon be opening the air-conditioned North River facility. We urge the state to continue this retrofitting in those prisons left without. Better still, let's release more folks and close more prisons! This summer I spoke of these and other concerns at a presentation in St. Mary of Sorrows church in Fairfax. This church has been a strong supporter of CURE's work. I also spoke at a meeting of the Alexandria NAACP. I was interviewed by the Fairfax County Times and a Charlottesville radio station. CURE member Marcia Dickinson (Richmond Chapter) had her letter against solitary confinement published in the Washington Post!. We continue meeting with the Justice Policy Institute Coalition of criminal justice reform organizations to further identify passable legislation for 2014. Planning is also underway for our 26th Annual Meeting on October 19th. . Carla
FCC Bars High Rates For Long Distance Phone Calls In Jails And Prisons Nationwide
An FCC workshop on the cost of prison phone rates was held in Washington on July 10. Panel members included CURE's own Charlie Sullivan, founder of National CURE and Delegate Patrick Hope (D-47) from Arlington. The panel addressed a number of concerns all too familiar to prisoners and their families. The report generated by this workshop was voted on at an August 10 meeting. By a 2 to 1 margin, the report with its recommendations was accepted! The Commission's reforms adopt "a simple and balanced approach that protects security and public safety needs, ensures providers receive fair compensation while providing reasonable rates to consumers" as follows:
"o Requires that all interstate inmate calling rates, including ancillary charges, be based on the cost of providing the inmate calling service. Provides immediate relief to exorbitant rates:
o Adopts an interim rate cap of $0.21 per minute for debit and pre-paid calls and $0.25 per minute for collect calls, dramatically decreasing rates of over $17 for a 15-minute call to no more than $3.75 or $3.15 a call
o Presumes that rates of $0.12 per minute for debit and prepaid calls ($1.80 for a 15-minute call) and $0.14 cents per minute for collect calls ($2.10 for a 15-minute call) are just, reasonable and cost-based."
Concludes that "site commissions", payments from providers to correctional facilities, may not be included in any interstate rate or charge; clarifies that inmates or their loved ones who use Telecommunications Relay Services because of hearing and speech disabilities may not be charged higher rates. Requires a mandatory data collection, annual certification requirement, and enforcement provisions to ensure compliance with this Order. Seeks comment on reforming rates and practices affecting calls within a state.
The DOC has contacted the attorney for the FCC and currently awaits the formal order that will explain what will be required of the states to realize the mandate. After receiving the order, the state will issue a memorandum for action. The order should come "soon". We will have more information in the next newsletter.
UPDATE ON NEW PAROLE REFORM LAW
Bill Richardson
As we have previously reported, effective July 1, 2013, the Virginia Code has been amended to reflect enactment of House Bill 2103 earlier this year. Introduced by Delegate Mark Sickles and supported by Virginia CURE, this bill amends the powers and duties of the Virginia Parole Board to require that the Board:
"Ensure that each person eligible for parole receives a timely and thorough review of his suitability for release on parole, including a review of any relevant post-sentencing information. If parole is denied, the basis for the denial of parole shall be in writing and shall give specific reasons for such denial to such inmate."
This bill was intended to address the Board's longstanding practice of denying parole based solely on a form letter listing standard reasons, such as "serious nature and circumstances of your offense," or "risk to the community."
Virginia CURE has met with the Chair and Vice Chair of the Parole Board to discuss how best to implement the new statute. Given the large number of candidates still eligible for parole every year, and the Board's limited staff, they believe that some reliance on standard forms is necessary. On the other hand, we emphasized the need for providing more "specific reasons" for parole denial, particularly in the case of those inmates who have served many years with model institutional records. According to the Virginia Criminal Sentencing Commission, for example, there are likely many hundreds of inmates who have already served longer under the "old" parole law than they would have served under the "new" post-1994 sentencing guidelines for the same offense.
We hope that the Board's implementation of the new statute will reflect some greater effort to provide the "thorough review of . . . suitability for release on parole," and "specific reasons for denial," contemplated by the General Assembly. We will keep you posted. Meanwhile, we would appreciate receiving any information about the Board's approach after July 1, 2013, including copies of parole denial letters.
We encourage family members to take advantage of your right to meet with a Parole Board member when inmates come up for parole. While parole grant rates continue to be very low, such meetings can demonstrate to the Parole Board that inmates continue to have the support of their families. At our meeting, Parole Board Chair Bill Muse asked us to inform Virginia CURE members of three changes the Board is making to its parole procedures.
First, family members (or other representatives) of candidates for parole may now meet with a Board member annually, rather than only every two years as before. Second, Board members are now trying to arrange to have these meetings in more convenient regional locations, so that you may not have to travel to Richmond. Finally, the Board is exploring the idea of meeting personally with those inmates eligible for geriatric release (generally those who have reached the age of 60 and have served at least five years, or those who have reached the age of 65 and have served at least ten years), since many are located in the same facilities (e.g., Deerfield or Greensville).
Please let us know if you would like more information about how to arrange to meet with a Parole Board member on behalf of an inmate who is coming up for parole consideration. Among the factors the Board would consider relevant at such a meeting would be an inmate's conduct, employment, education, vocational training, and other developmental activities during incarceration; recommendations from the court, the prosecuting attorney, or corrections officials; family history, education, employment and military experience; physical and mental health; changes in motivation and behavior while incarcerated; and availability of a suitable release plan (including residence and employment prospects).
Parole Grant Rates 2012-2013
Virginia News
Fairfax County Sheriff's Office made half a million dollars from inmate phone calls in 2011 phone services According to records obtained from the office's financial services branch in 2011 — the last year for which figures are available — the Sheriff's Office brought in $612,000 in gross telephone receipts from its inmate telephone services program, which sells prisoners prepaid phone cards in $10 or $20 increments. Prisoners can be charged as much as $5.31 for the first minute of a collect, or prepaid call made to an out-of-state phone number. Each additional minute is charged at a rate of 89 cents. This, according to advocates, is a higher rate than in any other facility in the country! Expenses for the phone system were $41,190, so the net revenue was $571,218.63. That figure represents a 93 percent commission rate, possibly the highest in the country. "The profits from the program go to support the infrastructure of the jail." the Sheriff informs us. The contractor for this state authorized program is IC Solutions.
Department of Juvenile Justice Studies Juvenile Facilities Needs
Virginia CURE Juvenile justice advocates attended a meeting this August presented by contractors hired by the Department of Juvenile Justice (DJJ) to assess the needs of facilities for young prisoners. Earlier this year the DJJ announced that it would build a new large facility to house juveniles. There was a strong reaction from advocates who had the newest data concluding that juveniles were best served in small facilities or in Community Corrections. The DJJ decided to study the actual needs for facilities in light of new trends. Advocates came away from this meeting feeling that this will be an honest look at needs. The team includes a number of professionals who will be dealing with various aspects of administering juvenile justice including architects and program specialists.
Warden Changed at Buckingham and Dillwyn
As of August 25, 2013, Dillwyn and Buckingham Correctional Centers exchanged Wardens. Dillwyn Warden Barksdale has replaced Warden Edmonds at Buckingham, and Edmonds took over at Dillwyn on Aug 28. Edmonds has risen through the administrative ranks of the VA DOC prison system, while Barksdale has risen to the top through security. Edmonds is known as a rehabilitation warden, whereas Barksdale is very security minded. This is good news for Dillwyn, as this security level 2 facility is an Intensive re-entry location for southwest and central Virginia.
DOC contracts with Jpay to provide communication and financial services
Jpay is the corporation that is providing the kiosks we have spoken about in past newsletters. Families can access Jpay services via their secure Internet web page. Jpay describes itself as being " committed to helping friends and family of inmates stay connected to their incarcerated loved ones through a variety of corrections-related services offered in more than 30 states across the country, as well as to providing the quickest and most reliable payment options for individuals in community corrections." They have been in business for 9 years and are "The one-stop shop for probationers, parolees, and anyone else making community correction payments." Jpay tells us that families can: "Send money to your loved one in state prison, email your cousin in county jail, chat with a friend using video visitation, or give the gift of music with the JP4® player."
Initially, we were excited about the prospect of technological improvements coming to the DOC, but we forgot to consider the possibility that they could lead to another "middle man" to manage and make a profit from this new prison industry. But, this is what has evolved. Fees will be charged for JP4 players, and video visitation. We have been assured that money orders sent by the US Post Office will incur no fee, as is currently the case.
However, there will be a cost, for email the same as for a stamp, though we send emails for free in the outside world! As for other fees, donations from 1 cent-$20.00 via the Jpay website will cost $3.95, by phone $4.95; donating $20.01- $100 online will cost $6.95, by phone $7.95; donating $100-$200 online will be $8.95, by phone $9.95; $201-$300 will incur a fee of $10.95 online, $11.95 by phone. Walk-ins where funds are transferred at authorized businesses will be $7.95 no matter what amount the contribution is.
Virginia CURE will be looking into this system as it exists in some of the 30 states touted by Jpay to learn more about how this service is working. Let us know your experiences, good and/or bad with this service. Please keep your letters short and to the point, so volunteers can quickly process your information.
4
Save the day and join us at Virginia CURE's 26th Annual Meeting Focus on Mass Incarceration The Problem, The solutions
October 19, 2013
Arlington Unitarian Universalist Church 4444 Arlington Boulevard (corner Arlington Blvd. and George Mason Dr.) Arlington, VA 22204 9:00 AM - 3:00 PM, Lunch Included
Pre-registration form
Please complete one form per person and return with Check or Money Order payable to Virginia CURE to cover registration fee of $25.00 per person (includes luncheon and materials)
$10.00 for students, scholarships available You may send one check for multiple registrations.
Name_____________________________________________________________________________
Address___________________________________________________________________________
City_____________________________________________________State_______Zip __________
Home phone ________________Business phone________________Cell____________________
Email______________________________________________________________________________
Send to Virginia CURE, PO Box 2310, Vienna, VA 22183
National Trends
House of Representatives Establishes Overcriminalization Panel
The panel is a bipartisan task force that aims to pare the federal criminal code which is too complex and bloated. The committee is comprised of 5 Republicans and 5 Democrats. This is the most comprehensive examination of federal law since the 1980s. Rep. James Sensenbrenner (R-WI) leads the task force. He is expected to reintroduce a bill that would cut the size of the criminal code by a third. Rep. Bobby Scott (D-VA) expects the committee to work through consensus. "We've been warned it's going to be a working task force and it means we'll have to essentially go through the entire code," he said. It is estimated that there are 4,500 criminal statutes and thousands of regulations that carry criminal penalties. This examination is supported by groups as disparate as the ACLU, CURE and the Heritage Foundation. Everyone agrees that the law needs an overhaul. In its first hearing on overcriminalization, the House task force heard from the Heritage Foundation, the National Association of Criminal Defense Lawyers, and former Deputy Attorney General George Terwilliger. Citing the $6.6 billion budget to run federal prisons, American Bar Association president William Shepherd told a House panel that, "Incarceration has been proven to have a negative impact on future income, employment prospect, and family involvement. Reducing overcriminalization saves taxpayer money and improves the lives of all citizens."
Supreme Court Makes it Tougher to Enhance Sentences
The U.S. Supreme Court ruled that a Washington man should not have gotten a harsher penalty for a crime because a judge had investigated his previous offenses, reports the Associated Press. The 8-1 decision came in the case of a Washington state man convicted of possessing a firearm in 2005. He could have been sentenced to a decade in prison, but since he had been convicted of multiple crimes, he fell under the Armed Career Criminal Act, which requires a sentence of at least 15 years if the defendant has three prior convictions for violent felonies. The man argued that his 1978 conviction for burglary wasn't violent and didn't count. The federal judge decided to investigate the record himself and decided that it did count. The man appealed, and the Supreme Court reversed the decision.
Smarter Sentencing Act passed
After decades of "get tough" rhetoric, Republicans and Democrats in Congress are finally coming together to say "enough." The Smarter Sentencing Act, S. 1410, introduced by Senators Durbin (D-IL) and Lee (R-UT), takes two significant steps forward. First, it reduces overly harsh penalties for drug offenses and allows judges greater flexibility in sentencing. Second, it extends the more equitable crack cocaine provisions of the Fair Sentencing Act retroactively to individuals serving prison terms under the now discredited 100-to-1 sentencing disparity. While this legislation does not eliminate mandatory minimums altogether, by reducing penalties and restoring discretion to judges it will help to mitigate their harshest effects.
Around the States
South Carolina Sentencing Reform Reduces Numbers in Prison, Increases Probationers
With the South Carolina corrections department running a $27 million deficit and heading higher, a bill introduced in 2010 has instead, caused a drop in the number of prisoners by more than 2,700 resulting in closure of two prisons. Taxpayers saved $3 million in 2012 alone.
California and Eight Other States Dramatically Reduced Juvenile Incarceration
Driven by budget cuts, lawsuits and research, the state reduced the number of youths in correctional facilities by 41 percent between 2000 and 2010. California and eight others states have dramatically reduced juvenile incarceration. The others are Connecticut, Illinois, Ohio, Mississippi, New York, Texas, Washington and Wisconsin.
Indiana Law Could Clear Thousands of Criminal Records
The new law, creates a mechanism for thousands of Hoosiers who've been arrested or convicted of mostly non-violent crimes to wipe clean their criminal history if they meet certain conditions. The law spells out in detail what crimes are – and aren't – covered and how to go about getting them expunged. Legal help may be necessary in applying for the expungment as violation of the rules can carry strong penalties. Nevertheless many people convicted of relatively minor offenses will now be able to get their records expunged. Drunk driving and low level drug dealing are among the covered offenses.
5
6
Ban the Box
Ban the box, an effort to remove the "have you ever been arrested" checkbox on so many applications, has been gaining ground in the United States. The National Employment Law Project (NELP) has been a leader in the movement to restore fairness to the process of criminal background checks and remove unnecessary or badly-designed barriers to the employment of people with criminal records. They report that over 50 cities and 10 states have passed ban the box legislation. This ban is limited to public entities like city governments. In Virginia, Newport News made the change last fall, Richmond banned the box in March of 2013, and Norfolk in June. Virginia Beach is soon to follow suit.
CURE's Hampton Roads Chapter created an online petition for the Hampton Roads area which was taken to officials in several cities in 2012. Thanks go to James Bailey and the Hampton Roads chapter for their work on this issue. NELP is working nationally to enforce Title VII of the Civil Rights Act of 1964 and the Fair Credit Reporting Act to expand job opportunities for people with criminal records. The organization maintains extensive resources on the Equal Employment Opportunity Commission's guidance on the use of conviction and arrest records in employment decisions and the guidelines of the U.S. Department of Labor applying the civil rights protections to the workforce development community. If you can, check their website: www.nelp.org. There is a huge amount of information displayed there.
Recent Reports
International Growth Trends in Private Prisons
unsolicited bids for its operation by private companies in 2012, but decided not to go in that direction.
This report from the Sentencing Project examines the growth of private prisons which were begun in England in the 16 th century but took off in the US in the 1980s. Enthused by promises of quality services, efficient management and lowered costs, states turned to private prisons to save money and address overcrowding. By 2011, these prisons were being criticized for not delivering on their promises. Services were poor, costs were not lowered and criminal justice policy was negatively affected. Nevertheless, several other countries followed suit. This allowed US companies like GEO to diversify by expanding overseas.
The Potential of Community Corrections to Improve Safety and Reduce Incarceration
A report by the Vera Center on Sentencing and Corrections examines the new emphasis on Community Corrections as an alternative to imprisonment. This report summarizes what constitutes best practices in community corrections today and describes the efforts of some states to reshape their work. including factors working against reform.
Noteworthy findings in this report indicate that 11 countries now have private prisons, the greatest number of which are in English speaking countries. The prison privatization market outside the states is dominated by GEO and two British companies. Media reports from other countries describe the same abuses and that private prison companies' profit motives often lead to inadequate services and unsafe conditions. Virginia has one private prison in Lawrenceville. The VCBR( Virginia )received
The report advises that Community Corrections needs a major change in the culture that has dominated supervision agencies for at least the last 30 years, an investment in resources to enable agencies to adopt evidence-based practices, a realistic plan, a commitment to record and measure outcomes, and an understanding among the courts, legislature, and executive-branch agencies of their role in enabling supervision agencies to deliver on public safety expectations.
A NOTE ABOUT LETTERS TO VIRGINIA CURE
While Virginia CURE cares about your concerns and appreciates being kept informed, we don't have a volunteer staff large enough to reply promptly to all letters received .Please, keep it short and to the point. Do not send legal papers. We do not have the capacity to deal with legal issues. Send mail to P.O. Box 2310, Vienna, VA 22183
CURE Chapters
Northern Virginia CURE Carla Peterson [email protected] 3rd Thursday, 7:30 PM Walter Reed Community Center 2909 16th St S
Arlington, VA 22204
Richmond CURE
Al Simmons
[email protected]
4th Sunday, 1 :00 PM
Friends Meeting House
4500 Kensington Ave
Richmond VA 23221
Hampton Roads CURE James Bailey [email protected] 3rd Tuesday, 7:00 PM Norview Baptist Church 1127 Norview Ave. Norfolk VA 23513
WE NEED YOUR EMAIL ADDRESS!
If you have an email address and are not receiving updates from Virginia CURE, please send a message to [email protected]. (vacure one)
Book Reviews:
RACE TO INCARCERATE: A GRAPHIC RETELLING
Marc Mauer's Race to Incarcerate, first published in 1999, has become an essential text for understanding the exponential growth of the U.S. prison system and a canonical work for those active in the U.S. criminal justice reform movement. Jonathan Kozol, the writer and education activist, called it: "A tremendously disturbing and important book about the devastating increase in our prison population...Now, graphic artist Sabrina Jones has collaborated with Mauer ...to produce a vivid and engaging comics narrative. Jones's dramatic artwork adds passion and compassion to the complex story of four decades of prison expansion and its corrosive effect on generations of Americans and the implications for American democracy. Race to Incarcerate: A Graphic Retelling , in this highly accessible format, chronicles the lives of those imprisoned and the fallout from a failed social policy. With more than two million people now imprisoned, this book is more essential than ever. The book is published by The New Press and available from its catalogue and national booksellers.
Board of Directors Issue Representatives 2013
Jean Auldridge
Alexandria
Juvenile Justice
Frances Boatman
Roanoke
James Bailey
Norfolk
Sandra Brandt
Norfolk
Pamela Carpenter
Barren Springs
Eileen Grey
Alexandria
Christa Pierpont
Charlottesville
Al Simmons
Richmond
Mary Anne Stone,
Vice Chairman
Richmond
Reverend William B. Twine,
Chairman
Norfolk
Eileen Grey
Restorative Justice
Christa Pierpont
Children with An
Incarcerated Parent
Gina Hudson
Prison Industries
Tom Petersik
Newsletter Editor
Crystal Davidson
Have You Renewed Your Membership?
Please see membership form on back page.
We can't do this without you.
Citizens United for Rehabilitation of Errants– Virginia, Inc.
Virginia CURE
P.O. Box2310
Vienna, Virginia, 22183
Virginia CURE web site www.vacure.org Join our newsgroup [email protected]
Today’s prisoners
are tomorrow’s neighbors
Member
Citizens United for the Rehabilitation of Errants– National, Inc.
Are you a Member of Virginia CURE?
Use form for new memberships or to renew your membership for
Membership in Virginia CURE
Join Virginia CURE today and become a part of the effort to work for criminal justice reform and safety in our communities. Send dues payment to:
Virginia CURE, P.O. Box 2310, Vienna, Virginia 22183
name
address
street/or p.o.
city
state
zip
e-mail
prisoner birthday
phone day
(
)
evening
()
fax
()
Involvement:
¦prisoner
¦family
¦friend
¦professional
¦volunteer
other
Institution
apt.
please specify
Dues are payable January 1 on a yearly,non-prorated basis for current year. Prisoner members need to include state number on all communications to CURE.
Remember to send address changes.
Check type of membership
¦Prisoner*
$102.00
¦Individual
¦Family
$ $
215.00
125.00
¦Sustaining
$150.00
¦Organization $100.00
¦Life
$100.00
¦Renewal
Please make checks payable to Virginia CURE. Contributions are tax deductible under the provisions of 501(c)(3), Internal Revenue Code.
*
Prisoners may send five stamps.
Please feel free to reproduce
Non-Profit Org. U.S. Postage PAID Merrifield VA Permit No. 6221
|
<urn:uuid:0072f525-fc49-4b17-88ef-2965e6f5842b>
|
CC-MAIN-2018-26
|
http://virginiacure.weebly.com/uploads/2/0/8/8/20882986/insideout_2013_summer.pdf
|
2018-06-24T04:49:13Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866358.52/warc/CC-MAIN-20180624044127-20180624064127-00593.warc.gz
| 347,599,934
| 5,451
|
eng_Latn
|
eng_Latn
| 0.987536
|
eng_Latn
| 0.998495
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3746,
7705,
12461,
13542,
18135,
22230,
24606,
26109
] |
Summer 2013
Highlights
Page 1: FCC Bars High Rates For Long Distance Phone Calls
Page 2: New Parole Law
Page 3: DOC contracts with Jpay
Page 4: Virginia CURE Annual Meeting
Page 5: National News
Directors Corner
It is a beautiful dry, sunny day as I write this note, but many CURE families can't help thinking of their family members housed in non air-conditioned facilities and suffering through this summer in terrible heat. We have expressed concern in the past about the warming temperatures and lack of air- conditioning in some of our prisons. Now, Greensville Correctional Center is being retrofitted with air- conditioning and
DOC may soon be opening the air-conditioned North River facility. We urge the state to continue this retrofitting in those prisons left without. Better still, let's release more folks and close more prisons! This summer I spoke of these and other concerns at a presentation in St. Mary of Sorrows church in Fairfax. This church has been a strong supporter of CURE's work. I also spoke at a meeting of the Alexandria NAACP. I was interviewed by the Fairfax County Times and a Charlottesville radio station. CURE member Marcia Dickinson (Richmond Chapter) had her letter against solitary confinement published in the Washington Post!. We continue meeting with the Justice Policy Institute Coalition of criminal justice reform organizations to further identify passable legislation for 2014. Planning is also underway for our 26th Annual Meeting on October 19th. . Carla
FCC Bars High Rates For Long Distance Phone Calls In Jails And Prisons Nationwide
An FCC workshop on the cost of prison phone rates was held in Washington on July 10. Panel members included CURE's own Charlie Sullivan, founder of National CURE and Delegate Patrick Hope (D-47) from Arlington. The panel addressed a number of concerns all too familiar to prisoners and their families. The report generated by this workshop was voted on at an August 10 meeting. By a 2 to 1 margin, the report with its recommendations was accepted! The Commission's reforms adopt "a simple and balanced approach that protects security and public safety needs, ensures providers receive fair compensation while providing reasonable rates to consumers" as follows:
"o Requires that all interstate inmate calling rates, including ancillary charges, be based on the cost of providing the inmate calling service. Provides immediate relief to exorbitant rates:
o Adopts an interim rate cap of $0.21 per minute for debit and pre-paid calls and $0.25 per minute for collect calls, dramatically decreasing rates of over $17 for a 15-minute call to no more than $3.75 or $3.15 a call
o Presumes that rates of $0.12 per minute for debit and prepaid calls ($1.80 for a 15-minute call) and $0.14 cents per minute for collect calls ($2.10 for a 15-minute call) are just, reasonable and cost-based."
Concludes that "site commissions", payments from providers to correctional facilities, may not be included in any interstate rate or charge; clarifies that inmates or their loved ones who use Telecommunications Relay Services because of hearing and speech disabilities may not be charged higher rates. Requires a mandatory data collection, annual certification requirement, and enforcement provisions to ensure compliance with this Order. Seeks comment on reforming rates and practices affecting calls within a state.
The DOC has contacted the attorney for the FCC and currently awaits the formal order that will explain what will be required of the states to realize the mandate. After receiving the order, the state will issue a memorandum for action. The order should come "soon". We will have more information in the next newsletter.
UPDATE ON NEW PAROLE REFORM LAW
Bill Richardson
As we have previously reported, effective July 1, 2013, the Virginia Code has been amended to reflect enactment of House Bill 2103 earlier this year. Introduced by Delegate Mark Sickles and supported by Virginia CURE, this bill amends the powers and duties of the Virginia Parole Board to require that the Board:
"Ensure that each person eligible for parole receives a timely and thorough review of his suitability for release on parole, including a review of any relevant post-sentencing information. If parole is denied, the basis for the denial of parole shall be in writing and shall give specific reasons for such denial to such inmate."
This bill was intended to address the Board's longstanding practice of denying parole based solely on a form letter listing standard reasons, such as "serious nature and circumstances of your offense," or "risk to the community."
Virginia CURE has met with the Chair and Vice Chair of the Parole Board to discuss how best to implement the new statute. Given the large number of candidates still eligible for parole every year, and the Board's limited staff, they believe that some reliance on standard forms is necessary. On the other hand, we emphasized the need for providing more "specific reasons" for parole denial, particularly in the case of those inmates who have served many years with model institutional records. According to the Virginia Criminal Sentencing Commission, for example, there are likely many hundreds of inmates who have already served longer under the "old" parole law than they would have served under the "new" post-1994 sentencing guidelines for the same offense.
We hope that the Board's implementation of the new statute will reflect some greater effort to provide the "thorough review of . . . suitability for release on parole," and "specific reasons for denial," contemplated by the General Assembly. We will keep you posted. Meanwhile, we would appreciate receiving any information about the Board's approach after July 1, 2013, including copies of parole denial letters.
We encourage family members to take advantage of your right to meet with a Parole Board member when inmates come up for parole. While parole grant rates continue to be very low, such meetings can demonstrate to the Parole Board that inmates continue to have the support of their families. At our meeting, Parole Board Chair Bill Muse asked us to inform Virginia CURE members of three changes the Board is making to its parole procedures.
First, family members (or other representatives) of candidates for parole may now meet with a Board member annually, rather than only every two years as before. Second, Board members are now trying to arrange to have these meetings in more convenient regional locations, so that you may not have to travel to Richmond. Finally, the Board is exploring the idea of meeting personally with those inmates eligible for geriatric release (generally those who have reached the age of 60 and have served at least five years, or those who have reached the age of 65 and have served at least ten years), since many are located in the same facilities (e.g., Deerfield or Greensville).
Please let us know if you would like more information about how to arrange to meet with a Parole Board member on behalf of an inmate who is coming up for parole consideration. Among the factors the Board would consider relevant at such a meeting would be an inmate's conduct, employment, education, vocational training, and other developmental activities during incarceration; recommendations from the court, the prosecuting attorney, or corrections officials; family history, education, employment and military experience; physical and mental health; changes in motivation and behavior while incarcerated; and availability of a suitable release plan (including residence and employment prospects).
Parole Grant Rates 2012-2013
Virginia News
Fairfax County Sheriff's Office made half a million dollars from inmate phone calls in 2011 phone services According to records obtained from the office's financial services branch in 2011 — the last year for which figures are available — the Sheriff's Office brought in $612,000 in gross telephone receipts from its inmate telephone services program, which sells prisoners prepaid phone cards in $10 or $20 increments. Prisoners can be charged as much as $5.31 for the first minute of a collect, or prepaid call made to an out-of-state phone number. Each additional minute is charged at a rate of 89 cents. This, according to advocates, is a higher rate than in any other facility in the country! Expenses for the phone system were $41,190, so the net revenue was $571,218.63. That figure represents a 93 percent commission rate, possibly the highest in the country. "The profits from the program go to support the infrastructure of the jail." the Sheriff informs us. The contractor for this state authorized program is IC Solutions.
Department of Juvenile Justice Studies Juvenile Facilities Needs
Virginia CURE Juvenile justice advocates attended a meeting this August presented by contractors hired by the Department of Juvenile Justice (DJJ) to assess the needs of facilities for young prisoners. Earlier this year the DJJ announced that it would build a new large facility to house juveniles. There was a strong reaction from advocates who had the newest data concluding that juveniles were best served in small facilities or in Community Corrections. The DJJ decided to study the actual needs for facilities in light of new trends. Advocates came away from this meeting feeling that this will be an honest look at needs. The team includes a number of professionals who will be dealing with various aspects of administering juvenile justice including architects and program specialists.
Warden Changed at Buckingham and Dillwyn
As of August 25, 2013, Dillwyn and Buckingham Correctional Centers exchanged Wardens. Dillwyn Warden Barksdale has replaced Warden Edmonds at Buckingham, and Edmonds took over at Dillwyn on Aug 28. Edmonds has risen through the administrative ranks of the VA DOC prison system, while Barksdale has risen to the top through security. Edmonds is known as a rehabilitation warden, whereas Barksdale is very security minded. This is good news for Dillwyn, as this security level 2 facility is an Intensive re-entry location for southwest and central Virginia.
DOC contracts with Jpay to provide communication and financial services
Jpay is the corporation that is providing the kiosks we have spoken about in past newsletters. Families can access Jpay services via their secure Internet web page. Jpay describes itself as being " committed to helping friends and family of inmates stay connected to their incarcerated loved ones through a variety of corrections-related services offered in more than 30 states across the country, as well as to providing the quickest and most reliable payment options for individuals in community corrections." They have been in business for 9 years and are "The one-stop shop for probationers, parolees, and anyone else making community correction payments." Jpay tells us that families can: "Send money to your loved one in state prison, email your cousin in county jail, chat with a friend using video visitation, or give the gift of music with the JP4® player."
Initially, we were excited about the prospect of technological improvements coming to the DOC, but we forgot to consider the possibility that they could lead to another "middle man" to manage and make a profit from this new prison industry. But, this is what has evolved. Fees will be charged for JP4 players, and video visitation. We have been assured that money orders sent by the US Post Office will incur no fee, as is currently the case.
However, there will be a cost, for email the same as for a stamp, though we send emails for free in the outside world! As for other fees, donations from 1 cent-$20.00 via the Jpay website will cost $3.95, by phone $4.95; donating $20.01- $100 online will cost $6.95, by phone $7.95; donating $100-$200 online will be $8.95, by phone $9.95; $201-$300 will incur a fee of $10.95 online, $11.95 by phone. Walk-ins where funds are transferred at authorized businesses will be $7.95 no matter what amount the contribution is.
Virginia CURE will be looking into this system as it exists in some of the 30 states touted by Jpay to learn more about how this service is working. Let us know your experiences, good and/or bad with this service. Please keep your letters short and to the point, so volunteers can quickly process your information.
4
Save the day and join us at Virginia CURE's 26th Annual Meeting Focus on Mass Incarceration The Problem, The solutions
October 19, 2013
Arlington Unitarian Universalist Church 4444 Arlington Boulevard (corner Arlington Blvd. and George Mason Dr.) Arlington, VA 22204 9:00 AM - 3:00 PM, Lunch Included
Pre-registration form
Please complete one form per person and return with Check or Money Order payable to Virginia CURE to cover registration fee of $25.00 per person (includes luncheon and materials)
$10.00 for students, scholarships available You may send one check for multiple registrations.
Name_____________________________________________________________________________
Address___________________________________________________________________________
City_____________________________________________________State_______Zip __________
Home phone ________________Business phone________________Cell____________________
Email______________________________________________________________________________
Send to Virginia CURE, PO Box 2310, Vienna, VA 22183
National Trends
House of Representatives Establishes Overcriminalization Panel
The panel is a bipartisan task force that aims to pare the federal criminal code which is too complex and bloated. The committee is comprised of 5 Republicans and 5 Democrats. This is the most comprehensive examination of federal law since the 1980s. Rep. James Sensenbrenner (R-WI) leads the task force. He is expected to reintroduce a bill that would cut the size of the criminal code by a third. Rep. Bobby Scott (D-VA) expects the committee to work through consensus. "We've been warned it's going to be a working task force and it means we'll have to essentially go through the entire code," he said. It is estimated that there are 4,500 criminal statutes and thousands of regulations that carry criminal penalties. This examination is supported by groups as disparate as the ACLU, CURE and the Heritage Foundation. Everyone agrees that the law needs an overhaul. In its first hearing on overcriminalization, the House task force heard from the Heritage Foundation, the National Association of Criminal Defense Lawyers, and former Deputy Attorney General George Terwilliger. Citing the $6.6 billion budget to run federal prisons, American Bar Association president William Shepherd told a House panel that, "Incarceration has been proven to have a negative impact on future income, employment prospect, and family involvement. Reducing overcriminalization saves taxpayer money and improves the lives of all citizens."
Supreme Court Makes it Tougher to Enhance Sentences
The U.S. Supreme Court ruled that a Washington man should not have gotten a harsher penalty for a crime because a judge had investigated his previous offenses, reports the Associated Press. The 8-1 decision came in the case of a Washington state man convicted of possessing a firearm in 2005. He could have been sentenced to a decade in prison, but since he had been convicted of multiple crimes, he fell under the Armed Career Criminal Act, which requires a sentence of at least 15 years if the defendant has three prior convictions for violent felonies. The man argued that his 1978 conviction for burglary wasn't violent and didn't count. The federal judge decided to investigate the record himself and decided that it did count. The man appealed, and the Supreme Court reversed the decision.
Smarter Sentencing Act passed
After decades of "get tough" rhetoric, Republicans and Democrats in Congress are finally coming together to say "enough." The Smarter Sentencing Act, S.
|
1410, introduced by Senators Durbin (D-IL) and Lee (R-UT), takes two significant steps forward.
| 16,091
|
end_of_word
|
S.
|
remove_all
|
<url>
http://virginiacure.weebly.com/uploads/2/0/8/8/20882986/insideout_2013_summer.pdf
</url>
<text>
Summer 2013
Highlights
Page 1: FCC Bars High Rates For Long Distance Phone Calls
Page 2: New Parole Law
Page 3: DOC contracts with Jpay
Page 4: Virginia CURE Annual Meeting
Page 5: National News
Directors Corner
It is a beautiful dry, sunny day as I write this note, but many CURE families can't help thinking of their family members housed in non air-conditioned facilities and suffering through this summer in terrible heat. We have expressed concern in the past about the warming temperatures and lack of air- conditioning in some of our prisons. Now, Greensville Correctional Center is being retrofitted with air- conditioning and
DOC may soon be opening the air-conditioned North River facility. We urge the state to continue this retrofitting in those prisons left without. Better still, let's release more folks and close more prisons! This summer I spoke of these and other concerns at a presentation in St. Mary of Sorrows church in Fairfax. This church has been a strong supporter of CURE's work. I also spoke at a meeting of the Alexandria NAACP. I was interviewed by the Fairfax County Times and a Charlottesville radio station. CURE member Marcia Dickinson (Richmond Chapter) had her letter against solitary confinement published in the Washington Post!. We continue meeting with the Justice Policy Institute Coalition of criminal justice reform organizations to further identify passable legislation for 2014. Planning is also underway for our 26th Annual Meeting on October 19th. . Carla
FCC Bars High Rates For Long Distance Phone Calls In Jails And Prisons Nationwide
An FCC workshop on the cost of prison phone rates was held in Washington on July 10. Panel members included CURE's own Charlie Sullivan, founder of National CURE and Delegate Patrick Hope (D-47) from Arlington. The panel addressed a number of concerns all too familiar to prisoners and their families. The report generated by this workshop was voted on at an August 10 meeting. By a 2 to 1 margin, the report with its recommendations was accepted! The Commission's reforms adopt "a simple and balanced approach that protects security and public safety needs, ensures providers receive fair compensation while providing reasonable rates to consumers" as follows:
"o Requires that all interstate inmate calling rates, including ancillary charges, be based on the cost of providing the inmate calling service. Provides immediate relief to exorbitant rates:
o Adopts an interim rate cap of $0.21 per minute for debit and pre-paid calls and $0.25 per minute for collect calls, dramatically decreasing rates of over $17 for a 15-minute call to no more than $3.75 or $3.15 a call
o Presumes that rates of $0.12 per minute for debit and prepaid calls ($1.80 for a 15-minute call) and $0.14 cents per minute for collect calls ($2.10 for a 15-minute call) are just, reasonable and cost-based."
Concludes that "site commissions", payments from providers to correctional facilities, may not be included in any interstate rate or charge; clarifies that inmates or their loved ones who use Telecommunications Relay Services because of hearing and speech disabilities may not be charged higher rates. Requires a mandatory data collection, annual certification requirement, and enforcement provisions to ensure compliance with this Order. Seeks comment on reforming rates and practices affecting calls within a state.
The DOC has contacted the attorney for the FCC and currently awaits the formal order that will explain what will be required of the states to realize the mandate. After receiving the order, the state will issue a memorandum for action. The order should come "soon". We will have more information in the next newsletter.
UPDATE ON NEW PAROLE REFORM LAW
Bill Richardson
As we have previously reported, effective July 1, 2013, the Virginia Code has been amended to reflect enactment of House Bill 2103 earlier this year. Introduced by Delegate Mark Sickles and supported by Virginia CURE, this bill amends the powers and duties of the Virginia Parole Board to require that the Board:
"Ensure that each person eligible for parole receives a timely and thorough review of his suitability for release on parole, including a review of any relevant post-sentencing information. If parole is denied, the basis for the denial of parole shall be in writing and shall give specific reasons for such denial to such inmate."
This bill was intended to address the Board's longstanding practice of denying parole based solely on a form letter listing standard reasons, such as "serious nature and circumstances of your offense," or "risk to the community."
Virginia CURE has met with the Chair and Vice Chair of the Parole Board to discuss how best to implement the new statute. Given the large number of candidates still eligible for parole every year, and the Board's limited staff, they believe that some reliance on standard forms is necessary. On the other hand, we emphasized the need for providing more "specific reasons" for parole denial, particularly in the case of those inmates who have served many years with model institutional records. According to the Virginia Criminal Sentencing Commission, for example, there are likely many hundreds of inmates who have already served longer under the "old" parole law than they would have served under the "new" post-1994 sentencing guidelines for the same offense.
We hope that the Board's implementation of the new statute will reflect some greater effort to provide the "thorough review of . . . suitability for release on parole," and "specific reasons for denial," contemplated by the General Assembly. We will keep you posted. Meanwhile, we would appreciate receiving any information about the Board's approach after July 1, 2013, including copies of parole denial letters.
We encourage family members to take advantage of your right to meet with a Parole Board member when inmates come up for parole. While parole grant rates continue to be very low, such meetings can demonstrate to the Parole Board that inmates continue to have the support of their families. At our meeting, Parole Board Chair Bill Muse asked us to inform Virginia CURE members of three changes the Board is making to its parole procedures.
First, family members (or other representatives) of candidates for parole may now meet with a Board member annually, rather than only every two years as before. Second, Board members are now trying to arrange to have these meetings in more convenient regional locations, so that you may not have to travel to Richmond. Finally, the Board is exploring the idea of meeting personally with those inmates eligible for geriatric release (generally those who have reached the age of 60 and have served at least five years, or those who have reached the age of 65 and have served at least ten years), since many are located in the same facilities (e.g., Deerfield or Greensville).
Please let us know if you would like more information about how to arrange to meet with a Parole Board member on behalf of an inmate who is coming up for parole consideration. Among the factors the Board would consider relevant at such a meeting would be an inmate's conduct, employment, education, vocational training, and other developmental activities during incarceration; recommendations from the court, the prosecuting attorney, or corrections officials; family history, education, employment and military experience; physical and mental health; changes in motivation and behavior while incarcerated; and availability of a suitable release plan (including residence and employment prospects).
Parole Grant Rates 2012-2013
Virginia News
Fairfax County Sheriff's Office made half a million dollars from inmate phone calls in 2011 phone services According to records obtained from the office's financial services branch in 2011 — the last year for which figures are available — the Sheriff's Office brought in $612,000 in gross telephone receipts from its inmate telephone services program, which sells prisoners prepaid phone cards in $10 or $20 increments. Prisoners can be charged as much as $5.31 for the first minute of a collect, or prepaid call made to an out-of-state phone number. Each additional minute is charged at a rate of 89 cents. This, according to advocates, is a higher rate than in any other facility in the country! Expenses for the phone system were $41,190, so the net revenue was $571,218.63. That figure represents a 93 percent commission rate, possibly the highest in the country. "The profits from the program go to support the infrastructure of the jail." the Sheriff informs us. The contractor for this state authorized program is IC Solutions.
Department of Juvenile Justice Studies Juvenile Facilities Needs
Virginia CURE Juvenile justice advocates attended a meeting this August presented by contractors hired by the Department of Juvenile Justice (DJJ) to assess the needs of facilities for young prisoners. Earlier this year the DJJ announced that it would build a new large facility to house juveniles. There was a strong reaction from advocates who had the newest data concluding that juveniles were best served in small facilities or in Community Corrections. The DJJ decided to study the actual needs for facilities in light of new trends. Advocates came away from this meeting feeling that this will be an honest look at needs. The team includes a number of professionals who will be dealing with various aspects of administering juvenile justice including architects and program specialists.
Warden Changed at Buckingham and Dillwyn
As of August 25, 2013, Dillwyn and Buckingham Correctional Centers exchanged Wardens. Dillwyn Warden Barksdale has replaced Warden Edmonds at Buckingham, and Edmonds took over at Dillwyn on Aug 28. Edmonds has risen through the administrative ranks of the VA DOC prison system, while Barksdale has risen to the top through security. Edmonds is known as a rehabilitation warden, whereas Barksdale is very security minded. This is good news for Dillwyn, as this security level 2 facility is an Intensive re-entry location for southwest and central Virginia.
DOC contracts with Jpay to provide communication and financial services
Jpay is the corporation that is providing the kiosks we have spoken about in past newsletters. Families can access Jpay services via their secure Internet web page. Jpay describes itself as being " committed to helping friends and family of inmates stay connected to their incarcerated loved ones through a variety of corrections-related services offered in more than 30 states across the country, as well as to providing the quickest and most reliable payment options for individuals in community corrections." They have been in business for 9 years and are "The one-stop shop for probationers, parolees, and anyone else making community correction payments." Jpay tells us that families can: "Send money to your loved one in state prison, email your cousin in county jail, chat with a friend using video visitation, or give the gift of music with the JP4® player."
Initially, we were excited about the prospect of technological improvements coming to the DOC, but we forgot to consider the possibility that they could lead to another "middle man" to manage and make a profit from this new prison industry. But, this is what has evolved. Fees will be charged for JP4 players, and video visitation. We have been assured that money orders sent by the US Post Office will incur no fee, as is currently the case.
However, there will be a cost, for email the same as for a stamp, though we send emails for free in the outside world! As for other fees, donations from 1 cent-$20.00 via the Jpay website will cost $3.95, by phone $4.95; donating $20.01- $100 online will cost $6.95, by phone $7.95; donating $100-$200 online will be $8.95, by phone $9.95; $201-$300 will incur a fee of $10.95 online, $11.95 by phone. Walk-ins where funds are transferred at authorized businesses will be $7.95 no matter what amount the contribution is.
Virginia CURE will be looking into this system as it exists in some of the 30 states touted by Jpay to learn more about how this service is working. Let us know your experiences, good and/or bad with this service. Please keep your letters short and to the point, so volunteers can quickly process your information.
4
Save the day and join us at Virginia CURE's 26th Annual Meeting Focus on Mass Incarceration The Problem, The solutions
October 19, 2013
Arlington Unitarian Universalist Church 4444 Arlington Boulevard (corner Arlington Blvd. and George Mason Dr.) Arlington, VA 22204 9:00 AM - 3:00 PM, Lunch Included
Pre-registration form
Please complete one form per person and return with Check or Money Order payable to Virginia CURE to cover registration fee of $25.00 per person (includes luncheon and materials)
$10.00 for students, scholarships available You may send one check for multiple registrations.
Name_____________________________________________________________________________
Address___________________________________________________________________________
City_____________________________________________________State_______Zip __________
Home phone ________________Business phone________________Cell____________________
Email______________________________________________________________________________
Send to Virginia CURE, PO Box 2310, Vienna, VA 22183
National Trends
House of Representatives Establishes Overcriminalization Panel
The panel is a bipartisan task force that aims to pare the federal criminal code which is too complex and bloated. The committee is comprised of 5 Republicans and 5 Democrats. This is the most comprehensive examination of federal law since the 1980s. Rep. James Sensenbrenner (R-WI) leads the task force. He is expected to reintroduce a bill that would cut the size of the criminal code by a third. Rep. Bobby Scott (D-VA) expects the committee to work through consensus. "We've been warned it's going to be a working task force and it means we'll have to essentially go through the entire code," he said. It is estimated that there are 4,500 criminal statutes and thousands of regulations that carry criminal penalties. This examination is supported by groups as disparate as the ACLU, CURE and the Heritage Foundation. Everyone agrees that the law needs an overhaul. In its first hearing on overcriminalization, the House task force heard from the Heritage Foundation, the National Association of Criminal Defense Lawyers, and former Deputy Attorney General George Terwilliger. Citing the $6.6 billion budget to run federal prisons, American Bar Association president William Shepherd told a House panel that, "Incarceration has been proven to have a negative impact on future income, employment prospect, and family involvement. Reducing overcriminalization saves taxpayer money and improves the lives of all citizens."
Supreme Court Makes it Tougher to Enhance Sentences
The U.S. Supreme Court ruled that a Washington man should not have gotten a harsher penalty for a crime because a judge had investigated his previous offenses, reports the Associated Press. The 8-1 decision came in the case of a Washington state man convicted of possessing a firearm in 2005. He could have been sentenced to a decade in prison, but since he had been convicted of multiple crimes, he fell under the Armed Career Criminal Act, which requires a sentence of at least 15 years if the defendant has three prior convictions for violent felonies. The man argued that his 1978 conviction for burglary wasn't violent and didn't count. The federal judge decided to investigate the record himself and decided that it did count. The man appealed, and the Supreme Court reversed the decision.
Smarter Sentencing Act passed
After decades of "get tough" rhetoric, Republicans and Democrats in Congress are finally coming together to say "enough." The Smarter Sentencing Act, S.<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://virginiacure.weebly.com/uploads/2/0/8/8/20882986/insideout_2013_summer.pdf\n</url>\n<text>\nSummer 2013\n\nHighlights\n\nPage 1: FCC Bars High Rates For Long Distance Phone Calls\n\nPage 2: New Parole Law\n\nPage 3: DOC contracts with Jpay\n\nPage 4: Virginia CURE Annual Meeting\n\nPage 5: National News\n\nDirectors Corner\n\nIt is a beautiful dry, sunny day as I write this note, but many CURE families can't help thinking of their family members housed in non air-conditioned facilities and suffering through this summer in terrible heat. We have expressed concern in the past about the warming temperatures and lack of air- conditioning in some of our prisons. Now, Greensville Correctional Center is being retrofitted with air- conditioning and\n\nDOC may soon be opening the air-conditioned North River facility. We urge the state to continue this retrofitting in those prisons left without. Better still, let's release more folks and close more prisons! This summer I spoke of these and other concerns at a presentation in St. Mary of Sorrows church in Fairfax. This church has been a strong supporter of CURE's work. I also spoke at a meeting of the Alexandria NAACP. I was interviewed by the Fairfax County Times and a Charlottesville radio station. CURE member Marcia Dickinson (Richmond Chapter) had her letter against solitary confinement published in the Washington Post!. We continue meeting with the Justice Policy Institute Coalition of criminal justice reform organizations to further identify passable legislation for 2014. Planning is also underway for our 26th Annual Meeting on October 19th. . Carla\n\nFCC Bars High Rates For Long Distance Phone Calls In Jails And Prisons Nationwide\n\nAn FCC workshop on the cost of prison phone rates was held in Washington on July 10. Panel members included CURE's own Charlie Sullivan, founder of National CURE and Delegate Patrick Hope (D-47) from Arlington. The panel addressed a number of concerns all too familiar to prisoners and their families. The report generated by this workshop was voted on at an August 10 meeting. By a 2 to 1 margin, the report with its recommendations was accepted! The Commission's reforms adopt \"a simple and balanced approach that protects security and public safety needs, ensures providers receive fair compensation while providing reasonable rates to consumers\" as follows:\n\n\"o Requires that all interstate inmate calling rates, including ancillary charges, be based on the cost of providing the inmate calling service. Provides immediate relief to exorbitant rates:\n\no Adopts an interim rate cap of $0.21 per minute for debit and pre-paid calls and $0.25 per minute for collect calls, dramatically decreasing rates of over $17 for a 15-minute call to no more than $3.75 or $3.15 a call\no Presumes that rates of $0.12 per minute for debit and prepaid calls ($1.80 for a 15-minute call) and $0.14 cents per minute for collect calls ($2.10 for a 15-minute call) are just, reasonable and cost-based.\"\n\nConcludes that \"site commissions\", payments from providers to correctional facilities, may not be included in any interstate rate or charge; clarifies that inmates or their loved ones who use Telecommunications Relay Services because of hearing and speech disabilities may not be charged higher rates. Requires a mandatory data collection, annual certification requirement, and enforcement provisions to ensure compliance with this Order. Seeks comment on reforming rates and practices affecting calls within a state.\n\nThe DOC has contacted the attorney for the FCC and currently awaits the formal order that will explain what will be required of the states to realize the mandate. After receiving the order, the state will issue a memorandum for action. The order should come \"soon\". We will have more information in the next newsletter.\n\nUPDATE ON NEW PAROLE REFORM LAW\n\nBill Richardson\n\nAs we have previously reported, effective July 1, 2013, the Virginia Code has been amended to reflect enactment of House Bill 2103 earlier this year. Introduced by Delegate Mark Sickles and supported by Virginia CURE, this bill amends the powers and duties of the Virginia Parole Board to require that the Board:\n\n\"Ensure that each person eligible for parole receives a timely and thorough review of his suitability for release on parole, including a review of any relevant post-sentencing information. If parole is denied, the basis for the denial of parole shall be in writing and shall give specific reasons for such denial to such inmate.\"\n\nThis bill was intended to address the Board's longstanding practice of denying parole based solely on a form letter listing standard reasons, such as \"serious nature and circumstances of your offense,\" or \"risk to the community.\"\n\nVirginia CURE has met with the Chair and Vice Chair of the Parole Board to discuss how best to implement the new statute. Given the large number of candidates still eligible for parole every year, and the Board's limited staff, they believe that some reliance on standard forms is necessary. On the other hand, we emphasized the need for providing more \"specific reasons\" for parole denial, particularly in the case of those inmates who have served many years with model institutional records. According to the Virginia Criminal Sentencing Commission, for example, there are likely many hundreds of inmates who have already served longer under the \"old\" parole law than they would have served under the \"new\" post-1994 sentencing guidelines for the same offense.\n\nWe hope that the Board's implementation of the new statute will reflect some greater effort to provide the \"thorough review of . . . suitability for release on parole,\" and \"specific reasons for denial,\" contemplated by the General Assembly. We will keep you posted. Meanwhile, we would appreciate receiving any information about the Board's approach after July 1, 2013, including copies of parole denial letters.\n\nWe encourage family members to take advantage of your right to meet with a Parole Board member when inmates come up for parole. While parole grant rates continue to be very low, such meetings can demonstrate to the Parole Board that inmates continue to have the support of their families. At our meeting, Parole Board Chair Bill Muse asked us to inform Virginia CURE members of three changes the Board is making to its parole procedures.\n\nFirst, family members (or other representatives) of candidates for parole may now meet with a Board member annually, rather than only every two years as before. Second, Board members are now trying to arrange to have these meetings in more convenient regional locations, so that you may not have to travel to Richmond. Finally, the Board is exploring the idea of meeting personally with those inmates eligible for geriatric release (generally those who have reached the age of 60 and have served at least five years, or those who have reached the age of 65 and have served at least ten years), since many are located in the same facilities (e.g., Deerfield or Greensville).\n\nPlease let us know if you would like more information about how to arrange to meet with a Parole Board member on behalf of an inmate who is coming up for parole consideration. Among the factors the Board would consider relevant at such a meeting would be an inmate's conduct, employment, education, vocational training, and other developmental activities during incarceration; recommendations from the court, the prosecuting attorney, or corrections officials; family history, education, employment and military experience; physical and mental health; changes in motivation and behavior while incarcerated; and availability of a suitable release plan (including residence and employment prospects).\n\nParole Grant Rates 2012-2013\n\nVirginia News\n\nFairfax County Sheriff's Office made half a million dollars from inmate phone calls in 2011 phone services According to records obtained from the office's financial services branch in 2011 — the last year for which figures are available — the Sheriff's Office brought in $612,000 in gross telephone receipts from its inmate telephone services program, which sells prisoners prepaid phone cards in $10 or $20 increments. Prisoners can be charged as much as $5.31 for the first minute of a collect, or prepaid call made to an out-of-state phone number. Each additional minute is charged at a rate of 89 cents. This, according to advocates, is a higher rate than in any other facility in the country! Expenses for the phone system were $41,190, so the net revenue was $571,218.63. That figure represents a 93 percent commission rate, possibly the highest in the country. \"The profits from the program go to support the infrastructure of the jail.\" the Sheriff informs us. The contractor for this state authorized program is IC Solutions.\n\nDepartment of Juvenile Justice Studies Juvenile Facilities Needs\n\nVirginia CURE Juvenile justice advocates attended a meeting this August presented by contractors hired by the Department of Juvenile Justice (DJJ) to assess the needs of facilities for young prisoners. Earlier this year the DJJ announced that it would build a new large facility to house juveniles. There was a strong reaction from advocates who had the newest data concluding that juveniles were best served in small facilities or in Community Corrections. The DJJ decided to study the actual needs for facilities in light of new trends. Advocates came away from this meeting feeling that this will be an honest look at needs. The team includes a number of professionals who will be dealing with various aspects of administering juvenile justice including architects and program specialists.\n\nWarden Changed at Buckingham and Dillwyn\n\nAs of August 25, 2013, Dillwyn and Buckingham Correctional Centers exchanged Wardens. Dillwyn Warden Barksdale has replaced Warden Edmonds at Buckingham, and Edmonds took over at Dillwyn on Aug 28. Edmonds has risen through the administrative ranks of the VA DOC prison system, while Barksdale has risen to the top through security. Edmonds is known as a rehabilitation warden, whereas Barksdale is very security minded. This is good news for Dillwyn, as this security level 2 facility is an Intensive re-entry location for southwest and central Virginia.\n\nDOC contracts with Jpay to provide communication and financial services\n\nJpay is the corporation that is providing the kiosks we have spoken about in past newsletters. Families can access Jpay services via their secure Internet web page. Jpay describes itself as being \" committed to helping friends and family of inmates stay connected to their incarcerated loved ones through a variety of corrections-related services offered in more than 30 states across the country, as well as to providing the quickest and most reliable payment options for individuals in community corrections.\" They have been in business for 9 years and are \"The one-stop shop for probationers, parolees, and anyone else making community correction payments.\" Jpay tells us that families can: \"Send money to your loved one in state prison, email your cousin in county jail, chat with a friend using video visitation, or give the gift of music with the JP4® player.\"\n\nInitially, we were excited about the prospect of technological improvements coming to the DOC, but we forgot to consider the possibility that they could lead to another \"middle man\" to manage and make a profit from this new prison industry. But, this is what has evolved. Fees will be charged for JP4 players, and video visitation. We have been assured that money orders sent by the US Post Office will incur no fee, as is currently the case.\n\nHowever, there will be a cost, for email the same as for a stamp, though we send emails for free in the outside world! As for other fees, donations from 1 cent-$20.00 via the Jpay website will cost $3.95, by phone $4.95; donating $20.01- $100 online will cost $6.95, by phone $7.95; donating $100-$200 online will be $8.95, by phone $9.95; $201-$300 will incur a fee of $10.95 online, $11.95 by phone. Walk-ins where funds are transferred at authorized businesses will be $7.95 no matter what amount the contribution is.\n\nVirginia CURE will be looking into this system as it exists in some of the 30 states touted by Jpay to learn more about how this service is working. Let us know your experiences, good and/or bad with this service. Please keep your letters short and to the point, so volunteers can quickly process your information.\n\n4\n\nSave the day and join us at Virginia CURE's 26th Annual Meeting Focus on Mass Incarceration The Problem, The solutions\n\nOctober 19, 2013\n\nArlington Unitarian Universalist Church 4444 Arlington Boulevard (corner Arlington Blvd. and George Mason Dr.) Arlington, VA 22204 9:00 AM - 3:00 PM, Lunch Included\n\nPre-registration form\n\nPlease complete one form per person and return with Check or Money Order payable to Virginia CURE to cover registration fee of $25.00 per person (includes luncheon and materials)\n\n$10.00 for students, scholarships available You may send one check for multiple registrations.\n\nName_____________________________________________________________________________\n\nAddress___________________________________________________________________________\n\nCity_____________________________________________________State_______Zip __________\n\nHome phone ________________Business phone________________Cell____________________\n\nEmail______________________________________________________________________________\n\nSend to Virginia CURE, PO Box 2310, Vienna, VA 22183\n\nNational Trends\n\nHouse of Representatives Establishes Overcriminalization Panel\n\nThe panel is a bipartisan task force that aims to pare the federal criminal code which is too complex and bloated. The committee is comprised of 5 Republicans and 5 Democrats. This is the most comprehensive examination of federal law since the 1980s. Rep. James Sensenbrenner (R-WI) leads the task force. He is expected to reintroduce a bill that would cut the size of the criminal code by a third. Rep. Bobby Scott (D-VA) expects the committee to work through consensus. \"We've been warned it's going to be a working task force and it means we'll have to essentially go through the entire code,\" he said. It is estimated that there are 4,500 criminal statutes and thousands of regulations that carry criminal penalties. This examination is supported by groups as disparate as the ACLU, CURE and the Heritage Foundation. Everyone agrees that the law needs an overhaul. In its first hearing on overcriminalization, the House task force heard from the Heritage Foundation, the National Association of Criminal Defense Lawyers, and former Deputy Attorney General George Terwilliger. Citing the $6.6 billion budget to run federal prisons, American Bar Association president William Shepherd told a House panel that, \"Incarceration has been proven to have a negative impact on future income, employment prospect, and family involvement. Reducing overcriminalization saves taxpayer money and improves the lives of all citizens.\"\n\nSupreme Court Makes it Tougher to Enhance Sentences\n\nThe U.S. Supreme Court ruled that a Washington man should not have gotten a harsher penalty for a crime because a judge had investigated his previous offenses, reports the Associated Press. The 8-1 decision came in the case of a Washington state man convicted of possessing a firearm in 2005. He could have been sentenced to a decade in prison, but since he had been convicted of multiple crimes, he fell under the Armed Career Criminal Act, which requires a sentence of at least 15 years if the defendant has three prior convictions for violent felonies. The man argued that his 1978 conviction for burglary wasn't violent and didn't count. The federal judge decided to investigate the record himself and decided that it did count. The man appealed, and the Supreme Court reversed the decision.\n\nSmarter Sentencing Act passed\n\nAfter decades of \"get tough\" rhetoric, Republicans and Democrats in Congress are finally coming together to say \"enough.\" The Smarter Sentencing Act, S.<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": " 1410, introduced by Senators Durbin (D-IL) and Lee (R-UT), takes two significant steps forward.",
"role": "assistant"
}
] |
|
STATE OF NORTH CAROLINA COUNCIL OF INTERNAL AUDITING
INTERNAL AUDIT ACTIVITY REPORT
As Required by G.S. 143-747(c)(12)
July 1, 2016 – June 30, 2017
Prepared By:
Office of Internal Audit Office of State Budget and Management
[THIS PAGE INTENTIONALLY LEFT BLANK]
Table of Contents
[THIS PAGE INTENTIONALLY LEFT BLANK]
INTRODUCTION
The North Carolina Internal Audit Act 1 (the Act) was signed into law on August 31, 2007. The Act established the Council of Internal Auditing (Council) and requires all Executive branch agencies 2 to establish a program of internal auditing. The Council of Internal Auditing is mandated to: report on service efforts and accomplishments of these programs; and propose legislation for consideration by the Governor and General Assembly. This report documents the service efforts and accomplishments from July 2016 through June 2017 of agencies and the Council of Internal Auditing in fulfilling the mandates of the legislation.
COUNCIL OF INTERNAL AUDITING
Membership, Programs and Staff
The Council membership is set by statute as shown in Table 1. The Council meets quarterly to provide guidance, set policies and assess progress of internal auditing efforts within State government.
Table 1
The Council is mandated to administer programs and activities which:
* Promulgate guidelines, develop technical manuals and suggest best practices;
* Provide training and professional development opportunities;
* Conduct statewide internal audit staffing analysis;
* Report on statewide internal audit service efforts and accomplishments;
* Develop and administer an internal audit recognition program;
* Develop and administer a peer review program;
* Develop and administer a shared internal audit program; and
* Maintain a report and audit plan repository.
The Office of State Budget and Management (OSBM) supports the Council and established the Office of Internal Audit (OIA) to house the Council staff. The organizational structure of the OIA is shown in Exhibit 1 on the next page. The five staff members hold eight professional credentials as follows:
* Two Certified Internal Auditors;
* One Certified Government Audit Professional;
* Two Certified Fraud Examiner;
* One Certified Public Accountants;
* One Certified Government Financial Manager.
* One Certified Internal Control Auditor; and
1 Entire Internal Audit Act is in Appendix A.
2 Agency means department, office, university, commission, board.
Exhibit 1 Office of Internal Audit as of June 30, 2017
State Budget Director
State Budget Director
Internal Audit
Director
Internal Audit
Director
Internal Auditor
Internal Auditor
Senior Internal
Auditor
Senior Internal
Auditor
Program Officer/
Internal Auditor
Program Officer/
Internal Auditor
Information System
Auditor
Information System
Auditor
Council of Internal Auditing
The expenditures for FY2012-13 through FY2016-17 are shown in Table 2. The Office of Internal Audit had a 1% overall increase in expenditures during FY2016-17.
Costs related to contractors were for: 1) obtaining experts; and 2) services to an agency not under the authority of OIA which were charged to those agencies. The increase in travel cost is due to a peer review performed at the State of Rhode Island. Rhode Island reimbursed OSBM for all associated costs. Also, training expenditures continue to decrease due to a small fee being charged to participants attending the training sessions.
Table 2
Efforts and Accomplishments
Over the last ten years the Council complied with all the mandated requirements in the Act. Guidelines and manuals were published in May 2008, communicated to all internal auditors and continue to be updated when necessary. The peer review, internal audit recognition and shared internal audit programs were developed and operationalized. Below are specific accomplishments during FY2016-17.
Training and Professional Development Opportunities
To maintain proficiency, audit standards require internal auditor participation in professional development. During FY2016-17, the Council sponsored three trainings which provided internal auditors the opportunity to earn up to 54 certified professional education (CPE) hours.
A one day training session was held in December 2016, covering leading edge ideas to improve the efficiency and effectiveness of audit functions and audit projects. The training session provided eight hours of certified professional education (CPE) hours at a cost of $50.00 per participant. Participants were invited from state agencies, universities, community colleges, local education agencies, local governments and IIA members. There were 155 registered participants and the cost of sponsoring the training session was just under $40 per participant. Based on participant surveys, 96% responded that the overall contract of the sessions provided value.
OIA staff coordinated a four-day Certified Internal Auditor (CIA) review course that corresponded to the three parts of the Certified Internal Auditor examination administered by the Institute of Internal Auditors (IIA). The training occurred between February and May 2017. The training sessions provided 32 hours of CPE hours at a cost of $65.00 per day. There were 67 registered participants and the cost of sponsoring the training was about $56 per participant per day. Survey responses indicated 17 participants attempted Part 1 and/or Part 2 of the examination; 11 (65%) successfully passed. Based on IIA records, 3 participants (4%) passed all three parts and obtained the CIA designation.
The 2 nd Annual Fraud Audit Conference was held in June 2017. This 2-day training session provided 14 CPE hours at a minimal cost of $40 per day. Participants were invited from state agencies, universities, community colleges, local education agencies, and local governments. There were 150 registered participants and the cost of sponsoring this conference was $35 per participant per day. Based on participant surveys, there was a 98% very good or excellent program rating.
In addition to the three training sessions throughout the year, other free or low cost training is identified and communicated to all internal auditors. Communication takes place via email and postings on the OSBM website. Over the past year, 64 professional development opportunities were identified and communicated. There were 243.5 CPE hours identified and 19% of these hours were free of charge.
Peer Review Program
The Peer Review program is a cooperative effort to establish a method to comply with the Institute of Internal Auditors' external quality assurance review requirement. All internal audit functions are required to have an external quality assurance review every five years. This program enables state agencies to obtain their external assessment in a cost-effective method. Over the last five years, 26 agencies used the Peer Review program. The Department of Commerce's Division of Employment Services, Elizabeth City State University and Department of Agriculture and Consumer Services used the Peer Review program in FY2016-17 and all received a generally conforms rating 3 . See page 15 for more details related to the outcomes of the Peer Review program.
3 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.
Internal Audit Recognition Program
The North Carolina Award of Excellence is the Council of Internal Auditing award for outstanding achievement in internal auditing. To express its appreciation for excellence in the field of internal auditing, this award is presented annually to honor a state internal auditor or a group of internal auditors who has made extraordinary contributions that promote excellence in internal auditing. The 2016 Internal Auditor Award of Excellence was presented to Jeani Allen, Internal Audit Director for the Department of Public Instruction.
Shared Internal Audit Program
The internal audit program provides audit services to small state agencies. The guidelines for state agencies to use the internal audit program for compliance with the Act is:
1. Has an annual operating budget exceeding ten million dollars but is less than seventy million dollars; or
2. Has less than 100 full-time equivalent employees; or
3. Receives and processes more than ten million dollars but less than seventy million dollars in cash in a fiscal year; or
4. Is deemed appropriate by the Council of Internal Auditing.
Currently, 11 agencies qualify to use this program; however, four of these agencies opt to have in-house functions. These agencies are the Department of the Secretary of State, Elizabeth City State University, House Finance Agency and Office of the State Controller.
The program will also provide audit assistance to any internal audit functions upon request. Services are dependent upon resource availability of the program. For accomplishment of this program, see the State Agency Internal Audit Functions section titled Efforts and Accomplishments on page 12.
Report and Audit Plan Repository
Audit reports are submitted to the office throughout the year. Agencies must also submit their audit plans by September 30 th of each year. For more details on compliance with requirements and the number and types of reports, see the State Agency Internal Audit Function section titled Efforts and Accomplishments on page 12.
Staffing Analysis
The Council's staffing analysis is a cursory review to identify the minimal number of internal audit positions needed, not the optimal. A more extensive review must be conducted to determine the optimal number of positions need in each internal audit function. The fiscal year 2017 analysis identified 24 agencies under the minimal number of internal auditors needed to address risk within their agencies. Positions needed to get all agencies to the minimal number is 52.50 positions at a cost 4 just under $5 million. Details of the specific staffing recommendations can be seen in Appendix B.
Institute of Internal Auditors Government Group Membership
The purpose of the program is to broaden internal audit knowledge by providing a membership reduction rate. Some benefits of a membership include free and discounted continuing education development and professional publications; enhanced networking; and exclusive on-line resource materials. The Council staff has worked with the IIA to establish the North Carolina Government Group membership program that starts October 1 and ends September 30 of each year. Any government employee can join this group and receive a discount on an IIA membership. On October 1, 2016, the program registered 170 individuals and throughout the year, added 30 additional individuals allowing for a 43% reduction of the membership rate.
Proposed Legislation Changes
The Council of Internal Auditing did not sponsor changes related to the Internal Audit Act during the 20162017 Legislative Session.
4 Annual cost of a position includes: Salary and Benefits – $91,200; and operating cost of $3,800.
STATE AGENCY INTERNAL AUDIT FUNCTIONS
Audit Resources
There are 48 agencies subject to the Internal Audit Act. Different models are used to establish an internal audit function from in-house staffing to outsourcing the entire function. Below is information on internal audit positions, contractor use and supplemental staffing via intern or temporary employees.
As shown in Table 3 on the next page, there are 196.25 internal auditor positions, which are spread across 36 state agencies. As of June 30, 2017, 84% of these positions were filled. There was a net gain of 5.75 positions throughout the state over the past year. Significant changes over the last year include:
* The UNC Health Care System gained three positions;
* Three "one-person" functions, Department of the Secretary of State, Community College System Office and University of North Carolina General Administration each gained one position.
* UNC Chapel Hill gained .75 position; and
Agencies under $70 million in operating funds can use OSBM as their internal audit function. During fiscal year 2017, eight agencies used OSBM services instead of having an in-house internal audit function. The Department of Military and Veterans Affairs is the only agency that is above the required threshold but uses OSBM due to a lack of resources. Agencies serviced by OSBM during FY2016-17 are:
* Commissioner of Banks;
* Department of Military and Veterans Affairs;
* Department of Labor;
* North Carolina Industrial Commission;
* Office of State Human Resources;
* Office of State Budget and Management;
* Office of the Governor; and
* Office of the State Auditor.
The following agencies outsource their internal audit function:
* North Carolina School of the Arts contracts with Winston-Salem State University for audit services;
* North Carolina School of Science and Mathematics contracts with the University of North Carolina General Administration;
* North Carolina State Education Assistance Authority contracts with the University of North Carolina General Administration;
* Housing Finance Agency contracts with Cherry Bekaert.
* Fayetteville State University contracts with an individual; and
Table 3
Statewide Internal Auditor Position Level Comparison
FY2013 to FY2017
2. Uses contract auditors
3. Contracts with Winston-Salem State University
4. Contracts with University of North Carolina - General Administration
Agencies continue efforts to supplement staffing levels which include: developing of a State Term internal audit supplemental staffing convenience contract; establishing intern programs; hiring temporary employees and using guest auditors 5 . Over the past year, 19 agencies have utilized these alternative methods to address resource limitations as shown in Table 4.
Personnel Proficiency
Internal auditors can demonstrate proficiency by obtaining professional certifications and advanced degrees. Overall, internal auditors hold 188 professional certifications in 23 different areas; an increase of 13% over last year. Eighty-three percent of the designations held by agency's internal auditors are in five of the 23 areas which are: Certified Public Accountants; Certified Internal Auditors; Certified Information Systems Auditors; Certified Internal Control Auditor; and Certified Fraud Examiners. A breakdown of all designation held by agency's internal auditors is shown in Chart 1, on the next page.
5 A guest auditor operates as a subject matter expert providing additional insight on the audit approach and/or interpretation of results.
52 CPA/Certified Public Accountant
40 CIA/Certified Internal Auditor
29 CFE /Certified Fraud Examiner
16 CISA/Certified Information Systems Auditor
19 CICA/Certified Internal Controls Auditor
3 CPM/Certified Project Manager
8 CISSP/Certified Information SystemSecurity
3 CGAP/Certified Government Audit Professional
3 CGFM/Certified Government Financial Manager
2 CRMA/Certification in Risk Management Assurance
1 Certified Healthcare Constructor
1 Certified Public Manager
1 Certified in Risk & Information Systems Control
1 Certified Information Security Manager
1 Chartered Global Management Accountant
1 Certified Anti-Money Laundering Specialist
1 Six Sigma Black Belt Certification
1 Certified Defense Financial Manager
1 Certified Quality Auditor
1 SAS Certified Base Programmer
1 Certified Integrated Resources Manager
1 Certified Real Estate Investigator
Over the last ten years, professional certifications held by internal auditors increased 224%, from 58 to 188 certifications, while staffing levels increased by 35%. Chart 2 provides a historical view of the top two certifications held by internal auditors. In the last year, the number of internal auditors that hold the CIA designation increased by 38%.
Along with the increases in professional certifications, advanced degrees held by internal auditors had a modest increase of 3% over the last year; however, over a ten-year period there has been a 200% increase, as shown in Chart 3 on the next page.
Chart 4, shows the type of advanced degrees held by the agency's internal auditors during fiscal year 2017. Auditors hold 78 advanced degrees with 77% of these being Masters in Business Administration, Accounting or Accounting and Finance Management.
33 MBA/Master of Business Administration
23 MAC/Master of Accounting & MSA/Master of Science Accountancy
5 MSci./Master of Science
4 MAFM/Master of Accounting & Financial Management
4 M.Ed./Master of Education
2 MPA/Master of Public Administration
Other:
1 Master of Information Systems
1 Juris Doctorate
1 Master of Science Information Assurance
1 Master of Art Organizational Management
1 Master of Science in Management
1 Master of Economic
1 Master of Bible Studies
Computer Assisted Audit Tools
Internal audit functions use computer assisted audit tools (CAATs) to improve the efficiency and effectiveness of administrative and audit tasks. Automated tools range from basic office productivity software such as spreadsheets, word processors and text editing programs to more advanced software packages involving the use of statistical analysis and business intelligence tools.
The advanced software products are typically productivity tools or generalized audit software. Productivity tools, such as Teammate and SharePoint, aid with the administration and management of the audit processes. Generalized audit software tools, such as ACL and IDEA, assist with data extraction, analytics and testing.
Table 5
Table 5 identifies the types of CAAT products used throughout State government and the number of internal audit functions using these products during fiscal year 2017. Some internal audit functions use more than one generalized audit software or productivity tool which is depicted in Table 6, on the next page.
A 5-year historic view shows growth in the use of CAATs as shown in Chart 5.
Table 6, on the next page, shows all internal audit functions use Microsoft Office products to enhance productivity through automation and which agencies employ the use of other CAAT products.
Table 6
1. Perform routine audit tasks including data extract, analytics, and testing.
2. Streamline processes to manage audits through electronic work papers and work flows.
3. Uses multiple generalized audit tools.
4. Uses multiple productivity tools.
Efforts and Accomplishments
Internal audit functions conduct various activities designed to add value and improve a state agency's operations. From July 1, 2016 through June 30, 2017, more compliance audits were completed when compared to other internal audit engagements. Chart 6 shows the percentage of internal audit reports prepared by type. In addition to the audit work shown here, most internal audit functions provide technical assistance throughout the year. During the same time, internal auditors provided over 21,600 hours of assistance to their agency's management which did not result in report issuance.
The audit engagements by state agency are shown in Table 7 on the next two pages. The Table depicts the efforts of each internal audit function. Efforts are directly related to the size of the audit function and the complexity of the engagement. There are many state agencies that have one or two internal auditors which limits the number of audits that can be accomplished throughout the year.
Table 7 (Continued on next page)
Table 7 (Continued from previous page)
Compliance
Internal Audit Act and Council Requirements
The Internal Audit Act and the North Carolina Internal Audit Manual require internal audit functions to submit their annual audit plan by September 30 of each year and engagement reports as completed. All Internal Audit Functions conformed with these requirements throughout the year.
External Quality Assurance Review (Peer Review)
To comply with audit standards, external quality assurance reviews (QAR) are required every five years. QARs for six internal audit functions are not due until a future date, as shown in Table 8.
Table 8
Of the 35 internal audit functions remaining, all have received a QAR and only one did not receive the generally conforms rating 6 . The Department of the Secretary of State received a partially conforms opinion on their last QAR. The agency hired a new Internal Audit Director in February 2017. The new Internal Audit Director must develop policies and procedures and conduct audit engagements before requesting a QAR. The tentative target date to request a follow up QAR is June 2018.
6 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.
16
[THIS PAGE INTENTIONALLY LEFT BLANK]
APPENDIX A NORTH CAROLINA INTERNAL AUDIT ACT
[THIS PAGE INTENTIONALLY LEFT BLANK]
Article 79.
Internal Auditing.
§ 143-745. Definitions; intent; applicability.
(a) For the purposes of this section:
(1) "Agency head" means the Governor, a Council of State member, a cabinet secretary, the President of The University of North Carolina, the President of the Community College System, the State Controller, and other independent appointed officers with authority over a State agency. The agency head for the Department of Public Instruction shall be the State Board of Education.
(2) "State agency" means each department created pursuant to Chapter 143A or 143B of the General Statutes, and includes all institutions, boards, commissions, authorities, by whatever name, that is a unit of the executive branch of State government, including The University of North Carolina, and the Community Colleges System Office. The term does not include a unit of local government.
(b) This Article applies only to a State agency that:
(1) Has an annual operating budget that exceeds ten million dollars ($10,000,000);
(2) Has more than 100 full-time equivalent employees; or
(3) Receives and processes more than ten million dollars ($10,000,000) in cash in a fiscal year. (2007-424, s. 1; 2009-516, s. 2; 2013-406, s. 1.)
§ 143-746. Internal auditing required.
(a) Requirements. - A State agency shall establish a program of internal auditing that:
(1) Promotes an effective system of internal controls that safeguards public funds and assets and minimizes incidences of fraud, waste, and abuse.
(2) Determines if programs and business operations are administered in compliance with federal and state laws, regulations, and other requirements.
(3) Reviews the effectiveness and efficiency of agency and program operations and service delivery.
(4) Periodically audits the agency's major systems and controls, including:
a. Accounting systems and controls.
b. Administrative systems and controls.
c. Information technology systems and controls.
(b) Internal Audit Standards. - Internal audits shall comply with current Standards for the Professional Practice of Internal Auditing issued by the Institute for Internal Auditors or, if appropriate, Government Auditing Standards issued by the Comptroller General of the United States.
(c) Appointment and Qualifications of Internal Auditors. - Any State employee who performs the internal audit function shall meet the minimum qualifications for internal auditors established by the Office of State Human Resources, in consultation with the Council of Internal Auditing.
(d) Director of Internal Auditing. - The agency head shall appoint a Director of Internal Auditing who shall report to, as designated by the agency head, (i) the agency head, (ii) the chief deputy or chief administrative assistant, or (iii) the agency governing board, or subcommittee thereof, if such a governing board exists. The Director of Internal Auditing shall be organizationally situated to avoid impairments to independence as defined in the auditing standards referenced in subsection (b) of this section.
(e) If a State agency has insufficient personnel to comply with this section, the Office of State Budget and Management shall provide technical assistance. (2007-424, s. 1; 2013-382, s. 9.1(c); 2013-406, s. 1.)
§ 143-747. Council of Internal Auditing.
(a) The Council of Internal Auditing is created, consisting of the following members:
(1) The State Controller who shall serve as Chair.
(2) The State Budget Officer.
(3) The Secretary of Administration.
(4) The Attorney General.
(5) The Secretary of Revenue.
(6) The State Auditor who shall serve as a nonvoting member. The State Auditor may appoint a designee.
(b) The Council shall be supported by the Office of State Budget and Management.
(c) The Council shall:
(1) Hold meetings at the call of the Chair or upon written request to the Chair by two members of the Council.
(2) Keep minutes of all proceedings.
(3) Promulgate guidelines for the uniformity and quality of State agency internal audit activities.
(4) Recommend the number of internal audit employees required by each State agency.
(5) Develop internal audit guides, technical manuals, and suggested best internal audit practices.
(6) Administer an independent peer review system for each State agency internal audit activity; specify the frequency of such reviews consistent with applicable national standards; and assist agencies with selection of independent peer reviewers from other State agencies.
(7) Provide central training sessions, professional development opportunities, and recognition programs for internal auditors.
(8) Administer a program for sharing internal auditors among State agencies needing temporary assistance and assembly of interagency teams of internal auditors to conduct internal audits beyond the capacity of a single agency.
(9) Maintain a central database of all annual internal audit plans; topics for review proposed by internal audit plans; internal audit reports issued and individual findings and recommendations from those reports.
(10) Require reports in writing from any State agency relative to any internal audit matter.
(11) If determined necessary by a majority vote of the council:
a. Conduct hearings relative to any attempts to interfere with, compromise, or intimidate an internal auditor.
b. Inquire as to the effectiveness of any internal audit unit.
c. Authorize the Chair to issue subpoenas for the appearance of any person or internal audit working papers, report drafts, and any other pertinent document or record regardless of physical form needed for the hearing.
(12) Issue an annual report including, but not limited to, service efforts and accomplishments of State agency internal auditors and to propose legislation for consideration by the Governor and General Assembly. (2007-424, s. 1; 2013-406, s. 1.)
§ 143-748. Confidentiality of internal audit work papers.
Internal audit work papers are confidential except as otherwise provided in this section or upon subpoena issued by a duly authorized court. A published internal audit report is a public record as defined in G.S. 132-1 to the extent it does not include information which is confidential under State or federal law or would compromise the security of a State agency. An internal auditor shall maintain for 10 years a complete file of all audit reports and reports of other examinations, investigations, surveys, and reviews conducted under the internal auditor's authority. Audit work papers and other evidence and related supportive material directly pertaining to the work of the internal auditor's office shall be retained in accordance with Chapter 132 of the General Statutes. Unless otherwise prohibited by law and to promote intergovernmental cooperation and avoid unnecessary duplication of audit effort, audit work papers related to released audit reports shall be made available for inspection by duly authorized representatives of the State and federal government in connection with some matter officially before them. (2013-406, s. 1.)
§ 143-749. Obstruction of audit.
It shall be a Class 2 misdemeanor for any officer, employee, or agent of a State agency subject to the provisions of this Article to willfully make or cause to be made to a State agency internal auditor or the internal auditor's designated representatives any false, misleading, or unfounded report for the purpose of interfering with the performance of any audit, special review, or investigation or to hinder or obstruct the State agency internal auditor or the internal auditor's designated representatives in the performance of their duties. (2013-406, s. 1.)
[THIS PAGE INTENTIONALLY LEFT BLANK]
APPENDIX B STAFFING RECOMMENDATIONS
[THIS PAGE INTENTIONALLY LEFT BLANK]
Internal Audit Staffing Analysis and Recommendation for Minimal Staff Level
As of June 30, 2017
Agencies at or above Minimum, Using Contractors or Using Shared Pool
Department of Agriculture and Consumer Services
4.00
Department of Health and Human Services
Department of Information Technology
Department of Public Safety
Department of Revenue
Department of Secretary of State
5
Department of Transportation
North Carolina Community College Central Office
Appalachian State University
East Carolina University
North Carolina A&T State University
North Carolina Central University
University of North Carolina-Charlotte
University of North Carolina-Pembroke
University of North Carolina-Wilmington
4
Winston-Salem State University
North Carolina School of Science & Math
North Carolina School of the Arts
North Carolina State Education Assistance Authority
Commissioner of Banks
Department of Labor
Office of State Auditor
Office of State Human Resources
Office of the Governor
41.00
3.00
20.00
3.00
2.00
25.00
2.00
5.00
8.00
4.00
4.00
5.00
2.00
4.00
5.00
Contracting
Contracting
Contracting
Shared Pool
Shared Pool
Shared Pool
Shared Pool
Shared Pool
State Board of Elections
Shared Pool
1. Provides internal audit services to agencies under $70 million expenditures; Shared Pool agencies listed above. Department of Military and Veteran's Affairs receives service; however, they are not included in OSBM calculation.
2. Provides internal audit services to North Carolina School for Science and Mathematics and NC State Education Assistance Authority which was considered in the calculation.
3. Outsourced internal audit services.
4. Provides internal audit services to North Carolina School for the Arts which was considered in the calculation.
5. Agencies under $70 million operating may use OSBM internal audit services instead established an in-house internal audit function.
|
<urn:uuid:dbb3d100-0164-4bdb-85d2-706f1a83fc22>
|
CC-MAIN-2022-33
|
https://www.osbm.nc.gov/media/2102/download?attachment
|
2022-08-19T02:17:55+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-33/subset=warc/part-00072-d466b69e-be2b-4525-ac34-1b10d57329da.c000.gz.parquet
| 801,422,044
| 6,062
|
eng_Latn
|
eng_Latn
| 0.89986
|
eng_Latn
| 0.980074
|
[
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"eng_Latn"
] | false
|
rolmOCR
|
[
228,
266,
285,
323,
2457,
3450,
7388,
11115,
13292,
13523,
14677,
15922,
16898,
18230,
18489,
19508,
19542,
19582,
20829,
20871,
20917,
20955,
24462,
28013,
28614,
28652,
28689,
28727,
30670
] |
STATE OF NORTH CAROLINA COUNCIL OF INTERNAL AUDITING
INTERNAL AUDIT ACTIVITY REPORT
As Required by G.S. 143-747(c)(12)
July 1, 2016 – June 30, 2017
Prepared By:
Office of Internal Audit Office of State Budget and Management
[THIS PAGE INTENTIONALLY LEFT BLANK]
Table of Contents
[THIS PAGE INTENTIONALLY LEFT BLANK]
INTRODUCTION
The North Carolina Internal Audit Act 1 (the Act) was signed into law on August 31, 2007. The Act established the Council of Internal Auditing (Council) and requires all Executive branch agencies 2 to establish a program of internal auditing. The Council of Internal Auditing is mandated to: report on service efforts and accomplishments of these programs; and propose legislation for consideration by the Governor and General Assembly. This report documents the service efforts and accomplishments from July 2016 through June 2017 of agencies and the Council of Internal Auditing in fulfilling the mandates of the legislation.
COUNCIL OF INTERNAL AUDITING
Membership, Programs and Staff
The Council membership is set by statute as shown in Table 1. The Council meets quarterly to provide guidance, set policies and assess progress of internal auditing efforts within State government.
Table 1
The Council is mandated to administer programs and activities which:
* Promulgate guidelines, develop technical manuals and suggest best practices;
* Provide training and professional development opportunities;
* Conduct statewide internal audit staffing analysis;
* Report on statewide internal audit service efforts and accomplishments;
* Develop and administer an internal audit recognition program;
* Develop and administer a peer review program;
* Develop and administer a shared internal audit program; and
* Maintain a report and audit plan repository.
The Office of State Budget and Management (OSBM) supports the Council and established the Office of Internal Audit (OIA) to house the Council staff. The organizational structure of the OIA is shown in Exhibit 1 on the next page. The five staff members hold eight professional credentials as follows:
* Two Certified Internal Auditors;
* One Certified Government Audit Professional;
* Two Certified Fraud Examiner;
* One Certified Public Accountants;
* One Certified Government Financial Manager.
* One Certified Internal Control Auditor; and
1 Entire Internal Audit Act is in Appendix A.
2 Agency means department, office, university, commission, board.
Exhibit 1 Office of Internal Audit as of June 30, 2017
State Budget Director
State Budget Director
Internal Audit
Director
Internal Audit
Director
Internal Auditor
Internal Auditor
Senior Internal
Auditor
Senior Internal
Auditor
Program Officer/
Internal Auditor
Program Officer/
Internal Auditor
Information System
Auditor
Information System
Auditor
Council of Internal Auditing
The expenditures for FY2012-13 through FY2016-17 are shown in Table 2. The Office of Internal Audit had a 1% overall increase in expenditures during FY2016-17.
Costs related to contractors were for: 1) obtaining experts; and 2) services to an agency not under the authority of OIA which were charged to those agencies. The increase in travel cost is due to a peer review performed at the State of Rhode Island. Rhode Island reimbursed OSBM for all associated costs. Also, training expenditures continue to decrease due to a small fee being charged to participants attending the training sessions.
Table 2
Efforts and Accomplishments
Over the last ten years the Council complied with all the mandated requirements in the Act. Guidelines and manuals were published in May 2008, communicated to all internal auditors and continue to be updated when necessary. The peer review, internal audit recognition and shared internal audit programs were developed and operationalized. Below are specific accomplishments during FY2016-17.
Training and Professional Development Opportunities
To maintain proficiency, audit standards require internal auditor participation in professional development. During FY2016-17, the Council sponsored three trainings which provided internal auditors the opportunity to earn up to 54 certified professional education (CPE) hours.
A one day training session was held in December 2016, covering leading edge ideas to improve the efficiency and effectiveness of audit functions and audit projects. The training session provided eight hours of certified professional education (CPE) hours at a cost of $50.00 per participant. Participants were invited from state agencies, universities, community colleges, local education agencies, local governments and IIA members. There were 155 registered participants and the cost of sponsoring the training session was just under $40 per participant. Based on participant surveys, 96% responded that the overall contract of the sessions provided value.
OIA staff coordinated a four-day Certified Internal Auditor (CIA) review course that corresponded to the three parts of the Certified Internal Auditor examination administered by the Institute of Internal Auditors (IIA). The training occurred between February and May 2017. The training sessions provided 32 hours of CPE hours at a cost of $65.00 per day. There were 67 registered participants and the cost of sponsoring the training was about $56 per participant per day. Survey responses indicated 17 participants attempted Part 1 and/or Part 2 of the examination; 11 (65%) successfully passed. Based on IIA records, 3 participants (4%) passed all three parts and obtained the CIA designation.
The 2 nd Annual Fraud Audit Conference was held in June 2017. This 2-day training session provided 14 CPE hours at a minimal cost of $40 per day. Participants were invited from state agencies, universities, community colleges, local education agencies, and local governments. There were 150 registered participants and the cost of sponsoring this conference was $35 per participant per day. Based on participant surveys, there was a 98% very good or excellent program rating.
In addition to the three training sessions throughout the year, other free or low cost training is identified and communicated to all internal auditors. Communication takes place via email and postings on the OSBM website. Over the past y
|
ear, 64 professional development opportunities were identified and communicated.
|
There were 243.5 CPE hours identified and 19% of these hours were free of charge.
Peer Review Program
The Peer Review program is a cooperative effort to establish a method to comply with the Institute of Internal Auditors' external quality assurance review requirement. All internal audit functions are required to have an external quality assurance review every five years. This program enables state agencies to obtain their external assessment in a cost-effective method. Over the last five years, 26 agencies used the Peer Review program. The Department of Commerce's Division of Employment Services, Elizabeth City State University and Department of Agriculture and Consumer Services used the Peer Review program in FY2016-17 and all received a generally conforms rating 3 . See page 15 for more details related to the outcomes of the Peer Review program.
3 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.
Internal Audit Recognition Program
The North Carolina Award of Excellence is the Council of Internal Auditing award for outstanding achievement in internal auditing. To express its appreciation for excellence in the field of internal auditing, this award is presented annually to honor a state internal auditor or a group of internal auditors who has made extraordinary contributions that promote excellence in internal auditing. The 2016 Internal Auditor Award of Excellence was presented to Jeani Allen, Internal Audit Director for the Department of Public Instruction.
Shared Internal Audit Program
The internal audit program provides audit services to small state agencies. The guidelines for state agencies to use the internal audit program for compliance with the Act is:
1. Has an annual operating budget exceeding ten million dollars but is less than seventy million dollars; or
2. Has less than 100 full-time equivalent employees; or
3. Receives and processes more than ten million dollars but less than seventy million dollars in cash in a fiscal year; or
4. Is deemed appropriate by the Council of Internal Auditing.
Currently, 11 agencies qualify to use this program; however, four of these agencies opt to have in-house functions. These agencies are the Department of the Secretary of State, Elizabeth City State University, House Finance Agency and Office of the State Controller.
The program will also provide audit assistance to any internal audit functions upon request. Services are dependent upon resource availability of the program. For accomplishment of this program, see the State Agency Internal Audit Functions section titled Efforts and Accomplishments on page 12.
Report and Audit Plan Repository
Audit reports are submitted to the office throughout the year. Agencies must also submit their audit plans by September 30 th of each year. For more details on compliance with requirements and the number and types of reports, see the State Agency Internal Audit Function section titled Efforts and Accomplishments on page 12.
Staffing Analysis
The Council's staffing analysis is a cursory review to identify the minimal number of internal audit positions needed, not the optimal. A more extensive review must be conducted to determine the optimal number of positions need in each internal audit function. The fiscal year 2017 analysis identified 24 agencies under the minimal number of internal auditors needed to address risk within their agencies. Positions needed to get all agencies to the minimal number is 52.50 positions at a cost 4 just under $5 million. Details of the specific staffing recommendations can be seen in Appendix B.
Institute of Internal Auditors Government Group Membership
The purpose of the program is to broaden internal audit knowledge by providing a membership reduction rate. Some benefits of a membership include free and discounted continuing education development and professional publications; enhanced networking; and exclusive on-line resource materials. The Council staff has worked with the IIA to establish the North Carolina Government Group membership program that starts October 1 and ends September 30 of each year. Any government employee can join this group and receive a discount on an IIA membership. On October 1, 2016, the program registered 170 individuals and throughout the year, added 30 additional individuals allowing for a 43% reduction of the membership rate.
Proposed Legislation Changes
The Council of Internal Auditing did not sponsor changes related to the Internal Audit Act during the 20162017 Legislative Session.
4 Annual cost of a position includes: Salary and Benefits – $91,200; and operating cost of $3,800.
STATE AGENCY INTERNAL AUDIT FUNCTIONS
Audit Resources
There are 48 agencies subject to the Internal Audit Act. Different models are used to establish an internal audit function from in-house staffing to outsourcing the entire function. Below is information on internal audit positions, contractor use and supplemental staffing via intern or temporary employees.
As shown in Table 3 on the next page, there are 196.25 internal auditor positions, which are spread across 36 state agencies. As of June 30, 2017, 84% of these positions were filled. There was a net gain of 5.75 positions throughout the state over the past year. Significant changes over the last year include:
* The UNC Health Care System gained three positions;
* Three "one-person" functions, Department of the Secretary of State, Community College System Office and University of North Carolina General Administration each gained one position.
* UNC Chapel Hill gained .75 position; and
Agencies under $70 million in operating funds can use OSBM as their internal audit function. During fiscal year 2017, eight agencies used OSBM services instead of having an in-house internal audit function. The Department of Military and Veterans Affairs is the only agency that is above the required threshold but uses OSBM due to a lack of resources. Agencies serviced by OSBM during FY2016-17 are:
* Commissioner of Banks;
* Department of Military and Veterans Affairs;
* Department of Labor;
* North Carolina Industrial Commission;
* Office of State Human Resources;
* Office of State Budget and Management;
* Office of the Governor; and
* Office of the State Auditor.
The following agencies outsource their internal audit function:
* North Carolina School of the Arts contracts with Winston-Salem State University for audit services;
* North Carolina School of Science and Mathematics contracts with the University of North Carolina General Administration;
* North Carolina State Education Assistance Authority contracts with the University of North Carolina General Administration;
* Housing Finance Agency contracts with Cherry Bekaert.
* Fayetteville State University contracts with an individual; and
Table 3
Statewide Internal Auditor Position Level Comparison
FY2013 to FY2017
2. Uses contract auditors
3. Contracts with Winston-Salem State University
4. Contracts with University of North Carolina - General Administration
Agencies continue efforts to supplement staffing levels which include: developing of a State Term internal audit supplemental staffing convenience contract; establishing intern programs; hiring temporary employees and using guest auditors 5 . Over the past year, 19 agencies have utilized these alternative methods to address resource limitations as shown in Table 4.
Personnel Proficiency
Internal auditors can demonstrate proficiency by obtaining professional certifications and advanced degrees. Overall, internal auditors hold 188 professional certifications in 23 different areas; an increase of 13% over last year. Eighty-three percent of the designations held by agency's internal auditors are in five of the 23 areas which are: Certified Public Accountants; Certified Internal Auditors; Certified Information Systems Auditors; Certified Internal Control Auditor; and Certified Fraud Examiners. A breakdown of all designation held by agency's internal auditors is shown in Chart 1, on the next page.
5 A guest auditor operates as a subject matter expert providing additional insight on the audit approach and/or interpretation of results.
52 CPA/Certified Public Accountant
40 CIA/Certified Internal Auditor
29 CFE /Certified Fraud Examiner
16 CISA/Certified Information Systems Auditor
19 CICA/Certified Internal Controls Auditor
3 CPM/Certified Project Manager
8 CISSP/Certified Information SystemSecurity
3 CGAP/Certified Government Audit Professional
3 CGFM/Certified Government Financial Manager
2 CRMA/Certification in Risk Management Assurance
1 Certified Healthcare Constructor
1 Certified Public Manager
1 Certified in Risk & Information Systems Control
1 Certified Information Security Manager
1 Chartered Global Management Accountant
1 Certified Anti-Money Laundering Specialist
1 Six Sigma Black Belt Certification
1 Certified Defense Financial Manager
1 Certified Quality Auditor
1 SAS Certified Base Programmer
1 Certified Integrated Resources Manager
1 Certified Real Estate Investigator
Over the last ten years, professional certifications held by internal auditors increased 224%, from 58 to 188 certifications, while staffing levels increased by 35%. Chart 2 provides a historical view of the top two certifications held by internal auditors. In the last year, the number of internal auditors that hold the CIA designation increased by 38%.
Along with the increases in professional certifications, advanced degrees held by internal auditors had a modest increase of 3% over the last year; however, over a ten-year period there has been a 200% increase, as shown in Chart 3 on the next page.
Chart 4, shows the type of advanced degrees held by the agency's internal auditors during fiscal year 2017. Auditors hold 78 advanced degrees with 77% of these being Masters in Business Administration, Accounting or Accounting and Finance Management.
33 MBA/Master of Business Administration
23 MAC/Master of Accounting & MSA/Master of Science Accountancy
5 MSci./Master of Science
4 MAFM/Master of Accounting & Financial Management
4 M.Ed./Master of Education
2 MPA/Master of Public Administration
Other:
1 Master of Information Systems
1 Juris Doctorate
1 Master of Science Information Assurance
1 Master of Art Organizational Management
1 Master of Science in Management
1 Master of Economic
1 Master of Bible Studies
Computer Assisted Audit Tools
Internal audit functions use computer assisted audit tools (CAATs) to improve the efficiency and effectiveness of administrative and audit tasks. Automated tools range from basic office productivity software such as spreadsheets, word processors and text editing programs to more advanced software packages involving the use of statistical analysis and business intelligence tools.
The advanced software products are typically productivity tools or generalized audit software. Productivity tools, such as Teammate and SharePoint, aid with the administration and management of the audit processes. Generalized audit software tools, such as ACL and IDEA, assist with data extraction, analytics and testing.
Table 5
Table 5 identifies the types of CAAT products used throughout State government and the number of internal audit functions using these products during fiscal year 2017. Some internal audit functions use more than one generalized audit software or productivity tool which is depicted in Table 6, on the next page.
A 5-year historic view shows growth in the use of CAATs as shown in Chart 5.
Table 6, on the next page, shows all internal audit functions use Microsoft Office products to enhance productivity through automation and which agencies employ the use of other CAAT products.
Table 6
1. Perform routine audit tasks including data extract, analytics, and testing.
2. Streamline processes to manage audits through electronic work papers and work flows.
3. Uses multiple generalized audit tools.
4. Uses multiple productivity tools.
Efforts and Accomplishments
Internal audit functions conduct various activities designed to add value and improve a state agency's operations. From July 1, 2016 through June 30, 2017, more compliance audits were completed when compared to other internal audit engagements. Chart 6 shows the percentage of internal audit reports prepared by type. In addition to the audit work shown here, most internal audit functions provide technical assistance throughout the year. During the same time, internal auditors provided over 21,600 hours of assistance to their agency's management which did not result in report issuance.
The audit engagements by state agency are shown in Table 7 on the next two pages. The Table depicts the efforts of each internal audit function. Efforts are directly related to the size of the audit function and the complexity of the engagement. There are many state agencies that have one or two internal auditors which limits the number of audits that can be accomplished throughout the year.
Table 7 (Continued on next page)
Table 7 (Continued from previous page)
Compliance
Internal Audit Act and Council Requirements
The Internal Audit Act and the North Carolina Internal Audit Manual require internal audit functions to submit their annual audit plan by September 30 of each year and engagement reports as completed. All Internal Audit Functions conformed with these requirements throughout the year.
External Quality Assurance Review (Peer Review)
To comply with audit standards, external quality assurance reviews (QAR) are required every five years. QARs for six internal audit functions are not due until a future date, as shown in Table 8.
Table 8
Of the 35 internal audit functions remaining, all have received a QAR and only one did not receive the generally conforms rating 6 . The Department of the Secretary of State received a partially conforms opinion on their last QAR. The agency hired a new Internal Audit Director in February 2017. The new Internal Audit Director must develop policies and procedures and conduct audit engagements before requesting a QAR. The tentative target date to request a follow up QAR is June 2018.
6 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.
16
[THIS PAGE INTENTIONALLY LEFT BLANK]
APPENDIX A NORTH CAROLINA INTERNAL AUDIT ACT
[THIS PAGE INTENTIONALLY LEFT BLANK]
Article 79.
Internal Auditing.
§ 143-745. Definitions; intent; applicability.
(a) For the purposes of this section:
(1) "Agency head" means the Governor, a Council of State member, a cabinet secretary, the President of The University of North Carolina, the President of the Community College System, the State Controller, and other independent appointed officers with authority over a State agency. The agency head for the Department of Public Instruction shall be the State Board of Education.
(2) "State agency" means each department created pursuant to Chapter 143A or 143B of the General Statutes, and includes all institutions, boards, commissions, authorities, by whatever name, that is a unit of the executive branch of State government, including The University of North Carolina, and the Community Colleges System Office. The term does not include a unit of local government.
(b) This Article applies only to a State agency that:
(1) Has an annual operating budget that exceeds ten million dollars ($10,000,000);
(2) Has more than 100 full-time equivalent employees; or
(3) Receives and processes more than ten million dollars ($10,000,000) in cash in a fiscal year. (2007-424, s. 1; 2009-516, s. 2; 2013-406, s. 1.)
§ 143-746. Internal auditing required.
(a) Requirements. - A State agency shall establish a program of internal auditing that:
(1) Promotes an effective system of internal controls that safeguards public funds and assets and minimizes incidences of fraud, waste, and abuse.
(2) Determines if programs and business operations are administered in compliance with federal and state laws, regulations, and other requirements.
(3) Reviews the effectiveness and efficiency of agency and program operations and service delivery.
(4) Periodically audits the agency's major systems and controls, including:
a. Accounting systems and controls.
b. Administrative systems and controls.
c. Information technology systems and controls.
(b) Internal Audit Standards. - Internal audits shall comply with current Standards for the Professional Practice of Internal Auditing issued by the Institute for Internal Auditors or, if appropriate, Government Auditing Standards issued by the Comptroller General of the United States.
(c) Appointment and Qualifications of Internal Auditors. - Any State employee who performs the internal audit function shall meet the minimum qualifications for internal auditors established by the Office of State Human Resources, in consultation with the Council of Internal Auditing.
(d) Director of Internal Auditing. - The agency head shall appoint a Director of Internal Auditing who shall report to, as designated by the agency head, (i) the agency head, (ii) the chief deputy or chief administrative assistant, or (iii) the agency governing board, or subcommittee thereof, if such a governing board exists. The Director of Internal Auditing shall be organizationally situated to avoid impairments to independence as defined in the auditing standards referenced in subsection (b) of this section.
(e) If a State agency has insufficient personnel to comply with this section, the Office of State Budget and Management shall provide technical assistance. (2007-424, s. 1; 2013-382, s. 9.1(c); 2013-406, s. 1.)
§ 143-747. Council of Internal Auditing.
(a) The Council of Internal Auditing is created, consisting of the following members:
(1) The State Controller who shall serve as Chair.
(2) The State Budget Officer.
(3) The Secretary of Administration.
(4) The Attorney General.
(5) The Secretary of Revenue.
(6) The State Auditor who shall serve as a nonvoting member. The State Auditor may appoint a designee.
(b) The Council shall be supported by the Office of State Budget and Management.
(c) The Council shall:
(1) Hold meetings at the call of the Chair or upon written request to the Chair by two members of the Council.
(2) Keep minutes of all proceedings.
(3) Promulgate guidelines for the uniformity and quality of State agency internal audit activities.
(4) Recommend the number of internal audit employees required by each State agency.
(5) Develop internal audit guides, technical manuals, and suggested best internal audit practices.
(6) Administer an independent peer review system for each State agency internal audit activity; specify the frequency of such reviews consistent with applicable national standards; and assist agencies with selection of independent peer reviewers from other State agencies.
(7) Provide central training sessions, professional development opportunities, and recognition programs for internal auditors.
(8) Administer a program for sharing internal auditors among State agencies needing temporary assistance and assembly of interagency teams of internal auditors to conduct internal audits beyond the capacity of a single agency.
(9) Maintain a central database of all annual internal audit plans; topics for review proposed by internal audit plans; internal audit reports issued and individual findings and recommendations from those reports.
(10) Require reports in writing from any State agency relative to any internal audit matter.
(11) If determined necessary by a majority vote of the council:
a. Conduct hearings relative to any attempts to interfere with, compromise, or intimidate an internal auditor.
b. Inquire as to the effectiveness of any internal audit unit.
c. Authorize the Chair to issue subpoenas for the appearance of any person or internal audit working papers, report drafts, and any other pertinent document or record regardless of physical form needed for the hearing.
(12) Issue an annual report including, but not limited to, service efforts and accomplishments of State agency internal auditors and to propose legislation for consideration by the Governor and General Assembly. (2007-424, s. 1; 2013-406, s. 1.)
§ 143-748. Confidentiality of internal audit work papers.
Internal audit work papers are confidential except as otherwise provided in this section or upon subpoena issued by a duly authorized court. A published internal audit report is a public record as defined in G.S. 132-1 to the extent it does not include information which is confidential under State or federal law or would compromise the security of a State agency. An internal auditor shall maintain for 10 years a complete file of all audit reports and reports of other examinations, investigations, surveys, and reviews conducted under the internal auditor's authority. Audit work papers and other evidence and related supportive material directly pertaining to the work of the internal auditor's office shall be retained in accordance with Chapter 132 of the General Statutes. Unless otherwise prohibited by law and to promote intergovernmental cooperation and avoid unnecessary duplication of audit effort, audit work papers related to released audit reports shall be made available for inspection by duly authorized representatives of the State and federal government in connection with some matter officially before them. (2013-406, s. 1.)
§ 143-749. Obstruction of audit.
It shall be a Class 2 misdemeanor for any officer, employee, or agent of a State agency subject to the provisions of this Article to willfully make or cause to be made to a State agency internal auditor or the internal auditor's designated representatives any false, misleading, or unfounded report for the purpose of interfering with the performance of any audit, special review, or investigation or to hinder or obstruct the State agency internal auditor or the internal auditor's designated representatives in the performance of their duties. (2013-406, s. 1.)
[THIS PAGE INTENTIONALLY LEFT BLANK]
APPENDIX B STAFFING RECOMMENDATIONS
[THIS PAGE INTENTIONALLY LEFT BLANK]
Internal Audit Staffing Analysis and Recommendation for Minimal Staff Level
As of June 30, 2017
Agencies at or above Minimum, Using Contractors or Using Shared Pool
Department of Agriculture and Consumer Services
4.00
Department of Health and Human Services
Department of Information Technology
Department of Public Safety
Department of Revenue
Department of Secretary of State
5
Department of Transportation
North Carolina Community College Central Office
Appalachian State University
East Carolina University
North Carolina A&T State University
North Carolina Central University
University of North Carolina-Charlotte
University of North Carolina-Pembroke
University of North Carolina-Wilmington
4
Winston-Salem State University
North Carolina School of Science & Math
North Carolina School of the Arts
North Carolina State Education Assistance Authority
Commissioner of Banks
Department of Labor
Office of State Auditor
Office of State Human Resources
Office of the Governor
41.00
3.00
20.00
3.00
2.00
25.00
2.00
5.00
8.00
4.00
4.00
5.00
2.00
4.00
5.00
Contracting
Contracting
Contracting
Shared Pool
Shared Pool
Shared Pool
Shared Pool
Shared Pool
State Board of Elections
Shared Pool
1. Provides internal audit services to agencies under $70 million expenditures; Shared Pool agencies listed above. Department of Military and Veteran's Affairs receives service; however, they are not included in OSBM calculation.
2. Provides internal audit services to North Carolina School for Science and Mathematics and NC State Education Assistance Authority which was considered in the calculation.
3. Outsourced internal audit services.
4. Provides internal audit services to North Carolina School for the Arts which was considered in the calculation.
5. Agencies under $70 million operating may use OSBM internal audit services instead established an in-house internal audit function.
| 6,286
|
inside_word
|
year,
|
remove_one_sentence
|
<url>
https://www.osbm.nc.gov/media/2102/download?attachment
</url>
<text>
STATE OF NORTH CAROLINA COUNCIL OF INTERNAL AUDITING
INTERNAL AUDIT ACTIVITY REPORT
As Required by G.S. 143-747(c)(12)
July 1, 2016 – June 30, 2017
Prepared By:
Office of Internal Audit Office of State Budget and Management
[THIS PAGE INTENTIONALLY LEFT BLANK]
Table of Contents
[THIS PAGE INTENTIONALLY LEFT BLANK]
INTRODUCTION
The North Carolina Internal Audit Act 1 (the Act) was signed into law on August 31, 2007. The Act established the Council of Internal Auditing (Council) and requires all Executive branch agencies 2 to establish a program of internal auditing. The Council of Internal Auditing is mandated to: report on service efforts and accomplishments of these programs; and propose legislation for consideration by the Governor and General Assembly. This report documents the service efforts and accomplishments from July 2016 through June 2017 of agencies and the Council of Internal Auditing in fulfilling the mandates of the legislation.
COUNCIL OF INTERNAL AUDITING
Membership, Programs and Staff
The Council membership is set by statute as shown in Table 1. The Council meets quarterly to provide guidance, set policies and assess progress of internal auditing efforts within State government.
Table 1
The Council is mandated to administer programs and activities which:
* Promulgate guidelines, develop technical manuals and suggest best practices;
* Provide training and professional development opportunities;
* Conduct statewide internal audit staffing analysis;
* Report on statewide internal audit service efforts and accomplishments;
* Develop and administer an internal audit recognition program;
* Develop and administer a peer review program;
* Develop and administer a shared internal audit program; and
* Maintain a report and audit plan repository.
The Office of State Budget and Management (OSBM) supports the Council and established the Office of Internal Audit (OIA) to house the Council staff. The organizational structure of the OIA is shown in Exhibit 1 on the next page. The five staff members hold eight professional credentials as follows:
* Two Certified Internal Auditors;
* One Certified Government Audit Professional;
* Two Certified Fraud Examiner;
* One Certified Public Accountants;
* One Certified Government Financial Manager.
* One Certified Internal Control Auditor; and
1 Entire Internal Audit Act is in Appendix A.
2 Agency means department, office, university, commission, board.
Exhibit 1 Office of Internal Audit as of June 30, 2017
State Budget Director
State Budget Director
Internal Audit
Director
Internal Audit
Director
Internal Auditor
Internal Auditor
Senior Internal
Auditor
Senior Internal
Auditor
Program Officer/
Internal Auditor
Program Officer/
Internal Auditor
Information System
Auditor
Information System
Auditor
Council of Internal Auditing
The expenditures for FY2012-13 through FY2016-17 are shown in Table 2. The Office of Internal Audit had a 1% overall increase in expenditures during FY2016-17.
Costs related to contractors were for: 1) obtaining experts; and 2) services to an agency not under the authority of OIA which were charged to those agencies. The increase in travel cost is due to a peer review performed at the State of Rhode Island. Rhode Island reimbursed OSBM for all associated costs. Also, training expenditures continue to decrease due to a small fee being charged to participants attending the training sessions.
Table 2
Efforts and Accomplishments
Over the last ten years the Council complied with all the mandated requirements in the Act. Guidelines and manuals were published in May 2008, communicated to all internal auditors and continue to be updated when necessary. The peer review, internal audit recognition and shared internal audit programs were developed and operationalized. Below are specific accomplishments during FY2016-17.
Training and Professional Development Opportunities
To maintain proficiency, audit standards require internal auditor participation in professional development. During FY2016-17, the Council sponsored three trainings which provided internal auditors the opportunity to earn up to 54 certified professional education (CPE) hours.
A one day training session was held in December 2016, covering leading edge ideas to improve the efficiency and effectiveness of audit functions and audit projects. The training session provided eight hours of certified professional education (CPE) hours at a cost of $50.00 per participant. Participants were invited from state agencies, universities, community colleges, local education agencies, local governments and IIA members. There were 155 registered participants and the cost of sponsoring the training session was just under $40 per participant. Based on participant surveys, 96% responded that the overall contract of the sessions provided value.
OIA staff coordinated a four-day Certified Internal Auditor (CIA) review course that corresponded to the three parts of the Certified Internal Auditor examination administered by the Institute of Internal Auditors (IIA). The training occurred between February and May 2017. The training sessions provided 32 hours of CPE hours at a cost of $65.00 per day. There were 67 registered participants and the cost of sponsoring the training was about $56 per participant per day. Survey responses indicated 17 participants attempted Part 1 and/or Part 2 of the examination; 11 (65%) successfully passed. Based on IIA records, 3 participants (4%) passed all three parts and obtained the CIA designation.
The 2 nd Annual Fraud Audit Conference was held in June 2017. This 2-day training session provided 14 CPE hours at a minimal cost of $40 per day. Participants were invited from state agencies, universities, community colleges, local education agencies, and local governments. There were 150 registered participants and the cost of sponsoring this conference was $35 per participant per day. Based on participant surveys, there was a 98% very good or excellent program rating.
In addition to the three training sessions throughout the year, other free or low cost training is identified and communicated to all internal auditors. Communication takes place via email and postings on the OSBM website. Over the past y<cursor_is_here> There were 243.5 CPE hours identified and 19% of these hours were free of charge.
Peer Review Program
The Peer Review program is a cooperative effort to establish a method to comply with the Institute of Internal Auditors' external quality assurance review requirement. All internal audit functions are required to have an external quality assurance review every five years. This program enables state agencies to obtain their external assessment in a cost-effective method. Over the last five years, 26 agencies used the Peer Review program. The Department of Commerce's Division of Employment Services, Elizabeth City State University and Department of Agriculture and Consumer Services used the Peer Review program in FY2016-17 and all received a generally conforms rating 3 . See page 15 for more details related to the outcomes of the Peer Review program.
3 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.
Internal Audit Recognition Program
The North Carolina Award of Excellence is the Council of Internal Auditing award for outstanding achievement in internal auditing. To express its appreciation for excellence in the field of internal auditing, this award is presented annually to honor a state internal auditor or a group of internal auditors who has made extraordinary contributions that promote excellence in internal auditing. The 2016 Internal Auditor Award of Excellence was presented to Jeani Allen, Internal Audit Director for the Department of Public Instruction.
Shared Internal Audit Program
The internal audit program provides audit services to small state agencies. The guidelines for state agencies to use the internal audit program for compliance with the Act is:
1. Has an annual operating budget exceeding ten million dollars but is less than seventy million dollars; or
2. Has less than 100 full-time equivalent employees; or
3. Receives and processes more than ten million dollars but less than seventy million dollars in cash in a fiscal year; or
4. Is deemed appropriate by the Council of Internal Auditing.
Currently, 11 agencies qualify to use this program; however, four of these agencies opt to have in-house functions. These agencies are the Department of the Secretary of State, Elizabeth City State University, House Finance Agency and Office of the State Controller.
The program will also provide audit assistance to any internal audit functions upon request. Services are dependent upon resource availability of the program. For accomplishment of this program, see the State Agency Internal Audit Functions section titled Efforts and Accomplishments on page 12.
Report and Audit Plan Repository
Audit reports are submitted to the office throughout the year. Agencies must also submit their audit plans by September 30 th of each year. For more details on compliance with requirements and the number and types of reports, see the State Agency Internal Audit Function section titled Efforts and Accomplishments on page 12.
Staffing Analysis
The Council's staffing analysis is a cursory review to identify the minimal number of internal audit positions needed, not the optimal. A more extensive review must be conducted to determine the optimal number of positions need in each internal audit function. The fiscal year 2017 analysis identified 24 agencies under the minimal number of internal auditors needed to address risk within their agencies. Positions needed to get all agencies to the minimal number is 52.50 positions at a cost 4 just under $5 million. Details of the specific staffing recommendations can be seen in Appendix B.
Institute of Internal Auditors Government Group Membership
The purpose of the program is to broaden internal audit knowledge by providing a membership reduction rate. Some benefits of a membership include free and discounted continuing education development and professional publications; enhanced networking; and exclusive on-line resource materials. The Council staff has worked with the IIA to establish the North Carolina Government Group membership program that starts October 1 and ends September 30 of each year. Any government employee can join this group and receive a discount on an IIA membership. On October 1, 2016, the program registered 170 individuals and throughout the year, added 30 additional individuals allowing for a 43% reduction of the membership rate.
Proposed Legislation Changes
The Council of Internal Auditing did not sponsor changes related to the Internal Audit Act during the 20162017 Legislative Session.
4 Annual cost of a position includes: Salary and Benefits – $91,200; and operating cost of $3,800.
STATE AGENCY INTERNAL AUDIT FUNCTIONS
Audit Resources
There are 48 agencies subject to the Internal Audit Act. Different models are used to establish an internal audit function from in-house staffing to outsourcing the entire function. Below is information on internal audit positions, contractor use and supplemental staffing via intern or temporary employees.
As shown in Table 3 on the next page, there are 196.25 internal auditor positions, which are spread across 36 state agencies. As of June 30, 2017, 84% of these positions were filled. There was a net gain of 5.75 positions throughout the state over the past year. Significant changes over the last year include:
* The UNC Health Care System gained three positions;
* Three "one-person" functions, Department of the Secretary of State, Community College System Office and University of North Carolina General Administration each gained one position.
* UNC Chapel Hill gained .75 position; and
Agencies under $70 million in operating funds can use OSBM as their internal audit function. During fiscal year 2017, eight agencies used OSBM services instead of having an in-house internal audit function. The Department of Military and Veterans Affairs is the only agency that is above the required threshold but uses OSBM due to a lack of resources. Agencies serviced by OSBM during FY2016-17 are:
* Commissioner of Banks;
* Department of Military and Veterans Affairs;
* Department of Labor;
* North Carolina Industrial Commission;
* Office of State Human Resources;
* Office of State Budget and Management;
* Office of the Governor; and
* Office of the State Auditor.
The following agencies outsource their internal audit function:
* North Carolina School of the Arts contracts with Winston-Salem State University for audit services;
* North Carolina School of Science and Mathematics contracts with the University of North Carolina General Administration;
* North Carolina State Education Assistance Authority contracts with the University of North Carolina General Administration;
* Housing Finance Agency contracts with Cherry Bekaert.
* Fayetteville State University contracts with an individual; and
Table 3
Statewide Internal Auditor Position Level Comparison
FY2013 to FY2017
2. Uses contract auditors
3. Contracts with Winston-Salem State University
4. Contracts with University of North Carolina - General Administration
Agencies continue efforts to supplement staffing levels which include: developing of a State Term internal audit supplemental staffing convenience contract; establishing intern programs; hiring temporary employees and using guest auditors 5 . Over the past year, 19 agencies have utilized these alternative methods to address resource limitations as shown in Table 4.
Personnel Proficiency
Internal auditors can demonstrate proficiency by obtaining professional certifications and advanced degrees. Overall, internal auditors hold 188 professional certifications in 23 different areas; an increase of 13% over last year. Eighty-three percent of the designations held by agency's internal auditors are in five of the 23 areas which are: Certified Public Accountants; Certified Internal Auditors; Certified Information Systems Auditors; Certified Internal Control Auditor; and Certified Fraud Examiners. A breakdown of all designation held by agency's internal auditors is shown in Chart 1, on the next page.
5 A guest auditor operates as a subject matter expert providing additional insight on the audit approach and/or interpretation of results.
52 CPA/Certified Public Accountant
40 CIA/Certified Internal Auditor
29 CFE /Certified Fraud Examiner
16 CISA/Certified Information Systems Auditor
19 CICA/Certified Internal Controls Auditor
3 CPM/Certified Project Manager
8 CISSP/Certified Information SystemSecurity
3 CGAP/Certified Government Audit Professional
3 CGFM/Certified Government Financial Manager
2 CRMA/Certification in Risk Management Assurance
1 Certified Healthcare Constructor
1 Certified Public Manager
1 Certified in Risk & Information Systems Control
1 Certified Information Security Manager
1 Chartered Global Management Accountant
1 Certified Anti-Money Laundering Specialist
1 Six Sigma Black Belt Certification
1 Certified Defense Financial Manager
1 Certified Quality Auditor
1 SAS Certified Base Programmer
1 Certified Integrated Resources Manager
1 Certified Real Estate Investigator
Over the last ten years, professional certifications held by internal auditors increased 224%, from 58 to 188 certifications, while staffing levels increased by 35%. Chart 2 provides a historical view of the top two certifications held by internal auditors. In the last year, the number of internal auditors that hold the CIA designation increased by 38%.
Along with the increases in professional certifications, advanced degrees held by internal auditors had a modest increase of 3% over the last year; however, over a ten-year period there has been a 200% increase, as shown in Chart 3 on the next page.
Chart 4, shows the type of advanced degrees held by the agency's internal auditors during fiscal year 2017. Auditors hold 78 advanced degrees with 77% of these being Masters in Business Administration, Accounting or Accounting and Finance Management.
33 MBA/Master of Business Administration
23 MAC/Master of Accounting & MSA/Master of Science Accountancy
5 MSci./Master of Science
4 MAFM/Master of Accounting & Financial Management
4 M.Ed./Master of Education
2 MPA/Master of Public Administration
Other:
1 Master of Information Systems
1 Juris Doctorate
1 Master of Science Information Assurance
1 Master of Art Organizational Management
1 Master of Science in Management
1 Master of Economic
1 Master of Bible Studies
Computer Assisted Audit Tools
Internal audit functions use computer assisted audit tools (CAATs) to improve the efficiency and effectiveness of administrative and audit tasks. Automated tools range from basic office productivity software such as spreadsheets, word processors and text editing programs to more advanced software packages involving the use of statistical analysis and business intelligence tools.
The advanced software products are typically productivity tools or generalized audit software. Productivity tools, such as Teammate and SharePoint, aid with the administration and management of the audit processes. Generalized audit software tools, such as ACL and IDEA, assist with data extraction, analytics and testing.
Table 5
Table 5 identifies the types of CAAT products used throughout State government and the number of internal audit functions using these products during fiscal year 2017. Some internal audit functions use more than one generalized audit software or productivity tool which is depicted in Table 6, on the next page.
A 5-year historic view shows growth in the use of CAATs as shown in Chart 5.
Table 6, on the next page, shows all internal audit functions use Microsoft Office products to enhance productivity through automation and which agencies employ the use of other CAAT products.
Table 6
1. Perform routine audit tasks including data extract, analytics, and testing.
2. Streamline processes to manage audits through electronic work papers and work flows.
3. Uses multiple generalized audit tools.
4. Uses multiple productivity tools.
Efforts and Accomplishments
Internal audit functions conduct various activities designed to add value and improve a state agency's operations. From July 1, 2016 through June 30, 2017, more compliance audits were completed when compared to other internal audit engagements. Chart 6 shows the percentage of internal audit reports prepared by type. In addition to the audit work shown here, most internal audit functions provide technical assistance throughout the year. During the same time, internal auditors provided over 21,600 hours of assistance to their agency's management which did not result in report issuance.
The audit engagements by state agency are shown in Table 7 on the next two pages. The Table depicts the efforts of each internal audit function. Efforts are directly related to the size of the audit function and the complexity of the engagement. There are many state agencies that have one or two internal auditors which limits the number of audits that can be accomplished throughout the year.
Table 7 (Continued on next page)
Table 7 (Continued from previous page)
Compliance
Internal Audit Act and Council Requirements
The Internal Audit Act and the North Carolina Internal Audit Manual require internal audit functions to submit their annual audit plan by September 30 of each year and engagement reports as completed. All Internal Audit Functions conformed with these requirements throughout the year.
External Quality Assurance Review (Peer Review)
To comply with audit standards, external quality assurance reviews (QAR) are required every five years. QARs for six internal audit functions are not due until a future date, as shown in Table 8.
Table 8
Of the 35 internal audit functions remaining, all have received a QAR and only one did not receive the generally conforms rating 6 . The Department of the Secretary of State received a partially conforms opinion on their last QAR. The agency hired a new Internal Audit Director in February 2017. The new Internal Audit Director must develop policies and procedures and conduct audit engagements before requesting a QAR. The tentative target date to request a follow up QAR is June 2018.
6 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.
16
[THIS PAGE INTENTIONALLY LEFT BLANK]
APPENDIX A NORTH CAROLINA INTERNAL AUDIT ACT
[THIS PAGE INTENTIONALLY LEFT BLANK]
Article 79.
Internal Auditing.
§ 143-745. Definitions; intent; applicability.
(a) For the purposes of this section:
(1) "Agency head" means the Governor, a Council of State member, a cabinet secretary, the President of The University of North Carolina, the President of the Community College System, the State Controller, and other independent appointed officers with authority over a State agency. The agency head for the Department of Public Instruction shall be the State Board of Education.
(2) "State agency" means each department created pursuant to Chapter 143A or 143B of the General Statutes, and includes all institutions, boards, commissions, authorities, by whatever name, that is a unit of the executive branch of State government, including The University of North Carolina, and the Community Colleges System Office. The term does not include a unit of local government.
(b) This Article applies only to a State agency that:
(1) Has an annual operating budget that exceeds ten million dollars ($10,000,000);
(2) Has more than 100 full-time equivalent employees; or
(3) Receives and processes more than ten million dollars ($10,000,000) in cash in a fiscal year. (2007-424, s. 1; 2009-516, s. 2; 2013-406, s. 1.)
§ 143-746. Internal auditing required.
(a) Requirements. - A State agency shall establish a program of internal auditing that:
(1) Promotes an effective system of internal controls that safeguards public funds and assets and minimizes incidences of fraud, waste, and abuse.
(2) Determines if programs and business operations are administered in compliance with federal and state laws, regulations, and other requirements.
(3) Reviews the effectiveness and efficiency of agency and program operations and service delivery.
(4) Periodically audits the agency's major systems and controls, including:
a. Accounting systems and controls.
b. Administrative systems and controls.
c. Information technology systems and controls.
(b) Internal Audit Standards. - Internal audits shall comply with current Standards for the Professional Practice of Internal Auditing issued by the Institute for Internal Auditors or, if appropriate, Government Auditing Standards issued by the Comptroller General of the United States.
(c) Appointment and Qualifications of Internal Auditors. - Any State employee who performs the internal audit function shall meet the minimum qualifications for internal auditors established by the Office of State Human Resources, in consultation with the Council of Internal Auditing.
(d) Director of Internal Auditing. - The agency head shall appoint a Director of Internal Auditing who shall report to, as designated by the agency head, (i) the agency head, (ii) the chief deputy or chief administrative assistant, or (iii) the agency governing board, or subcommittee thereof, if such a governing board exists. The Director of Internal Auditing shall be organizationally situated to avoid impairments to independence as defined in the auditing standards referenced in subsection (b) of this section.
(e) If a State agency has insufficient personnel to comply with this section, the Office of State Budget and Management shall provide technical assistance. (2007-424, s. 1; 2013-382, s. 9.1(c); 2013-406, s. 1.)
§ 143-747. Council of Internal Auditing.
(a) The Council of Internal Auditing is created, consisting of the following members:
(1) The State Controller who shall serve as Chair.
(2) The State Budget Officer.
(3) The Secretary of Administration.
(4) The Attorney General.
(5) The Secretary of Revenue.
(6) The State Auditor who shall serve as a nonvoting member. The State Auditor may appoint a designee.
(b) The Council shall be supported by the Office of State Budget and Management.
(c) The Council shall:
(1) Hold meetings at the call of the Chair or upon written request to the Chair by two members of the Council.
(2) Keep minutes of all proceedings.
(3) Promulgate guidelines for the uniformity and quality of State agency internal audit activities.
(4) Recommend the number of internal audit employees required by each State agency.
(5) Develop internal audit guides, technical manuals, and suggested best internal audit practices.
(6) Administer an independent peer review system for each State agency internal audit activity; specify the frequency of such reviews consistent with applicable national standards; and assist agencies with selection of independent peer reviewers from other State agencies.
(7) Provide central training sessions, professional development opportunities, and recognition programs for internal auditors.
(8) Administer a program for sharing internal auditors among State agencies needing temporary assistance and assembly of interagency teams of internal auditors to conduct internal audits beyond the capacity of a single agency.
(9) Maintain a central database of all annual internal audit plans; topics for review proposed by internal audit plans; internal audit reports issued and individual findings and recommendations from those reports.
(10) Require reports in writing from any State agency relative to any internal audit matter.
(11) If determined necessary by a majority vote of the council:
a. Conduct hearings relative to any attempts to interfere with, compromise, or intimidate an internal auditor.
b. Inquire as to the effectiveness of any internal audit unit.
c. Authorize the Chair to issue subpoenas for the appearance of any person or internal audit working papers, report drafts, and any other pertinent document or record regardless of physical form needed for the hearing.
(12) Issue an annual report including, but not limited to, service efforts and accomplishments of State agency internal auditors and to propose legislation for consideration by the Governor and General Assembly. (2007-424, s. 1; 2013-406, s. 1.)
§ 143-748. Confidentiality of internal audit work papers.
Internal audit work papers are confidential except as otherwise provided in this section or upon subpoena issued by a duly authorized court. A published internal audit report is a public record as defined in G.S. 132-1 to the extent it does not include information which is confidential under State or federal law or would compromise the security of a State agency. An internal auditor shall maintain for 10 years a complete file of all audit reports and reports of other examinations, investigations, surveys, and reviews conducted under the internal auditor's authority. Audit work papers and other evidence and related supportive material directly pertaining to the work of the internal auditor's office shall be retained in accordance with Chapter 132 of the General Statutes. Unless otherwise prohibited by law and to promote intergovernmental cooperation and avoid unnecessary duplication of audit effort, audit work papers related to released audit reports shall be made available for inspection by duly authorized representatives of the State and federal government in connection with some matter officially before them. (2013-406, s. 1.)
§ 143-749. Obstruction of audit.
It shall be a Class 2 misdemeanor for any officer, employee, or agent of a State agency subject to the provisions of this Article to willfully make or cause to be made to a State agency internal auditor or the internal auditor's designated representatives any false, misleading, or unfounded report for the purpose of interfering with the performance of any audit, special review, or investigation or to hinder or obstruct the State agency internal auditor or the internal auditor's designated representatives in the performance of their duties. (2013-406, s. 1.)
[THIS PAGE INTENTIONALLY LEFT BLANK]
APPENDIX B STAFFING RECOMMENDATIONS
[THIS PAGE INTENTIONALLY LEFT BLANK]
Internal Audit Staffing Analysis and Recommendation for Minimal Staff Level
As of June 30, 2017
Agencies at or above Minimum, Using Contractors or Using Shared Pool
Department of Agriculture and Consumer Services
4.00
Department of Health and Human Services
Department of Information Technology
Department of Public Safety
Department of Revenue
Department of Secretary of State
5
Department of Transportation
North Carolina Community College Central Office
Appalachian State University
East Carolina University
North Carolina A&T State University
North Carolina Central University
University of North Carolina-Charlotte
University of North Carolina-Pembroke
University of North Carolina-Wilmington
4
Winston-Salem State University
North Carolina School of Science & Math
North Carolina School of the Arts
North Carolina State Education Assistance Authority
Commissioner of Banks
Department of Labor
Office of State Auditor
Office of State Human Resources
Office of the Governor
41.00
3.00
20.00
3.00
2.00
25.00
2.00
5.00
8.00
4.00
4.00
5.00
2.00
4.00
5.00
Contracting
Contracting
Contracting
Shared Pool
Shared Pool
Shared Pool
Shared Pool
Shared Pool
State Board of Elections
Shared Pool
1. Provides internal audit services to agencies under $70 million expenditures; Shared Pool agencies listed above. Department of Military and Veteran's Affairs receives service; however, they are not included in OSBM calculation.
2. Provides internal audit services to North Carolina School for Science and Mathematics and NC State Education Assistance Authority which was considered in the calculation.
3. Outsourced internal audit services.
4. Provides internal audit services to North Carolina School for the Arts which was considered in the calculation.
5. Agencies under $70 million operating may use OSBM internal audit services instead established an in-house internal audit function.
</text>
|
[
{
"content": "<url>\nhttps://www.osbm.nc.gov/media/2102/download?attachment\n</url>\n<text>\nSTATE OF NORTH CAROLINA COUNCIL OF INTERNAL AUDITING\n\nINTERNAL AUDIT ACTIVITY REPORT\n\nAs Required by G.S. 143-747(c)(12)\n\nJuly 1, 2016 – June 30, 2017\n\nPrepared By:\n\nOffice of Internal Audit Office of State Budget and Management\n\n[THIS PAGE INTENTIONALLY LEFT BLANK]\n\nTable of Contents\n\n[THIS PAGE INTENTIONALLY LEFT BLANK]\n\nINTRODUCTION\n\nThe North Carolina Internal Audit Act 1 (the Act) was signed into law on August 31, 2007. The Act established the Council of Internal Auditing (Council) and requires all Executive branch agencies 2 to establish a program of internal auditing. The Council of Internal Auditing is mandated to: report on service efforts and accomplishments of these programs; and propose legislation for consideration by the Governor and General Assembly. This report documents the service efforts and accomplishments from July 2016 through June 2017 of agencies and the Council of Internal Auditing in fulfilling the mandates of the legislation.\n\nCOUNCIL OF INTERNAL AUDITING\n\nMembership, Programs and Staff\n\nThe Council membership is set by statute as shown in Table 1. The Council meets quarterly to provide guidance, set policies and assess progress of internal auditing efforts within State government.\n\nTable 1\n\nThe Council is mandated to administer programs and activities which:\n\n* Promulgate guidelines, develop technical manuals and suggest best practices;\n* Provide training and professional development opportunities;\n* Conduct statewide internal audit staffing analysis;\n* Report on statewide internal audit service efforts and accomplishments;\n* Develop and administer an internal audit recognition program;\n* Develop and administer a peer review program;\n* Develop and administer a shared internal audit program; and\n* Maintain a report and audit plan repository.\n\nThe Office of State Budget and Management (OSBM) supports the Council and established the Office of Internal Audit (OIA) to house the Council staff. The organizational structure of the OIA is shown in Exhibit 1 on the next page. The five staff members hold eight professional credentials as follows:\n\n* Two Certified Internal Auditors;\n* One Certified Government Audit Professional;\n* Two Certified Fraud Examiner;\n* One Certified Public Accountants;\n* One Certified Government Financial Manager.\n* One Certified Internal Control Auditor; and\n\n1 Entire Internal Audit Act is in Appendix A.\n\n2 Agency means department, office, university, commission, board.\n\nExhibit 1 Office of Internal Audit as of June 30, 2017\n\nState Budget Director\nState Budget Director\nInternal Audit\nDirector\nInternal Audit\nDirector\nInternal Auditor\nInternal Auditor\nSenior Internal\nAuditor\nSenior Internal\nAuditor\nProgram Officer/\nInternal Auditor\nProgram Officer/\nInternal Auditor\nInformation System\nAuditor\nInformation System\nAuditor\nCouncil of Internal Auditing\n\nThe expenditures for FY2012-13 through FY2016-17 are shown in Table 2. The Office of Internal Audit had a 1% overall increase in expenditures during FY2016-17.\n\nCosts related to contractors were for: 1) obtaining experts; and 2) services to an agency not under the authority of OIA which were charged to those agencies. The increase in travel cost is due to a peer review performed at the State of Rhode Island. Rhode Island reimbursed OSBM for all associated costs. Also, training expenditures continue to decrease due to a small fee being charged to participants attending the training sessions.\n\nTable 2\n\nEfforts and Accomplishments\n\nOver the last ten years the Council complied with all the mandated requirements in the Act. Guidelines and manuals were published in May 2008, communicated to all internal auditors and continue to be updated when necessary. The peer review, internal audit recognition and shared internal audit programs were developed and operationalized. Below are specific accomplishments during FY2016-17.\n\nTraining and Professional Development Opportunities\n\nTo maintain proficiency, audit standards require internal auditor participation in professional development. During FY2016-17, the Council sponsored three trainings which provided internal auditors the opportunity to earn up to 54 certified professional education (CPE) hours.\n\nA one day training session was held in December 2016, covering leading edge ideas to improve the efficiency and effectiveness of audit functions and audit projects. The training session provided eight hours of certified professional education (CPE) hours at a cost of $50.00 per participant. Participants were invited from state agencies, universities, community colleges, local education agencies, local governments and IIA members. There were 155 registered participants and the cost of sponsoring the training session was just under $40 per participant. Based on participant surveys, 96% responded that the overall contract of the sessions provided value.\n\nOIA staff coordinated a four-day Certified Internal Auditor (CIA) review course that corresponded to the three parts of the Certified Internal Auditor examination administered by the Institute of Internal Auditors (IIA). The training occurred between February and May 2017. The training sessions provided 32 hours of CPE hours at a cost of $65.00 per day. There were 67 registered participants and the cost of sponsoring the training was about $56 per participant per day. Survey responses indicated 17 participants attempted Part 1 and/or Part 2 of the examination; 11 (65%) successfully passed. Based on IIA records, 3 participants (4%) passed all three parts and obtained the CIA designation.\n\nThe 2 nd Annual Fraud Audit Conference was held in June 2017. This 2-day training session provided 14 CPE hours at a minimal cost of $40 per day. Participants were invited from state agencies, universities, community colleges, local education agencies, and local governments. There were 150 registered participants and the cost of sponsoring this conference was $35 per participant per day. Based on participant surveys, there was a 98% very good or excellent program rating.\n\nIn addition to the three training sessions throughout the year, other free or low cost training is identified and communicated to all internal auditors. Communication takes place via email and postings on the OSBM website. Over the past y<cursor_is_here> There were 243.5 CPE hours identified and 19% of these hours were free of charge.\n\nPeer Review Program\n\nThe Peer Review program is a cooperative effort to establish a method to comply with the Institute of Internal Auditors' external quality assurance review requirement. All internal audit functions are required to have an external quality assurance review every five years. This program enables state agencies to obtain their external assessment in a cost-effective method. Over the last five years, 26 agencies used the Peer Review program. The Department of Commerce's Division of Employment Services, Elizabeth City State University and Department of Agriculture and Consumer Services used the Peer Review program in FY2016-17 and all received a generally conforms rating 3 . See page 15 for more details related to the outcomes of the Peer Review program.\n\n3 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.\n\nInternal Audit Recognition Program\n\nThe North Carolina Award of Excellence is the Council of Internal Auditing award for outstanding achievement in internal auditing. To express its appreciation for excellence in the field of internal auditing, this award is presented annually to honor a state internal auditor or a group of internal auditors who has made extraordinary contributions that promote excellence in internal auditing. The 2016 Internal Auditor Award of Excellence was presented to Jeani Allen, Internal Audit Director for the Department of Public Instruction.\n\nShared Internal Audit Program\n\nThe internal audit program provides audit services to small state agencies. The guidelines for state agencies to use the internal audit program for compliance with the Act is:\n\n1. Has an annual operating budget exceeding ten million dollars but is less than seventy million dollars; or\n2. Has less than 100 full-time equivalent employees; or\n3. Receives and processes more than ten million dollars but less than seventy million dollars in cash in a fiscal year; or\n4. Is deemed appropriate by the Council of Internal Auditing.\n\nCurrently, 11 agencies qualify to use this program; however, four of these agencies opt to have in-house functions. These agencies are the Department of the Secretary of State, Elizabeth City State University, House Finance Agency and Office of the State Controller.\n\nThe program will also provide audit assistance to any internal audit functions upon request. Services are dependent upon resource availability of the program. For accomplishment of this program, see the State Agency Internal Audit Functions section titled Efforts and Accomplishments on page 12.\n\nReport and Audit Plan Repository\n\nAudit reports are submitted to the office throughout the year. Agencies must also submit their audit plans by September 30 th of each year. For more details on compliance with requirements and the number and types of reports, see the State Agency Internal Audit Function section titled Efforts and Accomplishments on page 12.\n\nStaffing Analysis\n\nThe Council's staffing analysis is a cursory review to identify the minimal number of internal audit positions needed, not the optimal. A more extensive review must be conducted to determine the optimal number of positions need in each internal audit function. The fiscal year 2017 analysis identified 24 agencies under the minimal number of internal auditors needed to address risk within their agencies. Positions needed to get all agencies to the minimal number is 52.50 positions at a cost 4 just under $5 million. Details of the specific staffing recommendations can be seen in Appendix B.\n\nInstitute of Internal Auditors Government Group Membership\n\nThe purpose of the program is to broaden internal audit knowledge by providing a membership reduction rate. Some benefits of a membership include free and discounted continuing education development and professional publications; enhanced networking; and exclusive on-line resource materials. The Council staff has worked with the IIA to establish the North Carolina Government Group membership program that starts October 1 and ends September 30 of each year. Any government employee can join this group and receive a discount on an IIA membership. On October 1, 2016, the program registered 170 individuals and throughout the year, added 30 additional individuals allowing for a 43% reduction of the membership rate.\n\nProposed Legislation Changes\n\nThe Council of Internal Auditing did not sponsor changes related to the Internal Audit Act during the 20162017 Legislative Session.\n\n4 Annual cost of a position includes: Salary and Benefits – $91,200; and operating cost of $3,800.\n\nSTATE AGENCY INTERNAL AUDIT FUNCTIONS\n\nAudit Resources\n\nThere are 48 agencies subject to the Internal Audit Act. Different models are used to establish an internal audit function from in-house staffing to outsourcing the entire function. Below is information on internal audit positions, contractor use and supplemental staffing via intern or temporary employees.\n\nAs shown in Table 3 on the next page, there are 196.25 internal auditor positions, which are spread across 36 state agencies. As of June 30, 2017, 84% of these positions were filled. There was a net gain of 5.75 positions throughout the state over the past year. Significant changes over the last year include:\n\n* The UNC Health Care System gained three positions;\n* Three \"one-person\" functions, Department of the Secretary of State, Community College System Office and University of North Carolina General Administration each gained one position.\n* UNC Chapel Hill gained .75 position; and\n\nAgencies under $70 million in operating funds can use OSBM as their internal audit function. During fiscal year 2017, eight agencies used OSBM services instead of having an in-house internal audit function. The Department of Military and Veterans Affairs is the only agency that is above the required threshold but uses OSBM due to a lack of resources. Agencies serviced by OSBM during FY2016-17 are:\n\n* Commissioner of Banks;\n* Department of Military and Veterans Affairs;\n* Department of Labor;\n* North Carolina Industrial Commission;\n* Office of State Human Resources;\n* Office of State Budget and Management;\n* Office of the Governor; and\n* Office of the State Auditor.\n\nThe following agencies outsource their internal audit function:\n\n* North Carolina School of the Arts contracts with Winston-Salem State University for audit services;\n* North Carolina School of Science and Mathematics contracts with the University of North Carolina General Administration;\n* North Carolina State Education Assistance Authority contracts with the University of North Carolina General Administration;\n* Housing Finance Agency contracts with Cherry Bekaert.\n* Fayetteville State University contracts with an individual; and\n\nTable 3\n\nStatewide Internal Auditor Position Level Comparison\n\nFY2013 to FY2017\n\n2. Uses contract auditors\n\n3. Contracts with Winston-Salem State University\n\n4. Contracts with University of North Carolina - General Administration\n\nAgencies continue efforts to supplement staffing levels which include: developing of a State Term internal audit supplemental staffing convenience contract; establishing intern programs; hiring temporary employees and using guest auditors 5 . Over the past year, 19 agencies have utilized these alternative methods to address resource limitations as shown in Table 4.\n\nPersonnel Proficiency\n\nInternal auditors can demonstrate proficiency by obtaining professional certifications and advanced degrees. Overall, internal auditors hold 188 professional certifications in 23 different areas; an increase of 13% over last year. Eighty-three percent of the designations held by agency's internal auditors are in five of the 23 areas which are: Certified Public Accountants; Certified Internal Auditors; Certified Information Systems Auditors; Certified Internal Control Auditor; and Certified Fraud Examiners. A breakdown of all designation held by agency's internal auditors is shown in Chart 1, on the next page.\n\n5 A guest auditor operates as a subject matter expert providing additional insight on the audit approach and/or interpretation of results.\n\n52 CPA/Certified Public Accountant\n\n40 CIA/Certified Internal Auditor\n\n29 CFE /Certified Fraud Examiner\n\n16 CISA/Certified Information Systems Auditor\n\n19 CICA/Certified Internal Controls Auditor\n\n3 CPM/Certified Project Manager\n\n8 CISSP/Certified Information SystemSecurity\n\n3 CGAP/Certified Government Audit Professional\n\n3 CGFM/Certified Government Financial Manager\n\n2 CRMA/Certification in Risk Management Assurance\n\n1 Certified Healthcare Constructor\n\n1 Certified Public Manager\n\n1 Certified in Risk & Information Systems Control\n\n1 Certified Information Security Manager\n\n1 Chartered Global Management Accountant\n\n1 Certified Anti-Money Laundering Specialist\n\n1 Six Sigma Black Belt Certification\n\n1 Certified Defense Financial Manager\n\n1 Certified Quality Auditor\n\n1 SAS Certified Base Programmer\n\n1 Certified Integrated Resources Manager\n\n1 Certified Real Estate Investigator\n\nOver the last ten years, professional certifications held by internal auditors increased 224%, from 58 to 188 certifications, while staffing levels increased by 35%. Chart 2 provides a historical view of the top two certifications held by internal auditors. In the last year, the number of internal auditors that hold the CIA designation increased by 38%.\n\nAlong with the increases in professional certifications, advanced degrees held by internal auditors had a modest increase of 3% over the last year; however, over a ten-year period there has been a 200% increase, as shown in Chart 3 on the next page.\n\nChart 4, shows the type of advanced degrees held by the agency's internal auditors during fiscal year 2017. Auditors hold 78 advanced degrees with 77% of these being Masters in Business Administration, Accounting or Accounting and Finance Management.\n\n33 MBA/Master of Business Administration\n23 MAC/Master of Accounting & MSA/Master of Science Accountancy\n5 MSci./Master of Science\n4 MAFM/Master of Accounting & Financial Management\n4 M.Ed./Master of Education\n2 MPA/Master of Public Administration\n\nOther:\n\n1 Master of Information Systems\n1 Juris Doctorate\n1 Master of Science Information Assurance\n1 Master of Art Organizational Management\n1 Master of Science in Management\n1 Master of Economic\n1 Master of Bible Studies\n\nComputer Assisted Audit Tools\n\nInternal audit functions use computer assisted audit tools (CAATs) to improve the efficiency and effectiveness of administrative and audit tasks. Automated tools range from basic office productivity software such as spreadsheets, word processors and text editing programs to more advanced software packages involving the use of statistical analysis and business intelligence tools.\n\nThe advanced software products are typically productivity tools or generalized audit software. Productivity tools, such as Teammate and SharePoint, aid with the administration and management of the audit processes. Generalized audit software tools, such as ACL and IDEA, assist with data extraction, analytics and testing.\n\nTable 5\n\nTable 5 identifies the types of CAAT products used throughout State government and the number of internal audit functions using these products during fiscal year 2017. Some internal audit functions use more than one generalized audit software or productivity tool which is depicted in Table 6, on the next page.\n\nA 5-year historic view shows growth in the use of CAATs as shown in Chart 5.\n\nTable 6, on the next page, shows all internal audit functions use Microsoft Office products to enhance productivity through automation and which agencies employ the use of other CAAT products.\n\nTable 6\n\n1. Perform routine audit tasks including data extract, analytics, and testing.\n\n2. Streamline processes to manage audits through electronic work papers and work flows.\n\n3. Uses multiple generalized audit tools.\n\n4. Uses multiple productivity tools.\n\nEfforts and Accomplishments\n\nInternal audit functions conduct various activities designed to add value and improve a state agency's operations. From July 1, 2016 through June 30, 2017, more compliance audits were completed when compared to other internal audit engagements. Chart 6 shows the percentage of internal audit reports prepared by type. In addition to the audit work shown here, most internal audit functions provide technical assistance throughout the year. During the same time, internal auditors provided over 21,600 hours of assistance to their agency's management which did not result in report issuance.\n\nThe audit engagements by state agency are shown in Table 7 on the next two pages. The Table depicts the efforts of each internal audit function. Efforts are directly related to the size of the audit function and the complexity of the engagement. There are many state agencies that have one or two internal auditors which limits the number of audits that can be accomplished throughout the year.\n\nTable 7 (Continued on next page)\n\nTable 7 (Continued from previous page)\n\nCompliance\n\nInternal Audit Act and Council Requirements\n\nThe Internal Audit Act and the North Carolina Internal Audit Manual require internal audit functions to submit their annual audit plan by September 30 of each year and engagement reports as completed. All Internal Audit Functions conformed with these requirements throughout the year.\n\nExternal Quality Assurance Review (Peer Review)\n\nTo comply with audit standards, external quality assurance reviews (QAR) are required every five years. QARs for six internal audit functions are not due until a future date, as shown in Table 8.\n\nTable 8\n\nOf the 35 internal audit functions remaining, all have received a QAR and only one did not receive the generally conforms rating 6 . The Department of the Secretary of State received a partially conforms opinion on their last QAR. The agency hired a new Internal Audit Director in February 2017. The new Internal Audit Director must develop policies and procedures and conduct audit engagements before requesting a QAR. The tentative target date to request a follow up QAR is June 2018.\n\n6 Generally Conforms with the Internal Professional Practice Framework is the highest rating that can be received for an external quality assurance review.\n\n16\n\n[THIS PAGE INTENTIONALLY LEFT BLANK]\n\nAPPENDIX A NORTH CAROLINA INTERNAL AUDIT ACT\n\n[THIS PAGE INTENTIONALLY LEFT BLANK]\n\nArticle 79.\n\nInternal Auditing.\n\n§ 143-745. Definitions; intent; applicability.\n\n(a) For the purposes of this section:\n(1) \"Agency head\" means the Governor, a Council of State member, a cabinet secretary, the President of The University of North Carolina, the President of the Community College System, the State Controller, and other independent appointed officers with authority over a State agency. The agency head for the Department of Public Instruction shall be the State Board of Education.\n(2) \"State agency\" means each department created pursuant to Chapter 143A or 143B of the General Statutes, and includes all institutions, boards, commissions, authorities, by whatever name, that is a unit of the executive branch of State government, including The University of North Carolina, and the Community Colleges System Office. The term does not include a unit of local government.\n(b) This Article applies only to a State agency that:\n(1) Has an annual operating budget that exceeds ten million dollars ($10,000,000);\n(2) Has more than 100 full-time equivalent employees; or\n(3) Receives and processes more than ten million dollars ($10,000,000) in cash in a fiscal year. (2007-424, s. 1; 2009-516, s. 2; 2013-406, s. 1.)\n\n§ 143-746. Internal auditing required.\n\n(a) Requirements. - A State agency shall establish a program of internal auditing that:\n(1) Promotes an effective system of internal controls that safeguards public funds and assets and minimizes incidences of fraud, waste, and abuse.\n(2) Determines if programs and business operations are administered in compliance with federal and state laws, regulations, and other requirements.\n(3) Reviews the effectiveness and efficiency of agency and program operations and service delivery.\n(4) Periodically audits the agency's major systems and controls, including:\na. Accounting systems and controls.\nb. Administrative systems and controls.\nc. Information technology systems and controls.\n(b) Internal Audit Standards. - Internal audits shall comply with current Standards for the Professional Practice of Internal Auditing issued by the Institute for Internal Auditors or, if appropriate, Government Auditing Standards issued by the Comptroller General of the United States.\n(c) Appointment and Qualifications of Internal Auditors. - Any State employee who performs the internal audit function shall meet the minimum qualifications for internal auditors established by the Office of State Human Resources, in consultation with the Council of Internal Auditing.\n(d) Director of Internal Auditing. - The agency head shall appoint a Director of Internal Auditing who shall report to, as designated by the agency head, (i) the agency head, (ii) the chief deputy or chief administrative assistant, or (iii) the agency governing board, or subcommittee thereof, if such a governing board exists. The Director of Internal Auditing shall be organizationally situated to avoid impairments to independence as defined in the auditing standards referenced in subsection (b) of this section.\n(e) If a State agency has insufficient personnel to comply with this section, the Office of State Budget and Management shall provide technical assistance. (2007-424, s. 1; 2013-382, s. 9.1(c); 2013-406, s. 1.)\n\n§ 143-747. Council of Internal Auditing.\n\n(a) The Council of Internal Auditing is created, consisting of the following members:\n(1) The State Controller who shall serve as Chair.\n(2) The State Budget Officer.\n(3) The Secretary of Administration.\n\n(4) The Attorney General.\n(5) The Secretary of Revenue.\n(6) The State Auditor who shall serve as a nonvoting member. The State Auditor may appoint a designee.\n(b) The Council shall be supported by the Office of State Budget and Management.\n\n(c) The Council shall:\n\n(1) Hold meetings at the call of the Chair or upon written request to the Chair by two members of the Council.\n(2) Keep minutes of all proceedings.\n(3) Promulgate guidelines for the uniformity and quality of State agency internal audit activities.\n(4) Recommend the number of internal audit employees required by each State agency.\n(5) Develop internal audit guides, technical manuals, and suggested best internal audit practices.\n(6) Administer an independent peer review system for each State agency internal audit activity; specify the frequency of such reviews consistent with applicable national standards; and assist agencies with selection of independent peer reviewers from other State agencies.\n(7) Provide central training sessions, professional development opportunities, and recognition programs for internal auditors.\n(8) Administer a program for sharing internal auditors among State agencies needing temporary assistance and assembly of interagency teams of internal auditors to conduct internal audits beyond the capacity of a single agency.\n(9) Maintain a central database of all annual internal audit plans; topics for review proposed by internal audit plans; internal audit reports issued and individual findings and recommendations from those reports.\n(10) Require reports in writing from any State agency relative to any internal audit matter.\n(11) If determined necessary by a majority vote of the council:\na. Conduct hearings relative to any attempts to interfere with, compromise, or intimidate an internal auditor.\nb. Inquire as to the effectiveness of any internal audit unit.\nc. Authorize the Chair to issue subpoenas for the appearance of any person or internal audit working papers, report drafts, and any other pertinent document or record regardless of physical form needed for the hearing.\n(12) Issue an annual report including, but not limited to, service efforts and accomplishments of State agency internal auditors and to propose legislation for consideration by the Governor and General Assembly. (2007-424, s. 1; 2013-406, s. 1.)\n\n§ 143-748. Confidentiality of internal audit work papers.\n\nInternal audit work papers are confidential except as otherwise provided in this section or upon subpoena issued by a duly authorized court. A published internal audit report is a public record as defined in G.S. 132-1 to the extent it does not include information which is confidential under State or federal law or would compromise the security of a State agency. An internal auditor shall maintain for 10 years a complete file of all audit reports and reports of other examinations, investigations, surveys, and reviews conducted under the internal auditor's authority. Audit work papers and other evidence and related supportive material directly pertaining to the work of the internal auditor's office shall be retained in accordance with Chapter 132 of the General Statutes. Unless otherwise prohibited by law and to promote intergovernmental cooperation and avoid unnecessary duplication of audit effort, audit work papers related to released audit reports shall be made available for inspection by duly authorized representatives of the State and federal government in connection with some matter officially before them. (2013-406, s. 1.)\n\n§ 143-749. Obstruction of audit.\n\nIt shall be a Class 2 misdemeanor for any officer, employee, or agent of a State agency subject to the provisions of this Article to willfully make or cause to be made to a State agency internal auditor or the internal auditor's designated representatives any false, misleading, or unfounded report for the purpose of interfering with the performance of any audit, special review, or investigation or to hinder or obstruct the State agency internal auditor or the internal auditor's designated representatives in the performance of their duties. (2013-406, s. 1.)\n\n[THIS PAGE INTENTIONALLY LEFT BLANK]\n\nAPPENDIX B STAFFING RECOMMENDATIONS\n\n[THIS PAGE INTENTIONALLY LEFT BLANK]\n\nInternal Audit Staffing Analysis and Recommendation for Minimal Staff Level\n\nAs of June 30, 2017\n\nAgencies at or above Minimum, Using Contractors or Using Shared Pool\n\nDepartment of Agriculture and Consumer Services\n\n4.00\n\nDepartment of Health and Human Services\n\nDepartment of Information Technology\n\nDepartment of Public Safety\n\nDepartment of Revenue\n\nDepartment of Secretary of State\n\n5\n\nDepartment of Transportation\n\nNorth Carolina Community College Central Office\n\nAppalachian State University\n\nEast Carolina University\n\nNorth Carolina A&T State University\n\nNorth Carolina Central University\n\nUniversity of North Carolina-Charlotte\n\nUniversity of North Carolina-Pembroke\n\nUniversity of North Carolina-Wilmington\n\n4\n\nWinston-Salem State University\n\nNorth Carolina School of Science & Math\n\nNorth Carolina School of the Arts\n\nNorth Carolina State Education Assistance Authority\n\nCommissioner of Banks\n\nDepartment of Labor\n\nOffice of State Auditor\n\nOffice of State Human Resources\n\nOffice of the Governor\n\n41.00\n\n3.00\n\n20.00\n\n3.00\n\n2.00\n\n25.00\n\n2.00\n\n5.00\n\n8.00\n\n4.00\n\n4.00\n\n5.00\n\n2.00\n\n4.00\n\n5.00\n\nContracting\n\nContracting\n\nContracting\n\nShared Pool\n\nShared Pool\n\nShared Pool\n\nShared Pool\n\nShared Pool\n\nState Board of Elections\n\nShared Pool\n\n1. Provides internal audit services to agencies under $70 million expenditures; Shared Pool agencies listed above. Department of Military and Veteran's Affairs receives service; however, they are not included in OSBM calculation.\n\n2. Provides internal audit services to North Carolina School for Science and Mathematics and NC State Education Assistance Authority which was considered in the calculation.\n\n3. Outsourced internal audit services.\n\n4. Provides internal audit services to North Carolina School for the Arts which was considered in the calculation.\n\n5. Agencies under $70 million operating may use OSBM internal audit services instead established an in-house internal audit function.\n</text>\n",
"role": "user"
},
{
"content": "ear, 64 professional development opportunities were identified and communicated.",
"role": "assistant"
}
] |
Dress and Appearance Policy
1. Policy statement
Cleveland Police are committed to delivering a high quality, cost effective and professional service. In support of this and in line with the code of ethics, it is important that all police officers and staff working with or on behalf of Cleveland Police portray a professional image which instils confidence, credibility and respect. It is therefore important that all staff understand the expectations set out around the high standards of personal appearance, dress and the personal responsibility required in pursuit of these values and priorities.
This policy applies to everyone who works for or on behalf of Cleveland Police all Police Officers both in uniform and non-uniform roles, police staff employed by the Chief Constable, special constables, cadets and volunteers engaged by the Chief Constable.
Uniform is provided in various roles and whilst this policy deals with the general principles of uniformity, every reasonable effort will be made to accommodate variations in uniform for religious and cultural reasons.
Where non-standard items of uniform are authorised and issued for particular duties or for specialist role, the items may not, as a matter of course, be worn for other duties or as a substitute for standard uniform.
Where a member of staff or police officer contradicts this policy, managers are expected to deal with issues promptly and robustly and in line with the code of ethics.
All supervisors / managers within every role and at every rank, have a responsibility to maintain the standards laid out within this policy and to challenge and ensure the standards are maintained by all staff at all times across the organisation. If required guidance on the application of this policy can be sought through the dress uniform and equipment group.
3. Underpinning procedures
Hair
Hair of all staff must be clean, neat and tidy. Supervisors must respect that colleagues will have different natural hair textures, so the definition of neat and tidy should be based on each individual.
To reduce risks the hair of all staff issued uniform by Cleveland Police must be either cut or secured above the collar and ears. It should not present a health and safety hazard. Hair must not impede individuals from wearing issued head gear, protective helmets or uniformed hats effectively.
For officers, PCSO's, Specials, uniformed police staff and other operational staff, pigtails and bunches are not acceptable due to officer safety implications
and any ponytails where the overall length exceeds the collar line, must be tied up in a low neat bun above the collar.
Non uniformed staff must ensure their appearance reflects the same high standards required of all other members of the force dependent upon their working environment. If the role is not one that requires face to face contact with the public there is room for discretion but must be smart and business like.
Regardless of role, hair will not be dyed in shades of conspicuously unnatural colours. Hair styles should look professional discreet and natural. They can be inclusive of people's cultural, faith or religious beliefs.
Facial hair
Moustaches, beards and sideburns, unless for religious or faith reasons, must be trimmed, neat and tidy. For health and safety reasons, within some roles such as operational policing, beards are not to be long and therefore would need to be tied up appropriately. Unshaven and stubbly facial hair (including 'Designer stubble') is not acceptable unless you have committed to growing a beard or moustache. This does not apply where there is a genuine medical reason not to shave is.
Eyebrow hair must not be shaved or styled to portray any pattern or design.
Again, regardless of role, any facial hair will not be dyed in shades of conspicuously unnatural colours.
In certain roles it may be necessary to adjust facial hair for afford the face fit of PPE equipment dependent upon role and at the advice and discretion of supervision.
Make up
All staff are welcome to wear makeup, those who choose to wear makeup are to aim for a neutral, professional appearance consistent with the role being undertaken. Make up to conceal a facial disfigurement or significant blemish is welcome. Make up appropriate for cultural, faith or religious belief is also welcome.
Nails
Nail varnish must be uniform across both hands and the length and style of false or natural nails must not hinder or prevent the performance of duty or present a risk to others.
Officers and staff will only wear neutral nail varnish and for health and safety reasons should keep their nails short and clean. Jewellery or attachments to nails are not permitted in these roles.
Jewellery
Operational staff must be aware of potential health and safety risks to yourselves, colleagues and members of the public when wearing any jewellery. Only a wristwatch, a wedding ring / partnership ring and one pair of stud earrings worn only in the ear lobe should be visible (in the case of a pair - one earring in each ear lobe). Sleepers or spacers are not to be worn. Cleveland police will not be held responsible for loss or damage of such items or any injury received as a result of wearing such items.
A bracelet or necklace for the purpose of medical alert or for cultural, faith or religious belief, can be worn but operational officers and staff must be aware of the health and safety risks and must discuss with their line manager. Such an item must be worn under the uniform to prevent any risks in a confrontational situation.
Sikh officers or staff are permitted to carry a miniature Kirpan, out of sight and beneath outer clothing.
Facial studs and visible body piercings are not permitted, which includes tongue piercing, nose, lips and eyebrows unless deemed acceptable and necessary for operational needs and in these circumstances can be worn only for that specific duty.
Metal should not be worn under the body armour due to safety issues. Any other body jewellery that is not visible must be assessed by the wearer. Such items pose the risk of injury should they become caught, detached, stuck or impaled into the wearers body. It is therefore recommended that such items are not worn and therefore will not be held responsible for damage caused of such items or injuries sustained.
If you are not operational and therefore there is no perceived risk or confrontation, you may wear jewellery provided it is not excessive and does not hinder or prevent the performance of duty or present a risk to others. Charity rubber bracelets can be worn by all staff and officers.
Sunglasses
Sunglasses should only be worn when on duty whilst driving a car, riding a motor bike or a bicycle, and only if conditions dictate their use to be appropriate. Sunglasses should not be worn in any other circumstance.
Mirrored or reflective lenses are not permitted and frames should be plain or neutral in colour. Glasses used for every day vision can be of any colour or design.
Sunglasses must always be removed when not driving and if stopped whilst driving, they must be removed as a matter of courtesy when speaking with a member of the public unless this will impede the effective performance of duty.
There is an exception if the glasses are medically required or are prescription glasses with transitional lenses.
When not wearing the sunglasses they are not to be placed on view about their person, hung upon on their uniform or worn around the head.
Tattoos / Body Art
Members of the public are now largely accepting of police officers with visible tattoos. Tattoos on the face are not acceptable unless for religious or medical reasons.
Any tattoo / body art (including henna) that is deemed inappropriate or offensive must be covered at all times when on duty.
In addition tattoos / body art whether visible or otherwise should not:
1. Undermine the dignity and authority of officers or staff
2. Indicate unacceptable attitudes towards any individual or section of the community
3. Indicate alignment to any particular group which could give offence to members of the public or colleagues
4. Be considered inflammatory, rude, crude, racist, sexist, homophobic, violent or intimidating.
The interpretation of offensive will take into consideration the sensitivity of the public and colleagues and the impact the design may have.
Chewing gum and smoking / Vaping
Chewing gum whilst on duty is not acceptable when on patrol or dealing with members of the public or other agencies
Smoking or Vaping is not permitted on police premises or within any police vehicles. When smoking off site any items of identification such as uniform or lanyards must be covered up.
Reasonable adjustments can be made for medical needs and requirements.
During travel
Avoid wearing 'half blues' when commuting to and from work, or to and from meetings in your own motor vehicle.
There is a national threat against police officers which is constantly assessed and there are members of the community that may wish to target those working for the police. Officers and uniformed police staff are therefore putting themselves at risk by wearing any element of their uniform visible when travelling to and from work, or to meetings in your own motor vehicles.
Personal Protective Equipment
Where Personal Protective Equipment (PPE) is issued for protection of officers and staff, it must be worn and employed appropriately for its intended purpose. It is the responsibility of the individuals to ensure that their equipment is maintained and continues to be fit for purpose.
Warrant and identity cards
Every Employee must carry their warrant/ identity card whilst on police premises and be able to produce their warrant/ identity card if required. The loss of these cards must be reported immediately due to the security risk it poses.
Warrant/identity cards must be on view and if worn on a lanyard, for security reasons, the lanyards must be 'official' and as supplied Cleveland Police or lanyards provided by their employer. It is everybody's responsibility to challenge when a warrant / identity card is not visible for security purposes.
Lanyards, and by implication Warrant Cards/Identification Cards must not be worn visible outside of the confines of the force estate if not undertaking policing duties. Operational line managers should indicate if wearing lanyards are appropriate by officers dependent upon their duties.
Non Uniformed police officers and staff
In order to present a professional and corporate image of the force to members of the public, standards of non-uniform dress must be in accordance with the professional image expected of Cleveland Police.
Staff members who perform non-uniformed duty must wear smart professional business attire appropriate to the role being undertaken. Business attire would be a suit, dress trousers, shirts with ties, skirts, blouses or appropriate dresses. It does not include jeans, polo shirts, hoodies or items of clothing that display any non-police logos, slogan or offensive words.
It is expected that shirts and tops will not be low cut, will not be strapless and will not be so short to expose the middle area of the stomach. Skirts and dresses must not be unnecessarily short in length, hemlines no more than two inches above the knee Trousers should be smart and not leggings, tracksuit bottoms, jeans of any colour or shorts.
Shoes should be professional. Flip flops, trainers of similar items to that of a training shoe or beach attire are not acceptable unless there is an existing medical condition and authorisation by supervision.
Officers engaged in covert operations will dress appropriately for their particular role or operation as directed by their Leadership team. When not engaged in this activity or operations the general standards of agreed non uniformed staff of business attire will apply.
Charity badges / pins that represent the police service or a charitable organisation or similar can be worn.
Clothing appropriate with religion and faith is welcomed, and reasonable adjustments can be made on an individual basis should there be a requirement around disability, mobility or other personal reasons. Any reasonable adjustments can be made with the individuals line manager however will always need to portray the smart professional image of the force.
UNIFORM AND EQUIPMENT
Uniform Officers, PCSO's, Uniformed police Staff and volunteers
Uniform can be ordered via the self service system. The uniform and equipment issued to you upon commencement of your role is the property of the force and you have the duty to take care of it. Items issued should not be sold or passed to a third party with any unused or unnecessary items returned to the force.
Certain specialist items of uniform are issued for specific tasks such as Public order, cycling, search and firearms. These specialist items should only be worn during the times in which that specific task is being undertaken. Outside of these specialist roles the standard uniform should be worn. Only items relevant to your role and skill set should be requested and authorised. Inspectors must not authorise any equipment that is not intended for the requesting individual.
If there is a requirement for any items of clothing to be adapted or altered for health reasons, or a requirement for items that are not issued as part of the general uniform to reflect culture or medical needs please discuss this with your line manager. Agreed alterations, adaptions and obtaining specialist items can be made or obtained with consideration of health and safety implications and the corporate image.
Where alterations are required on uniform issued this will be at the individuals expense however where the force are unable to provide a particular item of uniform, once agreed, the wearer will be reimbursed for the purchase. Uniform can only be altered for personal requirements and should not, under any circumstance, be adjusted, tapered or altered to change the integrity of the item for personal choice or fashion.
Plain or rainbow epaulettes are available. It is personal choice which people decide to order and wear and both are acceptable.
Where leather items are provided as part of the uniform such as boots, belts and gloves, non-leather items are available on request to anyone wishing an alternative.
Police staff Uniform
Some police staff roles within Cleveland Police require the employees to wear uniform. The uniform provided must be worn as is issued or approved by the force, and should be compliant with the expectations of each Departmental head. When epaulettes or sliders are provided these should always be on display whilst at work.
If footwear is issued this must always be worn throughout their tour of duty. Others in uniform must wear a black flat shoe that is in keeping with the uniform worn. Heeled shoes or boots are not to be worn.
PCSO Uniform
General PCSO uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity, weather and duty being undertaken.
PCSO wicking shirt - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No items of personal non uniformed clothing should be visible under the wicking shirt. There is an option of long or short sleeves dependant on choice, and shirts should always be worn with an epaulette or slider clearly identifying who they are.
Black Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.
Black lace up boots. These must be kept clean, well-polished and in good order.
Socks must be black or dark in colour
Fleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.
Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose. Caring for body armour is further explained in Appendix A
Jacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible
Head wear – caps and bowlers to be worn dependant on rank and role. PCSOs who are on foot patrol or general duties must wear the flat cap or bowler hat at all times. See exceptions around religious, cultural and alternative headwear for religious or cultural requirements.
Tie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.
Police Officer Uniform
General Police uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity i.e.
General day to day policing uniform will be:
Police Officer wicking Shirts - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No personal items of clothing should be visible under the wicking shirt. There is a choice of long or short sleeve dependant on choice.
Black Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.
Boots - Black lace up boots are provided. These must be kept clean, wellpolished and in good order.
Socks must be black or dark in colour
Fleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.
Body armour - Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose.
Caring for body armour is further explained in Appendix A
Utility belt - Utility belt should be worn over the hips over the outer clothing. Only Cleveland Police issued PPE should be carried on this belt with the exception of a personal multi tool which, based on individuals choice, can be carried on the belt secured in a black pouch.
For medical reasons if you are unable to wear a utility belt other vest options are available via the individual's supervisor.
Jacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible.
Tie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.
Gloves- black leather gloves are provided to all officers with Chief inspectors and above issued with brown gloves. These are slash resistant and should be worn with the uniform if and when required due to risk assessment or weather.
Hats and helmets - These are an important part of the uniform and should be worn at all times when performing uniformed duties within the public domain unless prevented from doing so by the urgency / nature of the particular duty or at the discretion of the Senior Leadership Team.
Officers who are on foot patrol or general policing duties must wear the police helmet, or bowler hat depending upon rank and role.
Police flat caps can only be worn by Inspectors or above or by officers who have these provided as part of their specific uniform for their role.
Other headwear may be provided and must be worn for specific duties or tasks upon direction of the supervision. This specialist headwear must not be worn as part of general uniform outside of these roles.
Specialist officers are issued with a woollen hat. Woollen hats are no longer issued routinely by Cleveland Police to all officers and unless you are an identified specialist officer any previously issued woollen hat should not be worn as part of the uniform at any time.
**Exceptions to headwear or PCSOs and Officers based on religion or culture;
If religion, culture or belief means a cap, helmet, or bowler hat is inappropriate for an individual, alternative options based on individual requirements can be arranged through discussion with supervision. In some instances it may be possible to wear a combination such as a skull cap underneath the police flat cap, bowler or helmet.
Some headwear is issued for personal protection due to health and safety legislation such as public order and method of entry officers and therefore there may be no suitable alternative. Each case will be treat on an individual basis and considerations will be given reach a suitable solution or alternative such as
wearing alternative headwear under protective headwear. Marking of PSU helmets is further explained in Appendix B
Police Chief Inspectors and above are also issued with;
White cotton shirts - either short sleeved or long sleeved. There is a male or female styled shirt which are available to all.
Shirts should always be worn with the collar fastened with a black tie. Epaulettes must always be worn and be visible. Ties must always be worn when visible to the public regardless of weather or activity.
Tie pins must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others.
Black wicker shirts can be worn at the officer's discretion if they are not performing a front facing role. These black shirts must have epaulettes or sliders clearly on show and should be worn with the cargo style trouser.
Clothing for maternity – Maternity uniform is available to those in uniformed roles. This can be requested and will be ordered on an individual basis. It is the individual's choice whether they wish to order this uniform or wear their own clothing.
Special Occasions
Dress Uniform
If you attend an occasion it is important to maintain dress uniformity and staff should wear smart operational uniform.
Tunics are no longer individually issued to officers however a small supply are available to loan on request from stores if required.
Tunics must be worn with a white shirt, black tie, black dress trousers or a skirt. Medals should only be worn on formal/ceremonial occasions or as directed by a specific Operational Order. They should be positioned over the left breast and in order of importance from right to left.
Dress When Attending Court –
Unless authorised to perform plain clothes duty officers must, unless directed by the judge, attend court in their full general police uniform with appointments, looking smart and clean in appearance. Tunics are no longer required to be worn. Non uniformed staff should wear smart professional business attire keeping with the dignity of the court.
Non uniformed officers should also take their appointments with them and have them available within the court building.
Officers and staff are on duty when they are in court and help reassure court users and court staff whilst in public areas.
Court covers any environment where you are called upon to provide evidence such as magistrate's court, Crown court, Coroners court, civil court or Employment Tribunal (not exhaustive)
Civil Events
Permission to wear operational uniform at civil events comes from the Chief Constable
Challenging dress standards
Supervisors are expected to manage dress and appearance of their teams and to challenge those failing to adhere to the standards. Those who fail to follow the policy will be addressed appropriately through supervisory action.
ANY REQUESTS FOR DEVIATION FROM THIS POLICY OR NEW ITEMS OF UNIFORM MUST GO TO THE UNIFORM USER GROUP FOR AUTHORISATION AND APPROVAL
Process for approval of new/alternative uniform items/equipment
For all requests for new/alternative uniform items/equipment a Business Case should be completed by the owner and submitted for decision at the Dress, Appearance & Equipment Group. This will be discussed by the Group and a decision will be logged on the minutes and emailed to the owner by the Chair. It is unacceptable to sell or pass on any uniform issued or supplied by Cleveland Police.
Reasonable adjustments are available on a case by case basis based on individual circumstances. These will be managed by their supervision, however, will in keeping with this policy of portraying a smart and professional image
4. Appendices
5. Compliance and monitoring
The Executive are responsible for the accuracy and integrity of this document. This policy will be continuously monitored, and updated when appropriate, to ensure full compliance with legislation.
The Executive will review this process to ensure that all aspects are being adhered to in accordance with the framework of this policy.
6. Version control
This policy will be reviewed and updated at least every three years by the owner, and more frequently if necessary.
The Corporate Services Department will ensure this document is available on the Force intranet, including any interim updates.
The following identifies all version changes.
Wearing and Caring for your Body Armour
These guidelines have been produced to assist you whilst wearing and caring for your body armour.
They are intended to raise your awareness in relation to safety, hygiene and storage.
You should be aware that you can still be vulnerable to attack when wearing body armour. It is designed to provide protection against unknown threats.
Force policy stipulates that the wearing of body armour, when on operational duties, is mandatory. Body armour should have a black cover.
Under Health and Safety Legislation, Police Officers and Police Staff have a duty to wear protective clothing and equipment which has been provided for their safety. It is essential, therefore, that body armour fits correctly. To ensure the best fit, this armour has been personally fitted and manufactured to individual size and posture. In the interests of hygiene, it is important that all Police Officers/Police Staff wash their armour carrier regularly in accordance with the manufacturer's instructions.
The body armour issued to has been designed with a built in ventilation system which has proven to be effective in reducing perspiration problems. However, no body armour system can completely eliminate this problem. In warmer weather, to avoid de-hydration, the body armour should be removed periodically where practicable. Police Officers/Police Staff are reminded to maintain body fluid levels and regular intakes of water may be required.
The armour offers some protection against ballistic threat (HGI) and also against stabbing/slashing (KRI) attacks. However, body armour does not offer total protection. Police Officers and Police Staff should always be aware of potential health and safety risks at all times, particularly when attending incidents.
All managers and supervisors have a responsibility to ensure their staff attend Personal Safety Training if appropriate to their role.
The body armour should be inspected for signs of damage to armour panels when washing the cover.
1. The armour panels should be inspected when the armour has had any physical contact with an object likely to cause damage.
2. The outer cover should be cleaned by machine washing following manufacturer's instructions.
3. Armour panels should be removed during washing and the guidelines below should be followed.
Ballistic/Stab Panel
The panels within body armour should not be hand or machine washed. The following maintenance process should be followed.
1. Check that the label is still distinguishable.
2. Look for broken seams or perforations in panel.
3. Wipe with a damp cloth (detergents, soap etc. should not be used).
4. Allow panels to dry naturally away from sunlight and direct sources of heat.
Outer Covers
Ensure that all panels are removed before laundering.
Close all fastenings (velcro and zip).
Covers may be hand washed or machine washed.
Hand Wash - hand hot not to exceed 40 0 C, cold rinse, cool iron, dry thoroughly before re-inserting your panels.
Machine Wash - 40 0 C wash cycle, spin dry, tumble dry on cool setting, cool iron. Always refer to washing instructions on garment. Dry garment thoroughly before re-inserting your panels.
Identification Marking of Public Order Helmets
A standardised layout for helmet markings is necessary for the ease of identification of Officers engaged on Mutual Aid.
General Uniform available for initial issue to Officers and Special Constables
General Uniform available for initial issue to PCSO's
6
3
2
1
1
1
1
1
1
1
1
1
1
|
<urn:uuid:8374168f-4fc6-4639-afb2-1fb8a946c744>
|
CC-MAIN-2022-49
|
https://www.cleveland.police.uk/SysSiteAssets/foi-media/cleveland/publication-scheme/our-policies-and-procedures/25-dress-and-appearance-policy-v2.0_redacted.pdf
|
2022-12-07T22:44:50+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-49/subset=warc/part-00042-a0906200-461b-4808-9b94-6c53daf73f61.c000.gz.parquet
| 735,463,929
| 5,801
|
eng_Latn
|
eng_Latn
| 0.989705
|
eng_Latn
| 0.998403
|
[
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
27,
2524,
4735,
7265,
9315,
11943,
14427,
16869,
19243,
21943,
24167,
25669,
26346,
28593,
29545,
29715,
29874,
29889
] |
Dress and Appearance Policy
1. Policy statement
Cleveland Police are committed to delivering a high quality, cost effective and professional service. In support of this and in line with the code of ethics, it is important that all police officers and staff working with or on behalf of Cleveland Police portray a professional image which instils confidence, credibility and respect. It is therefore important that all staff understand the expectations set out around the high standards of personal appearance, dress and the personal responsibility required in pursuit of these values and priorities.
This policy applies to everyone who works for or on behalf of Cleveland Police all Police Officers both in uniform and non-uniform roles, police staff employed by the Chief Constable, special constables, cadets and volunteers engaged by the Chief Constable.
Uniform is provided in various roles and whilst this policy deals with the general principles of uniformity, every reasonable effort will be made to accommodate variations in uniform for religious and cultural reasons.
Where non-standard items of uniform are authorised and issued for particular duties or for specialist role, the items may not, as a matter of course, be worn for other duties or as a substitute for standard uniform.
Where a member of staff or police officer contradicts this policy, managers are expected to deal with issues promptly and robustly and in line with the code of ethics.
All supervisors / managers within every role and at every rank, have a responsibility to maintain the standards laid out within this policy and to challenge and ensure the standards are maintained by all staff at all times across the organisation. If required guidance on the application of this policy can be sought through the dress uniform and equipment group.
3. Underpinning procedures
Hair
Hair of all staff must be clean, neat and tidy. Supervisors must respect that colleagues will have different natural hair textures, so the definition of neat and tidy should be based on each individual.
To reduce risks the hair of all staff issued uniform by Cleveland Police must be either cut or secured above the collar and ears. It should not present a health and safety hazard. Hair must not impede individuals from wearing issued head gear, protective helmets or uniformed hats effectively.
For officers, PCSO's, Specials, uniformed police staff and other operational staff, pigtails and bunches are not acceptable due to officer safety implications
and any ponytails where the overall length exceeds the collar line, must be tied up in a low neat bun above the collar.
Non uniformed staff must ensure their appearance reflects the same high standards required of all other members of the force dependent upon their working environment. If the role is not one that requires face to face contact with the public there is room for discretion but must be smart and business like.
Regardless of role, hair will not be dyed in shades of conspicuously unnatural colours. Hair styles should look professional discreet and natural. They can be inclusive of people's cultural, faith or religious beliefs.
Facial hair
Moustaches, beards and sideburns, unless for religious or faith reasons, must be trimmed, neat and tidy. For health and safety reasons, within some roles such as operational policing, beards are not to be long and therefore would need to be tied up appropriately. Unshaven an
|
d stubbly facial hair (including 'Designer stubble') is not acceptable unless you have committed to growing a beard or moustache.
|
This does not apply where there is a genuine medical reason not to shave is.
Eyebrow hair must not be shaved or styled to portray any pattern or design.
Again, regardless of role, any facial hair will not be dyed in shades of conspicuously unnatural colours.
In certain roles it may be necessary to adjust facial hair for afford the face fit of PPE equipment dependent upon role and at the advice and discretion of supervision.
Make up
All staff are welcome to wear makeup, those who choose to wear makeup are to aim for a neutral, professional appearance consistent with the role being undertaken. Make up to conceal a facial disfigurement or significant blemish is welcome. Make up appropriate for cultural, faith or religious belief is also welcome.
Nails
Nail varnish must be uniform across both hands and the length and style of false or natural nails must not hinder or prevent the performance of duty or present a risk to others.
Officers and staff will only wear neutral nail varnish and for health and safety reasons should keep their nails short and clean. Jewellery or attachments to nails are not permitted in these roles.
Jewellery
Operational staff must be aware of potential health and safety risks to yourselves, colleagues and members of the public when wearing any jewellery. Only a wristwatch, a wedding ring / partnership ring and one pair of stud earrings worn only in the ear lobe should be visible (in the case of a pair - one earring in each ear lobe). Sleepers or spacers are not to be worn. Cleveland police will not be held responsible for loss or damage of such items or any injury received as a result of wearing such items.
A bracelet or necklace for the purpose of medical alert or for cultural, faith or religious belief, can be worn but operational officers and staff must be aware of the health and safety risks and must discuss with their line manager. Such an item must be worn under the uniform to prevent any risks in a confrontational situation.
Sikh officers or staff are permitted to carry a miniature Kirpan, out of sight and beneath outer clothing.
Facial studs and visible body piercings are not permitted, which includes tongue piercing, nose, lips and eyebrows unless deemed acceptable and necessary for operational needs and in these circumstances can be worn only for that specific duty.
Metal should not be worn under the body armour due to safety issues. Any other body jewellery that is not visible must be assessed by the wearer. Such items pose the risk of injury should they become caught, detached, stuck or impaled into the wearers body. It is therefore recommended that such items are not worn and therefore will not be held responsible for damage caused of such items or injuries sustained.
If you are not operational and therefore there is no perceived risk or confrontation, you may wear jewellery provided it is not excessive and does not hinder or prevent the performance of duty or present a risk to others. Charity rubber bracelets can be worn by all staff and officers.
Sunglasses
Sunglasses should only be worn when on duty whilst driving a car, riding a motor bike or a bicycle, and only if conditions dictate their use to be appropriate. Sunglasses should not be worn in any other circumstance.
Mirrored or reflective lenses are not permitted and frames should be plain or neutral in colour. Glasses used for every day vision can be of any colour or design.
Sunglasses must always be removed when not driving and if stopped whilst driving, they must be removed as a matter of courtesy when speaking with a member of the public unless this will impede the effective performance of duty.
There is an exception if the glasses are medically required or are prescription glasses with transitional lenses.
When not wearing the sunglasses they are not to be placed on view about their person, hung upon on their uniform or worn around the head.
Tattoos / Body Art
Members of the public are now largely accepting of police officers with visible tattoos. Tattoos on the face are not acceptable unless for religious or medical reasons.
Any tattoo / body art (including henna) that is deemed inappropriate or offensive must be covered at all times when on duty.
In addition tattoos / body art whether visible or otherwise should not:
1. Undermine the dignity and authority of officers or staff
2. Indicate unacceptable attitudes towards any individual or section of the community
3. Indicate alignment to any particular group which could give offence to members of the public or colleagues
4. Be considered inflammatory, rude, crude, racist, sexist, homophobic, violent or intimidating.
The interpretation of offensive will take into consideration the sensitivity of the public and colleagues and the impact the design may have.
Chewing gum and smoking / Vaping
Chewing gum whilst on duty is not acceptable when on patrol or dealing with members of the public or other agencies
Smoking or Vaping is not permitted on police premises or within any police vehicles. When smoking off site any items of identification such as uniform or lanyards must be covered up.
Reasonable adjustments can be made for medical needs and requirements.
During travel
Avoid wearing 'half blues' when commuting to and from work, or to and from meetings in your own motor vehicle.
There is a national threat against police officers which is constantly assessed and there are members of the community that may wish to target those working for the police. Officers and uniformed police staff are therefore putting themselves at risk by wearing any element of their uniform visible when travelling to and from work, or to meetings in your own motor vehicles.
Personal Protective Equipment
Where Personal Protective Equipment (PPE) is issued for protection of officers and staff, it must be worn and employed appropriately for its intended purpose. It is the responsibility of the individuals to ensure that their equipment is maintained and continues to be fit for purpose.
Warrant and identity cards
Every Employee must carry their warrant/ identity card whilst on police premises and be able to produce their warrant/ identity card if required. The loss of these cards must be reported immediately due to the security risk it poses.
Warrant/identity cards must be on view and if worn on a lanyard, for security reasons, the lanyards must be 'official' and as supplied Cleveland Police or lanyards provided by their employer. It is everybody's responsibility to challenge when a warrant / identity card is not visible for security purposes.
Lanyards, and by implication Warrant Cards/Identification Cards must not be worn visible outside of the confines of the force estate if not undertaking policing duties. Operational line managers should indicate if wearing lanyards are appropriate by officers dependent upon their duties.
Non Uniformed police officers and staff
In order to present a professional and corporate image of the force to members of the public, standards of non-uniform dress must be in accordance with the professional image expected of Cleveland Police.
Staff members who perform non-uniformed duty must wear smart professional business attire appropriate to the role being undertaken. Business attire would be a suit, dress trousers, shirts with ties, skirts, blouses or appropriate dresses. It does not include jeans, polo shirts, hoodies or items of clothing that display any non-police logos, slogan or offensive words.
It is expected that shirts and tops will not be low cut, will not be strapless and will not be so short to expose the middle area of the stomach. Skirts and dresses must not be unnecessarily short in length, hemlines no more than two inches above the knee Trousers should be smart and not leggings, tracksuit bottoms, jeans of any colour or shorts.
Shoes should be professional. Flip flops, trainers of similar items to that of a training shoe or beach attire are not acceptable unless there is an existing medical condition and authorisation by supervision.
Officers engaged in covert operations will dress appropriately for their particular role or operation as directed by their Leadership team. When not engaged in this activity or operations the general standards of agreed non uniformed staff of business attire will apply.
Charity badges / pins that represent the police service or a charitable organisation or similar can be worn.
Clothing appropriate with religion and faith is welcomed, and reasonable adjustments can be made on an individual basis should there be a requirement around disability, mobility or other personal reasons. Any reasonable adjustments can be made with the individuals line manager however will always need to portray the smart professional image of the force.
UNIFORM AND EQUIPMENT
Uniform Officers, PCSO's, Uniformed police Staff and volunteers
Uniform can be ordered via the self service system. The uniform and equipment issued to you upon commencement of your role is the property of the force and you have the duty to take care of it. Items issued should not be sold or passed to a third party with any unused or unnecessary items returned to the force.
Certain specialist items of uniform are issued for specific tasks such as Public order, cycling, search and firearms. These specialist items should only be worn during the times in which that specific task is being undertaken. Outside of these specialist roles the standard uniform should be worn. Only items relevant to your role and skill set should be requested and authorised. Inspectors must not authorise any equipment that is not intended for the requesting individual.
If there is a requirement for any items of clothing to be adapted or altered for health reasons, or a requirement for items that are not issued as part of the general uniform to reflect culture or medical needs please discuss this with your line manager. Agreed alterations, adaptions and obtaining specialist items can be made or obtained with consideration of health and safety implications and the corporate image.
Where alterations are required on uniform issued this will be at the individuals expense however where the force are unable to provide a particular item of uniform, once agreed, the wearer will be reimbursed for the purchase. Uniform can only be altered for personal requirements and should not, under any circumstance, be adjusted, tapered or altered to change the integrity of the item for personal choice or fashion.
Plain or rainbow epaulettes are available. It is personal choice which people decide to order and wear and both are acceptable.
Where leather items are provided as part of the uniform such as boots, belts and gloves, non-leather items are available on request to anyone wishing an alternative.
Police staff Uniform
Some police staff roles within Cleveland Police require the employees to wear uniform. The uniform provided must be worn as is issued or approved by the force, and should be compliant with the expectations of each Departmental head. When epaulettes or sliders are provided these should always be on display whilst at work.
If footwear is issued this must always be worn throughout their tour of duty. Others in uniform must wear a black flat shoe that is in keeping with the uniform worn. Heeled shoes or boots are not to be worn.
PCSO Uniform
General PCSO uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity, weather and duty being undertaken.
PCSO wicking shirt - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No items of personal non uniformed clothing should be visible under the wicking shirt. There is an option of long or short sleeves dependant on choice, and shirts should always be worn with an epaulette or slider clearly identifying who they are.
Black Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.
Black lace up boots. These must be kept clean, well-polished and in good order.
Socks must be black or dark in colour
Fleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.
Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose. Caring for body armour is further explained in Appendix A
Jacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible
Head wear – caps and bowlers to be worn dependant on rank and role. PCSOs who are on foot patrol or general duties must wear the flat cap or bowler hat at all times. See exceptions around religious, cultural and alternative headwear for religious or cultural requirements.
Tie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.
Police Officer Uniform
General Police uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity i.e.
General day to day policing uniform will be:
Police Officer wicking Shirts - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No personal items of clothing should be visible under the wicking shirt. There is a choice of long or short sleeve dependant on choice.
Black Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.
Boots - Black lace up boots are provided. These must be kept clean, wellpolished and in good order.
Socks must be black or dark in colour
Fleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.
Body armour - Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose.
Caring for body armour is further explained in Appendix A
Utility belt - Utility belt should be worn over the hips over the outer clothing. Only Cleveland Police issued PPE should be carried on this belt with the exception of a personal multi tool which, based on individuals choice, can be carried on the belt secured in a black pouch.
For medical reasons if you are unable to wear a utility belt other vest options are available via the individual's supervisor.
Jacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible.
Tie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.
Gloves- black leather gloves are provided to all officers with Chief inspectors and above issued with brown gloves. These are slash resistant and should be worn with the uniform if and when required due to risk assessment or weather.
Hats and helmets - These are an important part of the uniform and should be worn at all times when performing uniformed duties within the public domain unless prevented from doing so by the urgency / nature of the particular duty or at the discretion of the Senior Leadership Team.
Officers who are on foot patrol or general policing duties must wear the police helmet, or bowler hat depending upon rank and role.
Police flat caps can only be worn by Inspectors or above or by officers who have these provided as part of their specific uniform for their role.
Other headwear may be provided and must be worn for specific duties or tasks upon direction of the supervision. This specialist headwear must not be worn as part of general uniform outside of these roles.
Specialist officers are issued with a woollen hat. Woollen hats are no longer issued routinely by Cleveland Police to all officers and unless you are an identified specialist officer any previously issued woollen hat should not be worn as part of the uniform at any time.
**Exceptions to headwear or PCSOs and Officers based on religion or culture;
If religion, culture or belief means a cap, helmet, or bowler hat is inappropriate for an individual, alternative options based on individual requirements can be arranged through discussion with supervision. In some instances it may be possible to wear a combination such as a skull cap underneath the police flat cap, bowler or helmet.
Some headwear is issued for personal protection due to health and safety legislation such as public order and method of entry officers and therefore there may be no suitable alternative. Each case will be treat on an individual basis and considerations will be given reach a suitable solution or alternative such as
wearing alternative headwear under protective headwear. Marking of PSU helmets is further explained in Appendix B
Police Chief Inspectors and above are also issued with;
White cotton shirts - either short sleeved or long sleeved. There is a male or female styled shirt which are available to all.
Shirts should always be worn with the collar fastened with a black tie. Epaulettes must always be worn and be visible. Ties must always be worn when visible to the public regardless of weather or activity.
Tie pins must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others.
Black wicker shirts can be worn at the officer's discretion if they are not performing a front facing role. These black shirts must have epaulettes or sliders clearly on show and should be worn with the cargo style trouser.
Clothing for maternity – Maternity uniform is available to those in uniformed roles. This can be requested and will be ordered on an individual basis. It is the individual's choice whether they wish to order this uniform or wear their own clothing.
Special Occasions
Dress Uniform
If you attend an occasion it is important to maintain dress uniformity and staff should wear smart operational uniform.
Tunics are no longer individually issued to officers however a small supply are available to loan on request from stores if required.
Tunics must be worn with a white shirt, black tie, black dress trousers or a skirt. Medals should only be worn on formal/ceremonial occasions or as directed by a specific Operational Order. They should be positioned over the left breast and in order of importance from right to left.
Dress When Attending Court –
Unless authorised to perform plain clothes duty officers must, unless directed by the judge, attend court in their full general police uniform with appointments, looking smart and clean in appearance. Tunics are no longer required to be worn. Non uniformed staff should wear smart professional business attire keeping with the dignity of the court.
Non uniformed officers should also take their appointments with them and have them available within the court building.
Officers and staff are on duty when they are in court and help reassure court users and court staff whilst in public areas.
Court covers any environment where you are called upon to provide evidence such as magistrate's court, Crown court, Coroners court, civil court or Employment Tribunal (not exhaustive)
Civil Events
Permission to wear operational uniform at civil events comes from the Chief Constable
Challenging dress standards
Supervisors are expected to manage dress and appearance of their teams and to challenge those failing to adhere to the standards. Those who fail to follow the policy will be addressed appropriately through supervisory action.
ANY REQUESTS FOR DEVIATION FROM THIS POLICY OR NEW ITEMS OF UNIFORM MUST GO TO THE UNIFORM USER GROUP FOR AUTHORISATION AND APPROVAL
Process for approval of new/alternative uniform items/equipment
For all requests for new/alternative uniform items/equipment a Business Case should be completed by the owner and submitted for decision at the Dress, Appearance & Equipment Group. This will be discussed by the Group and a decision will be logged on the minutes and emailed to the owner by the Chair. It is unacceptable to sell or pass on any uniform issued or supplied by Cleveland Police.
Reasonable adjustments are available on a case by case basis based on individual circumstances. These will be managed by their supervision, however, will in keeping with this policy of portraying a smart and professional image
4. Appendices
5. Compliance and monitoring
The Executive are responsible for the accuracy and integrity of this document. This policy will be continuously monitored, and updated when appropriate, to ensure full compliance with legislation.
The Executive will review this process to ensure that all aspects are being adhered to in accordance with the framework of this policy.
6. Version control
This policy will be reviewed and updated at least every three years by the owner, and more frequently if necessary.
The Corporate Services Department will ensure this document is available on the Force intranet, including any interim updates.
The following identifies all version changes.
Wearing and Caring for your Body Armour
These guidelines have been produced to assist you whilst wearing and caring for your body armour.
They are intended to raise your awareness in relation to safety, hygiene and storage.
You should be aware that you can still be vulnerable to attack when wearing body armour. It is designed to provide protection against unknown threats.
Force policy stipulates that the wearing of body armour, when on operational duties, is mandatory. Body armour should have a black cover.
Under Health and Safety Legislation, Police Officers and Police Staff have a duty to wear protective clothing and equipment which has been provided for their safety. It is essential, therefore, that body armour fits correctly. To ensure the best fit, this armour has been personally fitted and manufactured to individual size and posture. In the interests of hygiene, it is important that all Police Officers/Police Staff wash their armour carrier regularly in accordance with the manufacturer's instructions.
The body armour issued to has been designed with a built in ventilation system which has proven to be effective in reducing perspiration problems. However, no body armour system can completely eliminate this problem. In warmer weather, to avoid de-hydration, the body armour should be removed periodically where practicable. Police Officers/Police Staff are reminded to maintain body fluid levels and regular intakes of water may be required.
The armour offers some protection against ballistic threat (HGI) and also against stabbing/slashing (KRI) attacks. However, body armour does not offer total protection. Police Officers and Police Staff should always be aware of potential health and safety risks at all times, particularly when attending incidents.
All managers and supervisors have a responsibility to ensure their staff attend Personal Safety Training if appropriate to their role.
The body armour should be inspected for signs of damage to armour panels when washing the cover.
1. The armour panels should be inspected when the armour has had any physical contact with an object likely to cause damage.
2. The outer cover should be cleaned by machine washing following manufacturer's instructions.
3. Armour panels should be removed during washing and the guidelines below should be followed.
Ballistic/Stab Panel
The panels within body armour should not be hand or machine washed. The following maintenance process should be followed.
1. Check that the label is still distinguishable.
2. Look for broken seams or perforations in panel.
3. Wipe with a damp cloth (detergents, soap etc. should not be used).
4. Allow panels to dry naturally away from sunlight and direct sources of heat.
Outer Covers
Ensure that all panels are removed before laundering.
Close all fastenings (velcro and zip).
Covers may be hand washed or machine washed.
Hand Wash - hand hot not to exceed 40 0 C, cold rinse, cool iron, dry thoroughly before re-inserting your panels.
Machine Wash - 40 0 C wash cycle, spin dry, tumble dry on cool setting, cool iron. Always refer to washing instructions on garment. Dry garment thoroughly before re-inserting your panels.
Identification Marking of Public Order Helmets
A standardised layout for helmet markings is necessary for the ease of identification of Officers engaged on Mutual Aid.
General Uniform available for initial issue to Officers and Special Constables
General Uniform available for initial issue to PCSO's
6
3
2
1
1
1
1
1
1
1
1
1
1
| 3,463
|
inside_word
|
and
|
remove_one_sentence
|
<url>
https://www.cleveland.police.uk/SysSiteAssets/foi-media/cleveland/publication-scheme/our-policies-and-procedures/25-dress-and-appearance-policy-v2.0_redacted.pdf
</url>
<text>
Dress and Appearance Policy
1. Policy statement
Cleveland Police are committed to delivering a high quality, cost effective and professional service. In support of this and in line with the code of ethics, it is important that all police officers and staff working with or on behalf of Cleveland Police portray a professional image which instils confidence, credibility and respect. It is therefore important that all staff understand the expectations set out around the high standards of personal appearance, dress and the personal responsibility required in pursuit of these values and priorities.
This policy applies to everyone who works for or on behalf of Cleveland Police all Police Officers both in uniform and non-uniform roles, police staff employed by the Chief Constable, special constables, cadets and volunteers engaged by the Chief Constable.
Uniform is provided in various roles and whilst this policy deals with the general principles of uniformity, every reasonable effort will be made to accommodate variations in uniform for religious and cultural reasons.
Where non-standard items of uniform are authorised and issued for particular duties or for specialist role, the items may not, as a matter of course, be worn for other duties or as a substitute for standard uniform.
Where a member of staff or police officer contradicts this policy, managers are expected to deal with issues promptly and robustly and in line with the code of ethics.
All supervisors / managers within every role and at every rank, have a responsibility to maintain the standards laid out within this policy and to challenge and ensure the standards are maintained by all staff at all times across the organisation. If required guidance on the application of this policy can be sought through the dress uniform and equipment group.
3. Underpinning procedures
Hair
Hair of all staff must be clean, neat and tidy. Supervisors must respect that colleagues will have different natural hair textures, so the definition of neat and tidy should be based on each individual.
To reduce risks the hair of all staff issued uniform by Cleveland Police must be either cut or secured above the collar and ears. It should not present a health and safety hazard. Hair must not impede individuals from wearing issued head gear, protective helmets or uniformed hats effectively.
For officers, PCSO's, Specials, uniformed police staff and other operational staff, pigtails and bunches are not acceptable due to officer safety implications
and any ponytails where the overall length exceeds the collar line, must be tied up in a low neat bun above the collar.
Non uniformed staff must ensure their appearance reflects the same high standards required of all other members of the force dependent upon their working environment. If the role is not one that requires face to face contact with the public there is room for discretion but must be smart and business like.
Regardless of role, hair will not be dyed in shades of conspicuously unnatural colours. Hair styles should look professional discreet and natural. They can be inclusive of people's cultural, faith or religious beliefs.
Facial hair
Moustaches, beards and sideburns, unless for religious or faith reasons, must be trimmed, neat and tidy. For health and safety reasons, within some roles such as operational policing, beards are not to be long and therefore would need to be tied up appropriately. Unshaven an<cursor_is_here> This does not apply where there is a genuine medical reason not to shave is.
Eyebrow hair must not be shaved or styled to portray any pattern or design.
Again, regardless of role, any facial hair will not be dyed in shades of conspicuously unnatural colours.
In certain roles it may be necessary to adjust facial hair for afford the face fit of PPE equipment dependent upon role and at the advice and discretion of supervision.
Make up
All staff are welcome to wear makeup, those who choose to wear makeup are to aim for a neutral, professional appearance consistent with the role being undertaken. Make up to conceal a facial disfigurement or significant blemish is welcome. Make up appropriate for cultural, faith or religious belief is also welcome.
Nails
Nail varnish must be uniform across both hands and the length and style of false or natural nails must not hinder or prevent the performance of duty or present a risk to others.
Officers and staff will only wear neutral nail varnish and for health and safety reasons should keep their nails short and clean. Jewellery or attachments to nails are not permitted in these roles.
Jewellery
Operational staff must be aware of potential health and safety risks to yourselves, colleagues and members of the public when wearing any jewellery. Only a wristwatch, a wedding ring / partnership ring and one pair of stud earrings worn only in the ear lobe should be visible (in the case of a pair - one earring in each ear lobe). Sleepers or spacers are not to be worn. Cleveland police will not be held responsible for loss or damage of such items or any injury received as a result of wearing such items.
A bracelet or necklace for the purpose of medical alert or for cultural, faith or religious belief, can be worn but operational officers and staff must be aware of the health and safety risks and must discuss with their line manager. Such an item must be worn under the uniform to prevent any risks in a confrontational situation.
Sikh officers or staff are permitted to carry a miniature Kirpan, out of sight and beneath outer clothing.
Facial studs and visible body piercings are not permitted, which includes tongue piercing, nose, lips and eyebrows unless deemed acceptable and necessary for operational needs and in these circumstances can be worn only for that specific duty.
Metal should not be worn under the body armour due to safety issues. Any other body jewellery that is not visible must be assessed by the wearer. Such items pose the risk of injury should they become caught, detached, stuck or impaled into the wearers body. It is therefore recommended that such items are not worn and therefore will not be held responsible for damage caused of such items or injuries sustained.
If you are not operational and therefore there is no perceived risk or confrontation, you may wear jewellery provided it is not excessive and does not hinder or prevent the performance of duty or present a risk to others. Charity rubber bracelets can be worn by all staff and officers.
Sunglasses
Sunglasses should only be worn when on duty whilst driving a car, riding a motor bike or a bicycle, and only if conditions dictate their use to be appropriate. Sunglasses should not be worn in any other circumstance.
Mirrored or reflective lenses are not permitted and frames should be plain or neutral in colour. Glasses used for every day vision can be of any colour or design.
Sunglasses must always be removed when not driving and if stopped whilst driving, they must be removed as a matter of courtesy when speaking with a member of the public unless this will impede the effective performance of duty.
There is an exception if the glasses are medically required or are prescription glasses with transitional lenses.
When not wearing the sunglasses they are not to be placed on view about their person, hung upon on their uniform or worn around the head.
Tattoos / Body Art
Members of the public are now largely accepting of police officers with visible tattoos. Tattoos on the face are not acceptable unless for religious or medical reasons.
Any tattoo / body art (including henna) that is deemed inappropriate or offensive must be covered at all times when on duty.
In addition tattoos / body art whether visible or otherwise should not:
1. Undermine the dignity and authority of officers or staff
2. Indicate unacceptable attitudes towards any individual or section of the community
3. Indicate alignment to any particular group which could give offence to members of the public or colleagues
4. Be considered inflammatory, rude, crude, racist, sexist, homophobic, violent or intimidating.
The interpretation of offensive will take into consideration the sensitivity of the public and colleagues and the impact the design may have.
Chewing gum and smoking / Vaping
Chewing gum whilst on duty is not acceptable when on patrol or dealing with members of the public or other agencies
Smoking or Vaping is not permitted on police premises or within any police vehicles. When smoking off site any items of identification such as uniform or lanyards must be covered up.
Reasonable adjustments can be made for medical needs and requirements.
During travel
Avoid wearing 'half blues' when commuting to and from work, or to and from meetings in your own motor vehicle.
There is a national threat against police officers which is constantly assessed and there are members of the community that may wish to target those working for the police. Officers and uniformed police staff are therefore putting themselves at risk by wearing any element of their uniform visible when travelling to and from work, or to meetings in your own motor vehicles.
Personal Protective Equipment
Where Personal Protective Equipment (PPE) is issued for protection of officers and staff, it must be worn and employed appropriately for its intended purpose. It is the responsibility of the individuals to ensure that their equipment is maintained and continues to be fit for purpose.
Warrant and identity cards
Every Employee must carry their warrant/ identity card whilst on police premises and be able to produce their warrant/ identity card if required. The loss of these cards must be reported immediately due to the security risk it poses.
Warrant/identity cards must be on view and if worn on a lanyard, for security reasons, the lanyards must be 'official' and as supplied Cleveland Police or lanyards provided by their employer. It is everybody's responsibility to challenge when a warrant / identity card is not visible for security purposes.
Lanyards, and by implication Warrant Cards/Identification Cards must not be worn visible outside of the confines of the force estate if not undertaking policing duties. Operational line managers should indicate if wearing lanyards are appropriate by officers dependent upon their duties.
Non Uniformed police officers and staff
In order to present a professional and corporate image of the force to members of the public, standards of non-uniform dress must be in accordance with the professional image expected of Cleveland Police.
Staff members who perform non-uniformed duty must wear smart professional business attire appropriate to the role being undertaken. Business attire would be a suit, dress trousers, shirts with ties, skirts, blouses or appropriate dresses. It does not include jeans, polo shirts, hoodies or items of clothing that display any non-police logos, slogan or offensive words.
It is expected that shirts and tops will not be low cut, will not be strapless and will not be so short to expose the middle area of the stomach. Skirts and dresses must not be unnecessarily short in length, hemlines no more than two inches above the knee Trousers should be smart and not leggings, tracksuit bottoms, jeans of any colour or shorts.
Shoes should be professional. Flip flops, trainers of similar items to that of a training shoe or beach attire are not acceptable unless there is an existing medical condition and authorisation by supervision.
Officers engaged in covert operations will dress appropriately for their particular role or operation as directed by their Leadership team. When not engaged in this activity or operations the general standards of agreed non uniformed staff of business attire will apply.
Charity badges / pins that represent the police service or a charitable organisation or similar can be worn.
Clothing appropriate with religion and faith is welcomed, and reasonable adjustments can be made on an individual basis should there be a requirement around disability, mobility or other personal reasons. Any reasonable adjustments can be made with the individuals line manager however will always need to portray the smart professional image of the force.
UNIFORM AND EQUIPMENT
Uniform Officers, PCSO's, Uniformed police Staff and volunteers
Uniform can be ordered via the self service system. The uniform and equipment issued to you upon commencement of your role is the property of the force and you have the duty to take care of it. Items issued should not be sold or passed to a third party with any unused or unnecessary items returned to the force.
Certain specialist items of uniform are issued for specific tasks such as Public order, cycling, search and firearms. These specialist items should only be worn during the times in which that specific task is being undertaken. Outside of these specialist roles the standard uniform should be worn. Only items relevant to your role and skill set should be requested and authorised. Inspectors must not authorise any equipment that is not intended for the requesting individual.
If there is a requirement for any items of clothing to be adapted or altered for health reasons, or a requirement for items that are not issued as part of the general uniform to reflect culture or medical needs please discuss this with your line manager. Agreed alterations, adaptions and obtaining specialist items can be made or obtained with consideration of health and safety implications and the corporate image.
Where alterations are required on uniform issued this will be at the individuals expense however where the force are unable to provide a particular item of uniform, once agreed, the wearer will be reimbursed for the purchase. Uniform can only be altered for personal requirements and should not, under any circumstance, be adjusted, tapered or altered to change the integrity of the item for personal choice or fashion.
Plain or rainbow epaulettes are available. It is personal choice which people decide to order and wear and both are acceptable.
Where leather items are provided as part of the uniform such as boots, belts and gloves, non-leather items are available on request to anyone wishing an alternative.
Police staff Uniform
Some police staff roles within Cleveland Police require the employees to wear uniform. The uniform provided must be worn as is issued or approved by the force, and should be compliant with the expectations of each Departmental head. When epaulettes or sliders are provided these should always be on display whilst at work.
If footwear is issued this must always be worn throughout their tour of duty. Others in uniform must wear a black flat shoe that is in keeping with the uniform worn. Heeled shoes or boots are not to be worn.
PCSO Uniform
General PCSO uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity, weather and duty being undertaken.
PCSO wicking shirt - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No items of personal non uniformed clothing should be visible under the wicking shirt. There is an option of long or short sleeves dependant on choice, and shirts should always be worn with an epaulette or slider clearly identifying who they are.
Black Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.
Black lace up boots. These must be kept clean, well-polished and in good order.
Socks must be black or dark in colour
Fleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.
Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose. Caring for body armour is further explained in Appendix A
Jacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible
Head wear – caps and bowlers to be worn dependant on rank and role. PCSOs who are on foot patrol or general duties must wear the flat cap or bowler hat at all times. See exceptions around religious, cultural and alternative headwear for religious or cultural requirements.
Tie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.
Police Officer Uniform
General Police uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity i.e.
General day to day policing uniform will be:
Police Officer wicking Shirts - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No personal items of clothing should be visible under the wicking shirt. There is a choice of long or short sleeve dependant on choice.
Black Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.
Boots - Black lace up boots are provided. These must be kept clean, wellpolished and in good order.
Socks must be black or dark in colour
Fleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.
Body armour - Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose.
Caring for body armour is further explained in Appendix A
Utility belt - Utility belt should be worn over the hips over the outer clothing. Only Cleveland Police issued PPE should be carried on this belt with the exception of a personal multi tool which, based on individuals choice, can be carried on the belt secured in a black pouch.
For medical reasons if you are unable to wear a utility belt other vest options are available via the individual's supervisor.
Jacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible.
Tie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.
Gloves- black leather gloves are provided to all officers with Chief inspectors and above issued with brown gloves. These are slash resistant and should be worn with the uniform if and when required due to risk assessment or weather.
Hats and helmets - These are an important part of the uniform and should be worn at all times when performing uniformed duties within the public domain unless prevented from doing so by the urgency / nature of the particular duty or at the discretion of the Senior Leadership Team.
Officers who are on foot patrol or general policing duties must wear the police helmet, or bowler hat depending upon rank and role.
Police flat caps can only be worn by Inspectors or above or by officers who have these provided as part of their specific uniform for their role.
Other headwear may be provided and must be worn for specific duties or tasks upon direction of the supervision. This specialist headwear must not be worn as part of general uniform outside of these roles.
Specialist officers are issued with a woollen hat. Woollen hats are no longer issued routinely by Cleveland Police to all officers and unless you are an identified specialist officer any previously issued woollen hat should not be worn as part of the uniform at any time.
**Exceptions to headwear or PCSOs and Officers based on religion or culture;
If religion, culture or belief means a cap, helmet, or bowler hat is inappropriate for an individual, alternative options based on individual requirements can be arranged through discussion with supervision. In some instances it may be possible to wear a combination such as a skull cap underneath the police flat cap, bowler or helmet.
Some headwear is issued for personal protection due to health and safety legislation such as public order and method of entry officers and therefore there may be no suitable alternative. Each case will be treat on an individual basis and considerations will be given reach a suitable solution or alternative such as
wearing alternative headwear under protective headwear. Marking of PSU helmets is further explained in Appendix B
Police Chief Inspectors and above are also issued with;
White cotton shirts - either short sleeved or long sleeved. There is a male or female styled shirt which are available to all.
Shirts should always be worn with the collar fastened with a black tie. Epaulettes must always be worn and be visible. Ties must always be worn when visible to the public regardless of weather or activity.
Tie pins must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others.
Black wicker shirts can be worn at the officer's discretion if they are not performing a front facing role. These black shirts must have epaulettes or sliders clearly on show and should be worn with the cargo style trouser.
Clothing for maternity – Maternity uniform is available to those in uniformed roles. This can be requested and will be ordered on an individual basis. It is the individual's choice whether they wish to order this uniform or wear their own clothing.
Special Occasions
Dress Uniform
If you attend an occasion it is important to maintain dress uniformity and staff should wear smart operational uniform.
Tunics are no longer individually issued to officers however a small supply are available to loan on request from stores if required.
Tunics must be worn with a white shirt, black tie, black dress trousers or a skirt. Medals should only be worn on formal/ceremonial occasions or as directed by a specific Operational Order. They should be positioned over the left breast and in order of importance from right to left.
Dress When Attending Court –
Unless authorised to perform plain clothes duty officers must, unless directed by the judge, attend court in their full general police uniform with appointments, looking smart and clean in appearance. Tunics are no longer required to be worn. Non uniformed staff should wear smart professional business attire keeping with the dignity of the court.
Non uniformed officers should also take their appointments with them and have them available within the court building.
Officers and staff are on duty when they are in court and help reassure court users and court staff whilst in public areas.
Court covers any environment where you are called upon to provide evidence such as magistrate's court, Crown court, Coroners court, civil court or Employment Tribunal (not exhaustive)
Civil Events
Permission to wear operational uniform at civil events comes from the Chief Constable
Challenging dress standards
Supervisors are expected to manage dress and appearance of their teams and to challenge those failing to adhere to the standards. Those who fail to follow the policy will be addressed appropriately through supervisory action.
ANY REQUESTS FOR DEVIATION FROM THIS POLICY OR NEW ITEMS OF UNIFORM MUST GO TO THE UNIFORM USER GROUP FOR AUTHORISATION AND APPROVAL
Process for approval of new/alternative uniform items/equipment
For all requests for new/alternative uniform items/equipment a Business Case should be completed by the owner and submitted for decision at the Dress, Appearance & Equipment Group. This will be discussed by the Group and a decision will be logged on the minutes and emailed to the owner by the Chair. It is unacceptable to sell or pass on any uniform issued or supplied by Cleveland Police.
Reasonable adjustments are available on a case by case basis based on individual circumstances. These will be managed by their supervision, however, will in keeping with this policy of portraying a smart and professional image
4. Appendices
5. Compliance and monitoring
The Executive are responsible for the accuracy and integrity of this document. This policy will be continuously monitored, and updated when appropriate, to ensure full compliance with legislation.
The Executive will review this process to ensure that all aspects are being adhered to in accordance with the framework of this policy.
6. Version control
This policy will be reviewed and updated at least every three years by the owner, and more frequently if necessary.
The Corporate Services Department will ensure this document is available on the Force intranet, including any interim updates.
The following identifies all version changes.
Wearing and Caring for your Body Armour
These guidelines have been produced to assist you whilst wearing and caring for your body armour.
They are intended to raise your awareness in relation to safety, hygiene and storage.
You should be aware that you can still be vulnerable to attack when wearing body armour. It is designed to provide protection against unknown threats.
Force policy stipulates that the wearing of body armour, when on operational duties, is mandatory. Body armour should have a black cover.
Under Health and Safety Legislation, Police Officers and Police Staff have a duty to wear protective clothing and equipment which has been provided for their safety. It is essential, therefore, that body armour fits correctly. To ensure the best fit, this armour has been personally fitted and manufactured to individual size and posture. In the interests of hygiene, it is important that all Police Officers/Police Staff wash their armour carrier regularly in accordance with the manufacturer's instructions.
The body armour issued to has been designed with a built in ventilation system which has proven to be effective in reducing perspiration problems. However, no body armour system can completely eliminate this problem. In warmer weather, to avoid de-hydration, the body armour should be removed periodically where practicable. Police Officers/Police Staff are reminded to maintain body fluid levels and regular intakes of water may be required.
The armour offers some protection against ballistic threat (HGI) and also against stabbing/slashing (KRI) attacks. However, body armour does not offer total protection. Police Officers and Police Staff should always be aware of potential health and safety risks at all times, particularly when attending incidents.
All managers and supervisors have a responsibility to ensure their staff attend Personal Safety Training if appropriate to their role.
The body armour should be inspected for signs of damage to armour panels when washing the cover.
1. The armour panels should be inspected when the armour has had any physical contact with an object likely to cause damage.
2. The outer cover should be cleaned by machine washing following manufacturer's instructions.
3. Armour panels should be removed during washing and the guidelines below should be followed.
Ballistic/Stab Panel
The panels within body armour should not be hand or machine washed. The following maintenance process should be followed.
1. Check that the label is still distinguishable.
2. Look for broken seams or perforations in panel.
3. Wipe with a damp cloth (detergents, soap etc. should not be used).
4. Allow panels to dry naturally away from sunlight and direct sources of heat.
Outer Covers
Ensure that all panels are removed before laundering.
Close all fastenings (velcro and zip).
Covers may be hand washed or machine washed.
Hand Wash - hand hot not to exceed 40 0 C, cold rinse, cool iron, dry thoroughly before re-inserting your panels.
Machine Wash - 40 0 C wash cycle, spin dry, tumble dry on cool setting, cool iron. Always refer to washing instructions on garment. Dry garment thoroughly before re-inserting your panels.
Identification Marking of Public Order Helmets
A standardised layout for helmet markings is necessary for the ease of identification of Officers engaged on Mutual Aid.
General Uniform available for initial issue to Officers and Special Constables
General Uniform available for initial issue to PCSO's
6
3
2
1
1
1
1
1
1
1
1
1
1
</text>
|
[
{
"content": "<url>\nhttps://www.cleveland.police.uk/SysSiteAssets/foi-media/cleveland/publication-scheme/our-policies-and-procedures/25-dress-and-appearance-policy-v2.0_redacted.pdf\n</url>\n<text>\nDress and Appearance Policy\n\n1. Policy statement\n\nCleveland Police are committed to delivering a high quality, cost effective and professional service. In support of this and in line with the code of ethics, it is important that all police officers and staff working with or on behalf of Cleveland Police portray a professional image which instils confidence, credibility and respect. It is therefore important that all staff understand the expectations set out around the high standards of personal appearance, dress and the personal responsibility required in pursuit of these values and priorities.\n\nThis policy applies to everyone who works for or on behalf of Cleveland Police all Police Officers both in uniform and non-uniform roles, police staff employed by the Chief Constable, special constables, cadets and volunteers engaged by the Chief Constable.\n\nUniform is provided in various roles and whilst this policy deals with the general principles of uniformity, every reasonable effort will be made to accommodate variations in uniform for religious and cultural reasons.\n\nWhere non-standard items of uniform are authorised and issued for particular duties or for specialist role, the items may not, as a matter of course, be worn for other duties or as a substitute for standard uniform.\n\nWhere a member of staff or police officer contradicts this policy, managers are expected to deal with issues promptly and robustly and in line with the code of ethics.\n\nAll supervisors / managers within every role and at every rank, have a responsibility to maintain the standards laid out within this policy and to challenge and ensure the standards are maintained by all staff at all times across the organisation. If required guidance on the application of this policy can be sought through the dress uniform and equipment group.\n\n3. Underpinning procedures\n\nHair\n\nHair of all staff must be clean, neat and tidy. Supervisors must respect that colleagues will have different natural hair textures, so the definition of neat and tidy should be based on each individual.\n\nTo reduce risks the hair of all staff issued uniform by Cleveland Police must be either cut or secured above the collar and ears. It should not present a health and safety hazard. Hair must not impede individuals from wearing issued head gear, protective helmets or uniformed hats effectively.\n\nFor officers, PCSO's, Specials, uniformed police staff and other operational staff, pigtails and bunches are not acceptable due to officer safety implications\n\nand any ponytails where the overall length exceeds the collar line, must be tied up in a low neat bun above the collar.\n\nNon uniformed staff must ensure their appearance reflects the same high standards required of all other members of the force dependent upon their working environment. If the role is not one that requires face to face contact with the public there is room for discretion but must be smart and business like.\n\nRegardless of role, hair will not be dyed in shades of conspicuously unnatural colours. Hair styles should look professional discreet and natural. They can be inclusive of people's cultural, faith or religious beliefs.\n\nFacial hair\n\nMoustaches, beards and sideburns, unless for religious or faith reasons, must be trimmed, neat and tidy. For health and safety reasons, within some roles such as operational policing, beards are not to be long and therefore would need to be tied up appropriately. Unshaven an<cursor_is_here> This does not apply where there is a genuine medical reason not to shave is.\n\nEyebrow hair must not be shaved or styled to portray any pattern or design.\n\nAgain, regardless of role, any facial hair will not be dyed in shades of conspicuously unnatural colours.\n\nIn certain roles it may be necessary to adjust facial hair for afford the face fit of PPE equipment dependent upon role and at the advice and discretion of supervision.\n\nMake up\n\nAll staff are welcome to wear makeup, those who choose to wear makeup are to aim for a neutral, professional appearance consistent with the role being undertaken. Make up to conceal a facial disfigurement or significant blemish is welcome. Make up appropriate for cultural, faith or religious belief is also welcome.\n\nNails\n\nNail varnish must be uniform across both hands and the length and style of false or natural nails must not hinder or prevent the performance of duty or present a risk to others.\n\nOfficers and staff will only wear neutral nail varnish and for health and safety reasons should keep their nails short and clean. Jewellery or attachments to nails are not permitted in these roles.\n\nJewellery\n\nOperational staff must be aware of potential health and safety risks to yourselves, colleagues and members of the public when wearing any jewellery. Only a wristwatch, a wedding ring / partnership ring and one pair of stud earrings worn only in the ear lobe should be visible (in the case of a pair - one earring in each ear lobe). Sleepers or spacers are not to be worn. Cleveland police will not be held responsible for loss or damage of such items or any injury received as a result of wearing such items.\n\nA bracelet or necklace for the purpose of medical alert or for cultural, faith or religious belief, can be worn but operational officers and staff must be aware of the health and safety risks and must discuss with their line manager. Such an item must be worn under the uniform to prevent any risks in a confrontational situation.\n\nSikh officers or staff are permitted to carry a miniature Kirpan, out of sight and beneath outer clothing.\n\nFacial studs and visible body piercings are not permitted, which includes tongue piercing, nose, lips and eyebrows unless deemed acceptable and necessary for operational needs and in these circumstances can be worn only for that specific duty.\n\nMetal should not be worn under the body armour due to safety issues. Any other body jewellery that is not visible must be assessed by the wearer. Such items pose the risk of injury should they become caught, detached, stuck or impaled into the wearers body. It is therefore recommended that such items are not worn and therefore will not be held responsible for damage caused of such items or injuries sustained.\n\nIf you are not operational and therefore there is no perceived risk or confrontation, you may wear jewellery provided it is not excessive and does not hinder or prevent the performance of duty or present a risk to others. Charity rubber bracelets can be worn by all staff and officers.\n\nSunglasses\n\nSunglasses should only be worn when on duty whilst driving a car, riding a motor bike or a bicycle, and only if conditions dictate their use to be appropriate. Sunglasses should not be worn in any other circumstance.\n\nMirrored or reflective lenses are not permitted and frames should be plain or neutral in colour. Glasses used for every day vision can be of any colour or design.\n\nSunglasses must always be removed when not driving and if stopped whilst driving, they must be removed as a matter of courtesy when speaking with a member of the public unless this will impede the effective performance of duty.\n\nThere is an exception if the glasses are medically required or are prescription glasses with transitional lenses.\n\nWhen not wearing the sunglasses they are not to be placed on view about their person, hung upon on their uniform or worn around the head.\n\nTattoos / Body Art\n\nMembers of the public are now largely accepting of police officers with visible tattoos. Tattoos on the face are not acceptable unless for religious or medical reasons.\n\nAny tattoo / body art (including henna) that is deemed inappropriate or offensive must be covered at all times when on duty.\n\nIn addition tattoos / body art whether visible or otherwise should not:\n\n1. Undermine the dignity and authority of officers or staff\n2. Indicate unacceptable attitudes towards any individual or section of the community\n3. Indicate alignment to any particular group which could give offence to members of the public or colleagues\n4. Be considered inflammatory, rude, crude, racist, sexist, homophobic, violent or intimidating.\n\nThe interpretation of offensive will take into consideration the sensitivity of the public and colleagues and the impact the design may have.\n\nChewing gum and smoking / Vaping\n\nChewing gum whilst on duty is not acceptable when on patrol or dealing with members of the public or other agencies\n\nSmoking or Vaping is not permitted on police premises or within any police vehicles. When smoking off site any items of identification such as uniform or lanyards must be covered up.\n\nReasonable adjustments can be made for medical needs and requirements.\n\nDuring travel\n\nAvoid wearing 'half blues' when commuting to and from work, or to and from meetings in your own motor vehicle.\n\nThere is a national threat against police officers which is constantly assessed and there are members of the community that may wish to target those working for the police. Officers and uniformed police staff are therefore putting themselves at risk by wearing any element of their uniform visible when travelling to and from work, or to meetings in your own motor vehicles.\n\nPersonal Protective Equipment\n\nWhere Personal Protective Equipment (PPE) is issued for protection of officers and staff, it must be worn and employed appropriately for its intended purpose. It is the responsibility of the individuals to ensure that their equipment is maintained and continues to be fit for purpose.\n\nWarrant and identity cards\n\nEvery Employee must carry their warrant/ identity card whilst on police premises and be able to produce their warrant/ identity card if required. The loss of these cards must be reported immediately due to the security risk it poses.\n\nWarrant/identity cards must be on view and if worn on a lanyard, for security reasons, the lanyards must be 'official' and as supplied Cleveland Police or lanyards provided by their employer. It is everybody's responsibility to challenge when a warrant / identity card is not visible for security purposes.\n\nLanyards, and by implication Warrant Cards/Identification Cards must not be worn visible outside of the confines of the force estate if not undertaking policing duties. Operational line managers should indicate if wearing lanyards are appropriate by officers dependent upon their duties.\n\nNon Uniformed police officers and staff\n\nIn order to present a professional and corporate image of the force to members of the public, standards of non-uniform dress must be in accordance with the professional image expected of Cleveland Police.\n\nStaff members who perform non-uniformed duty must wear smart professional business attire appropriate to the role being undertaken. Business attire would be a suit, dress trousers, shirts with ties, skirts, blouses or appropriate dresses. It does not include jeans, polo shirts, hoodies or items of clothing that display any non-police logos, slogan or offensive words.\n\nIt is expected that shirts and tops will not be low cut, will not be strapless and will not be so short to expose the middle area of the stomach. Skirts and dresses must not be unnecessarily short in length, hemlines no more than two inches above the knee Trousers should be smart and not leggings, tracksuit bottoms, jeans of any colour or shorts.\n\nShoes should be professional. Flip flops, trainers of similar items to that of a training shoe or beach attire are not acceptable unless there is an existing medical condition and authorisation by supervision.\n\nOfficers engaged in covert operations will dress appropriately for their particular role or operation as directed by their Leadership team. When not engaged in this activity or operations the general standards of agreed non uniformed staff of business attire will apply.\n\nCharity badges / pins that represent the police service or a charitable organisation or similar can be worn.\n\nClothing appropriate with religion and faith is welcomed, and reasonable adjustments can be made on an individual basis should there be a requirement around disability, mobility or other personal reasons. Any reasonable adjustments can be made with the individuals line manager however will always need to portray the smart professional image of the force.\n\nUNIFORM AND EQUIPMENT\n\nUniform Officers, PCSO's, Uniformed police Staff and volunteers\n\nUniform can be ordered via the self service system. The uniform and equipment issued to you upon commencement of your role is the property of the force and you have the duty to take care of it. Items issued should not be sold or passed to a third party with any unused or unnecessary items returned to the force.\n\nCertain specialist items of uniform are issued for specific tasks such as Public order, cycling, search and firearms. These specialist items should only be worn during the times in which that specific task is being undertaken. Outside of these specialist roles the standard uniform should be worn. Only items relevant to your role and skill set should be requested and authorised. Inspectors must not authorise any equipment that is not intended for the requesting individual.\n\nIf there is a requirement for any items of clothing to be adapted or altered for health reasons, or a requirement for items that are not issued as part of the general uniform to reflect culture or medical needs please discuss this with your line manager. Agreed alterations, adaptions and obtaining specialist items can be made or obtained with consideration of health and safety implications and the corporate image.\n\nWhere alterations are required on uniform issued this will be at the individuals expense however where the force are unable to provide a particular item of uniform, once agreed, the wearer will be reimbursed for the purchase. Uniform can only be altered for personal requirements and should not, under any circumstance, be adjusted, tapered or altered to change the integrity of the item for personal choice or fashion.\n\nPlain or rainbow epaulettes are available. It is personal choice which people decide to order and wear and both are acceptable.\n\nWhere leather items are provided as part of the uniform such as boots, belts and gloves, non-leather items are available on request to anyone wishing an alternative.\n\nPolice staff Uniform\n\nSome police staff roles within Cleveland Police require the employees to wear uniform. The uniform provided must be worn as is issued or approved by the force, and should be compliant with the expectations of each Departmental head. When epaulettes or sliders are provided these should always be on display whilst at work.\n\nIf footwear is issued this must always be worn throughout their tour of duty. Others in uniform must wear a black flat shoe that is in keeping with the uniform worn. Heeled shoes or boots are not to be worn.\n\nPCSO Uniform\n\nGeneral PCSO uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity, weather and duty being undertaken.\n\nPCSO wicking shirt - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No items of personal non uniformed clothing should be visible under the wicking shirt. There is an option of long or short sleeves dependant on choice, and shirts should always be worn with an epaulette or slider clearly identifying who they are.\n\nBlack Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.\n\nBlack lace up boots. These must be kept clean, well-polished and in good order.\n\nSocks must be black or dark in colour\n\nFleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.\n\nBody Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose. Caring for body armour is further explained in Appendix A\n\nJacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible\n\nHead wear – caps and bowlers to be worn dependant on rank and role. PCSOs who are on foot patrol or general duties must wear the flat cap or bowler hat at all times. See exceptions around religious, cultural and alternative headwear for religious or cultural requirements.\n\nTie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.\n\nPolice Officer Uniform\n\nGeneral Police uniform is designed as a layered system to maximise comfort and safety. Officers can choose which items of uniform they are to wear as part of the layered structure depending on role or activity i.e.\n\nGeneral day to day policing uniform will be:\n\nPolice Officer wicking Shirts - This should always be tucked into the trousers and should be worn with the zip up and the collar up. No personal items of clothing should be visible under the wicking shirt. There is a choice of long or short sleeve dependant on choice.\n\nBlack Cargo trousers. Trousers should be worn over your boots and not tucked in. No trousers to be worn with elasticated ankle cuffs. Trousers should always be worn with the issued black leather belt.\n\nBoots - Black lace up boots are provided. These must be kept clean, wellpolished and in good order.\n\nSocks must be black or dark in colour\n\nFleece jacket with epaulettes or sliders. These should not be worn open and should be worn zipped. They can be worn under body armour.\n\nBody armour - Body Armour with epaulettes or sliders. These are designed to fit and are provided for your safety. Body armour should be worn at all times in line with current health and safety risk assessment, unless the officer has conducted a personal risk assessment that negates the need for it to be worn. As they are personal issue it is the officers requirement to inspect the body armour for cuts, slits and tears to ensure it remains fit for purpose.\n\nCaring for body armour is further explained in Appendix A\n\nUtility belt - Utility belt should be worn over the hips over the outer clothing. Only Cleveland Police issued PPE should be carried on this belt with the exception of a personal multi tool which, based on individuals choice, can be carried on the belt secured in a black pouch.\n\nFor medical reasons if you are unable to wear a utility belt other vest options are available via the individual's supervisor.\n\nJacket - High visibility blouson jacket. These are designed to give protection from the weather as well as keep you visible and safe. Jackets must not be worn open and must be zipped whilst being worn, can be worn over the body armour and must always be worn with sliders or epaulettes visible.\n\nTie pins/ badges must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others. A Patch supporting emergency services staff are also acceptable to be added on the uniform.\n\nGloves- black leather gloves are provided to all officers with Chief inspectors and above issued with brown gloves. These are slash resistant and should be worn with the uniform if and when required due to risk assessment or weather.\n\nHats and helmets - These are an important part of the uniform and should be worn at all times when performing uniformed duties within the public domain unless prevented from doing so by the urgency / nature of the particular duty or at the discretion of the Senior Leadership Team.\n\nOfficers who are on foot patrol or general policing duties must wear the police helmet, or bowler hat depending upon rank and role.\n\nPolice flat caps can only be worn by Inspectors or above or by officers who have these provided as part of their specific uniform for their role.\n\nOther headwear may be provided and must be worn for specific duties or tasks upon direction of the supervision. This specialist headwear must not be worn as part of general uniform outside of these roles.\n\nSpecialist officers are issued with a woollen hat. Woollen hats are no longer issued routinely by Cleveland Police to all officers and unless you are an identified specialist officer any previously issued woollen hat should not be worn as part of the uniform at any time.\n\n**Exceptions to headwear or PCSOs and Officers based on religion or culture;\n\nIf religion, culture or belief means a cap, helmet, or bowler hat is inappropriate for an individual, alternative options based on individual requirements can be arranged through discussion with supervision. In some instances it may be possible to wear a combination such as a skull cap underneath the police flat cap, bowler or helmet.\n\nSome headwear is issued for personal protection due to health and safety legislation such as public order and method of entry officers and therefore there may be no suitable alternative. Each case will be treat on an individual basis and considerations will be given reach a suitable solution or alternative such as\n\nwearing alternative headwear under protective headwear. Marking of PSU helmets is further explained in Appendix B\n\nPolice Chief Inspectors and above are also issued with;\n\nWhite cotton shirts - either short sleeved or long sleeved. There is a male or female styled shirt which are available to all.\n\nShirts should always be worn with the collar fastened with a black tie. Epaulettes must always be worn and be visible. Ties must always be worn when visible to the public regardless of weather or activity.\n\nTie pins must be limited to one (1) and may only be worn if relevant to the police service or a charitable organisation or similar which is not offensive to others.\n\nBlack wicker shirts can be worn at the officer's discretion if they are not performing a front facing role. These black shirts must have epaulettes or sliders clearly on show and should be worn with the cargo style trouser.\n\nClothing for maternity – Maternity uniform is available to those in uniformed roles. This can be requested and will be ordered on an individual basis. It is the individual's choice whether they wish to order this uniform or wear their own clothing.\n\nSpecial Occasions\n\nDress Uniform\n\nIf you attend an occasion it is important to maintain dress uniformity and staff should wear smart operational uniform.\n\nTunics are no longer individually issued to officers however a small supply are available to loan on request from stores if required.\n\nTunics must be worn with a white shirt, black tie, black dress trousers or a skirt. Medals should only be worn on formal/ceremonial occasions or as directed by a specific Operational Order. They should be positioned over the left breast and in order of importance from right to left.\n\nDress When Attending Court –\n\nUnless authorised to perform plain clothes duty officers must, unless directed by the judge, attend court in their full general police uniform with appointments, looking smart and clean in appearance. Tunics are no longer required to be worn. Non uniformed staff should wear smart professional business attire keeping with the dignity of the court.\n\nNon uniformed officers should also take their appointments with them and have them available within the court building.\n\nOfficers and staff are on duty when they are in court and help reassure court users and court staff whilst in public areas.\n\nCourt covers any environment where you are called upon to provide evidence such as magistrate's court, Crown court, Coroners court, civil court or Employment Tribunal (not exhaustive)\n\nCivil Events\n\nPermission to wear operational uniform at civil events comes from the Chief Constable\n\nChallenging dress standards\n\nSupervisors are expected to manage dress and appearance of their teams and to challenge those failing to adhere to the standards. Those who fail to follow the policy will be addressed appropriately through supervisory action.\n\nANY REQUESTS FOR DEVIATION FROM THIS POLICY OR NEW ITEMS OF UNIFORM MUST GO TO THE UNIFORM USER GROUP FOR AUTHORISATION AND APPROVAL\n\nProcess for approval of new/alternative uniform items/equipment\n\nFor all requests for new/alternative uniform items/equipment a Business Case should be completed by the owner and submitted for decision at the Dress, Appearance & Equipment Group. This will be discussed by the Group and a decision will be logged on the minutes and emailed to the owner by the Chair. It is unacceptable to sell or pass on any uniform issued or supplied by Cleveland Police.\n\nReasonable adjustments are available on a case by case basis based on individual circumstances. These will be managed by their supervision, however, will in keeping with this policy of portraying a smart and professional image\n\n4. Appendices\n\n5. Compliance and monitoring\n\nThe Executive are responsible for the accuracy and integrity of this document. This policy will be continuously monitored, and updated when appropriate, to ensure full compliance with legislation.\n\nThe Executive will review this process to ensure that all aspects are being adhered to in accordance with the framework of this policy.\n\n6. Version control\n\nThis policy will be reviewed and updated at least every three years by the owner, and more frequently if necessary.\n\nThe Corporate Services Department will ensure this document is available on the Force intranet, including any interim updates.\n\nThe following identifies all version changes.\n\nWearing and Caring for your Body Armour\n\nThese guidelines have been produced to assist you whilst wearing and caring for your body armour.\n\nThey are intended to raise your awareness in relation to safety, hygiene and storage.\n\nYou should be aware that you can still be vulnerable to attack when wearing body armour. It is designed to provide protection against unknown threats.\n\nForce policy stipulates that the wearing of body armour, when on operational duties, is mandatory. Body armour should have a black cover.\n\nUnder Health and Safety Legislation, Police Officers and Police Staff have a duty to wear protective clothing and equipment which has been provided for their safety. It is essential, therefore, that body armour fits correctly. To ensure the best fit, this armour has been personally fitted and manufactured to individual size and posture. In the interests of hygiene, it is important that all Police Officers/Police Staff wash their armour carrier regularly in accordance with the manufacturer's instructions.\n\nThe body armour issued to has been designed with a built in ventilation system which has proven to be effective in reducing perspiration problems. However, no body armour system can completely eliminate this problem. In warmer weather, to avoid de-hydration, the body armour should be removed periodically where practicable. Police Officers/Police Staff are reminded to maintain body fluid levels and regular intakes of water may be required.\n\nThe armour offers some protection against ballistic threat (HGI) and also against stabbing/slashing (KRI) attacks. However, body armour does not offer total protection. Police Officers and Police Staff should always be aware of potential health and safety risks at all times, particularly when attending incidents.\n\nAll managers and supervisors have a responsibility to ensure their staff attend Personal Safety Training if appropriate to their role.\n\nThe body armour should be inspected for signs of damage to armour panels when washing the cover.\n\n1. The armour panels should be inspected when the armour has had any physical contact with an object likely to cause damage.\n2. The outer cover should be cleaned by machine washing following manufacturer's instructions.\n\n3. Armour panels should be removed during washing and the guidelines below should be followed.\n\nBallistic/Stab Panel\n\nThe panels within body armour should not be hand or machine washed. The following maintenance process should be followed.\n\n1. Check that the label is still distinguishable.\n2. Look for broken seams or perforations in panel.\n3. Wipe with a damp cloth (detergents, soap etc. should not be used).\n4. Allow panels to dry naturally away from sunlight and direct sources of heat.\n\nOuter Covers\n\nEnsure that all panels are removed before laundering.\n\nClose all fastenings (velcro and zip).\n\nCovers may be hand washed or machine washed.\n\nHand Wash - hand hot not to exceed 40 0 C, cold rinse, cool iron, dry thoroughly before re-inserting your panels.\n\nMachine Wash - 40 0 C wash cycle, spin dry, tumble dry on cool setting, cool iron. Always refer to washing instructions on garment. Dry garment thoroughly before re-inserting your panels.\n\nIdentification Marking of Public Order Helmets\n\nA standardised layout for helmet markings is necessary for the ease of identification of Officers engaged on Mutual Aid.\n\nGeneral Uniform available for initial issue to Officers and Special Constables\n\nGeneral Uniform available for initial issue to PCSO's\n\n6\n\n3\n\n2\n\n1\n\n1\n\n1\n\n1\n\n1\n\n1\n\n1\n\n1\n\n1\n\n1\n</text>\n",
"role": "user"
},
{
"content": "d stubbly facial hair (including 'Designer stubble') is not acceptable unless you have committed to growing a beard or moustache.",
"role": "assistant"
}
] |
Addressing, Subroutines and Stacks
Steven R. Bagley
Endianness
* Computer memory is addressed in bytes
* But often have to deal with things that are bigger than a byte
* How do the bits of these bigger entities get laid out into the bytes of memory?
* Two approaches: Big Endian, and Little Endian
Split into 8bit chunks MSB = most significant byte LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Writeback
* ARM's LDR and STR instructions also allow you to write the calculated address back into the base register
* This is called writeback
* Means that we can auto update the address register for free
Writeback
* Allows you to implement the equivalent of the C *p++ and *++p
* Already seen similar to LDRB R2, [R1]
* Means "Load the low-order byte, at the memory location at address held in R1 into in R2"
* We then did an ADD R1, R1, #1 to update the address
Writeback
* But we can also do LDRB R2, [R1], #1 and use write back to get the same effect
* This will copy the contents of the place in memory denoted by [R1] into R2
* But afterwards update the pointer in R1 to point to the next byte (i.e. add one to the value in R1)
* This is done for free!
No extra cycles spent on doing this
Go and show how we can alter strlen.s to use write back and compare the different addresses.
Pre-index Writeback
* Can also do the same with a pre-index operation
* But the syntax is different
* Here we just put an ! after the square brackets, e.g. LDR R1, [R0, #4]!
* This loads R1 with the value at memory location R0+4
* And updates R0 to contain R0 + 4
ARM Indirect Addressing Summary
* Offset can be a number, -number, Register or Register
* Register offsets can also be shifted…
Subroutines and Stacks
What is a Function?
* In C, we've written functions
* Small blocks of code that can be called and reused
* Also called Sub-Routines, Procedures, or Methods
* Technically, a function should return a value
* Some purists would argue that a C function returning void is actually a procedure
Why Procedures?
* Procedures reduce duplication of code and enable re-use
* Decompose programs into smaller, manageable parts
* Procedures call other procedures, possibly even themselves
* What happens when we call a procedure?
Calling a Procedure
* When we call a procedure
* The caller is suspended
* Control is passed to the callee
* Callee performs the requested task
* Callee returns control to the caller
* How do we implement this in assembler?
Implementing Subroutines
* Have already seen how we can jump to a block of code
* Use the branch (B) instruction…
* Can branch to the start of the callee…
* But how do we get back into the caller?
* How about another branch?
Branch to the instruction after the call
How do we get back?
Implementing Subroutines
* This works…
* Caller (main) calls the subroutine (strlen)
* Callee (strlen) can then calculate the length of the string
* Before branching back into the caller (main)
* But what if we want to call strlen twice?
Ooops, now branches back to next again — which is the wrong place!
Implementing Subroutines
* We've hard-coded the 'return' address which means we can only call it from one place
* The callee has no way of knowing how where it should jump back to
* Only the caller knows this
* Need a mechanism for the caller to let the callee know where to branch back to…
Self-modifying code
* Recall that a program is just a series of opcodes in memory
* This memory can be modified like any other
* Program as it is running replaces the bytes making up the branch instruction with an instruction that branches to the right place
Calculate the correct offset and formulate it as an instruction…
Then store it in memory at the right point
EDSAC and the Wheeler jump
Self-modifying Code
* This is messy!
* But it works
* Was used on some of the first computers to implement sub-routines
Program Counter
* There's another way we can change which instruction the CPU executes next
* Remember that the Program Counter is just another register (R15 on the ARM)
* If we move a value into R15 then the CPU will execute the instruction at that new address next
Program Counter
* The caller knows which is the next instruction that should execute
* So it could pass the address of that function to the callee
* When the callee has finished it can just move that address into the PC to return to the caller
Link Register
* On ARM, this is done by passing the address in register R14
* Which is called the Link Register
* Callee can then return to the caller with a simple MOV PC, R14
Now each time strlen is called, R14 has a different address
If we remember the Fetch-decode-execute cycle then we can remember that the PC will already be pointing 2 instructions ahead so we could just replace it with a MOV R14,PC rather than having to get the address of a label…
Such a common thing to do that it is built into the CPU with the BL instruction Branch-with-link
Branch-with-link if equal…
Branch-with-Link
* Branch with Link instruction (BL) automatically puts the address of the following instruction in R14
* Always R14, we can't chose the register
* Can also be a conditional branch (e.g. BLEQ)
* Subroutine can then return to the next instruction with ease…
Basic procedure calls
* Seen that BL instruction uses R14 as the link register to store return address
* In simple cases, at the end of a procedure we just need to do MOV PC, R14
* Some routines may be able to do their job solely with registers
* Need conventions for register usage to avoid overwriting and misunderstandings
* Thus we have the APCS (ARM Procedure Call Standard) to guide us…
| Register | APCS name |
|---|---|
| R0 | a1 |
| R1 | a2 |
| R2 | a3 |
| R3 | a4 |
| R4 | v1 |
| R5 | v2 |
| R6 | v3 |
| R7 | v4 |
| R8 | v5 |
| R9 | sb/v6 |
| R10 | sl/v7 |
| R11 | fp |
| R12 | ip |
| R13 | sp |
| R14 | lr |
| R15 | pc |
Scratch registers do not need to be preserved through a function call, but all other registers should be. As far as the caller is concerned it should be as if the function call never happened
Note if more arguments are needed than registers they are placed on the stack before the procedure call. Each argument must take up a multiple of 4 bytes on the stack. For 8-byte wide values, two registers are used…
Caller Saved Registers
* R0—R3 used to pass arguments into a function
* Inside the function they may be used by the function for any purpose.
* R0 often used to return the result
* Caller must expect R0–R3 to be trashed (reused) by the procedure…
Caller Saved Registers
* If the Caller doesn't want the values in R0-R3 trashing,then it must preserve them itself (e.g. by saving them in memory)
* A typical simple leaf function (such as strlen)
* Would only use R0–R3
* Be called with BL
* Returns with MOV PC, R14
Leaf instruction is one that doesn't call any other function…
If it did call another function then R14 would get trashed…
Callee Saved Registers
* R4–R8 are registers which the callee is expected to save if it uses them
* In other words, the values of R4–R8 should be unchanged when control returns to the calling function
* So if the called function needs these register for extra workspace, it must save them
* And then restore them before returning to the caller
Saving Registers
* We have a limited number of registers
* But lots of memory
* Can use memory to save the values
* But we need a disciplined way to do this
* Most often this is done using a stack
Like a stack of plates, we can only remove the top thing from the stack (although we can peek at the values below it)
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Stack Implementation
* How do we implement a stack in memory?
* Turns out that there are various approaches
* Need a stack pointer, register R13 is used on ARM
* But what does it point to?
Stack Implementation
* Does the stack grow downwards (descending addresses) or upwards (ascending addresses) in memory?
* Does the stack pointer point to the topmost filled location (full stack)
* Or should it point to the next empty location just beyond the top of the stack (stack empty)?
* No right answer, but most systems including ARM use a "full-descending" stack
That means the stack pointer points to the top-most item on the stack (full) and the memory addresses grow downwards
Saw this in PRG
Stack pointer starts off at the top of memory and moves down and up as things are pushed and popped (respectively) between the top of memory and the stack limit
Using the APCS names for things here — some assemblers (like aasm) will let you use these names interchangeable with R13 (for sp) etc.
Stack Implementation
* Can use LDR and STR to push and pop registers from the stack
* Because we are using a full-descending stack, we need to use pre-decrement to push something on the stack STR R0, [R13, #-4]!
* And post-increment to pop LDR R0, [R13],#4
You might need to draw a stack here and show how it works
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Stack Implementation
* Can also access values pushed on the stack without popping them
* Just use an offset from the stack point R13
* For example, to access the third thing on the stack LDR R0, [R13, #8]
* Offsets are positive because we use a fulldescending stack
If we'd have used an ascending stack we would have needed to use negative offsets…
Positive offsets in memory allow us to access values on the stack (although there's no change to the stack pointer
Multiple Loads and Stores
* Stack is a good place to preserve register values
* ARM provides instructions to load and store registers en bloc
* Rather than having to use multiple STR and LDR operations
* Using the LDM and STM instructions (Load/Store Multiple)
FD = full-descending
Multiple Loads and Stores
* These instructions again use a base register, with an option for write-back
* For the main stack, we use R13 as the base register
* LDM/STM both require a suffix depending on the stack regime
* For APCS, we use LDMFD and STMFD
LDM/STM Addressing Modes
* ARM instruction set provides four addressing modes for LDM/STM
* Addressing mode is provided as a suffix to the instruction, e.g. LDMIA, STMDB
* Describes whether the addresses are incremented or decremented
* And whether it happens before or after the values are loaded/stored
| Suffix | Meaning |
|---|---|
| IA | Increment After |
| IB | Increment Before |
| DA | Decrement After |
| DB | Decrement Before |
LDM / STM Addressing Modes
Suffix
Meaning
IA
Increment After
IB
Increment Before
DA
Decrement After
DB
Decrement Before
| Stack Type | Push | Pop |
|---|---|---|
| Full, Descending | STMFD (STMDB) | LDMFD (LDMIA) |
| Full, Ascending | STMFA (STMIB) | LDMFA (LDMDA) |
| Empty, Descending | STMED (STMDA) | LDMED (STMIB) |
Assemblers also provide stack-oriented suffixes, where you tell it what stack regime you are using. Assembler then maps this automatically to the correct addressing mode (shown in brackets). We'll only worry about the first type
The effect of the different addressing modes for STM/LDM starting at R13
Full Descending Stack
* With a Full Descending stack, a multiple store (STMFD) corresponds to pushing registers onto the stack
* Conversely, a multiple load (LDMFD) corresponds to a pop from the stack
* Could use STMDB and LDMIA as well
Full Descending Stack
* Consider LDMFD R13, {R0-R3}
* Registers specified between curly braces
* This is equivalent to:
* But notice that R13 isn't updated
```
LDR R0, [R13] LDR R1, [R13, #4] LDR R2, [R13, #8] LDR R3, [R13, #12]
```
Stack Writeback
* If we want the stack pointer, R13, to be updated then we need to specify that we want write back
* Done by placing a ! after the base register
* For example: LDMFD R13!, {R0-R3}
LDMxx/STMxx
* Register list is specified between curly braces
* Use commas to separate them and a hyphen to specify a range, e.g. LDMFD R13!, {R0-R5, R8, R14}
* Pops R0, R1, R2, R3, R4, R5, R8 and R14
* Remember the item in the lowest address goes to the lowest register number
Stack Frames
* Data stored on the stack as part of a function call forms part of the stack frame for that invocation
* Stack frames are used to store register values, but also to create space for local variables used within the function
* Also used to preserve the link register (R14)
Local variables go on the stack because you can then be sure of a unique instance of them for that invocation. Functions may be called while the function is already running (e.g. recursion, multi-threaded code, etc.) Can't always just be stored in registers (Even if we have enough of them, since we might need to pass the address to something)
Stack Frames
* When a procedure exits and return to the caller, everything it put on the stack must be popped
* This is why local variables vanish once a function exits
* The caller expects the stack to be exactly as it left it
Storing the Link Register
* If we are a leaf function (i.e. we don't call anything else) then there is no need to store the link register
* If we do call a function, then it is necessary to preserve the link register
* Why?
Note how we restore to PC, not R14 — saves us an instruction
Storing the Link Register
* The BL func1 in main stores the return address in R14
* But then the BL func2 inside func1 overwrites it
* So func2 returns correctly to func1
* But if func1 were to return using MOV PC, R14 then R14 would have the wrong value
Storing the Link Register
* Non-leaf functions definitely need to stack the link register value
* But note the stack frame push/pop in func1
* The LDMFD restores the stored return address directly into the PC
* This causes an instantaneous return to main
Local Variables
* Local variables are stored on the stack
* Guarantees a unique instance of the variables for each function invocation
* Can easily create space for them on the stack by using a SUB instruction after we preserve the registers
* Use an ADD later to remove them all quickly…
* Can then use an offset from R13 to access them
* But remember the offset will change as you push and pop more values…
|
<urn:uuid:86711090-9c9d-423b-a168-73c9329f3e6c>
|
CC-MAIN-2017-30
|
http://g51csa.cs.nott.ac.uk/Distribution/Lectures/CSA-2014-Lecture18.pdf
|
2017-07-24T08:49:14Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424770.15/warc/CC-MAIN-20170724082331-20170724102331-00643.warc.gz
| 148,077,096
| 4,009
|
eng_Latn
|
eng_Latn
| 0.955056
|
eng_Latn
| 0.99687
|
[
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dan_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
51,
299,
380,
463,
546,
629,
712,
771,
830,
889,
948,
1007,
1073,
1139,
1205,
1271,
1337,
1546,
1807,
2235,
2501,
2631,
2655,
2945,
3175,
3401,
3628,
3670,
3691,
3931,
3999,
4292,
4662,
4811,
5080,
5325,
5504,
5565,
5787,
5885,
6188,
6583,
7233,
7482,
7875,
8221,
8420,
8539,
8624,
8709,
8794,
8879,
8964,
9155,
9645,
9960,
10278,
10360,
10442,
10524,
10606,
10688,
10770,
10852,
10934,
11016,
11368,
11484,
11747,
12025,
12331,
12585,
13017,
13091,
13330,
13565,
13763,
14042,
14675,
14905,
15131,
15193,
15450,
15706,
16117
] |
Addressing, Subroutines and Stacks
Steven R. Bagley
Endianness
* Computer memory is addressed in bytes
* But often have to deal with things that are bigger than a byte
* How do the bits of these bigger entities get laid out into the bytes of memory?
* Two approaches: Big Endian, and Little Endian
Split into 8bit chunks MSB = most significant byte LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Writeback
* ARM's LDR and STR instructions also allow you to write the calculated address back into the base register
* This is called writeback
* Means that we can auto update the address register for free
Writeback
* Allows you to implement the equivalent of the C *p++ and *++p
* Already seen similar to LDRB R2, [R1]
* Means "Load the low-order byte, at the memory location at address held in R1 into in R2"
* We then did an ADD R1, R1, #1 to update the address
Writeback
* But we can also do LDRB R2, [R1], #1 and use write back to get the same effect
* This will copy the contents of the place in memory denoted by [R1] into R2
* But afterwards update the pointer in R1 to point to the next byte (i.e. add one to the value in R1)
* This is done for free!
No extra cycles spent on doing this
Go and show how we can alter strlen.s to use write back and compare the different addresses.
Pre-index Writeback
* Can also do the same with a pre-index operation
* But the syntax is different
* Here we just put an ! after the square brackets, e.g. LDR R1, [R0, #4]!
* This loads R1 with the value at memory location R0+4
* And updates R0 to contain R0 + 4
ARM Indirect Addressing Summary
* Offset can be a number, -number, Register or Register
* Register offsets can also be shifted…
Subroutines and Stacks
What is a Function?
* In C, we've written functions
* Small blocks of code that can be called and reused
* Also called Sub-Routines, Procedures, or Methods
* Technically, a function should return a value
* Some purists would argue that a C function returning void is actually a procedure
Why Procedures?
* Procedures reduce duplication of code and enable re-use
* Decompose programs into smaller, manageable parts
* Procedures call other procedures, possibly even themselves
* What happens when we call a procedure?
Calling a Procedure
* When we call a procedure
* The caller is suspended
* Control is passed to the callee
* Callee performs the requested task
* Callee returns control to the caller
* How do we implement this in assembler?
Implementing Subroutines
* Have already seen how we can jump to a block of code
* Use the branch (B) instruction…
* Can branch to the start of the callee…
* But how do we get back into the caller?
* How about another branch?
Branch to the instruction after the call
How do we get back?
Implementing Subroutines
* This works…
* Caller (main) calls the subroutine (strlen)
* Callee (strlen) can then calculate the length of the string
* Before branching back into the caller (main)
* But what if we want to call strlen twice?
Ooops, now branches back to next again — which is the wrong place!
Implementing Subroutines
* We've hard-coded the 'return' address which means we can only call it from one place
* The callee has no way of knowing how where it should jump back to
* Only the caller knows this
* Need a mechanism for the caller to let the callee know where to branch back to…
Self-modifying code
* Recall that a program is just a series of opcodes in memory
* This memory can be modified like any other
* Program as it is running replaces the bytes making up the branch instruction with an instruction that branches to the right place
Calculate the correct offset and formulate it as an instruction…
Then store it in memory at the right point
EDSAC and the Wheeler jump
Self-modifying Code
* This is messy!
* But it works
* Was used on some of the first computers to implement sub-routines
Program Counter
* There's another way we can change which instruction the CPU executes next
* Remember that the Program Counter is just another register (R15 on the ARM)
* If we move a value into R15 then the CPU will execute the instruction at that new address next
Program Counter
* The caller knows which is the next instruction that should execute
* So it could pass the address of that function to the callee
* When the callee has finished it can just move that address into the PC to return to the caller
Link Register
* On ARM, this is done by passing the address in register R14
* Which is called the Link Register
* Callee can then return to the caller with a simple MOV PC, R14
Now each time strlen is called, R14 has a different address
If we remember the Fetch-decode-execute cycle then we can remember that the PC will already be pointing 2 instructions ahead so we could just replace it with a MOV R14,PC rather than having to get the address of a label…
Such a common thing to do that it is built into the CPU with the BL instruction Branch-with-link
Branch-with-link if equal…
Branch-with-Link
* Branch with Link instruction (BL) automatically puts the address of the following instruction in R14
* Always R14, we can't chose the register
* Can also be a conditional branch (e.g. BLEQ)
* Subroutine can then return to the next instruction with ease…
Basic procedure calls
* Seen that BL instruction uses R14 as the link register to store return address
* In simple cases, at the end of a procedure we just need to do MOV PC, R14
* Some routines may be able to do their job solely with registers
* Need conventions for register usage to avoid overwriting and misunderstandings
* Thus we have the APCS (ARM Procedure Call Standard) to guide us…
| Register | APCS name |
|---|---|
| R0 | a1 |
| R1 | a2 |
| R2 | a3 |
| R3 | a4 |
| R4 | v1 |
| R5 | v2 |
| R6 | v3 |
| R7 | v4 |
| R8 | v5 |
| R9 | sb/v6 |
| R10 | sl/v7 |
| R11 | fp |
| R12 | ip |
| R13 | sp |
| R14 | lr |
| R15 | pc |
Scratch registers do not need to be preserved through a function call, but all other registers should be. As far as the caller is concerned it should be as if the function call never happened
Note if more arguments are needed than registers they are placed on the stack before the procedure call. Each argument must take up a multiple of 4 bytes on the stack. For 8-byte wide values, two registers are used…
Caller Saved Registers
* R0—R3 used to pass arguments into a function
* Inside the function they may be used by the function for any purpose.
* R0 often used to return the result
* Caller must expect R0–R3 to be trashed (reused) by the procedure…
Caller Saved Registers
* If the Caller doesn't want the values in R0-R3 trashing,then it must preserve them itself (e.g. by saving them in memory)
* A typical simple leaf function (such as strlen)
* Would only use R0–R3
* Be called with BL
* Returns with MOV PC, R14
Leaf instruction is one that doesn't call any other function…
If it did call another function then R14 would get trashed…
Callee Saved Registers
* R4–R8 are registers which the callee is expected to save if it uses them
* In other words, the values of R4–R8 should be unchanged when control returns to the calling function
* So if the called function needs these register for extra workspace, it must save them
* And then restore them before returning to the caller
Saving Registers
* We have a limited number of registers
* But lots of memory
* Can use memory to save the values
* But we need a disciplined way to do this
* Most often this is done using a stack
Like a stack of plates, we can only remove the top thing from the stack (although we can peek at the values below it)
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Stack Implementation
* How do we implement a stack in memory?
* Turns out that there are various approaches
* Need a stack pointer, register R13 is used on ARM
* But what does it point to?
Stack Implementation
* Does the stack grow downwards (descending addresses) or upwards (ascending addresses) in memory?
* Does the stack pointer point to the topmost filled location (full stack)
* Or should it point to the next empty location just beyond the top of the stack (stack empty)?
* No right answer, but most systems including ARM use a "full-descending" stack
That means the stack pointer points to the top-most item on the stack (full) and the memory addresses grow downwards
Saw this in PRG
Stack pointer starts off at the top of memory and moves down and up as things are pushed and popped (respectively) between the top of memory and the stack limit
Using the APCS names for things here — some assemblers (like aasm) will let you use these names interchangeable with R13 (for sp) etc.
Stack Implementation
* Can use LDR and STR to push and pop registers from the stack
* Because we are using a full-descending stack, we need to use pre-decrement to push something on the stack STR R0, [R13, #-4]!
* And post-increment to pop LDR R0, [R13],#4
You might need to draw a stack here and show how it works
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Stack Implementation
* Can also access values pushed on the stack without popping them
* Just use an offset from the stack point R13
* For example, to access the third thing on the stack LDR R0, [R13, #8]
* Offsets are positive because we use a fulldescending stack
If we'd have used an ascending stack we would have needed to use negative offsets…
Positive offsets in memory allow us to access values on the stack (although there's no change to the stack pointer
Multiple Loads and Stores
* Stack is a good place to preserve register values
* ARM provides instructions to load and store registers en bloc
* Rather than having to use multiple STR and LDR operations
* Using the LDM and STM instructions (Load/Store Multiple)
FD = full-descending
Multiple Loads and Stores
* These instructions again use a base register, with an option for write-back
* For the main stack, we use R13 as the base register
* LDM/STM both require a suffix depending on the stack regime
* For APCS, we use LDMFD and STMFD
LDM/STM Addressing Modes
* ARM instruction set provides four addressing modes for LDM/STM
* Addressing mode is provided as a suffix to the instruction, e.g. LDMIA, STMDB
* Describes whether the addresses are incremented or decremented
* And whether it happens before or after the values are loaded/stored
| Suffix | Meaning |
|---|---|
| IA | Increment After |
| IB | Increment Before |
| DA | Decrement After |
| DB | Decrement Before |
LDM / STM Addressing Modes
Suffix
Meaning
IA
Increment After
IB
Increment Before
DA
Decrement After
DB
Decrement Before
| Stack Type | Push | Pop |
|---|---|---|
| Full, Descending | STMFD (STMDB) | LDMFD (LDMIA) |
| Full, Ascending | STMFA (STMIB) | LDMFA (LDMDA) |
| Empty, Descending | STMED (STMDA) | LDMED (STMIB) |
Assemblers also provide stack-oriented suffixes, where you tell it what stack regime you are using. Assembler then maps this automatically to the correct addressing mode (shown in brackets). We'll only worry about the first type
The effect of the different addressing modes for STM/LDM starting at R13
Full Descending Stack
* With a Full Descending stack, a multiple store (STMFD) corresponds to pushing registers onto the stack
* Conversely, a multiple load (LDMFD) corresponds to a pop from the stack
* Could use STMDB and LDMIA as well
Full Descending Stack
* Consider LDMFD R13, {R0-R3}
* Registers specified between curly braces
* This is equivalent to:
* But notice that R13 isn't updated
```
LDR R0, [R13] LDR R1, [R13, #4] LDR R2, [R13, #8] LDR R3, [R13, #12]
```
Stack Writeback
* If we want the stack pointer, R13, to be updated then we need to specify that we want write back
* Done by placing a ! after the base register
* For example: LDMFD R13!, {R0-R3}
LDMxx/STMxx
* Register list is specified between curly braces
* Use commas to separate them and a hyphen to specify a range, e.g. LDMFD R13!, {R0-R5, R8, R14}
* Pops R0, R1, R2, R3, R4, R5, R8 and R14
* Remember the item in the lowest address goes to the lowest register number
Stack Frames
* Data stored on the stack as part of a function call forms part of the stack frame for that invocation
* Stack frames are used to store register values, but also to create space for local variables used within the function
* Also used to preserve the link register (R14)
Local variables go on the stack because you can then be sure of a unique instance of them for that invocation. Functions may be called while the function is already running (e.g. recursion, multi-threaded code, etc.) Can't always just be stored in registers (Even if we have enough of them, since we might need to pass the address to something)
Stack Frames
* When a procedure exits and return to the caller, everything it put on the stack must be popped
* This is why local variables vanish once a function exits
* The caller expects the stack to be exactly as it left it
Storing the Link Register
* If we are a leaf function (i.e. we don't call anything else) then there is no need to store the link register
* If we do call a function, then it is necessary to preserve the link register
* Why?
Note how we restore to PC, not R14 — saves us an instruction
Storing the Li
|
nk Register
* The BL func1 in main stores the return address in R14
* But then the BL func2 inside func1 overwrites it
* So func2 returns correctly to func1
* But if func1 were to return using MOV PC, R14 then R14 would have the wrong value
Storing the Link Register
* Non-leaf functions definitely need to stack the link register value
* But note the stack frame push/pop in func1
* The LDMFD restores the stored return address directly into the PC
* This causes an instantaneous return to main
Local Variables
* Local variables are stored on the stack
* Guarantees a unique instance of the variables for each function invocation
* Can easily create space for them on the stack by using a SUB instruction after we preserve the registers
* Use an ADD later to remove them all quickly…
* Can then use an offset from R13 to access them
* But remember the offset will change as you push and pop more values…
| 15,209
|
inside_word
|
Link
|
remove_one_sentence
|
<url>
http://g51csa.cs.nott.ac.uk/Distribution/Lectures/CSA-2014-Lecture18.pdf
</url>
<text>
Addressing, Subroutines and Stacks
Steven R. Bagley
Endianness
* Computer memory is addressed in bytes
* But often have to deal with things that are bigger than a byte
* How do the bits of these bigger entities get laid out into the bytes of memory?
* Two approaches: Big Endian, and Little Endian
Split into 8bit chunks MSB = most significant byte LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
Split into 8bit chunks
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
MSB = most significant byte
LSB = Least Significant byte
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Yes, it's all backwards, but it can make the chip design easier…
Writeback
* ARM's LDR and STR instructions also allow you to write the calculated address back into the base register
* This is called writeback
* Means that we can auto update the address register for free
Writeback
* Allows you to implement the equivalent of the C *p++ and *++p
* Already seen similar to LDRB R2, [R1]
* Means "Load the low-order byte, at the memory location at address held in R1 into in R2"
* We then did an ADD R1, R1, #1 to update the address
Writeback
* But we can also do LDRB R2, [R1], #1 and use write back to get the same effect
* This will copy the contents of the place in memory denoted by [R1] into R2
* But afterwards update the pointer in R1 to point to the next byte (i.e. add one to the value in R1)
* This is done for free!
No extra cycles spent on doing this
Go and show how we can alter strlen.s to use write back and compare the different addresses.
Pre-index Writeback
* Can also do the same with a pre-index operation
* But the syntax is different
* Here we just put an ! after the square brackets, e.g. LDR R1, [R0, #4]!
* This loads R1 with the value at memory location R0+4
* And updates R0 to contain R0 + 4
ARM Indirect Addressing Summary
* Offset can be a number, -number, Register or Register
* Register offsets can also be shifted…
Subroutines and Stacks
What is a Function?
* In C, we've written functions
* Small blocks of code that can be called and reused
* Also called Sub-Routines, Procedures, or Methods
* Technically, a function should return a value
* Some purists would argue that a C function returning void is actually a procedure
Why Procedures?
* Procedures reduce duplication of code and enable re-use
* Decompose programs into smaller, manageable parts
* Procedures call other procedures, possibly even themselves
* What happens when we call a procedure?
Calling a Procedure
* When we call a procedure
* The caller is suspended
* Control is passed to the callee
* Callee performs the requested task
* Callee returns control to the caller
* How do we implement this in assembler?
Implementing Subroutines
* Have already seen how we can jump to a block of code
* Use the branch (B) instruction…
* Can branch to the start of the callee…
* But how do we get back into the caller?
* How about another branch?
Branch to the instruction after the call
How do we get back?
Implementing Subroutines
* This works…
* Caller (main) calls the subroutine (strlen)
* Callee (strlen) can then calculate the length of the string
* Before branching back into the caller (main)
* But what if we want to call strlen twice?
Ooops, now branches back to next again — which is the wrong place!
Implementing Subroutines
* We've hard-coded the 'return' address which means we can only call it from one place
* The callee has no way of knowing how where it should jump back to
* Only the caller knows this
* Need a mechanism for the caller to let the callee know where to branch back to…
Self-modifying code
* Recall that a program is just a series of opcodes in memory
* This memory can be modified like any other
* Program as it is running replaces the bytes making up the branch instruction with an instruction that branches to the right place
Calculate the correct offset and formulate it as an instruction…
Then store it in memory at the right point
EDSAC and the Wheeler jump
Self-modifying Code
* This is messy!
* But it works
* Was used on some of the first computers to implement sub-routines
Program Counter
* There's another way we can change which instruction the CPU executes next
* Remember that the Program Counter is just another register (R15 on the ARM)
* If we move a value into R15 then the CPU will execute the instruction at that new address next
Program Counter
* The caller knows which is the next instruction that should execute
* So it could pass the address of that function to the callee
* When the callee has finished it can just move that address into the PC to return to the caller
Link Register
* On ARM, this is done by passing the address in register R14
* Which is called the Link Register
* Callee can then return to the caller with a simple MOV PC, R14
Now each time strlen is called, R14 has a different address
If we remember the Fetch-decode-execute cycle then we can remember that the PC will already be pointing 2 instructions ahead so we could just replace it with a MOV R14,PC rather than having to get the address of a label…
Such a common thing to do that it is built into the CPU with the BL instruction Branch-with-link
Branch-with-link if equal…
Branch-with-Link
* Branch with Link instruction (BL) automatically puts the address of the following instruction in R14
* Always R14, we can't chose the register
* Can also be a conditional branch (e.g. BLEQ)
* Subroutine can then return to the next instruction with ease…
Basic procedure calls
* Seen that BL instruction uses R14 as the link register to store return address
* In simple cases, at the end of a procedure we just need to do MOV PC, R14
* Some routines may be able to do their job solely with registers
* Need conventions for register usage to avoid overwriting and misunderstandings
* Thus we have the APCS (ARM Procedure Call Standard) to guide us…
| Register | APCS name |
|---|---|
| R0 | a1 |
| R1 | a2 |
| R2 | a3 |
| R3 | a4 |
| R4 | v1 |
| R5 | v2 |
| R6 | v3 |
| R7 | v4 |
| R8 | v5 |
| R9 | sb/v6 |
| R10 | sl/v7 |
| R11 | fp |
| R12 | ip |
| R13 | sp |
| R14 | lr |
| R15 | pc |
Scratch registers do not need to be preserved through a function call, but all other registers should be. As far as the caller is concerned it should be as if the function call never happened
Note if more arguments are needed than registers they are placed on the stack before the procedure call. Each argument must take up a multiple of 4 bytes on the stack. For 8-byte wide values, two registers are used…
Caller Saved Registers
* R0—R3 used to pass arguments into a function
* Inside the function they may be used by the function for any purpose.
* R0 often used to return the result
* Caller must expect R0–R3 to be trashed (reused) by the procedure…
Caller Saved Registers
* If the Caller doesn't want the values in R0-R3 trashing,then it must preserve them itself (e.g. by saving them in memory)
* A typical simple leaf function (such as strlen)
* Would only use R0–R3
* Be called with BL
* Returns with MOV PC, R14
Leaf instruction is one that doesn't call any other function…
If it did call another function then R14 would get trashed…
Callee Saved Registers
* R4–R8 are registers which the callee is expected to save if it uses them
* In other words, the values of R4–R8 should be unchanged when control returns to the calling function
* So if the called function needs these register for extra workspace, it must save them
* And then restore them before returning to the caller
Saving Registers
* We have a limited number of registers
* But lots of memory
* Can use memory to save the values
* But we need a disciplined way to do this
* Most often this is done using a stack
Like a stack of plates, we can only remove the top thing from the stack (although we can peek at the values below it)
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Pushing the values on the stack and then popping them back off in the reverse order
Stack Implementation
* How do we implement a stack in memory?
* Turns out that there are various approaches
* Need a stack pointer, register R13 is used on ARM
* But what does it point to?
Stack Implementation
* Does the stack grow downwards (descending addresses) or upwards (ascending addresses) in memory?
* Does the stack pointer point to the topmost filled location (full stack)
* Or should it point to the next empty location just beyond the top of the stack (stack empty)?
* No right answer, but most systems including ARM use a "full-descending" stack
That means the stack pointer points to the top-most item on the stack (full) and the memory addresses grow downwards
Saw this in PRG
Stack pointer starts off at the top of memory and moves down and up as things are pushed and popped (respectively) between the top of memory and the stack limit
Using the APCS names for things here — some assemblers (like aasm) will let you use these names interchangeable with R13 (for sp) etc.
Stack Implementation
* Can use LDR and STR to push and pop registers from the stack
* Because we are using a full-descending stack, we need to use pre-decrement to push something on the stack STR R0, [R13, #-4]!
* And post-increment to pop LDR R0, [R13],#4
You might need to draw a stack here and show how it works
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Note that after a value has been 'popped' off the stack its still left in memory
Stack Implementation
* Can also access values pushed on the stack without popping them
* Just use an offset from the stack point R13
* For example, to access the third thing on the stack LDR R0, [R13, #8]
* Offsets are positive because we use a fulldescending stack
If we'd have used an ascending stack we would have needed to use negative offsets…
Positive offsets in memory allow us to access values on the stack (although there's no change to the stack pointer
Multiple Loads and Stores
* Stack is a good place to preserve register values
* ARM provides instructions to load and store registers en bloc
* Rather than having to use multiple STR and LDR operations
* Using the LDM and STM instructions (Load/Store Multiple)
FD = full-descending
Multiple Loads and Stores
* These instructions again use a base register, with an option for write-back
* For the main stack, we use R13 as the base register
* LDM/STM both require a suffix depending on the stack regime
* For APCS, we use LDMFD and STMFD
LDM/STM Addressing Modes
* ARM instruction set provides four addressing modes for LDM/STM
* Addressing mode is provided as a suffix to the instruction, e.g. LDMIA, STMDB
* Describes whether the addresses are incremented or decremented
* And whether it happens before or after the values are loaded/stored
| Suffix | Meaning |
|---|---|
| IA | Increment After |
| IB | Increment Before |
| DA | Decrement After |
| DB | Decrement Before |
LDM / STM Addressing Modes
Suffix
Meaning
IA
Increment After
IB
Increment Before
DA
Decrement After
DB
Decrement Before
| Stack Type | Push | Pop |
|---|---|---|
| Full, Descending | STMFD (STMDB) | LDMFD (LDMIA) |
| Full, Ascending | STMFA (STMIB) | LDMFA (LDMDA) |
| Empty, Descending | STMED (STMDA) | LDMED (STMIB) |
Assemblers also provide stack-oriented suffixes, where you tell it what stack regime you are using. Assembler then maps this automatically to the correct addressing mode (shown in brackets). We'll only worry about the first type
The effect of the different addressing modes for STM/LDM starting at R13
Full Descending Stack
* With a Full Descending stack, a multiple store (STMFD) corresponds to pushing registers onto the stack
* Conversely, a multiple load (LDMFD) corresponds to a pop from the stack
* Could use STMDB and LDMIA as well
Full Descending Stack
* Consider LDMFD R13, {R0-R3}
* Registers specified between curly braces
* This is equivalent to:
* But notice that R13 isn't updated
```
LDR R0, [R13] LDR R1, [R13, #4] LDR R2, [R13, #8] LDR R3, [R13, #12]
```
Stack Writeback
* If we want the stack pointer, R13, to be updated then we need to specify that we want write back
* Done by placing a ! after the base register
* For example: LDMFD R13!, {R0-R3}
LDMxx/STMxx
* Register list is specified between curly braces
* Use commas to separate them and a hyphen to specify a range, e.g. LDMFD R13!, {R0-R5, R8, R14}
* Pops R0, R1, R2, R3, R4, R5, R8 and R14
* Remember the item in the lowest address goes to the lowest register number
Stack Frames
* Data stored on the stack as part of a function call forms part of the stack frame for that invocation
* Stack frames are used to store register values, but also to create space for local variables used within the function
* Also used to preserve the link register (R14)
Local variables go on the stack because you can then be sure of a unique instance of them for that invocation. Functions may be called while the function is already running (e.g. recursion, multi-threaded code, etc.) Can't always just be stored in registers (Even if we have enough of them, since we might need to pass the address to something)
Stack Frames
* When a procedure exits and return to the caller, everything it put on the stack must be popped
* This is why local variables vanish once a function exits
* The caller expects the stack to be exactly as it left it
Storing the Link Register
* If we are a leaf function (i.e. we don't call anything else) then there is no need to store the link register
* If we do call a function, then it is necessary to preserve the link register
* Why?
Note how we restore to PC, not R14 — saves us an instruction
Storing the Li<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://g51csa.cs.nott.ac.uk/Distribution/Lectures/CSA-2014-Lecture18.pdf\n</url>\n<text>\nAddressing, Subroutines and Stacks\nSteven R. Bagley\n\nEndianness\n\n* Computer memory is addressed in bytes\n* But often have to deal with things that are bigger than a byte\n* How do the bits of these bigger entities get laid out into the bytes of memory?\n* Two approaches: Big Endian, and Little Endian\n\nSplit into 8bit chunks MSB = most significant byte LSB = Least Significant byte\n\nSplit into 8bit chunks\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nSplit into 8bit chunks\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nSplit into 8bit chunks\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nSplit into 8bit chunks\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nMSB = most significant byte\n\nLSB = Least Significant byte\n\nYes, it's all backwards, but it can make the chip design easier…\n\nYes, it's all backwards, but it can make the chip design easier…\n\nYes, it's all backwards, but it can make the chip design easier…\n\nYes, it's all backwards, but it can make the chip design easier…\n\nYes, it's all backwards, but it can make the chip design easier…\n\nWriteback\n\n* ARM's LDR and STR instructions also allow you to write the calculated address back into the base register\n* This is called writeback\n* Means that we can auto update the address register for free\n\nWriteback\n\n* Allows you to implement the equivalent of the C *p++ and *++p\n* Already seen similar to LDRB R2, [R1]\n* Means \"Load the low-order byte, at the memory location at address held in R1 into in R2\"\n* We then did an ADD R1, R1, #1 to update the address\n\nWriteback\n\n* But we can also do LDRB R2, [R1], #1 and use write back to get the same effect\n* This will copy the contents of the place in memory denoted by [R1] into R2\n* But afterwards update the pointer in R1 to point to the next byte (i.e. add one to the value in R1)\n* This is done for free!\n\nNo extra cycles spent on doing this\n\nGo and show how we can alter strlen.s to use write back and compare the different addresses.\n\nPre-index Writeback\n\n* Can also do the same with a pre-index operation\n* But the syntax is different\n* Here we just put an ! after the square brackets, e.g. LDR R1, [R0, #4]!\n* This loads R1 with the value at memory location R0+4\n* And updates R0 to contain R0 + 4\n\nARM Indirect Addressing Summary\n\n* Offset can be a number, -number, Register or Register\n* Register offsets can also be shifted…\n\nSubroutines and Stacks\n\nWhat is a Function?\n\n* In C, we've written functions\n* Small blocks of code that can be called and reused\n* Also called Sub-Routines, Procedures, or Methods\n* Technically, a function should return a value\n* Some purists would argue that a C function returning void is actually a procedure\n\nWhy Procedures?\n\n* Procedures reduce duplication of code and enable re-use\n* Decompose programs into smaller, manageable parts\n* Procedures call other procedures, possibly even themselves\n* What happens when we call a procedure?\n\nCalling a Procedure\n\n* When we call a procedure\n* The caller is suspended\n* Control is passed to the callee\n* Callee performs the requested task\n* Callee returns control to the caller\n* How do we implement this in assembler?\n\nImplementing Subroutines\n\n* Have already seen how we can jump to a block of code\n* Use the branch (B) instruction…\n* Can branch to the start of the callee…\n* But how do we get back into the caller?\n* How about another branch?\n\nBranch to the instruction after the call\n\nHow do we get back?\n\nImplementing Subroutines\n\n* This works…\n* Caller (main) calls the subroutine (strlen)\n* Callee (strlen) can then calculate the length of the string\n* Before branching back into the caller (main)\n* But what if we want to call strlen twice?\n\nOoops, now branches back to next again — which is the wrong place!\n\nImplementing Subroutines\n\n* We've hard-coded the 'return' address which means we can only call it from one place\n* The callee has no way of knowing how where it should jump back to\n* Only the caller knows this\n* Need a mechanism for the caller to let the callee know where to branch back to…\n\nSelf-modifying code\n\n* Recall that a program is just a series of opcodes in memory\n* This memory can be modified like any other\n* Program as it is running replaces the bytes making up the branch instruction with an instruction that branches to the right place\n\nCalculate the correct offset and formulate it as an instruction…\n\nThen store it in memory at the right point\n\nEDSAC and the Wheeler jump\n\nSelf-modifying Code\n\n* This is messy!\n* But it works\n* Was used on some of the first computers to implement sub-routines\n\nProgram Counter\n\n* There's another way we can change which instruction the CPU executes next\n* Remember that the Program Counter is just another register (R15 on the ARM)\n* If we move a value into R15 then the CPU will execute the instruction at that new address next\n\nProgram Counter\n\n* The caller knows which is the next instruction that should execute\n* So it could pass the address of that function to the callee\n* When the callee has finished it can just move that address into the PC to return to the caller\n\nLink Register\n\n* On ARM, this is done by passing the address in register R14\n* Which is called the Link Register\n* Callee can then return to the caller with a simple MOV PC, R14\n\nNow each time strlen is called, R14 has a different address\n\nIf we remember the Fetch-decode-execute cycle then we can remember that the PC will already be pointing 2 instructions ahead so we could just replace it with a MOV R14,PC rather than having to get the address of a label…\n\nSuch a common thing to do that it is built into the CPU with the BL instruction Branch-with-link\n\nBranch-with-link if equal…\n\nBranch-with-Link\n\n* Branch with Link instruction (BL) automatically puts the address of the following instruction in R14\n* Always R14, we can't chose the register\n* Can also be a conditional branch (e.g. BLEQ)\n* Subroutine can then return to the next instruction with ease…\n\nBasic procedure calls\n\n* Seen that BL instruction uses R14 as the link register to store return address\n* In simple cases, at the end of a procedure we just need to do MOV PC, R14\n* Some routines may be able to do their job solely with registers\n* Need conventions for register usage to avoid overwriting and misunderstandings\n* Thus we have the APCS (ARM Procedure Call Standard) to guide us…\n\n| Register | APCS name |\n|---|---|\n| R0 | a1 |\n| R1 | a2 |\n| R2 | a3 |\n| R3 | a4 |\n| R4 | v1 |\n| R5 | v2 |\n| R6 | v3 |\n| R7 | v4 |\n| R8 | v5 |\n| R9 | sb/v6 |\n| R10 | sl/v7 |\n| R11 | fp |\n| R12 | ip |\n| R13 | sp |\n| R14 | lr |\n| R15 | pc |\n\nScratch registers do not need to be preserved through a function call, but all other registers should be. As far as the caller is concerned it should be as if the function call never happened\n\nNote if more arguments are needed than registers they are placed on the stack before the procedure call. Each argument must take up a multiple of 4 bytes on the stack. For 8-byte wide values, two registers are used…\n\nCaller Saved Registers\n\n* R0—R3 used to pass arguments into a function\n* Inside the function they may be used by the function for any purpose.\n* R0 often used to return the result\n* Caller must expect R0–R3 to be trashed (reused) by the procedure…\n\nCaller Saved Registers\n\n* If the Caller doesn't want the values in R0-R3 trashing,then it must preserve them itself (e.g. by saving them in memory)\n* A typical simple leaf function (such as strlen)\n* Would only use R0–R3\n* Be called with BL\n* Returns with MOV PC, R14\n\nLeaf instruction is one that doesn't call any other function…\n\nIf it did call another function then R14 would get trashed…\n\nCallee Saved Registers\n\n* R4–R8 are registers which the callee is expected to save if it uses them\n* In other words, the values of R4–R8 should be unchanged when control returns to the calling function\n* So if the called function needs these register for extra workspace, it must save them\n* And then restore them before returning to the caller\n\nSaving Registers\n\n* We have a limited number of registers\n* But lots of memory\n* Can use memory to save the values\n* But we need a disciplined way to do this\n* Most often this is done using a stack\n\nLike a stack of plates, we can only remove the top thing from the stack (although we can peek at the values below it)\n\nPushing the values on the stack and then popping them back off in the reverse order\n\nPushing the values on the stack and then popping them back off in the reverse order\n\nPushing the values on the stack and then popping them back off in the reverse order\n\nPushing the values on the stack and then popping them back off in the reverse order\n\nPushing the values on the stack and then popping them back off in the reverse order\n\nStack Implementation\n\n* How do we implement a stack in memory?\n* Turns out that there are various approaches\n* Need a stack pointer, register R13 is used on ARM\n* But what does it point to?\n\nStack Implementation\n\n* Does the stack grow downwards (descending addresses) or upwards (ascending addresses) in memory?\n* Does the stack pointer point to the topmost filled location (full stack)\n* Or should it point to the next empty location just beyond the top of the stack (stack empty)?\n* No right answer, but most systems including ARM use a \"full-descending\" stack\n\nThat means the stack pointer points to the top-most item on the stack (full) and the memory addresses grow downwards\n\nSaw this in PRG\n\nStack pointer starts off at the top of memory and moves down and up as things are pushed and popped (respectively) between the top of memory and the stack limit\n\nUsing the APCS names for things here — some assemblers (like aasm) will let you use these names interchangeable with R13 (for sp) etc.\n\nStack Implementation\n\n* Can use LDR and STR to push and pop registers from the stack\n* Because we are using a full-descending stack, we need to use pre-decrement to push something on the stack STR R0, [R13, #-4]!\n* And post-increment to pop LDR R0, [R13],#4\n\nYou might need to draw a stack here and show how it works\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nNote that after a value has been 'popped' off the stack its still left in memory\n\nStack Implementation\n\n* Can also access values pushed on the stack without popping them\n* Just use an offset from the stack point R13\n* For example, to access the third thing on the stack LDR R0, [R13, #8]\n* Offsets are positive because we use a fulldescending stack\n\nIf we'd have used an ascending stack we would have needed to use negative offsets…\n\nPositive offsets in memory allow us to access values on the stack (although there's no change to the stack pointer\n\nMultiple Loads and Stores\n\n* Stack is a good place to preserve register values\n* ARM provides instructions to load and store registers en bloc\n* Rather than having to use multiple STR and LDR operations\n* Using the LDM and STM instructions (Load/Store Multiple)\n\nFD = full-descending\n\nMultiple Loads and Stores\n\n* These instructions again use a base register, with an option for write-back\n* For the main stack, we use R13 as the base register\n* LDM/STM both require a suffix depending on the stack regime\n* For APCS, we use LDMFD and STMFD\n\nLDM/STM Addressing Modes\n\n* ARM instruction set provides four addressing modes for LDM/STM\n* Addressing mode is provided as a suffix to the instruction, e.g. LDMIA, STMDB\n* Describes whether the addresses are incremented or decremented\n* And whether it happens before or after the values are loaded/stored\n\n| Suffix | Meaning |\n|---|---|\n| IA | Increment After |\n| IB | Increment Before |\n| DA | Decrement After |\n| DB | Decrement Before |\n\nLDM / STM Addressing Modes\nSuffix\nMeaning\nIA\nIncrement After\nIB\nIncrement Before\nDA\nDecrement After\nDB\nDecrement Before\n\n| Stack Type | Push | Pop |\n|---|---|---|\n| Full, Descending | STMFD (STMDB) | LDMFD (LDMIA) |\n| Full, Ascending | STMFA (STMIB) | LDMFA (LDMDA) |\n| Empty, Descending | STMED (STMDA) | LDMED (STMIB) |\n\nAssemblers also provide stack-oriented suffixes, where you tell it what stack regime you are using. Assembler then maps this automatically to the correct addressing mode (shown in brackets). We'll only worry about the first type\n\nThe effect of the different addressing modes for STM/LDM starting at R13\n\nFull Descending Stack\n\n* With a Full Descending stack, a multiple store (STMFD) corresponds to pushing registers onto the stack\n* Conversely, a multiple load (LDMFD) corresponds to a pop from the stack\n* Could use STMDB and LDMIA as well\n\nFull Descending Stack\n\n* Consider LDMFD R13, {R0-R3}\n* Registers specified between curly braces\n* This is equivalent to:\n* But notice that R13 isn't updated\n\n```\nLDR R0, [R13] LDR R1, [R13, #4] LDR R2, [R13, #8] LDR R3, [R13, #12]\n```\n\nStack Writeback\n\n* If we want the stack pointer, R13, to be updated then we need to specify that we want write back\n* Done by placing a ! after the base register\n* For example: LDMFD R13!, {R0-R3}\n\nLDMxx/STMxx\n\n* Register list is specified between curly braces\n* Use commas to separate them and a hyphen to specify a range, e.g. LDMFD R13!, {R0-R5, R8, R14}\n* Pops R0, R1, R2, R3, R4, R5, R8 and R14\n* Remember the item in the lowest address goes to the lowest register number\n\nStack Frames\n\n* Data stored on the stack as part of a function call forms part of the stack frame for that invocation\n* Stack frames are used to store register values, but also to create space for local variables used within the function\n* Also used to preserve the link register (R14)\n\nLocal variables go on the stack because you can then be sure of a unique instance of them for that invocation. Functions may be called while the function is already running (e.g. recursion, multi-threaded code, etc.) Can't always just be stored in registers (Even if we have enough of them, since we might need to pass the address to something)\n\nStack Frames\n\n* When a procedure exits and return to the caller, everything it put on the stack must be popped\n* This is why local variables vanish once a function exits\n* The caller expects the stack to be exactly as it left it\n\nStoring the Link Register\n\n* If we are a leaf function (i.e. we don't call anything else) then there is no need to store the link register\n* If we do call a function, then it is necessary to preserve the link register\n* Why?\n\nNote how we restore to PC, not R14 — saves us an instruction\n\nStoring the Li<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "nk Register\n\n* The BL func1 in main stores the return address in R14\n* But then the BL func2 inside func1 overwrites it\n* So func2 returns correctly to func1\n* But if func1 were to return using MOV PC, R14 then R14 would have the wrong value\n\nStoring the Link Register\n\n* Non-leaf functions definitely need to stack the link register value\n* But note the stack frame push/pop in func1\n* The LDMFD restores the stored return address directly into the PC\n* This causes an instantaneous return to main\n\nLocal Variables\n\n* Local variables are stored on the stack\n* Guarantees a unique instance of the variables for each function invocation\n* Can easily create space for them on the stack by using a SUB instruction after we preserve the registers\n* Use an ADD later to remove them all quickly…\n* Can then use an offset from R13 to access them\n* But remember the offset will change as you push and pop more values…",
"role": "assistant"
}
] |
|
Making Appointments for Lobby Day!
Dear 2006 Lobby Day Participants,
Hello! Thank you for your interest in the Taking Action for Animals Lobby Day. We are looking forward to working with you for a successful lobbying experience. Although ideally it would be wonderful to meet with a legislator in person, in most cases you will be meeting with a member of the legislator's staff. Legislative staffers have tremendous influence over whether or not his/her boss will actively support a pro-animal bill. Therefore, a personal meeting with a legislative staff member is just as critical as meeting with the actual legislator.
Scheduling
As a part of your Lobby Day experience, it is your responsibility to call your legislator's offices and set up meetings. You should attempt to set up 3 meetings total (one meeting with each Senator and one with your Representative). Simply call (not e-mail) the office and request an appointment. Please understand that each office functions uniquely; some offices may ask that you place your request for a meeting in writing.
Please keep the following tips in mind:
* Schedule your meeting between 11:30 am and 3:30 pm on Tuesday, September 5
* When speaking to the legislative office, be sure to mention that you are a constituent
* The average meeting will be 10-15 minutes long. The time it takes to walk between offices could be as much as 30 minutes. Plan accordingly.
Within each office on Capitol Hill, there are staffers that work on specific issues for legislators. When calling the office to set up your meeting, ask for the animal protection staffer.
Here is a basic phone script to give you a sense of what to say to a staffer:
“Hello, my name is _______________, and I am a constituent of Senator/Representative ______________. I will be in Washington, DC on Tuesday, September 5 th , and I was wondering if I could meet with you briefly to discuss some general animal protection legislation with you.”
If the staffer says yes, be sure to make it a convenient time for you. If the animal protection staffer cannot meet with you, ask to meet with a different staffer.
When mentioning that you would like to discuss animal protection issues, it is best to start out really general. Our federal lobbyists will be working with you during the Monday evening workshop (5:15-7:00pm) to help you construct specific messages that would be most appropriate and effective for each staffer with whom you meet.
THE EARLIER YOU SCHEDULE THESE MEETINGS, THE BETTER! Call TODAY! For your specific legislators' specific contact information, please visit www.hsus.org/leglookup
We will be giving you more information to assist you in the actual appointments, don't worry. The main goal right now is to schedule these appointments.
If you run into problems or have any questions, please contact me at [email protected] or (202) 955-3678.
I look forward to assisting you in any way that I can and of course seeing you on Tuesday, September 5 th !
Sincerely,
Kelley Dupps Grassroots Outreach Coordinator The Humane Society of the United States 202-955-3678 [email protected]
LOBBYING TIPS
HOW TO BE AN EFFECTIVE ANIMAL ADVOCATE
Know who represents you at all levels of government. Keep phone numbers and addresses handy, quick action! Help others do the same.
State a clear and concise objective. For example, say that you want to ban canned hunts (specific) -- not just that you want to stop outrageous hunting practices (too broad).
Identify yourself by name and organization (if any) when talking with an elected official.
Explain why this issue is important to you personally. If possible, link the issue to a personal experience or a situation in the elected official's district.
Get to know your elected officials. Make an effort to appear at their town meetings and other events and be sure they hear you ask at least one question on animal issues at each event.
Never lie to or mislead a legislator - especially to someone who is on your side and needs to know the truth about an issue. Trust is essential for a working relationship.
Be aware of previous actions the official has taken on behalf of animals. You can be sure the opposition is aware of the assistance he or she gave on our behalf.
Explain the meaning of terms that may be unfamiliar. For example, explain terms like "canned," "pound seizure," "class B dealers." Broad statements such as "hunting bears with hounds is inexcusable" may reflect how you feel, but doesn't convey a message as to what action needs to be taken by the official.
Explain how important it is for your elected officials to adequately fund animal programs -ranging from local animal control, to state enforcement of wildlife protection laws, to enforcement of the Animal Welfare Act and others. Let them know that this is how you want your tax dollars spent.
Get to know & develop relationships with key people having influence over animals. For example, animal control officers, veterinarians, state wildlife board members, prosecuting attorneys, and health department officials have a major impact on animal protection bills. Legislators listen to their views so work with them whenever possible.
Join forces with other types of groups who may have the same position as you even if for different reasons - such as churches, teachers, chambers of commerce, local universities, or specific industries. Whenever appropriate, get school children to support your efforts.
Wear many hats - not just your animal advocate hat. When lobbying legislators, identify yourself as a parent, businessperson, campaign contributor, or fellow church/club/team member, etc.
Work with legislative staff. They often have more knowledge of the issues and its chances, can give you vital background on the legislation's outlook, and have extraordinary clout.
Get involved in legislative campaigns - as an individual, not a nonprofit group. Volunteer to work, place a campaign sign in your yard, hand out leaflets, or otherwise help get someone elected.
Develop a relationship with reporters, editors and editorial boards in local media outlets.
Do not threaten or antagonize a legislator. If this elected official opposes you, but respects and bears you no animosity, you may find common ground in the future on another issue. But if you make an enemy, that person may take extra steps to defeat the bill you support. A legislator who doesn't agree with you on wildlife issues may be great on companion animal issues and vice versa. Don't make enemies. Today's city council member can be tomorrow's governor.
Refer to bills by their numbers AND name. For example, "Please support SB 405, the Dog Protection Act".
Listen to elected officials' comments and questions on an issue. If they ask how a bill will impact jobs, or medical care, or the budget, you know where their concern is focused. Find ways to address those issues.
Explain terms or abbreviations that may be unfamiliar without explaining their meaning such as USDA, PETA, or even HSUS.
Sometimes we have to compromise. As long as such a change won't harm any animals, consider the situation carefully. Learn legislative strategies that might save a bill otherwise destined to die such as sunset provisions, grand fathering clauses, and placing provisions into regulation instead of a statute.
Thank someone who was helpful. Whenever possible, let your membership know how very helpful the person has been.
Respond to action alerts sent by The HSUS and other groups. When these are sent, legislation is usually close to passage or in a precarious position and your action can make a tremendous difference.
Support H.R. 503 / S. 1915 – American Horse Slaughter Prevention Act
Representatives John Sweeney (R-NY) and John Spratt (D-SC) and Senators John Ensign (R-NV) and Mary Landrieu (D-LA) have introduced H.R. 503/S.1915, The American Horse Slaughter Prevention Act. This legislation bans the slaughter of horses for human consumption and the domestic and international transport of live horses or horseflesh for human consumption. Congress passed an amendment to the FY2006 Agriculture Appropriations amendment by overwhelming and bipartisan majorities in both House (269-158) and Senate (69-28), however the United States Department of Agriculture has refused to implement even this temporary ban on horse slaughter. Passage of a permanent ban is necessary in order to protect American horses.
Horses are our trusted companions, a symbol of grace and beauty, and have contributed greatly to our society throughout history. Horses have never been raised for human consumption in America. However, American horses are being killed for the palates of overseas diners in Italy, France, Belgium, and Japan. Many thousands of live horses are also transported across the border to Canada for slaughter. Show horses, racehorses, foals born as a "byproduct" of the Premarin© industry (a female hormone replacement drug), wild horses, carriage horses, and family horses are victims of the horse slaughter industry. Thousands of horses are stolen every year for the horsemeat trade.
There are only three slaughterhouses in the US – all are foreign-owned. According to the USDA, more than 91,000 American horses were slaughtered in the U.S. in 2005. Another 25,000 are believed to have been shipped live to another country to be slaughtered for human consumption last year.
Where These Horses Come From
Many horses are unknowingly sold to slaughter, while many are stolen and sold for a profit. When California banned horse slaughter, horse theft decreased by 34%. Wild horses often are sold to slaughter. Logs from all three plants show that thousands of wild horses have been slaughtered in recent years. Irresponsible owners who wish to squeeze a final dollar from horses that have served them for years may seek to dispose their animals via slaughter. However, most are purchased at auction, where their former owners have no idea that they will be butchered. Sick, sore, lame, disabled, blind, and pregnant horses are legally trucked and slaughtered. Killer buyers and slaughterhouses try to suggest that all the horses they slaughter are old and past recovery. In truth, some horses may be sick or injured because of neglect but many more are sound and in good health.
A Brutal End
The cruelty of horse slaughter is not limited to the killing, but the entire process involves great suffering. Horses bound for slaughter plants are shipped, frequently over long distances, in inhumane conditions. They are typically given no food, water or rest. Terrified horses and ponies are commonly crammed together and transported to slaughter in double-deck trucks designed for cattle and pigs. The truck ceilings are so low that horses are not even able to hold their heads in a balanced position. Inappropriate floor surfaces cause slips and falls, and sometimes even trampling. Some horses arrive at the slaughterhouse seriously injured or dead.
Under federal law, horses are required to be rendered unconscious prior to slaughter, usually with a captive bolt pistol, which shoots a metal rod into the horse's brain. Conditions in the slaughterhouse are stressful and frightening for horses. Horses are different from cattle due to their instinctive flight response in stressful conditions, making it difficult to accurately stun them prior to slaughter. Our undercover footage has shown that some horses are improperly stunned and are conscious when they are shackled and hoisted by a rear leg to have their throats cut. Death at the slaughterhouse is anything but a humane end for horses.
MYTHS AND FACTS REGARDING HORSE SLAUGHTER
Myth: The ban will lead to an increase in horse abuse and neglect cases.
Fact: A ban on horse slaughter will not lead to an increase in horse abuse and neglect. In California, where horse slaughter was banned in 1998, there has been no corresponding rise in cruelty and neglect cases. Horse theft has dropped by 34% since enactment of the ban. Allowing one's horse to starve is not an option – state anti-cruelty laws prohibit such neglect.
Myth: There is no need for this ban because slaughter is humane euthanasia.
Fact: Horse slaughter is a far cry from humane euthanasia. "Euthanasia" means a gentle, painless death provided in order to prevent suffering. Horse slaughter is a death fraught with terror, pain, and suffering. Horses are shipped for more than 24 hours at a time in crowded double-deck cattle trucks without food, water, or rest. Pregnant mares, foals, injured horses, and even blind horses must endure the journey. Once they arrive, their suffering intensifies – undercover footage obtained by The HSUS demonstrates that fully conscious horses are shackled and hoisted by the rear leg and have their throats slit. Because horses are skittish by nature, it is particularly difficult to align them correctly and ensure that the captive bolt stun gun renders them unconscious. When no other option exists, unwanted horses should be humanely euthanized by a licensed veterinarian rather than placed on a truck, cruelly transported and then butchered. Most horse owners already use humane euthanasia for their older or ill horses.
Myth: Transport guidelines prevent harm to horses shipped to slaughter.
Fact: The 2002 guidelines allow horses to be shipped for more than 24 hours without food, water or rest, with broken limbs, with eyes missing, even heavily pregnant. Industry successfully pushed to delay the prohibition on the use of double-decker trucks until December 7, 2006. The regulations cover only the final journey to the slaughterhouse. If horses are loaded and unloaded at various places as part of their route to slaughter, only the final leg of the trip is covered. Since the enforcement of these guidelines occurs only after the truck reaches the slaughter plant, these guidelines have little preventative effect and allow extreme suffering in transport to continue.
Myth: If horses can no longer be slaughtered, their welfare is at risk due to the lack of adequate equine rescue facilities and uniform standards for them.
Fact: Standards of care have already been developed and embraced by the hundreds of equine rescue and retirement facilities that exist throughout the country that routinely rescue horses from slaughter. All must comply with state and local animal welfare statutes. In an effort to end the slaughter of racehorses, the New York Racing Association has partnered with other groups to launch the "Ferdinand Fee" to raise funds for the care of retired racehorses, and to honor Ferdinand, a former Kentucky Derby winner sent to slaughter. The organizations leading the charge in favor of the Ensign-Byrd amendment are the very organizations that are actively working to provide sanctuaries and solutions for horses that would otherwise go to slaughter.
Myth: Ending horse slaughter will cause environmental harm.
Fact: Hundreds of thousands of horses are safely and humanely disposed of annually by means other than slaughter, and the infrastructure can absorb an increase in numbers. Conversely, the operation of the horse slaughterhouses has a very real negative environmental impact, with two out of the three in violation of current environmental law related to the disposal of blood and other waste materials.
Myth: If this legislation is enacted, the federal government will face the financial burden of care for horses no longer going to slaughter.
Fact: This assertion rests on the false premise that all horses currently going to slaughter would become the financial responsibility of the federal government. Horse owners, not the government, will remain responsible for the care of their horses. Owners who no longer wish to keep their horses and who cannot sell or place their horses in a new home will have the option of humane euthanasia. The average cost for veterinarianadministered euthanasia and carcass disposal – approximately $225, the cost of one month's care – is simply a part of responsible horse ownership.
|
<urn:uuid:7921e751-c5d7-461b-9447-1a7fc3117b85>
|
CC-MAIN-2017-13
|
http://www.humanesociety.org/assets/pdfs/rallyforhorses_minikit.pdf
|
2017-03-27T10:54:46Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189471.55/warc/CC-MAIN-20170322212949-00229-ip-10-233-31-227.ec2.internal.warc.gz
| 570,000,656
| 3,273
|
eng_Latn
|
eng_Latn
| 0.99874
|
eng_Latn
| 0.999186
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2625,
3120,
5852,
7676,
11661,
16103
] |
Making Appointments for Lobby Day!
Dear 2006 Lobby Day Participants,
Hello! Thank you for your interest in the Taking Action for Animals Lobby Day. We are looking forward to working with you for a successful lobbying experience. Although ideally it would be wonderful to meet with a legislator in person, in most cases you will be meeting with a member of the legislator's staff. Legislative staffers have tremendous influence over whether or not his/her boss will actively support a pro-animal bill. Therefore, a personal meeting with a legislative staff member is just as critical as meeting with the actual legislator.
Scheduling
As a part of your Lobby Day experience, it is your responsibility to call your legislator's offices and set up meetings. You should attempt to set up 3 meetings total (one meeting with eac
|
h Senator and one with your Representative).
| 829
|
inside_word
|
each
|
remove_all
|
<url>
http://www.humanesociety.org/assets/pdfs/rallyforhorses_minikit.pdf
</url>
<text>
Making Appointments for Lobby Day!
Dear 2006 Lobby Day Participants,
Hello! Thank you for your interest in the Taking Action for Animals Lobby Day. We are looking forward to working with you for a successful lobbying experience. Although ideally it would be wonderful to meet with a legislator in person, in most cases you will be meeting with a member of the legislator's staff. Legislative staffers have tremendous influence over whether or not his/her boss will actively support a pro-animal bill. Therefore, a personal meeting with a legislative staff member is just as critical as meeting with the actual legislator.
Scheduling
As a part of your Lobby Day experience, it is your responsibility to call your legislator's offices and set up meetings. You should attempt to set up 3 meetings total (one meeting with eac<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.humanesociety.org/assets/pdfs/rallyforhorses_minikit.pdf\n</url>\n<text>\nMaking Appointments for Lobby Day!\n\nDear 2006 Lobby Day Participants,\n\nHello! Thank you for your interest in the Taking Action for Animals Lobby Day. We are looking forward to working with you for a successful lobbying experience. Although ideally it would be wonderful to meet with a legislator in person, in most cases you will be meeting with a member of the legislator's staff. Legislative staffers have tremendous influence over whether or not his/her boss will actively support a pro-animal bill. Therefore, a personal meeting with a legislative staff member is just as critical as meeting with the actual legislator.\n\nScheduling\n\nAs a part of your Lobby Day experience, it is your responsibility to call your legislator's offices and set up meetings. You should attempt to set up 3 meetings total (one meeting with eac<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "h Senator and one with your Representative).",
"role": "assistant"
}
] |
|
POLICIES & PROCEDURES
Spread of the Gospel (Mark 16:15)
Our purpose is to build people to become role models of the Great Commandment and Great Commission, as commanded in Matthew Chapters 22 and 28; which are:
* "To Love The Lord Our God With All Our Heart, Soul and Mind… and Our Neighbor As Ourselves." Matthew 22:35-38
* "And To Go Out Into The World As His Witnesses and Make Disciples Until He Returns For the Church." Matthew 28:20
Night Walk Teams
Night Walk Team utilizes specific strategies to get individuals who are "drivers of violence" off the streets through outreach, ministry, love and direct communication; introducing them to an alternative lifestyle and a relationship with Jesus Christ. Night Walks and other strategies are important pieces of the puzzle that has the potential to significantly reduce violence in Chicago.
Bringing the Church to the Community (Mt. 5:14-16)
Inviting individuals to various church services are part of what we do. However, the main goal and vision of this work is to reduce violence and bring the church of Jesus Christ and all it has to offer to the people who need it. It is our strong belief that the blessings of God should not be confined inside the walls of a church building.
To touch people in their time of need so that they may feel the caring arms of God and to reach out in a manner that plants seeds and ultimately leads them to accept Christ as their personal Savior.
Consistency will lead individuals to Christ.
Deliver a Positive Message (I Cor. 2:2)
We speak, preach, and communicate the positive message of Jesus Christ with love. We understand that some individuals may not be ready to accept the Gospel with open arms and some may even reject our efforts. We are there to demonstrate love and compassion. As ambassadors for Christ we realize that forcing people to receive Jesus as there Lord and Savior is not always the most effective way to open people's hearts and minds to receive the message of Jesus Christ. It is important that we are viewed as credible messengers. We must remember the 3 second rule. We have seconds to be sure that we present ourselves as trusted individuals.
A Servant's Heart (Mt. 10:42)
We must do all our works as unto the Lord whether offering kind words and giving encouragement, we should always consider that it is a great opportunity and a privilege for we are laborers together with God. Doing our works this way will always bring glory to Christ and make us the greatest light in a dark world that we can possibly be.
Harmful Conversation (James 4:11)
Backbiting, rumors, speaking evil of one another, and gossip are tools of the devil to bring divisions, and must be exposed and eliminated immediately. Complete love and respect must be shown to all who work in this ministry, as well as to the people to whom we minister. Our basic principle will be, "If you would not say the words in the person's presence, do not say them in their absence."
This is not an opportunity to neither exchange numbers with people for "hook up" nor use language that is not appropriate for Kingdom business.
NIGHT WALK MISSION STATEMENT
100 Blocks 100 Churches Night Walk Outreach will enable the process of actively reaching and winning lives for Christ while reducing shootings in the Austin area of Chicago by targeting youth, young adults, and individuals impacted and engaging in gun violence. The purpose of the Night Walks is to touch and transform lives for Christ to the Glory of God through witnessing, evangelism, and discipleship.
PURPOSE
Congregations in Austin have organized night walks in collaboration with faith Leaders.
GOALS
* Develop relationships within the community
* Remain present in 15 th District "Hot Spots / Trouble Areas"
* Engage residents into the work
POLICIES
In order to be effective, 100 Blocks / 100 Churches Prayer Night Walks must be CONSISTENT and be performed in a Spirit of Excellency.
* Each team is to select a unified color for team shirts and be consistent is wearing the selected color on each Prayer Night Walk.
* Meeting site walks will be conduct weekly on Wednesdays. Pre-meetings will begin promptly at 6:00 pm. Walks will take place from 6:00 pm to 7:45 pm. Debriefing will be conducted thereafter and concluded by 7:50 pm.
o TEAM ROUTE:
§ Each site will develop routes according to desired opportunity
* Team Members should understand that this is a serious endeavor; walking and engaging the community with a purpose. DO NOT GET OFF TRACK [i.e. yelling, screaming, complaining, doing 'extra'].
* No one should ever be alone during a Prayer Night Walk. Team members are to be paired into groups of two (at a minimum). Each group should have a designated speaker and a designated recorder. The speaker is responsible for the verbal communication [i.e. conversation with residents]. The recorder is responsible for filling in the 100 Block / 100 Churches Contact Cards as needed.
* Children are permitted to participate. However, for safety precautions, children must be with a parent or guardian at all times.
* Team Members are advised not to hand out money. If a team member wants to give aid or help, it is better to ask the person what they need and direct them to appropriate resources. Handing out cash is not generally conducive to building healthy relationships with the people we are connecting with and ministering to.
* Team Members are to neither exchange numbers with people for "hook up" nor use language that is not appropriate for Kingdom business.
* Remember, our goal is not to offer unsolicited prayers. Our goal is to develop relationships. Through consistency, care, and love we will win them over to Christ and be instrumental in saving lives.
* Be relational. Develop relationships with people. Gather information. Pass out literature with contact info. Try to limit conversations to 2-5 minutes.
* Stay aware. The most effective way to ensure safety is to simply stay aware. If you are vigilant you can often spot things like loose dogs or a car that is driving too fast down the street. Thus, recognize the potential for danger and proceed with caution.
* Don't argue or be confrontational. On occasion, we will come in contact with individuals who are unreceptive to our presence. This can get worse if, for instance, you run into someone who is intoxicated and/or having a bad day. When you encounter someone who is combative, simply end the conversation, wish them well, and proceed on.
* Don't go inside. Never enter someone's home, even when invited. Always stay on the sidewalk, porch, or doorstep.
* Trust your instinct. Don't knock on a door or enter a yard you feel uneasy about. If something seems suspicious, or should you feel uncomfortable at any point during a Prayer Night Walk, notify your walk partner and/or team captain; identify and proceed to a safe location (i.e. original meeting site).
* If encountering a situation that seems criminal or dangerous protect your personal safety and that of the other team members. Personal safety is paramount. There is no need to endanger yourself EVER.
* Travel light. Only the essentials should be taken when canvassing. Valuables should be left at a secure location or hidden from sight.
* Carry a cell phone. In the event of an emergency, Team Members should always carry a cell phone. However, phones [and other valuables] should not be displayed unless emergency use is needed.
* Neighbors are often curious about what Prayer Night Walkers are doing. As long as the neighbors seem safe, be open and friendly. You are forming potential alliances with people who might want to join the Foot Patrol or help your cause in some other way. Likewise, be friendly towards kids you may encounter. It's valuable for them to see that theirs is a community that cares about safety and livability and is hopeful for the future.
* Use discretion when approaching vehicles.
* Use discretion when approaching a group of people.
* Use discernment in prayer (avoid inappropriate touching; at least one team member should keep their eyes open throughout prayer).
* Prayer should only be offered if there is an established relationship or if requested.
ATTIRE
Teams are to be uniformed in RED shirts. Comfortable walking shoes are suggested.
RESPECT OF PRIVACY
Total respect of privacy must be given to everyone we come in contact with. Team Members will not discuss the following with anyone except the Team Captains or other certified personnel and/or volunteers, after securing the permission:
* Contact Information (phone number, email, social network, or physical address)
* Gang Affiliation Information
* Any other information deemed personal.
* The only exception is if a confidentiality release form has been signed by the Person.
STRUCTURE OF WEEKLY MEETINGS
Adhering to weekly meeting structures provides consistency and allow participants the ability to adapt to Prayer Walk policies and procedures.
MEETING STRUCTURES:
* Pre-Walk Meetings should start promptly at 6:00 pm.
* Team Members are to be encourage to meet at the designated meeting site at 6pm in order to receive specific instructions for the current walk. Team Members unable to meet at the designated site should be informed where to join team along walk route.
* The 100 Blocks / 100 Churches Prayer Night Walks Purpose Statement along with the team's walk route should be reviewed at each meeting.
* Ten [10] minutes of each meeting should be dedicated to providing instructions for the current walk.
* Following each Prayer Night Walk, a fifteen to twenty [15-20] minute Debriefing Meeting should be conducted upon returning to the designated meeting site. This meeting is to discuss what took place, issues addressed, issues that require follow-up, and what things need to be complete for the team's next walk.
* Both Pre-Walk Meetings and Debriefing Meetings are to be opened and closed in prayer.
DUTIES OF TEAM CAPTAINS
1. Know Your Team
* Maintain a team list. This ensures that you have the ability to notify Team Members of schedule changes or cancelations.
* Exchange contact numbers with co-captains and provide your contact information to your team members. This allows for accountability and for notification in the event of an emergency.
2. Secure Location
* Ensure that your teams meeting site is open and accessible at the selected time of meetings and remains accessible for the duration of the walk.
3. Provide Instructions
* Ensure that your team has a clear understanding of their purpose prior to each Prayer Walk.
4. Be Prepared
* Ensure that your team has ample supplies to make canvassing easier [i.e. pens, contact cards, resource cards, clipboards, etc.] Having a clipboard to write on may make recording the results of conversations much easier.
5. Prayer
* Begin and conclude each pre-walk meeting and debriefing meeting in prayer, praying for your team, the community, and the Kingdom.
6. Be Consistent
* Ensure that walks are organized and properly conducted on a regularly scheduled basis.
7. Reporting
Following each Prayer Walk Debriefing Meeting, Captains are to report on the following:
* Number of participating team members
* Number of prayers performed
* Number of needs addressed
* Issues / items requiring follow-up
6:00 Opening Prayer
6:03 Introductions
Be sure to make sure that everyone knows who is in the group and understands that we are to keep our eyes on each other. Everyone should sign in if they have not. Captains should report number of participants to the designated person or email information.
6:08 Purpose of 100 Blocks / 100 Churches Night Walks
To reducing shootings in Chicago's 15 th Policing District by targeting youth, young adults, and individuals impacted and engaging in gun violence. To touch and transform lives for Christ to the Glory of God through witnessing, evangelism, and discipleship
6:10 Review Route
Map out the blocks that you will walk. (This is pre- work for captains) Divide the blocks up by teams and this depends on the amount of people).
6:15 Provide Walk Instructions
* Quickly break into pairs
* Assign roles [i.e. speaker, recorder]
* Provide walk materials [i.e. contact cards, resource information, etc.]
* Emphasize the need to stay alert and stay together. Never argue or press someone to talk with you.
6:25 Prayer
6:30 Begin Walk
* 30 minute walk out
* 30 Minutes Back
7:30 Debriefing Meeting
* One word Feeling
* What went well?
* What could have gone better?
* Suggestions for next walk?
Submit Material (contact cards, resources cards, etc.)
7:45 Closing Prayer
DETAILED PRE-WALK MEETING STRUCTURE
6:00 pm – 7:45 pm
SAMPLE PRAYER WALK RESPONSES
Scenario 1
Team Member:
Hello, my name is Thomas. How are you today?
Response:
I'm good but I don't want to talk.
Team Member:
No problem. We'll be back out next week. I hope to see you then.
Scenario 2
Team Member:
Hello, how are you today?
Response:
I'm good. What are you all doing?
Team Member:
We walk our community each week to show love, pray with our neighbors, and hopefully identify some ways to support the community. What are your thoughts about the gun violence in our area?
Response:
We need to do something about it.
Team Member:
The best thing that we can do is love each other and be present. Are you interested in learning more about the community led strategies that's being using to reduce the shootings? Our kids need all the support that our community can give.
Response:
Yes
Team Member:
Can you give me your information (fill out contact card)? Thanks (use name)! I will be in contact and I hope to see you next week.
Remember…
* Always remind them on when you will be back.
* Keep the conversations brief.
* Do not offer unsolicited prayers.
* Do not use this as an opportunity to promote church services. Again consistency will win them over.
* Listen. Be sure to take notes and gather the needed information. Don't ask for the information we are not detectives but gather what you hear.
* Are there any feuds currently occurring? Did you hear of any house or people that may be engaging in violence (we want to develop relationships with these individuals not submit their names to the police)?
* Did you make any observations?
|
<urn:uuid:f0e98ff0-d012-41e7-8da3-4acc82066da3>
|
CC-MAIN-2025-08
|
https://buildingblocksofpeace.com/wp-content/uploads/2024/12/2019-Prayer-Walks-Policies-and-Procedures-Manual.pdf
|
2025-02-08T18:31:17+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2025-08/subset=warc/part-00082-b184e832-acd1-425a-bab7-895830f2748a.c000.gz.parquet
| 128,043,044
| 3,020
|
eng_Latn
|
eng_Latn
| 0.99696
|
eng_Latn
| 0.9975
|
[
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
21,
3116,
5411,
8297,
9942,
11313,
12689,
14300
] |
POLICIES & PROCEDURES
Spread of the Gospel (Mark 16:15)
Our purpose is to build people to become role models of the Great Commandment and Great Commission, as commanded in Matthew Chapters 22 and 28; which are:
* "To Love The Lord Our God With All Our Heart, Soul and Mind… and Our Neighbor As Ourselves." Matthew 22:35-38
* "And To Go Out Into The World As His Witnesses and Make Disciples Until He Returns For the Church." Matthew 28:20
Night Walk Teams
Night Walk Team utilizes specific strategies to get individuals who are "drivers of violence" off the streets through outreach, ministry, love and direct communication; introducing them to an alternative lifestyle and a relationship with Jesus Christ. Night Walks and other strategies are important pieces of the puzzle that has the potential to significantly reduce violence in Chicago.
Bringing the Church to the Community (Mt. 5:14-16)
Inviting individuals to various church services are part of what we do. However, the main goal and vision of this work is to reduce violence and bring the church of Jesus Christ and all it has to offer to the people who need it. It is our strong belief that the blessings of God should not be confined inside the walls of a church building.
To touch people in their time of need so that they may feel the caring arms of God and to reach out in a manner that plants seeds and ultimately leads them to accept Christ as their personal Savior.
Consistency will lead individuals to Christ.
Deliver a Positive Message (I Cor. 2:2)
We speak, preach, and communicate the positive message of Jesus Christ with love. We understand that some individuals may not be ready to accept the Gospel with open arms and some may even reject our efforts. We are there to demonstrate love and compassion. As ambassadors for Christ we realize that forcing people to receive Jesus as there Lord and Savior is not always the most effective way to open people's hearts and minds to receive the message of Jesus Christ. It is important that we are viewed as credible messengers. We must remember the 3 second rule. We have seconds to be sure that we present ourselves as trusted individuals.
A Servant's Heart (Mt. 10:42)
We must do all our works as unto the Lord whether offering kind words and giving encouragement, we should always consider that it is a great opportunity and a privilege for we are laborers together with God. Doing our works this way will always bring glory to Christ and make us the greatest light in a dark world that we can possibly be.
Harmful Conversation (James 4:11)
Backbiting, rumors, speaking evil of one another, and gossip are tools of the devil to bring divisions, and must be exposed and eliminated immediately. Complete love and respect must be shown to all who work in this ministry, as well as to the people to whom we minister. Our basic principle will be, "If you would not say the words in the person's presence, do not say them in their absence."
This is not an opportunity to neither exchange numbers with people for "hook up" nor use language that is not appropriate for Kingdom business.
NIGHT WALK MISSION STATEMENT
100 Blocks 100 Churches Night Walk Outreach will enable the process of actively reaching and winning lives for Christ while reducing shootings in the Austin area of Chicago by targeting youth, young adults, and individuals impacted and engaging in gun violence. The purpose of the Night Walks is to touch and transform lives for Christ to the Glory of God through witnessing, evangelism, and discipleship.
PURPOSE
Congregations in Austin have organized night walks in collaboration with faith Leaders.
GOALS
* Develop relationships within the community
* Remain present in 15 th District "Hot Spots / Trouble Areas"
* Engage residents into the work
POLICIES
In order to be effective, 100 Blocks / 100 Churches Prayer Night Walks must be CONSISTENT and be performed in a Spirit of Excellency.
* Each team is to select a unified color for team shirts and be consistent is wearing the selected color on each Prayer Night Walk.
* Meeting site walks will be conduct weekly on Wednesdays. Pre-meetings will begin promptly at 6:00 pm. Walks will take place from 6:00 pm to 7:45 pm. Debriefing will be conducted thereafter and concluded by 7:50 pm.
o TEAM ROUTE:
§ Each site will develop routes according to desired opportunity
* Team Members should understand that this is a serious endeavor; walking and engaging the community with a purpose. DO NOT GET OFF TRACK [i.e. yelling, screaming, complaining, doing 'extra'].
* No one should ever be alone during a Prayer Night Walk. Team members are to be paired into groups of two (at a minimum). Each group should have a designated speaker and a designated recorder. The speaker is responsible for the verbal communication [i.e. conversation with residents]. The recorder is responsible for filling in the 100 Block / 100 Churches Contact Cards as needed.
* Children are permitted to participate. However, for safety precautions, children must be with a parent or guardian at all ti
|
mes.
| 5,088
|
inside_word
|
times.
|
remove_all
|
<url>
https://buildingblocksofpeace.com/wp-content/uploads/2024/12/2019-Prayer-Walks-Policies-and-Procedures-Manual.pdf
</url>
<text>
POLICIES & PROCEDURES
Spread of the Gospel (Mark 16:15)
Our purpose is to build people to become role models of the Great Commandment and Great Commission, as commanded in Matthew Chapters 22 and 28; which are:
* "To Love The Lord Our God With All Our Heart, Soul and Mind… and Our Neighbor As Ourselves." Matthew 22:35-38
* "And To Go Out Into The World As His Witnesses and Make Disciples Until He Returns For the Church." Matthew 28:20
Night Walk Teams
Night Walk Team utilizes specific strategies to get individuals who are "drivers of violence" off the streets through outreach, ministry, love and direct communication; introducing them to an alternative lifestyle and a relationship with Jesus Christ. Night Walks and other strategies are important pieces of the puzzle that has the potential to significantly reduce violence in Chicago.
Bringing the Church to the Community (Mt. 5:14-16)
Inviting individuals to various church services are part of what we do. However, the main goal and vision of this work is to reduce violence and bring the church of Jesus Christ and all it has to offer to the people who need it. It is our strong belief that the blessings of God should not be confined inside the walls of a church building.
To touch people in their time of need so that they may feel the caring arms of God and to reach out in a manner that plants seeds and ultimately leads them to accept Christ as their personal Savior.
Consistency will lead individuals to Christ.
Deliver a Positive Message (I Cor. 2:2)
We speak, preach, and communicate the positive message of Jesus Christ with love. We understand that some individuals may not be ready to accept the Gospel with open arms and some may even reject our efforts. We are there to demonstrate love and compassion. As ambassadors for Christ we realize that forcing people to receive Jesus as there Lord and Savior is not always the most effective way to open people's hearts and minds to receive the message of Jesus Christ. It is important that we are viewed as credible messengers. We must remember the 3 second rule. We have seconds to be sure that we present ourselves as trusted individuals.
A Servant's Heart (Mt. 10:42)
We must do all our works as unto the Lord whether offering kind words and giving encouragement, we should always consider that it is a great opportunity and a privilege for we are laborers together with God. Doing our works this way will always bring glory to Christ and make us the greatest light in a dark world that we can possibly be.
Harmful Conversation (James 4:11)
Backbiting, rumors, speaking evil of one another, and gossip are tools of the devil to bring divisions, and must be exposed and eliminated immediately. Complete love and respect must be shown to all who work in this ministry, as well as to the people to whom we minister. Our basic principle will be, "If you would not say the words in the person's presence, do not say them in their absence."
This is not an opportunity to neither exchange numbers with people for "hook up" nor use language that is not appropriate for Kingdom business.
NIGHT WALK MISSION STATEMENT
100 Blocks 100 Churches Night Walk Outreach will enable the process of actively reaching and winning lives for Christ while reducing shootings in the Austin area of Chicago by targeting youth, young adults, and individuals impacted and engaging in gun violence. The purpose of the Night Walks is to touch and transform lives for Christ to the Glory of God through witnessing, evangelism, and discipleship.
PURPOSE
Congregations in Austin have organized night walks in collaboration with faith Leaders.
GOALS
* Develop relationships within the community
* Remain present in 15 th District "Hot Spots / Trouble Areas"
* Engage residents into the work
POLICIES
In order to be effective, 100 Blocks / 100 Churches Prayer Night Walks must be CONSISTENT and be performed in a Spirit of Excellency.
* Each team is to select a unified color for team shirts and be consistent is wearing the selected color on each Prayer Night Walk.
* Meeting site walks will be conduct weekly on Wednesdays. Pre-meetings will begin promptly at 6:00 pm. Walks will take place from 6:00 pm to 7:45 pm. Debriefing will be conducted thereafter and concluded by 7:50 pm.
o TEAM ROUTE:
§ Each site will develop routes according to desired opportunity
* Team Members should understand that this is a serious endeavor; walking and engaging the community with a purpose. DO NOT GET OFF TRACK [i.e. yelling, screaming, complaining, doing 'extra'].
* No one should ever be alone during a Prayer Night Walk. Team members are to be paired into groups of two (at a minimum). Each group should have a designated speaker and a designated recorder. The speaker is responsible for the verbal communication [i.e. conversation with residents]. The recorder is responsible for filling in the 100 Block / 100 Churches Contact Cards as needed.
* Children are permitted to participate. However, for safety precautions, children must be with a parent or guardian at all ti<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://buildingblocksofpeace.com/wp-content/uploads/2024/12/2019-Prayer-Walks-Policies-and-Procedures-Manual.pdf\n</url>\n<text>\nPOLICIES & PROCEDURES\n\nSpread of the Gospel (Mark 16:15)\n\nOur purpose is to build people to become role models of the Great Commandment and Great Commission, as commanded in Matthew Chapters 22 and 28; which are:\n\n* \"To Love The Lord Our God With All Our Heart, Soul and Mind… and Our Neighbor As Ourselves.\" Matthew 22:35-38\n* \"And To Go Out Into The World As His Witnesses and Make Disciples Until He Returns For the Church.\" Matthew 28:20\n\nNight Walk Teams\n\nNight Walk Team utilizes specific strategies to get individuals who are \"drivers of violence\" off the streets through outreach, ministry, love and direct communication; introducing them to an alternative lifestyle and a relationship with Jesus Christ. Night Walks and other strategies are important pieces of the puzzle that has the potential to significantly reduce violence in Chicago.\n\nBringing the Church to the Community (Mt. 5:14-16)\n\nInviting individuals to various church services are part of what we do. However, the main goal and vision of this work is to reduce violence and bring the church of Jesus Christ and all it has to offer to the people who need it. It is our strong belief that the blessings of God should not be confined inside the walls of a church building.\n\nTo touch people in their time of need so that they may feel the caring arms of God and to reach out in a manner that plants seeds and ultimately leads them to accept Christ as their personal Savior.\n\nConsistency will lead individuals to Christ.\n\nDeliver a Positive Message (I Cor. 2:2)\n\nWe speak, preach, and communicate the positive message of Jesus Christ with love. We understand that some individuals may not be ready to accept the Gospel with open arms and some may even reject our efforts. We are there to demonstrate love and compassion. As ambassadors for Christ we realize that forcing people to receive Jesus as there Lord and Savior is not always the most effective way to open people's hearts and minds to receive the message of Jesus Christ. It is important that we are viewed as credible messengers. We must remember the 3 second rule. We have seconds to be sure that we present ourselves as trusted individuals.\n\nA Servant's Heart (Mt. 10:42)\n\nWe must do all our works as unto the Lord whether offering kind words and giving encouragement, we should always consider that it is a great opportunity and a privilege for we are laborers together with God. Doing our works this way will always bring glory to Christ and make us the greatest light in a dark world that we can possibly be.\n\nHarmful Conversation (James 4:11)\n\nBackbiting, rumors, speaking evil of one another, and gossip are tools of the devil to bring divisions, and must be exposed and eliminated immediately. Complete love and respect must be shown to all who work in this ministry, as well as to the people to whom we minister. Our basic principle will be, \"If you would not say the words in the person's presence, do not say them in their absence.\"\n\nThis is not an opportunity to neither exchange numbers with people for \"hook up\" nor use language that is not appropriate for Kingdom business.\n\nNIGHT WALK MISSION STATEMENT\n\n100 Blocks 100 Churches Night Walk Outreach will enable the process of actively reaching and winning lives for Christ while reducing shootings in the Austin area of Chicago by targeting youth, young adults, and individuals impacted and engaging in gun violence. The purpose of the Night Walks is to touch and transform lives for Christ to the Glory of God through witnessing, evangelism, and discipleship.\n\nPURPOSE\n\nCongregations in Austin have organized night walks in collaboration with faith Leaders.\n\nGOALS\n\n* Develop relationships within the community\n* Remain present in 15 th District \"Hot Spots / Trouble Areas\"\n* Engage residents into the work\n\nPOLICIES\n\nIn order to be effective, 100 Blocks / 100 Churches Prayer Night Walks must be CONSISTENT and be performed in a Spirit of Excellency.\n\n* Each team is to select a unified color for team shirts and be consistent is wearing the selected color on each Prayer Night Walk.\n* Meeting site walks will be conduct weekly on Wednesdays. Pre-meetings will begin promptly at 6:00 pm. Walks will take place from 6:00 pm to 7:45 pm. Debriefing will be conducted thereafter and concluded by 7:50 pm.\n\no TEAM ROUTE:\n\n§ Each site will develop routes according to desired opportunity\n* Team Members should understand that this is a serious endeavor; walking and engaging the community with a purpose. DO NOT GET OFF TRACK [i.e. yelling, screaming, complaining, doing 'extra'].\n* No one should ever be alone during a Prayer Night Walk. Team members are to be paired into groups of two (at a minimum). Each group should have a designated speaker and a designated recorder. The speaker is responsible for the verbal communication [i.e. conversation with residents]. The recorder is responsible for filling in the 100 Block / 100 Churches Contact Cards as needed.\n* Children are permitted to participate. However, for safety precautions, children must be with a parent or guardian at all ti<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "mes.",
"role": "assistant"
}
] |
|
7toX for Final Cut Pro
7toX for Final Cut Pro 7 or 6 or Premiere Pro Project (bins, clips and sequences) into a new Event in Final Cut Pro X. The XML translation retains important metadata from your Project XML and creates clear, detailed reporting after every transfer.
IMPORTANT: 7toX creates different results based on the version of Final Cut Pro X you have installed. This is why it is important to install 7toX on the computer that is running Final Cut Pro X. 7toX will generate the appropriate version of Final Cut Pro X XML based on the version of Final Cut Pro X installed.
The most important difference in the results will be how the translated Sequences are created in Final Cut Pro X.
- If Final Cut Pro X 10.1.1 or earlier is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Compound Clips in a Keyword Collection named “Sequences”.
- If Final Cut Pro X 10.1.2 or later is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Projects in the Event.
Table of Contents
Three easy steps ................................................................. 2
Before exporting XML for 7toX translation .......................... 3
Exporting XML from Final Cut Pro 6 or Premiere Pro ............ 4
Workflow Options ............................................................... 4
Translating a full Final Cut Pro 7 Project ......................... 4
Translating a Sequence ................................................... 4
Translating Browser Clips and Bins ................................. 4
What translates? ............................................................... 5
Projects ........................................................................... 5
Sequences ....................................................................... 5
What loses something in translation? .................................. 7
What doesn’t get translated? .............................................. 7
Preferences ........................................................................ 7
Enhancing the translation..................................................... 8
Known issues ....................................................................... 9
Three easy steps
1. Open the project into **Final Cut Pro 7**. Click in the browser window, choose the **File** menu and from the **Export** submenu, select **XML...** (The dialog lists how many clips and sequences will be included in the XML file.) Choose **Apple XML Interchange Format, version 5**, then name and save the XML file. If you have Final Cut Pro X and Final Cut Pro 7 installed on different Macs or partitions, save the XML file to the external storage device with your media.
2. Run **Final Cut Pro X**. (For 10.0.9 and earlier, select the external storage device in the Event Library where you want the new Event to be created.)
3. Install 7toX on the same Mac as Final Cut Pro X. To translate the project either:
- run 7toX and use the open dialog to locate your exported XML file;
- drag-and-drop the XML file onto the 7toX application or dock icon; or
- right-click on the XML file in Finder and choose **Open With > 7toX for Final Cut Pro** from the contextual menu.
7toX displays a progress bar during XML translation and, when completed, adds the new Event to the selected Library. The more items that are included in the XML, the larger the exported file will be and the longer it will take to translate.
The contents of the new Event will vary depending on which version of Final Cut Pro X you are using:
- For Final Cut Pro X 10.1.1 or earlier, the translated Event will contain clips for each media file and a compound clip representing each original sequence.
- For Final Cut Pro X 10.1.2 or later, the translated Event will contain clips for each media file and a Project representing each original Sequence.
Importing media using XML obeys the preference setting. If you don’t want media files added to the new Event, set the **Import** panel’s **Files** preference to **Leave in place** (instead of **Copy to library storage location**).
For clips, keywords are added to the in point/out point range representing the bins the clip or subclip was inside. Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. If the clip or subclip was marked Good then the clip or range is rated as Favorite (depending on your preferences choice).
**If you are using Final Cut Pro X 10.1.1 or earlier,** each compound clip is added to the Keyword Collection called “Sequences” in the Event. Compound clips can be opened in a timeline or added to a Project’s timeline. To create a new Project from the Compound Clip, add it to the Project, select the Compound Clip and choose **Clip > Break Apart Clip Items** to “unnest” the compound clip.
In the Compound Clip (10.1.1 or earlier) or Project (10.1.2 or later) timeline, video clips are always connected above the Primary Storyline and audio clips are always below it. Each clip is assigned a Role representing its original track position. The easiest way to find clips that were in a particular track is to open the Timeline Index (Window > Show Timeline Index) and click the Roles button. Then click on the track name to have those clips highlighted in the timeline.
So that you are fully aware of what may be different between your Final Cut Pro 7 sequence and your Final Cut Pro X timeline, 7toX adds red to-do markers to items that draw your attention to what has changed or been substituted. The easiest way to view these markers is to open the Timeline Index and click the Tags button. As you review these substitutions you can change each marker to completed by clicking on the red checkbox in the Timeline Index.
If Final Cut Pro X is running, 7toX tells it to import the translated XML file; if Final Cut Pro X is not running, 7toX will give you the option to either Send to Final Cut Pro X or Save XML file. When translated XML is automatically imported, the file is first saved to your user space’s /Library/Application Support/com.AssistedEditing.7toX/ folder and named after the original XML file. Translated XML in this folder can be manually imported again if necessary.
**IMPORTANT:** 7toX translates Final Cut Pro XML from one version to another. It does not work with project files, so you will need access to an application that exports Final Cut Pro XML (such as Final Cut Pro 7 or 6, Premiere Pro CS6, etc.) to export the XML representation of your project. Final Cut Pro 7 and Final Cut Pro X can be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.
Please use **Provide Feedback**… under the application menu for bug reports, feature requests or support. If you need to email an XML file, please zip the file and send it to [email protected] with a brief description of what happened.
**Before exporting XML for 7toX translation**
It is strongly recommended that the media files are online and have identical file paths (drive names, folder structures and file names) to avoid problems with relinking media in Final Cut Pro X. If working between two Macs, you may need to consolidate media to an external drive and reconnect any unconnected media before exporting XML. To avoid this issue Final Cut Pro 7 and Final Cut Pro X may be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.
If you have Motion Projects (either from Motion Templates, or custom Motion Projects) in any sequences, render a video from Motion (or Final Cut Pro 7) and replace the Motion Project with the rendered file. See note under **Enhancing the Translation** for bringing an updated Motion Project into your new Final Cut Pro X Project.
If you have LiveType Projects (.lpr), render a video from LiveType (or Final Cut Pro 7) and replace the LiveType Project with the rendered file. LiveType projects cannot be updated or imported to Final Cut Pro X.
Export Freeze Frames as still images and replace the Freeze Frame with the still by importing and replacing the Freeze Frame in a Sequence or Bin — the new still images will import into Final Cut Pro X. Without this step, Freeze Frames will be converted to a placeholder clip with references to the original media under the playhead displayed in the To Do Marker notes.
Exporting XML from Final Cut Pro 6 or Premiere Pro
Open the project into **Final Cut Pro 6**. Choose the **File** menu and from the **Export** submenu, select **XML...** Choose Apple XML Interchange Format, version 4, then name and save the XML file.
Open the project into **Premiere Pro**. Choose the **File** menu and from the **Export** submenu, select **Final Cut Pro XML...**, then name and save the XML file. (Premiere Pro exports XML Interchange Format version 4.)
**Workflow Options**
**Translating a full Final Cut Pro 7 Project**
To translate a full Final Cut Pro 7 project:
- Make sure there is nothing selected in the Browser (otherwise only the selected items will be included in the XML);
- Choose the **File** menu and from the **Export** submenu select **XML...**
When imported into Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name. For Final Cut Pro X 10.1.1 or earlier, there will be a keyword collection for "Sequences" where all sequences from the Final Cut Pro 7 project will have been translated to Compound Clips. (See note on converting Compound Clips to Projects under the **Enhancing the Translation** heading.)
For Final Cut Pro X 10.1.2 and later the Sequences will be translated to Projects in the Event.
**Translating a Sequence**
If you only need a single sequence translated:
- Select the Sequence in the Bin or Browser;
- Choose the **File** menu and from the **Export** submenu select **XML...**
The sequence will be translated to a Compound Clip or Project and the Event will contain references to the media files used in the sequence. Clip names and metadata in the Browser are not translated into the Event. Export the full project to retain original clip names and metadata.
**Translating Browser Clips and Bins**
If you wish to translate clips without sequences:
- Select the Bins and Clips in the Browser
- Choose the **File** menu and from the **Export** submenu select **XML...**
When imported to Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name.
What translates?
Essentially, all standard features translate perfectly. Here’s a list of what happens during translation.
Projects
- Each clip becomes a clip in the Event Browser. Bin structure is translated by adding Keywords to the clip in point/out point range representing the bins each clip or subclip was inside. Clips and subclips marked as Good become rated as Favorite.
- For Final Cut Pro X 10.1.1 or earlier, Final Cut Pro 7 Sequences are converted to Compound Clips and added to the Event. In the Event they have the keyword “Sequences” so they can be easily found. (See note on converting Compound Clips to Projects under the Enhancing the Translation heading.) In Final Cut Pro X 10.1.2 or later, Sequences are converted to Projects and placed in the translated Event.
- Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. Metadata from an ALE file with the same name as the XML file is also added to the Notes field.
- Auxiliary timecode information is added as the custom metadata fields “Sound Roll” and “Aux TC”. These fields can be added to any Metadata View in the Inspector.
Sequences
- The starting timecode and sequence settings are maintained.
- Clips on track V1 are added to the primary storyline.
- Clips on other tracks become connected to primary storyline clips as connected clips or in secondary storylines. Video clips are connected above the primary storyline and audio-only clips are connected below the primary storyline.
- Roles are applied representing the original track layout.
- Nested Sequences are translated to Compound Clips.
- Multiclip are translated to Final Cut Pro X multicam clips (except for XML from Premiere Pro, which creates “collapsed” multiclip in the XML).
- Timecode format for individual clips is maintained.
- Reel, Scene, Shot/Take and Angle are added to the clip’s Reel, Scene, Take and Camera Angle fields, while other log notes and comments are added to the clip’s Notes field.
- Auxiliary timecode information is added as the custom metadata fields “Sound Roll” and “Aux TC”. These fields can be added to any Metadata View in the Inspector.
- The active/inactive state of each clip and audio track is maintained.
- Mixed format sequences are translated.
- Split edits (J/L cuts) are preserved.
- Audio levels, audio level keyframes, pan and pan keyframes are added to the appropriate audio components. Select a clip and choose Clip > Expand Audio Components to see the audio adjustments.
- Scale, Rotation, Center, Crop, Distort, Opacity, Drop Shadow and Composite Modes are translated to Transform (Scale, Rotation, Position), Crop, Distort, Compositing Opacity, Drop Shadow effect and Compositing Blend Modes.
• Motion tab settings keyframes are preserved for these properties.
• Motion tab Anchor and Motion Blur adjustments are ignored.
• Add, Subtract, Difference, Multiply, Screen, Overlay, Hard Light, Soft Light, Darken and Lighten composite modes become their equivalent blend modes.
• Constant speed changes are maintained.
• Clip markers become blue markers and the marker comment is added to the Notes field (which is available in the Timeline Index).
• Layered Photoshop files are maintained, including the visibility and position of the original layers.
• PICT files are not supported in Final Cut Pro X so these are automatically converted to high resolution TIFF files. The Final Cut Pro X Event will be linked to the TIFF files. The TIFF files are saved in the same folder as the original PICT files.
• 31 Transitions are substituted with matching transitions:
• Cross Dissolve, Band Wipe, Center Wipe, Checkerboard Wipe, Clock Wipe, Cross Iris, Cross Zoom, Cube Spin, Dip to Color Dissolve, Edge Wipe, Fade In Fade Out Dissolve, Gradient Wipe, Implode, Inset Wipe, Iris, Matrix Wipe, Multi Spin Slide, Oval Iris, Page Peel, Point Iris, Push Slide, Radial, Random Edge Wipe, Rectangle Iris, Ripple Dissolve, Slide, Spin Slide, Spinback3D, Swap Slide and Swing transitions are substituted with equivalents; other transitions become Cross Dissolve; audio transitions become Cross Fades.
• Each Slug becomes a solid black custom generator called “Slug”.
• The Gradient generator is translated to the Gradient effect.
• 72 video FxPlug and FXScript filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution and the enabled state, e.g. “Gaussian Blur → Gaussian (enabled)”:.
• Circle Blur, Defocus, Soft Focus, Directional Blur, Gaussian Blur, Prism, Radial Blur, Zoom Blur, Basic Border, Eight-Point Garbage Matte, Four-Point Garbage Matte, Simple Border, Droplet, Whirlpool, Earthquake, Fisheye, Fun House, Insect Eye, Scrape, Slit Scan, Wave, Outer Glow, Overdrive, Desaturate, HSV Adjust, Sepia, Tint, Broadcast Safe, Blue/Green Screen, Chroma Keyer, Color Key, Luma Key, Image Mask, Mask Feather, Mask Shape, Widescreen, Flop, Mirror, Sharpen, Unsharp Mask, Add Noise, Bad Film, Bad TV, Circles, Crystallize, Edge Work, Hatched Screen, Posterize, Replicate, Vignette, Kaleidoscope, Kaleidotile, Trails, WideTime, Strobe and Viewfinder filters are replaced with equivalent or similar Final Cut Pro X effects.
• 32 audio filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution:
• AUBandpass, Band Pass Filter, AUDelay, AUDistortion, AUDynamicsProcessor, AUFilter, AUGraphicEQ, AUHighShelfFilter, High Shelf Filter, AUHipass, High Pass Filter, AULowpass, Low Pass Filter, AULowShelfFilter, Low Shelf Filter, AUMultibandCompressor, AUNetSend, AUParametricEQ, DC Notch, Notch Filter, Parametric Equalizer, AUPeakLimiter, AUPitch, AURogerBeep, AUSampleDelay, 3 Band Equalizer, Echo, Expander/Noise Gate, Gain, Reverberation, Vocal DeEsser and Compressor/Limiter filters are replaced with equivalent or similar Final Cut Pro X effects.
What loses something in translation?
The translation from Final Cut Pro 7 sequence to Final Cut Pro X timeline isn’t perfect. Here’s a list of what gets “lost in translation.”
- For 10.0.9 and earlier, custom sequence frame sizes are changed to a nearest equivalent supported size (and a to-do marker is added to the first video clip).
- Text and Outline Text titles becomes Custom; Lower Third becomes Middle; Scrolling Text becomes Scrolling; Crawl becomes Ticker; and Typewriter becomes Typewriter. For 10.0.9 and earlier, font, size, style, line spacing and color information does not transfer.
- Sequence markers become markers on a clip in the primary storyline at the same point in the timeline. Sequence chapter markers become chapter markers on a clip in the primary storyline at the same point in the timeline.
- Surround sound clips will import with multiple mono audio tracks. (See note on converting Multiple Mono to Surround Sound under Enhancing the Translation.)
- Keyframed speed changes are converted to a constant speed change that maintains the duration of the original clip and uses the average speed of the clip.
- Generators (other than Color, Color Solid, Gradient, Circle, Oval, Rectangle and Square generators) become a solid black custom generator named after the Final Cut Pro 7 generator.
What doesn’t get translated?
- Motion Project clips become a solid black custom generator named after the Motion clip. See Enhancing the Translation about bringing Motion Projects forward.
- Freeze frames (see Before exporting XML for 7toX).
- Boris Calligraphy titles become a solid black custom generator named after its original item name.
- Transition settings — transitions have their default settings in Final Cut Pro X.
- Color Corrector and Color Corrector 3-way filters.
- Filter settings — effects have their default settings in Final Cut Pro X.
- Motion Blur adjustments are ignored — there is no equivalent in Final Cut Pro X.
- Travel Matte — Alpha and Travel Matte — Luma composite modes.
Preferences
The default is to translate clips or subclips marked Good as having a Favorite applied, but you can change this to a “Good” keyword or “Circle Take” keyword in Preferences. Keywords, but not Favorites, are visible in the Timeline Index.
In some cases, cameras with newer MP4 formats can create files with timecode that can be read by Premiere Pro but not by Final Cut Pro X, so after translation these appear as black clips in the Event and Timeline. To work-around this issue, turn the Ignore MP4 timecode checkbox “on” and re-run the translation. With this preference on, any MP4 timecode in the XML will be ignored by both 7toX and Final Cut Pro X.
Enhancing the translation
Updating Motion Projects
As mentioned above, before exporting XML from Final Cut Pro 7 for translation, you will have exported Motion Projects as self contained movies, and replaced those in Final Cut Pro 7 before the translation to Final Cut Pro X. This creates flattened, uneditable versions of the originals. Motion 4 projects can be updated and incorporated into the new Final Cut Pro X Project. To update:
- Open the Motion 4 Project in Motion 5.
- Decide what parameters you want to edit in Final Cut Pro X, and “Publish” those parameters, by selecting Publish from the small pulldown menu to the right of each parameter in the Inspector.
- Publish the Project as a Final Cut Pro Generator. Create a new category to make it easier to find among Final Cut Pro X’s Generators.
- Inside Final Cut Pro X replace the old Motion 4 Project’s placeholder clip with the new Generator, and customize the settings you published.
Using Compound Clips in Final Cut Pro X 10.1.1 or earlier
If you are using Final Cut Pro 10.1.1 or earlier, 7toX converts every Final Cut Pro 7 Sequence to a Compound Clip within the Event. There are three ways you can use these Compound Clips within Final Cut Pro X:
- **Create a Project from the Compound Clip. This is the most like a Final Cut Pro 7 Sequence.**
- Add the Compound to a New Project, and choose *Clip > Break Apart Clip Items* (or Shift-Command-C) to “unnest” the compound clip. This creates the equivalent of a Final Cut Pro 7 Sequence as a Final Cut Pro X Project.
- The link to the Compound Clip in the Event is broken. The Project is completely independent of the Compound Clip in the Event.
- **Use the Compound Clip in one or more Projects. This is most like working with a Nested Sequence in Final Cut Pro 7.**
- Select the Compound Clip and edit into one or more Projects. Do not break apart clip items.
- Every instance of the Compound Clip updates with any changes. Changes made to the Compound Clip in the Event or Project are also made to every instance of that Compound Clip in any Projects. It live updates.
- **Open the Compound Clip in its own Timeline — great if you just want to copy out a section to paste into a new Project.**
- Changes made to the Compound Clip in the Event are also made to every instance of that Compound Clip in any Projects. It live updates.
Changing the connection point
While reviewing the timeline you may want to change the Primary Storyline clip that a connected clip or Secondary Storyline is connected to. See “Adjust the connection point of a connected clip” at help.apple.com/finalcutpro/mac/#ver7a77ef9e.
Converting Multi-mono to Surround Sound
To convert the multiple mono imports that are translated from surround sound in Final Cut Pro 7 back to surround sound:
- Select the clip in the Event or Project;
- In the Inspector select the audio pane;
- From the Channel Configuration pop-up menu, select Surround Sound.
Known issues
- Carefully consider the media format of your video clips. For example, Final Cut Pro X can support R3D clips directly, whereas Final Cut Pro 7 needs RED QuickTime Wrapper versions of the clips. Black video usually means that Final Cut Pro X is missing a plug-in. If you’ve installed a Final Cut Pro 7 or Premiere Pro plug-in to support your camera’s format, then you’ll need to download and install a version for Final Cut Pro X. (Import a clip directly into Final Cut Pro X to see if the file type or camera format is supported.) The most reliable way to get media that works in Final Cut Pro 7, Premiere Pro and Final Cut Pro X is to transcode to your favorite flavor of ProRes.
- Similarly, formats that aren’t supported by Final Cut Pro X (such as AVI or QuickTime reference movies) won’t play in Final Cut Pro X.
- Clips in the Event use the original media files. If the clips show the “missing proxy file” warning icon then your Playback preferences are set to “Use proxy media”. Change the Playback preference to Use original or optimized media instead.
- Relink Files will not work for media without a file suffix.
- Sometimes Final Cut Pro X will display an error dialog after importing the XML saying “The item is not on an edit frame boundary”. 10.1 introduced this new advisory to help developers with the calculations in the XML. On import, Final Cut Pro X will recalculate so that edit frame boundaries are correct and XML should import as expected. (The advisory is probably caused by clips with a different frame rate to the timeline’s.)
- Multiple mono audio clips, where some tracks have been removed, will translate without those tracks and show only the active audio tracks.
- Video crossfade also adds audio crossfade to A/V clips.
- Audio-only transitions on A/V clips are not applied.
- For 10.0.9 and earlier, footage from Canon 5D mark III cameras with embedded timecode imported into Premiere Pro will not translate correctly (footage displays as a still frame only). XML from Final Cut Pro 7 with the same footage contains extra metadata that allows it to translate correctly.
- Audio files with an odd number of tracks display an incorrect Channel Configuration.
- Speed changed clips may have their in/out points slipped by a frame or two.
- Photoshop files aren’t added to the Event browser.
• Photoshop files where layers have been removed in FCP7 won't be translated properly. Instead of removing the layer, change its visibility to invisible.
• On Snow Leopard, Final Cut Pro X should be running before importing the translation into Final Cut Pro X or double-clicking a .fcpxml file. If not you may get an error message that the “Event is already open with the same identifier as Event, so the second document cannot be opened.”
|
<urn:uuid:ce2bd2c5-1065-4012-95ef-420b01395d1d>
|
CC-MAIN-2016-07
|
http://assistedediting.intelligentassistance.com/7toX/help/7toX%20for%20Final%20Cut%20Pro%20-%20Help.pdf
|
2016-02-13T23:30:01Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701168065.93/warc/CC-MAIN-20160205193928-00147-ip-10-236-182-209.ec2.internal.warc.gz
| 14,523,312
| 5,430
|
eng_Latn
|
eng_Latn
| 0.979791
|
eng_Latn
| 0.994898
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
2254,
4924,
8491,
10617,
13401,
16601,
19294,
21940,
24606,
25049
] |
7toX for Final Cut Pro
7toX for Final Cut Pro 7 or 6 or Premiere Pro Project (bins, clips and sequences) into a new Event in Final Cut Pro X. The XML translation retains important metadata from your Project XML and creates clear, detailed reporting after every transfer.
IMPORTANT: 7toX creates different results based on the version of Final Cut Pro X you have installed. This is why it is important to install 7toX on the computer that is running Final Cut Pro X. 7toX will generate the appropriate version of Final Cut Pro X XML based on the version of Final Cut Pro X installed.
The most important difference in the results will be how the translated Sequences are created in Final Cut Pro X.
- If Final Cut Pro X 10.1.1 or earlier is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Compound Clips in a Keyword Collection named “Sequences”.
- If Final Cut Pro X 10.1.2 or later is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Projects in the Event.
Table of Contents
Three easy steps ................................................................. 2
Before exporting XML for 7toX translation .......................... 3
Exporting XML from Final Cut Pro 6 or Premiere Pro ............ 4
Workflow Options ............................................................... 4
Translating a full Final Cut Pro 7 Project ......................... 4
Translating a Sequence ................................................... 4
Translating Browser Clips and Bins ................................. 4
What translates? ............................................................... 5
Projects ........................................................................... 5
Sequences ....................................................................... 5
What loses something in translation? .................................. 7
What doesn’t get translated? .............................................. 7
Preferences ........................................................................ 7
Enhancing the translation..................................................... 8
Known issues ....................................................................... 9
Three easy steps
1. Open the project into **Final Cut Pro 7**. Click in the browser window, choose the **File** menu and from the **Export** submenu, select **XML...** (The dialog lists how many clips and sequences will be included in the XML file.) Choose **Apple XML Interchange Format, version 5**, then name and save the XML file. If you have Final Cut Pro X and Final Cut Pro 7 installed on different Macs or partitions, save the XML file to the external storage device with your media.
2. Run **Final Cut Pro X**. (For 10.0.9 and earlier, select the external storage device in the Event Library where you want the new Event to be created.)
3. Install 7toX on the same Mac as Final Cut Pro X. To translate the project either:
- run 7toX and use the open dialog to locate your exported XML file;
- drag-and-drop the XML file onto the 7toX application or dock icon; or
- right-click on the XML file in Finder and choose **Open With > 7toX for Final Cut Pro** from the contextual menu.
7toX displays a progress bar during XML translation and, when completed, adds the new Event to the selected Library. The more items that are included in the XML, the larger the exported file will be and the longer it will take to translate.
The contents of the new Event will vary depending on which version of Final Cut Pro X you are using:
- For Final Cut Pro X 10.1.1 or earlier, the translated Event will contain clips for each media file and a compound clip representing each original sequence.
- For Final Cut Pro X 10.1.2 or later, the translated Event will contain clips for each media file and a Project representing each original Sequence.
Importing media using XML obeys the preference setting. If you don’t want media files added to the new Event, set the **Import** panel’s **Files** preference to **Leave in place** (instead of **Copy to library storage location**).
For clips, keywords are added to the in point/out point range representing the bins the clip or subclip was inside. Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. If the clip or subclip was marked Good then the clip or range is rated as Favorite (depending on your preferences choice).
**If you are using Final Cut Pro X 10.1.1 or earlier,** each compound clip is added to the Keyword Collection called “Sequences” in the Event. Compound clips can be opened in a timeline or added to a Project’s timeline. To create a new Project from the Compound Clip, add it to the Project, select the Compound Clip and choose **Clip > Break Apart Clip Items** to “unnest” the compound clip.
In the Compound Clip (10.1.1 or earlier) or Project (10.1.2 or later) timeline, video clips are always connected above the Primary Storyline and audio clips are always below it. Each clip is assigned a Role representing its original track position. The easiest way to find clips that were in a particular track is to open the Timeline Index (Window > Show Timeline Index) and click the Roles button. Then click on the track name to have those clips highlighted in the timeline.
So that you are fully aware of what may be different between your Final Cut Pro 7 sequence and your Final Cut Pro X timeline, 7toX adds red to-do markers to items that draw your attention to what has changed or been substituted. The easiest way to view these markers is to open the Timeline Index and click the Tags button. As you review these substitutions you can change each marker to completed by clicking on the red checkbox in the Timeline Index.
If Final Cut Pro X is running, 7toX tells it to import the translated XML file; if Final Cut Pro X is not running, 7toX will give you the option to either Send to Final Cut Pro X or Save XML file. When translated XML is automatically imported, the file is first saved to your user space’s /Library/Application Support/com.AssistedEditing.7toX/ folder and named after the original XML file. Translated XML in this folder can be manually imported again if necessary.
**IMPORTANT:** 7toX translates Final Cut Pro XML from one version to another. It does not work with project files, so you will need access to an application that exports Final Cut Pro XML (such as Final Cut Pro 7 or 6, Premiere Pro CS6, etc.) to export the XML representation of your project. Final Cut Pro 7 and Final Cut Pro X can be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.
Please use **Provide Feedback**… under the application menu for bug reports, feature requests or support. If you need to email an XML file, please zip the file and send it to [email protected] with a brief description of what happened.
**Before exporting XML for 7toX translation**
It is strongly recommended that the media files are online and have identical file paths (drive names, folder structures and file names) to avoid problems with relinking media in Final Cut Pro X. If working between two Macs, you may need to consolidate media to an external drive and reconnect any unconnected media before exporting XML. To avoid this issue Final Cut Pro 7 and Final Cut Pro X may be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.
If you have Motion Projects (either from Motion Templates, or custom Motion Projects) in any sequences, render a video from Motion (or Final Cut Pro 7) and replace the Motion Project with the rendered file. See note under **Enhancing the Translation** for bringing an updated Motion Project into your new Final Cut Pro X Project.
If you have LiveType Projects (.lpr), render a video from LiveType (or Final Cut Pro 7) and replace the LiveType Project with the rendered file. LiveType projects cannot be updated or imported to Final Cut Pro X.
Export Freeze Frames as still images and replace the Freeze Frame with the still by importing and replacing the Freeze Frame in a Sequence or Bin — the new still images will import into Final Cut Pro X. Without this step, Freeze Frames will be converted to a placeholder clip with references to the original media under the playhead displayed in the To Do Marker notes.
Exporting XML from Final Cut Pro 6 or Premiere Pro
Open the project into **Final Cut Pro 6**. Choose the **File** menu and from the **Export** submenu, select **XML...** Choose Apple XML Interchange Format, version 4, then name and save the XML file.
Open the project into **Premiere Pro**. Choose the **File** menu and from the **Export** submenu, select **Final Cut Pro XML...**, then name and save the XML file. (Premiere Pro exports XML Interchange Format version 4.)
**Workflow Options**
**Translating a full Final Cut Pro 7 Project**
To translate a full Final Cut Pro 7 project:
- Make sure there is nothing selected in the Browser (otherwise only the selected items will be included in the XML);
- Choose the **File** menu and from the **Export** submenu select **XML...**
When imported into Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name. For Final Cut Pro X 10.1.1 or earlier, there will be a keyword collection for "Sequences" where all sequences from the Final Cut Pro 7 project will have been translated to Compound Clips. (See note on converting Compound Clips to Projects under the **Enhancing the Translation** heading.)
For Final Cut Pro X 10.1.2 and later the Sequences will be translated to Projects in the Event.
**Translating a Sequence**
If you only need a single sequence translated:
- Select the Sequence in the Bin or Browser;
- Choose the **File** menu and from the **Export** submenu select **XML...**
The sequence will be translated to a Compound Clip or Project and the Event will contain references to the media files used in the sequence. Clip names and metadata in the Browser are not translated into the Event. Export the full project to retain original clip names and metadata.
**Translating Browser Clips and Bins**
If you wish to translate clips without sequences:
- Select the Bins and Clips in the Browser
- Choose the **File** menu and from the **Export** submenu select **XML...**
When imported to Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name.
What translates?
Essentially, all standard features translate perfectly. Here’s a list of what happens during translation.
Projects
- Each clip becomes a clip in the Event Browser. Bin structure is translated by adding Keywords to the clip in point/out point range representing the bins each clip or subclip was inside. Clips and subclips marked as Good become rated as Favorite.
- For Final Cut Pro X 10.1.1 or earlier, Final Cut Pro 7 Sequences are converted to Compound Clips and added to the Event. In the Event they have the keyword “Sequences” so they can be easily found. (See note on converting Compound Clips to Projects under the Enhancing the Translation heading.) In Final Cut Pro X 10.1.2 or later, Sequences are converted to Projects and placed in the translated Event.
- Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. Metadata from an ALE file with the same name as the XML file is also added to the Notes field.
- Auxiliary timecode information is added as the custom metadata fields “Sound Roll” and “Aux TC”. These fields can be added to any Metadata View in the Inspector.
Sequences
- The starting timecode and sequence settings are maintained.
- Clips on track V1 are added to the primary storyline.
- Clips on other tracks become connected to primary storyline clips as connected clips or in secondary storylines. Video clips are connected above the primary storyline and audio-only clips are connected below the primary storyline.
- Roles are applied representing the original track layout.
- Nested Sequences are translated to Compound Clips.
- Multiclip are translated to Final Cut Pro X multicam clips (except for XML from Premiere Pro, which creates “collapsed” multiclip in the XML).
- Timecode format for individual clips is maintained.
- Reel, Scene, Shot/Take and Angle are added to the clip’s Reel, Scene, Take and Camera Angle fields, while other log notes and comments are added to the clip’s Notes field.
- Auxiliary timecode information is added as the custom metadata fields “So
|
und Roll” and “Aux TC”.
|
These fields can be added to any Metadata View in the Inspector.
- The active/inactive state of each clip and audio track is maintained.
- Mixed format sequences are translated.
- Split edits (J/L cuts) are preserved.
- Audio levels, audio level keyframes, pan and pan keyframes are added to the appropriate audio components. Select a clip and choose Clip > Expand Audio Components to see the audio adjustments.
- Scale, Rotation, Center, Crop, Distort, Opacity, Drop Shadow and Composite Modes are translated to Transform (Scale, Rotation, Position), Crop, Distort, Compositing Opacity, Drop Shadow effect and Compositing Blend Modes.
• Motion tab settings keyframes are preserved for these properties.
• Motion tab Anchor and Motion Blur adjustments are ignored.
• Add, Subtract, Difference, Multiply, Screen, Overlay, Hard Light, Soft Light, Darken and Lighten composite modes become their equivalent blend modes.
• Constant speed changes are maintained.
• Clip markers become blue markers and the marker comment is added to the Notes field (which is available in the Timeline Index).
• Layered Photoshop files are maintained, including the visibility and position of the original layers.
• PICT files are not supported in Final Cut Pro X so these are automatically converted to high resolution TIFF files. The Final Cut Pro X Event will be linked to the TIFF files. The TIFF files are saved in the same folder as the original PICT files.
• 31 Transitions are substituted with matching transitions:
• Cross Dissolve, Band Wipe, Center Wipe, Checkerboard Wipe, Clock Wipe, Cross Iris, Cross Zoom, Cube Spin, Dip to Color Dissolve, Edge Wipe, Fade In Fade Out Dissolve, Gradient Wipe, Implode, Inset Wipe, Iris, Matrix Wipe, Multi Spin Slide, Oval Iris, Page Peel, Point Iris, Push Slide, Radial, Random Edge Wipe, Rectangle Iris, Ripple Dissolve, Slide, Spin Slide, Spinback3D, Swap Slide and Swing transitions are substituted with equivalents; other transitions become Cross Dissolve; audio transitions become Cross Fades.
• Each Slug becomes a solid black custom generator called “Slug”.
• The Gradient generator is translated to the Gradient effect.
• 72 video FxPlug and FXScript filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution and the enabled state, e.g. “Gaussian Blur → Gaussian (enabled)”:.
• Circle Blur, Defocus, Soft Focus, Directional Blur, Gaussian Blur, Prism, Radial Blur, Zoom Blur, Basic Border, Eight-Point Garbage Matte, Four-Point Garbage Matte, Simple Border, Droplet, Whirlpool, Earthquake, Fisheye, Fun House, Insect Eye, Scrape, Slit Scan, Wave, Outer Glow, Overdrive, Desaturate, HSV Adjust, Sepia, Tint, Broadcast Safe, Blue/Green Screen, Chroma Keyer, Color Key, Luma Key, Image Mask, Mask Feather, Mask Shape, Widescreen, Flop, Mirror, Sharpen, Unsharp Mask, Add Noise, Bad Film, Bad TV, Circles, Crystallize, Edge Work, Hatched Screen, Posterize, Replicate, Vignette, Kaleidoscope, Kaleidotile, Trails, WideTime, Strobe and Viewfinder filters are replaced with equivalent or similar Final Cut Pro X effects.
• 32 audio filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution:
• AUBandpass, Band Pass Filter, AUDelay, AUDistortion, AUDynamicsProcessor, AUFilter, AUGraphicEQ, AUHighShelfFilter, High Shelf Filter, AUHipass, High Pass Filter, AULowpass, Low Pass Filter, AULowShelfFilter, Low Shelf Filter, AUMultibandCompressor, AUNetSend, AUParametricEQ, DC Notch, Notch Filter, Parametric Equalizer, AUPeakLimiter, AUPitch, AURogerBeep, AUSampleDelay, 3 Band Equalizer, Echo, Expander/Noise Gate, Gain, Reverberation, Vocal DeEsser and Compressor/Limiter filters are replaced with equivalent or similar Final Cut Pro X effects.
What loses something in translation?
The translation from Final Cut Pro 7 sequence to Final Cut Pro X timeline isn’t perfect. Here’s a list of what gets “lost in translation.”
- For 10.0.9 and earlier, custom sequence frame sizes are changed to a nearest equivalent supported size (and a to-do marker is added to the first video clip).
- Text and Outline Text titles becomes Custom; Lower Third becomes Middle; Scrolling Text becomes Scrolling; Crawl becomes Ticker; and Typewriter becomes Typewriter. For 10.0.9 and earlier, font, size, style, line spacing and color information does not transfer.
- Sequence markers become markers on a clip in the primary storyline at the same point in the timeline. Sequence chapter markers become chapter markers on a clip in the primary storyline at the same point in the timeline.
- Surround sound clips will import with multiple mono audio tracks. (See note on converting Multiple Mono to Surround Sound under Enhancing the Translation.)
- Keyframed speed changes are converted to a constant speed change that maintains the duration of the original clip and uses the average speed of the clip.
- Generators (other than Color, Color Solid, Gradient, Circle, Oval, Rectangle and Square generators) become a solid black custom generator named after the Final Cut Pro 7 generator.
What doesn’t get translated?
- Motion Project clips become a solid black custom generator named after the Motion clip. See Enhancing the Translation about bringing Motion Projects forward.
- Freeze frames (see Before exporting XML for 7toX).
- Boris Calligraphy titles become a solid black custom generator named after its original item name.
- Transition settings — transitions have their default settings in Final Cut Pro X.
- Color Corrector and Color Corrector 3-way filters.
- Filter settings — effects have their default settings in Final Cut Pro X.
- Motion Blur adjustments are ignored — there is no equivalent in Final Cut Pro X.
- Travel Matte — Alpha and Travel Matte — Luma composite modes.
Preferences
The default is to translate clips or subclips marked Good as having a Favorite applied, but you can change this to a “Good” keyword or “Circle Take” keyword in Preferences. Keywords, but not Favorites, are visible in the Timeline Index.
In some cases, cameras with newer MP4 formats can create files with timecode that can be read by Premiere Pro but not by Final Cut Pro X, so after translation these appear as black clips in the Event and Timeline. To work-around this issue, turn the Ignore MP4 timecode checkbox “on” and re-run the translation. With this preference on, any MP4 timecode in the XML will be ignored by both 7toX and Final Cut Pro X.
Enhancing the translation
Updating Motion Projects
As mentioned above, before exporting XML from Final Cut Pro 7 for translation, you will have exported Motion Projects as self contained movies, and replaced those in Final Cut Pro 7 before the translation to Final Cut Pro X. This creates flattened, uneditable versions of the originals. Motion 4 projects can be updated and incorporated into the new Final Cut Pro X Project. To update:
- Open the Motion 4 Project in Motion 5.
- Decide what parameters you want to edit in Final Cut Pro X, and “Publish” those parameters, by selecting Publish from the small pulldown menu to the right of each parameter in the Inspector.
- Publish the Project as a Final Cut Pro Generator. Create a new category to make it easier to find among Final Cut Pro X’s Generators.
- Inside Final Cut Pro X replace the old Motion 4 Project’s placeholder clip with the new Generator, and customize the settings you published.
Using Compound Clips in Final Cut Pro X 10.1.1 or earlier
If you are using Final Cut Pro 10.1.1 or earlier, 7toX converts every Final Cut Pro 7 Sequence to a Compound Clip within the Event. There are three ways you can use these Compound Clips within Final Cut Pro X:
- **Create a Project from the Compound Clip. This is the most like a Final Cut Pro 7 Sequence.**
- Add the Compound to a New Project, and choose *Clip > Break Apart Clip Items* (or Shift-Command-C) to “unnest” the compound clip. This creates the equivalent of a Final Cut Pro 7 Sequence as a Final Cut Pro X Project.
- The link to the Compound Clip in the Event is broken. The Project is completely independent of the Compound Clip in the Event.
- **Use the Compound Clip in one or more Projects. This is most like working with a Nested Sequence in Final Cut Pro 7.**
- Select the Compound Clip and edit into one or more Projects. Do not break apart clip items.
- Every instance of the Compound Clip updates with any changes. Changes made to the Compound Clip in the Event or Project are also made to every instance of that Compound Clip in any Projects. It live updates.
- **Open the Compound Clip in its own Timeline — great if you just want to copy out a section to paste into a new Project.**
- Changes made to the Compound Clip in the Event are also made to every instance of that Compound Clip in any Projects. It live updates.
Changing the connection point
While reviewing the timeline you may want to change the Primary Storyline clip that a connected clip or Secondary Storyline is connected to. See “Adjust the connection point of a connected clip” at help.apple.com/finalcutpro/mac/#ver7a77ef9e.
Converting Multi-mono to Surround Sound
To convert the multiple mono imports that are translated from surround sound in Final Cut Pro 7 back to surround sound:
- Select the clip in the Event or Project;
- In the Inspector select the audio pane;
- From the Channel Configuration pop-up menu, select Surround Sound.
Known issues
- Carefully consider the media format of your video clips. For example, Final Cut Pro X can support R3D clips directly, whereas Final Cut Pro 7 needs RED QuickTime Wrapper versions of the clips. Black video usually means that Final Cut Pro X is missing a plug-in. If you’ve installed a Final Cut Pro 7 or Premiere Pro plug-in to support your camera’s format, then you’ll need to download and install a version for Final Cut Pro X. (Import a clip directly into Final Cut Pro X to see if the file type or camera format is supported.) The most reliable way to get media that works in Final Cut Pro 7, Premiere Pro and Final Cut Pro X is to transcode to your favorite flavor of ProRes.
- Similarly, formats that aren’t supported by Final Cut Pro X (such as AVI or QuickTime reference movies) won’t play in Final Cut Pro X.
- Clips in the Event use the original media files. If the clips show the “missing proxy file” warning icon then your Playback preferences are set to “Use proxy media”. Change the Playback preference to Use original or optimized media instead.
- Relink Files will not work for media without a file suffix.
- Sometimes Final Cut Pro X will display an error dialog after importing the XML saying “The item is not on an edit frame boundary”. 10.1 introduced this new advisory to help developers with the calculations in the XML. On import, Final Cut Pro X will recalculate so that edit frame boundaries are correct and XML should import as expected. (The advisory is probably caused by clips with a different frame rate to the timeline’s.)
- Multiple mono audio clips, where some tracks have been removed, will translate without those tracks and show only the active audio tracks.
- Video crossfade also adds audio crossfade to A/V clips.
- Audio-only transitions on A/V clips are not applied.
- For 10.0.9 and earlier, footage from Canon 5D mark III cameras with embedded timecode imported into Premiere Pro will not translate correctly (footage displays as a still frame only). XML from Final Cut Pro 7 with the same footage contains extra metadata that allows it to translate correctly.
- Audio files with an odd number of tracks display an incorrect Channel Configuration.
- Speed changed clips may have their in/out points slipped by a frame or two.
- Photoshop files aren’t added to the Event browser.
• Photoshop files where layers have been removed in FCP7 won't be translated properly. Instead of removing the layer, change its visibility to invisible.
• On Snow Leopard, Final Cut Pro X should be running before importing the translation into Final Cut Pro X or double-clicking a .fcpxml file. If not you may get an error message that the “Event is already open with the same identifier as Event, so the second document cannot be opened.”
| 12,748
|
inside_word
|
“Sound
|
remove_one_sentence
|
<url>
http://assistedediting.intelligentassistance.com/7toX/help/7toX%20for%20Final%20Cut%20Pro%20-%20Help.pdf
</url>
<text>
7toX for Final Cut Pro
7toX for Final Cut Pro 7 or 6 or Premiere Pro Project (bins, clips and sequences) into a new Event in Final Cut Pro X. The XML translation retains important metadata from your Project XML and creates clear, detailed reporting after every transfer.
IMPORTANT: 7toX creates different results based on the version of Final Cut Pro X you have installed. This is why it is important to install 7toX on the computer that is running Final Cut Pro X. 7toX will generate the appropriate version of Final Cut Pro X XML based on the version of Final Cut Pro X installed.
The most important difference in the results will be how the translated Sequences are created in Final Cut Pro X.
- If Final Cut Pro X 10.1.1 or earlier is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Compound Clips in a Keyword Collection named “Sequences”.
- If Final Cut Pro X 10.1.2 or later is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Projects in the Event.
Table of Contents
Three easy steps ................................................................. 2
Before exporting XML for 7toX translation .......................... 3
Exporting XML from Final Cut Pro 6 or Premiere Pro ............ 4
Workflow Options ............................................................... 4
Translating a full Final Cut Pro 7 Project ......................... 4
Translating a Sequence ................................................... 4
Translating Browser Clips and Bins ................................. 4
What translates? ............................................................... 5
Projects ........................................................................... 5
Sequences ....................................................................... 5
What loses something in translation? .................................. 7
What doesn’t get translated? .............................................. 7
Preferences ........................................................................ 7
Enhancing the translation..................................................... 8
Known issues ....................................................................... 9
Three easy steps
1. Open the project into **Final Cut Pro 7**. Click in the browser window, choose the **File** menu and from the **Export** submenu, select **XML...** (The dialog lists how many clips and sequences will be included in the XML file.) Choose **Apple XML Interchange Format, version 5**, then name and save the XML file. If you have Final Cut Pro X and Final Cut Pro 7 installed on different Macs or partitions, save the XML file to the external storage device with your media.
2. Run **Final Cut Pro X**. (For 10.0.9 and earlier, select the external storage device in the Event Library where you want the new Event to be created.)
3. Install 7toX on the same Mac as Final Cut Pro X. To translate the project either:
- run 7toX and use the open dialog to locate your exported XML file;
- drag-and-drop the XML file onto the 7toX application or dock icon; or
- right-click on the XML file in Finder and choose **Open With > 7toX for Final Cut Pro** from the contextual menu.
7toX displays a progress bar during XML translation and, when completed, adds the new Event to the selected Library. The more items that are included in the XML, the larger the exported file will be and the longer it will take to translate.
The contents of the new Event will vary depending on which version of Final Cut Pro X you are using:
- For Final Cut Pro X 10.1.1 or earlier, the translated Event will contain clips for each media file and a compound clip representing each original sequence.
- For Final Cut Pro X 10.1.2 or later, the translated Event will contain clips for each media file and a Project representing each original Sequence.
Importing media using XML obeys the preference setting. If you don’t want media files added to the new Event, set the **Import** panel’s **Files** preference to **Leave in place** (instead of **Copy to library storage location**).
For clips, keywords are added to the in point/out point range representing the bins the clip or subclip was inside. Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. If the clip or subclip was marked Good then the clip or range is rated as Favorite (depending on your preferences choice).
**If you are using Final Cut Pro X 10.1.1 or earlier,** each compound clip is added to the Keyword Collection called “Sequences” in the Event. Compound clips can be opened in a timeline or added to a Project’s timeline. To create a new Project from the Compound Clip, add it to the Project, select the Compound Clip and choose **Clip > Break Apart Clip Items** to “unnest” the compound clip.
In the Compound Clip (10.1.1 or earlier) or Project (10.1.2 or later) timeline, video clips are always connected above the Primary Storyline and audio clips are always below it. Each clip is assigned a Role representing its original track position. The easiest way to find clips that were in a particular track is to open the Timeline Index (Window > Show Timeline Index) and click the Roles button. Then click on the track name to have those clips highlighted in the timeline.
So that you are fully aware of what may be different between your Final Cut Pro 7 sequence and your Final Cut Pro X timeline, 7toX adds red to-do markers to items that draw your attention to what has changed or been substituted. The easiest way to view these markers is to open the Timeline Index and click the Tags button. As you review these substitutions you can change each marker to completed by clicking on the red checkbox in the Timeline Index.
If Final Cut Pro X is running, 7toX tells it to import the translated XML file; if Final Cut Pro X is not running, 7toX will give you the option to either Send to Final Cut Pro X or Save XML file. When translated XML is automatically imported, the file is first saved to your user space’s /Library/Application Support/com.AssistedEditing.7toX/ folder and named after the original XML file. Translated XML in this folder can be manually imported again if necessary.
**IMPORTANT:** 7toX translates Final Cut Pro XML from one version to another. It does not work with project files, so you will need access to an application that exports Final Cut Pro XML (such as Final Cut Pro 7 or 6, Premiere Pro CS6, etc.) to export the XML representation of your project. Final Cut Pro 7 and Final Cut Pro X can be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.
Please use **Provide Feedback**… under the application menu for bug reports, feature requests or support. If you need to email an XML file, please zip the file and send it to [email protected] with a brief description of what happened.
**Before exporting XML for 7toX translation**
It is strongly recommended that the media files are online and have identical file paths (drive names, folder structures and file names) to avoid problems with relinking media in Final Cut Pro X. If working between two Macs, you may need to consolidate media to an external drive and reconnect any unconnected media before exporting XML. To avoid this issue Final Cut Pro 7 and Final Cut Pro X may be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.
If you have Motion Projects (either from Motion Templates, or custom Motion Projects) in any sequences, render a video from Motion (or Final Cut Pro 7) and replace the Motion Project with the rendered file. See note under **Enhancing the Translation** for bringing an updated Motion Project into your new Final Cut Pro X Project.
If you have LiveType Projects (.lpr), render a video from LiveType (or Final Cut Pro 7) and replace the LiveType Project with the rendered file. LiveType projects cannot be updated or imported to Final Cut Pro X.
Export Freeze Frames as still images and replace the Freeze Frame with the still by importing and replacing the Freeze Frame in a Sequence or Bin — the new still images will import into Final Cut Pro X. Without this step, Freeze Frames will be converted to a placeholder clip with references to the original media under the playhead displayed in the To Do Marker notes.
Exporting XML from Final Cut Pro 6 or Premiere Pro
Open the project into **Final Cut Pro 6**. Choose the **File** menu and from the **Export** submenu, select **XML...** Choose Apple XML Interchange Format, version 4, then name and save the XML file.
Open the project into **Premiere Pro**. Choose the **File** menu and from the **Export** submenu, select **Final Cut Pro XML...**, then name and save the XML file. (Premiere Pro exports XML Interchange Format version 4.)
**Workflow Options**
**Translating a full Final Cut Pro 7 Project**
To translate a full Final Cut Pro 7 project:
- Make sure there is nothing selected in the Browser (otherwise only the selected items will be included in the XML);
- Choose the **File** menu and from the **Export** submenu select **XML...**
When imported into Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name. For Final Cut Pro X 10.1.1 or earlier, there will be a keyword collection for "Sequences" where all sequences from the Final Cut Pro 7 project will have been translated to Compound Clips. (See note on converting Compound Clips to Projects under the **Enhancing the Translation** heading.)
For Final Cut Pro X 10.1.2 and later the Sequences will be translated to Projects in the Event.
**Translating a Sequence**
If you only need a single sequence translated:
- Select the Sequence in the Bin or Browser;
- Choose the **File** menu and from the **Export** submenu select **XML...**
The sequence will be translated to a Compound Clip or Project and the Event will contain references to the media files used in the sequence. Clip names and metadata in the Browser are not translated into the Event. Export the full project to retain original clip names and metadata.
**Translating Browser Clips and Bins**
If you wish to translate clips without sequences:
- Select the Bins and Clips in the Browser
- Choose the **File** menu and from the **Export** submenu select **XML...**
When imported to Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name.
What translates?
Essentially, all standard features translate perfectly. Here’s a list of what happens during translation.
Projects
- Each clip becomes a clip in the Event Browser. Bin structure is translated by adding Keywords to the clip in point/out point range representing the bins each clip or subclip was inside. Clips and subclips marked as Good become rated as Favorite.
- For Final Cut Pro X 10.1.1 or earlier, Final Cut Pro 7 Sequences are converted to Compound Clips and added to the Event. In the Event they have the keyword “Sequences” so they can be easily found. (See note on converting Compound Clips to Projects under the Enhancing the Translation heading.) In Final Cut Pro X 10.1.2 or later, Sequences are converted to Projects and placed in the translated Event.
- Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. Metadata from an ALE file with the same name as the XML file is also added to the Notes field.
- Auxiliary timecode information is added as the custom metadata fields “Sound Roll” and “Aux TC”. These fields can be added to any Metadata View in the Inspector.
Sequences
- The starting timecode and sequence settings are maintained.
- Clips on track V1 are added to the primary storyline.
- Clips on other tracks become connected to primary storyline clips as connected clips or in secondary storylines. Video clips are connected above the primary storyline and audio-only clips are connected below the primary storyline.
- Roles are applied representing the original track layout.
- Nested Sequences are translated to Compound Clips.
- Multiclip are translated to Final Cut Pro X multicam clips (except for XML from Premiere Pro, which creates “collapsed” multiclip in the XML).
- Timecode format for individual clips is maintained.
- Reel, Scene, Shot/Take and Angle are added to the clip’s Reel, Scene, Take and Camera Angle fields, while other log notes and comments are added to the clip’s Notes field.
- Auxiliary timecode information is added as the custom metadata fields “So<cursor_is_here> These fields can be added to any Metadata View in the Inspector.
- The active/inactive state of each clip and audio track is maintained.
- Mixed format sequences are translated.
- Split edits (J/L cuts) are preserved.
- Audio levels, audio level keyframes, pan and pan keyframes are added to the appropriate audio components. Select a clip and choose Clip > Expand Audio Components to see the audio adjustments.
- Scale, Rotation, Center, Crop, Distort, Opacity, Drop Shadow and Composite Modes are translated to Transform (Scale, Rotation, Position), Crop, Distort, Compositing Opacity, Drop Shadow effect and Compositing Blend Modes.
• Motion tab settings keyframes are preserved for these properties.
• Motion tab Anchor and Motion Blur adjustments are ignored.
• Add, Subtract, Difference, Multiply, Screen, Overlay, Hard Light, Soft Light, Darken and Lighten composite modes become their equivalent blend modes.
• Constant speed changes are maintained.
• Clip markers become blue markers and the marker comment is added to the Notes field (which is available in the Timeline Index).
• Layered Photoshop files are maintained, including the visibility and position of the original layers.
• PICT files are not supported in Final Cut Pro X so these are automatically converted to high resolution TIFF files. The Final Cut Pro X Event will be linked to the TIFF files. The TIFF files are saved in the same folder as the original PICT files.
• 31 Transitions are substituted with matching transitions:
• Cross Dissolve, Band Wipe, Center Wipe, Checkerboard Wipe, Clock Wipe, Cross Iris, Cross Zoom, Cube Spin, Dip to Color Dissolve, Edge Wipe, Fade In Fade Out Dissolve, Gradient Wipe, Implode, Inset Wipe, Iris, Matrix Wipe, Multi Spin Slide, Oval Iris, Page Peel, Point Iris, Push Slide, Radial, Random Edge Wipe, Rectangle Iris, Ripple Dissolve, Slide, Spin Slide, Spinback3D, Swap Slide and Swing transitions are substituted with equivalents; other transitions become Cross Dissolve; audio transitions become Cross Fades.
• Each Slug becomes a solid black custom generator called “Slug”.
• The Gradient generator is translated to the Gradient effect.
• 72 video FxPlug and FXScript filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution and the enabled state, e.g. “Gaussian Blur → Gaussian (enabled)”:.
• Circle Blur, Defocus, Soft Focus, Directional Blur, Gaussian Blur, Prism, Radial Blur, Zoom Blur, Basic Border, Eight-Point Garbage Matte, Four-Point Garbage Matte, Simple Border, Droplet, Whirlpool, Earthquake, Fisheye, Fun House, Insect Eye, Scrape, Slit Scan, Wave, Outer Glow, Overdrive, Desaturate, HSV Adjust, Sepia, Tint, Broadcast Safe, Blue/Green Screen, Chroma Keyer, Color Key, Luma Key, Image Mask, Mask Feather, Mask Shape, Widescreen, Flop, Mirror, Sharpen, Unsharp Mask, Add Noise, Bad Film, Bad TV, Circles, Crystallize, Edge Work, Hatched Screen, Posterize, Replicate, Vignette, Kaleidoscope, Kaleidotile, Trails, WideTime, Strobe and Viewfinder filters are replaced with equivalent or similar Final Cut Pro X effects.
• 32 audio filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution:
• AUBandpass, Band Pass Filter, AUDelay, AUDistortion, AUDynamicsProcessor, AUFilter, AUGraphicEQ, AUHighShelfFilter, High Shelf Filter, AUHipass, High Pass Filter, AULowpass, Low Pass Filter, AULowShelfFilter, Low Shelf Filter, AUMultibandCompressor, AUNetSend, AUParametricEQ, DC Notch, Notch Filter, Parametric Equalizer, AUPeakLimiter, AUPitch, AURogerBeep, AUSampleDelay, 3 Band Equalizer, Echo, Expander/Noise Gate, Gain, Reverberation, Vocal DeEsser and Compressor/Limiter filters are replaced with equivalent or similar Final Cut Pro X effects.
What loses something in translation?
The translation from Final Cut Pro 7 sequence to Final Cut Pro X timeline isn’t perfect. Here’s a list of what gets “lost in translation.”
- For 10.0.9 and earlier, custom sequence frame sizes are changed to a nearest equivalent supported size (and a to-do marker is added to the first video clip).
- Text and Outline Text titles becomes Custom; Lower Third becomes Middle; Scrolling Text becomes Scrolling; Crawl becomes Ticker; and Typewriter becomes Typewriter. For 10.0.9 and earlier, font, size, style, line spacing and color information does not transfer.
- Sequence markers become markers on a clip in the primary storyline at the same point in the timeline. Sequence chapter markers become chapter markers on a clip in the primary storyline at the same point in the timeline.
- Surround sound clips will import with multiple mono audio tracks. (See note on converting Multiple Mono to Surround Sound under Enhancing the Translation.)
- Keyframed speed changes are converted to a constant speed change that maintains the duration of the original clip and uses the average speed of the clip.
- Generators (other than Color, Color Solid, Gradient, Circle, Oval, Rectangle and Square generators) become a solid black custom generator named after the Final Cut Pro 7 generator.
What doesn’t get translated?
- Motion Project clips become a solid black custom generator named after the Motion clip. See Enhancing the Translation about bringing Motion Projects forward.
- Freeze frames (see Before exporting XML for 7toX).
- Boris Calligraphy titles become a solid black custom generator named after its original item name.
- Transition settings — transitions have their default settings in Final Cut Pro X.
- Color Corrector and Color Corrector 3-way filters.
- Filter settings — effects have their default settings in Final Cut Pro X.
- Motion Blur adjustments are ignored — there is no equivalent in Final Cut Pro X.
- Travel Matte — Alpha and Travel Matte — Luma composite modes.
Preferences
The default is to translate clips or subclips marked Good as having a Favorite applied, but you can change this to a “Good” keyword or “Circle Take” keyword in Preferences. Keywords, but not Favorites, are visible in the Timeline Index.
In some cases, cameras with newer MP4 formats can create files with timecode that can be read by Premiere Pro but not by Final Cut Pro X, so after translation these appear as black clips in the Event and Timeline. To work-around this issue, turn the Ignore MP4 timecode checkbox “on” and re-run the translation. With this preference on, any MP4 timecode in the XML will be ignored by both 7toX and Final Cut Pro X.
Enhancing the translation
Updating Motion Projects
As mentioned above, before exporting XML from Final Cut Pro 7 for translation, you will have exported Motion Projects as self contained movies, and replaced those in Final Cut Pro 7 before the translation to Final Cut Pro X. This creates flattened, uneditable versions of the originals. Motion 4 projects can be updated and incorporated into the new Final Cut Pro X Project. To update:
- Open the Motion 4 Project in Motion 5.
- Decide what parameters you want to edit in Final Cut Pro X, and “Publish” those parameters, by selecting Publish from the small pulldown menu to the right of each parameter in the Inspector.
- Publish the Project as a Final Cut Pro Generator. Create a new category to make it easier to find among Final Cut Pro X’s Generators.
- Inside Final Cut Pro X replace the old Motion 4 Project’s placeholder clip with the new Generator, and customize the settings you published.
Using Compound Clips in Final Cut Pro X 10.1.1 or earlier
If you are using Final Cut Pro 10.1.1 or earlier, 7toX converts every Final Cut Pro 7 Sequence to a Compound Clip within the Event. There are three ways you can use these Compound Clips within Final Cut Pro X:
- **Create a Project from the Compound Clip. This is the most like a Final Cut Pro 7 Sequence.**
- Add the Compound to a New Project, and choose *Clip > Break Apart Clip Items* (or Shift-Command-C) to “unnest” the compound clip. This creates the equivalent of a Final Cut Pro 7 Sequence as a Final Cut Pro X Project.
- The link to the Compound Clip in the Event is broken. The Project is completely independent of the Compound Clip in the Event.
- **Use the Compound Clip in one or more Projects. This is most like working with a Nested Sequence in Final Cut Pro 7.**
- Select the Compound Clip and edit into one or more Projects. Do not break apart clip items.
- Every instance of the Compound Clip updates with any changes. Changes made to the Compound Clip in the Event or Project are also made to every instance of that Compound Clip in any Projects. It live updates.
- **Open the Compound Clip in its own Timeline — great if you just want to copy out a section to paste into a new Project.**
- Changes made to the Compound Clip in the Event are also made to every instance of that Compound Clip in any Projects. It live updates.
Changing the connection point
While reviewing the timeline you may want to change the Primary Storyline clip that a connected clip or Secondary Storyline is connected to. See “Adjust the connection point of a connected clip” at help.apple.com/finalcutpro/mac/#ver7a77ef9e.
Converting Multi-mono to Surround Sound
To convert the multiple mono imports that are translated from surround sound in Final Cut Pro 7 back to surround sound:
- Select the clip in the Event or Project;
- In the Inspector select the audio pane;
- From the Channel Configuration pop-up menu, select Surround Sound.
Known issues
- Carefully consider the media format of your video clips. For example, Final Cut Pro X can support R3D clips directly, whereas Final Cut Pro 7 needs RED QuickTime Wrapper versions of the clips. Black video usually means that Final Cut Pro X is missing a plug-in. If you’ve installed a Final Cut Pro 7 or Premiere Pro plug-in to support your camera’s format, then you’ll need to download and install a version for Final Cut Pro X. (Import a clip directly into Final Cut Pro X to see if the file type or camera format is supported.) The most reliable way to get media that works in Final Cut Pro 7, Premiere Pro and Final Cut Pro X is to transcode to your favorite flavor of ProRes.
- Similarly, formats that aren’t supported by Final Cut Pro X (such as AVI or QuickTime reference movies) won’t play in Final Cut Pro X.
- Clips in the Event use the original media files. If the clips show the “missing proxy file” warning icon then your Playback preferences are set to “Use proxy media”. Change the Playback preference to Use original or optimized media instead.
- Relink Files will not work for media without a file suffix.
- Sometimes Final Cut Pro X will display an error dialog after importing the XML saying “The item is not on an edit frame boundary”. 10.1 introduced this new advisory to help developers with the calculations in the XML. On import, Final Cut Pro X will recalculate so that edit frame boundaries are correct and XML should import as expected. (The advisory is probably caused by clips with a different frame rate to the timeline’s.)
- Multiple mono audio clips, where some tracks have been removed, will translate without those tracks and show only the active audio tracks.
- Video crossfade also adds audio crossfade to A/V clips.
- Audio-only transitions on A/V clips are not applied.
- For 10.0.9 and earlier, footage from Canon 5D mark III cameras with embedded timecode imported into Premiere Pro will not translate correctly (footage displays as a still frame only). XML from Final Cut Pro 7 with the same footage contains extra metadata that allows it to translate correctly.
- Audio files with an odd number of tracks display an incorrect Channel Configuration.
- Speed changed clips may have their in/out points slipped by a frame or two.
- Photoshop files aren’t added to the Event browser.
• Photoshop files where layers have been removed in FCP7 won't be translated properly. Instead of removing the layer, change its visibility to invisible.
• On Snow Leopard, Final Cut Pro X should be running before importing the translation into Final Cut Pro X or double-clicking a .fcpxml file. If not you may get an error message that the “Event is already open with the same identifier as Event, so the second document cannot be opened.”
</text>
|
[
{
"content": "<url>\nhttp://assistedediting.intelligentassistance.com/7toX/help/7toX%20for%20Final%20Cut%20Pro%20-%20Help.pdf\n</url>\n<text>\n7toX for Final Cut Pro\n\n7toX for Final Cut Pro 7 or 6 or Premiere Pro Project (bins, clips and sequences) into a new Event in Final Cut Pro X. The XML translation retains important metadata from your Project XML and creates clear, detailed reporting after every transfer.\n\nIMPORTANT: 7toX creates different results based on the version of Final Cut Pro X you have installed. This is why it is important to install 7toX on the computer that is running Final Cut Pro X. 7toX will generate the appropriate version of Final Cut Pro X XML based on the version of Final Cut Pro X installed.\n\nThe most important difference in the results will be how the translated Sequences are created in Final Cut Pro X.\n\n- If Final Cut Pro X 10.1.1 or earlier is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Compound Clips in a Keyword Collection named “Sequences”.\n\n- If Final Cut Pro X 10.1.2 or later is installed, 7toX will translate the Sequences from your Final Cut Pro 6 or 7 XML into Projects in the Event.\n\nTable of Contents\n\nThree easy steps ................................................................. 2\nBefore exporting XML for 7toX translation .......................... 3\nExporting XML from Final Cut Pro 6 or Premiere Pro ............ 4\nWorkflow Options ............................................................... 4\n Translating a full Final Cut Pro 7 Project ......................... 4\n Translating a Sequence ................................................... 4\n Translating Browser Clips and Bins ................................. 4\nWhat translates? ............................................................... 5\n Projects ........................................................................... 5\n Sequences ....................................................................... 5\nWhat loses something in translation? .................................. 7\nWhat doesn’t get translated? .............................................. 7\nPreferences ........................................................................ 7\nEnhancing the translation..................................................... 8\nKnown issues ....................................................................... 9\n\nThree easy steps\n\n1. Open the project into **Final Cut Pro 7**. Click in the browser window, choose the **File** menu and from the **Export** submenu, select **XML...** (The dialog lists how many clips and sequences will be included in the XML file.) Choose **Apple XML Interchange Format, version 5**, then name and save the XML file. If you have Final Cut Pro X and Final Cut Pro 7 installed on different Macs or partitions, save the XML file to the external storage device with your media.\n\n2. Run **Final Cut Pro X**. (For 10.0.9 and earlier, select the external storage device in the Event Library where you want the new Event to be created.)\n\n3. Install 7toX on the same Mac as Final Cut Pro X. To translate the project either:\n - run 7toX and use the open dialog to locate your exported XML file;\n - drag-and-drop the XML file onto the 7toX application or dock icon; or\n - right-click on the XML file in Finder and choose **Open With > 7toX for Final Cut Pro** from the contextual menu.\n\n7toX displays a progress bar during XML translation and, when completed, adds the new Event to the selected Library. The more items that are included in the XML, the larger the exported file will be and the longer it will take to translate.\n\nThe contents of the new Event will vary depending on which version of Final Cut Pro X you are using:\n\n- For Final Cut Pro X 10.1.1 or earlier, the translated Event will contain clips for each media file and a compound clip representing each original sequence.\n- For Final Cut Pro X 10.1.2 or later, the translated Event will contain clips for each media file and a Project representing each original Sequence.\n\nImporting media using XML obeys the preference setting. If you don’t want media files added to the new Event, set the **Import** panel’s **Files** preference to **Leave in place** (instead of **Copy to library storage location**).\n\nFor clips, keywords are added to the in point/out point range representing the bins the clip or subclip was inside. Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. If the clip or subclip was marked Good then the clip or range is rated as Favorite (depending on your preferences choice).\n\n**If you are using Final Cut Pro X 10.1.1 or earlier,** each compound clip is added to the Keyword Collection called “Sequences” in the Event. Compound clips can be opened in a timeline or added to a Project’s timeline. To create a new Project from the Compound Clip, add it to the Project, select the Compound Clip and choose **Clip > Break Apart Clip Items** to “unnest” the compound clip.\n\nIn the Compound Clip (10.1.1 or earlier) or Project (10.1.2 or later) timeline, video clips are always connected above the Primary Storyline and audio clips are always below it. Each clip is assigned a Role representing its original track position. The easiest way to find clips that were in a particular track is to open the Timeline Index (Window > Show Timeline Index) and click the Roles button. Then click on the track name to have those clips highlighted in the timeline.\n\nSo that you are fully aware of what may be different between your Final Cut Pro 7 sequence and your Final Cut Pro X timeline, 7toX adds red to-do markers to items that draw your attention to what has changed or been substituted. The easiest way to view these markers is to open the Timeline Index and click the Tags button. As you review these substitutions you can change each marker to completed by clicking on the red checkbox in the Timeline Index.\n\nIf Final Cut Pro X is running, 7toX tells it to import the translated XML file; if Final Cut Pro X is not running, 7toX will give you the option to either Send to Final Cut Pro X or Save XML file. When translated XML is automatically imported, the file is first saved to your user space’s /Library/Application Support/com.AssistedEditing.7toX/ folder and named after the original XML file. Translated XML in this folder can be manually imported again if necessary.\n\n**IMPORTANT:** 7toX translates Final Cut Pro XML from one version to another. It does not work with project files, so you will need access to an application that exports Final Cut Pro XML (such as Final Cut Pro 7 or 6, Premiere Pro CS6, etc.) to export the XML representation of your project. Final Cut Pro 7 and Final Cut Pro X can be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.\n\nPlease use **Provide Feedback**… under the application menu for bug reports, feature requests or support. If you need to email an XML file, please zip the file and send it to [email protected] with a brief description of what happened.\n\n**Before exporting XML for 7toX translation**\n\nIt is strongly recommended that the media files are online and have identical file paths (drive names, folder structures and file names) to avoid problems with relinking media in Final Cut Pro X. If working between two Macs, you may need to consolidate media to an external drive and reconnect any unconnected media before exporting XML. To avoid this issue Final Cut Pro 7 and Final Cut Pro X may be installed on the same Mac — see [support.apple.com/kb/HT4722](http://support.apple.com/kb/HT4722) for details.\n\nIf you have Motion Projects (either from Motion Templates, or custom Motion Projects) in any sequences, render a video from Motion (or Final Cut Pro 7) and replace the Motion Project with the rendered file. See note under **Enhancing the Translation** for bringing an updated Motion Project into your new Final Cut Pro X Project.\n\nIf you have LiveType Projects (.lpr), render a video from LiveType (or Final Cut Pro 7) and replace the LiveType Project with the rendered file. LiveType projects cannot be updated or imported to Final Cut Pro X.\n\nExport Freeze Frames as still images and replace the Freeze Frame with the still by importing and replacing the Freeze Frame in a Sequence or Bin — the new still images will import into Final Cut Pro X. Without this step, Freeze Frames will be converted to a placeholder clip with references to the original media under the playhead displayed in the To Do Marker notes.\n\nExporting XML from Final Cut Pro 6 or Premiere Pro\n\nOpen the project into **Final Cut Pro 6**. Choose the **File** menu and from the **Export** submenu, select **XML...** Choose Apple XML Interchange Format, version 4, then name and save the XML file.\n\nOpen the project into **Premiere Pro**. Choose the **File** menu and from the **Export** submenu, select **Final Cut Pro XML...**, then name and save the XML file. (Premiere Pro exports XML Interchange Format version 4.)\n\n**Workflow Options**\n\n**Translating a full Final Cut Pro 7 Project**\n\nTo translate a full Final Cut Pro 7 project:\n\n- Make sure there is nothing selected in the Browser (otherwise only the selected items will be included in the XML);\n- Choose the **File** menu and from the **Export** submenu select **XML...**\n\nWhen imported into Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name. For Final Cut Pro X 10.1.1 or earlier, there will be a keyword collection for \"Sequences\" where all sequences from the Final Cut Pro 7 project will have been translated to Compound Clips. (See note on converting Compound Clips to Projects under the **Enhancing the Translation** heading.)\n\nFor Final Cut Pro X 10.1.2 and later the Sequences will be translated to Projects in the Event.\n\n**Translating a Sequence**\n\nIf you only need a single sequence translated:\n\n- Select the Sequence in the Bin or Browser;\n- Choose the **File** menu and from the **Export** submenu select **XML...**\n\nThe sequence will be translated to a Compound Clip or Project and the Event will contain references to the media files used in the sequence. Clip names and metadata in the Browser are not translated into the Event. Export the full project to retain original clip names and metadata.\n\n**Translating Browser Clips and Bins**\n\nIf you wish to translate clips without sequences:\n\n- Select the Bins and Clips in the Browser\n- Choose the **File** menu and from the **Export** submenu select **XML...**\n\nWhen imported to Final Cut Pro X after translation, the bins will be translated to keyword collections, based on the bin name.\n\nWhat translates?\n\nEssentially, all standard features translate perfectly. Here’s a list of what happens during translation.\n\nProjects\n\n- Each clip becomes a clip in the Event Browser. Bin structure is translated by adding Keywords to the clip in point/out point range representing the bins each clip or subclip was inside. Clips and subclips marked as Good become rated as Favorite.\n- For Final Cut Pro X 10.1.1 or earlier, Final Cut Pro 7 Sequences are converted to Compound Clips and added to the Event. In the Event they have the keyword “Sequences” so they can be easily found. (See note on converting Compound Clips to Projects under the Enhancing the Translation heading.) In Final Cut Pro X 10.1.2 or later, Sequences are converted to Projects and placed in the translated Event.\n- Reel, Scene and Shot/Take are added to the clip’s Reel, Scene and Take fields, while other log notes and comments are added to the clip’s Notes field. Metadata from an ALE file with the same name as the XML file is also added to the Notes field.\n- Auxiliary timecode information is added as the custom metadata fields “Sound Roll” and “Aux TC”. These fields can be added to any Metadata View in the Inspector.\n\nSequences\n\n- The starting timecode and sequence settings are maintained.\n- Clips on track V1 are added to the primary storyline.\n- Clips on other tracks become connected to primary storyline clips as connected clips or in secondary storylines. Video clips are connected above the primary storyline and audio-only clips are connected below the primary storyline.\n- Roles are applied representing the original track layout.\n- Nested Sequences are translated to Compound Clips.\n- Multiclip are translated to Final Cut Pro X multicam clips (except for XML from Premiere Pro, which creates “collapsed” multiclip in the XML).\n- Timecode format for individual clips is maintained.\n- Reel, Scene, Shot/Take and Angle are added to the clip’s Reel, Scene, Take and Camera Angle fields, while other log notes and comments are added to the clip’s Notes field.\n- Auxiliary timecode information is added as the custom metadata fields “So<cursor_is_here> These fields can be added to any Metadata View in the Inspector.\n- The active/inactive state of each clip and audio track is maintained.\n- Mixed format sequences are translated.\n- Split edits (J/L cuts) are preserved.\n- Audio levels, audio level keyframes, pan and pan keyframes are added to the appropriate audio components. Select a clip and choose Clip > Expand Audio Components to see the audio adjustments.\n- Scale, Rotation, Center, Crop, Distort, Opacity, Drop Shadow and Composite Modes are translated to Transform (Scale, Rotation, Position), Crop, Distort, Compositing Opacity, Drop Shadow effect and Compositing Blend Modes.\n\n• Motion tab settings keyframes are preserved for these properties.\n\n• Motion tab Anchor and Motion Blur adjustments are ignored.\n\n• Add, Subtract, Difference, Multiply, Screen, Overlay, Hard Light, Soft Light, Darken and Lighten composite modes become their equivalent blend modes.\n\n• Constant speed changes are maintained.\n\n• Clip markers become blue markers and the marker comment is added to the Notes field (which is available in the Timeline Index).\n\n• Layered Photoshop files are maintained, including the visibility and position of the original layers.\n\n• PICT files are not supported in Final Cut Pro X so these are automatically converted to high resolution TIFF files. The Final Cut Pro X Event will be linked to the TIFF files. The TIFF files are saved in the same folder as the original PICT files.\n\n• 31 Transitions are substituted with matching transitions:\n • Cross Dissolve, Band Wipe, Center Wipe, Checkerboard Wipe, Clock Wipe, Cross Iris, Cross Zoom, Cube Spin, Dip to Color Dissolve, Edge Wipe, Fade In Fade Out Dissolve, Gradient Wipe, Implode, Inset Wipe, Iris, Matrix Wipe, Multi Spin Slide, Oval Iris, Page Peel, Point Iris, Push Slide, Radial, Random Edge Wipe, Rectangle Iris, Ripple Dissolve, Slide, Spin Slide, Spinback3D, Swap Slide and Swing transitions are substituted with equivalents; other transitions become Cross Dissolve; audio transitions become Cross Fades.\n\n• Each Slug becomes a solid black custom generator called “Slug”.\n\n• The Gradient generator is translated to the Gradient effect.\n\n• 72 video FxPlug and FXScript filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution and the enabled state, e.g. “Gaussian Blur → Gaussian (enabled)”:.\n • Circle Blur, Defocus, Soft Focus, Directional Blur, Gaussian Blur, Prism, Radial Blur, Zoom Blur, Basic Border, Eight-Point Garbage Matte, Four-Point Garbage Matte, Simple Border, Droplet, Whirlpool, Earthquake, Fisheye, Fun House, Insect Eye, Scrape, Slit Scan, Wave, Outer Glow, Overdrive, Desaturate, HSV Adjust, Sepia, Tint, Broadcast Safe, Blue/Green Screen, Chroma Keyer, Color Key, Luma Key, Image Mask, Mask Feather, Mask Shape, Widescreen, Flop, Mirror, Sharpen, Unsharp Mask, Add Noise, Bad Film, Bad TV, Circles, Crystallize, Edge Work, Hatched Screen, Posterize, Replicate, Vignette, Kaleidoscope, Kaleidotile, Trails, WideTime, Strobe and Viewfinder filters are replaced with equivalent or similar Final Cut Pro X effects.\n\n• 32 audio filters are substituted with matching effects; the filter’s enabled state is maintained; and to-do markers report the substitution:\n • AUBandpass, Band Pass Filter, AUDelay, AUDistortion, AUDynamicsProcessor, AUFilter, AUGraphicEQ, AUHighShelfFilter, High Shelf Filter, AUHipass, High Pass Filter, AULowpass, Low Pass Filter, AULowShelfFilter, Low Shelf Filter, AUMultibandCompressor, AUNetSend, AUParametricEQ, DC Notch, Notch Filter, Parametric Equalizer, AUPeakLimiter, AUPitch, AURogerBeep, AUSampleDelay, 3 Band Equalizer, Echo, Expander/Noise Gate, Gain, Reverberation, Vocal DeEsser and Compressor/Limiter filters are replaced with equivalent or similar Final Cut Pro X effects.\n\nWhat loses something in translation?\n\nThe translation from Final Cut Pro 7 sequence to Final Cut Pro X timeline isn’t perfect. Here’s a list of what gets “lost in translation.”\n\n- For 10.0.9 and earlier, custom sequence frame sizes are changed to a nearest equivalent supported size (and a to-do marker is added to the first video clip).\n- Text and Outline Text titles becomes Custom; Lower Third becomes Middle; Scrolling Text becomes Scrolling; Crawl becomes Ticker; and Typewriter becomes Typewriter. For 10.0.9 and earlier, font, size, style, line spacing and color information does not transfer.\n- Sequence markers become markers on a clip in the primary storyline at the same point in the timeline. Sequence chapter markers become chapter markers on a clip in the primary storyline at the same point in the timeline.\n- Surround sound clips will import with multiple mono audio tracks. (See note on converting Multiple Mono to Surround Sound under Enhancing the Translation.)\n- Keyframed speed changes are converted to a constant speed change that maintains the duration of the original clip and uses the average speed of the clip.\n- Generators (other than Color, Color Solid, Gradient, Circle, Oval, Rectangle and Square generators) become a solid black custom generator named after the Final Cut Pro 7 generator.\n\nWhat doesn’t get translated?\n\n- Motion Project clips become a solid black custom generator named after the Motion clip. See Enhancing the Translation about bringing Motion Projects forward.\n- Freeze frames (see Before exporting XML for 7toX).\n- Boris Calligraphy titles become a solid black custom generator named after its original item name.\n- Transition settings — transitions have their default settings in Final Cut Pro X.\n- Color Corrector and Color Corrector 3-way filters.\n- Filter settings — effects have their default settings in Final Cut Pro X.\n- Motion Blur adjustments are ignored — there is no equivalent in Final Cut Pro X.\n- Travel Matte — Alpha and Travel Matte — Luma composite modes.\n\nPreferences\n\nThe default is to translate clips or subclips marked Good as having a Favorite applied, but you can change this to a “Good” keyword or “Circle Take” keyword in Preferences. Keywords, but not Favorites, are visible in the Timeline Index.\n\nIn some cases, cameras with newer MP4 formats can create files with timecode that can be read by Premiere Pro but not by Final Cut Pro X, so after translation these appear as black clips in the Event and Timeline. To work-around this issue, turn the Ignore MP4 timecode checkbox “on” and re-run the translation. With this preference on, any MP4 timecode in the XML will be ignored by both 7toX and Final Cut Pro X.\n\nEnhancing the translation\n\nUpdating Motion Projects\n\nAs mentioned above, before exporting XML from Final Cut Pro 7 for translation, you will have exported Motion Projects as self contained movies, and replaced those in Final Cut Pro 7 before the translation to Final Cut Pro X. This creates flattened, uneditable versions of the originals. Motion 4 projects can be updated and incorporated into the new Final Cut Pro X Project. To update:\n\n- Open the Motion 4 Project in Motion 5.\n- Decide what parameters you want to edit in Final Cut Pro X, and “Publish” those parameters, by selecting Publish from the small pulldown menu to the right of each parameter in the Inspector.\n- Publish the Project as a Final Cut Pro Generator. Create a new category to make it easier to find among Final Cut Pro X’s Generators.\n- Inside Final Cut Pro X replace the old Motion 4 Project’s placeholder clip with the new Generator, and customize the settings you published.\n\nUsing Compound Clips in Final Cut Pro X 10.1.1 or earlier\n\nIf you are using Final Cut Pro 10.1.1 or earlier, 7toX converts every Final Cut Pro 7 Sequence to a Compound Clip within the Event. There are three ways you can use these Compound Clips within Final Cut Pro X:\n\n- **Create a Project from the Compound Clip. This is the most like a Final Cut Pro 7 Sequence.**\n - Add the Compound to a New Project, and choose *Clip > Break Apart Clip Items* (or Shift-Command-C) to “unnest” the compound clip. This creates the equivalent of a Final Cut Pro 7 Sequence as a Final Cut Pro X Project.\n - The link to the Compound Clip in the Event is broken. The Project is completely independent of the Compound Clip in the Event.\n\n- **Use the Compound Clip in one or more Projects. This is most like working with a Nested Sequence in Final Cut Pro 7.**\n - Select the Compound Clip and edit into one or more Projects. Do not break apart clip items.\n - Every instance of the Compound Clip updates with any changes. Changes made to the Compound Clip in the Event or Project are also made to every instance of that Compound Clip in any Projects. It live updates.\n\n- **Open the Compound Clip in its own Timeline — great if you just want to copy out a section to paste into a new Project.**\n - Changes made to the Compound Clip in the Event are also made to every instance of that Compound Clip in any Projects. It live updates.\n\nChanging the connection point\n\nWhile reviewing the timeline you may want to change the Primary Storyline clip that a connected clip or Secondary Storyline is connected to. See “Adjust the connection point of a connected clip” at help.apple.com/finalcutpro/mac/#ver7a77ef9e.\n\nConverting Multi-mono to Surround Sound\n\nTo convert the multiple mono imports that are translated from surround sound in Final Cut Pro 7 back to surround sound:\n\n- Select the clip in the Event or Project;\n- In the Inspector select the audio pane;\n- From the Channel Configuration pop-up menu, select Surround Sound.\n\nKnown issues\n\n- Carefully consider the media format of your video clips. For example, Final Cut Pro X can support R3D clips directly, whereas Final Cut Pro 7 needs RED QuickTime Wrapper versions of the clips. Black video usually means that Final Cut Pro X is missing a plug-in. If you’ve installed a Final Cut Pro 7 or Premiere Pro plug-in to support your camera’s format, then you’ll need to download and install a version for Final Cut Pro X. (Import a clip directly into Final Cut Pro X to see if the file type or camera format is supported.) The most reliable way to get media that works in Final Cut Pro 7, Premiere Pro and Final Cut Pro X is to transcode to your favorite flavor of ProRes.\n\n- Similarly, formats that aren’t supported by Final Cut Pro X (such as AVI or QuickTime reference movies) won’t play in Final Cut Pro X.\n\n- Clips in the Event use the original media files. If the clips show the “missing proxy file” warning icon then your Playback preferences are set to “Use proxy media”. Change the Playback preference to Use original or optimized media instead.\n\n- Relink Files will not work for media without a file suffix.\n\n- Sometimes Final Cut Pro X will display an error dialog after importing the XML saying “The item is not on an edit frame boundary”. 10.1 introduced this new advisory to help developers with the calculations in the XML. On import, Final Cut Pro X will recalculate so that edit frame boundaries are correct and XML should import as expected. (The advisory is probably caused by clips with a different frame rate to the timeline’s.)\n\n- Multiple mono audio clips, where some tracks have been removed, will translate without those tracks and show only the active audio tracks.\n\n- Video crossfade also adds audio crossfade to A/V clips.\n\n- Audio-only transitions on A/V clips are not applied.\n\n- For 10.0.9 and earlier, footage from Canon 5D mark III cameras with embedded timecode imported into Premiere Pro will not translate correctly (footage displays as a still frame only). XML from Final Cut Pro 7 with the same footage contains extra metadata that allows it to translate correctly.\n\n- Audio files with an odd number of tracks display an incorrect Channel Configuration.\n\n- Speed changed clips may have their in/out points slipped by a frame or two.\n\n- Photoshop files aren’t added to the Event browser.\n\n• Photoshop files where layers have been removed in FCP7 won't be translated properly. Instead of removing the layer, change its visibility to invisible.\n\n• On Snow Leopard, Final Cut Pro X should be running before importing the translation into Final Cut Pro X or double-clicking a .fcpxml file. If not you may get an error message that the “Event is already open with the same identifier as Event, so the second document cannot be opened.”\n</text>\n",
"role": "user"
},
{
"content": "und Roll” and “Aux TC”.",
"role": "assistant"
}
] |
The joy of riding or walk of shame? The theme park experience of obese people
Yaniv Poria 1 *, Jeremy Beal 2 and Arie Reichel 3
1 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501. E-mail: [email protected]
2 Hospitality and Tourism Management, Virginia Tech, Virginia, USA
3 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501
* Corresponding author
Abstract
This exploratory study focuses on obese people's perceptions of their theme park experience. Given this study's objective and the gap in the literature on obese people's tourist experience, a qualitative research approach was adopted. In-depth semi-structured interviews were conducted. Participants revealed that their theme park experiences included a strong sense of humiliation. This is clearly associated with the interaction between their body, the physical environment and most importantly the human environment. Managerial implications are suggested.
Keywords: theme-park; obesity
Citation: Poria, Y., Beal, J. and Reichel, A. (2020). The joy of riding or walk of shame? The theme park experience of obese people. European Journal of Tourism Research 24, 2412.
This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
Introduction and literature review
More and more tourism scholars have been increasingly interested in the accessibility of disenfranchised segments of the population, whose physical characteristics hinder their tourist and leisure experiences. This interest is a response both to legal regulations and to societal recognition that tourism and mobility should be recognized as a social right. Obese people are not usually foremost in mind when discussing physical disabilities. Yet, these individuals face difficulties in many public places. This exploratory research focuses on their theme-park experience.
In 2011-2014, obese people made up some 36.5% of the adult population in the USA (Ogden et al., 2015), and current trends indicate that this rate is on the rise (Fitzpatrick et al. 2018). The International Association of Amusement Parks and Attractions (IAAPA) reports that there are more than 400 major theme parks and amusement parks and attractions in the USA, and about 300 in Europe, hosting 375 million and 161 million visitors annually, respectively (http://www.iaapa.org/resources/by-parktype/amusement-parks-and-attractions/industry-statistics). If the proportion of obese visitors to theme parks matches that of the general population, then one third of all visitors are obese. To date, surprisingly, researchers and park administrators have paid little attention to this rapidly growing segment of their visitors.
While there are numerous studies on theme or amusement parks (e.g. Slåtten, Krogh, & Connolley, 2011; Wakefield & Blodgett, 1994), there seems to be a gap in the understanding of the nature of the visit experience of people whose body might be a barrier to full enjoyment and participation. This corresponds with the ongoing attention to the study of the body in tourism and hospitality (Crouch, 2000; Harris & Small, 2013; Pons, 2003; Pritchard & Morgan, 2011; Veijola & Jokinen, 1994).
Bitner (1992) identified three dimensions of the theme park experience which could assist in contextualising the barriers to its experience: visitors' initiative to participate, experience with fellow visitors, and interaction with the staff. As these dimensions involve both the personal and the interpersonal spheres, and with studies focusing on the accessibility of marginalized segments in mind, this study uses a holistic approach that emphasizes the significance of people's emotions, self-respect, and self-perceptions (Darcy, 2010; Poria & Beal, 2016).
The apparent gap in studies concerning obese visitors could be attributed to an overall lack of recognition, in research and the industry, of the role of visitors' body and physical appearance in shaping the tourist experience (Berdychevsky, Poria, & Uriely, 2013). This, despite the fact that elements such as one's body and the social stigma it may carry, are highly recognized when conceptualizing human behaviour.
Research objective
This exploratory study was guided by two objectives: first, to highlight the onsite theme park experiences of obese people and, second, to identify ways to overcome the hurdles and barriers they confront. The focus on obese people stems from their current proportion in the population, and more so, from indications that obesity will become more prevalent in the near future. Beyond its effect on tourism, the present research will also contribute to the broader field of obesity studies by enhancing our knowledge of the meaning and reality of obese people's leisure experience (Small & Harris, 2012).
Methodology
Given the exploratory nature of the study as well as the research objectives, a qualitative research approach was adopted. In-depth semi-structured interviews were utilized as a means to obtain
subjective accounts and allow for comparisons between participants' reports. The findings reported here are part of a larger research project focusing on obese peoples' tourist experience, conducted in the USA in Virginia and West Virginia. Initially, 40 people were contacted through Craigslist, and were offered $20 for their participation; all those who responded ended up participating. For ethical reasons, participants were not asked about their weight or their BMI, and their definition of obesity or morbid obesity was by self-report. During the interviews, almost all participants revealed their weight and BMI, although they had not been asked about. The decision to focus on theme park visits evolved during the interviews. The interviewer (one of the authors) asked participants to relate to four components of the tourist experience: hotels, museums, restaurants, and flights. At the end of the interview, participants were asked to report on other tourism experiences related to their obesity. This procedure is based on studies elucidating the significant role of remembering noteworthy elements of past vacations, including unpleasant emotional experiences (Fuchs, Chen, & Pizam, 2015; Torres, Wei, & Hua, 2017), as well as studies highlighting the importance of memorable moments on the perception of the tourist experience (Poria, Butler, & Airey, 2007).
Interestingly, of the entire sample (N=40), 14 participants volunteered to share "an additional frustrating experience", and all referred to the same issue – theme parks. Some even wondered why they had not been asked about theme-parks to begin with ("Why did you ask me about museums and not about my visit to Disneyland?"). In addition, participants mentioned that if asked to compare the various components of their tourist experience, flights and theme parks would be the worst. The interviews were inspired by the recognition that the body is a socio-cultural entity inscribed with meaning. Moreover, it is suggested here that the visit experience is a corporeal experience as well as emotional one.
Findings
The 14 obese/morbidly obese participants made it clear that visiting theme parks was a major component of their travel experience, referring almost exclusively to theme parks in the USA, primarily Disneyland, Disney World and in and around Virginia (e.g. Busch Gardens in Williamsburg). Interestingly, they revealed that theme parks were often the main – if not the sole reason for travel. For some, it was 'a dream come true'. Moreover, it was often part of a long-awaited planned family vacation for which participants had saved money for long time to cover the high costs.
The interviewees had clear and high expectations of the theme park to be visited. It also became evident that participants had planned accurately how to experience the site. Ruth commented about her recent vacation with her two children and husband: '…it was me and my two kids. We planned it and dreamt about it for almost two years. We knew exactly what we were going to do. We knew exactly which rides we should take. When will we eat, when does the show begin. Everything. You have to know, it is a very expensive vacation for us. We were all so excited – my kids, myself and even my husband.'
Theme park issues
The content analysis of the responses highlighted several noteworthy issues. All but one of the 14 participants in the obese/morbidly obese group complained about the long distances between park attractions, the long queues, and the "endless waiting time for each ride." The interviews revealed that the participants' physical condition resulted in mobility difficulties, which, in turn, caused frustration and fatigue. Participants argued that due to their weight and size '…it is extremely difficult to move between the park's various attractions or to stand on line'. Some voiced their frustration that obesity is not formally classified as a disability. Therefore, they could not use the special line for people with disabilities or the golf carts. However, the main concern that all participants shared and expressed was
their strong feeling of humiliation, caused mainly by their inability to experience a ride (due to the small seats or too-short seatbelts), and by the insult of being asked to leave the line – all in front of other visitors.
The content analysis clearly showed that the participants were greatly embarrassed by the attraction operators' request that they leave the line in order not to block the next visitors. This request was especially embarrassing when made in front of their children. Participants used words such as "humiliating," "embarrassing," "devastating," and "I wanted to cry." Dana said, "I felt the world was shattering… and all of it in front of my kids. I was devastated." Moreover, this is especially difficult when children are not allowed on a ride unless accompanied by a parent, or when the children wanted to take the ride with the parents only. Clearly, these highly memorable humiliating moments are crucial for the understanding of the painful theme park experience of obese people.
The findings indicate that the reported experience might cast a long shadow onto the future. Participants stated that their humiliating experiences tainted their theme park visit with hard-to-heal wounds, some going so far as to claim that "it ruined our vacation". To aggravate the situation, some participants felt that bystanders seemed to be happy seeing them and their children barred from the ride, being punished for their intentional choice to be obese. Interviewees felt that bystanders' facial expressions indicated that it was socially acceptable, judicious, and even commendable to punish obese people, by expulsion from the line: "they view us as people who made a choice to be obese, so treated us like people who chose to be disabled and enjoy government support paid for by ordinary working people's taxes".
Obese people's feeling that others view them as "thieves", was a shameful and humiliating experience that lingered on as a painful memory. Thus, the joy of ride turns into a public walk of shame.
Summary
The findings indicate the theme park experience is highly affected by obese peoples' look and body size. Their body determines their interaction with the physical and human environments, creating a physically challenging and mentally humiliating visitor experience. The physical environment is challenging for obese people. It calls upon them to cover considerable distances, and this entails great effort. The restrictive park regulations have a major effect on obese people's park experience, an effect that has not yet been documented in tourism studies. At the core of the experience is participants' perception that the bystanders who watched and stared at them when asked to leave, considered the request to be a mark justice made. The ensuing sense of humiliation was highly devastating. The findings indicate that people's appearances should be considered when conceptualizing the tourist experience, especially the theme park experience. The findings suggest that obesity should be approached as a "social disability" which might be more punitive and restrictive than physical disability. In other words, it is the social arena that may create long-term negative memories rather than the physical attributes of the site.
The findings highlight that accessibility should be conceptualised not only in terms of the individual's ability to move from one point to another, but also in terms of respect and acceptance by others. Relying on previous studies, it is suggested in line with the neo-liberal approach (Small & Harris, 2012; Small, Harris, & Wilson, 2008) that one's physical body should be approached as a social construct crucial to the understanding of the tourist experience.
Implications
Several simple, yet effective, inexpensive and easy to implement managerial implications arise from this exploratory study. Obese people could be advised to use the line for people with disabilities, and be offered golf carts to facilitate greater mobility. The humiliation felt at ride's embarkation point can be easily solved via expectations management. Theme park visitors should be informed prior to ticket purchase and arrival about the 'servicescape' limitations. Just as there are age and height limits for some rides, clear information should also be posted about weight or body size. This is especially significant when a parent is obese and is barred from a ride, the impact on the family is devastating. Services for obese people, as well as restrictions, should be clearly posted on the park website.
Ride operators should be instructed on how to handle sensitive situations with obese people. In addition, as one of the interviewees suggested, a designated area of the park could display the various rides' seats, so that people can see in advance whether a particular ride is suited for their body size. The management of theme parks could consider providing obese people with a booklet of coupons only for the rides they can use, rather than the common all-inclusive expensive pass, offering a lower entrance fee. In addition, since obese people find it difficult to walk long distances, it is possible to provide them with extended period of ticket validity. Park management should also consider the possibility of designating service employees to escort children of obese parents in restricted rides. All these suggestions also apply to people using wheelchairs or crutches.
Obese people should be aware that due to their physical limitations they will not be able to fully enjoy the park, and this may also impact their children. A way to better plan the visit may be by contacting other obese people who have been to theme parks. In other words, pro-active planning may enhance their theme-park experience and adjust expectations level.
Finally, we must bear in mind that many theme parks and attractions were designed and constructed more than fifty years ago, and there has been a significant increase in people's weight and size since then (Pozza & Isidori, 2018). New theme parks and attractions should be planned to accommodate these changes. For example, roller coasters, often cited by interviewees as a major disappointing experience as participants could not be buckled up, should be equipped with longer, more flexible seat belts. Finally, one of the interviewees suggested to examine the possibility to install 'adjustable seats' for different people's sizes ('small seats for kids, big seats for the parents'). In line with previous studies, this could be relevant also to the airline industry (Poria & Beal, 2016).
Limitation and future research
This exploratory study focuses on a small group of American interviewees, from a limited geographical area. Future studies in other locations may reveal different experiences. In addition, this study was conducted after the visit. Future studies conducted on site may provide further insights. The current study's emphasis on the social stigma attached to obesity, may encourage further exploration into other groups of distinct appearance in tourism and leisure servicescapes (e.g., ultra-Orthodox Jews or religious Muslims). Inspired by the idea of lookism, such studies could assist improving people's ability to enjoy tourism and leisure, improving their quality of life. Also, future studies should compare and contrast between obese people's perception of their experience and non-obese people's attitudes and reactions to obese people.
References
Berdychevsky, L., Poria, Y., & Uriely, N. (2013). Sexual behaviour in women's tourist experience: Motivations, behaviours and meanings. Tourism Management, 35, 272-274.
Bitner, M. J. (1992). Servicescapes: The impact of physical surroundings on customers and employees. Journal of Marketing, 56(2), 57-71.
Crouch, D. (2000). Places around us: Embodied lay geographies in leisure and tourism. Leisure Studies, 19 (2), 63-76.
Darcy, S. (2010). Inherent complexity: Disability, accessible tourism and accommodation information preferences. Tourism Management 31(6), 816-826.
Fitzpatrick, K. M., Shi, X., Willis, D. & Niemeier, J. (2018). Obesity and place: Chronic disease in the 500 largest US cities. Obesity Research & Clinical Practice, 12(5), 421-425.
Fuchs, G., Chen, P. J. & Pizam, A. (2015). Are travel purchases more satisfactory than no travel experiential purchases and material purchases? An exploratory study. Tourism Analysis, 20, 487-497. Harris, C., & Small, J. (2013). Obesity and hotel staffing: Are hotels guilty of 'lookism'? Hospitality & Society, 3(2), 111-127.
IAAPA. (2018). http://www.iaapa.org/resources/by-park-type/amusement-parks-and-attractions/ industry-statistics. Retrieved on 30/06/2018.
Ogden, C. L., Carroll, M. D., Fryar, C. D. & Flegal, K. M. (2015). Prevalence of obesity among adults and youth: United States, 2011-2014. NCHS Data Brief, 219 (1-8).
Pons, P. O. (2003). Being-on-holiday: Tourist dwelling, bodies and place. Tourist Studies, 3(1), 47–66.
Poria, Y. & Beal, J. (2017). An exploratory study about obese people's flight experience. Journal of Travel Research, 56, 1-11.
Poria, Y., Butler, R. & Airey, D. (2007). Understanding tourism – Memorable moments in a complex timeframe. Asian Journal of Tourism and Hospitality Research, 1, 25-38.
Pozza C. & Isidori A. M. (2018). What's behind the obesity epidemic. In A. Laghi & M. Rengo (Eds.), Imaging in bariatric surgery (pp. 1-8). Cham, Switzerland: Springer.
Pritchard, A., & Morgan, N. (2011). Tourist bodies, transformation and sensuality. In P. Bramham & S. Wagg (Eds.), The new politics of leisure and pleasure (pp. 153-168). New York, NY: Palgrave.
Slåtten, T., Krogh, C. & Connolley, S. (2011). Make it memorable: Customer experiences in winter amusement parks. International Journal of Culture, Tourism and Hospitality Research, 5(1), 80-91.
Small, J., & Harris, C. (2012). Obesity and tourism: Rights and responsibilities. Annals of Tourism Research, 39(2), 686-707.
Small, J., Harris, C., & Wilson, E. (2008). A critical discourse analysis of in-flight magazine advertisements: The ''social sorting'' of airline travellers? Journal of Tourism and Cultural Change, 6, 17-38.
Torres, E. N., Wei, W. & Hua, N. (2017). Towards understanding the effects of time and emotions on the vacation experience. Tourism Review, 72 (4), 357-374.
Veijola, S., & Jokinen, E. (1994). The body in tourism. Theory, Culture & Society, 11(3), 125-151.
Wakefield, K. L. & Blodgett, J. G. (1994). The importance of servicescapes in leisure service settings. Journal of Services Marketing, 8(3), 66-76.
Received: 31/03/2019
Accepted: 16/07/2019
Coordinating editor: Stanislav Ivanov
|
<urn:uuid:d036466f-b221-456f-a4ad-506ac8ab3d5a>
|
CC-MAIN-2024-51
|
https://ejtr.vumk.eu/index.php/about/article/download/414/418/1538
|
2024-12-09T07:11:19+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-51/subset=warc/part-00054-b392068a-8e35-4497-8fab-a691b1a71843.c000.gz.parquet
| 204,002,573
| 4,285
|
eng_Latn
|
eng_Latn
| 0.954295
|
eng_Latn
| 0.996907
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1534,
5273,
9386,
13125,
17049,
20048
] |
The joy of riding or walk of shame? The theme park experience of obese people
Yaniv Poria 1 *, Jeremy Beal 2 and Arie Reichel 3
1 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501. E-mail: [email protected]
2 Hospitality and Tourism Management, Virginia Tech, Virginia, USA
3 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501
* Corresponding author
Abstract
This exploratory study focuses on obese people's perceptions of their theme park experience. Given this study's objective and the gap in the literature on obese people's tourist experience, a qualitative research approach was adopted. In-depth semi-structured interviews were conducted. Participants revealed that their theme park experiences included a strong sense of humiliation. This is clearly associated with the interaction between their body, the physical environment and most importantly the human environment. Managerial implications are suggested.
Keywords: theme-park; obesity
Citation: Poria, Y., Beal, J. and Reichel, A. (2020). The joy of riding or walk of shame? The theme park experience of obese people. European Journal of Tourism Research 24, 2412.
This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
Introduction and literature review
More and more tourism scholars have been increasingly interested in the accessibility of disenfranchised segments of the population, whose physical characteristics hinder their tourist and leisure experiences. This interest is a response both to legal regulations and to societal recognition that tourism and mobility should be recognized as a social right. Obese people are not usually foremost in mind when discussing physical disabilities. Yet, these individuals face difficulties in many public places. This exploratory research focuses on their theme-park experience.
In 2011-2014, obese people made up some 36.5% of the adult population in the USA (Ogden et al., 2015), and current trends indicate that this rate is on the rise (Fitzpatrick et al. 2018). The International Association of Amusement Parks and Attractions (IAAPA) reports that there are more than 400 major theme parks and amusement parks and attractions in the USA, and about 300 in Europe, hosting 375 million and 161 million visitors annually, respectively (http://www.iaapa.org/resources/by-parktype/amusement-parks-and-attractions/industry-statistics). If the proportion of obese visitors to theme parks matches that of the general population, then one third of all visitors are obese. To date, surprisingly, researchers and park administrators have paid little attention to this rapidly growing segment of their visitors.
While there are numerous studies on theme or amusement parks (e.g. Slåtten, Krogh, & Connolley, 2011; Wakefield & Blodgett, 1994), there seems to be a gap in the understanding of the nature of the visit experience of people whose body might be a barrier to full enjoyment and participation. This corresponds with the ongoing attention to the study of the body in tourism and hospitality (Crouch, 2000; Harris & Small, 2013; Pons, 2003; Pritchard & Morgan, 2011; Veijola & Jokinen, 1994).
Bitner (1992) identified three dimensions of the theme park experience which could assist in contextualising the barriers to its experience: visitors' initiative to participate, experience with fellow visitors, and interaction with the staff. As these dimensions involve both the personal and the interpersonal spheres, and with studies focusing on the accessibility of marginalized segments in mind, this study uses a holistic approach that emphasizes the significance of people's emotions, self-respect, and self-perceptions (Darcy, 2010; Poria & Beal, 2016).
The apparent gap in studies concerning obese visitors could be attributed to an overall lack of recognition, in research and the industry, of the role of visitors' body and physical appearance in shaping the tourist experience (Berdychevsky, Poria, & Uriely, 2013). This, despite the fact that elements such as one's body and the social stigma it may carry, are highly recognized when conceptualizing human behaviour.
Research objective
This exploratory study was guided by two objectives: first, to highlight the onsite theme park experiences of obese people and, second, to identify ways to overcome the hurdles and barriers they confront. The focus on obese people stems from their current proportion in the population, and more so, from indications that obesity will become more prevalent in the near future. Beyond its effect on tourism, the present research will also contribute to the broader field of obesity studies by enhancing our knowledge of the meaning and reality of obese people's leisure experience (Small & Harris, 2012).
Methodology
Given the exploratory nature of the study as well as the research objectives, a qualitative research approach was adopted. In-depth semi-structured interviews were utilized as a means to obtain
subjective accounts and allow for comparisons between participants' reports. The findings reported here are part of a larger research project focusing on obese peoples' tourist experience, conducted in the USA in Virginia and West Virginia. Initially, 40 people were contacted through Craigslist, and were offered $20 for their participation; all those who responded ended up participating. For ethical reasons, participants were not asked about their weight or their BMI, and their definition of obesity or morbid obesity was by self-report. During the interviews, almost all participants revealed their weight and BMI, although they had not been asked about. The decision to focus on theme park visits evolved during the interviews. The interviewer (one of the authors) asked participants to relate to four components of the tourist experience: hotels, museums, restaurants, and flights. At the end of the interview, participants were asked to report on other tourism experiences related to their obesity. This procedure is based on studies elucidating the significant role of remembering noteworthy elements of past vacations, including unpleasant emotional experiences (Fuchs, Chen, & Pizam, 2015; Torres, Wei, & Hua, 2017), as well as studies highlighting the importance of memorable moments on the perception of the tourist experience (Poria, Butler, & Airey, 2007).
Interestingly, of the entire sample (N=40), 14 participants volunteered to share "an additional frustrating experience", and all referred to the same issue – theme parks. Some even wondered why they had not been asked about theme-parks to begin with ("Why did you ask me about museums and not about my visit to Disneyland?"). In addition, participants mentioned that if asked to compare the various components of their tourist experience, flights and theme parks would be the worst. The interviews were inspired by the recognition that the body is a socio-cultural entity inscribed with meaning. Moreover, it is suggested here that the visit experience is a corporeal experience as well as emotional one.
Findings
The 14 obese/morbidly obese participants made it clear that visiting theme parks was a major component of their travel experience, referring almost exclusively to theme parks in the USA, primarily Disneyland, Disney World and in and around Virginia (e.g. Busch Gardens in Williamsburg). Interestingly, they revealed that theme parks were often the main – if not the sole reason for travel. For some, it was 'a dream come true'. Moreover, it was often part of a long-awaited planned family vacation for which participants had saved money for long time to cover the high costs.
The interviewees had clear and high expectations of the theme park to be visited. It also became evident that participants had planned accurately how to experience the site. Ruth commented about her recent vacation with her two children and husband: '…it was me and my two kids. We planned it and dreamt about it for almost two years. We knew exactly what we were going to do. We knew exactly which rides we should take. When will we eat, when does the show begin. Everything. You have to know, it is a very expensive vacation for us. We were all so excited – my kids, myself and even my husband.'
Theme park issues
The content analysis of the responses highlighted several noteworthy issues. All but one of the 14 participants in the obese/morbidly obese group complained about the long distances between park attractions, the long queues, and the "endless waiting time for each ride." The interviews revealed that the participants' physical condition resulted in mobility difficulties, which, in turn, caused frustration and fatigue. Participants argued that due to their weight and size '…it is extremely difficult to move between the park's various attractions or to stand on line'. Some voiced their frustration that obesity is not formally classified as a disability. Therefore, they could not use the special line for people with disabilities or the golf carts. However, the main concern that all participants shared and expressed was
their strong feeling of humiliation, caused mainly by their inability to experience a ride (due to the small seats or too-short seatbelts), and by the insult of being asked to leave the line – all in front of other visitors.
The content analysis clearly showed that the participants were greatly embarrassed by the attraction operators' request that they leave the line in order not to block the next visitors. This request was especially embarrassing when made in front of their children. Participants used words such as "humiliating," "embarrassing," "devastating," and "I wanted to cry." Dana said, "I felt the world was shattering… and all of it in front of my kids. I was devastated." Moreover, this is especially difficult when children are not allowed on a ride unless accompanied by a parent, or when the children wanted to take the ride with the parents only. Clearly, these highly memorable humiliating moments are crucial for the understanding of the painful theme park experience of obese people.
The findings indicate that the reported experience might cast a long shadow onto the future. Participants stated that their humiliating experiences tainted their theme park visit with hard-to-heal wounds, some going so far as to claim that "it ruined our vacation". To aggravate the situation, some participants felt that bystanders seemed to be happy seeing them and their children barred from the ride, being punished for their intentional choice to be obese. Interviewees felt that bystanders' facial expressions indicated that it was socially acceptable, judicious, and even commendable to punish obese people, by expulsion from the line: "they view us as people who made a choice to be obese, so treated us like people who chose to be disabled and enjoy government support paid for by ordinary working people's taxes".
Obese people's feeling that others view them as "thieves", was a shameful and humiliating experience that lingered on as a painful memory. Thus, the joy of ride turns into a public walk of shame.
Summary
The findings indicate the theme park experience is highly affected by obese peoples' look and body size. Their body determines their interaction with the physical and human environments, creating a physically challenging and mentally humiliating visitor experience. The physical environment is challenging for obese people. It calls upon them to cover considerable distances, and this entails great effort. The restrictive park regulations have a major effect on obese people's park experience, an effect that has not yet been documented in tourism studies. At the core of the experience is participants' perception that the bystanders who watched and stared at them when asked to leave, considered the request to be a mark justice made. The ensuing sense of humiliation was highly devastating. The findings indicate that people's appearances should be considered when conceptualizing the tourist experience, especially the theme park experience. The findings suggest that obesity should be approached as a "social disability" which might be more punitive and restrictive than physical disability. In other words, it is the social arena that may create long-term negative memories rather than the physical attributes of the site.
The findings highlight that accessibility should be conceptualised not only in terms of the individual's ability to move from one point to another, but also in terms of respect and acceptance by others. Relying on previous studies, it is suggested in line with the neo-liberal approach (Small & Harris, 2012; Small, Harris, & Wilson, 2008) that one's physical body should be approached as a social construct crucial to the understanding of the tourist experience.
Implications
Several simple, yet effective, inexpensive and easy to implement managerial implications arise from this exploratory study. Obese people could be advised to use the line for people with disabilities, and be offered golf carts to facilitate greater mobility. The humiliation felt at ride's embarkation point can be easily solved via expectations management. Theme park visitors should be informed prior to ticket purchase and arrival about the 'servicescape' limitations. Just as there are age and height limits for some rides, clear information should also be posted about weight or body size. This is especially significant when a parent is obese and is barred from a ride, the impact on the family is devastating. Services for obese people, as well as restrictions, should be clearly posted on the park website.
Ride operators should be instructed on how to handle sensitive situations with obese people. In addition, as one of the interviewees suggested, a designated area of the park could display the various rides' seats, so that people can see in advance whether a particular ride is suited for their body size. The management of theme parks could consider providing obese people with a booklet of coupons only for the rides they can use, rather than the common all-inclusive expensive pass, offering a lower entrance fe
|
e.
| 14,466
|
inside_word
|
fee.
|
remove_all
|
<url>
https://ejtr.vumk.eu/index.php/about/article/download/414/418/1538
</url>
<text>
The joy of riding or walk of shame? The theme park experience of obese people
Yaniv Poria 1 *, Jeremy Beal 2 and Arie Reichel 3
1 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501. E-mail: [email protected]
2 Hospitality and Tourism Management, Virginia Tech, Virginia, USA
3 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501
* Corresponding author
Abstract
This exploratory study focuses on obese people's perceptions of their theme park experience. Given this study's objective and the gap in the literature on obese people's tourist experience, a qualitative research approach was adopted. In-depth semi-structured interviews were conducted. Participants revealed that their theme park experiences included a strong sense of humiliation. This is clearly associated with the interaction between their body, the physical environment and most importantly the human environment. Managerial implications are suggested.
Keywords: theme-park; obesity
Citation: Poria, Y., Beal, J. and Reichel, A. (2020). The joy of riding or walk of shame? The theme park experience of obese people. European Journal of Tourism Research 24, 2412.
This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
Introduction and literature review
More and more tourism scholars have been increasingly interested in the accessibility of disenfranchised segments of the population, whose physical characteristics hinder their tourist and leisure experiences. This interest is a response both to legal regulations and to societal recognition that tourism and mobility should be recognized as a social right. Obese people are not usually foremost in mind when discussing physical disabilities. Yet, these individuals face difficulties in many public places. This exploratory research focuses on their theme-park experience.
In 2011-2014, obese people made up some 36.5% of the adult population in the USA (Ogden et al., 2015), and current trends indicate that this rate is on the rise (Fitzpatrick et al. 2018). The International Association of Amusement Parks and Attractions (IAAPA) reports that there are more than 400 major theme parks and amusement parks and attractions in the USA, and about 300 in Europe, hosting 375 million and 161 million visitors annually, respectively (http://www.iaapa.org/resources/by-parktype/amusement-parks-and-attractions/industry-statistics). If the proportion of obese visitors to theme parks matches that of the general population, then one third of all visitors are obese. To date, surprisingly, researchers and park administrators have paid little attention to this rapidly growing segment of their visitors.
While there are numerous studies on theme or amusement parks (e.g. Slåtten, Krogh, & Connolley, 2011; Wakefield & Blodgett, 1994), there seems to be a gap in the understanding of the nature of the visit experience of people whose body might be a barrier to full enjoyment and participation. This corresponds with the ongoing attention to the study of the body in tourism and hospitality (Crouch, 2000; Harris & Small, 2013; Pons, 2003; Pritchard & Morgan, 2011; Veijola & Jokinen, 1994).
Bitner (1992) identified three dimensions of the theme park experience which could assist in contextualising the barriers to its experience: visitors' initiative to participate, experience with fellow visitors, and interaction with the staff. As these dimensions involve both the personal and the interpersonal spheres, and with studies focusing on the accessibility of marginalized segments in mind, this study uses a holistic approach that emphasizes the significance of people's emotions, self-respect, and self-perceptions (Darcy, 2010; Poria & Beal, 2016).
The apparent gap in studies concerning obese visitors could be attributed to an overall lack of recognition, in research and the industry, of the role of visitors' body and physical appearance in shaping the tourist experience (Berdychevsky, Poria, & Uriely, 2013). This, despite the fact that elements such as one's body and the social stigma it may carry, are highly recognized when conceptualizing human behaviour.
Research objective
This exploratory study was guided by two objectives: first, to highlight the onsite theme park experiences of obese people and, second, to identify ways to overcome the hurdles and barriers they confront. The focus on obese people stems from their current proportion in the population, and more so, from indications that obesity will become more prevalent in the near future. Beyond its effect on tourism, the present research will also contribute to the broader field of obesity studies by enhancing our knowledge of the meaning and reality of obese people's leisure experience (Small & Harris, 2012).
Methodology
Given the exploratory nature of the study as well as the research objectives, a qualitative research approach was adopted. In-depth semi-structured interviews were utilized as a means to obtain
subjective accounts and allow for comparisons between participants' reports. The findings reported here are part of a larger research project focusing on obese peoples' tourist experience, conducted in the USA in Virginia and West Virginia. Initially, 40 people were contacted through Craigslist, and were offered $20 for their participation; all those who responded ended up participating. For ethical reasons, participants were not asked about their weight or their BMI, and their definition of obesity or morbid obesity was by self-report. During the interviews, almost all participants revealed their weight and BMI, although they had not been asked about. The decision to focus on theme park visits evolved during the interviews. The interviewer (one of the authors) asked participants to relate to four components of the tourist experience: hotels, museums, restaurants, and flights. At the end of the interview, participants were asked to report on other tourism experiences related to their obesity. This procedure is based on studies elucidating the significant role of remembering noteworthy elements of past vacations, including unpleasant emotional experiences (Fuchs, Chen, & Pizam, 2015; Torres, Wei, & Hua, 2017), as well as studies highlighting the importance of memorable moments on the perception of the tourist experience (Poria, Butler, & Airey, 2007).
Interestingly, of the entire sample (N=40), 14 participants volunteered to share "an additional frustrating experience", and all referred to the same issue – theme parks. Some even wondered why they had not been asked about theme-parks to begin with ("Why did you ask me about museums and not about my visit to Disneyland?"). In addition, participants mentioned that if asked to compare the various components of their tourist experience, flights and theme parks would be the worst. The interviews were inspired by the recognition that the body is a socio-cultural entity inscribed with meaning. Moreover, it is suggested here that the visit experience is a corporeal experience as well as emotional one.
Findings
The 14 obese/morbidly obese participants made it clear that visiting theme parks was a major component of their travel experience, referring almost exclusively to theme parks in the USA, primarily Disneyland, Disney World and in and around Virginia (e.g. Busch Gardens in Williamsburg). Interestingly, they revealed that theme parks were often the main – if not the sole reason for travel. For some, it was 'a dream come true'. Moreover, it was often part of a long-awaited planned family vacation for which participants had saved money for long time to cover the high costs.
The interviewees had clear and high expectations of the theme park to be visited. It also became evident that participants had planned accurately how to experience the site. Ruth commented about her recent vacation with her two children and husband: '…it was me and my two kids. We planned it and dreamt about it for almost two years. We knew exactly what we were going to do. We knew exactly which rides we should take. When will we eat, when does the show begin. Everything. You have to know, it is a very expensive vacation for us. We were all so excited – my kids, myself and even my husband.'
Theme park issues
The content analysis of the responses highlighted several noteworthy issues. All but one of the 14 participants in the obese/morbidly obese group complained about the long distances between park attractions, the long queues, and the "endless waiting time for each ride." The interviews revealed that the participants' physical condition resulted in mobility difficulties, which, in turn, caused frustration and fatigue. Participants argued that due to their weight and size '…it is extremely difficult to move between the park's various attractions or to stand on line'. Some voiced their frustration that obesity is not formally classified as a disability. Therefore, they could not use the special line for people with disabilities or the golf carts. However, the main concern that all participants shared and expressed was
their strong feeling of humiliation, caused mainly by their inability to experience a ride (due to the small seats or too-short seatbelts), and by the insult of being asked to leave the line – all in front of other visitors.
The content analysis clearly showed that the participants were greatly embarrassed by the attraction operators' request that they leave the line in order not to block the next visitors. This request was especially embarrassing when made in front of their children. Participants used words such as "humiliating," "embarrassing," "devastating," and "I wanted to cry." Dana said, "I felt the world was shattering… and all of it in front of my kids. I was devastated." Moreover, this is especially difficult when children are not allowed on a ride unless accompanied by a parent, or when the children wanted to take the ride with the parents only. Clearly, these highly memorable humiliating moments are crucial for the understanding of the painful theme park experience of obese people.
The findings indicate that the reported experience might cast a long shadow onto the future. Participants stated that their humiliating experiences tainted their theme park visit with hard-to-heal wounds, some going so far as to claim that "it ruined our vacation". To aggravate the situation, some participants felt that bystanders seemed to be happy seeing them and their children barred from the ride, being punished for their intentional choice to be obese. Interviewees felt that bystanders' facial expressions indicated that it was socially acceptable, judicious, and even commendable to punish obese people, by expulsion from the line: "they view us as people who made a choice to be obese, so treated us like people who chose to be disabled and enjoy government support paid for by ordinary working people's taxes".
Obese people's feeling that others view them as "thieves", was a shameful and humiliating experience that lingered on as a painful memory. Thus, the joy of ride turns into a public walk of shame.
Summary
The findings indicate the theme park experience is highly affected by obese peoples' look and body size. Their body determines their interaction with the physical and human environments, creating a physically challenging and mentally humiliating visitor experience. The physical environment is challenging for obese people. It calls upon them to cover considerable distances, and this entails great effort. The restrictive park regulations have a major effect on obese people's park experience, an effect that has not yet been documented in tourism studies. At the core of the experience is participants' perception that the bystanders who watched and stared at them when asked to leave, considered the request to be a mark justice made. The ensuing sense of humiliation was highly devastating. The findings indicate that people's appearances should be considered when conceptualizing the tourist experience, especially the theme park experience. The findings suggest that obesity should be approached as a "social disability" which might be more punitive and restrictive than physical disability. In other words, it is the social arena that may create long-term negative memories rather than the physical attributes of the site.
The findings highlight that accessibility should be conceptualised not only in terms of the individual's ability to move from one point to another, but also in terms of respect and acceptance by others. Relying on previous studies, it is suggested in line with the neo-liberal approach (Small & Harris, 2012; Small, Harris, & Wilson, 2008) that one's physical body should be approached as a social construct crucial to the understanding of the tourist experience.
Implications
Several simple, yet effective, inexpensive and easy to implement managerial implications arise from this exploratory study. Obese people could be advised to use the line for people with disabilities, and be offered golf carts to facilitate greater mobility. The humiliation felt at ride's embarkation point can be easily solved via expectations management. Theme park visitors should be informed prior to ticket purchase and arrival about the 'servicescape' limitations. Just as there are age and height limits for some rides, clear information should also be posted about weight or body size. This is especially significant when a parent is obese and is barred from a ride, the impact on the family is devastating. Services for obese people, as well as restrictions, should be clearly posted on the park website.
Ride operators should be instructed on how to handle sensitive situations with obese people. In addition, as one of the interviewees suggested, a designated area of the park could display the various rides' seats, so that people can see in advance whether a particular ride is suited for their body size. The management of theme parks could consider providing obese people with a booklet of coupons only for the rides they can use, rather than the common all-inclusive expensive pass, offering a lower entrance fe<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://ejtr.vumk.eu/index.php/about/article/download/414/418/1538\n</url>\n<text>\nThe joy of riding or walk of shame? The theme park experience of obese people\n\nYaniv Poria 1 *, Jeremy Beal 2 and Arie Reichel 3\n\n1 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501. E-mail: [email protected]\n\n2 Hospitality and Tourism Management, Virginia Tech, Virginia, USA\n\n3 Department of Hotel and Tourism Management, Ben-Gurion University of the Negev, Guilford Glazer Faculty of Business and Management, Be'er-Sheva, Israel 8410501\n\n* Corresponding author\n\nAbstract\n\nThis exploratory study focuses on obese people's perceptions of their theme park experience. Given this study's objective and the gap in the literature on obese people's tourist experience, a qualitative research approach was adopted. In-depth semi-structured interviews were conducted. Participants revealed that their theme park experiences included a strong sense of humiliation. This is clearly associated with the interaction between their body, the physical environment and most importantly the human environment. Managerial implications are suggested.\n\nKeywords: theme-park; obesity\n\nCitation: Poria, Y., Beal, J. and Reichel, A. (2020). The joy of riding or walk of shame? The theme park experience of obese people. European Journal of Tourism Research 24, 2412.\n\nThis work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/\n\nIntroduction and literature review\n\nMore and more tourism scholars have been increasingly interested in the accessibility of disenfranchised segments of the population, whose physical characteristics hinder their tourist and leisure experiences. This interest is a response both to legal regulations and to societal recognition that tourism and mobility should be recognized as a social right. Obese people are not usually foremost in mind when discussing physical disabilities. Yet, these individuals face difficulties in many public places. This exploratory research focuses on their theme-park experience.\n\nIn 2011-2014, obese people made up some 36.5% of the adult population in the USA (Ogden et al., 2015), and current trends indicate that this rate is on the rise (Fitzpatrick et al. 2018). The International Association of Amusement Parks and Attractions (IAAPA) reports that there are more than 400 major theme parks and amusement parks and attractions in the USA, and about 300 in Europe, hosting 375 million and 161 million visitors annually, respectively (http://www.iaapa.org/resources/by-parktype/amusement-parks-and-attractions/industry-statistics). If the proportion of obese visitors to theme parks matches that of the general population, then one third of all visitors are obese. To date, surprisingly, researchers and park administrators have paid little attention to this rapidly growing segment of their visitors.\n\nWhile there are numerous studies on theme or amusement parks (e.g. Slåtten, Krogh, & Connolley, 2011; Wakefield & Blodgett, 1994), there seems to be a gap in the understanding of the nature of the visit experience of people whose body might be a barrier to full enjoyment and participation. This corresponds with the ongoing attention to the study of the body in tourism and hospitality (Crouch, 2000; Harris & Small, 2013; Pons, 2003; Pritchard & Morgan, 2011; Veijola & Jokinen, 1994).\n\nBitner (1992) identified three dimensions of the theme park experience which could assist in contextualising the barriers to its experience: visitors' initiative to participate, experience with fellow visitors, and interaction with the staff. As these dimensions involve both the personal and the interpersonal spheres, and with studies focusing on the accessibility of marginalized segments in mind, this study uses a holistic approach that emphasizes the significance of people's emotions, self-respect, and self-perceptions (Darcy, 2010; Poria & Beal, 2016).\n\nThe apparent gap in studies concerning obese visitors could be attributed to an overall lack of recognition, in research and the industry, of the role of visitors' body and physical appearance in shaping the tourist experience (Berdychevsky, Poria, & Uriely, 2013). This, despite the fact that elements such as one's body and the social stigma it may carry, are highly recognized when conceptualizing human behaviour.\n\nResearch objective\n\nThis exploratory study was guided by two objectives: first, to highlight the onsite theme park experiences of obese people and, second, to identify ways to overcome the hurdles and barriers they confront. The focus on obese people stems from their current proportion in the population, and more so, from indications that obesity will become more prevalent in the near future. Beyond its effect on tourism, the present research will also contribute to the broader field of obesity studies by enhancing our knowledge of the meaning and reality of obese people's leisure experience (Small & Harris, 2012).\n\nMethodology\n\nGiven the exploratory nature of the study as well as the research objectives, a qualitative research approach was adopted. In-depth semi-structured interviews were utilized as a means to obtain\n\nsubjective accounts and allow for comparisons between participants' reports. The findings reported here are part of a larger research project focusing on obese peoples' tourist experience, conducted in the USA in Virginia and West Virginia. Initially, 40 people were contacted through Craigslist, and were offered $20 for their participation; all those who responded ended up participating. For ethical reasons, participants were not asked about their weight or their BMI, and their definition of obesity or morbid obesity was by self-report. During the interviews, almost all participants revealed their weight and BMI, although they had not been asked about. The decision to focus on theme park visits evolved during the interviews. The interviewer (one of the authors) asked participants to relate to four components of the tourist experience: hotels, museums, restaurants, and flights. At the end of the interview, participants were asked to report on other tourism experiences related to their obesity. This procedure is based on studies elucidating the significant role of remembering noteworthy elements of past vacations, including unpleasant emotional experiences (Fuchs, Chen, & Pizam, 2015; Torres, Wei, & Hua, 2017), as well as studies highlighting the importance of memorable moments on the perception of the tourist experience (Poria, Butler, & Airey, 2007).\n\nInterestingly, of the entire sample (N=40), 14 participants volunteered to share \"an additional frustrating experience\", and all referred to the same issue – theme parks. Some even wondered why they had not been asked about theme-parks to begin with (\"Why did you ask me about museums and not about my visit to Disneyland?\"). In addition, participants mentioned that if asked to compare the various components of their tourist experience, flights and theme parks would be the worst. The interviews were inspired by the recognition that the body is a socio-cultural entity inscribed with meaning. Moreover, it is suggested here that the visit experience is a corporeal experience as well as emotional one.\n\nFindings\n\nThe 14 obese/morbidly obese participants made it clear that visiting theme parks was a major component of their travel experience, referring almost exclusively to theme parks in the USA, primarily Disneyland, Disney World and in and around Virginia (e.g. Busch Gardens in Williamsburg). Interestingly, they revealed that theme parks were often the main – if not the sole reason for travel. For some, it was 'a dream come true'. Moreover, it was often part of a long-awaited planned family vacation for which participants had saved money for long time to cover the high costs.\n\nThe interviewees had clear and high expectations of the theme park to be visited. It also became evident that participants had planned accurately how to experience the site. Ruth commented about her recent vacation with her two children and husband: '…it was me and my two kids. We planned it and dreamt about it for almost two years. We knew exactly what we were going to do. We knew exactly which rides we should take. When will we eat, when does the show begin. Everything. You have to know, it is a very expensive vacation for us. We were all so excited – my kids, myself and even my husband.'\n\nTheme park issues\n\nThe content analysis of the responses highlighted several noteworthy issues. All but one of the 14 participants in the obese/morbidly obese group complained about the long distances between park attractions, the long queues, and the \"endless waiting time for each ride.\" The interviews revealed that the participants' physical condition resulted in mobility difficulties, which, in turn, caused frustration and fatigue. Participants argued that due to their weight and size '…it is extremely difficult to move between the park's various attractions or to stand on line'. Some voiced their frustration that obesity is not formally classified as a disability. Therefore, they could not use the special line for people with disabilities or the golf carts. However, the main concern that all participants shared and expressed was\n\ntheir strong feeling of humiliation, caused mainly by their inability to experience a ride (due to the small seats or too-short seatbelts), and by the insult of being asked to leave the line – all in front of other visitors.\n\nThe content analysis clearly showed that the participants were greatly embarrassed by the attraction operators' request that they leave the line in order not to block the next visitors. This request was especially embarrassing when made in front of their children. Participants used words such as \"humiliating,\" \"embarrassing,\" \"devastating,\" and \"I wanted to cry.\" Dana said, \"I felt the world was shattering… and all of it in front of my kids. I was devastated.\" Moreover, this is especially difficult when children are not allowed on a ride unless accompanied by a parent, or when the children wanted to take the ride with the parents only. Clearly, these highly memorable humiliating moments are crucial for the understanding of the painful theme park experience of obese people.\n\nThe findings indicate that the reported experience might cast a long shadow onto the future. Participants stated that their humiliating experiences tainted their theme park visit with hard-to-heal wounds, some going so far as to claim that \"it ruined our vacation\". To aggravate the situation, some participants felt that bystanders seemed to be happy seeing them and their children barred from the ride, being punished for their intentional choice to be obese. Interviewees felt that bystanders' facial expressions indicated that it was socially acceptable, judicious, and even commendable to punish obese people, by expulsion from the line: \"they view us as people who made a choice to be obese, so treated us like people who chose to be disabled and enjoy government support paid for by ordinary working people's taxes\".\n\nObese people's feeling that others view them as \"thieves\", was a shameful and humiliating experience that lingered on as a painful memory. Thus, the joy of ride turns into a public walk of shame.\n\nSummary\n\nThe findings indicate the theme park experience is highly affected by obese peoples' look and body size. Their body determines their interaction with the physical and human environments, creating a physically challenging and mentally humiliating visitor experience. The physical environment is challenging for obese people. It calls upon them to cover considerable distances, and this entails great effort. The restrictive park regulations have a major effect on obese people's park experience, an effect that has not yet been documented in tourism studies. At the core of the experience is participants' perception that the bystanders who watched and stared at them when asked to leave, considered the request to be a mark justice made. The ensuing sense of humiliation was highly devastating. The findings indicate that people's appearances should be considered when conceptualizing the tourist experience, especially the theme park experience. The findings suggest that obesity should be approached as a \"social disability\" which might be more punitive and restrictive than physical disability. In other words, it is the social arena that may create long-term negative memories rather than the physical attributes of the site.\n\nThe findings highlight that accessibility should be conceptualised not only in terms of the individual's ability to move from one point to another, but also in terms of respect and acceptance by others. Relying on previous studies, it is suggested in line with the neo-liberal approach (Small & Harris, 2012; Small, Harris, & Wilson, 2008) that one's physical body should be approached as a social construct crucial to the understanding of the tourist experience.\n\nImplications\n\nSeveral simple, yet effective, inexpensive and easy to implement managerial implications arise from this exploratory study. Obese people could be advised to use the line for people with disabilities, and be offered golf carts to facilitate greater mobility. The humiliation felt at ride's embarkation point can be easily solved via expectations management. Theme park visitors should be informed prior to ticket purchase and arrival about the 'servicescape' limitations. Just as there are age and height limits for some rides, clear information should also be posted about weight or body size. This is especially significant when a parent is obese and is barred from a ride, the impact on the family is devastating. Services for obese people, as well as restrictions, should be clearly posted on the park website.\n\nRide operators should be instructed on how to handle sensitive situations with obese people. In addition, as one of the interviewees suggested, a designated area of the park could display the various rides' seats, so that people can see in advance whether a particular ride is suited for their body size. The management of theme parks could consider providing obese people with a booklet of coupons only for the rides they can use, rather than the common all-inclusive expensive pass, offering a lower entrance fe<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "e.",
"role": "assistant"
}
] |
|
Institute of Atmospheric Optics, Siberian Branch of the Russian Academy of Sciences Received June 2, 1995
An algorithm for reconstructing overcast fragments of aerospace images of the Earth's surface has been proposed. It is based on a statistical approach to completing skipped components of the observation vector. Some examples of reconstruction of video images have been given with a sample of images of preceding statistically homogeneous observations.
Well known are the problems connected with the analysis of aerospace video images produced when some regions of the Earth's surface are shadowed by fog or cloud fragments of high optical density. In this case, standard methods of image restoration using, for example, linear model describing the process of image transfer through dense scattering media and having the form of functional of convolution of the sought–after image with the point spread function give no way to obtain results of any value.
At the same time, in mathematical statistics, 1,2 the apparatus has been developed for reconstructing skipped components and formulating decision rules of statistical inference in observations of incomplete vector data. Methods for reconstructing skipper values are based on the use of information coded in interconnections between the vector components of the data being observed, i.e., on the context of interrelations. Therefore, for a solution of the aforementioned problem, the methods based on estimating the unknown parameters of statistical models are widely used. 2
Thus, for example, in order to reconstruct defect rows of raster images and to represent them efficiently, the filtration algorithms are used. 5 The linear models of data description in bases of linearly independent functions (in the simplest case it may be the Fourier trigonometric basis used for restoration of archive photographs 6 ) offer reconstructing properties.
Although from the theoretical viewpoint the choice of a system of basis function is not crucial for a solution of the problem of reconstructing the skipped values, taking into account multidimensionality of video mages and instability of a solution of the system of linear equations whose dimensionality is determined by the number of functions of basis space, it becomes clear that progress in the problem solution is completely governed by the approximating properties of the basis chosen to describe the observed ensemble of images by relatively small number of basis functions.
In general let us consider a problem of reconstruction of fragments of vector fields modeling multicomponent aerospace images. We assume that the random vector field ξ ( u )=( ξ 1 ( u ), ..., ξ s ( u )) T of vector argument u = ( u 1 ,..., u ν ) T (where s and ν are the dimensionality of the vector function ξ ( ⋅ ) and of vector argument respectively, and T denotes transposition), centered about mathematical expectation μ ( u ), is represented in its domain of definition
where {u i a } and {u i b } are the boundaries of multidimensional square, by a set of N realizations ξ 1(u), ..., ξ N(u).
With regard for restrictions imposed onto the field that were introduced in Refs. 3 and 4 and hold true for physically realizable fields, the orthonormal basis can be constructed in the space of process realizations, and the vector field can be represented as follows:
where the limit is understood as convergence in the rms sense, {Φ i(u)} 1 k are the non–random basis vector functions of vector argument. The random coefficients {X i } k 1 are determined from conditions of minimum standard deviation
where M denotes the mathematical expectation operator, é⋅é denotes the Euclidean norm in the space of observations, and k is the number of chosen basis functions. If the condition of orthonormality
is imposed onto the basis functions {Φ i(u)} 1 k ,where δ ij(i, j = 1, ..., k) is the Kronecker symbol, d ν u = du 1× ... ×du ν , and (., .) denotes the scalar product, the representation coefficients { X i } k 1 that minimize Eq. (2) have the form
Let us now assume that the next realization being observed has skipped values in some connected subsets of the domain D. These skipped values are due to shadowing effect of broken cloudiness. Let us denote a set of all fragments of the domain D with indefinite realizations ξ(u) by E, where E ⊂ D.
It should be noted that the rms error ε 2 k (see Eq. (2)) of representation of this incomplete realization(using statistical terms of Ref. 1 and 2) is uncertain, since ξ(u) has unknown values in the domain E ⊂ D, whereas the basis functions {Φ i(u)} k 1 are defined everywhere over the domain D.
The idea of reconstructing the skipped values is to complement realization ξ(u) in E in any way and to find the coefficients {X i } k 1 that minimize ε 2 k . In connection with the aforesaid, let us complement the uncertain realizations ξ(u) in the domain E by a linear combination of some (thus far unknown) coefficients and basis functions {Φ i(u)} k 1 . It is natural to choose the coefficient of model (1) as unknown coefficients of these linear combinations. In other words, we introduce a modified realization of the following form:
and the complement ∑ X j Φ j(u) of realization ξ(u) in a shadowed region does not increase the error ε k 2 , because it enters into both terms of the difference in Eq. (2).
Let us now write down expression (4) for the representation coefficients dividing the domain D of integration into non–intersecting subdomain D\E, in which the modified observation ζ(u) has the form of true observation ξ(u), and subdomain E, where ζ(u)
has the form of approximation ∑ X j Φ j(u) of the field to be reconstructed in E . Then expression X i for coefficients (4) comprises the following components:
Now we introduce the designations
x = (X 1 ... X k ) T , and I = diag(1, ..., 1) (the unit k×k matrix).
Then from Eq. (6) we obtain the equation for unknown components of vector x, namely,
Solving it by any method, we find the desired coefficients {X i } k 1 . These coefficients can be used for reconstruction of the realization ξ(u) being observed using either model (1) or modified realization of Eq. (5) only for shadowed regions.
It should be noted that the basis {Φ i(u)} k 1 of orthonormal functions was taken arbitrarily, but the quality of approximation and the accuracy of reconstruction will be much higher for the Karhunen– Loeve (KL) basis best suited for description a random process in the sense of the rms error, which ensures the minimum approximation error 3,4 ε 2 k as compared with other bases for fixed number k of basis functions.
An algorithm for constructing such a basis and other adaptive bases from a sample of complete realizations ξ 1(u), ..., ξ N(u) was described in detail in Ref. 4. Let us consider the problems of construction of such a basis from incomplete realizations ξ 1(u), ..., ξ N(u) in subdomains E1, ..., EN, respectively, of the domain D.
At the first step, we choose a certain basis {Ψ i(u)} k 1 and, after complement of realizations as described above, obtain a corrected set of images {ζ 0 i ( u )} N 1 , in which the skipped realization ξ 1(u), ..., ξ N(u) of overcast fragments of video images E1, ..., EN have been complemented by modifications (5). Having the reconstructed data of zero approximation {ζ 0 i ( u )} N 1 at hand, we can construct the KL basis of the first approximation {Φ 1 i(u)} k 1 , and on this basis solve the problem of reconstruction of realizations of the basis sample for model (5).
To eliminate degeneracy of matrix A in Eq. (7), which results in singular solutions, a moving regime of correction and construction of basis should be used, that is, when reconstructing the ith realization ξ i(u), its modified analog should be excluded from the sample {ζ 0 i ( u )} N 1 and the KL basis of the first approximation {Φ 1 i(u)} k 1 should be constructed from the sample ζ 0 1 ( u ), ..., ζ 0 i$1 ( u ), ζ 0 i+1 ( u ), ..., ζ 0 N ( u ) of size N – 1, where i = 1, ..., N.
Having thus reconstructed each of {ξ i(u)} N 1 images and obtained their modifications {ζ 1 i ( u )}, we construct the basis of the second approximation {Φ 2 i ( u )} k 1 from these data.
Continuing this iterative process of construction of the next basis and reconstruction of realizations, we finally obtain at the mth step a set of basis functions
{Φ m i ( u )} k 1 , that can be used to correct ultimately the images {ξ i(u)} N 1 , converting them in a set { ζ m i ( u )} N 1 with the rms error of approximation
An increment to the error at the next step of iteration serves as a criterion for termination of this process, and when ε k(m – 1) – ε k(m) ≤ε, where ε is a preset parameter, the process of basis correction is terminated, and the obtained basis {Φ m i ( u )} k 1 is used for reconstruction of newly recorded video images.
In the rms sense convergence of the above– described procedure of reconstruction of basis and realizations follows from convergence of monotonically decreasing finite sequences.
It should be noted that to solve the problem of reconstruction of overcasted fragments of video images, for construction of adaptive bases 4 it is natural to use the a priori information in the form of:
– landscape maps of ground reflectivity that can be used to form model images of underlying surface of a chosen region,
– statistics of microwave satellite images recorded with superhigh resolution, from which the optical images scaled to the images being observed can be synthesized,
– samples of satellite images recorded at stations of routine survey at stages of preliminary observations with regard to seasonal stationarity of situation.
Just the last case is presented as an example of operation of an algorithm. We consider the simplified geometry of satellite observations without regard for cloud shadow, adjacency effect, sun elevation, and other interfering effects believing that their influence during the period of data accumulation does not disturb statistical homogeneity of observations.
To illustrate the operation of the algorithm for reconstructing overcast fragments of video images, linearly independent realizations of images were formed. As a basis for collecting image statistics, three satellite photographs taken from onboard the Resurs satellite were chosen in the following wavelength ranges: 0.5–0.6 μm (channel I), 0.6–0.7 μm (channel II), and 0.8–0.9 μm (channel III). They were digitized by 256 brightness levels.
Fragments of images of 256×256 pixels, denoted by ξ 1(x, y), ξ 2(x, y), and ξ 3(x, y) for each wavelength range, served as initial information to collect statistics of images. The next model image ξ(x, y) of the sampling ensemble was formed using a linear combination of three initial images, namely,
where α, β, and γ were set by a random-number generator. They obeyed uniform distribution and normalization condition α + β + γ = 1.
To collect statistics of linearly independent images, we used the nonlinear transformation of equalization in Eq. (9). The sample of 25 images was thus obtained, which modeled the results of satellite observations at a station of routine survey of the same region of the Earth's surface.
As model clouds, plane fragments bounded by ellipses with random center positions, orientation, and lengths of axes were taken. On average, 10.5% of total area was shadowed by these clouds. As a criterion of image reconstruction quality, the following quadratic integral criterion
was chosen. Here, ξ(x, y) is the initial sharp (complete) image, ^ ξ(x, y) is the image reconstructed from ξ 0(x, y), and ξ 0(x, y) is the overcast image ξ(x, y).
The first run of experiments used the KL basis constructed from a sample of 12 complete images. Approximating properties of the KL basis so obtained are characterized by the spectrum of the eigenvalues shown in Fig. 1a (curve 1), where λ determine the contribution from each basis function to the generalized variance. Figure 1b (curve 1) shows the error of approximation of an ensemble of realization by a set of basis functions.
FIG. 2. Mathematical expectation (ME) and the first three functions of the KL basis (1, 2, and 3).
FIG. 3.
The mathematical expectation estimated from the sample and the first three basis functions (in the form of images) of the KL basis obtained in this experiment are illustrated by Fig. 2a.
Then the problem of reconstruction of ten images with cloud fragments was solved with the use of the basis so constructed. Figure 3a illustrates four of these images with clouds, whereas Fig. 3b displays their reconstructed copies.
In this case, the quality of image reconstruction to the initial sharp images, estimated by criterion (10), was equal to μ[ε] ± σ[ε] = (0.53 ± 0.13)%, where μ[ ] is the mathematical expectation, and σ[ ] is the standard deviation of the reconstruction error ε estimated from ten images.
When criterion (10) is integrated only over the region occupied by clouds, the accuracy is equal to μ[ε] ± σ[ε] = (1.6 ± 0.45)%. At the same time, the difference between the complete image and the image in the form of mathematical expectation displayed in Fig. 2a was μ[ε] ± σ[ε] = (11.8 ± 2.5)%. If only overcast fragments of video images were replaced by their average values, then μ[ε]±σ[ε] = (12.1 ± 1.5)%.
The second run of experiments corresponds to the case in which the KL basis was reconstructed from images with clouds. At the first step of iteration process of basis construction, the overcast fragments of video images were replaced by the values of brightness averaged over unshadowed fragments of corresponding images.
The spectrum of eigenvalues of the basis of the first approximation is shown in Fig. 1a (curve 2), whereas Fig. 1b (curve 2) shows the quality of approximation of observation ensemble in this basis. The quality of reconstruction of ten images in this case was μ[ε] ± σ[ε] = (2.1±0.6)%, and upon integrating Eq. (10) over the cloud area, it was μ[ε] ± σ[ε] = (6.5 ± 2.0)%.
Figure 2b shows the estimated mathematical expectation and the first three basis functions corresponding to this case. Figures 4a and b show four images with clouds and their reconstructed copies, respectively. Then in the moving regime of reconstruction, when the next basis image is reconstructed in the first approximation basis, all basis images were reconstructed.
Once the realizations had been reconstructed, the KL basis of the second approximation was constructed. The spectrum of eigenvalues of this basis is shown in Fig. 1a (curve 3), whereas the approximation error in this basis is shown in Fig. 1b (curve 3). The behavior of the curves is indicative of the increasing role of the first basis functions and eigenvalues. The quality of ten images being reconstructed in this basis has increased, and μ[ε]±σ[ε] = (0.96 ± 0.36)%. In this case, the modified quality criterion mentioned above was μ[ε] ± σ[ε] = (2.97 ± 1.1)%. Preliminary experiments on reconstruction of video images demonstrate high efficiency of the proposed method.
I would like to express my deep gratitude to Dr. V.V. Belov for his support of this work and to V.I. Khamarin, Senior Scientific Worker of the Institute of Ecology of Natural Complexes, for satellite photographs kindly placed at my disposal.
1. S.A. Aivazyan, et al., Applied Statistics: Principles of Modeling and Primary Processing of Data (Financy i Statistika, Moscow, 1983), 471 pp.
2. R.J.A. Little and D.B. Rubin, Statistical Analysis of Incomplete Data [Russian translation] (Financy i Statistika, Moscow, 1990), 336 pp.
3. H.L. Van Trees, Estimation and Modulation Theory. Part I. Detection, Estimation, and Linear Modulation Theory (Willey, New York, 1968).
4. K.T. Protasov, Atm. Opt. 3, No. 1, 42–46 (1990).
5. V.A. Vittikh, V.V. Sergeev, and V.A. Soifer, Image Processing in Automated Systems for Scientific Researches (Nauka, Moscow, 1982).
6. V.A. Morozov and V.V. Pospelov, Digital Processing of Signals. Texts of Lectures, O.B. Arushanyan, ed. (Moscow State University Publishing House, Moscow, 1986), 81 pp.
|
<urn:uuid:5c45ced1-51d6-4a54-b951-a2adcf623875>
|
CC-MAIN-2021-43
|
https://ao-pv.iao.ru/en/content/text?vol=8&issue=10&num=11
|
2021-10-27T00:40:35+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00087-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 181,275,573
| 3,734
|
eng_Latn
|
eng_Latn
| 0.975033
|
eng_Latn
| 0.988984
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4056,
8394,
12131,
12241,
16143
] |
Institute of Atmospheric Optics, Siberian Branch of the Russian Academy of Sciences Received June 2, 1995
An algorithm for reconstructing overcast fragments of aerospace images of the Earth's surface has been proposed. It is based on a statistical approach to completing skipped components of the observation vector. Some examples of reconstruction of video images have been given with a sample of images of preceding statistically homogeneous observations.
Well known are the problems connected with the analysis of aerospace video images produced when some regions of the Earth's surface are shadowed by fog or cloud fragments of high optical density. In this case, standard methods of image restoration using, for example, linear model describing the process of image transfer through dense scattering media and having the form of functional of convolution of the sought–after image with the point spread function give no way to obtain results of any value.
At the same time, in mathematical statistics, 1,2 the apparatus has been developed for reconstructing skipped components and formulating decision rules of statistical inference in observations of incomplete vector data. Methods for reconstructing skipper values are based on the use of information coded in interconnections between the vector components of the data being observed, i.e., on the context of interrelations. Therefore, for a solution of the aforementioned problem, the methods based on estimating the unknown parameters of statistical models are widely used. 2
Thus, for example, in order to reconstruct defect rows of raster images and to represent them efficiently, the filtration algorithms are used. 5 The linear models of data description in bases of linearly independent functions (in the simplest case it may be the Fourier trigonometric basis used for restoration of archive photographs 6 ) offer reconstructing properties.
Although from the theoretical viewpoint the choice of a system of basis function is not crucial for a solution of the problem of reconstructing the skipped values, taking into account multidimensionality of video mages and instability of a solution of the system of linear equations whose dimensionality is determined by the number of functions of basis space, it becomes clear that progress in the problem solution is completely governed by the approximating properties of the basis chosen to describe the observed ensemble of images by relatively small number of basis functions.
In general let us consider a problem of reconstruction of fragments of vector fields modeling multicomponent aerospace images. We assume that the random vector field ξ ( u )=( ξ 1 ( u ), ..., ξ s ( u )) T of vector argument u = ( u 1 ,..., u ν ) T (where s and ν are the dimensionality of the vector function ξ ( ⋅ ) and of vector argument respectively, and T denotes transposition), centered about mathematical expectation μ ( u ), is represented in its domain of definition
where {u i a } and {u i b } are the boundaries of multidimensional square, by a set of N realizations ξ 1(u), ..., ξ N(u).
With regard for restrictions imposed onto the field that were introduced in Refs. 3 and 4 and hold true for physically realizable fields, the orthonormal basis can be constructed in the space of process realizations, and the vector field can be represented as follows:
where the limit is understood as convergence in the rms sense, {Φ i(u)} 1 k are the non–random basis vector functions of vector argument. The random coefficients {X i } k 1 are determined from conditions of minimum standard deviation
where M denotes the mathematical expectation operator, é⋅é denotes the Euclidean norm in the space of observations, and k is the number of chosen basis functions. If the condition of orthonormality
is imposed onto the basis functions {Φ i(u)} 1 k ,where δ ij(i, j = 1, ..., k) is the Kronecker symbol, d ν u = du 1× ... ×du ν , and (., .) denotes the scalar product, the representation coefficients { X i } k 1 that minimize Eq. (2) have the form
Let us now assume that the next realization being observed has skipped values in some connected subsets of the domain D. These skipped values are due to shadowing effect of broken cloudiness. Let us denote a set of all fragments of the domain D with indefinite realizations ξ(u) by E, where E ⊂ D.
It should be noted that the rms error ε 2 k (see Eq. (2)) of representation of this incomplete realization(using statistical terms of Ref. 1 and 2) is uncertain, since ξ(u) has unknown values in the domain E ⊂ D, whereas the basis functions {Φ i(u)} k 1 are defined everywhere over the domain D.
The idea of reconstructing the skipped values is to complement realization ξ(u) in E in any way and to find the coefficients {X i } k 1 that minimize ε 2 k . In connection with the aforesaid, let us complement the uncertain realizations ξ(u) in the domain E by a linear combination of some (thus far unknown) coefficients and basis functions {Φ i(u)} k 1 . It is natural to choose the coefficient of model (1) as unknown coefficients of these linear combinations. In other words, we introduce a modified realization of the following form:
and the complement ∑ X j Φ j(u) of realization ξ(u) in a shadowed region does not increase the error ε k 2 , because it enters into both terms of the difference in Eq. (2).
Let us now write down expression (4) for the representation coefficients dividing the domain D of integration into non–intersecting subdomain D\E, in which the modified observation ζ(u) has the form of true observation ξ(u), and subdomain E, where ζ(u)
has the form of approximation ∑ X j Φ j(u) of the field to be reconstructed in E . Then expression X i for coefficients (4) comprises the following components:
Now we introduce the designations
x = (X 1 ... X k ) T , and I = diag(1, ..., 1) (the unit k×k matrix).
Then from Eq. (6) we obtain the equation for unknown components of vector x, namely,
Solving it by any method, we find the desired coefficients {X i } k 1 . These coefficients can be used for reconstruction of the realization ξ(u) being observed using either model (1) or modified realization of Eq. (5) only for shadowed regions.
It should be noted that the basis {Φ i(u)} k 1 of orthonormal functions was taken arbitrarily, but the quality of approximation and the accuracy of reconstruction will be much higher for the Karhunen– Loeve (KL) basis best suited for description a random process in the sense of the rms error, which ensures the minimum approximation error 3,4 ε 2 k as compared with other bases for fixed number k of basis functions.
An algorithm for constructing such a basis and other adaptive bases from a sample of complete realizations ξ 1(u), ..., ξ N(u) was described in detail in Ref. 4. Let us consider the problems of construction of such a basis from incomplete realizations ξ 1(u), ..., ξ N(u) in subdomains E1, ..., EN, respectively, of the domain D.
At the first step, we choose a certain basis {Ψ i(u)} k 1 and, after complement of realizations as described above, obtain a corrected set of images {ζ 0 i ( u )} N 1 , in which the skipped realization ξ 1(u), ..., ξ N(u) of overcast fragments of video images E1, ..., EN have been complemented by modifications (5). Having the reconstructed data of zero approximation {ζ 0 i ( u )} N 1 at hand, we can construct the KL basis of the first approximation {Φ 1 i(u)} k 1 , and on this basis solve the problem of reconstruction of realizations of the basis sample for model (5).
To eliminate degeneracy of matrix A in Eq. (7), which results in singular solutions, a moving regime of correction and construction of basis should be used, that is, when reconstructing the ith realization ξ i(u), its modified analog should be excluded from the sample {ζ 0 i ( u
|
)} N 1 and the KL basis of the first approximation {Φ 1 i(u)} k 1 should be constructed from the sample ζ 0 1 ( u ), ...
|
, ζ 0 i$1 ( u ), ζ 0 i+1 ( u ), ..., ζ 0 N ( u ) of size N – 1, where i = 1, ..., N.
Having thus reconstructed each of {ξ i(u)} N 1 images and obtained their modifications {ζ 1 i ( u )}, we construct the basis of the second approximation {Φ 2 i ( u )} k 1 from these data.
Continuing this iterative process of construction of the next basis and reconstruction of realizations, we finally obtain at the mth step a set of basis functions
{Φ m i ( u )} k 1 , that can be used to correct ultimately the images {ξ i(u)} N 1 , converting them in a set { ζ m i ( u )} N 1 with the rms error of approximation
An increment to the error at the next step of iteration serves as a criterion for termination of this process, and when ε k(m – 1) – ε k(m) ≤ε, where ε is a preset parameter, the process of basis correction is terminated, and the obtained basis {Φ m i ( u )} k 1 is used for reconstruction of newly recorded video images.
In the rms sense convergence of the above– described procedure of reconstruction of basis and realizations follows from convergence of monotonically decreasing finite sequences.
It should be noted that to solve the problem of reconstruction of overcasted fragments of video images, for construction of adaptive bases 4 it is natural to use the a priori information in the form of:
– landscape maps of ground reflectivity that can be used to form model images of underlying surface of a chosen region,
– statistics of microwave satellite images recorded with superhigh resolution, from which the optical images scaled to the images being observed can be synthesized,
– samples of satellite images recorded at stations of routine survey at stages of preliminary observations with regard to seasonal stationarity of situation.
Just the last case is presented as an example of operation of an algorithm. We consider the simplified geometry of satellite observations without regard for cloud shadow, adjacency effect, sun elevation, and other interfering effects believing that their influence during the period of data accumulation does not disturb statistical homogeneity of observations.
To illustrate the operation of the algorithm for reconstructing overcast fragments of video images, linearly independent realizations of images were formed. As a basis for collecting image statistics, three satellite photographs taken from onboard the Resurs satellite were chosen in the following wavelength ranges: 0.5–0.6 μm (channel I), 0.6–0.7 μm (channel II), and 0.8–0.9 μm (channel III). They were digitized by 256 brightness levels.
Fragments of images of 256×256 pixels, denoted by ξ 1(x, y), ξ 2(x, y), and ξ 3(x, y) for each wavelength range, served as initial information to collect statistics of images. The next model image ξ(x, y) of the sampling ensemble was formed using a linear combination of three initial images, namely,
where α, β, and γ were set by a random-number generator. They obeyed uniform distribution and normalization condition α + β + γ = 1.
To collect statistics of linearly independent images, we used the nonlinear transformation of equalization in Eq. (9). The sample of 25 images was thus obtained, which modeled the results of satellite observations at a station of routine survey of the same region of the Earth's surface.
As model clouds, plane fragments bounded by ellipses with random center positions, orientation, and lengths of axes were taken. On average, 10.5% of total area was shadowed by these clouds. As a criterion of image reconstruction quality, the following quadratic integral criterion
was chosen. Here, ξ(x, y) is the initial sharp (complete) image, ^ ξ(x, y) is the image reconstructed from ξ 0(x, y), and ξ 0(x, y) is the overcast image ξ(x, y).
The first run of experiments used the KL basis constructed from a sample of 12 complete images. Approximating properties of the KL basis so obtained are characterized by the spectrum of the eigenvalues shown in Fig. 1a (curve 1), where λ determine the contribution from each basis function to the generalized variance. Figure 1b (curve 1) shows the error of approximation of an ensemble of realization by a set of basis functions.
FIG. 2. Mathematical expectation (ME) and the first three functions of the KL basis (1, 2, and 3).
FIG. 3.
The mathematical expectation estimated from the sample and the first three basis functions (in the form of images) of the KL basis obtained in this experiment are illustrated by Fig. 2a.
Then the problem of reconstruction of ten images with cloud fragments was solved with the use of the basis so constructed. Figure 3a illustrates four of these images with clouds, whereas Fig. 3b displays their reconstructed copies.
In this case, the quality of image reconstruction to the initial sharp images, estimated by criterion (10), was equal to μ[ε] ± σ[ε] = (0.53 ± 0.13)%, where μ[ ] is the mathematical expectation, and σ[ ] is the standard deviation of the reconstruction error ε estimated from ten images.
When criterion (10) is integrated only over the region occupied by clouds, the accuracy is equal to μ[ε] ± σ[ε] = (1.6 ± 0.45)%. At the same time, the difference between the complete image and the image in the form of mathematical expectation displayed in Fig. 2a was μ[ε] ± σ[ε] = (11.8 ± 2.5)%. If only overcast fragments of video images were replaced by their average values, then μ[ε]±σ[ε] = (12.1 ± 1.5)%.
The second run of experiments corresponds to the case in which the KL basis was reconstructed from images with clouds. At the first step of iteration process of basis construction, the overcast fragments of video images were replaced by the values of brightness averaged over unshadowed fragments of corresponding images.
The spectrum of eigenvalues of the basis of the first approximation is shown in Fig. 1a (curve 2), whereas Fig. 1b (curve 2) shows the quality of approximation of observation ensemble in this basis. The quality of reconstruction of ten images in this case was μ[ε] ± σ[ε] = (2.1±0.6)%, and upon integrating Eq. (10) over the cloud area, it was μ[ε] ± σ[ε] = (6.5 ± 2.0)%.
Figure 2b shows the estimated mathematical expectation and the first three basis functions corresponding to this case. Figures 4a and b show four images with clouds and their reconstructed copies, respectively. Then in the moving regime of reconstruction, when the next basis image is reconstructed in the first approximation basis, all basis images were reconstructed.
Once the realizations had been reconstructed, the KL basis of the second approximation was constructed. The spectrum of eigenvalues of this basis is shown in Fig. 1a (curve 3), whereas the approximation error in this basis is shown in Fig. 1b (curve 3). The behavior of the curves is indicative of the increasing role of the first basis functions and eigenvalues. The quality of ten images being reconstructed in this basis has increased, and μ[ε]±σ[ε] = (0.96 ± 0.36)%. In this case, the modified quality criterion mentioned above was μ[ε] ± σ[ε] = (2.97 ± 1.1)%. Preliminary experiments on reconstruction of video images demonstrate high efficiency of the proposed method.
I would like to express my deep gratitude to Dr. V.V. Belov for his support of this work and to V.I. Khamarin, Senior Scientific Worker of the Institute of Ecology of Natural Complexes, for satellite photographs kindly placed at my disposal.
1. S.A. Aivazyan, et al., Applied Statistics: Principles of Modeling and Primary Processing of Data (Financy i Statistika, Moscow, 1983), 471 pp.
2. R.J.A. Little and D.B. Rubin, Statistical Analysis of Incomplete Data [Russian translation] (Financy i Statistika, Moscow, 1990), 336 pp.
3. H.L. Van Trees, Estimation and Modulation Theory. Part I. Detection, Estimation, and Linear Modulation Theory (Willey, New York, 1968).
4. K.T. Protasov, Atm. Opt. 3, No. 1, 42–46 (1990).
5. V.A. Vittikh, V.V. Sergeev, and V.A. Soifer, Image Processing in Automated Systems for Scientific Researches (Nauka, Moscow, 1982).
6. V.A. Morozov and V.V. Pospelov, Digital Processing of Signals. Texts of Lectures, O.B. Arushanyan, ed. (Moscow State University Publishing House, Moscow, 1986), 81 pp.
| 7,837
|
inside_word
|
)}
|
remove_one_sentence
|
<url>
https://ao-pv.iao.ru/en/content/text?vol=8&issue=10&num=11
</url>
<text>
Institute of Atmospheric Optics, Siberian Branch of the Russian Academy of Sciences Received June 2, 1995
An algorithm for reconstructing overcast fragments of aerospace images of the Earth's surface has been proposed. It is based on a statistical approach to completing skipped components of the observation vector. Some examples of reconstruction of video images have been given with a sample of images of preceding statistically homogeneous observations.
Well known are the problems connected with the analysis of aerospace video images produced when some regions of the Earth's surface are shadowed by fog or cloud fragments of high optical density. In this case, standard methods of image restoration using, for example, linear model describing the process of image transfer through dense scattering media and having the form of functional of convolution of the sought–after image with the point spread function give no way to obtain results of any value.
At the same time, in mathematical statistics, 1,2 the apparatus has been developed for reconstructing skipped components and formulating decision rules of statistical inference in observations of incomplete vector data. Methods for reconstructing skipper values are based on the use of information coded in interconnections between the vector components of the data being observed, i.e., on the context of interrelations. Therefore, for a solution of the aforementioned problem, the methods based on estimating the unknown parameters of statistical models are widely used. 2
Thus, for example, in order to reconstruct defect rows of raster images and to represent them efficiently, the filtration algorithms are used. 5 The linear models of data description in bases of linearly independent functions (in the simplest case it may be the Fourier trigonometric basis used for restoration of archive photographs 6 ) offer reconstructing properties.
Although from the theoretical viewpoint the choice of a system of basis function is not crucial for a solution of the problem of reconstructing the skipped values, taking into account multidimensionality of video mages and instability of a solution of the system of linear equations whose dimensionality is determined by the number of functions of basis space, it becomes clear that progress in the problem solution is completely governed by the approximating properties of the basis chosen to describe the observed ensemble of images by relatively small number of basis functions.
In general let us consider a problem of reconstruction of fragments of vector fields modeling multicomponent aerospace images. We assume that the random vector field ξ ( u )=( ξ 1 ( u ), ..., ξ s ( u )) T of vector argument u = ( u 1 ,..., u ν ) T (where s and ν are the dimensionality of the vector function ξ ( ⋅ ) and of vector argument respectively, and T denotes transposition), centered about mathematical expectation μ ( u ), is represented in its domain of definition
where {u i a } and {u i b } are the boundaries of multidimensional square, by a set of N realizations ξ 1(u), ..., ξ N(u).
With regard for restrictions imposed onto the field that were introduced in Refs. 3 and 4 and hold true for physically realizable fields, the orthonormal basis can be constructed in the space of process realizations, and the vector field can be represented as follows:
where the limit is understood as convergence in the rms sense, {Φ i(u)} 1 k are the non–random basis vector functions of vector argument. The random coefficients {X i } k 1 are determined from conditions of minimum standard deviation
where M denotes the mathematical expectation operator, é⋅é denotes the Euclidean norm in the space of observations, and k is the number of chosen basis functions. If the condition of orthonormality
is imposed onto the basis functions {Φ i(u)} 1 k ,where δ ij(i, j = 1, ..., k) is the Kronecker symbol, d ν u = du 1× ... ×du ν , and (., .) denotes the scalar product, the representation coefficients { X i } k 1 that minimize Eq. (2) have the form
Let us now assume that the next realization being observed has skipped values in some connected subsets of the domain D. These skipped values are due to shadowing effect of broken cloudiness. Let us denote a set of all fragments of the domain D with indefinite realizations ξ(u) by E, where E ⊂ D.
It should be noted that the rms error ε 2 k (see Eq. (2)) of representation of this incomplete realization(using statistical terms of Ref. 1 and 2) is uncertain, since ξ(u) has unknown values in the domain E ⊂ D, whereas the basis functions {Φ i(u)} k 1 are defined everywhere over the domain D.
The idea of reconstructing the skipped values is to complement realization ξ(u) in E in any way and to find the coefficients {X i } k 1 that minimize ε 2 k . In connection with the aforesaid, let us complement the uncertain realizations ξ(u) in the domain E by a linear combination of some (thus far unknown) coefficients and basis functions {Φ i(u)} k 1 . It is natural to choose the coefficient of model (1) as unknown coefficients of these linear combinations. In other words, we introduce a modified realization of the following form:
and the complement ∑ X j Φ j(u) of realization ξ(u) in a shadowed region does not increase the error ε k 2 , because it enters into both terms of the difference in Eq. (2).
Let us now write down expression (4) for the representation coefficients dividing the domain D of integration into non–intersecting subdomain D\E, in which the modified observation ζ(u) has the form of true observation ξ(u), and subdomain E, where ζ(u)
has the form of approximation ∑ X j Φ j(u) of the field to be reconstructed in E . Then expression X i for coefficients (4) comprises the following components:
Now we introduce the designations
x = (X 1 ... X k ) T , and I = diag(1, ..., 1) (the unit k×k matrix).
Then from Eq. (6) we obtain the equation for unknown components of vector x, namely,
Solving it by any method, we find the desired coefficients {X i } k 1 . These coefficients can be used for reconstruction of the realization ξ(u) being observed using either model (1) or modified realization of Eq. (5) only for shadowed regions.
It should be noted that the basis {Φ i(u)} k 1 of orthonormal functions was taken arbitrarily, but the quality of approximation and the accuracy of reconstruction will be much higher for the Karhunen– Loeve (KL) basis best suited for description a random process in the sense of the rms error, which ensures the minimum approximation error 3,4 ε 2 k as compared with other bases for fixed number k of basis functions.
An algorithm for constructing such a basis and other adaptive bases from a sample of complete realizations ξ 1(u), ..., ξ N(u) was described in detail in Ref. 4. Let us consider the problems of construction of such a basis from incomplete realizations ξ 1(u), ..., ξ N(u) in subdomains E1, ..., EN, respectively, of the domain D.
At the first step, we choose a certain basis {Ψ i(u)} k 1 and, after complement of realizations as described above, obtain a corrected set of images {ζ 0 i ( u )} N 1 , in which the skipped realization ξ 1(u), ..., ξ N(u) of overcast fragments of video images E1, ..., EN have been complemented by modifications (5). Having the reconstructed data of zero approximation {ζ 0 i ( u )} N 1 at hand, we can construct the KL basis of the first approximation {Φ 1 i(u)} k 1 , and on this basis solve the problem of reconstruction of realizations of the basis sample for model (5).
To eliminate degeneracy of matrix A in Eq. (7), which results in singular solutions, a moving regime of correction and construction of basis should be used, that is, when reconstructing the ith realization ξ i(u), its modified analog should be excluded from the sample {ζ 0 i ( u <cursor_is_here>, ζ 0 i$1 ( u ), ζ 0 i+1 ( u ), ..., ζ 0 N ( u ) of size N – 1, where i = 1, ..., N.
Having thus reconstructed each of {ξ i(u)} N 1 images and obtained their modifications {ζ 1 i ( u )}, we construct the basis of the second approximation {Φ 2 i ( u )} k 1 from these data.
Continuing this iterative process of construction of the next basis and reconstruction of realizations, we finally obtain at the mth step a set of basis functions
{Φ m i ( u )} k 1 , that can be used to correct ultimately the images {ξ i(u)} N 1 , converting them in a set { ζ m i ( u )} N 1 with the rms error of approximation
An increment to the error at the next step of iteration serves as a criterion for termination of this process, and when ε k(m – 1) – ε k(m) ≤ε, where ε is a preset parameter, the process of basis correction is terminated, and the obtained basis {Φ m i ( u )} k 1 is used for reconstruction of newly recorded video images.
In the rms sense convergence of the above– described procedure of reconstruction of basis and realizations follows from convergence of monotonically decreasing finite sequences.
It should be noted that to solve the problem of reconstruction of overcasted fragments of video images, for construction of adaptive bases 4 it is natural to use the a priori information in the form of:
– landscape maps of ground reflectivity that can be used to form model images of underlying surface of a chosen region,
– statistics of microwave satellite images recorded with superhigh resolution, from which the optical images scaled to the images being observed can be synthesized,
– samples of satellite images recorded at stations of routine survey at stages of preliminary observations with regard to seasonal stationarity of situation.
Just the last case is presented as an example of operation of an algorithm. We consider the simplified geometry of satellite observations without regard for cloud shadow, adjacency effect, sun elevation, and other interfering effects believing that their influence during the period of data accumulation does not disturb statistical homogeneity of observations.
To illustrate the operation of the algorithm for reconstructing overcast fragments of video images, linearly independent realizations of images were formed. As a basis for collecting image statistics, three satellite photographs taken from onboard the Resurs satellite were chosen in the following wavelength ranges: 0.5–0.6 μm (channel I), 0.6–0.7 μm (channel II), and 0.8–0.9 μm (channel III). They were digitized by 256 brightness levels.
Fragments of images of 256×256 pixels, denoted by ξ 1(x, y), ξ 2(x, y), and ξ 3(x, y) for each wavelength range, served as initial information to collect statistics of images. The next model image ξ(x, y) of the sampling ensemble was formed using a linear combination of three initial images, namely,
where α, β, and γ were set by a random-number generator. They obeyed uniform distribution and normalization condition α + β + γ = 1.
To collect statistics of linearly independent images, we used the nonlinear transformation of equalization in Eq. (9). The sample of 25 images was thus obtained, which modeled the results of satellite observations at a station of routine survey of the same region of the Earth's surface.
As model clouds, plane fragments bounded by ellipses with random center positions, orientation, and lengths of axes were taken. On average, 10.5% of total area was shadowed by these clouds. As a criterion of image reconstruction quality, the following quadratic integral criterion
was chosen. Here, ξ(x, y) is the initial sharp (complete) image, ^ ξ(x, y) is the image reconstructed from ξ 0(x, y), and ξ 0(x, y) is the overcast image ξ(x, y).
The first run of experiments used the KL basis constructed from a sample of 12 complete images. Approximating properties of the KL basis so obtained are characterized by the spectrum of the eigenvalues shown in Fig. 1a (curve 1), where λ determine the contribution from each basis function to the generalized variance. Figure 1b (curve 1) shows the error of approximation of an ensemble of realization by a set of basis functions.
FIG. 2. Mathematical expectation (ME) and the first three functions of the KL basis (1, 2, and 3).
FIG. 3.
The mathematical expectation estimated from the sample and the first three basis functions (in the form of images) of the KL basis obtained in this experiment are illustrated by Fig. 2a.
Then the problem of reconstruction of ten images with cloud fragments was solved with the use of the basis so constructed. Figure 3a illustrates four of these images with clouds, whereas Fig. 3b displays their reconstructed copies.
In this case, the quality of image reconstruction to the initial sharp images, estimated by criterion (10), was equal to μ[ε] ± σ[ε] = (0.53 ± 0.13)%, where μ[ ] is the mathematical expectation, and σ[ ] is the standard deviation of the reconstruction error ε estimated from ten images.
When criterion (10) is integrated only over the region occupied by clouds, the accuracy is equal to μ[ε] ± σ[ε] = (1.6 ± 0.45)%. At the same time, the difference between the complete image and the image in the form of mathematical expectation displayed in Fig. 2a was μ[ε] ± σ[ε] = (11.8 ± 2.5)%. If only overcast fragments of video images were replaced by their average values, then μ[ε]±σ[ε] = (12.1 ± 1.5)%.
The second run of experiments corresponds to the case in which the KL basis was reconstructed from images with clouds. At the first step of iteration process of basis construction, the overcast fragments of video images were replaced by the values of brightness averaged over unshadowed fragments of corresponding images.
The spectrum of eigenvalues of the basis of the first approximation is shown in Fig. 1a (curve 2), whereas Fig. 1b (curve 2) shows the quality of approximation of observation ensemble in this basis. The quality of reconstruction of ten images in this case was μ[ε] ± σ[ε] = (2.1±0.6)%, and upon integrating Eq. (10) over the cloud area, it was μ[ε] ± σ[ε] = (6.5 ± 2.0)%.
Figure 2b shows the estimated mathematical expectation and the first three basis functions corresponding to this case. Figures 4a and b show four images with clouds and their reconstructed copies, respectively. Then in the moving regime of reconstruction, when the next basis image is reconstructed in the first approximation basis, all basis images were reconstructed.
Once the realizations had been reconstructed, the KL basis of the second approximation was constructed. The spectrum of eigenvalues of this basis is shown in Fig. 1a (curve 3), whereas the approximation error in this basis is shown in Fig. 1b (curve 3). The behavior of the curves is indicative of the increasing role of the first basis functions and eigenvalues. The quality of ten images being reconstructed in this basis has increased, and μ[ε]±σ[ε] = (0.96 ± 0.36)%. In this case, the modified quality criterion mentioned above was μ[ε] ± σ[ε] = (2.97 ± 1.1)%. Preliminary experiments on reconstruction of video images demonstrate high efficiency of the proposed method.
I would like to express my deep gratitude to Dr. V.V. Belov for his support of this work and to V.I. Khamarin, Senior Scientific Worker of the Institute of Ecology of Natural Complexes, for satellite photographs kindly placed at my disposal.
1. S.A. Aivazyan, et al., Applied Statistics: Principles of Modeling and Primary Processing of Data (Financy i Statistika, Moscow, 1983), 471 pp.
2. R.J.A. Little and D.B. Rubin, Statistical Analysis of Incomplete Data [Russian translation] (Financy i Statistika, Moscow, 1990), 336 pp.
3. H.L. Van Trees, Estimation and Modulation Theory. Part I. Detection, Estimation, and Linear Modulation Theory (Willey, New York, 1968).
4. K.T. Protasov, Atm. Opt. 3, No. 1, 42–46 (1990).
5. V.A. Vittikh, V.V. Sergeev, and V.A. Soifer, Image Processing in Automated Systems for Scientific Researches (Nauka, Moscow, 1982).
6. V.A. Morozov and V.V. Pospelov, Digital Processing of Signals. Texts of Lectures, O.B. Arushanyan, ed. (Moscow State University Publishing House, Moscow, 1986), 81 pp.
</text>
|
[
{
"content": "<url>\nhttps://ao-pv.iao.ru/en/content/text?vol=8&issue=10&num=11\n</url>\n<text>\nInstitute of Atmospheric Optics, Siberian Branch of the Russian Academy of Sciences Received June 2, 1995\n\nAn algorithm for reconstructing overcast fragments of aerospace images of the Earth's surface has been proposed. It is based on a statistical approach to completing skipped components of the observation vector. Some examples of reconstruction of video images have been given with a sample of images of preceding statistically homogeneous observations.\n\nWell known are the problems connected with the analysis of aerospace video images produced when some regions of the Earth's surface are shadowed by fog or cloud fragments of high optical density. In this case, standard methods of image restoration using, for example, linear model describing the process of image transfer through dense scattering media and having the form of functional of convolution of the sought–after image with the point spread function give no way to obtain results of any value.\n\nAt the same time, in mathematical statistics, 1,2 the apparatus has been developed for reconstructing skipped components and formulating decision rules of statistical inference in observations of incomplete vector data. Methods for reconstructing skipper values are based on the use of information coded in interconnections between the vector components of the data being observed, i.e., on the context of interrelations. Therefore, for a solution of the aforementioned problem, the methods based on estimating the unknown parameters of statistical models are widely used. 2\n\nThus, for example, in order to reconstruct defect rows of raster images and to represent them efficiently, the filtration algorithms are used. 5 The linear models of data description in bases of linearly independent functions (in the simplest case it may be the Fourier trigonometric basis used for restoration of archive photographs 6 ) offer reconstructing properties.\n\nAlthough from the theoretical viewpoint the choice of a system of basis function is not crucial for a solution of the problem of reconstructing the skipped values, taking into account multidimensionality of video mages and instability of a solution of the system of linear equations whose dimensionality is determined by the number of functions of basis space, it becomes clear that progress in the problem solution is completely governed by the approximating properties of the basis chosen to describe the observed ensemble of images by relatively small number of basis functions.\n\nIn general let us consider a problem of reconstruction of fragments of vector fields modeling multicomponent aerospace images. We assume that the random vector field ξ ( u )=( ξ 1 ( u ), ..., ξ s ( u )) T of vector argument u = ( u 1 ,..., u ν ) T (where s and ν are the dimensionality of the vector function ξ ( ⋅ ) and of vector argument respectively, and T denotes transposition), centered about mathematical expectation μ ( u ), is represented in its domain of definition\n\nwhere {u i a } and {u i b } are the boundaries of multidimensional square, by a set of N realizations ξ 1(u), ..., ξ N(u).\n\nWith regard for restrictions imposed onto the field that were introduced in Refs. 3 and 4 and hold true for physically realizable fields, the orthonormal basis can be constructed in the space of process realizations, and the vector field can be represented as follows:\n\nwhere the limit is understood as convergence in the rms sense, {Φ i(u)} 1 k are the non–random basis vector functions of vector argument. The random coefficients {X i } k 1 are determined from conditions of minimum standard deviation\n\nwhere M denotes the mathematical expectation operator, é⋅é denotes the Euclidean norm in the space of observations, and k is the number of chosen basis functions. If the condition of orthonormality\n\nis imposed onto the basis functions {Φ i(u)} 1 k ,where δ ij(i, j = 1, ..., k) is the Kronecker symbol, d ν u = du 1× ... ×du ν , and (., .) denotes the scalar product, the representation coefficients { X i } k 1 that minimize Eq. (2) have the form\n\nLet us now assume that the next realization being observed has skipped values in some connected subsets of the domain D. These skipped values are due to shadowing effect of broken cloudiness. Let us denote a set of all fragments of the domain D with indefinite realizations ξ(u) by E, where E ⊂ D.\n\nIt should be noted that the rms error ε 2 k (see Eq. (2)) of representation of this incomplete realization(using statistical terms of Ref. 1 and 2) is uncertain, since ξ(u) has unknown values in the domain E ⊂ D, whereas the basis functions {Φ i(u)} k 1 are defined everywhere over the domain D.\n\nThe idea of reconstructing the skipped values is to complement realization ξ(u) in E in any way and to find the coefficients {X i } k 1 that minimize ε 2 k . In connection with the aforesaid, let us complement the uncertain realizations ξ(u) in the domain E by a linear combination of some (thus far unknown) coefficients and basis functions {Φ i(u)} k 1 . It is natural to choose the coefficient of model (1) as unknown coefficients of these linear combinations. In other words, we introduce a modified realization of the following form:\n\nand the complement ∑ X j Φ j(u) of realization ξ(u) in a shadowed region does not increase the error ε k 2 , because it enters into both terms of the difference in Eq. (2).\n\nLet us now write down expression (4) for the representation coefficients dividing the domain D of integration into non–intersecting subdomain D\\E, in which the modified observation ζ(u) has the form of true observation ξ(u), and subdomain E, where ζ(u)\n\nhas the form of approximation ∑ X j Φ j(u) of the field to be reconstructed in E . Then expression X i for coefficients (4) comprises the following components:\n\nNow we introduce the designations\n\nx = (X 1 ... X k ) T , and I = diag(1, ..., 1) (the unit k×k matrix).\n\nThen from Eq. (6) we obtain the equation for unknown components of vector x, namely,\n\nSolving it by any method, we find the desired coefficients {X i } k 1 . These coefficients can be used for reconstruction of the realization ξ(u) being observed using either model (1) or modified realization of Eq. (5) only for shadowed regions.\n\nIt should be noted that the basis {Φ i(u)} k 1 of orthonormal functions was taken arbitrarily, but the quality of approximation and the accuracy of reconstruction will be much higher for the Karhunen– Loeve (KL) basis best suited for description a random process in the sense of the rms error, which ensures the minimum approximation error 3,4 ε 2 k as compared with other bases for fixed number k of basis functions.\n\nAn algorithm for constructing such a basis and other adaptive bases from a sample of complete realizations ξ 1(u), ..., ξ N(u) was described in detail in Ref. 4. Let us consider the problems of construction of such a basis from incomplete realizations ξ 1(u), ..., ξ N(u) in subdomains E1, ..., EN, respectively, of the domain D.\n\nAt the first step, we choose a certain basis {Ψ i(u)} k 1 and, after complement of realizations as described above, obtain a corrected set of images {ζ 0 i ( u )} N 1 , in which the skipped realization ξ 1(u), ..., ξ N(u) of overcast fragments of video images E1, ..., EN have been complemented by modifications (5). Having the reconstructed data of zero approximation {ζ 0 i ( u )} N 1 at hand, we can construct the KL basis of the first approximation {Φ 1 i(u)} k 1 , and on this basis solve the problem of reconstruction of realizations of the basis sample for model (5).\n\nTo eliminate degeneracy of matrix A in Eq. (7), which results in singular solutions, a moving regime of correction and construction of basis should be used, that is, when reconstructing the ith realization ξ i(u), its modified analog should be excluded from the sample {ζ 0 i ( u <cursor_is_here>, ζ 0 i$1 ( u ), ζ 0 i+1 ( u ), ..., ζ 0 N ( u ) of size N – 1, where i = 1, ..., N.\n\nHaving thus reconstructed each of {ξ i(u)} N 1 images and obtained their modifications {ζ 1 i ( u )}, we construct the basis of the second approximation {Φ 2 i ( u )} k 1 from these data.\n\nContinuing this iterative process of construction of the next basis and reconstruction of realizations, we finally obtain at the mth step a set of basis functions\n\n{Φ m i ( u )} k 1 , that can be used to correct ultimately the images {ξ i(u)} N 1 , converting them in a set { ζ m i ( u )} N 1 with the rms error of approximation\n\nAn increment to the error at the next step of iteration serves as a criterion for termination of this process, and when ε k(m – 1) – ε k(m) ≤ε, where ε is a preset parameter, the process of basis correction is terminated, and the obtained basis {Φ m i ( u )} k 1 is used for reconstruction of newly recorded video images.\n\nIn the rms sense convergence of the above– described procedure of reconstruction of basis and realizations follows from convergence of monotonically decreasing finite sequences.\n\nIt should be noted that to solve the problem of reconstruction of overcasted fragments of video images, for construction of adaptive bases 4 it is natural to use the a priori information in the form of:\n\n– landscape maps of ground reflectivity that can be used to form model images of underlying surface of a chosen region,\n\n– statistics of microwave satellite images recorded with superhigh resolution, from which the optical images scaled to the images being observed can be synthesized,\n\n– samples of satellite images recorded at stations of routine survey at stages of preliminary observations with regard to seasonal stationarity of situation.\n\nJust the last case is presented as an example of operation of an algorithm. We consider the simplified geometry of satellite observations without regard for cloud shadow, adjacency effect, sun elevation, and other interfering effects believing that their influence during the period of data accumulation does not disturb statistical homogeneity of observations.\n\nTo illustrate the operation of the algorithm for reconstructing overcast fragments of video images, linearly independent realizations of images were formed. As a basis for collecting image statistics, three satellite photographs taken from onboard the Resurs satellite were chosen in the following wavelength ranges: 0.5–0.6 μm (channel I), 0.6–0.7 μm (channel II), and 0.8–0.9 μm (channel III). They were digitized by 256 brightness levels.\n\nFragments of images of 256×256 pixels, denoted by ξ 1(x, y), ξ 2(x, y), and ξ 3(x, y) for each wavelength range, served as initial information to collect statistics of images. The next model image ξ(x, y) of the sampling ensemble was formed using a linear combination of three initial images, namely,\n\nwhere α, β, and γ were set by a random-number generator. They obeyed uniform distribution and normalization condition α + β + γ = 1.\n\nTo collect statistics of linearly independent images, we used the nonlinear transformation of equalization in Eq. (9). The sample of 25 images was thus obtained, which modeled the results of satellite observations at a station of routine survey of the same region of the Earth's surface.\n\nAs model clouds, plane fragments bounded by ellipses with random center positions, orientation, and lengths of axes were taken. On average, 10.5% of total area was shadowed by these clouds. As a criterion of image reconstruction quality, the following quadratic integral criterion\n\nwas chosen. Here, ξ(x, y) is the initial sharp (complete) image, ^ ξ(x, y) is the image reconstructed from ξ 0(x, y), and ξ 0(x, y) is the overcast image ξ(x, y).\n\nThe first run of experiments used the KL basis constructed from a sample of 12 complete images. Approximating properties of the KL basis so obtained are characterized by the spectrum of the eigenvalues shown in Fig. 1a (curve 1), where λ determine the contribution from each basis function to the generalized variance. Figure 1b (curve 1) shows the error of approximation of an ensemble of realization by a set of basis functions.\n\nFIG. 2. Mathematical expectation (ME) and the first three functions of the KL basis (1, 2, and 3).\n\nFIG. 3.\n\nThe mathematical expectation estimated from the sample and the first three basis functions (in the form of images) of the KL basis obtained in this experiment are illustrated by Fig. 2a.\n\nThen the problem of reconstruction of ten images with cloud fragments was solved with the use of the basis so constructed. Figure 3a illustrates four of these images with clouds, whereas Fig. 3b displays their reconstructed copies.\n\nIn this case, the quality of image reconstruction to the initial sharp images, estimated by criterion (10), was equal to μ[ε] ± σ[ε] = (0.53 ± 0.13)%, where μ[ ] is the mathematical expectation, and σ[ ] is the standard deviation of the reconstruction error ε estimated from ten images.\n\nWhen criterion (10) is integrated only over the region occupied by clouds, the accuracy is equal to μ[ε] ± σ[ε] = (1.6 ± 0.45)%. At the same time, the difference between the complete image and the image in the form of mathematical expectation displayed in Fig. 2a was μ[ε] ± σ[ε] = (11.8 ± 2.5)%. If only overcast fragments of video images were replaced by their average values, then μ[ε]±σ[ε] = (12.1 ± 1.5)%.\n\nThe second run of experiments corresponds to the case in which the KL basis was reconstructed from images with clouds. At the first step of iteration process of basis construction, the overcast fragments of video images were replaced by the values of brightness averaged over unshadowed fragments of corresponding images.\n\nThe spectrum of eigenvalues of the basis of the first approximation is shown in Fig. 1a (curve 2), whereas Fig. 1b (curve 2) shows the quality of approximation of observation ensemble in this basis. The quality of reconstruction of ten images in this case was μ[ε] ± σ[ε] = (2.1±0.6)%, and upon integrating Eq. (10) over the cloud area, it was μ[ε] ± σ[ε] = (6.5 ± 2.0)%.\n\nFigure 2b shows the estimated mathematical expectation and the first three basis functions corresponding to this case. Figures 4a and b show four images with clouds and their reconstructed copies, respectively. Then in the moving regime of reconstruction, when the next basis image is reconstructed in the first approximation basis, all basis images were reconstructed.\n\nOnce the realizations had been reconstructed, the KL basis of the second approximation was constructed. The spectrum of eigenvalues of this basis is shown in Fig. 1a (curve 3), whereas the approximation error in this basis is shown in Fig. 1b (curve 3). The behavior of the curves is indicative of the increasing role of the first basis functions and eigenvalues. The quality of ten images being reconstructed in this basis has increased, and μ[ε]±σ[ε] = (0.96 ± 0.36)%. In this case, the modified quality criterion mentioned above was μ[ε] ± σ[ε] = (2.97 ± 1.1)%. Preliminary experiments on reconstruction of video images demonstrate high efficiency of the proposed method.\n\nI would like to express my deep gratitude to Dr. V.V. Belov for his support of this work and to V.I. Khamarin, Senior Scientific Worker of the Institute of Ecology of Natural Complexes, for satellite photographs kindly placed at my disposal.\n\n1. S.A. Aivazyan, et al., Applied Statistics: Principles of Modeling and Primary Processing of Data (Financy i Statistika, Moscow, 1983), 471 pp.\n2. R.J.A. Little and D.B. Rubin, Statistical Analysis of Incomplete Data [Russian translation] (Financy i Statistika, Moscow, 1990), 336 pp.\n3. H.L. Van Trees, Estimation and Modulation Theory. Part I. Detection, Estimation, and Linear Modulation Theory (Willey, New York, 1968).\n4. K.T. Protasov, Atm. Opt. 3, No. 1, 42–46 (1990).\n5. V.A. Vittikh, V.V. Sergeev, and V.A. Soifer, Image Processing in Automated Systems for Scientific Researches (Nauka, Moscow, 1982).\n6. V.A. Morozov and V.V. Pospelov, Digital Processing of Signals. Texts of Lectures, O.B. Arushanyan, ed. (Moscow State University Publishing House, Moscow, 1986), 81 pp.\n</text>\n",
"role": "user"
},
{
"content": ")} N 1 and the KL basis of the first approximation {Φ 1 i(u)} k 1 should be constructed from the sample ζ 0 1 ( u ), ...",
"role": "assistant"
}
] |
SECURITIES AND EXCHANGE COMMISSION
(Release No. 34-55109; File No. SR-NYSEArca-2007-05)
January 16, 2007
Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Regarding a Proposed Combination Between NYSE Group, Inc. and Euronext N.V.
Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934, as amended, ("Exchange Act") 1 and Rule 19b-4 thereunder, 2 notice is hereby given that on January 12, 2007, NYSE Arca, Inc. ("NYSE Arca" or "Exchange") filed with the Securities and Exchange Commission ("Commission") the proposed rule change as described in Items I, II, and III below, which Items have been substantially prepared by the Exchange. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons.
I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change
NYSE Arca is submitting the proposed rule change to the Commission in connection with the proposed business combination (the "Combination") of NYSE Group, Inc., a Delaware corporation ("NYSE Group"), with Euronext N.V., a company organized under the laws of The Netherlands ("Euronext"). As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext, a Delaware corporation ("NYSE Euronext"). The Combination involves certain modifications to the organizational documents of NYSE Group, 3
1 15 U.S.C. 78s(b)(l).
2 17 CFR 240.19b-4.
3 Upon the consummation of the Combination, NYSE Group will be merged with and into Jefferson Merger Sub, Inc. and the name of Jefferson Merger Sub, Inc. will be changed to NYSE Group, Inc. The changes to the NYSE Group organizational documents refer to changes from the current NYSE Group organizational documents. Technically, however, the Amended and Restated Certificate of Incorporation and Amended and Restated
the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.
The text of the proposed rule change and Exhibits 5A through 5H 4 are available at the Exchange, the Commission's Public Reference Room, and www.nysearca.com.
II. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change
In its filing with the Commission, the Exchange included statements concerning the purpose of, and basis for, the proposed rule change. The text of these statements may be
Bylaws of NYSE Group that will be operative upon the consummation of the Combination will be amended and restated forms of the Certificate of Incorporation and Bylaws of Jefferson Merger Sub, Inc.
4 The proposed Amended and Restated Certificate of Incorporation of NYSE Euronext is Exhibit 5A; the proposed Amended and Restated Bylaws of NYSE Euronext are Exhibit 5B; the proposed NYSE Euronext Director Independence Policy, which policy will replace the current NYSE Group Director Independence Policy, is Exhibit 5C; the proposed Amended and Restated Certificate of Incorporation of NYSE Group is Exhibit 5D; the proposed Amended and Restated Bylaws of NYSE Group are Exhibit 5E; the resolutions of the board of directors of NYSE Group are Exhibit 5F; the proposed Amended and Restated Certificate of Incorporation of Archipelago Holdings, Inc. ("Arca Holdings") is Exhibit 5G and the proposed Trust Agreement for the Delaware Trust is Exhibit 5H. Each of these Exhibits will be operative as of the consummation of the Combination.
examined at the places specified in Item IV below. The Exchange has prepared summaries, set forth in Sections A, B, and C below, of the most significant aspects of such statements.
A. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change
1. Purpose
NYSE Arca is submitting the proposed rule change to the Commission in connection with the Combination of NYSE Group with Euronext. As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext. The Combination involves certain modifications to the organizational documents of NYSE Group, the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.
For a description of the Combination and related rule changes regarding NYSE Euronext, NYSE Group, and the Delaware Trust, see the rule filing submitted by the New York Stock
Exchange LLC ("NYSE") relating to the Combination (File Number SR-NYSE-2006-120) (the "NYSE Rule Filing"). 5
As a self-regulatory organization also owned by NYSE Group, the Exchange is making reference in this proposed rule change to the applicable matters described in the NYSE Rule Filing. In particular, the NYSE Rule Filing describes the following matters:
* corporate structure of NYSE Euronext following the Combination. In particular, Arca Holdings will remain a wholly owned subsidiary of NYSE Group. NYSE Arca Holdings, Inc., a Delaware corporation ("NYSE Arca Holdings"), and NYSE Arca L.L.C., a Delaware limited liability company ("NYSE Arca LLC"), will remain wholly owned subsidiaries of Arca Holdings. NYSE Arca will remain a wholly owned subsidiary of NYSE Arca Holdings and NYSE Arca Equities, Inc., a Delaware corporation formerly known as PCX Equities, Inc. ("NYSE Arca Equities"), will remain a wholly owned subsidiary of NYSE Arca. NYSE Arca will continue to maintain its status as a registered national securities exchange and self-regulatory organization. Arca Holdings' businesses and assets will continue to be held by it and its subsidiaries. Pursuant to a services agreement, NYSE Regulation will perform many of the regulatory functions of NYSE Arca.
There will be no change to the current manner of election or appointment of the directors and officers of Arca Holdings, NYSE Arca Holdings, NYSE Arca LLC, NYSE Arca or NYSE Arca Equities (or of the Euronext exchanges) as a result of the
5 See Securities Exchange Act Release No. 55026 (December 29, 2006), 72 FR 814 (January 8, 2007).
Combination. The Combination will have no effect on the ability of any party to trade securities on NYSE Arca or NYSE Arca Equities.
* board of directors and board committees of NYSE Euronext. Specifically, in contrast to the current independence policy of NYSE Group, the independence policy of NYSE Euronext will not provide as a categorical matter that a person fails to be independent if he or she is an executive officer of a foreign private issuer of securities listed on the NYSE or NYSE Arca. The Exchange believes that this change is important because NYSE Euronext will be a multinational company, with European Persons comprising half of its initial directors, most of whom will initially be former directors of Euronext. Euronext does not prohibit executive officers of companies listed on Euronext exchanges from serving as directors of Euronext because Euronext does not (and NYSE Euronext will not) regulate these companies in the way that the Exchange regulates its listed companies. The Exchange therefore believes that a categorical requirement prohibiting all executive officers of foreign private issuers listed on the NYSE on NYSE Arca could preclude a large pool of otherwise highly qualified director candidates from serving on the NYSE Euronext board of directors and is not necessary.
In addition, the director independence policy will contain a transition period so that the independence requirements will not apply to the European Persons on the NYSE Euronext board of directors until the annual meeting of NYSE Euronext stockholders in 2008.
Finally, in contrast to the current independence policy of NYSE Group, the independence policy of NYSE Euronext will not provide as a categorical matter that a person fails to be independent if he or she is a director of an affiliate of a member organization (which includes member organizations of NYSE (as defined in paragraph (b) of Rule 2 of NYSE), OTP Firms of NYSE Arca (as defined in Rules 1.1(r) of NYSE Arca) and ETP Holders of NYSE Arca Equities, Inc. (as defined in Rule 1.1(n) of NYSE Arca Equities, Inc.)).
The independence policy of NYSE Euronext will require, however, that (1) executive officers of foreign private issuers (including, for the avoidance of doubt, companies whose securities are listed on a Euronext exchange), (2) executive officers of NYSE Euronext, (3) any European Person on the NYSE Euronext board of directors who would not satisfy the independence requirements in the independence policy but for the transition period, and (4) any director of an affiliate of a member organization, taken together, shall constitute no more than a minority of the total number of directors of NYSE Euronext. In addition, none of (1) an executive officer of an issuer whose securities are listed on the NYSE or NYSE Arca (regardless of whether such issuer is a foreign private issuer), (2) a European Person on the NYSE Euronext board of directors who would not satisfy the independence requirements in the independence policy but for the transition period, or (3) any director of an affiliate of a member organization can qualify as an independent director of the NYSE, NYSE Market or NYSE Regulation. Consequently, the Exchange believes that the proposed changes, when taken together, do not present significant concerns regarding the independence of the board of NYSE Euronext.
* management of NYSE Euronext.
* voting and ownership limitations on the shares of NYSE Euronext.
* protection of the self-regulatory functions and oversight. 6
The Exchange understands that the Commission is also concerned about potential unfair competition and conflicts of interest between a U.S. exchange's selfregulatory obligations and its commercial interests that could exist if such exchange were to become affiliated with one of its members, as well as the potential for unfair competitive advantage that the affiliated member could have by virtue of informational or operational advantages, or the ability to receive preferential treatment. 7 The Exchange acknowledges that ownership of, or a control relationship with, a member organization by NYSE Euronext or any of its subsidiaries would necessitate that the foregoing concerns be first addressed with, and to the satisfaction of, the Commission 8 and/or, as appropriate, the European Regulators.
* provisions relating to the Delaware Trust and Dutch Foundation, including:
* administration of the Delaware Trust and Dutch Foundation,
* material adverse changes in law,
* remedies of the Dutch Foundation and Delaware Trust,
* unwinding of remedies,
6 In particular, to facilitate compliance with the requirements of Rule 17a-1(b) under the Exchange Act, NYSE Euronext shall maintain in the United States originals or copies of Overlapping Records (as defined in the NYSE Rule Filing) covered by Rule 17a-1(b) promptly after creation of such Overlapping Records.
7 See Securities Exchange Act Release No. 52497 (September 22, 2005), 70 FR 56949 (September 29, 2005) (File Number SR-PCX-2005-90); and Securities Exchange Act Release No. 53382 (February 27, 2006), 71 FR 11251 (March 6, 2006) (File Number SRNYSE-2005-77).
8 We note that the Commission has specifically approved the ownership and operation of the outbound router function of Archipelago Securities by Archipelago, subject to the conditions specified in Securities Exchange Act Release No. 52497.
* consequences of the exercise of remedies,
* automatic suspension and repeal of certain provisions in the NYSE Euronext organizational documents,
* transfer of Foundation and Trust property,
* submission to jurisdiction,
* other duties,
* initiatives by the Board of Trustees of the Delaware Trust and the Board of Directors of the Foundation,
* duration of the Dutch Foundation, and
* term of the Delaware Trust.
* NYSE Group waiver of its ownership and voting limitations.
In this regard, an extract with the relevant resolutions is attached to this rule filing as Exhibit 5F.
The Exchange hereby requests that the Commission allow NYSE Euronext to wholly own and vote all of the outstanding common stock of NYSE Group, either alone or with its related persons, except for any related person of NYSE Euronext which is an ETP Holder of NYSE Arca Equities, OTP Holder or OTP Firm of NYSE Arca, or member or member organization of the NYSE, upon the consummation of the Combination.
* regulation following the Combination.
* changes to the organizational documents of NYSE Group.
In addition, Article Fourth of the Certificate of Incorporation of Arca Holdings is being amended to provide for voting or ownership of the shares of stock of Arca Holdings by the
Delaware Trust pursuant to the terms and conditions of the Trust Agreement by and among NYSE Euronext, Inc., NYSE Group, Inc. and the trustees and Delaware trustee thereto. 9
The proposed rule change, if approved by the Commission, will not be operative until the consummation of the Combination.
2. Statutory Basis
The Exchange believes that this filing is consistent with Section 6(b)(1) of the Exchange Act, 10 in general, and furthers the objectives of Section 6(b)(1) in particular, in that it enables the Exchange to be so organized as to have the capacity to be able to carry out the purposes of the Exchange Act and to comply, and to enforce compliance by its exchange members and persons associated with its exchange members, with the provisions of the Exchange Act, the rules and regulations thereunder, and the rules of the Exchange. The Exchange also believes that this filing furthers the objectives of Section 6(b)(5) of the Exchange Act 11 because the rules summarized herein would create a governance and regulatory structure that is designed to prevent fraudulent and manipulative acts and practices, to promote just and equitable principles of trade, to remove impediments to, and perfect the mechanism of a free and open market and a national market system and, in general, to protect investors and the public interest.
9 See proposed Amended and Restated Certificate of Incorporation of Arca Holdings., Article Fourth (C)(1) and (D)(1).
10 15 U.S.C. 78f(b)(1).
11 15 U.S.C. 78f(b)(5).
B. Self-Regulatory Organization's Statement on Burden on Competition
The Exchange does not believe that the proposed rule change would impose any burden on competition that is not necessary or appropriate in furtherance of the purposes of the Exchange Act.
C. Self-Regulatory Organization's Statement on Comments on the Proposed Rule Change Received from Members, Participants or Others
The Exchange has neither solicited nor received written comments on the proposed rule change.
III. Date of Effectiveness of the Proposed Rule Change and Timing for Commission Action Within 35 days of the date of publication of this notice in the Federal Register or within such longer period (i) as the Commission may designate up to 90 days of such date if it finds such longer period to be appropriate and publishes its reasons for so finding or (ii) as to which the self-regulatory organization consents, the Commission will:
(A) by order approve such proposed rule change, or
(B) institute proceedings to determine whether the proposed rule change should be disapproved.
IV. Solicitation of Comments
Interested persons are invited to submit written data, views, and arguments concerning the foregoing, including whether the proposed rule change is consistent with the Act. Comments may be submitted by any of the following methods:
Electronic comments:
* Use the Commission's Internet comment form (http://www.sec.gov/rules/sro.shtml); or
* Send an e-mail to [email protected]. Please include File Number SR-NYSEArca2007-05 on the subject line.
Paper comments:
* Send paper comments in triplicate to Nancy M. Morris, Secretary, Securities and Exchange Commission, Station Place, 100 F Street, NE, Washington, DC 20549-1090. All submissions should refer to File Number SR-NYSEArca-2007-05. This file number should be included on the subject line if e-mail is used. To help the Commission process and review your comments more efficiently, please use only one method. The Commission will post all comments on the Commission's Internet Web site (http://www.sec.gov/rules/sro.shtml). Copies of the submission, all subsequent amendments, all written statements with respect to the proposed rule change that are filed with the Commission, and all written communications relating to the proposed rule change between the Commission and any person, other than those that may be withheld from the public in accordance with the provisions of 5 U.S.C. 552, will be available for inspection and copying in the Commission's Public Reference Room. Copies of such filing also will be available for inspection and copying at the principal office of the Exchange. All comments received will be posted without change; the Commission does not edit personal identifying information from submissions. You should submit only information that
you wish to make available publicly. All submissions should refer to File Number SR-NYSE-
2007-05 and should be submitted on or before [insert date 15 days from publication in the
Federal Register].
For the Commission, by the Division of Market Regulation, pursuant to delegated authority. 12
Florence E. Harmon Deputy Secretary
12
17 CFR 200.30-3(a)(12).
|
<urn:uuid:ce16c60d-8a33-45b4-bdfa-c9a177346a67>
|
CC-MAIN-2018-30
|
https://www.sec.gov/rules/sro/nysearca/2007/34-55109.pdf
|
2018-07-19T23:27:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591332.73/warc/CC-MAIN-20180719222958-20180720002958-00533.warc.gz
| 968,427,227
| 4,060
|
eng_Latn
|
eng_Latn
| 0.971008
|
eng_Latn
| 0.983089
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1983,
4160,
5748,
7374,
9471,
10853,
12787,
14052,
15565,
17116,
18399,
18763
] |
SECURITIES AND EXCHANGE COMMISSION
(Release No. 34-55109; File No. SR-NYSEArca-2007-05)
January 16, 2007
Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Regarding a Proposed Combination Between NYSE Group, Inc. and Euronext N.V.
Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934, as amended, ("Exchange Act") 1 and Rule 19b-4 thereunder, 2 notice is hereby given that on January 12, 2007, NYSE Arca, Inc. ("NYSE Arca" or "Exchange") filed with the Securities and Exchange Commission ("Commission") the proposed rule change as described in Items I, II, and III below, which Items have been substantially prepared by the Exchange. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons.
I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change
NYSE Arca is submitting the proposed rule change to the Commission in connection with the proposed business combination (the "Combination") of NYSE Group, Inc., a Delaware corporation ("NYSE Group"), with Euronext N.V., a company organized under the laws of The Netherlands ("Euronext"). As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext, a Delaware corporation ("NYSE Euronext"). The Combination involves certain modifications to the organizational documents of NYSE Group, 3
1 15 U.S.C. 78s(b)(l).
2 17 CFR 240.19b-4.
3 Upon the consummation of the Combination, NYSE Group will be merged with and into Jefferson Merger Sub, Inc. and the name of Jefferson Merger Sub, Inc. will be changed to NYSE Group, Inc. The changes to the NYSE Group organizational documents refer to changes from the current NYSE Group organizational documents. Technically, however, the Amended and Restated Certificate of Incorporation and Amended and Restated
the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.
The text of the proposed rule change and Exhibits 5A through 5H 4 are available at the Exchange, the Commission's Public Reference Room, and www.nysearca.com.
II. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change
In its filing with the Commission, the Exchange included statements concerning the purpose of, and basis for, the proposed rule change. The text of these statements may be
Bylaws of NYSE Group that will be operative upon the consummation of the Combination will be amended and restated forms of the Certificate of Incorporation and Bylaws of Jefferson Merger Sub, Inc.
4 The proposed Amended and Restated Certificate of Incorporation of NYSE Euronext is Exhibit 5A; the proposed Amended and Restated Bylaws of NYSE Euronext are Exhibit 5B; the proposed NYSE Euronext Director Independence Policy, which policy will replace the current NYSE Group Director Independence Policy, is Exhibit 5C; the proposed Amended and Restated Certificate of Incorporation of NYSE Group is Exhibit 5D; the proposed Amended and Restated Bylaws of NYSE Group are Exhibit 5E; the resolutions of the board of directors of NYSE Group are Exhibit 5F; the proposed Amended and Restated Certificate of Incorporation of Archipelago Holdings, Inc. ("Arca Holdings") is Exhibit 5G and the proposed Trust Agreement for the Delaware Trust is Exhibit 5H. Each of these Exhibits will be operative as of the consummation of the Combination.
examined at the places specified in Item IV below. The Exchange has prepared summaries, set forth in Sections A, B, and C below, of the most significant aspects of such statements.
A. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change
1. Purpose
NYSE Arca is submitting the proposed rule change to the Commission in connection with the Combination of NYSE Group with Euronext. As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext. The Combination involves certain modifications to the organizational documents of NYSE Group, the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.
For a description of the Combination and related rule changes regarding NYSE Euronext, NYSE Group, and the Delaware Trust, see the rule filing submitted by the New York Stock
Exchange LLC ("NYSE") relating to the Combination (File Number SR-NYSE-2006-120) (the "NYSE Rule Filing"). 5
As a self-regulatory organization also owned by NYSE Group, the Exchange is making reference in this proposed rule change to the applicable matters described in the NYSE Rule Filing. In particular, the NYSE Rule Filing describes the following matters:
* corporate structure of NYSE Euronext following the Combination. In particular, Arca Holdings will remain a wholly owned subsidiary of NYSE Group. NYSE Arca Holdings, Inc., a Delaware corporation ("NYSE Arca Holdings"), and NYSE Arca L.L.C., a Delaware limited liability company ("NYSE Arca LLC"), will remain wholly owned subsidiaries of Arca Holdings. NYSE Arca will remain a wholly owned subsidiary of NYSE Arca Holdings and NYSE Arca Equities, Inc., a Delaware corporation formerly known as PCX Equities, Inc. ("NYSE Arca Equities"), will remain a wholly owned subsidiary of NYSE Arca. NYSE Arca will continue to maintain its status as a registered national securities exchange and self-regulatory organization. Arca Holdings' businesses and assets will continue to be held by it and its subsidiaries. Pursuant to a services agreement, NYSE Regulation will perform many of the regulatory functions of NYSE Arca.
There will be no change to the current manner of election or appointment of the directors and officers of Arca Holdings, NYSE Arca Holdings, NYSE Arca LLC, NYSE Arca or NYSE Arca Equities (or of the Euronext exchanges) as a result of the
5 See Securities Exchange Act Release No. 55026 (December 29, 2006), 72 FR 814 (January 8, 2007).
Combination. The Combination will have no effect on the ability of any party to trade securities on NYSE Arca or NYSE Arca Equities.
* board of directors and board committees of NYSE Euronext. Specifically, in contrast to the current independence policy of NYSE Group, the independence policy of NYSE Euronext will not provide as a categorical matter that a person fails to be independent if he or she is an executive officer of a foreign private issuer of securities listed on the NYSE or NYSE Arca. The Exchange believes that this change is important because NYSE Euronext will be a multinational company, with European Persons comprising half of its initial directors, most of whom will initially be former directors of Euronext. Euronext does not prohibit executive officers of companies listed on Euronext exchanges from serving as directors of Euronext because Euronext does not (and NYSE Euronext will not) regulate these companies in the way that the Exchange regulates its listed companies. Th
|
e Exchange therefore believes that a categorical requirement prohibiting all executive officers of foreign private issuers listed on the NYSE on NYSE Arca could preclude a large pool of otherwise highly qualified director candidates from serving on the NYSE Euronext board of directors and is not necessary.
| 8,382
|
inside_word
|
The
|
remove_all
|
<url>
https://www.sec.gov/rules/sro/nysearca/2007/34-55109.pdf
</url>
<text>
SECURITIES AND EXCHANGE COMMISSION
(Release No. 34-55109; File No. SR-NYSEArca-2007-05)
January 16, 2007
Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Regarding a Proposed Combination Between NYSE Group, Inc. and Euronext N.V.
Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934, as amended, ("Exchange Act") 1 and Rule 19b-4 thereunder, 2 notice is hereby given that on January 12, 2007, NYSE Arca, Inc. ("NYSE Arca" or "Exchange") filed with the Securities and Exchange Commission ("Commission") the proposed rule change as described in Items I, II, and III below, which Items have been substantially prepared by the Exchange. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons.
I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change
NYSE Arca is submitting the proposed rule change to the Commission in connection with the proposed business combination (the "Combination") of NYSE Group, Inc., a Delaware corporation ("NYSE Group"), with Euronext N.V., a company organized under the laws of The Netherlands ("Euronext"). As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext, a Delaware corporation ("NYSE Euronext"). The Combination involves certain modifications to the organizational documents of NYSE Group, 3
1 15 U.S.C. 78s(b)(l).
2 17 CFR 240.19b-4.
3 Upon the consummation of the Combination, NYSE Group will be merged with and into Jefferson Merger Sub, Inc. and the name of Jefferson Merger Sub, Inc. will be changed to NYSE Group, Inc. The changes to the NYSE Group organizational documents refer to changes from the current NYSE Group organizational documents. Technically, however, the Amended and Restated Certificate of Incorporation and Amended and Restated
the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.
The text of the proposed rule change and Exhibits 5A through 5H 4 are available at the Exchange, the Commission's Public Reference Room, and www.nysearca.com.
II. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change
In its filing with the Commission, the Exchange included statements concerning the purpose of, and basis for, the proposed rule change. The text of these statements may be
Bylaws of NYSE Group that will be operative upon the consummation of the Combination will be amended and restated forms of the Certificate of Incorporation and Bylaws of Jefferson Merger Sub, Inc.
4 The proposed Amended and Restated Certificate of Incorporation of NYSE Euronext is Exhibit 5A; the proposed Amended and Restated Bylaws of NYSE Euronext are Exhibit 5B; the proposed NYSE Euronext Director Independence Policy, which policy will replace the current NYSE Group Director Independence Policy, is Exhibit 5C; the proposed Amended and Restated Certificate of Incorporation of NYSE Group is Exhibit 5D; the proposed Amended and Restated Bylaws of NYSE Group are Exhibit 5E; the resolutions of the board of directors of NYSE Group are Exhibit 5F; the proposed Amended and Restated Certificate of Incorporation of Archipelago Holdings, Inc. ("Arca Holdings") is Exhibit 5G and the proposed Trust Agreement for the Delaware Trust is Exhibit 5H. Each of these Exhibits will be operative as of the consummation of the Combination.
examined at the places specified in Item IV below. The Exchange has prepared summaries, set forth in Sections A, B, and C below, of the most significant aspects of such statements.
A. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change
1. Purpose
NYSE Arca is submitting the proposed rule change to the Commission in connection with the Combination of NYSE Group with Euronext. As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext. The Combination involves certain modifications to the organizational documents of NYSE Group, the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.
For a description of the Combination and related rule changes regarding NYSE Euronext, NYSE Group, and the Delaware Trust, see the rule filing submitted by the New York Stock
Exchange LLC ("NYSE") relating to the Combination (File Number SR-NYSE-2006-120) (the "NYSE Rule Filing"). 5
As a self-regulatory organization also owned by NYSE Group, the Exchange is making reference in this proposed rule change to the applicable matters described in the NYSE Rule Filing. In particular, the NYSE Rule Filing describes the following matters:
* corporate structure of NYSE Euronext following the Combination. In particular, Arca Holdings will remain a wholly owned subsidiary of NYSE Group. NYSE Arca Holdings, Inc., a Delaware corporation ("NYSE Arca Holdings"), and NYSE Arca L.L.C., a Delaware limited liability company ("NYSE Arca LLC"), will remain wholly owned subsidiaries of Arca Holdings. NYSE Arca will remain a wholly owned subsidiary of NYSE Arca Holdings and NYSE Arca Equities, Inc., a Delaware corporation formerly known as PCX Equities, Inc. ("NYSE Arca Equities"), will remain a wholly owned subsidiary of NYSE Arca. NYSE Arca will continue to maintain its status as a registered national securities exchange and self-regulatory organization. Arca Holdings' businesses and assets will continue to be held by it and its subsidiaries. Pursuant to a services agreement, NYSE Regulation will perform many of the regulatory functions of NYSE Arca.
There will be no change to the current manner of election or appointment of the directors and officers of Arca Holdings, NYSE Arca Holdings, NYSE Arca LLC, NYSE Arca or NYSE Arca Equities (or of the Euronext exchanges) as a result of the
5 See Securities Exchange Act Release No. 55026 (December 29, 2006), 72 FR 814 (January 8, 2007).
Combination. The Combination will have no effect on the ability of any party to trade securities on NYSE Arca or NYSE Arca Equities.
* board of directors and board committees of NYSE Euronext. Specifically, in contrast to the current independence policy of NYSE Group, the independence policy of NYSE Euronext will not provide as a categorical matter that a person fails to be independent if he or she is an executive officer of a foreign private issuer of securities listed on the NYSE or NYSE Arca. The Exchange believes that this change is important because NYSE Euronext will be a multinational company, with European Persons comprising half of its initial directors, most of whom will initially be former directors of Euronext. Euronext does not prohibit executive officers of companies listed on Euronext exchanges from serving as directors of Euronext because Euronext does not (and NYSE Euronext will not) regulate these companies in the way that the Exchange regulates its listed companies. Th<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.sec.gov/rules/sro/nysearca/2007/34-55109.pdf\n</url>\n<text>\nSECURITIES AND EXCHANGE COMMISSION\n\n(Release No. 34-55109; File No. SR-NYSEArca-2007-05)\n\nJanuary 16, 2007\n\nSelf-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Regarding a Proposed Combination Between NYSE Group, Inc. and Euronext N.V.\n\nPursuant to Section 19(b)(1) of the Securities Exchange Act of 1934, as amended, (\"Exchange Act\") 1 and Rule 19b-4 thereunder, 2 notice is hereby given that on January 12, 2007, NYSE Arca, Inc. (\"NYSE Arca\" or \"Exchange\") filed with the Securities and Exchange Commission (\"Commission\") the proposed rule change as described in Items I, II, and III below, which Items have been substantially prepared by the Exchange. The Commission is publishing this notice to solicit comments on the proposed rule change from interested persons.\n\nI. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change\n\nNYSE Arca is submitting the proposed rule change to the Commission in connection with the proposed business combination (the \"Combination\") of NYSE Group, Inc., a Delaware corporation (\"NYSE Group\"), with Euronext N.V., a company organized under the laws of The Netherlands (\"Euronext\"). As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext, a Delaware corporation (\"NYSE Euronext\"). The Combination involves certain modifications to the organizational documents of NYSE Group, 3\n\n1 15 U.S.C. 78s(b)(l).\n\n2 17 CFR 240.19b-4.\n\n3 Upon the consummation of the Combination, NYSE Group will be merged with and into Jefferson Merger Sub, Inc. and the name of Jefferson Merger Sub, Inc. will be changed to NYSE Group, Inc. The changes to the NYSE Group organizational documents refer to changes from the current NYSE Group organizational documents. Technically, however, the Amended and Restated Certificate of Incorporation and Amended and Restated\n\nthe current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.\n\nThe text of the proposed rule change and Exhibits 5A through 5H 4 are available at the Exchange, the Commission's Public Reference Room, and www.nysearca.com.\n\nII. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change\n\nIn its filing with the Commission, the Exchange included statements concerning the purpose of, and basis for, the proposed rule change. The text of these statements may be\n\nBylaws of NYSE Group that will be operative upon the consummation of the Combination will be amended and restated forms of the Certificate of Incorporation and Bylaws of Jefferson Merger Sub, Inc.\n\n4 The proposed Amended and Restated Certificate of Incorporation of NYSE Euronext is Exhibit 5A; the proposed Amended and Restated Bylaws of NYSE Euronext are Exhibit 5B; the proposed NYSE Euronext Director Independence Policy, which policy will replace the current NYSE Group Director Independence Policy, is Exhibit 5C; the proposed Amended and Restated Certificate of Incorporation of NYSE Group is Exhibit 5D; the proposed Amended and Restated Bylaws of NYSE Group are Exhibit 5E; the resolutions of the board of directors of NYSE Group are Exhibit 5F; the proposed Amended and Restated Certificate of Incorporation of Archipelago Holdings, Inc. (\"Arca Holdings\") is Exhibit 5G and the proposed Trust Agreement for the Delaware Trust is Exhibit 5H. Each of these Exhibits will be operative as of the consummation of the Combination.\n\nexamined at the places specified in Item IV below. The Exchange has prepared summaries, set forth in Sections A, B, and C below, of the most significant aspects of such statements.\n\nA. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change\n\n1. Purpose\n\nNYSE Arca is submitting the proposed rule change to the Commission in connection with the Combination of NYSE Group with Euronext. As a result of the Combination, the businesses of NYSE Group (including that of NYSE Arca) and Euronext will be held under a single, publicly traded holding company named NYSE Euronext. The Combination involves certain modifications to the organizational documents of NYSE Group, the current indirect parent company of NYSE Arca, and of NYSE Euronext, which upon completion of the Combination will be the new indirect parent company of NYSE Arca. The organizational documents and independence policies of NYSE Group and NYSE Euronext and the trust documents constitute rules of the Exchange. The resolutions of the board of directors of NYSE Group and the changes to the Certificate of Incorporation of Archipelago Holdings, Inc., current direct parent of NYSE Arca are also rules of the Exchange requiring Commission approval. Accordingly, NYSE Arca submits this proposed rule change to reflect the rule changes to be implemented in connection with the Combination.\n\nFor a description of the Combination and related rule changes regarding NYSE Euronext, NYSE Group, and the Delaware Trust, see the rule filing submitted by the New York Stock\n\nExchange LLC (\"NYSE\") relating to the Combination (File Number SR-NYSE-2006-120) (the \"NYSE Rule Filing\"). 5\n\nAs a self-regulatory organization also owned by NYSE Group, the Exchange is making reference in this proposed rule change to the applicable matters described in the NYSE Rule Filing. In particular, the NYSE Rule Filing describes the following matters:\n\n* corporate structure of NYSE Euronext following the Combination. In particular, Arca Holdings will remain a wholly owned subsidiary of NYSE Group. NYSE Arca Holdings, Inc., a Delaware corporation (\"NYSE Arca Holdings\"), and NYSE Arca L.L.C., a Delaware limited liability company (\"NYSE Arca LLC\"), will remain wholly owned subsidiaries of Arca Holdings. NYSE Arca will remain a wholly owned subsidiary of NYSE Arca Holdings and NYSE Arca Equities, Inc., a Delaware corporation formerly known as PCX Equities, Inc. (\"NYSE Arca Equities\"), will remain a wholly owned subsidiary of NYSE Arca. NYSE Arca will continue to maintain its status as a registered national securities exchange and self-regulatory organization. Arca Holdings' businesses and assets will continue to be held by it and its subsidiaries. Pursuant to a services agreement, NYSE Regulation will perform many of the regulatory functions of NYSE Arca.\n\nThere will be no change to the current manner of election or appointment of the directors and officers of Arca Holdings, NYSE Arca Holdings, NYSE Arca LLC, NYSE Arca or NYSE Arca Equities (or of the Euronext exchanges) as a result of the\n\n5 See Securities Exchange Act Release No. 55026 (December 29, 2006), 72 FR 814 (January 8, 2007).\n\nCombination. The Combination will have no effect on the ability of any party to trade securities on NYSE Arca or NYSE Arca Equities.\n* board of directors and board committees of NYSE Euronext. Specifically, in contrast to the current independence policy of NYSE Group, the independence policy of NYSE Euronext will not provide as a categorical matter that a person fails to be independent if he or she is an executive officer of a foreign private issuer of securities listed on the NYSE or NYSE Arca. The Exchange believes that this change is important because NYSE Euronext will be a multinational company, with European Persons comprising half of its initial directors, most of whom will initially be former directors of Euronext. Euronext does not prohibit executive officers of companies listed on Euronext exchanges from serving as directors of Euronext because Euronext does not (and NYSE Euronext will not) regulate these companies in the way that the Exchange regulates its listed companies. Th<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "e Exchange therefore believes that a categorical requirement prohibiting all executive officers of foreign private issuers listed on the NYSE on NYSE Arca could preclude a large pool of otherwise highly qualified director candidates from serving on the NYSE Euronext board of directors and is not necessary.",
"role": "assistant"
}
] |
|
UT-Austin
PREMODERN WORLD HIS 301f (#38985) // AHC 310 (#32050)
MWF 10 to 11 am
Fall 2010
WAG 101
Description.
"Premodern World" is a lower-division, lecture course that provides an overview of global development from roughly 30,000 BCE to 1500 CE. By the end of the semester, students should be able to: 1) define "civilization" and explain theories about the rise and fall of civilizations; 2) compare political, cultural, and socio-economic aspects of premodern societies across Eurasia, Africa, and the Americas; and 3) identify cross-cultural encounters that have had a lasting impact on global history. This team-taught, entry-level course aims to teach historical thinking as well as historical content, to impart a basic grasp of the premodern past as well as to stimulate the development of large-scale frameworks for historical analysis. Although this course has no prerequisites and assumes no prior knowledge of the subject, students are presumed to be capable of critical reflection upon both lectures and readings.
Professor and TA information.
Prof. A. Frazier
Prof. C. Talbot
Hadi Hosainy, TA
[email protected] [email protected]
[email protected]
Office: GAR 2.148
Office: GAR 3.106
Office: Burdine 310
Hrs: T 3-5pm & by apptmt. Hrs: M 11-12 & F 1:30-3:30 Hrs. W 2-4 pm
Readings. Available for purchase (p) at the Co-op or for download from Blackboard (bb):
Strayer, Ways of the World, A Brief Global History with Sources volume I (p)
Anonymous, Epic of Gilgamesh, tr. D. Ferry (p)
Sima Qian, The First Emperor, tr. R. Dawson (p)
Marco Polo, Travels, tr. R. Latham (p)
Ross Dunn, The Adventures of Ibn Battuta (p)
excerpt from Jared Diamond, Collapse (bb)
excerpt from Ammianus Marcellinus, Histories (bb)
excerpt from Epictetus, Handbook (bb)
P. A. McAnany & T. G. Negron, "Bellicose Rulers and Climatological Peril"
in
Questioning Collapse
, ed. P. A. McAnany & Norman Yoffee
(bb)
Asoka's Rock Edict XIII
(bb)
Requirements. Students are expected:
*to attend all lectures
*to prepare all reading assignments thoughtfully by beginning of the week
*to respond to at least six of eight reading worksheets and submit them before class through Blackboard (by 10pm on the required date)
*to participate regularly and responsibly in worksheet-based discussions
*to complete at least six of the eight short factual quizzes
*to complete the three non-cumulative exams
Grading procedure. The three non-cumulative exams will consist of both short answer and essay questions, and will together comprise 60% of the course grade. Eight short, factual, multiple-choice quizzes based on the assigned textbook readings will be administered on Mondays – six of these will count toward the course grade. A series of eight reading worksheets will accompany our non-textbook sources; six will count towards the course grade. Attendance and participation is another component of your final grade. The various aspects of student performance are weighted:
```
exam 1 (Sept. 24) = 20% exam 2 (Oct. 22) = 20% exam 3 (Dec. 8) = 20% (during final exam period) 6 quizzes = 15% (cannot be made up) 6 reading worksheets = 20% (must be turned in before class) attendance & participation = 5%
```
We will NOT be using pluses and minuses for the course grade this semester.
Attendance policy. You are counted present only if you are in class for the entire period. Emergencies will of course be accommodated, but departures immediately following a quiz reflect poorly upon you.
You are allowed two absences no questions asked. After that, unexcused absences will adversely affect your grade. Excused absences require a note to the professors ahead of time insofar as possible. For unexpected absences due to illness or accident, notify us of your situation as soon as possible and document it immediately upon your return.
Quizzes and reading worksheets cannot be made up. Make-up exams will be administered only with the consent of the professors and at their convenience.
Religious holy days sometimes conflict with class and examination schedules. It is the policy of UT-Austin that you must notify each of your instructors at least fourteen days prior to the classes scheduled on dates you will be absent to observe a religious holy day.
Policy on special accommodations. At the beginning of the semester, students who need special accommodations should notify the instructor by presenting a letter prepared by the Services for Students with Disabilities (SDD) Office. To ensure that the most appropriate accommodations can be provided, students should contact the SSD Office at 471-6259 or 471-4641 TTY.
Read more at: http://www.utexas.edu/diversity/ddce/ssd/
Academic integrity. Students who violate University rules on scholastic dishonesty are
subject to disciplinary penalties, including the possibility of failure in the course and/or dismissal from the University. Since such dishonesty harms the individual, all students, and the integrity of the University, policies on scholastic dishonesty will be strictly enforced.
Read details at: http://deanofstudents.utexas.edu/sjs/scholdis.php
Blackboard and laptop/messaging device policy. We will use the course web site on Blackboard to post assignments and make announcements relating to the course – check the site regularly (at least weekly) for new information. It is your responsibility to maintain a functioning email account linked to Blackboard.
Read university policy at: http://www.utexas.edu/its/policies/emailnotify/html
All students have the right to learn in a supportive environment: don't let your use of a laptop or mobile device distract others. All laptops and mobile messaging devices must be turned off and stored away during quizzes and examinations. Their use, WITHOUT ANY SOUND, is acceptable during lectures or class discussions for note-taking or instructor-directed websurfing.
To record audio or visuals of lectures you must have a written consent from both professors.
Keep in touch! If you are having difficulty with the course or must be absent for a period due to personal issues, stop by during office hours or be in touch by email. Don't wait until weeks have passed and it's too late to catch up. The professors and TA for this course sincerely want you to succeed.
*****************************************************
Schedule of Class Meetings & Readings
PART I -- Taking A Global View: Civilization & Its Consequences
Wk 1. INTRODUCTION
W 25 Aug Introduction to Course
F 27 Aug Maps & Mapping
reading: Strayer,Ways, Ch1. "First Peoples, To 10,000 BCE."
Wk 2. AGRICULTURE & ITS IMPACTS
M 30 Aug quiz 1 (on Strayer ch. 2); Paleolithic Art
W 1 Sept. Agricultural Transitions
F 3 Sept. Food Production & the Fertile Crescent
reading: Strayer, Ways, Ch2. "First Farmers, 10,000 BCE-3000 BCE."
Wk 3. THE FIRST CIVILIZATIONS
M 6 Sept. Labor Day Holiday
W 8 Sept. The Urban Revolution in Mesopotamia
F 10 Sept. Other River Valley Civilizations reading: begin Epic of Gilgamesh; Strayer, Ways, Ch3. "First Civilizations, 3500 BCE-500 BCE."
Wk 4. VARYING TRAJECTORIES OF DEVELOPMENT
M 13 Sept. quiz 2 (Strayer ch. 3 & 7); Ruling, Writing, and Gilgamesh reading worksheet 1 due 10 pm, Tues. Sept. 14
W 15 Sept.
discussion: Defining Civilization with Gilgamesh
F 17 Sept. Mesoamerica & the Classical Maya reading: finish Epic of Gilgamesh; Strayer, Ways, Ch7. "Classical Era Variations: Africa & Americas."
Wk 5. SUMMING UP: GLOBAL PATTERNS IN EARLY HISTORY
M 20 Sept. Sub-Saharan Africa & the Bantu Migrations reading worksheet 2 due 10 pm, Tues. Sept. 21
W 22 Sept. discussion: Considering Civilizational Collapse
F 24 Sept. EXAM 1
reading: Jared Diamond, "Prologue" (pp. 1-23) & "The Maya Collapses" (pp. 157-77) in Collapse: How Societies Choose to Fail or Succeed (bb); P. A. McAnany & T. G. Negron, "Bellicose Rulers and Climatological Peril" in Questioning Collapse, ed. P. A. McAnany & Norman Yoffee (bb).
PART II -- Comparative History: Classical Cultures, 500 BCE to 500 CE
Wk 6. RELIGION AND PHILOSOPHY IN THE AXIAL AGE
M 27 Sept. quiz 3 (Strayer ch. 5); Buddha and Confucius
W 29 Sept. Moses, Socrates, Jesus reading worksheet 3 due 10 pm, Thurs. Sept. 30
F 1 Oct. discussion: Axial Age Religions reading: Strayer, Ways, Ch5. "Eurasian Cultural Traditions, 500 BCE-500 CE." Epictetus, selection from Handbook (bb)
Wk 7. POLITICS OF EMPIRE IN ASIA
M 4 Oct. quiz 4 (Strayer ch. 4); First Emperor & His Han Successors
W 6 Oct. Asoka's Empire and Message of Dharma reading worksheet 4 due 10 pm, Thurs. Oct. 7
F 8 Oct. discussion: The Chinese Imperial Tradition Begins reading: Strayer, Ways, Ch4. "Eurasian Empires, 500 BCE-500 CE;" Asoka's Rock Edict XIII; Sima Qian, First Emperor, pp. xxii-xxxiv, 23-52 & 61-94.
Wk. 8. POLITICS OF EMPIRE IN THE WEST
M 11 Oct. quiz 5 (Strayer ch. 6); Rome & Its Imperial Predecessors
W 13 Oct. Fall of the Roman Empire reading worksheet 5 due 10 pm, Thurs. Oct. 14
F 15 Oct. discussion: Barbarians at the Gates reading: Strayer, Ways, Ch6. "Eurasian Social Hierarchies, 500 BCE-500 CE;" Ammianus Marcellinus selection (bb)
Wk 9. SUMMING UP CLASSICAL EMPIRES AND CULTURES
M 18 Oct. Comparing Empires: Han & Roman
W 20 Oct. Comparing Religions in Late Antiquity
F 22 Oct. EXAM 2
PART III -- Cross-Cultural History: Spread of Civilizations, 500-1500
Wk 10. EXPANDING ECONOMIC & CULTURAL SPHERES
M 25 Oct. Silk, Sea, and Sand Roads: An Overview
W 27 Oct. Sinification of Central & East Asia
F 29 Oct. film: "Islam: Empire of Faith, Pt. 1: The Messenger"
reading: Strayer, Ways, Ch8. "Commerce and Culture, 500-1500;" Strayer, Ways, Ch9. "China & World: East Asian Connections."
Wk 11. SPREAD OF ISLAM & CHRISTIANITY
M 1 Nov. quiz 6 (Strayer ch. 10 & 11); Islamic Spain
W 3 Nov. Perspectives on the Crusades reading worksheet 6 due 10 pm Thurs. Nov. 4
F 5 Nov. discussion: Marco Polo and the Literature of Travel reading: Strayer, Ways, Ch10. "Worlds of European Christendom, 500-1300;" Strayer, Ways, Ch11. "Worlds of Islam: Afro-Eurasia, 600-1500;" Marco Polo, Travels, "Prologue" (pp. 33-45)
Wk 12. TRAVEL IN THE MONGOL WORLD: MARCO POLO
M 8 Nov. quiz 7 (Strayer ch. 12); Genghis Khan & the Mongol Empire
W 10 Nov. Marco Polo and the Pax Mongolica reading worksheet 7
due 10 pm, Thurs. Nov. 11
F 12 Nov. discussion: Marco Polo and Trade Diasporas reading: Strayer, Ways, Ch12. "Pastoral Peoples ... Mongol Moment, 1200-1500." Marco Polo, Travels,"Kubilai Khan" (pp. 113-62)
Wk 13. TRAVEL IN THE ISLAMIC WORLD: IBN BATTUTA
M 15 Nov. Islam in the Eastern World
W 17 Nov. Cultures in Contact in Africa reading worksheet 8 due 10 pm, Thurs. Nov. 18
F 19 Nov. discussion: Ibn Battuta and the Traveller's Gaze reading: Dunn, Ibn Battuta, pp. 1-12,183-212 (optional: 213-40), 290-320.
Wk 14. THE FIFTEENTH CENTURY
M 22 Nov. quiz 8 (Strayer ch. 13); Renaissance in Europe
W 24 Nov. Rise of the Ottoman Empire
F 26 Nov. Thanksgiving Holiday reading: Strayer, Ways, Ch13. "The Worlds of the Fifteenth Century."
Wk 15. SUMMING UP: CROSS-CULTURAL ENCOUNTERS, 500-1500
M 29 Nov. Global Connections
W 1 Dec. Review worksheet & discussion
F 3 Dec. NO CLASS MEETING, Professors hold extra office hours
EXAM 3 on Wed. December 8, 2:00-5:00 pm
|
<urn:uuid:682565d3-a875-4d42-9eae-0157c94d2eb5>
|
CC-MAIN-2015-18
|
http://www.utexas.edu/cola/files/658370
|
2015-04-22T02:52:03Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246644083.49/warc/CC-MAIN-20150417045724-00185-ip-10-235-10-82.ec2.internal.warc.gz
| 339,162,365
| 3,084
|
eng_Latn
|
eng_Latn
| 0.77289
|
eng_Latn
| 0.970526
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2259,
4826,
6885,
8435,
9924,
11322
] |
UT-Austin
PREMODERN WORLD HIS 301f (#38985) // AHC 310 (#32050)
MWF 10 to 11 am
Fall 2010
WAG 101
Description.
"Premodern World" is a lower-division, lecture course that provides an overview of global development from roughly 30,000 BCE to 1500 CE. By the end of the semester, students should be able to: 1) define "civilization" and explain theories about the rise and fall of civilizations; 2) compare political, cultural, and socio-economic aspects of premodern societies across Eurasia, Africa, and the Americas; and 3) identify cross-cultural encounters that have had a lasting impact on global history. This team-taught, entry-level course aims to teach historical thinking as well as historical content, to impart a basic grasp of the premodern past as well as to stimulate the development of large-scale frameworks for historical analysis. Although this course has no prerequisites and assumes no prior knowledge of the subject, students are presumed to be capable of critical reflection upon both lectures and readings.
Professor and TA information.
Prof. A. Frazier
Prof. C. Talbot
Hadi Hosainy, TA
[email protected] [email protected]
[email protected]
Office: GAR 2.148
Office: GAR 3.106
Office: Burdine 310
Hrs: T 3-5pm & by apptmt. Hrs: M 11-12 & F 1:30-3:30 Hrs. W 2-4 pm
Readings. Available for purchase (p) at the Co-op or for download from Blackboard (bb):
Strayer, Ways of the World, A Brief Global History with Sources volume I (p)
Anonymous, Epic of Gilgamesh, tr. D. Ferry (p)
Sima Qian, The First Emperor, tr. R. Dawson (p)
Marco Polo, Travels, tr. R. Latham (p)
Ross Dunn, The Adventures of Ibn Battuta (p)
excerpt from Jared Diamond, Collapse (bb)
excerpt from Ammianus Marcellinus, Histories (bb)
excerpt from Epictetus, Handbook (bb)
P. A. McAnany & T. G. Negron, "Bellicose Rulers and Climatological Peril"
in
Questioning Collapse
, ed. P. A. McAnany & Norman Yoffee
(bb)
Asoka's Rock Edict XIII
(bb)
Requirements. Students are expected:
*to attend all lectures
*to prepare all reading assignments thoughtfully by beginning of the week
*to respond to at least six of eight reading worksheets and submit them before class through Blackboard (by 10pm on the required date)
*to participate regularly and responsibly in worksheet-based discussions
*to complete at least six of the eight short factual quizzes
*to complete the three non-cumulative exams
Grading procedure. The three non-cumulative exams will consist of both short answer and essay questions, and will together comprise 60% of the course grade. Eight short, factual, multiple-choice quizzes based on the assigned textbook readings will be administered on Mondays – six of these will count toward the course grade. A series of eight reading worksheets will accompany our non-textbook sources; six will count towards the course grade. Attendance and participation is another component of your final grade. The various aspects of student performance are weighted:
```
exam 1 (Sept. 24) = 20% exam 2 (Oct. 22) = 20% exam 3 (Dec. 8) = 20% (during final exam period) 6 quizzes = 15% (cannot be made up) 6 reading worksheets = 20% (must be turned in before class) attendance & participation = 5%
```
We will NOT be using pluses and minuses for the course grade this semester.
Attendance policy. You are counted present only if you are in class for the entire period. Emergencies will of course be accommodated, but departures immediately following a quiz reflect poorly upon you.
You are allowed two absences no questions asked. After that, unexcused absences will adversely affect your grade. Excused absences require a note to the professors ahead of time insofar as possible. For unexpected absences due to illness or accident, notify us of your situation as soon as possible and document it immediately upon your return.
Quizzes and reading worksheets cannot be made up. Make-up exams will be administered only with the consent of the professors and at their convenience.
Religious holy days sometimes conflict with class and examination schedules. It is the policy of UT-Austin that you must notify each of your instructors at least fourteen days prior to the classes scheduled on dates you will be absent to observe a religious holy day.
Policy on special accommodations. At the beginning of the semester, students who need special accommodations should notify the instructor by presenting a letter prepared by the Services for Students with Disabilities (SDD) Office. To ensure that the most appropriate accommodations can be provided, students should contact the SSD Office at 471-6259 or 471-4641 TTY.
Read more at: http://www.utexas.edu/diversity/ddce/ssd/
Academic integrity. Students who violate University rules on scholastic dishonesty are
subject to disciplinary penalties, including the possibility of failure in the course and/or dismissal from the University. Since such dishonesty harms the individual, all students, and the integrity of the University, policies on scholastic dishonesty will be strictly enforced.
Read details at: http://deanofstudents.utexas.edu/sjs/scholdis.php
Blackboard and laptop/messaging device policy. We will use the course web site on Blackboard to post assignments and make announcements relating to the course – check the site regularly (at least weekly) for new information. It is your responsibility to maintain a functioning email account linked to Blackboard.
Read university policy at: http://www.utexas.edu/its/policies/emailnotify/html
All students have the right to learn in a supportive environment: don't let your use of a laptop or mobile device distract others. All laptops and mobile messaging devices must be turned off and stored away during quizzes and examinations. Their use, WITHOUT ANY SOUND, is acceptable during lectures or class discussions for note-taking or instructor-directed websurfing.
To record audio or visuals of lectures you must have a written consent from both professors.
Keep in touch! If you are having difficulty with the course or must be absent for a period due to personal issues, stop by during office hours or be in touch by email. Don't wait until weeks have passed and it's too late to catch up. The professors and TA for this course sincerely want you to succeed.
*****************************************************
Schedule of Class Meetings & Readings
PART I -- Taking A Global View: Civilization & Its Consequences
Wk 1. INTRODUCTION
W 25 Aug Introduction to Course
F 27 Aug Maps & Mapping
reading: Strayer,Ways, Ch1. "First Peoples, To 10,000 BCE."
Wk 2. AGRICULTURE & ITS IMPACTS
M 30 Aug quiz 1 (on Strayer ch. 2); Paleolithic Art
W 1 Sept. Agricultural Transitions
F 3 Sept. Food Production & the Fertile Crescent
reading: Strayer, Ways, Ch2. "First Farmers, 10,000 BCE-3000 BCE."
Wk 3. THE FIRST CIVILIZATIONS
M 6 Sept. Labor Day Holiday
W 8 Sept. The Urban Revolution in Mesopotamia
F 10 Sept. Other River Valley Civilizations reading: begin Epic of Gilgamesh; Strayer, Ways, Ch3. "First Civilizations, 3500 BCE-500 BCE."
Wk 4. VARYING TRAJECTORIES OF DEVELOPMENT
M 13 Sept. quiz 2 (Strayer ch. 3 & 7); Ruling, Writing, and Gilgamesh reading worksheet 1 due 10 pm, Tues. Sept. 14
W 15 Sept.
discussion: Defining Civilization with Gilgamesh
F 17 Sept. Mesoamerica & the Classical Maya reading: finish Epic of Gilgamesh; Strayer, Ways, Ch7. "Classical Era Variations: Africa & Americas."
Wk 5. SUMMING UP: GLOBAL PATTERNS IN EARLY HISTORY
M 20 Sept. Sub-Saharan Africa & the Bantu Migrations reading worksheet 2 due 10 pm, Tues. Sept. 21
W 22 Sept. discussion: Considering Civilizational Collapse
F 24 Sept. EXAM 1
reading: Jared Diamond, "Prologue" (pp. 1-23) & "The Maya Collapses" (pp. 157-77) in Collapse: How Societies Choose to Fail or Succeed (bb); P. A. McAnany & T. G. Negron, "Bellicose Rulers and Climatological Peril" in Questioning Collapse, ed. P. A. McAnany & Norman Yoffee (bb).
PART II -- Comparative History: Classical Cultures, 500 BCE to 500 CE
Wk 6. RELIGION AND PHILOSOPHY IN THE AXIAL AGE
M 27 Sept. quiz 3 (Strayer ch. 5); Buddha and Confucius
W 29 Sept. Moses, Socrates, Jesus reading worksheet 3 due 10 pm, Thurs. Sept. 30
F 1 Oct. discussion: Axial Age Religions reading: Strayer, Ways, Ch5. "Eurasian Cultural Traditions, 500 BCE-500 CE." Epictetus, selection from Handbook (bb)
Wk 7. POLITICS OF EMPIRE IN ASIA
M 4 Oct. quiz 4 (Strayer ch. 4); First Emperor & His Han Successors
W 6 Oct. Asoka's Empire and Message of Dharma reading worksheet 4 due 10 pm, Thurs. Oct. 7
F 8 Oct. discussion: The Chinese Imperial Tradition Begins reading: Strayer, Ways, Ch4. "Eurasian Empires, 500 BCE-500 CE;" Asoka's Rock Edict XIII; Sima Qian, First Emperor, pp. xxii-xxxiv, 23-52 & 61-94.
Wk. 8. POLITICS OF EMPIRE IN THE WEST
M 11 Oct. quiz 5 (Strayer ch. 6); Rome & Its Imperial Predecessors
W 13 Oct. Fall of the Roman Empire reading worksheet 5 due 10 pm, Thurs. Oct. 14
F 15 Oct. discussion: Barbarians at the Gates reading: Strayer, Ways, Ch6. "Eurasian Social Hierarchies, 500 BCE-500 CE;" Ammianus Marcellinus selection (bb)
Wk 9. SUMMING UP CLASSICAL EMPIRES AND CULTURES
M 18 Oct. Comparing Empires: Han & Roman
W 20 Oct. Comparing Religions in Late Antiquity
F 22 Oct. EXAM 2
PART III -- Cross-Cultural History: Spread of Civilizations, 500-1500
Wk 10. EXPANDING ECONOMIC & CULTURAL SPHERES
M 25 Oct. Silk, Sea, and Sand Roads: An Overview
W 27 Oct. Sinification of Central & East Asia
F 29 Oct. film: "Islam: Empire of Faith, Pt. 1: The Messenger"
reading: Strayer, Ways, Ch8. "Commerce and Culture, 500-1500;" Strayer, Ways, Ch9. "China & World: East Asian Connections."
Wk 11. SPREAD OF ISLAM & CHRISTIANITY
M 1 Nov. quiz 6 (Strayer ch. 10 & 11); Islamic Spain
W 3 Nov. Perspectives on the Crusades reading worksheet 6 due 10 pm Thurs. Nov. 4
F 5 Nov. discussi
|
on: Marco Polo and the Literature of Travel reading: Strayer, Ways, Ch10.
| 9,941
|
inside_word
|
discussion:
|
remove_all
|
<url>
http://www.utexas.edu/cola/files/658370
</url>
<text>
UT-Austin
PREMODERN WORLD HIS 301f (#38985) // AHC 310 (#32050)
MWF 10 to 11 am
Fall 2010
WAG 101
Description.
"Premodern World" is a lower-division, lecture course that provides an overview of global development from roughly 30,000 BCE to 1500 CE. By the end of the semester, students should be able to: 1) define "civilization" and explain theories about the rise and fall of civilizations; 2) compare political, cultural, and socio-economic aspects of premodern societies across Eurasia, Africa, and the Americas; and 3) identify cross-cultural encounters that have had a lasting impact on global history. This team-taught, entry-level course aims to teach historical thinking as well as historical content, to impart a basic grasp of the premodern past as well as to stimulate the development of large-scale frameworks for historical analysis. Although this course has no prerequisites and assumes no prior knowledge of the subject, students are presumed to be capable of critical reflection upon both lectures and readings.
Professor and TA information.
Prof. A. Frazier
Prof. C. Talbot
Hadi Hosainy, TA
[email protected] [email protected]
[email protected]
Office: GAR 2.148
Office: GAR 3.106
Office: Burdine 310
Hrs: T 3-5pm & by apptmt. Hrs: M 11-12 & F 1:30-3:30 Hrs. W 2-4 pm
Readings. Available for purchase (p) at the Co-op or for download from Blackboard (bb):
Strayer, Ways of the World, A Brief Global History with Sources volume I (p)
Anonymous, Epic of Gilgamesh, tr. D. Ferry (p)
Sima Qian, The First Emperor, tr. R. Dawson (p)
Marco Polo, Travels, tr. R. Latham (p)
Ross Dunn, The Adventures of Ibn Battuta (p)
excerpt from Jared Diamond, Collapse (bb)
excerpt from Ammianus Marcellinus, Histories (bb)
excerpt from Epictetus, Handbook (bb)
P. A. McAnany & T. G. Negron, "Bellicose Rulers and Climatological Peril"
in
Questioning Collapse
, ed. P. A. McAnany & Norman Yoffee
(bb)
Asoka's Rock Edict XIII
(bb)
Requirements. Students are expected:
*to attend all lectures
*to prepare all reading assignments thoughtfully by beginning of the week
*to respond to at least six of eight reading worksheets and submit them before class through Blackboard (by 10pm on the required date)
*to participate regularly and responsibly in worksheet-based discussions
*to complete at least six of the eight short factual quizzes
*to complete the three non-cumulative exams
Grading procedure. The three non-cumulative exams will consist of both short answer and essay questions, and will together comprise 60% of the course grade. Eight short, factual, multiple-choice quizzes based on the assigned textbook readings will be administered on Mondays – six of these will count toward the course grade. A series of eight reading worksheets will accompany our non-textbook sources; six will count towards the course grade. Attendance and participation is another component of your final grade. The various aspects of student performance are weighted:
```
exam 1 (Sept. 24) = 20% exam 2 (Oct. 22) = 20% exam 3 (Dec. 8) = 20% (during final exam period) 6 quizzes = 15% (cannot be made up) 6 reading worksheets = 20% (must be turned in before class) attendance & participation = 5%
```
We will NOT be using pluses and minuses for the course grade this semester.
Attendance policy. You are counted present only if you are in class for the entire period. Emergencies will of course be accommodated, but departures immediately following a quiz reflect poorly upon you.
You are allowed two absences no questions asked. After that, unexcused absences will adversely affect your grade. Excused absences require a note to the professors ahead of time insofar as possible. For unexpected absences due to illness or accident, notify us of your situation as soon as possible and document it immediately upon your return.
Quizzes and reading worksheets cannot be made up. Make-up exams will be administered only with the consent of the professors and at their convenience.
Religious holy days sometimes conflict with class and examination schedules. It is the policy of UT-Austin that you must notify each of your instructors at least fourteen days prior to the classes scheduled on dates you will be absent to observe a religious holy day.
Policy on special accommodations. At the beginning of the semester, students who need special accommodations should notify the instructor by presenting a letter prepared by the Services for Students with Disabilities (SDD) Office. To ensure that the most appropriate accommodations can be provided, students should contact the SSD Office at 471-6259 or 471-4641 TTY.
Read more at: http://www.utexas.edu/diversity/ddce/ssd/
Academic integrity. Students who violate University rules on scholastic dishonesty are
subject to disciplinary penalties, including the possibility of failure in the course and/or dismissal from the University. Since such dishonesty harms the individual, all students, and the integrity of the University, policies on scholastic dishonesty will be strictly enforced.
Read details at: http://deanofstudents.utexas.edu/sjs/scholdis.php
Blackboard and laptop/messaging device policy. We will use the course web site on Blackboard to post assignments and make announcements relating to the course – check the site regularly (at least weekly) for new information. It is your responsibility to maintain a functioning email account linked to Blackboard.
Read university policy at: http://www.utexas.edu/its/policies/emailnotify/html
All students have the right to learn in a supportive environment: don't let your use of a laptop or mobile device distract others. All laptops and mobile messaging devices must be turned off and stored away during quizzes and examinations. Their use, WITHOUT ANY SOUND, is acceptable during lectures or class discussions for note-taking or instructor-directed websurfing.
To record audio or visuals of lectures you must have a written consent from both professors.
Keep in touch! If you are having difficulty with the course or must be absent for a period due to personal issues, stop by during office hours or be in touch by email. Don't wait until weeks have passed and it's too late to catch up. The professors and TA for this course sincerely want you to succeed.
*****************************************************
Schedule of Class Meetings & Readings
PART I -- Taking A Global View: Civilization & Its Consequences
Wk 1. INTRODUCTION
W 25 Aug Introduction to Course
F 27 Aug Maps & Mapping
reading: Strayer,Ways, Ch1. "First Peoples, To 10,000 BCE."
Wk 2. AGRICULTURE & ITS IMPACTS
M 30 Aug quiz 1 (on Strayer ch. 2); Paleolithic Art
W 1 Sept. Agricultural Transitions
F 3 Sept. Food Production & the Fertile Crescent
reading: Strayer, Ways, Ch2. "First Farmers, 10,000 BCE-3000 BCE."
Wk 3. THE FIRST CIVILIZATIONS
M 6 Sept. Labor Day Holiday
W 8 Sept. The Urban Revolution in Mesopotamia
F 10 Sept. Other River Valley Civilizations reading: begin Epic of Gilgamesh; Strayer, Ways, Ch3. "First Civilizations, 3500 BCE-500 BCE."
Wk 4. VARYING TRAJECTORIES OF DEVELOPMENT
M 13 Sept. quiz 2 (Strayer ch. 3 & 7); Ruling, Writing, and Gilgamesh reading worksheet 1 due 10 pm, Tues. Sept. 14
W 15 Sept.
discussion: Defining Civilization with Gilgamesh
F 17 Sept. Mesoamerica & the Classical Maya reading: finish Epic of Gilgamesh; Strayer, Ways, Ch7. "Classical Era Variations: Africa & Americas."
Wk 5. SUMMING UP: GLOBAL PATTERNS IN EARLY HISTORY
M 20 Sept. Sub-Saharan Africa & the Bantu Migrations reading worksheet 2 due 10 pm, Tues. Sept. 21
W 22 Sept. discussion: Considering Civilizational Collapse
F 24 Sept. EXAM 1
reading: Jared Diamond, "Prologue" (pp. 1-23) & "The Maya Collapses" (pp. 157-77) in Collapse: How Societies Choose to Fail or Succeed (bb); P. A. McAnany & T. G. Negron, "Bellicose Rulers and Climatological Peril" in Questioning Collapse, ed. P. A. McAnany & Norman Yoffee (bb).
PART II -- Comparative History: Classical Cultures, 500 BCE to 500 CE
Wk 6. RELIGION AND PHILOSOPHY IN THE AXIAL AGE
M 27 Sept. quiz 3 (Strayer ch. 5); Buddha and Confucius
W 29 Sept. Moses, Socrates, Jesus reading worksheet 3 due 10 pm, Thurs. Sept. 30
F 1 Oct. discussion: Axial Age Religions reading: Strayer, Ways, Ch5. "Eurasian Cultural Traditions, 500 BCE-500 CE." Epictetus, selection from Handbook (bb)
Wk 7. POLITICS OF EMPIRE IN ASIA
M 4 Oct. quiz 4 (Strayer ch. 4); First Emperor & His Han Successors
W 6 Oct. Asoka's Empire and Message of Dharma reading worksheet 4 due 10 pm, Thurs. Oct. 7
F 8 Oct. discussion: The Chinese Imperial Tradition Begins reading: Strayer, Ways, Ch4. "Eurasian Empires, 500 BCE-500 CE;" Asoka's Rock Edict XIII; Sima Qian, First Emperor, pp. xxii-xxxiv, 23-52 & 61-94.
Wk. 8. POLITICS OF EMPIRE IN THE WEST
M 11 Oct. quiz 5 (Strayer ch. 6); Rome & Its Imperial Predecessors
W 13 Oct. Fall of the Roman Empire reading worksheet 5 due 10 pm, Thurs. Oct. 14
F 15 Oct. discussion: Barbarians at the Gates reading: Strayer, Ways, Ch6. "Eurasian Social Hierarchies, 500 BCE-500 CE;" Ammianus Marcellinus selection (bb)
Wk 9. SUMMING UP CLASSICAL EMPIRES AND CULTURES
M 18 Oct. Comparing Empires: Han & Roman
W 20 Oct. Comparing Religions in Late Antiquity
F 22 Oct. EXAM 2
PART III -- Cross-Cultural History: Spread of Civilizations, 500-1500
Wk 10. EXPANDING ECONOMIC & CULTURAL SPHERES
M 25 Oct. Silk, Sea, and Sand Roads: An Overview
W 27 Oct. Sinification of Central & East Asia
F 29 Oct. film: "Islam: Empire of Faith, Pt. 1: The Messenger"
reading: Strayer, Ways, Ch8. "Commerce and Culture, 500-1500;" Strayer, Ways, Ch9. "China & World: East Asian Connections."
Wk 11. SPREAD OF ISLAM & CHRISTIANITY
M 1 Nov. quiz 6 (Strayer ch. 10 & 11); Islamic Spain
W 3 Nov. Perspectives on the Crusades reading worksheet 6 due 10 pm Thurs. Nov. 4
F 5 Nov. discussi<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.utexas.edu/cola/files/658370\n</url>\n<text>\nUT-Austin\n\nPREMODERN WORLD HIS 301f (#38985) // AHC 310 (#32050)\n\nMWF 10 to 11 am\n\nFall 2010\n\nWAG 101\n\nDescription.\n\n\"Premodern World\" is a lower-division, lecture course that provides an overview of global development from roughly 30,000 BCE to 1500 CE. By the end of the semester, students should be able to: 1) define \"civilization\" and explain theories about the rise and fall of civilizations; 2) compare political, cultural, and socio-economic aspects of premodern societies across Eurasia, Africa, and the Americas; and 3) identify cross-cultural encounters that have had a lasting impact on global history. This team-taught, entry-level course aims to teach historical thinking as well as historical content, to impart a basic grasp of the premodern past as well as to stimulate the development of large-scale frameworks for historical analysis. Although this course has no prerequisites and assumes no prior knowledge of the subject, students are presumed to be capable of critical reflection upon both lectures and readings.\n\nProfessor and TA information.\n\nProf. A. Frazier\n\nProf. C. Talbot\n\nHadi Hosainy, TA\n\[email protected] [email protected]\n\[email protected]\n\nOffice: GAR 2.148\n\nOffice: GAR 3.106\n\nOffice: Burdine 310\n\nHrs: T 3-5pm & by apptmt. Hrs: M 11-12 & F 1:30-3:30 Hrs. W 2-4 pm\n\nReadings. Available for purchase (p) at the Co-op or for download from Blackboard (bb):\n\nStrayer, Ways of the World, A Brief Global History with Sources volume I (p)\n\nAnonymous, Epic of Gilgamesh, tr. D. Ferry (p)\n\nSima Qian, The First Emperor, tr. R. Dawson (p)\n\nMarco Polo, Travels, tr. R. Latham (p)\n\nRoss Dunn, The Adventures of Ibn Battuta (p)\n\nexcerpt from Jared Diamond, Collapse (bb)\n\nexcerpt from Ammianus Marcellinus, Histories (bb)\n\nexcerpt from Epictetus, Handbook (bb)\n\nP. A. McAnany & T. G. Negron, \"Bellicose Rulers and Climatological Peril\"\n\nin\n\nQuestioning Collapse\n\n, ed. P. A. McAnany & Norman Yoffee\n\n(bb)\n\nAsoka's Rock Edict XIII\n\n(bb)\n\nRequirements. Students are expected:\n\n*to attend all lectures\n\n*to prepare all reading assignments thoughtfully by beginning of the week\n*to respond to at least six of eight reading worksheets and submit them before class through Blackboard (by 10pm on the required date)\n\n*to participate regularly and responsibly in worksheet-based discussions\n\n*to complete at least six of the eight short factual quizzes\n\n*to complete the three non-cumulative exams\n\nGrading procedure. The three non-cumulative exams will consist of both short answer and essay questions, and will together comprise 60% of the course grade. Eight short, factual, multiple-choice quizzes based on the assigned textbook readings will be administered on Mondays – six of these will count toward the course grade. A series of eight reading worksheets will accompany our non-textbook sources; six will count towards the course grade. Attendance and participation is another component of your final grade. The various aspects of student performance are weighted:\n\n```\nexam 1 (Sept. 24) = 20% exam 2 (Oct. 22) = 20% exam 3 (Dec. 8) = 20% (during final exam period) 6 quizzes = 15% (cannot be made up) 6 reading worksheets = 20% (must be turned in before class) attendance & participation = 5%\n```\n\nWe will NOT be using pluses and minuses for the course grade this semester.\n\nAttendance policy. You are counted present only if you are in class for the entire period. Emergencies will of course be accommodated, but departures immediately following a quiz reflect poorly upon you.\n\nYou are allowed two absences no questions asked. After that, unexcused absences will adversely affect your grade. Excused absences require a note to the professors ahead of time insofar as possible. For unexpected absences due to illness or accident, notify us of your situation as soon as possible and document it immediately upon your return.\n\nQuizzes and reading worksheets cannot be made up. Make-up exams will be administered only with the consent of the professors and at their convenience.\n\nReligious holy days sometimes conflict with class and examination schedules. It is the policy of UT-Austin that you must notify each of your instructors at least fourteen days prior to the classes scheduled on dates you will be absent to observe a religious holy day.\n\nPolicy on special accommodations. At the beginning of the semester, students who need special accommodations should notify the instructor by presenting a letter prepared by the Services for Students with Disabilities (SDD) Office. To ensure that the most appropriate accommodations can be provided, students should contact the SSD Office at 471-6259 or 471-4641 TTY.\n\nRead more at: http://www.utexas.edu/diversity/ddce/ssd/\n\nAcademic integrity. Students who violate University rules on scholastic dishonesty are\n\nsubject to disciplinary penalties, including the possibility of failure in the course and/or dismissal from the University. Since such dishonesty harms the individual, all students, and the integrity of the University, policies on scholastic dishonesty will be strictly enforced.\n\nRead details at: http://deanofstudents.utexas.edu/sjs/scholdis.php\n\nBlackboard and laptop/messaging device policy. We will use the course web site on Blackboard to post assignments and make announcements relating to the course – check the site regularly (at least weekly) for new information. It is your responsibility to maintain a functioning email account linked to Blackboard.\n\nRead university policy at: http://www.utexas.edu/its/policies/emailnotify/html\n\nAll students have the right to learn in a supportive environment: don't let your use of a laptop or mobile device distract others. All laptops and mobile messaging devices must be turned off and stored away during quizzes and examinations. Their use, WITHOUT ANY SOUND, is acceptable during lectures or class discussions for note-taking or instructor-directed websurfing.\n\nTo record audio or visuals of lectures you must have a written consent from both professors.\n\nKeep in touch! If you are having difficulty with the course or must be absent for a period due to personal issues, stop by during office hours or be in touch by email. Don't wait until weeks have passed and it's too late to catch up. The professors and TA for this course sincerely want you to succeed.\n\n*****************************************************\n\nSchedule of Class Meetings & Readings\n\nPART I -- Taking A Global View: Civilization & Its Consequences\n\nWk 1. INTRODUCTION\n\nW 25 Aug Introduction to Course\n\nF 27 Aug Maps & Mapping\n\nreading: Strayer,Ways, Ch1. \"First Peoples, To 10,000 BCE.\"\n\nWk 2. AGRICULTURE & ITS IMPACTS\n\nM 30 Aug quiz 1 (on Strayer ch. 2); Paleolithic Art\n\nW 1 Sept. Agricultural Transitions\n\nF 3 Sept. Food Production & the Fertile Crescent\n\nreading: Strayer, Ways, Ch2. \"First Farmers, 10,000 BCE-3000 BCE.\"\n\nWk 3. THE FIRST CIVILIZATIONS\n\nM 6 Sept. Labor Day Holiday\n\nW 8 Sept. The Urban Revolution in Mesopotamia\n\nF 10 Sept. Other River Valley Civilizations reading: begin Epic of Gilgamesh; Strayer, Ways, Ch3. \"First Civilizations, 3500 BCE-500 BCE.\"\n\nWk 4. VARYING TRAJECTORIES OF DEVELOPMENT\n\nM 13 Sept. quiz 2 (Strayer ch. 3 & 7); Ruling, Writing, and Gilgamesh reading worksheet 1 due 10 pm, Tues. Sept. 14\n\nW 15 Sept.\n\ndiscussion: Defining Civilization with Gilgamesh\n\nF 17 Sept. Mesoamerica & the Classical Maya reading: finish Epic of Gilgamesh; Strayer, Ways, Ch7. \"Classical Era Variations: Africa & Americas.\"\n\nWk 5. SUMMING UP: GLOBAL PATTERNS IN EARLY HISTORY\n\nM 20 Sept. Sub-Saharan Africa & the Bantu Migrations reading worksheet 2 due 10 pm, Tues. Sept. 21\n\nW 22 Sept. discussion: Considering Civilizational Collapse\n\nF 24 Sept. EXAM 1\n\nreading: Jared Diamond, \"Prologue\" (pp. 1-23) & \"The Maya Collapses\" (pp. 157-77) in Collapse: How Societies Choose to Fail or Succeed (bb); P. A. McAnany & T. G. Negron, \"Bellicose Rulers and Climatological Peril\" in Questioning Collapse, ed. P. A. McAnany & Norman Yoffee (bb).\n\nPART II -- Comparative History: Classical Cultures, 500 BCE to 500 CE\n\nWk 6. RELIGION AND PHILOSOPHY IN THE AXIAL AGE\n\nM 27 Sept. quiz 3 (Strayer ch. 5); Buddha and Confucius\n\nW 29 Sept. Moses, Socrates, Jesus reading worksheet 3 due 10 pm, Thurs. Sept. 30\n\nF 1 Oct. discussion: Axial Age Religions reading: Strayer, Ways, Ch5. \"Eurasian Cultural Traditions, 500 BCE-500 CE.\" Epictetus, selection from Handbook (bb)\n\nWk 7. POLITICS OF EMPIRE IN ASIA\n\nM 4 Oct. quiz 4 (Strayer ch. 4); First Emperor & His Han Successors\n\nW 6 Oct. Asoka's Empire and Message of Dharma reading worksheet 4 due 10 pm, Thurs. Oct. 7\n\nF 8 Oct. discussion: The Chinese Imperial Tradition Begins reading: Strayer, Ways, Ch4. \"Eurasian Empires, 500 BCE-500 CE;\" Asoka's Rock Edict XIII; Sima Qian, First Emperor, pp. xxii-xxxiv, 23-52 & 61-94.\n\nWk. 8. POLITICS OF EMPIRE IN THE WEST\n\nM 11 Oct. quiz 5 (Strayer ch. 6); Rome & Its Imperial Predecessors\n\nW 13 Oct. Fall of the Roman Empire reading worksheet 5 due 10 pm, Thurs. Oct. 14\n\nF 15 Oct. discussion: Barbarians at the Gates reading: Strayer, Ways, Ch6. \"Eurasian Social Hierarchies, 500 BCE-500 CE;\" Ammianus Marcellinus selection (bb)\n\nWk 9. SUMMING UP CLASSICAL EMPIRES AND CULTURES\n\nM 18 Oct. Comparing Empires: Han & Roman\n\nW 20 Oct. Comparing Religions in Late Antiquity\n\nF 22 Oct. EXAM 2\n\nPART III -- Cross-Cultural History: Spread of Civilizations, 500-1500\n\nWk 10. EXPANDING ECONOMIC & CULTURAL SPHERES\n\nM 25 Oct. Silk, Sea, and Sand Roads: An Overview\n\nW 27 Oct. Sinification of Central & East Asia\n\nF 29 Oct. film: \"Islam: Empire of Faith, Pt. 1: The Messenger\"\n\nreading: Strayer, Ways, Ch8. \"Commerce and Culture, 500-1500;\" Strayer, Ways, Ch9. \"China & World: East Asian Connections.\"\n\nWk 11. SPREAD OF ISLAM & CHRISTIANITY\n\nM 1 Nov. quiz 6 (Strayer ch. 10 & 11); Islamic Spain\n\nW 3 Nov. Perspectives on the Crusades reading worksheet 6 due 10 pm Thurs. Nov. 4\n\nF 5 Nov. discussi<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "on: Marco Polo and the Literature of Travel reading: Strayer, Ways, Ch10.",
"role": "assistant"
}
] |
|
MEMORANDUM
April 20, 2020
To:
Jessica Kinard City Budget Office
Re: FY 2019-20 Police Bureau Spring BMP Submittal
Current Year Projections
Expense and revenue projections with variances to the Spring Revised Budget are summarized below:
General Fund
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. This small margin is impacted by the bureau's $2.0 million one-time reduction of Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Grants Fund
This submission includes a request for an increase in appropriation backed by grant awards. The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal yearend. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 202021 Fall BMP adjustments.
Police Special Revenue Fund
The expenditure projection is $700,000, with revenue projected to reach $310,000, and an increase in fund balance of $408,000. The bureau has included in this submission a revenue package for technical and resource adjustments within this fund.
PL - Portland Police Bureau
Request Name: 9723 -PL Tech Adjust
Package Description
This package consists of a handful of technical adjustments made within bureau funds to align budget and expense by major object category.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
There are no equity impacts as a result of these adjustments.
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type Technical Adjustments
Run Date: 4/20/20
Run Time: 11:45:29 AM
PL - Portland Police Bureau DP Type Technical Adjustments
Request Name: 9876 -PL Grant Adjust
Package Description
This package includes adjustments to appropriations in the Grants Fund for existing grant programs to conform to planned expenditures. The funding increase is backed by grant awards already received and accepted by the City but have not yet been appropriated. Net adjustments increase the Grants Fund appropriation by $174,928. Adjustments to local matching General Fund discretionary funds appropriations are balanced so there is no net change to existing General Fund appropriation to the Police Bureau.
Service Impacts
These adjustments will have no impact on service.
Equity Impacts
These adjustments have zero impact on equity beyond the underlying effects of the underlying programs.
PL - Portland Police Bureau
Request Name: 9932 -PL Revenue Recognition
Package Description
The Police Bureau is increasing external revenue to the Police Special Revenue Fund by $51,640 in order to align the budget with actual resources received from partners to the Regional Justice Information Network (RegJIN) program. These new resources are offset by an increased share of the expense for the system.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
There are no equity impacts as a result of these adjustments.
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type New Revenue
PL - Portland Police Bureau
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type GF Program Carryover
Request Name:
9974 -PL Program Carryover Request
Package Description
The bureau requests a set of program carryovers to FY 2020-21 which will reduce the Spring Revised budget by $1.3 million. These carryovers are designated for planned purchases and projects that cannot be completed within the current fiscal year for a variety of reasons. Most of these carryovers represent infrastructure maintenance, and one is funding for the initial equipment purchase associated with bodyworn cameras. The following list outlines the current budget reductions and provides additional details for items requested for carryover :
* Electronics upgrade for Central Precinct ($120,000): this is the system responsible for ensuring secure access control to the Justice Center building. The expense is being processed as an emergency procurement due to the immediacy with which this upgrade is required; however, due to contractor scheduling, this will not be complete before June 30, 2020. Further deterioration of the current system would necessitate assigning an individual to specifically monitor external access points.
* Security camera upgrade for Central Precinct ($120,000): Central Precinct is the only bureau precinct location without camera security over its full building and vehicle storage locations. Additionally, current system limitations prevent the bureau from being able to extract video recordings in the event of an incident in the precinct. Contractor scheduling precludes the ability to complete this upgrade in the current Fiscal Year.
* Training Division elevator study ($50,000): a system study is required before there can be forward progress in putting an elevator into the Training Division building. The undeveloped second floor space will provide flexibility and ability in the bureau's space allocations, creating opportunities for future cost savings. Buildout and development of this space cannot proceed without a plan for the elevator.
* Update and modernize first floor of Kelly Building ($200,000): as the bureau moves towards full occupancy of the Kelly Building, these dollars will be used for necessary tenant improvements, updates to community spaces, and moving into the space. The bureau had anticipated this taking place in the current Fiscal Years, but delays in the process of Multnomah County moving out of the building have pushed the timeline of this project.
* Body-worn camera equipment carryover ($834,619): this sum of money is the one-time funding for the initial equipment purchase associated with body-worn cameras. The bureau will not be incurring these equipment costs in the current Fiscal Year as policy and program development are not complete.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
Most carryover requests do not have a direct impact on equity. Future Kelly Building improvements enhance the bureau's ability to more equitably provide service to populations within Portland due to its location and available parking.
F4 - BMP Amendment Request Report (Spring Requested)
Run Date: 4/20/20
Run Time: 11:45:29 AM
PL - Portland Police Bureau
DP Type Compensation Set-Aside
Request Name: 9976 -PL Compensation Set-Aside Request
Package Description
The bureau requests $3.0 million of the $5.5 million in General Fund contingency that was earmarked as compensation set-aside to cover wage and benefit costs increases. Substantial sworn vacancies have severely constrained the number of officers available for patrol, and overtime hours used to meet minimum staffing of patrol shifts has offset a significant portion of vacancy savings to meet this need. Additionally offsetting available personnel resources to cover wage and benefit cost increases, the bureau sustained a $2.0 million one-time reduction in Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. This request would establish adequate, stable funding for the projected over-expenditure in bureau personnel services and allow for more variable savings in materials and services budgets to fall to General Fund balance in support of projected shortfalls resulting from COVID-19 effects on Citywide revenue.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
This package has no equity impact, positive or negative, beyond that of the services provided by the Police Bureau.
Account Name
2019-20 SPRING Requested
Adj
Expense
Personnel
3,000,000
Expense
Sum:
3,000,000
Account Name
2019-20 SPRING Requested
Adj
Revenue
General Fund Discretionary
3,000,000
Revenue
Sum:
3,000,000
Portland Police Bureau - Fund 100
Revenue Discussion
External revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.
Revenue Risks
The bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.
Expenditure Discussion
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Expenditure Risks
As the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 100
375%
82%
100%
102%
100%
99%
79%
100%
98%
93%
100%
37%
99%
99%
Revenue Discussion
External revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.
Revenue Risks
The bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.
Expenditure Discussion
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Expenditure Risks
As the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.
Portland Police Bureau - Fund 217
Revenue Discussion
This submission includes a request for an increase in appropriation backed by grant awards.
Revenue Risks
At this time there are no known risks to existing grant awards.
Expenditure Discussion
The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal year-end. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 2020-21 Fall BMP adjustments.
Expenditure Risks
Reimbursable grant personnel activity may be slowed in favor of supporting core and essential bureau functions.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 217
128,107
156,131
44,112
519,146
847,496
345,355
345,355
1,192,851
Revenue Discussion
This submission includes a request for an increase in appropriation backed by grant awards.
Revenue Risks
At this time there are no known risks to existing grant awards.
Expenditure Discussion
The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal year-end. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 2020-21 Fall BMP adjustments.
Expenditure Risks
Reimbursable grant personnel activity may be slowed in favor of supporting core and essential bureau functions.
Portland Police Bureau - Fund 222
Revenue Discussion
Revenue is projected to reach $310,000 for the current year.
Revenue Risks
Reassigned resources from the unit that would typically bring in new revenues by result of their investigation may impact future revenue.
Expenditure Discussion
The expense projection is across sub-funds and is inclusive of adjustments to the Regional Justice Information Network program.
Expenditure Risks
Decisions to expend resources from this fund have been significantly slowed in anticipation of the procurement of a new Records Management System.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 222
357,265
129,267
4,128
0
490,661
0
191,323
127,015
318,338
808,998
Revenue Discussion
Revenue is projected to reach $310,000 for the current year.
Revenue Risks
Reassigned resources from the unit that would typically bring in new revenues by result of their investigation may impact future revenue.
Expenditure Discussion
The expense projection is across sub-funds and is inclusive of adjustments to the Regional Justice Information Network program.
Expenditure Risks
Decisions to expend resources from this fund have been significantly slowed in anticipation of the procurement of a new Records Management System.
Portland Police Bureau - Fund 227
Revenue Discussion
Revenue Risks
Fund balance is dependent upon consumer behavior, potentially affecting fund appropriations.
Expenditure Discussion
The Police Bureau manages a separate sub-fund that provides resources to support a portion of the bureau's Traffic Safety program, which supports the City's Vision Zero initiative. City Code restricts the purposes for which recreational cannabis tax revenue may be used, one of which is to support public safety, including police, fire, and transportation safety purposes that protect community members from unsafe drivers. The full appropriation of $2.23 million has been spent.
Expenditure Risks
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 227
2,227,141
2,227,141
0
0
2,227,141
Revenue Discussion
Revenue Risks
Fund balance is dependent upon consumer behavior, potentially affecting fund appropriations.
Expenditure Discussion
The Police Bureau manages a separate sub-fund that provides resources to support a portion of the bureau's Traffic Safety program, which supports the City's Vision Zero initiative. City Code restricts the purposes for which recreational cannabis tax revenue may be used, one of which is to support public safety, including police, fire, and transportation safety purposes that protect community members from unsafe drivers. The full appropriation of $2.23 million has been spent.
Expenditure Risks
|
<urn:uuid:d78dc590-f206-465a-8277-aa46169a2e56>
|
CC-MAIN-2020-24
|
https://www.portlandoregon.gov/cbo/article/759937
|
2020-05-28T21:29:03+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-24/subset=warc/part-00196-b4a094ce-c3a1-4796-8c26-d927e48e4b4a.c000.gz.parquet
| 867,117,104
| 3,412
|
eng_Latn
|
eng_Latn
| 0.93866
|
eng_Latn
| 0.995905
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dan_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1823,
2283,
3138,
3772,
6905,
8544,
10549,
10725,
12675,
13305,
14053,
14644,
15356,
16044,
16816
] |
MEMORANDUM
April 20, 2020
To:
Jessica Kinard City Budget Office
Re: FY 2019-20 Police Bureau Spring BMP Submittal
Current Year Projections
Expense and revenue projections with variances to the Spring Revised Budget are summarized below:
General Fund
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. This small margin is impacted by the bureau's $2.0 million one-time reduction of Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Grants Fund
This submission includes a request for an increase in appropriation backed by grant awards. The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal yearend. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 202021 Fall BMP adjustments.
Police Special Revenue Fund
The expenditure projection is $700,000, with revenue projected to reach $310,000, and an increase in fund balance of $408,000. The bureau has included in this submission a revenue package for technical and resource adjustments within this fund.
PL - Portland Police Bureau
Request Name: 9723 -PL Tech Adjust
Package Description
This package consists of a handful of technical adjustments made within bureau funds to align budget and expense by major object category.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
There are no equity impacts as a result of these adjustments.
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type Technical Adjustments
Run Date: 4/20/20
Run Time: 11:45:29 AM
PL - Portland Police Bureau DP Type Technical Adjustments
Request Name: 9876 -PL Grant Adjust
Package Description
This package includes adjustments to appropriations in the Grants Fund for existing grant programs to conform to planned expenditures. The funding increase is backed by grant awards already received and accepted by the City but have not yet been appropriated. Net adjustments increase the Grants Fund appropriation by $174,928. Adjustments to local matching General Fund discretionary funds appropriations are balanced so there is no net change to existing General Fund appropriation to the Police Bureau.
Service Impacts
These adjustments will have no impact on service.
Equity Impacts
These adjustments have zero impact on equity beyond the underlying effects of the underlying programs.
PL - Portland Police Bureau
Request Name: 9932 -PL Revenue Recognition
Package Description
The Police Bureau is increasing external revenue to the Police Special Revenue Fund by $51,640 in order to align the budget with actual resources received from partners to the Regional Justice Information Network (RegJIN) program. These new resources are offset by an increased share of the expense for the system.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
There are no equity impacts as a result of these adjustments.
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type New Revenue
PL - Portland Police Bureau
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type GF Program Carryover
Request Name:
9974 -PL Program Carryover Request
Package Description
The bureau requests a set of program carryovers to FY 2020-21 which will reduce the Spring Revised budget by $1.3 million. These carryovers are designated for planned purchases and projects that cannot be completed within the current fiscal year for a variety of reasons. Most of these carryovers represent infrastructure maintenance, and one is funding for the initial equipment purchase associated with bodyworn cameras. The following list outlines the current budget reductions and provides additional details for items requested for carryover :
* Electronics upgrade for Central Precinct ($120,000): this is the system responsible for ensuring secure access control to the Justice Center building. The expense is being processed as an emergency procurement due to the immediacy with which this upgrade is required; however, due to contractor scheduling, this will not be complete before June 30, 2020. Further deterioration of the current system would necessitate assigning an individual to specifically monitor external access points.
* Security camera upgrade for Central Precinct ($120,000): Central Precinct is the only bureau precinct location without camera security over its full building and vehicle storage locations. Additionally, current system limitations prevent the bureau from being able to extract video recordings in the event of an incident in the precinct. Contractor scheduling precludes the ability to complete this upgrade in the current Fiscal Year.
* Training Division elevator study ($50,000): a system study is required before there can be forward progress in putting an elevator into the Training Division building. The undeveloped second floor space will provide flexibility and ability in the bureau's space allocations, creating opportunities for future cost savings. Buildout and development of this space cannot proceed without a plan for the elevator.
* Update and modernize first floor of Kelly Building ($200,000): as the bureau moves towards full occupancy of the Kelly Building, these dollars will be used for necessary tenant improvements, updates to community spaces, and moving into the space. The bureau had anticipated this taking place in the current Fiscal Years, but delays in the process of Multnomah County moving out of the building have pushed the timeline of this project.
* Body-worn camera equipment carryover ($834,619): this sum of money is the one-time funding for the initial equipment purchase associated with body-worn cameras. The bureau will not be incurring these equipment costs in the current Fiscal Year as policy and program development are not complete.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
Most carryover requests do not have a direct impact on equity. Future Kelly Building improvements enhance the bureau's ability to more equitably provide service to populations within Portland due to its location and available parking.
F4 - BMP Amendment Request Report (Spring Requested)
Run Date: 4/20/20
Run Time: 11:45:29 AM
PL - Portland Police Bureau
DP Type Compensation Set-Aside
Request Name: 9976 -PL Compensation Set-Aside Request
Package Description
The bureau requests $3.0 million of the $5.5 million in General Fund contingency that was earmarked as compensation set-aside to cover wage and benefit costs increases. Substantial sworn vacancies have severely constrained the number of officers available for patrol, and overtime hours used to meet minimum staffing of patrol shifts has offset a significant portion of vacancy savings to meet this need. Additionally offsetting available personnel resources to cover wage and benefit cost increases, the bureau sustained a $2.0 million one-time reduction in Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. This request would establish adequate, stable funding for the projected over-expenditure in bureau personnel services and allow for more variable savings in materials and services budgets to fall to General Fund balance in support of projected shortfalls resulting from COVID-19 effects on Citywide revenue.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
This package has no equity impact, positive or negative, beyond that of the services provided by the Police Bureau.
Account Name
2019-20 SPRING Requested
Adj
Expense
Personnel
3,000,000
Expense
Sum:
3,000,000
Account Name
2019-20 SPRING Requested
Adj
Revenue
General Fund Discretionary
3,000,000
Revenue
Sum:
3,000,000
Portland Police Bureau - Fund 100
Revenue Discussion
External revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.
Revenue Risks
The bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.
Expenditure Discussion
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Expenditure Risks
As the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 100
375%
82%
100%
102%
100%
99%
79%
100%
98%
93%
100%
37%
99%
99%
Revenue Discussion
External revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.
Revenue Risks
The bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.
Expenditure Discussion
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Expenditure Risks
As the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.
Portland Police Bureau - Fund 217
Revenue Discussion
This submission includes a request for an increase in appropriation backed by grant awards.
Revenue Risks
At this time there are no known risks to existing grant awards.
Expenditure Discussion
The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal year-end. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 2020-21 Fall BMP adjustments.
Expenditure Risks
Reimbursable grant personnel activity may be slowed in favor of supporting core and essential bureau functions.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 217
128,107
156,131
44,112
519,146
847,496
345,355
345,355
1,192,851
Revenue Discussion
This submission includes a request for an increase in appropriation backed by grant awards.
Revenue Risks
At this time there are no known risks to existing grant awards.
Expenditure Discussion
The bureau projects expenditure of $1.4 million in
|
FY 2019-20, which will leave a favorable balance at fiscal year-end.
| 13,728
|
inside_word
|
FY
|
remove_all
|
<url>
https://www.portlandoregon.gov/cbo/article/759937
</url>
<text>
MEMORANDUM
April 20, 2020
To:
Jessica Kinard City Budget Office
Re: FY 2019-20 Police Bureau Spring BMP Submittal
Current Year Projections
Expense and revenue projections with variances to the Spring Revised Budget are summarized below:
General Fund
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. This small margin is impacted by the bureau's $2.0 million one-time reduction of Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Grants Fund
This submission includes a request for an increase in appropriation backed by grant awards. The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal yearend. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 202021 Fall BMP adjustments.
Police Special Revenue Fund
The expenditure projection is $700,000, with revenue projected to reach $310,000, and an increase in fund balance of $408,000. The bureau has included in this submission a revenue package for technical and resource adjustments within this fund.
PL - Portland Police Bureau
Request Name: 9723 -PL Tech Adjust
Package Description
This package consists of a handful of technical adjustments made within bureau funds to align budget and expense by major object category.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
There are no equity impacts as a result of these adjustments.
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type Technical Adjustments
Run Date: 4/20/20
Run Time: 11:45:29 AM
PL - Portland Police Bureau DP Type Technical Adjustments
Request Name: 9876 -PL Grant Adjust
Package Description
This package includes adjustments to appropriations in the Grants Fund for existing grant programs to conform to planned expenditures. The funding increase is backed by grant awards already received and accepted by the City but have not yet been appropriated. Net adjustments increase the Grants Fund appropriation by $174,928. Adjustments to local matching General Fund discretionary funds appropriations are balanced so there is no net change to existing General Fund appropriation to the Police Bureau.
Service Impacts
These adjustments will have no impact on service.
Equity Impacts
These adjustments have zero impact on equity beyond the underlying effects of the underlying programs.
PL - Portland Police Bureau
Request Name: 9932 -PL Revenue Recognition
Package Description
The Police Bureau is increasing external revenue to the Police Special Revenue Fund by $51,640 in order to align the budget with actual resources received from partners to the Regional Justice Information Network (RegJIN) program. These new resources are offset by an increased share of the expense for the system.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
There are no equity impacts as a result of these adjustments.
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type New Revenue
PL - Portland Police Bureau
Run Date: 4/20/20
Run Time: 11:45:29 AM
DP Type GF Program Carryover
Request Name:
9974 -PL Program Carryover Request
Package Description
The bureau requests a set of program carryovers to FY 2020-21 which will reduce the Spring Revised budget by $1.3 million. These carryovers are designated for planned purchases and projects that cannot be completed within the current fiscal year for a variety of reasons. Most of these carryovers represent infrastructure maintenance, and one is funding for the initial equipment purchase associated with bodyworn cameras. The following list outlines the current budget reductions and provides additional details for items requested for carryover :
* Electronics upgrade for Central Precinct ($120,000): this is the system responsible for ensuring secure access control to the Justice Center building. The expense is being processed as an emergency procurement due to the immediacy with which this upgrade is required; however, due to contractor scheduling, this will not be complete before June 30, 2020. Further deterioration of the current system would necessitate assigning an individual to specifically monitor external access points.
* Security camera upgrade for Central Precinct ($120,000): Central Precinct is the only bureau precinct location without camera security over its full building and vehicle storage locations. Additionally, current system limitations prevent the bureau from being able to extract video recordings in the event of an incident in the precinct. Contractor scheduling precludes the ability to complete this upgrade in the current Fiscal Year.
* Training Division elevator study ($50,000): a system study is required before there can be forward progress in putting an elevator into the Training Division building. The undeveloped second floor space will provide flexibility and ability in the bureau's space allocations, creating opportunities for future cost savings. Buildout and development of this space cannot proceed without a plan for the elevator.
* Update and modernize first floor of Kelly Building ($200,000): as the bureau moves towards full occupancy of the Kelly Building, these dollars will be used for necessary tenant improvements, updates to community spaces, and moving into the space. The bureau had anticipated this taking place in the current Fiscal Years, but delays in the process of Multnomah County moving out of the building have pushed the timeline of this project.
* Body-worn camera equipment carryover ($834,619): this sum of money is the one-time funding for the initial equipment purchase associated with body-worn cameras. The bureau will not be incurring these equipment costs in the current Fiscal Year as policy and program development are not complete.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
Most carryover requests do not have a direct impact on equity. Future Kelly Building improvements enhance the bureau's ability to more equitably provide service to populations within Portland due to its location and available parking.
F4 - BMP Amendment Request Report (Spring Requested)
Run Date: 4/20/20
Run Time: 11:45:29 AM
PL - Portland Police Bureau
DP Type Compensation Set-Aside
Request Name: 9976 -PL Compensation Set-Aside Request
Package Description
The bureau requests $3.0 million of the $5.5 million in General Fund contingency that was earmarked as compensation set-aside to cover wage and benefit costs increases. Substantial sworn vacancies have severely constrained the number of officers available for patrol, and overtime hours used to meet minimum staffing of patrol shifts has offset a significant portion of vacancy savings to meet this need. Additionally offsetting available personnel resources to cover wage and benefit cost increases, the bureau sustained a $2.0 million one-time reduction in Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. This request would establish adequate, stable funding for the projected over-expenditure in bureau personnel services and allow for more variable savings in materials and services budgets to fall to General Fund balance in support of projected shortfalls resulting from COVID-19 effects on Citywide revenue.
Service Impacts
There are no service impacts as a result of these adjustments.
Equity Impacts
This package has no equity impact, positive or negative, beyond that of the services provided by the Police Bureau.
Account Name
2019-20 SPRING Requested
Adj
Expense
Personnel
3,000,000
Expense
Sum:
3,000,000
Account Name
2019-20 SPRING Requested
Adj
Revenue
General Fund Discretionary
3,000,000
Revenue
Sum:
3,000,000
Portland Police Bureau - Fund 100
Revenue Discussion
External revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.
Revenue Risks
The bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.
Expenditure Discussion
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Expenditure Risks
As the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 100
375%
82%
100%
102%
100%
99%
79%
100%
98%
93%
100%
37%
99%
99%
Revenue Discussion
External revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.
Revenue Risks
The bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.
Expenditure Discussion
Projected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.
Expenditure Risks
As the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.
Portland Police Bureau - Fund 217
Revenue Discussion
This submission includes a request for an increase in appropriation backed by grant awards.
Revenue Risks
At this time there are no known risks to existing grant awards.
Expenditure Discussion
The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal year-end. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 2020-21 Fall BMP adjustments.
Expenditure Risks
Reimbursable grant personnel activity may be slowed in favor of supporting core and essential bureau functions.
Sum:
Sum:
Business Area Projection Report
Portland Police Bureau - Fund 217
128,107
156,131
44,112
519,146
847,496
345,355
345,355
1,192,851
Revenue Discussion
This submission includes a request for an increase in appropriation backed by grant awards.
Revenue Risks
At this time there are no known risks to existing grant awards.
Expenditure Discussion
The bureau projects expenditure of $1.4 million in <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.portlandoregon.gov/cbo/article/759937\n</url>\n<text>\nMEMORANDUM\n\nApril 20, 2020\n\nTo:\n\nJessica Kinard City Budget Office\n\nRe: FY 2019-20 Police Bureau Spring BMP Submittal\n\nCurrent Year Projections\n\nExpense and revenue projections with variances to the Spring Revised Budget are summarized below:\n\nGeneral Fund\n\nProjected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. This small margin is impacted by the bureau's $2.0 million one-time reduction of Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.\n\nGrants Fund\n\nThis submission includes a request for an increase in appropriation backed by grant awards. The bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal yearend. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 202021 Fall BMP adjustments.\n\nPolice Special Revenue Fund\n\nThe expenditure projection is $700,000, with revenue projected to reach $310,000, and an increase in fund balance of $408,000. The bureau has included in this submission a revenue package for technical and resource adjustments within this fund.\n\nPL - Portland Police Bureau\n\nRequest Name: 9723 -PL Tech Adjust\n\nPackage Description\n\nThis package consists of a handful of technical adjustments made within bureau funds to align budget and expense by major object category.\n\nService Impacts\n\nThere are no service impacts as a result of these adjustments.\n\nEquity Impacts\n\nThere are no equity impacts as a result of these adjustments.\n\nRun Date: 4/20/20\n\nRun Time: 11:45:29 AM\n\nDP Type Technical Adjustments\n\nRun Date: 4/20/20\n\nRun Time: 11:45:29 AM\n\nPL - Portland Police Bureau DP Type Technical Adjustments\n\nRequest Name: 9876 -PL Grant Adjust\n\nPackage Description\n\nThis package includes adjustments to appropriations in the Grants Fund for existing grant programs to conform to planned expenditures. The funding increase is backed by grant awards already received and accepted by the City but have not yet been appropriated. Net adjustments increase the Grants Fund appropriation by $174,928. Adjustments to local matching General Fund discretionary funds appropriations are balanced so there is no net change to existing General Fund appropriation to the Police Bureau.\n\nService Impacts\n\nThese adjustments will have no impact on service.\n\nEquity Impacts\n\nThese adjustments have zero impact on equity beyond the underlying effects of the underlying programs.\n\nPL - Portland Police Bureau\n\nRequest Name: 9932 -PL Revenue Recognition\n\nPackage Description\n\nThe Police Bureau is increasing external revenue to the Police Special Revenue Fund by $51,640 in order to align the budget with actual resources received from partners to the Regional Justice Information Network (RegJIN) program. These new resources are offset by an increased share of the expense for the system.\n\nService Impacts\n\nThere are no service impacts as a result of these adjustments.\n\nEquity Impacts\n\nThere are no equity impacts as a result of these adjustments.\n\nRun Date: 4/20/20\n\nRun Time: 11:45:29 AM\n\nDP Type New Revenue\n\nPL - Portland Police Bureau\n\nRun Date: 4/20/20\n\nRun Time: 11:45:29 AM\n\nDP Type GF Program Carryover\n\nRequest Name:\n\n9974 -PL Program Carryover Request\n\nPackage Description\n\nThe bureau requests a set of program carryovers to FY 2020-21 which will reduce the Spring Revised budget by $1.3 million. These carryovers are designated for planned purchases and projects that cannot be completed within the current fiscal year for a variety of reasons. Most of these carryovers represent infrastructure maintenance, and one is funding for the initial equipment purchase associated with bodyworn cameras. The following list outlines the current budget reductions and provides additional details for items requested for carryover :\n\n* Electronics upgrade for Central Precinct ($120,000): this is the system responsible for ensuring secure access control to the Justice Center building. The expense is being processed as an emergency procurement due to the immediacy with which this upgrade is required; however, due to contractor scheduling, this will not be complete before June 30, 2020. Further deterioration of the current system would necessitate assigning an individual to specifically monitor external access points.\n* Security camera upgrade for Central Precinct ($120,000): Central Precinct is the only bureau precinct location without camera security over its full building and vehicle storage locations. Additionally, current system limitations prevent the bureau from being able to extract video recordings in the event of an incident in the precinct. Contractor scheduling precludes the ability to complete this upgrade in the current Fiscal Year.\n* Training Division elevator study ($50,000): a system study is required before there can be forward progress in putting an elevator into the Training Division building. The undeveloped second floor space will provide flexibility and ability in the bureau's space allocations, creating opportunities for future cost savings. Buildout and development of this space cannot proceed without a plan for the elevator.\n* Update and modernize first floor of Kelly Building ($200,000): as the bureau moves towards full occupancy of the Kelly Building, these dollars will be used for necessary tenant improvements, updates to community spaces, and moving into the space. The bureau had anticipated this taking place in the current Fiscal Years, but delays in the process of Multnomah County moving out of the building have pushed the timeline of this project.\n* Body-worn camera equipment carryover ($834,619): this sum of money is the one-time funding for the initial equipment purchase associated with body-worn cameras. The bureau will not be incurring these equipment costs in the current Fiscal Year as policy and program development are not complete.\n\nService Impacts\n\nThere are no service impacts as a result of these adjustments.\n\nEquity Impacts\n\nMost carryover requests do not have a direct impact on equity. Future Kelly Building improvements enhance the bureau's ability to more equitably provide service to populations within Portland due to its location and available parking.\n\nF4 - BMP Amendment Request Report (Spring Requested)\n\nRun Date: 4/20/20\n\nRun Time: 11:45:29 AM\n\nPL - Portland Police Bureau\n\nDP Type Compensation Set-Aside\n\nRequest Name: 9976 -PL Compensation Set-Aside Request\n\nPackage Description\n\nThe bureau requests $3.0 million of the $5.5 million in General Fund contingency that was earmarked as compensation set-aside to cover wage and benefit costs increases. Substantial sworn vacancies have severely constrained the number of officers available for patrol, and overtime hours used to meet minimum staffing of patrol shifts has offset a significant portion of vacancy savings to meet this need. Additionally offsetting available personnel resources to cover wage and benefit cost increases, the bureau sustained a $2.0 million one-time reduction in Current Appropriation Level in the FY 2019-20 Adopted Budget predicated on projected vacancy savings. This request would establish adequate, stable funding for the projected over-expenditure in bureau personnel services and allow for more variable savings in materials and services budgets to fall to General Fund balance in support of projected shortfalls resulting from COVID-19 effects on Citywide revenue.\n\nService Impacts\n\nThere are no service impacts as a result of these adjustments.\n\nEquity Impacts\n\nThis package has no equity impact, positive or negative, beyond that of the services provided by the Police Bureau.\n\nAccount Name\n\n2019-20 SPRING Requested\n\nAdj\n\nExpense\n\nPersonnel\n\n3,000,000\n\nExpense\n\nSum:\n\n3,000,000\n\nAccount Name\n\n2019-20 SPRING Requested\n\nAdj\n\nRevenue\n\nGeneral Fund Discretionary\n\n3,000,000\n\nRevenue\n\nSum:\n\n3,000,000\n\nPortland Police Bureau - Fund 100\n\nRevenue Discussion\n\nExternal revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.\n\nRevenue Risks\n\nThe bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.\n\nExpenditure Discussion\n\nProjected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.\n\nExpenditure Risks\n\nAs the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.\n\nSum:\n\nSum:\n\nBusiness Area Projection Report\n\nPortland Police Bureau - Fund 100\n\n375%\n\n82%\n\n100%\n\n102%\n\n100%\n\n99%\n\n79%\n\n100%\n\n98%\n\n93%\n\n100%\n\n37%\n\n99%\n\n99%\n\nRevenue Discussion\n\nExternal revenue is projected to be $1.5 million short of target due to shortfalls in secondary employment, photo enforcement, transit, and alarm registrations. Interfund revenue is projected to be short of target by $1.2 million due to high sworn vacancies and conservative budgeting of FPDR's expense. The budget is increased by further increase of $600,000 for FPDR revenue.The unfavorable variance in revenue is balanced by favorable balances in materials and services or personnel expense within the same programs.\n\nRevenue Risks\n\nThe bureau expects to see a reduction in some external revenues as a result of reduced economic activity in response to the 'stay at home' order stemming from COVID-19; however, this would be met with a commensurate decrease in reimbursable activities.\n\nExpenditure Discussion\n\nProjected General Fund expense is $229.6 million, which will provide a favorable difference to the Spring Revised Budget. Personnel services projection is based on the first 20 pay periods, which includes initial COVID-19 expense. The personnel services Spring Revised Budget includes the request of $3.0 million from Compensation Set-aside and an increase of $600,000 in reimbursement revenue from the Fire & Police Disability & Retirement Fund, which will leave a margin of 0.2% above projected personnel expense. Materials projections are based on a combination of historical spend and on run-rate plus encumbrances. Materials, Services, and Transfers assumes carryovers for certain programs to FY 2020-21. Including requests and transfers, this leaves a projected balance of 0.5% of the bureau's General Fund Revised Budget.\n\nExpenditure Risks\n\nAs the bureau responds to anticipated revenue shortfalls due to COVID-19, any desired purchase over $1,000 must be approved through channels by an Assistant Chief. Additional materials and services underspending generated by this oversight measure will be available to fall to balance.\n\nPortland Police Bureau - Fund 217\n\nRevenue Discussion\n\nThis submission includes a request for an increase in appropriation backed by grant awards.\n\nRevenue Risks\n\nAt this time there are no known risks to existing grant awards.\n\nExpenditure Discussion\n\nThe bureau projects expenditure of $1.4 million in FY 2019-20, which will leave a favorable balance at fiscal year-end. The majority of the awards cross multiple fiscal years, and this balance will fold into the FY 2020-21 Fall BMP adjustments.\n\nExpenditure Risks\n\nReimbursable grant personnel activity may be slowed in favor of supporting core and essential bureau functions.\n\nSum:\n\nSum:\n\nBusiness Area Projection Report\n\nPortland Police Bureau - Fund 217\n\n128,107\n\n156,131\n\n44,112\n\n519,146\n\n847,496\n\n345,355\n\n345,355\n\n1,192,851\n\nRevenue Discussion\n\nThis submission includes a request for an increase in appropriation backed by grant awards.\n\nRevenue Risks\n\nAt this time there are no known risks to existing grant awards.\n\nExpenditure Discussion\n\nThe bureau projects expenditure of $1.4 million in <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "FY 2019-20, which will leave a favorable balance at fiscal year-end.",
"role": "assistant"
}
] |
|
Overview and Application Guide
Belden Infinity is a complete line of control, data, video, and power cables specifically designed to handle the rigorous speeds and near-constant motion encountered in automated equipment such as robots, pick and place machines, automatic handling systems, multi-axis machine tools, and conveyor systems.
When the application demands highly flexible cables offering exceptional cable life and performance, specify Belden Infinity.
Application Guide
C-Track
Systems
Servo
Festooning
Product Series Descriptions
C-TC+ — The C-TC+ series is designed for C-track and extreme flex applications up to 9 million flex cycles*. This series utilizes super fine stranding and some of the tightest lay lengths allowed by UL, providing outstanding flex life.
FCC — The FCC series is a cost effective alternative for C-track and moderate flexing applications rated up to 1 million flex cycles*.
Flex Data Cables — Belden Infinity Flex Data cables are designed for industrial applications where precise data transmission is combined with high-flexing. These cables are ideal for effective operation of computer controlled equipment or other automated production processes, even in harsh environments.
Flex Vision — Belden Infinity Vision cables are continuous flex video cables designed for machine vision applications. They are ideal for motioncontrolled video and with inspection and measurement equipment.
Motion-
Controlled
Video
Inspection & Measure Equip.
Machine
Vision
MultiAxis MachiningRobotics
Belden Infinity Means More Performance And Longer Life
Reduced Cable Memory — Belden Infinity's unique design and neutralized cabling, results in cables that are relaxed, with almost no memory.
Greater Flex Life — Belden Infinity cables offer superior flexibility and are able to handle the vigorous motions and high speeds encountered in automated equipment.
Greater System Uptime — Belden Infinity cables combine specialized manufacturing techniques with precision copper stranding and rugged insulation and jacketing compounds to maximize flex life and reliability.
No Talc Problems — Unlike the potentially harmful talc used in other cables, Belden's non-toxic, non-irritating slipper compound facilitates flexing and also complies with OSHA regulations. It's safer for employees and operators and is less likely to contaminate solder joints or mechanical compounds.
CE Conformity — All Belden Infinity cables are CE marked per the Conformité Européenne low voltage directive, allowing trade of product in Europe.
Custom Designs — Other designs available upon request.
Automated
Pick & Automated
Assembly
Systems
Material Handling Systems
Place
Systems
Storage
Retrieval
Gantry
Systems
Belden Infinity Series
* Good ✚ Better
★
Best
*Based on proper installation techniques in a C-track cable guide.
600V C-TC+ Control Cables for Extreme Flexing
(9 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
20 AWGStranded (74x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7106AS 12 250
†
76.2 57.5 26.1.020.51
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
.025 .055
.64
1.40
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
18 AWG Stranded (114x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
18 AWG Stranded (114x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC = Polyvinyl Chloride • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 116.0 52.7
Outer:
.535 13.59 194 863
600V C-TC+ Control Cables for Extreme Flexing
(9 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
16 AWGStranded (190x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7123AS
4
250
†
76.2
40.8 18.5.020.51
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
14 AWGStranded (266x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
14 AWG Stranded (266x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
12 AWGStranded (413x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 78.0 35.4
.025 .040
.64
1.02
Outer:
.420 10.67 154 685
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
20 AWGStranded (10x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | Maximum Pull Tension | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. | N |
18 AWGStranded (16x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
16 AWGStranded (26x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
14 AWG Stranded (41x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
12 AWGStranded (65x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
12 AWGStranded (65x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7445AS
4 250
†
76.2 85.8 38.9.028.71
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 171.5 77.9
.030.76
Outer:
.070 1.78
.580 14.73 338 1503
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
10 AWGStranded (105x30) Bare Copper Conductors • Unshielded (Color Code: Black w/numbers + Green/Yellow ground)
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
10 AWG Stranded (105x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7447AS
4 250
†
76.2 92.8 42.2.030.76
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
8 AWG Stranded (168x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
CSA AWM / A/B
500 152.4 228.0 103.5
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
8 AWG Stranded (168x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7450AS
4 250
†
76.2 141.3 64.1.045 1.14
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
.040 .065
1.02
1.65
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
6 AWG Stranded (266x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • Gray Oil- and Abrasion-resistant PVC Jacket
UL AWM Style 2587 (600V 90°C) 7453A
4 250
†
76.2 185.0 84.0
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
.060 1.52.085 2.16.925 23.50 1472 6548
500
†
152.4 281.0 127.6
.815 20.70 872
500
†
152.4 185.5 84.3
.035 .065
.89
1.65
.660 16.76 546 2429
Outer:
Outer:
3879
300V Flex Data Cables
(1 Million Flex Cycles*)
| Description | Part No. | No. of Pairs | UL NEC/ C(UL) CEC Type | RS Type | Color Code | Standard Lengths | | Standard Unit Weight | | Nominal OD | | Maximum Capacitance | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | | | | Ft. | m | Lbs. | kg | Inch | mm | pF/Ft. | pF/m |
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
**24 AWG stranded (41x40) tinned copper drain wire.
Color Codes: Flex Data
75 Ohm Flex Vision Coax Cables
(1 Million Flex Cycles*)
| Description | Part No. | UL NEC/ C(UL) CEC Type | Standard Lengths | | Standard Unit Weight | | Nom. DCR | | Nominal Core OD | | Nominal OD | | Nom. Imp. (Ω) | Nom. Vel. of Prop. | Nominal Capacitance | | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Conductor | Shield | Inch | mm | Inch | mm | | | pF/Ft. | pF/m | MHz | dB/ 100 Ft. |
Sub-Mini Type • 30 AWGStranded (7x38) Tinned Cadmium Bronze Conductor • Tinned Copper "French Braid" Shield (95% Coverage)
Foam Polyethylene Insulation • Matte Blue Belflex ® Jacket
UL AWM 7500A CEC:
250
†
76.2 3.0 1.4 108.0Ω/M′ 13.3Ω/M
Style 1354
30V 80°C
CSA AWM
Ι
/
ΙΙ
A/B
Mini Type • 25 AWG Stranded (19x38) Bare Copper Conductor • Tinned Copper "French Braid" Shield (95% Coverage)
Foam Polyethylene Insulation • Matte Blue Belflex Jacket
UL AWM 7501A CEC:
500
†
152.4 7.5 3.4 35.0Ω/M′
9.1Ω
Style 1354
30V 80°C
CSA AWM
Ι
/
ΙΙ
A/B
RG-59 Type • 22 AWGStranded (19x34) Bare Copper Conductor • Tinned Copper "French Braid" Shield (95% Coverage)
Foam Polyethylene Insulation • Matte Blue Belflex Jacket
UL AWM 7502A CEC:
250
†
76.2 10.5 4.8 13.4Ω/M′
6.4Ω
Style 1354
30V 80°C
CSA AWM
Ι
/
ΙΙ
A/B
2.2
5
10
30
50
100
2.2
5
10
30
50
100
2.2
5
10
30
50
100
.9
1.4
2.0
3.4
4.4
6.4
.6 .9
1.3
2.2
2.9
4.2
.4 .5 .8
1.4
1.8
2.95
4.59
6.56
11.16
14.44
21.00
1.97
2.95
4.27
7.22
9.52
13.78
1.31
1.64
2.63
4.59
5.91
2.7 8.86
RG-6/U Type • 20 AWGStranded (7x15x40) Bare Copper Conductor • Tinned Copper "French Braid" Shield (95% Coverage)
RG-11 Type • 16 AWGStranded (7x37x40) Bare Copper Conductor • Tinned Copper "French Braid" Shield (95% Coverage)
Foam Polyethylene Insulation • Matte Blue Belflex Jacket
UL AWM 7504A CEC: 1000
†
304.8 84.0 38.1 3.5Ω/M′
3.6Ω
Style 1354
30V 80°C
CSA AWM
Ι
/
ΙΙ
A/B
BC = Bare Copper • DCR = DC Resistance • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
FT1
11.5Ω
/M′.285 7.24.405 10.29
/km Ω 11.8 /km
FT1
500
1000
† †
152.4
304.8
15.0
34.0
6.8
15.4
44.0Ω/km
/M
Ω 21.0
′
/km
FT1
/M′.090 2.29.146 3.71 75 77% 17.7 58.1
1000
†
304.8 14.0 6.4 114.8Ω/km Ω 29.9 /km
FT1
500
1000
† †
152.4
304.8
5.0
9.0
2.3
4.1
354.3Ω/km Ω 43.6
′
/km
.056
.146
1.42
3.71
.110
.242
2.79
6.15
75
75
75
78%
79%
81%
16.7
18.0
17.3
54.8
59.1
56.8 2.2
5
10
30
50
.2 .3 .4 .8
1.0
0.66
0.98
1.31
2.63
3.28
100 1.5 4.92
|
<urn:uuid:e4f8508f-617a-42b0-9df8-0af28beaccc5>
|
CC-MAIN-2018-47
|
http://www.beldenkorea.com/pdf/usa/18.31-18.40.PDF
|
2018-11-14T00:06:47Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741569.29/warc/CC-MAIN-20181114000002-20181114022002-00280.warc.gz
| 388,502,248
| 5,447
|
eng_Latn
|
eng_Latn
| 0.408095
|
eng_Latn
| 0.216767
|
[
"eng_Latn",
"pol_Latn",
"pol_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"pol_Latn",
"dag_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
2863,
4306,
5986,
6635,
7315,
7964,
9431,
11776,
12317,
15191
] |
Overview and Application Guide
Belden Infinity is a complete line of control, data, video, and power cables specifically designed to handle the rigorous speeds and near-constant motion encountered in automated equipment such as robots, pick and place machines, automatic handling systems, multi-axis machine tools, and conveyor systems.
When the application demands highly flexible cables offering exceptional cable life and performance, specify Belden Infinity.
Application Guide
C-Track
Systems
Servo
Festooning
Product Series Descriptions
C-TC+ — The C-TC+ series is designed for C-track and extreme flex applications up to 9 million flex cycles*. This series utilizes super fine stranding and some of the tightest lay lengths allowed by UL, providing outstanding flex life.
FCC — The FCC series is a cost effective alternative for C-track and moderate flexing applications rated up to 1 million flex cycles*.
Flex Data Cables — Belden Infinity Flex Data cables are designed for industrial applications where precise data transmission is combined with high-flexing. These cables are ideal for effective operation of computer controlled equipment or other automated production processes, even in harsh environments.
Flex Vision — Belden Infinity Vision cables are continuous flex video cables designed for machine vision applications. They are ideal for motioncontrolled video and with inspection and measurement equipment.
Motion-
Controlled
Video
Inspection & Measure Equip.
Machine
Vision
MultiAxis MachiningRobotics
Belden Infinity Means More Performance And Longer Life
Reduced Cable Memory — Belden Infinity's unique design and neutralized cabling, results in cables that are relaxed, with almost no memory.
Greater Flex Life — Belden Infinity cables offer superior flexibility and are able to handle the vigorous motions and high speeds encountered in automated equipment.
Greater System Uptime — Belden Infinity cables combine specialized manufacturing techniques with precision copper stranding and rugged insulation and jacketing compounds to maximize flex life and reliability.
No Talc Problems — Unlike the potentially harmful talc used in other cables, Belden's non-toxic, non-irritating slipper compound facilitates flexing and also complies with OSHA regulations. It's safer for employees and operators and is less likely to contaminate solder joints or mechanical compounds.
CE Conformity — All Belden Infinity cables are CE marked per the Conformité Européenne low voltage directive, allowing trade of product in Europe.
Custom Designs — Other designs available upon request.
Automated
Pick & Automated
Assembly
Systems
Material Handling Systems
Place
Systems
Storage
Retrieval
Gantry
Systems
Belden Infinity Series
* Good ✚ Better
★
Best
*Based on proper installation techniques in a C-track cable guide.
600V C-TC+ Control Cables for Extreme Flexing
(9 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
20 AWGStranded (74x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7106AS 12 250
†
76.2 57.5 26.1.020.51
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
.025 .055
.64
1.40
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
18 AWG Stranded (114x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
18 AWG Stranded (114x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC = Polyvinyl Chloride • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 116.0 52.7
Outer:
.535 13.59 194 863
600V C-TC+ Control Cables for Extreme Flexing
(9 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
16 AWGStranded (190x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7123AS
4
250
†
76.2
40.8 18.5.020.51
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
14 AWGStranded (266x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
14 AWG Stranded (266x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
12 AWGStranded (413x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 78.0 35.4
.025 .040
.64
1.02
Outer:
.420 10.67 154 685
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
20 AWGStranded (10x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | Maximum Pull Tension | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. | N |
18 AWGStranded (16x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
16 AWGStranded (26x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
14 AWG Stranded (41x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
12 AWGStranded (65x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
12 AWGStranded (65x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7445AS
4 250
†
76.2 85.8 38.9.028.71
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 171.5 77.9
.030.76
Outer:
.070 1.78
.580 14.73 338 1503
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
10 AWGStranded (105x30) Bare Copper Conductors • Unshielded (Color Code: Black w/numbers + Green/Yellow ground)
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
10 AWG Stranded (105x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7447AS
4 250
†
76.2 92.8 42.2.030.76
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
8 AWG Stranded (168x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
CSA AWM / A/B
500 152.4 228.0 103.5
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
8 AWG Stranded (168x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Oute
|
r Jacket
UL AWM Style 2587 (600V 90°C) 7450AS
4 250
†
76.
| 10,739
|
inside_word
|
Outer
|
remove_all
|
<url>
http://www.beldenkorea.com/pdf/usa/18.31-18.40.PDF
</url>
<text>
Overview and Application Guide
Belden Infinity is a complete line of control, data, video, and power cables specifically designed to handle the rigorous speeds and near-constant motion encountered in automated equipment such as robots, pick and place machines, automatic handling systems, multi-axis machine tools, and conveyor systems.
When the application demands highly flexible cables offering exceptional cable life and performance, specify Belden Infinity.
Application Guide
C-Track
Systems
Servo
Festooning
Product Series Descriptions
C-TC+ — The C-TC+ series is designed for C-track and extreme flex applications up to 9 million flex cycles*. This series utilizes super fine stranding and some of the tightest lay lengths allowed by UL, providing outstanding flex life.
FCC — The FCC series is a cost effective alternative for C-track and moderate flexing applications rated up to 1 million flex cycles*.
Flex Data Cables — Belden Infinity Flex Data cables are designed for industrial applications where precise data transmission is combined with high-flexing. These cables are ideal for effective operation of computer controlled equipment or other automated production processes, even in harsh environments.
Flex Vision — Belden Infinity Vision cables are continuous flex video cables designed for machine vision applications. They are ideal for motioncontrolled video and with inspection and measurement equipment.
Motion-
Controlled
Video
Inspection & Measure Equip.
Machine
Vision
MultiAxis MachiningRobotics
Belden Infinity Means More Performance And Longer Life
Reduced Cable Memory — Belden Infinity's unique design and neutralized cabling, results in cables that are relaxed, with almost no memory.
Greater Flex Life — Belden Infinity cables offer superior flexibility and are able to handle the vigorous motions and high speeds encountered in automated equipment.
Greater System Uptime — Belden Infinity cables combine specialized manufacturing techniques with precision copper stranding and rugged insulation and jacketing compounds to maximize flex life and reliability.
No Talc Problems — Unlike the potentially harmful talc used in other cables, Belden's non-toxic, non-irritating slipper compound facilitates flexing and also complies with OSHA regulations. It's safer for employees and operators and is less likely to contaminate solder joints or mechanical compounds.
CE Conformity — All Belden Infinity cables are CE marked per the Conformité Européenne low voltage directive, allowing trade of product in Europe.
Custom Designs — Other designs available upon request.
Automated
Pick & Automated
Assembly
Systems
Material Handling Systems
Place
Systems
Storage
Retrieval
Gantry
Systems
Belden Infinity Series
* Good ✚ Better
★
Best
*Based on proper installation techniques in a C-track cable guide.
600V C-TC+ Control Cables for Extreme Flexing
(9 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
20 AWGStranded (74x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7106AS 12 250
†
76.2 57.5 26.1.020.51
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
.025 .055
.64
1.40
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
18 AWG Stranded (114x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
18 AWG Stranded (114x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC = Polyvinyl Chloride • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 116.0 52.7
Outer:
.535 13.59 194 863
600V C-TC+ Control Cables for Extreme Flexing
(9 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
16 AWGStranded (190x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7123AS
4
250
†
76.2
40.8 18.5.020.51
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
14 AWGStranded (266x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
14 AWG Stranded (266x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
12 AWGStranded (413x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 78.0 35.4
.025 .040
.64
1.02
Outer:
.420 10.67 154 685
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
20 AWGStranded (10x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | Maximum Pull Tension | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. | N |
18 AWGStranded (16x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
16 AWGStranded (26x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
14 AWG Stranded (41x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
12 AWGStranded (65x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
12 AWGStranded (65x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7445AS
4 250
†
76.2 85.8 38.9.028.71
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
BC = Bare Copper • TC = Tinned Copper
*Based on proper installation techniques in a C-track cable guide.
†Final put-up length may vary ±10% from length shown.
For more information, contact
견적문의
Belden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m
[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr
500
†
152.4 171.5 77.9
.030.76
Outer:
.070 1.78
.580 14.73 338 1503
600V FCC Control Cables for Moderate Flexing
(1 Million Flex Cycles*)
| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |
10 AWGStranded (105x30) Bare Copper Conductors • Unshielded (Color Code: Black w/numbers + Green/Yellow ground)
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
10 AWG Stranded (105x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket
UL AWM Style 2587 (600V 90°C) 7447AS
4 250
†
76.2 92.8 42.2.030.76
Inner:
CSA AWM
Ι
/
ΙΙ
A/B
Temp Rating: -40° to 90°C
(-5° to 90°C flexing)
8 AWG Stranded (168x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground
CSA AWM / A/B
500 152.4 228.0 103.5
Temp Rating: -40° to 90°C (-5° to 90°C flexing)
8 AWG Stranded (168x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground
PVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Oute<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.beldenkorea.com/pdf/usa/18.31-18.40.PDF\n</url>\n<text>\nOverview and Application Guide\n\nBelden Infinity is a complete line of control, data, video, and power cables specifically designed to handle the rigorous speeds and near-constant motion encountered in automated equipment such as robots, pick and place machines, automatic handling systems, multi-axis machine tools, and conveyor systems.\n\nWhen the application demands highly flexible cables offering exceptional cable life and performance, specify Belden Infinity.\n\nApplication Guide\n\nC-Track\n\nSystems\n\nServo\n\nFestooning\n\nProduct Series Descriptions\n\nC-TC+ — The C-TC+ series is designed for C-track and extreme flex applications up to 9 million flex cycles*. This series utilizes super fine stranding and some of the tightest lay lengths allowed by UL, providing outstanding flex life.\nFCC — The FCC series is a cost effective alternative for C-track and moderate flexing applications rated up to 1 million flex cycles*.\nFlex Data Cables — Belden Infinity Flex Data cables are designed for industrial applications where precise data transmission is combined with high-flexing. These cables are ideal for effective operation of computer controlled equipment or other automated production processes, even in harsh environments.\nFlex Vision — Belden Infinity Vision cables are continuous flex video cables designed for machine vision applications. They are ideal for motioncontrolled video and with inspection and measurement equipment.\n\nMotion-\n\nControlled\n\nVideo\n\nInspection & Measure Equip.\n\nMachine\n\nVision\n\nMultiAxis MachiningRobotics\n\nBelden Infinity Means More Performance And Longer Life\n\nReduced Cable Memory — Belden Infinity's unique design and neutralized cabling, results in cables that are relaxed, with almost no memory.\n\nGreater Flex Life — Belden Infinity cables offer superior flexibility and are able to handle the vigorous motions and high speeds encountered in automated equipment.\n\nGreater System Uptime — Belden Infinity cables combine specialized manufacturing techniques with precision copper stranding and rugged insulation and jacketing compounds to maximize flex life and reliability.\n\nNo Talc Problems — Unlike the potentially harmful talc used in other cables, Belden's non-toxic, non-irritating slipper compound facilitates flexing and also complies with OSHA regulations. It's safer for employees and operators and is less likely to contaminate solder joints or mechanical compounds.\n\nCE Conformity — All Belden Infinity cables are CE marked per the Conformité Européenne low voltage directive, allowing trade of product in Europe.\n\nCustom Designs — Other designs available upon request.\n\nAutomated\n\nPick & Automated\n\nAssembly\n\nSystems\n\nMaterial Handling Systems\n\nPlace\n\nSystems\n\nStorage\n\nRetrieval\n\nGantry\n\nSystems\n\nBelden Infinity Series\n\n* Good ✚ Better\n\n★\n\nBest\n\n*Based on proper installation techniques in a C-track cable guide.\n\n600V C-TC+ Control Cables for Extreme Flexing\n\n(9 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |\n\n20 AWGStranded (74x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground\n\nPVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket\n\nUL AWM Style 2587 (600V 90°C) 7106AS 12 250\n\n†\n\n76.2 57.5 26.1.020.51\n\nInner:\n\nCSA AWM\n\nΙ\n\n/\n\nΙΙ\n\nA/B\n\n.025 .055\n\n.64\n\n1.40\n\nTemp Rating: -40° to 90°C (-5° to 90°C flexing)\n\n18 AWG Stranded (114x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground\n\n18 AWG Stranded (114x38) Bare Copper Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground\n\nPVC = Polyvinyl Chloride • TC = Tinned Copper\n\n*Based on proper installation techniques in a C-track cable guide.\n\n†Final put-up length may vary ±10% from length shown.\n\nFor more information, contact\n\n견적문의\n\nBelden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m\n\[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr\n\n500\n\n†\n\n152.4 116.0 52.7\n\nOuter:\n\n.535 13.59 194 863\n\n600V C-TC+ Control Cables for Extreme Flexing\n\n(9 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |\n\n16 AWGStranded (190x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground\n\nPVC Insulation • PVC Inner Jacket • Orange Oil- and Abrasion-resistant PVC Outer Jacket\n\nUL AWM Style 2587 (600V 90°C) 7123AS\n\n4\n\n250\n\n†\n\n76.2\n\n40.8 18.5.020.51\n\nInner:\n\nCSA AWM\n\nΙ\n\n/\n\nΙΙ\n\nA/B\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\n14 AWGStranded (266x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\n14 AWG Stranded (266x38) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Red w/numbers + Green/Yellow ground\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\n12 AWGStranded (413x38) Bare Copper Conductors • Unshielded • Color Code: Red w/numbers + Green/Yellow ground\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\nBC = Bare Copper • TC = Tinned Copper\n\n*Based on proper installation techniques in a C-track cable guide.\n\n†Final put-up length may vary ±10% from length shown.\n\nFor more information, contact\n\n견적문의\n\nBelden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m\n\[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr\n\n500\n\n†\n\n152.4 78.0 35.4\n\n.025 .040\n\n.64\n\n1.02\n\nOuter:\n\n.420 10.67 154 685\n\n600V FCC Control Cables for Moderate Flexing\n\n(1 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |\n\n20 AWGStranded (10x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\nBC = Bare Copper • TC = Tinned Copper\n\n*Based on proper installation techniques in a C-track cable guide.\n\n†Final put-up length may vary ±10% from length shown.\n\n600V FCC Control Cables for Moderate Flexing\n\n(1 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | Maximum Pull Tension | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. | N |\n\n18 AWGStranded (16x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\nBC = Bare Copper • TC = Tinned Copper\n\n*Based on proper installation techniques in a C-track cable guide.\n\n†Final put-up length may vary ±10% from length shown.\n\n600V FCC Control Cables for Moderate Flexing\n\n(1 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |\n\n16 AWGStranded (26x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\nBC = Bare Copper • TC = Tinned Copper\n\n*Based on proper installation techniques in a C-track cable guide.\n\n†Final put-up length may vary ±10% from length shown.\n\n600V FCC Control Cables for Moderate Flexing\n\n(1 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |\n\n14 AWG Stranded (41x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\n12 AWGStranded (65x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\n12 AWGStranded (65x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\nPVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket\n\nUL AWM Style 2587 (600V 90°C) 7445AS\n\n4 250\n\n†\n\n76.2 85.8 38.9.028.71\n\nInner:\n\nCSA AWM\n\nΙ\n\n/\n\nΙΙ\n\nA/B\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\nBC = Bare Copper • TC = Tinned Copper\n\n*Based on proper installation techniques in a C-track cable guide.\n\n†Final put-up length may vary ±10% from length shown.\n\nFor more information, contact\n\n견적문의\n\nBelden Te c h n i c a l S u p p o r t : 1 - 8 0 0 - B E L D E N - 1• w w w . b e l d e n . c o m\n\[email protected] / 0707-434-7704 / Fax. 02-744-0909 / www.CableCon.co.kr\n\n500\n\n†\n\n152.4 171.5 77.9\n\n.030.76\n\nOuter:\n\n.070 1.78\n\n.580 14.73 338 1503\n\n600V FCC Control Cables for Moderate Flexing\n\n(1 Million Flex Cycles*)\n\n| Description | Part No. | No. of Cond. | Standard Lengths | | Standard Unit Weight | | Insulation Thickness | | Jacket Thickness | | Nominal OD | | |\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\n| | | | Ft. | m | Lbs. | kg | Inch | mm | Inch | mm | Inch | mm | Lbs. |\n\n10 AWGStranded (105x30) Bare Copper Conductors • Unshielded (Color Code: Black w/numbers + Green/Yellow ground)\n\nTemp Rating: -40° to 90°C (-5° to 90°C flexing)\n\n10 AWG Stranded (105x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\nPVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Outer Jacket\n\nUL AWM Style 2587 (600V 90°C) 7447AS\n\n4 250\n\n†\n\n76.2 92.8 42.2.030.76\n\nInner:\n\nCSA AWM\n\nΙ\n\n/\n\nΙΙ\n\nA/B\n\nTemp Rating: -40° to 90°C\n\n(-5° to 90°C flexing)\n\n8 AWG Stranded (168x30) Bare Copper Conductors • Unshielded • Color Code: Black w/numbers + Green/Yellow ground\n\nCSA AWM / A/B\n\n500 152.4 228.0 103.5\n\nTemp Rating: -40° to 90°C (-5° to 90°C flexing)\n\n8 AWG Stranded (168x30) BC Conductors • TC Braid Shield (85% Coverage) • Color Code: Black w/numbers + Green/Yellow ground\n\nPVC Insulation • PVC Inner Jacket • Gray Oil- and Abrasion-resistant PVC Oute<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "r Jacket\n\nUL AWM Style 2587 (600V 90°C) 7450AS\n\n4 250\n\n†\n\n76.",
"role": "assistant"
}
] |
|
Hospitals Providing Naloxone Upon Discharge
Updated 6/13/2019
Hospitals treating individuals who suffer from non-fatal opioid-related overdoses have an important opportunity to provide naloxone upon discharge. Providing naloxone can be an effective tool to prevent a fatal overdose, as data indicates that a risk factor for a fatal overdose incudes discharge from emergency medical care following opioid intoxication or poisoning. This document provides guidance to hospitals seeking to provide naloxone to at-risk individuals upon discharge.
For questions on this topic, please review the following guidance document. If you need additional information, the most expedient way to have your questions answered will be to e-mail the Board office by visiting: http://www.pharmacy.ohio.gov/contact.aspx.
NOTE: This document is intended to serve as guidance and should not be construed as legal advice or legal opinion on specific facts or circumstances. You should your organization's legal department with respect to any issue or concern.
Table of Contents
Option 1: Personally Furnishing Pursuant to a Physician Approved Protocol
Option 2: Dispensing Naloxone from a Hospital Pharmacy Pursuant to a Physician Approved Protocol
T:
(614) 466.4143
|
F:
(614) 752.4836
| [email protected]
|
www.pharmacy.ohio.gov
Option 1: Personally Furnishing Pursuant to a Physician Approved Protocol
Ohio law (ORC 4731.941) permits a physician to authorize one or more individuals to personally furnish a supply of naloxone pursuant to a protocol to an individual who there is reason to believe is experiencing or at risk of experiencing an opioid-related overdose.
This allows any appropriately trained hospital staff (nurse, pharmacist, pharmacy technician, social worker, etc.) to personally furnish naloxone to at-risk individuals prior to discharge. The following FAQ provides additional information regarding the use of a physician approved protocol.
What are the requirements of the protocol?
The protocol must include all the following:
(1) A description of the clinical pharmacology of naloxone;
(2) Precautions and contraindications concerning furnishing naloxone;
(3) Any limitations the physician specifies concerning the individuals to whom naloxone may be furnished;
(4) The naloxone dosage that may be furnished and any variation in the dosage based on circumstances specified in the protocol;
(5) Labeling, storage, record-keeping, and administrative requirements;
(6) Training requirements that must be met before an individual will be authorized to furnish naloxone;
(7) Any instructions or training that the authorized individual must provide to an individual to whom naloxone is furnished.
Is the authorizing physician required to name specific individuals permitted to personally furnish naloxone?
The authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained social workers or use of internal hospital credentialing). Regardless of how "authorized individuals" are identified in the protocol, the hospital should have policies in place to ensure all the following:
(1) The authorized individual complies with the protocol established, including having completed the training required by the protocol.
(2) The authorized individual instructs the individual to whom naloxone is furnished to summon emergency services as soon as practicable either before or after administering naloxone.
Is there a sample protocol available?
The Ohio Department of Health, in collaboration with the State Board of Pharmacy, have developed the following sample protocol for personally furnishing naloxone that can be accessed here.
What type of prescribers are able to authorize the protocol?
Ohio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.
Should the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?
Such a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.
How do I store naloxone?
There are a number of options for storing naloxone that is personally furnished by hospital staff. It can be maintained in an automated medication dispensing system that is used by nurses and other individuals authorized by law to administer medications.
For individuals that do not have access to a dispensing system or where no such system is available, the naloxone can be stored a locked cabinet, room, or drawer accessible to individuals authorized under the physician's protocol. If a secure cabinet or room is not available, it may also be stored in a container which is sealed with a tamper-evident seal that must be broken to gain access.
What are the record keeping requirements for personally furnishing naloxone pursuant to a protocol?
Rule 4729-9-22 requires all records related to personally furnishing to contain a description of the kind and quantity of the drug provided, the name and address of the person to whom or for whose use the drug was personally furnished. These records can be kept in as separate log or can be entered as part of the patient's medical record. The rule also requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).
What are the labeling requirements for personally furnishing naloxone pursuant to a protocol?
Rule 4729-5-17 requires the following to be affixed to naloxone, prior to personally furnishing the drug to the patient:
(1) The name and address of the physician. This should be the name of the physician authorizing the protocol and the hospital address.
(2) The name of the patient for whom the naloxone is intended.
(3) Name and strength of the naloxone.
(4) Directions for use; and
(5) Date furnished.
These labels can be preprinted with the name and strength of the drug and directions for use. The staff personally furnishing the drug would be responsible for filling in the remainder of the information on the labels.
If personally furnishing naloxone pursuant to a protocol, is the physician required to conduct the final check of the drug?
No. Rule 4729-5-17 permits the authorized individual personally furnishing naloxone pursuant to the protocol to do all of the following:
[x] Prepare, package and appropriately label the naloxone.
[x] Conduct the final check of the naloxone prior to personally furnishing on behalf of the physician.
[x] Keep and maintain all records in accordance with rule 4729-9-22 of the Administrative Code. The rule requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).
[x] Conduct patient counseling, including training on the use of naloxone, as specified in the physician protocol.
Do I need a patient-specific prescriber order to personally furnish naloxone?
No. While an order may be required to bill the patient's insurance for the naloxone, it is not necessary to personally furnish naloxone pursuant to a protocol. For the purposes of compliance with Board of Pharmacy regulations, a protocol authorized pursuant to 4731.941 is considered a valid order.
Can I bill a patient's insurance for the naloxone?
It may be possible to bill a patient's insurance for the naloxone. It is recommended you contact your hospital's billing department for more information.
Is there written information available to assist with the training of patients?
Yes. The Board has developed a brochure (available in English and Spanish) that covers many of the typical training requirements for providing naloxone to laypersons. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone
Copies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:
o Name of Requestor
o Hospital Name
o Mailing Address
o Phone Number
o Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)
Please allow 7-10 days for delivery from the date of the request.
Additional training materials can also be accessed here:
Ohio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/
Prescribe to Prevent: http://prescribetoprevent.org
Are there any protections in the law for physicians and individuals authorized to personally furnish naloxone on behalf of the physician pursuant to a protocol?
ORC 4731.941 states that a physician and a person authorized by the physician to personally furnish naloxone, acting in good faith, are not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is furnished: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.
What type of naloxone can be personally furnished pursuant to the physician approved protocol?
The law does not specify or limit the type of naloxone that can be personally furnished pursuant to a physician approved protocol. However, the type of naloxone that may be personally furnished is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.
Are there any substance abuse treatment resources available?
It is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.
The Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347
MHAS also has a toll-free treatment referral line: 1-877-275-6364.
Option 2: Dispensing Naloxone from the Hospital Pharmacy Pursuant to a Protocol
Naloxone may also be dispensed by a hospital pharmacy for outpatient use pursuant to a physician approved protocol. For example, if a patient is identified as meeting the criteria specified in the pharmacy's protocol, a hospital employee (nurse, social worker, etc.) can request naloxone be dispensed from the pharmacy in the patient's name.
Pursuant to rule 4729-5-39, a pharmacist, pharmacist intern or a pharmacist's designee (which can be the individual who requests the naloxone) can provide the required training to the patient. The pharmacist, intern or pharmacist's designee can provide the naloxone once dispensed by the hospital pharmacy.
NOTE: This does apply to the prescribing and dispensing of naloxone by a pharmacist acting pursuant to a consult agreement. Nor does it apply to dispensing pursuant to a patient-specific prescriber order.
What are the requirements for an approved protocol?
Unlike personally furnishing, the requirements for a pharmacy protocol are specified in rule 47295-39.
According to the rule, a physician approved protocol for dispensing naloxone must include all the following:
(1) A description of the clinical pharmacology of naloxone.
(2) Indications for use of naloxone as rescue therapy, including criteria for identifying persons eligible to receive naloxone under the protocol.
(3) Precautions and contraindications concerning dispensing naloxone.
(4) Assessment and follow-up actions by the pharmacist or pharmacy intern.
(5) Naloxone products authorized to be dispensed, including: name of product, dose, route of administration, required delivery device and directions for use.
(6) Any patient instructions in addition to the counseling requirements in the rule.
Is the authorizing physician required to name specific pharmacists or interns who are authorized to dispense furnish naloxone pursuant to a protocol?
The authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained pharmacists and interns). Regardless of how "authorized individuals" are identified in the protocol, the hospital should have policies in place to ensure all the following:
(1) The authorized pharmacist/intern or pharmacist designee complies with the protocol established by the authorizing physician, including having completed the training required by the protocol.
(2) The authorized pharmacist/intern or designee instructs the individual to whom naloxone is dispensed to summon emergency services as soon as practicable either before or after administering naloxone.
Is there a sample protocol available?
Yes. The Board has developed a sample protocol that can be used by physicians and pharmacies as their official protocol. The sample protocol can be accessed here: www.pharmacy.ohio.gov/naloxoneprotocol.
NOTE: While the sample protocol includes several indications for the provision of naloxone, it is up to the authorizing physician to determine which of these categories is appropriate for individuals discharged from the hospital.
What type of patient training is required prior to the provision of naloxone pursuant to a physician protocol?
A pharmacist, pharmacy intern under the direct supervision of a pharmacist, or a pharmacist's designee that is appropriately trained shall personally provide in-person training and written educational materials to the individual to whom naloxone is dispensed:
(1) Risk factors of opioid overdose;
(2) Strategies to prevent opioid overdose;
(3) Signs of opioid overdose;
(4) Steps in responding to an overdose;
(5) Information on naloxone;
(6) Procedures for administering naloxone;
(7) Proper storage and expiration of naloxone product dispensed; and
(8) Information on where to obtain a referral for substance abuse treatment.
The hospital and the pharmacy's responsible person on their terminal distributor license shall ensure that all pharmacist designees are appropriately trained on the use of naloxone and can meet the training requirements listed above.
NOTE: A designee can be any hospital employee (nurse, social worker, etc.) and does not have to be limited to a pharmacy employee.
Is an offer to counsel the patient required if dispensing pursuant to a protocol?
Yes. An offer to counsel if still required. However, the pharmacist or intern shall not be required to counsel a patient or caregiver pursuant to rule 4729-5-22 of the Administrative Code if the patient or caregiver refuses the offer of counseling or does not respond to the written offer to counsel.
In this situation, when counseling is refused, the pharmacist, intern or their designee shall ensure that such refusal is documented in the presence of the patient or the patient's caregiver.
What type of prescribers can authorize the protocol?
Ohio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.
Should the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?
Such a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (such abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.
What are there recordkeeping and other requirements for dispensing naloxone pursuant to a protocol?
All laws and regulations regarding the outpatient dispensing of drugs by a pharmacy would apply to naloxone dispensed pursuant to a protocol.
All drugs dispensed for use by outpatients of an institutional facility shall be labeled in accordance with paragraphs (A), (B), and (C) of rule 4729-5-16 of the Administrative Code
I am a pharmacy dispensing naloxone pursuant to a prescription. Do I need to comply with the requirements of OAC 4729-5-39?
No. The requirements for OAC 4729-5-39 are only required for pharmacies that dispense naloxone pursuant to a physician approved protocol. It does not apply to pharmacies that provide naloxone pursuant to a prescription or an order by a licensed prescriber.
Rule 4729-5-39 requires notification to the Board of Pharmacy if dispensing naloxone pursuant to a physician authorized protocol. Does this apply if dispensing only to individuals being treated at a hospital?
No. If the hospital pharmacy is only engaged in dispensing to patients upon discharge, then notification is not required pursuant to paragraph (I) of the rule.
Can I bill a patient's insurance for the naloxone?
It may be possible to bill a patient's insurance for the naloxone dispensed. It is recommended you contact your hospital's billing department for more information.
NOTE: Pursuant to Ohio law, a pharmacist may document the dispensing of naloxone by the pharmacist or a pharmacy intern supervised by the pharmacist on a prescription form. The form may be assigned a number for record-keeping purposes.
Is there written information available to assist with the training of patients?
Yes. The Board has developed a brochure that covers many of the typical training requirements for providing naloxone. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone
Copies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:
o Name of Requestor
o Hospital Name
o Mailing Address
o Phone Number
o Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)
Please allow 7-10 days for delivery from the date of the request.
Additional training materials can also be accessed here:
Ohio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/
Prescribe to Prevent:
http://prescribetoprevent.org
Are there any protections in the law for physicians and pharmacists/interns authorized to dispense naloxone pursuant to a protocol?
Yes. A pharmacist, pharmacy intern, or physician, acting in good faith, is not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is dispensed: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.
What type of naloxone can be dispensed pursuant to the physician approved protocol?
The law does not specify or limit the type of naloxone that can be dispensed pursuant to a physician approved protocol. However, the type of naloxone that may be dispensed is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.
Are there any age restrictions for dispensing naloxone pursuant to a protocol?
Unless specified in the protocol, there are no restrictions on age for dispensing naloxone. A pharmacist must use their professional judgement to determine if a minor is sufficiently mature with respect to intellect and emotions to carry out all the responsibilities to effectively respond to a suspected overdose, including the administration of naloxone.
Are there any substance abuse treatment resources available?
It is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.
The Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347
MHAS also has a toll-free treatment referral line: 1-877-275-6364.
|
<urn:uuid:160dbe66-fb80-4aa5-bbc2-b8cf77020e7c>
|
CC-MAIN-2020-50
|
https://pharmacy.ohio.gov/Documents/Pubs/Naloxone/Hospital/Guidance%20Document%20-%20Hospitals%20Providing%20Naloxone%20Upon%20Discharge.pdf
|
2020-11-27T09:23:00+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-50/subset=warc/part-00286-8431e8c9-c763-4c27-b286-ba1dd7e2631e.c000.gz.parquet
| 428,381,205
| 4,123
|
eng_Latn
|
eng_Latn
| 0.990631
|
eng_Latn
| 0.992242
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1333,
3759,
6160,
8363,
10351,
12646,
14631,
16997,
18907,
20255
] |
Hospitals Providing Naloxone Upon Discharge
Updated 6/13/2019
Hospitals treating individuals who suffer from non-fatal opioid-related overdoses have an important opportunity to provide naloxone upon discharge. Providing naloxone can be an effective tool to prevent a fatal overdose, as data indicates that a risk factor for a fatal overdose incudes discharge from emergency medical care following opioid intoxication or poisoning. This document provides guidance to hospitals seeking to provide naloxone to at-risk individuals upon discharge.
For questions on this topic, please review the following guidance document. If you need additional information, the most expedient way to have your questions answered will be to e-mail the Board office by visiting: http://www.pharmacy.ohio.gov/contact.aspx.
NOTE: This document is intended to serve as guidance and should not be construed as legal advice or legal opinion on specific facts or circumstances. You should your organization's legal department with respect to any issue or concern.
Table of Contents
Option 1: Personally Furnishing Pursuant to a Physician Approved Protocol
Option 2: Dispensing Naloxone from a Hospital Pharmacy Pursuant to a Physician Approved Protocol
T:
(614) 466.4143
|
F:
(614) 752.4836
| [email protected]
|
www.pharmacy.ohio.gov
Option 1: Personally Furnishing Pursuant to a Physician Approved Protocol
Ohio law (ORC 4731.941) permits a physician to authorize one or more individuals to personally furnish a supply of naloxone pursuant to a protocol to an individual who there is reason to believe is experiencing or at risk of experiencing an opioid-related overdose.
This allows any appropriately trained hospital staff (nurse, pharmacist, pharmacy technician, social worker, etc.) to personally furnish naloxone to at-risk individuals prior to discharge. The following FAQ provides additional information regarding the use of a physician approved protocol.
What are the requirements of the protocol?
The protocol must include all the following:
(1) A description of the clinical pharmacology of naloxone;
(2) Precautions and contraindications concerning furnishing naloxone;
(3) Any limitations the physician specifies concerning the individuals to whom naloxone may be furnished;
(4) The naloxone dosage that may be furnished and any variation in the dosage based on circumstances specified in the protocol;
(5) Labeling, storage, record-keeping, and administrative requirements;
(6) Training requirements that must be met before an individual will be authorized to furnish naloxone;
(7) Any instructions or training that the authorized individual must provide to an individual to whom naloxone is furnished.
Is the authorizing physician required to name specific individuals permitted to personally furnish naloxone?
The authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained social workers or use of internal hospital credentialing). Regardless of how "authorized individuals" are identified in the protocol, the hospital should have policies in place to ensure all the following:
(1) The authorized individual complies with the protocol established, including having completed the training required by the protocol.
(2) The authorized individual instructs the individual to whom naloxone is furnished to summon emergency services as soon as practicable either before or after administering naloxone.
Is there a sample protocol available?
The Ohio Department of Health, in collaboration with the State Board of Pharmacy, have developed the following sample protocol for personally furnishing naloxone that can be accessed here.
What type of prescribers are able to authorize the protocol?
Ohio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.
Should the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?
Such a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.
How do I store naloxone?
There are a number of options for storing naloxone that is personally furnished by hospital staff. It can be maintained in an automated medication dispensing system that is used by nurses and other individuals authorized by law to administer medications.
For individuals that do not have access to a dispensing syst
|
em or where no such system is available, the naloxone can be stored a locked cabinet, room, or drawer accessible to individuals authorized under the physician's protocol.
|
If a secure cabinet or room is not available, it may also be stored in a container which is sealed with a tamper-evident seal that must be broken to gain access.
What are the record keeping requirements for personally furnishing naloxone pursuant to a protocol?
Rule 4729-9-22 requires all records related to personally furnishing to contain a description of the kind and quantity of the drug provided, the name and address of the person to whom or for whose use the drug was personally furnished. These records can be kept in as separate log or can be entered as part of the patient's medical record. The rule also requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).
What are the labeling requirements for personally furnishing naloxone pursuant to a protocol?
Rule 4729-5-17 requires the following to be affixed to naloxone, prior to personally furnishing the drug to the patient:
(1) The name and address of the physician. This should be the name of the physician authorizing the protocol and the hospital address.
(2) The name of the patient for whom the naloxone is intended.
(3) Name and strength of the naloxone.
(4) Directions for use; and
(5) Date furnished.
These labels can be preprinted with the name and strength of the drug and directions for use. The staff personally furnishing the drug would be responsible for filling in the remainder of the information on the labels.
If personally furnishing naloxone pursuant to a protocol, is the physician required to conduct the final check of the drug?
No. Rule 4729-5-17 permits the authorized individual personally furnishing naloxone pursuant to the protocol to do all of the following:
[x] Prepare, package and appropriately label the naloxone.
[x] Conduct the final check of the naloxone prior to personally furnishing on behalf of the physician.
[x] Keep and maintain all records in accordance with rule 4729-9-22 of the Administrative Code. The rule requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).
[x] Conduct patient counseling, including training on the use of naloxone, as specified in the physician protocol.
Do I need a patient-specific prescriber order to personally furnish naloxone?
No. While an order may be required to bill the patient's insurance for the naloxone, it is not necessary to personally furnish naloxone pursuant to a protocol. For the purposes of compliance with Board of Pharmacy regulations, a protocol authorized pursuant to 4731.941 is considered a valid order.
Can I bill a patient's insurance for the naloxone?
It may be possible to bill a patient's insurance for the naloxone. It is recommended you contact your hospital's billing department for more information.
Is there written information available to assist with the training of patients?
Yes. The Board has developed a brochure (available in English and Spanish) that covers many of the typical training requirements for providing naloxone to laypersons. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone
Copies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:
o Name of Requestor
o Hospital Name
o Mailing Address
o Phone Number
o Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)
Please allow 7-10 days for delivery from the date of the request.
Additional training materials can also be accessed here:
Ohio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/
Prescribe to Prevent: http://prescribetoprevent.org
Are there any protections in the law for physicians and individuals authorized to personally furnish naloxone on behalf of the physician pursuant to a protocol?
ORC 4731.941 states that a physician and a person authorized by the physician to personally furnish naloxone, acting in good faith, are not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is furnished: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.
What type of naloxone can be personally furnished pursuant to the physician approved protocol?
The law does not specify or limit the type of naloxone that can be personally furnished pursuant to a physician approved protocol. However, the type of naloxone that may be personally furnished is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.
Are there any substance abuse treatment resources available?
It is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.
The Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347
MHAS also has a toll-free treatment referral line: 1-877-275-6364.
Option 2: Dispensing Naloxone from the Hospital Pharmacy Pursuant to a Protocol
Naloxone may also be dispensed by a hospital pharmacy for outpatient use pursuant to a physician approved protocol. For example, if a patient is identified as meeting the criteria specified in the pharmacy's protocol, a hospital employee (nurse, social worker, etc.) can request naloxone be dispensed from the pharmacy in the patient's name.
Pursuant to rule 4729-5-39, a pharmacist, pharmacist intern or a pharmacist's designee (which can be the individual who requests the naloxone) can provide the required training to the patient. The pharmacist, intern or pharmacist's designee can provide the naloxone once dispensed by the hospital pharmacy.
NOTE: This does apply to the prescribing and dispensing of naloxone by a pharmacist acting pursuant to a consult agreement. Nor does it apply to dispensing pursuant to a patient-specific prescriber order.
What are the requirements for an approved protocol?
Unlike personally furnishing, the requirements for a pharmacy protocol are specified in rule 47295-39.
According to the rule, a physician approved protocol for dispensing naloxone must include all the following:
(1) A description of the clinical pharmacology of naloxone.
(2) Indications for use of naloxone as rescue therapy, including criteria for identifying persons eligible to receive naloxone under the protocol.
(3) Precautions and contraindications concerning dispensing naloxone.
(4) Assessment and follow-up actions by the pharmacist or pharmacy intern.
(5) Naloxone products authorized to be dispensed, including: name of product, dose, route of administration, required delivery device and directions for use.
(6) Any patient instructions in addition to the counseling requirements in the rule.
Is the authorizing physician required to name specific pharmacists or interns who are authorized to dispense furnish naloxone pursuant to a protocol?
The authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained pharmacists and interns). Regardless of how "authorized individuals" are identified in the protocol, the hospital should have policies in place to ensure all the following:
(1) The authorized pharmacist/intern or pharmacist designee complies with the protocol established by the authorizing physician, including having completed the training required by the protocol.
(2) The authorized pharmacist/intern or designee instructs the individual to whom naloxone is dispensed to summon emergency services as soon as practicable either before or after administering naloxone.
Is there a sample protocol available?
Yes. The Board has developed a sample protocol that can be used by physicians and pharmacies as their official protocol. The sample protocol can be accessed here: www.pharmacy.ohio.gov/naloxoneprotocol.
NOTE: While the sample protocol includes several indications for the provision of naloxone, it is up to the authorizing physician to determine which of these categories is appropriate for individuals discharged from the hospital.
What type of patient training is required prior to the provision of naloxone pursuant to a physician protocol?
A pharmacist, pharmacy intern under the direct supervision of a pharmacist, or a pharmacist's designee that is appropriately trained shall personally provide in-person training and written educational materials to the individual to whom naloxone is dispensed:
(1) Risk factors of opioid overdose;
(2) Strategies to prevent opioid overdose;
(3) Signs of opioid overdose;
(4) Steps in responding to an overdose;
(5) Information on naloxone;
(6) Procedures for administering naloxone;
(7) Proper storage and expiration of naloxone product dispensed; and
(8) Information on where to obtain a referral for substance abuse treatment.
The hospital and the pharmacy's responsible person on their terminal distributor license shall ensure that all pharmacist designees are appropriately trained on the use of naloxone and can meet the training requirements listed above.
NOTE: A designee can be any hospital employee (nurse, social worker, etc.) and does not have to be limited to a pharmacy employee.
Is an offer to counsel the patient required if dispensing pursuant to a protocol?
Yes. An offer to counsel if still required. However, the pharmacist or intern shall not be required to counsel a patient or caregiver pursuant to rule 4729-5-22 of the Administrative Code if the patient or caregiver refuses the offer of counseling or does not respond to the written offer to counsel.
In this situation, when counseling is refused, the pharmacist, intern or their designee shall ensure that such refusal is documented in the presence of the patient or the patient's caregiver.
What type of prescribers can authorize the protocol?
Ohio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.
Should the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?
Such a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (such abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.
What are there recordkeeping and other requirements for dispensing naloxone pursuant to a protocol?
All laws and regulations regarding the outpatient dispensing of drugs by a pharmacy would apply to naloxone dispensed pursuant to a protocol.
All drugs dispensed for use by outpatients of an institutional facility shall be labeled in accordance with paragraphs (A), (B), and (C) of rule 4729-5-16 of the Administrative Code
I am a pharmacy dispensing naloxone pursuant to a prescription. Do I need to comply with the requirements of OAC 4729-5-39?
No. The requirements for OAC 4729-5-39 are only required for pharmacies that dispense naloxone pursuant to a physician approved protocol. It does not apply to pharmacies that provide naloxone pursuant to a prescription or an order by a licensed prescriber.
Rule 4729-5-39 requires notification to the Board of Pharmacy if dispensing naloxone pursuant to a physician authorized protocol. Does this apply if dispensing only to individuals being treated at a hospital?
No. If the hospital pharmacy is only engaged in dispensing to patients upon discharge, then notification is not required pursuant to paragraph (I) of the rule.
Can I bill a patient's insurance for the naloxone?
It may be possible to bill a patient's insurance for the naloxone dispensed. It is recommended you contact your hospital's billing department for more information.
NOTE: Pursuant to Ohio law, a pharmacist may document the dispensing of naloxone by the pharmacist or a pharmacy intern supervised by the pharmacist on a prescription form. The form may be assigned a number for record-keeping purposes.
Is there written information available to assist with the training of patients?
Yes. The Board has developed a brochure that covers many of the typical training requirements for providing naloxone. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone
Copies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:
o Name of Requestor
o Hospital Name
o Mailing Address
o Phone Number
o Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)
Please allow 7-10 days for delivery from the date of the request.
Additional training materials can also be accessed here:
Ohio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/
Prescribe to Prevent:
http://prescribetoprevent.org
Are there any protections in the law for physicians and pharmacists/interns authorized to dispense naloxone pursuant to a protocol?
Yes. A pharmacist, pharmacy intern, or physician, acting in good faith, is not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is dispensed: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.
What type of naloxone can be dispensed pursuant to the physician approved protocol?
The law does not specify or limit the type of naloxone that can be dispensed pursuant to a physician approved protocol. However, the type of naloxone that may be dispensed is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.
Are there any age restrictions for dispensing naloxone pursuant to a protocol?
Unless specified in the protocol, there are no restrictions on age for dispensing naloxone. A pharmacist must use their professional judgement to determine if a minor is sufficiently mature with respect to intellect and emotions to carry out all the responsibilities to effectively respond to a suspected overdose, including the administration of naloxone.
Are there any substance abuse treatment resources available?
It is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.
The Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347
MHAS also has a toll-free treatment referral line: 1-877-275-6364.
| 4,714
|
inside_word
|
system
|
remove_one_sentence
|
<url>
https://pharmacy.ohio.gov/Documents/Pubs/Naloxone/Hospital/Guidance%20Document%20-%20Hospitals%20Providing%20Naloxone%20Upon%20Discharge.pdf
</url>
<text>
Hospitals Providing Naloxone Upon Discharge
Updated 6/13/2019
Hospitals treating individuals who suffer from non-fatal opioid-related overdoses have an important opportunity to provide naloxone upon discharge. Providing naloxone can be an effective tool to prevent a fatal overdose, as data indicates that a risk factor for a fatal overdose incudes discharge from emergency medical care following opioid intoxication or poisoning. This document provides guidance to hospitals seeking to provide naloxone to at-risk individuals upon discharge.
For questions on this topic, please review the following guidance document. If you need additional information, the most expedient way to have your questions answered will be to e-mail the Board office by visiting: http://www.pharmacy.ohio.gov/contact.aspx.
NOTE: This document is intended to serve as guidance and should not be construed as legal advice or legal opinion on specific facts or circumstances. You should your organization's legal department with respect to any issue or concern.
Table of Contents
Option 1: Personally Furnishing Pursuant to a Physician Approved Protocol
Option 2: Dispensing Naloxone from a Hospital Pharmacy Pursuant to a Physician Approved Protocol
T:
(614) 466.4143
|
F:
(614) 752.4836
| [email protected]
|
www.pharmacy.ohio.gov
Option 1: Personally Furnishing Pursuant to a Physician Approved Protocol
Ohio law (ORC 4731.941) permits a physician to authorize one or more individuals to personally furnish a supply of naloxone pursuant to a protocol to an individual who there is reason to believe is experiencing or at risk of experiencing an opioid-related overdose.
This allows any appropriately trained hospital staff (nurse, pharmacist, pharmacy technician, social worker, etc.) to personally furnish naloxone to at-risk individuals prior to discharge. The following FAQ provides additional information regarding the use of a physician approved protocol.
What are the requirements of the protocol?
The protocol must include all the following:
(1) A description of the clinical pharmacology of naloxone;
(2) Precautions and contraindications concerning furnishing naloxone;
(3) Any limitations the physician specifies concerning the individuals to whom naloxone may be furnished;
(4) The naloxone dosage that may be furnished and any variation in the dosage based on circumstances specified in the protocol;
(5) Labeling, storage, record-keeping, and administrative requirements;
(6) Training requirements that must be met before an individual will be authorized to furnish naloxone;
(7) Any instructions or training that the authorized individual must provide to an individual to whom naloxone is furnished.
Is the authorizing physician required to name specific individuals permitted to personally furnish naloxone?
The authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained social workers or use of internal hospital credentialing). Regardless of how "authorized individuals" are identified in the protocol, the hospital should have policies in place to ensure all the following:
(1) The authorized individual complies with the protocol established, including having completed the training required by the protocol.
(2) The authorized individual instructs the individual to whom naloxone is furnished to summon emergency services as soon as practicable either before or after administering naloxone.
Is there a sample protocol available?
The Ohio Department of Health, in collaboration with the State Board of Pharmacy, have developed the following sample protocol for personally furnishing naloxone that can be accessed here.
What type of prescribers are able to authorize the protocol?
Ohio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.
Should the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?
Such a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.
How do I store naloxone?
There are a number of options for storing naloxone that is personally furnished by hospital staff. It can be maintained in an automated medication dispensing system that is used by nurses and other individuals authorized by law to administer medications.
For individuals that do not have access to a dispensing syst<cursor_is_here> If a secure cabinet or room is not available, it may also be stored in a container which is sealed with a tamper-evident seal that must be broken to gain access.
What are the record keeping requirements for personally furnishing naloxone pursuant to a protocol?
Rule 4729-9-22 requires all records related to personally furnishing to contain a description of the kind and quantity of the drug provided, the name and address of the person to whom or for whose use the drug was personally furnished. These records can be kept in as separate log or can be entered as part of the patient's medical record. The rule also requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).
What are the labeling requirements for personally furnishing naloxone pursuant to a protocol?
Rule 4729-5-17 requires the following to be affixed to naloxone, prior to personally furnishing the drug to the patient:
(1) The name and address of the physician. This should be the name of the physician authorizing the protocol and the hospital address.
(2) The name of the patient for whom the naloxone is intended.
(3) Name and strength of the naloxone.
(4) Directions for use; and
(5) Date furnished.
These labels can be preprinted with the name and strength of the drug and directions for use. The staff personally furnishing the drug would be responsible for filling in the remainder of the information on the labels.
If personally furnishing naloxone pursuant to a protocol, is the physician required to conduct the final check of the drug?
No. Rule 4729-5-17 permits the authorized individual personally furnishing naloxone pursuant to the protocol to do all of the following:
[x] Prepare, package and appropriately label the naloxone.
[x] Conduct the final check of the naloxone prior to personally furnishing on behalf of the physician.
[x] Keep and maintain all records in accordance with rule 4729-9-22 of the Administrative Code. The rule requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).
[x] Conduct patient counseling, including training on the use of naloxone, as specified in the physician protocol.
Do I need a patient-specific prescriber order to personally furnish naloxone?
No. While an order may be required to bill the patient's insurance for the naloxone, it is not necessary to personally furnish naloxone pursuant to a protocol. For the purposes of compliance with Board of Pharmacy regulations, a protocol authorized pursuant to 4731.941 is considered a valid order.
Can I bill a patient's insurance for the naloxone?
It may be possible to bill a patient's insurance for the naloxone. It is recommended you contact your hospital's billing department for more information.
Is there written information available to assist with the training of patients?
Yes. The Board has developed a brochure (available in English and Spanish) that covers many of the typical training requirements for providing naloxone to laypersons. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone
Copies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:
o Name of Requestor
o Hospital Name
o Mailing Address
o Phone Number
o Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)
Please allow 7-10 days for delivery from the date of the request.
Additional training materials can also be accessed here:
Ohio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/
Prescribe to Prevent: http://prescribetoprevent.org
Are there any protections in the law for physicians and individuals authorized to personally furnish naloxone on behalf of the physician pursuant to a protocol?
ORC 4731.941 states that a physician and a person authorized by the physician to personally furnish naloxone, acting in good faith, are not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is furnished: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.
What type of naloxone can be personally furnished pursuant to the physician approved protocol?
The law does not specify or limit the type of naloxone that can be personally furnished pursuant to a physician approved protocol. However, the type of naloxone that may be personally furnished is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.
Are there any substance abuse treatment resources available?
It is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.
The Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347
MHAS also has a toll-free treatment referral line: 1-877-275-6364.
Option 2: Dispensing Naloxone from the Hospital Pharmacy Pursuant to a Protocol
Naloxone may also be dispensed by a hospital pharmacy for outpatient use pursuant to a physician approved protocol. For example, if a patient is identified as meeting the criteria specified in the pharmacy's protocol, a hospital employee (nurse, social worker, etc.) can request naloxone be dispensed from the pharmacy in the patient's name.
Pursuant to rule 4729-5-39, a pharmacist, pharmacist intern or a pharmacist's designee (which can be the individual who requests the naloxone) can provide the required training to the patient. The pharmacist, intern or pharmacist's designee can provide the naloxone once dispensed by the hospital pharmacy.
NOTE: This does apply to the prescribing and dispensing of naloxone by a pharmacist acting pursuant to a consult agreement. Nor does it apply to dispensing pursuant to a patient-specific prescriber order.
What are the requirements for an approved protocol?
Unlike personally furnishing, the requirements for a pharmacy protocol are specified in rule 47295-39.
According to the rule, a physician approved protocol for dispensing naloxone must include all the following:
(1) A description of the clinical pharmacology of naloxone.
(2) Indications for use of naloxone as rescue therapy, including criteria for identifying persons eligible to receive naloxone under the protocol.
(3) Precautions and contraindications concerning dispensing naloxone.
(4) Assessment and follow-up actions by the pharmacist or pharmacy intern.
(5) Naloxone products authorized to be dispensed, including: name of product, dose, route of administration, required delivery device and directions for use.
(6) Any patient instructions in addition to the counseling requirements in the rule.
Is the authorizing physician required to name specific pharmacists or interns who are authorized to dispense furnish naloxone pursuant to a protocol?
The authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained pharmacists and interns). Regardless of how "authorized individuals" are identified in the protocol, the hospital should have policies in place to ensure all the following:
(1) The authorized pharmacist/intern or pharmacist designee complies with the protocol established by the authorizing physician, including having completed the training required by the protocol.
(2) The authorized pharmacist/intern or designee instructs the individual to whom naloxone is dispensed to summon emergency services as soon as practicable either before or after administering naloxone.
Is there a sample protocol available?
Yes. The Board has developed a sample protocol that can be used by physicians and pharmacies as their official protocol. The sample protocol can be accessed here: www.pharmacy.ohio.gov/naloxoneprotocol.
NOTE: While the sample protocol includes several indications for the provision of naloxone, it is up to the authorizing physician to determine which of these categories is appropriate for individuals discharged from the hospital.
What type of patient training is required prior to the provision of naloxone pursuant to a physician protocol?
A pharmacist, pharmacy intern under the direct supervision of a pharmacist, or a pharmacist's designee that is appropriately trained shall personally provide in-person training and written educational materials to the individual to whom naloxone is dispensed:
(1) Risk factors of opioid overdose;
(2) Strategies to prevent opioid overdose;
(3) Signs of opioid overdose;
(4) Steps in responding to an overdose;
(5) Information on naloxone;
(6) Procedures for administering naloxone;
(7) Proper storage and expiration of naloxone product dispensed; and
(8) Information on where to obtain a referral for substance abuse treatment.
The hospital and the pharmacy's responsible person on their terminal distributor license shall ensure that all pharmacist designees are appropriately trained on the use of naloxone and can meet the training requirements listed above.
NOTE: A designee can be any hospital employee (nurse, social worker, etc.) and does not have to be limited to a pharmacy employee.
Is an offer to counsel the patient required if dispensing pursuant to a protocol?
Yes. An offer to counsel if still required. However, the pharmacist or intern shall not be required to counsel a patient or caregiver pursuant to rule 4729-5-22 of the Administrative Code if the patient or caregiver refuses the offer of counseling or does not respond to the written offer to counsel.
In this situation, when counseling is refused, the pharmacist, intern or their designee shall ensure that such refusal is documented in the presence of the patient or the patient's caregiver.
What type of prescribers can authorize the protocol?
Ohio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.
Should the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?
Such a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (such abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.
What are there recordkeeping and other requirements for dispensing naloxone pursuant to a protocol?
All laws and regulations regarding the outpatient dispensing of drugs by a pharmacy would apply to naloxone dispensed pursuant to a protocol.
All drugs dispensed for use by outpatients of an institutional facility shall be labeled in accordance with paragraphs (A), (B), and (C) of rule 4729-5-16 of the Administrative Code
I am a pharmacy dispensing naloxone pursuant to a prescription. Do I need to comply with the requirements of OAC 4729-5-39?
No. The requirements for OAC 4729-5-39 are only required for pharmacies that dispense naloxone pursuant to a physician approved protocol. It does not apply to pharmacies that provide naloxone pursuant to a prescription or an order by a licensed prescriber.
Rule 4729-5-39 requires notification to the Board of Pharmacy if dispensing naloxone pursuant to a physician authorized protocol. Does this apply if dispensing only to individuals being treated at a hospital?
No. If the hospital pharmacy is only engaged in dispensing to patients upon discharge, then notification is not required pursuant to paragraph (I) of the rule.
Can I bill a patient's insurance for the naloxone?
It may be possible to bill a patient's insurance for the naloxone dispensed. It is recommended you contact your hospital's billing department for more information.
NOTE: Pursuant to Ohio law, a pharmacist may document the dispensing of naloxone by the pharmacist or a pharmacy intern supervised by the pharmacist on a prescription form. The form may be assigned a number for record-keeping purposes.
Is there written information available to assist with the training of patients?
Yes. The Board has developed a brochure that covers many of the typical training requirements for providing naloxone. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone
Copies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:
o Name of Requestor
o Hospital Name
o Mailing Address
o Phone Number
o Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)
Please allow 7-10 days for delivery from the date of the request.
Additional training materials can also be accessed here:
Ohio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/
Prescribe to Prevent:
http://prescribetoprevent.org
Are there any protections in the law for physicians and pharmacists/interns authorized to dispense naloxone pursuant to a protocol?
Yes. A pharmacist, pharmacy intern, or physician, acting in good faith, is not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is dispensed: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.
What type of naloxone can be dispensed pursuant to the physician approved protocol?
The law does not specify or limit the type of naloxone that can be dispensed pursuant to a physician approved protocol. However, the type of naloxone that may be dispensed is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.
Are there any age restrictions for dispensing naloxone pursuant to a protocol?
Unless specified in the protocol, there are no restrictions on age for dispensing naloxone. A pharmacist must use their professional judgement to determine if a minor is sufficiently mature with respect to intellect and emotions to carry out all the responsibilities to effectively respond to a suspected overdose, including the administration of naloxone.
Are there any substance abuse treatment resources available?
It is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.
The Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347
MHAS also has a toll-free treatment referral line: 1-877-275-6364.
</text>
|
[
{
"content": "<url>\nhttps://pharmacy.ohio.gov/Documents/Pubs/Naloxone/Hospital/Guidance%20Document%20-%20Hospitals%20Providing%20Naloxone%20Upon%20Discharge.pdf\n</url>\n<text>\nHospitals Providing Naloxone Upon Discharge\n\nUpdated 6/13/2019\n\nHospitals treating individuals who suffer from non-fatal opioid-related overdoses have an important opportunity to provide naloxone upon discharge. Providing naloxone can be an effective tool to prevent a fatal overdose, as data indicates that a risk factor for a fatal overdose incudes discharge from emergency medical care following opioid intoxication or poisoning. This document provides guidance to hospitals seeking to provide naloxone to at-risk individuals upon discharge.\n\nFor questions on this topic, please review the following guidance document. If you need additional information, the most expedient way to have your questions answered will be to e-mail the Board office by visiting: http://www.pharmacy.ohio.gov/contact.aspx.\n\nNOTE: This document is intended to serve as guidance and should not be construed as legal advice or legal opinion on specific facts or circumstances. You should your organization's legal department with respect to any issue or concern.\n\nTable of Contents\n\nOption 1: Personally Furnishing Pursuant to a Physician Approved Protocol\n\nOption 2: Dispensing Naloxone from a Hospital Pharmacy Pursuant to a Physician Approved Protocol\n\nT:\n\n(614) 466.4143\n\n|\n\nF:\n\n(614) 752.4836\n\n| [email protected]\n\n|\n\nwww.pharmacy.ohio.gov\n\nOption 1: Personally Furnishing Pursuant to a Physician Approved Protocol\n\nOhio law (ORC 4731.941) permits a physician to authorize one or more individuals to personally furnish a supply of naloxone pursuant to a protocol to an individual who there is reason to believe is experiencing or at risk of experiencing an opioid-related overdose.\n\nThis allows any appropriately trained hospital staff (nurse, pharmacist, pharmacy technician, social worker, etc.) to personally furnish naloxone to at-risk individuals prior to discharge. The following FAQ provides additional information regarding the use of a physician approved protocol.\n\nWhat are the requirements of the protocol?\n\nThe protocol must include all the following:\n\n(1) A description of the clinical pharmacology of naloxone;\n(2) Precautions and contraindications concerning furnishing naloxone;\n(3) Any limitations the physician specifies concerning the individuals to whom naloxone may be furnished;\n(4) The naloxone dosage that may be furnished and any variation in the dosage based on circumstances specified in the protocol;\n(5) Labeling, storage, record-keeping, and administrative requirements;\n(6) Training requirements that must be met before an individual will be authorized to furnish naloxone;\n(7) Any instructions or training that the authorized individual must provide to an individual to whom naloxone is furnished.\n\nIs the authorizing physician required to name specific individuals permitted to personally furnish naloxone?\n\nThe authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained social workers or use of internal hospital credentialing). Regardless of how \"authorized individuals\" are identified in the protocol, the hospital should have policies in place to ensure all the following:\n\n(1) The authorized individual complies with the protocol established, including having completed the training required by the protocol.\n(2) The authorized individual instructs the individual to whom naloxone is furnished to summon emergency services as soon as practicable either before or after administering naloxone.\n\nIs there a sample protocol available?\n\nThe Ohio Department of Health, in collaboration with the State Board of Pharmacy, have developed the following sample protocol for personally furnishing naloxone that can be accessed here.\n\nWhat type of prescribers are able to authorize the protocol?\n\nOhio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.\n\nShould the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?\n\nSuch a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.\n\nHow do I store naloxone?\n\nThere are a number of options for storing naloxone that is personally furnished by hospital staff. It can be maintained in an automated medication dispensing system that is used by nurses and other individuals authorized by law to administer medications.\n\nFor individuals that do not have access to a dispensing syst<cursor_is_here> If a secure cabinet or room is not available, it may also be stored in a container which is sealed with a tamper-evident seal that must be broken to gain access.\n\nWhat are the record keeping requirements for personally furnishing naloxone pursuant to a protocol?\n\nRule 4729-9-22 requires all records related to personally furnishing to contain a description of the kind and quantity of the drug provided, the name and address of the person to whom or for whose use the drug was personally furnished. These records can be kept in as separate log or can be entered as part of the patient's medical record. The rule also requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).\n\nWhat are the labeling requirements for personally furnishing naloxone pursuant to a protocol?\n\nRule 4729-5-17 requires the following to be affixed to naloxone, prior to personally furnishing the drug to the patient:\n\n(1) The name and address of the physician. This should be the name of the physician authorizing the protocol and the hospital address.\n(2) The name of the patient for whom the naloxone is intended.\n(3) Name and strength of the naloxone.\n(4) Directions for use; and\n\n(5) Date furnished.\n\nThese labels can be preprinted with the name and strength of the drug and directions for use. The staff personally furnishing the drug would be responsible for filling in the remainder of the information on the labels.\n\nIf personally furnishing naloxone pursuant to a protocol, is the physician required to conduct the final check of the drug?\n\nNo. Rule 4729-5-17 permits the authorized individual personally furnishing naloxone pursuant to the protocol to do all of the following:\n\n[x] Prepare, package and appropriately label the naloxone.\n[x] Conduct the final check of the naloxone prior to personally furnishing on behalf of the physician.\n[x] Keep and maintain all records in accordance with rule 4729-9-22 of the Administrative Code. The rule requires the positive identification of the person who personally furnished the drug to the patient (this can easily be achieved through a manual wet-ink signature on the log).\n[x] Conduct patient counseling, including training on the use of naloxone, as specified in the physician protocol.\n\nDo I need a patient-specific prescriber order to personally furnish naloxone?\n\nNo. While an order may be required to bill the patient's insurance for the naloxone, it is not necessary to personally furnish naloxone pursuant to a protocol. For the purposes of compliance with Board of Pharmacy regulations, a protocol authorized pursuant to 4731.941 is considered a valid order.\n\nCan I bill a patient's insurance for the naloxone?\n\nIt may be possible to bill a patient's insurance for the naloxone. It is recommended you contact your hospital's billing department for more information.\n\nIs there written information available to assist with the training of patients?\n\nYes. The Board has developed a brochure (available in English and Spanish) that covers many of the typical training requirements for providing naloxone to laypersons. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone\n\nCopies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:\n\no Name of Requestor\no Hospital Name\n\no Mailing Address\no Phone Number\no Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)\n\nPlease allow 7-10 days for delivery from the date of the request.\n\nAdditional training materials can also be accessed here:\n\nOhio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/\n\nPrescribe to Prevent: http://prescribetoprevent.org\n\nAre there any protections in the law for physicians and individuals authorized to personally furnish naloxone on behalf of the physician pursuant to a protocol?\n\nORC 4731.941 states that a physician and a person authorized by the physician to personally furnish naloxone, acting in good faith, are not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is furnished: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.\n\nWhat type of naloxone can be personally furnished pursuant to the physician approved protocol?\n\nThe law does not specify or limit the type of naloxone that can be personally furnished pursuant to a physician approved protocol. However, the type of naloxone that may be personally furnished is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.\n\nAre there any substance abuse treatment resources available?\n\nIt is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.\n\nThe Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347\n\nMHAS also has a toll-free treatment referral line: 1-877-275-6364.\n\nOption 2: Dispensing Naloxone from the Hospital Pharmacy Pursuant to a Protocol\n\nNaloxone may also be dispensed by a hospital pharmacy for outpatient use pursuant to a physician approved protocol. For example, if a patient is identified as meeting the criteria specified in the pharmacy's protocol, a hospital employee (nurse, social worker, etc.) can request naloxone be dispensed from the pharmacy in the patient's name.\n\nPursuant to rule 4729-5-39, a pharmacist, pharmacist intern or a pharmacist's designee (which can be the individual who requests the naloxone) can provide the required training to the patient. The pharmacist, intern or pharmacist's designee can provide the naloxone once dispensed by the hospital pharmacy.\n\nNOTE: This does apply to the prescribing and dispensing of naloxone by a pharmacist acting pursuant to a consult agreement. Nor does it apply to dispensing pursuant to a patient-specific prescriber order.\n\nWhat are the requirements for an approved protocol?\n\nUnlike personally furnishing, the requirements for a pharmacy protocol are specified in rule 47295-39.\n\nAccording to the rule, a physician approved protocol for dispensing naloxone must include all the following:\n\n(1) A description of the clinical pharmacology of naloxone.\n(2) Indications for use of naloxone as rescue therapy, including criteria for identifying persons eligible to receive naloxone under the protocol.\n(3) Precautions and contraindications concerning dispensing naloxone.\n(4) Assessment and follow-up actions by the pharmacist or pharmacy intern.\n(5) Naloxone products authorized to be dispensed, including: name of product, dose, route of administration, required delivery device and directions for use.\n(6) Any patient instructions in addition to the counseling requirements in the rule.\n\nIs the authorizing physician required to name specific pharmacists or interns who are authorized to dispense furnish naloxone pursuant to a protocol?\n\nThe authorizing physician can identify specific individuals or may use broader categories that include reference to hospital staff (for example, appropriately trained pharmacists and interns). Regardless of how \"authorized individuals\" are identified in the protocol, the hospital should have policies in place to ensure all the following:\n\n(1) The authorized pharmacist/intern or pharmacist designee complies with the protocol established by the authorizing physician, including having completed the training required by the protocol.\n(2) The authorized pharmacist/intern or designee instructs the individual to whom naloxone is dispensed to summon emergency services as soon as practicable either before or after administering naloxone.\n\nIs there a sample protocol available?\n\nYes. The Board has developed a sample protocol that can be used by physicians and pharmacies as their official protocol. The sample protocol can be accessed here: www.pharmacy.ohio.gov/naloxoneprotocol.\n\nNOTE: While the sample protocol includes several indications for the provision of naloxone, it is up to the authorizing physician to determine which of these categories is appropriate for individuals discharged from the hospital.\n\nWhat type of patient training is required prior to the provision of naloxone pursuant to a physician protocol?\n\nA pharmacist, pharmacy intern under the direct supervision of a pharmacist, or a pharmacist's designee that is appropriately trained shall personally provide in-person training and written educational materials to the individual to whom naloxone is dispensed:\n\n(1) Risk factors of opioid overdose;\n(2) Strategies to prevent opioid overdose;\n(3) Signs of opioid overdose;\n(4) Steps in responding to an overdose;\n(5) Information on naloxone;\n(6) Procedures for administering naloxone;\n(7) Proper storage and expiration of naloxone product dispensed; and\n(8) Information on where to obtain a referral for substance abuse treatment.\n\nThe hospital and the pharmacy's responsible person on their terminal distributor license shall ensure that all pharmacist designees are appropriately trained on the use of naloxone and can meet the training requirements listed above.\n\nNOTE: A designee can be any hospital employee (nurse, social worker, etc.) and does not have to be limited to a pharmacy employee.\n\nIs an offer to counsel the patient required if dispensing pursuant to a protocol?\n\nYes. An offer to counsel if still required. However, the pharmacist or intern shall not be required to counsel a patient or caregiver pursuant to rule 4729-5-22 of the Administrative Code if the patient or caregiver refuses the offer of counseling or does not respond to the written offer to counsel.\n\nIn this situation, when counseling is refused, the pharmacist, intern or their designee shall ensure that such refusal is documented in the presence of the patient or the patient's caregiver.\n\nWhat type of prescribers can authorize the protocol?\n\nOhio licensed physicians must authorize the protocol. The law does not limit the number of protocols a physician may authorize.\n\nShould the provision of naloxone be reserved only for individuals who are discharged following opioid intoxication or poisoning?\n\nSuch a determination is the responsibility of the physician authorizing the protocol. However, treatment or identification of other conditions that may be associated with opioid abuse (such abscesses, HIV, endocarditis or hepatitis) may warrant the provision of naloxone upon discharge.\n\nWhat are there recordkeeping and other requirements for dispensing naloxone pursuant to a protocol?\n\nAll laws and regulations regarding the outpatient dispensing of drugs by a pharmacy would apply to naloxone dispensed pursuant to a protocol.\n\nAll drugs dispensed for use by outpatients of an institutional facility shall be labeled in accordance with paragraphs (A), (B), and (C) of rule 4729-5-16 of the Administrative Code\n\nI am a pharmacy dispensing naloxone pursuant to a prescription. Do I need to comply with the requirements of OAC 4729-5-39?\n\nNo. The requirements for OAC 4729-5-39 are only required for pharmacies that dispense naloxone pursuant to a physician approved protocol. It does not apply to pharmacies that provide naloxone pursuant to a prescription or an order by a licensed prescriber.\n\nRule 4729-5-39 requires notification to the Board of Pharmacy if dispensing naloxone pursuant to a physician authorized protocol. Does this apply if dispensing only to individuals being treated at a hospital?\n\nNo. If the hospital pharmacy is only engaged in dispensing to patients upon discharge, then notification is not required pursuant to paragraph (I) of the rule.\n\nCan I bill a patient's insurance for the naloxone?\n\nIt may be possible to bill a patient's insurance for the naloxone dispensed. It is recommended you contact your hospital's billing department for more information.\n\nNOTE: Pursuant to Ohio law, a pharmacist may document the dispensing of naloxone by the pharmacist or a pharmacy intern supervised by the pharmacist on a prescription form. The form may be assigned a number for record-keeping purposes.\n\nIs there written information available to assist with the training of patients?\n\nYes. The Board has developed a brochure that covers many of the typical training requirements for providing naloxone. The brochure is available electronically by visiting: www.pharmacy.ohio.gov/naloxone\n\nCopies of the patient counseling brochure are available free-of-charge from the Board by sending a request with all of the following information to [email protected]:\n\no Name of Requestor\no Hospital Name\no Mailing Address\no Phone Number\no Quantity Requested (there is a 250-brochure limit but additional requests can be made if the hospital is running low)\n\nPlease allow 7-10 days for delivery from the date of the request.\n\nAdditional training materials can also be accessed here:\n\nOhio Department of Health - Project DAWN (Deaths Avoided with Naloxone): https://odh.ohio.gov/wps/portal/gov/odh/know-our-programs/violence-injury-preventionprogram/projectdawn/\n\nPrescribe to Prevent:\n\nhttp://prescribetoprevent.org\n\nAre there any protections in the law for physicians and pharmacists/interns authorized to dispense naloxone pursuant to a protocol?\n\nYes. A pharmacist, pharmacy intern, or physician, acting in good faith, is not liable for or subject to any of the following for any action or omission of the individual to whom the naloxone is dispensed: damages in any civil action, prosecution in any criminal proceeding, or professional disciplinary action.\n\nWhat type of naloxone can be dispensed pursuant to the physician approved protocol?\n\nThe law does not specify or limit the type of naloxone that can be dispensed pursuant to a physician approved protocol. However, the type of naloxone that may be dispensed is subject to the formulations specified within the physician protocol. If new formulations are developed, they may be added to the protocol.\n\nAre there any age restrictions for dispensing naloxone pursuant to a protocol?\n\nUnless specified in the protocol, there are no restrictions on age for dispensing naloxone. A pharmacist must use their professional judgement to determine if a minor is sufficiently mature with respect to intellect and emotions to carry out all the responsibilities to effectively respond to a suspected overdose, including the administration of naloxone.\n\nAre there any substance abuse treatment resources available?\n\nIt is recommended that the hospital provide substance abuse treatment resources and/or referrals to patients. You can get more information about such resources by contacting your local treatment board.\n\nThe Ohio Department of Mental Health and Addiction Services (MHAS) has a listing of treatment resources that can be accessed here: http://mha.ohio.gov/Default.aspx?tabid=347\n\nMHAS also has a toll-free treatment referral line: 1-877-275-6364.\n</text>\n",
"role": "user"
},
{
"content": "em or where no such system is available, the naloxone can be stored a locked cabinet, room, or drawer accessible to individuals authorized under the physician's protocol.",
"role": "assistant"
}
] |
A study of the bioavailability of 90 Sr, 137 Cs, and 239+240 Pu in soils at two locations of Spain affected by different radionuclide contamination events
A. Baeza 1 , J. Guillén 1 , A. Espinosa 2 , A. Aragón 2 and J. Gutierrez 2
1
University of Extremadura, Department of Physics, Avda. de la Universidad s/n,
10071 Cáceres, Spain, e-mail: [email protected]
2 Centro de Investigaciones Energéticas Medioambientales y Tecnológicas, Madrid, Spain
Abstract. It is well known that the bioavailability of artifical radionuclides such as 90 Sr, 137 Cs and 239+240 Pu in contaminated soils depends on the source term origin of the contamination. Altough the behaviour of the mentioned radionuclides in the soil is also influenced by the time passed from the contamination event and the characteristics of the contamination receiving soils. The objective of the present work is to analyse the different bioavailability and possible chemical-physical associations of 90 Sr, 137 Cs, and 239+240 Pu in soils located in different Spanish ecosystems (Almeria and Cáceres provinces) by application of a sequential extraction procedure based on the NIST standard sequential extraction protocol. The resulting fractions obtained are: a) water soluble and exchangeable, b) associated to organic matter, and c) residual fraction. They will be studied jointly with the polluting sources (deposit of nuclear fallout-50s and 60s, Palomares accident in 1966 and the cesium release by Acerinox in 1998) in each ecosystem to interpret the observed behaviour of radionuclides.
1. INTRODUCTION
The bioavailability of artificial radionuclides in soilsdepends on the characteristics of the source, time passed from the contamination event and climatic conditions. The main sources of man-made radionuclides in different localities of Spain are: (a) global fallout in the 50s and 60s; (b) the Palomares accident in 1966, in which plutonium and americium were released; and (c) the radiocaesium release by Acerinox in 1998. Chernobyl fallout was not taken into consideration because in Spain it was negligible compared to global fallout [1]. To analyze the effect on the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu of the various sources we selected two ecosystems affected by each to a different degree – Bazagona and Palomares, located in Cáceres and Almería provinces respectively, and separated by more than 650 km (see fig. 1). Bazagona was presumed to be affected only by global fallout. At this location a profile of soil was also collected to estimate the inventory of the deposited 137Cs and 90Sr, which would confirm its origin. The soil of Palomares was presumed to be in principle affected by all three sources – global fallout, the Palomares accident, and the Acerinox release. Indeed, it was one of the few places in Spain affected by the last event, as can be seen in fig. 1. In both ecosystems, surface soil (0-5 cm) was collected and the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu was determined by means of a sequential extraction procedure based on the NIST standard extraction protocol [2]. Three fractions have been considered: exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual (extracted with HF + HNO3 ).
Article published by EDP Sciences and available at http://www.edpsciences.org/radiopro
or http://dx.doi.org/10.1051/radiopro:2005s1-010
2. MATERIALS AND METHODS
2.1 Sequential extraction
The sequential extraction procedure is based on the NIST standard sequential extraction protocol [2]. Three fraction have been obtained:
a) Exchangeable, extracted with MgCl2 0.4M with a liquid-soil ratio of 15:1 at room temperature for 4 h.
b) Bound to organic matter, extracted with NaClO 5% at pH 8.5 with a liquid-soil ratio of 15:1 at room temperature for 2 h.
c) Residue: this was acid digested with HNO3 and HF.
After each extraction, the liquid phase was separated from the solid phase by vacuum filtration through Whatman 42 filter paper and then through a 0.47 µm membrane filter. The filter was then calcined at 400 °C and added to the residue before the following extraction.
2.2 Radionuclide determination
All fractions were evaporated to dryness and the residues were put into 71 mm diameter, 30 mm deep, Petri dishes for gamma spectrometric assay. This was carried out using an n-type germanium detector with a 25% relative efficiency, a 1.87 keV resolution for the 1332 keV 60 Co peak, and a peak-to-Compton ratio of 57.5:1. The detector was coupled to a Compton effect suppressing device [4], which permits a better determination of the 137 Cs activity level since it reduces the contribution of the equipment's background that is largely due to the Compton scattering of photons from 40 K present in the samples. The reduction is by a factor of 2 in the 661.6 keV energy region of the 137 Cs emission.
After their gamma spectrometric analysis, the soil samples were calcined at 600 C to eliminate the organic matter prior to the 90 Sr radiochemical separation [5]. A second stage included acid digestion and precipitation of strontium and barium as nitrates. This precipitate was dissolved in distilled water, and iron and other multivalent elements precipitated out as hydroxides. With these elements removed from the solution, strontium was then precipitated out at pH 8 as SrCO3 onto a 5 cm diameter striated planchet. The recovery was determined by gravimetry. Once 90 Sr- 90 Y equilibrium had been reached, the sample was measured in a low background gas flow proportional counter (Canberra model 2401).
The procedure used for the determination of plutonium is based on an optimization of various methods proposed by other authors [6, 7]. The soil samples were calcined at 600 C, and acid digested with HF and HNO3. For the extraction, Fe was added to the solution, and the plutonium was coprecipitated with iron hydroxide. The iron and plutonium were reduced by adding hydrazine, with which plutonium passes to Pu (III). The plutonium valence was adjusted to IV by adding HNO3 and NaNO2, followed by separation in a column with Dowex 1x8 resin or AG 1x2 [6]. The samples were passed through in HNO3 8M to retain the plutonium and thorium. Thorium was eluted from the column with concentrated HCl, and plutonium with a combination of dilute HCl and hydroxylamine. The alpha sources were prepared by coprecipitation with NdF3 [8] and electrodeposition [6]. The alpha spectrometric analyses were carried out using silicon detectors with a mean efficiency of 23.2%, and a resolution of 38.7 keV for a source-detector distance of 6 mm.
3. RESULTS AND DISCUSSION
Table 1 lists the activity levels of 137 Cs, 90 Sr, and 239+240 Pu from the total fraction of the soils from Bazagona and Palomares. As can be seen, the greatest difference between the two soils was in the 239+240Pu content because of the plutonium released in the Palomares accident in 1996. The 90Sr contents were similar, suggesting that global fallout is their common origin. The 137 Cs content was higher in Bazagona than in Palomares, suggesting that the release of radiocaesium from Acerinox might not have made a significant contribution to the 137 Cs deposited in the soil because the direction of the wind was as shown in fig. 1, and the activity level of 137 Cs in the air of Palomares (890 mBq/m 3 ) was lower than in some locations of France (200-2430 Bq/m 3 ) and Italy (140-1700 Bq/m 3 ) [3].
Table 1. Activity levels of 137 Cs, 90 Sr, and 239+240 Pu, in Bq/kg d.w., detected in surface soil (0-5 cm) in Bazagona and Palomares.
| Location | 137Cs (Bq/kg) | 90Sr (Bq/kg) |
|---|---|---|
| Bazagona | 21.7 ± 1.6 | 1.00 ± 0.14 |
In order to verify the global fallout origin, in Bazagona the soil profile of 137 Cs and 90 Sr was also determined (fig. 2). The maximum activity for 137 Cs was detected in the surface layer, but for 90 Sr was deeper due to the different mobility of caesium and strontium in soil [9, 10]. To estimate the total inventory deposited in the soil, we fitted the experimental data to an exponential function that decreases with depth:
where I(z) is the cumulative inventory in Bq/m 2 down to depth z, I∞ is the total inventory to infinite depth in Bq/m 2 , α is the reciprocal of the relaxation length in cm -1 , and z is the linear depth. The results of the fit for 137 Cs and 90 Sr in the Bazagona soil were:
Considering the total inventory in the soil, the 137 Cs/ 90 Sr ratio is (1.1 ± 0.7). Given the associated uncertainty, this ratio is coherent with the value of 1.66 for global fallout at the latitude of Spain [9, 11].
Table 2 lists the percentages of the total activity of 137 Cs, 90 Sr, and 239+240 Pu detected in each fraction considered in the sequential extraction procedure. The results of the speciation for 137 Cs and 90 Sr are the same for both soils – most is found in the residual fraction, the percentages in the fractions extracted with MgCl2 and NaClO being beneath the detection limit of 0.028 and 0.020 Bq for 137 Cs and 90 Sr respectively. This suggested that the 137 Cs source was the same for the two soils. The percentage of 137 Cs bound to the organic matter fraction is coherent with the low percentage of radiocaesium that binds to humic and fulvic acids, which are a significant component of the organic matter of soil [12, 13]. For 239+240 Pu, the exchangeable fraction was the least important in both soils. Whereas in Bazagona these isotopes were mainly bound to organic matter, as found by other authors [12, 13, 14], in Palomares they were mainly detected in the residual fraction. This different association is probably due to the chemical form of plutonium incorporated to each soil. In Palomares, the plutonium was spread as the result of conventional chemical explosions destroying the two H-bombs, whereas that of global fallout was spread mainly as the result of nuclear explosions with far higher temperatures involved.
Table 2. Percentages of 137 Cs, 90 Sr, and 239+240 Pu detected in exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual fractions in surface soil from Bazagona and Palomares. DL = detection limit.
| Fraction | Bazagona | | | Palomares | | |
|---|---|---|---|---|---|---|
| | 137Cs | 90Sr | 239+240Pu | 137Cs | 90Sr | 239+240Pu |
| MgCl 2 | DL | DL | 0.92 ± 0.19 | DL | DL | (9.4±1.7)·10-3 |
| NaClO | DL | DL | 61 ± 4 | DL | DL | 0.36 ± 0.05 |
References
[1] M. Llauradó, M. Vidal, G. Rauret, M.C. Roca, J. Fons, V.R. Vallejo, J. Environ. Radioactiv. 23 (1994) 81-100.
[2] M.K. Schultz, W.C. Burnett, K.G.W. Inn, J. Environ. Radioactiv. 40 (1998) 155-174.
[3] I. Palomino, F.Martín, S. Núñez, J. Gutiérrez, Radioprotección, 21 (1999) 31-42 (in Spanish)
[4] A. López, J.L. Ferrero, E. Navarro, A. Baeza, F.J. Guillén, in Proceedings the 24 th Annual Meeting of the Spanish Nuclear Society, Valladolid 1998. (in Spanish).
[5] C. Gascó, A. Álvarez, Sp ISSN 0081-3397. CIEMAT 617, Madrid, 1998. (in Spanish).
[6] E. Iranzo, A. Espinosa, A. Bellido, C. Gascó, A. Aragón, J. Gutiérrez, CIEMAT/IMA/UGIA/ M5A01 /03/92. CIEMAT, Madrid. (1992).
[7] J.J. LaRosa, E.L. Cooper, A. Ghods-Esphahani, V. Jansta, M. Makarewicz, S. Shawky, N. Vajda, J. Environ. Radioactiv. 17 (1992) 183-209.
[8] C.W. Sill, Nucl. Chem. Waste Manage. 7 (1987) 201-215.
[9] A. Baeza, M. del Río, C. Miró, J. Paniagua, J. Radioanal. Nucl. Chem. 174 (1993) 297-316.
[10] S. Forsberg, K. Rosén, F. Bréchignac, J. Environ. Radioactiv. 54 (2001) 253-265.
[11] UNSCEAR, in Ionizing radiation: sources and biological effects (1982)
[12] M.H. Lee, C.W. Lee, J. Environ. Radioactiv. 47 (2000) 253-262.
[13] Y. Fujikawa, J. Zheng, I. Cayer, M. Sugahara, H. Takigami, A. Kudo, J. Radioanal. Nucl. Chem. 240 (1999) 69-74.
[14] G.T. Cook, M.S. Baxter, H.J. Duncan, J. Toole, R. Malcolmson, Nucl. Instruments Methods 223 (1984) 517-522.
|
<urn:uuid:af04e2e8-8aed-461a-9204-ab56c434445f>
|
CC-MAIN-2018-30
|
https://www.radioprotection.org/articles/radiopro/pdf/2005/02/p103.pdf
|
2018-07-19T23:28:01Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591332.73/warc/CC-MAIN-20180719222958-20180720002958-00541.warc.gz
| 952,272,226
| 3,307
|
eng_Latn
|
eng_Latn
| 0.790031
|
eng_Latn
| 0.970667
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
3402,
4880,
8396,
10448,
11893
] |
A study of the bioavailability of 90 Sr, 137 Cs, and 239+240 Pu in soils at two locations of Spain affected by different radionuclide contamination events
A. Baeza 1 , J. Guillén 1 , A. Espinosa 2 , A. Aragón 2 and J. Gutierrez 2
1
University of Extremadura, Department of Physics, Avda. de la Universidad s/n,
10071 Cáceres, Spain, e-mail: [email protected]
2 Centro de Investigaciones Energéticas Medioambientales y Tecnológicas, Madrid, Spain
Abstract. It is well known that the bioavailability of artifical radionuclides such as 90 Sr, 137 Cs and 239+240 Pu in contaminated soils depends on the source term origin of the contamination. Altough the behaviour of the mentioned radionuclides in the soil is also influenced by the time passed from the contamination event and the characteristics of the contamination receiving soils. The objective of the present work is to analyse the different bioavailability and possible chemical-physical associations of 90 Sr, 137 Cs, and 239+240 Pu in soils located in different Spanish ecosystems (Almeria and Cáceres provinces) by application of a sequential extraction procedure based on the NIST standard sequential extraction protocol. The resulting fractions obtained are: a) water soluble and exchangeable, b) associated to organic matter, and c) residual fraction. They will be studied jointly with the polluting sources (deposit of nuclear fallout-50s and 60s, Palomares accident in 1966 and the cesium release by Acerinox in 1998) in each ecosystem to interpret the observed behaviour of radionuclides.
1. INTRODUCTION
The bioavailability of artificial radionuclides in soilsdepends on the characteristics of the source, time passed from the contamination event and climatic conditions. The main sources of man-made radionuclides in different localities of Spain are: (a) global fallout in the 50s and 60s; (b) the Palomares accident in 1966, in which plutonium and americium were released; and (c) the radiocaesium release by Acerinox in 1998. Chernobyl fallout was not taken into consideration because in Spain it was negligible compared to global fallout [1]. To analyze the effect on the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu of the various sources we selected two ecosystems affected by each to a different degree – Bazagona and Palomares, located in Cáceres and Almería provinces respectively, and separated by more than 650 km (see fig. 1). Bazagona was presumed to be affected only by global fallout. At this location a profile of soil was also collected to estimate the inventory of the deposited 137Cs and 90Sr, which would confirm its origin. The soil of Palomares was presumed to be in principle affected by all three sources – global fallout, the Palomares accident, and the Acerinox release. Indeed, it was one of the few places in Spain affected by the last event, as can be seen in fig. 1. In both ecosystems, surface soil (0-5 cm) was collected and the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu was determined by means of a sequential extraction procedure based on the NIST standard extraction protocol [2]. Three fractions have been considered: exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual (extracted with HF + HNO3 ).
Article published by EDP Sciences and available at http://www.edpsciences.org/radiopro
or http://dx.doi.org/10.1051/radiopro:2005s1-010
2. MATERIALS AND METHODS
2.1 Sequential extraction
The sequential extraction procedure is based on the NIST standard sequential extraction protocol [2]. Three fraction have been obtained:
a) Exchangeable, extracted with MgCl2 0.4M with a liquid-soil ratio of 15:1 at room temperature for 4 h.
b) Bound to organic matter, extracted with NaClO 5% at pH 8.5 with a liquid-soil ratio of 15:1 at room temperature for 2 h.
c) Residue: this was acid digested with HNO3 and HF.
After each extraction, the liquid phase was separated from the solid phase by vacuum filtration through Whatman 42 filter paper and then through a 0.47 µm membrane filter. The filter was then calcined at 400 °C and added to the residue before the following extraction.
2.2 Radionuclide determination
All fractions were evaporated to dryness and the residues were put into 71 mm diameter, 30 mm deep, Petri dishes for gamma spectrometric assay. This was carried out using an n-type germanium detector with a 25% relative efficiency, a 1.87 keV resolution for the 1332 keV 60 Co peak, and a peak-to-Compton ratio of 57.5:1. The detector was coupled to a Compton effect suppressing device [4], which permits a better determination of the 137 Cs activity level since it reduces the contribution of the equipment's background that is largely due to the Compton scattering of photons from 40 K present in the samples. The reduction is by a factor of 2 in the 661.6 keV energy region of the 137 Cs emission.
After their gamma spectrometric analysis, the soil samples were calcined at 600 C to eliminate the organic matter prior to the 90 Sr radiochemical separation [5]. A second stage included acid digestion and precipitation of strontium and barium as nitrates. This precipitate was dissolved in distilled water, and iron and other multivalent elements precipitated out as hydroxides. With these elements removed from the solution, strontium was then precipitated out at pH 8 as SrCO3 onto a 5 cm diameter striated planchet. The recovery was determined by gravimetry. Once 90 Sr- 90 Y equilibrium had been reached, the sample was measured in a low background gas flow proportional counter (Canberra model 2401).
The procedure used for the determination of plutonium is based on an optimization of various methods proposed by other authors [6, 7]. The soil samples were calcined at 600 C, and acid digested with HF and HNO3. For the extraction, Fe was added to the solution, and the plutonium was coprecipitated with iron hydroxide. The iron and plutonium were reduced by adding hydrazine, with which plutonium passes to Pu (III). The plutonium valence was adjusted to IV by adding HNO3 and NaNO2, followed by separation in a column with Dowex 1x8 resin or AG 1x2 [6]. The samples were passed through in HNO3 8M to retain the plutonium and thorium. Thorium was eluted from the column with concentrated HCl, and plutonium with a combination of dilute HCl and hydroxylamine. The alpha sources were prepared by coprecipitation with NdF3 [8] and electrodeposition [6]. The alpha spectrometric analyses were carried out using silicon detectors with a mean efficiency of 23.2%, and a resolution of 38.7 keV for a source-detector distance of 6 mm.
3. RESULTS AND DISCUSSION
Table 1 lists the activity levels of 137 Cs, 90 Sr, and 239+240 Pu from the total fraction of the soils from Bazagona and Palomares. As can be seen, the greatest difference between the two soils was in the 239+240Pu content because of the plutonium released in the Palomares accident in 1996. The 90Sr contents were similar, suggesting that global fallout is their common origin. The 137 Cs content was higher in Bazagona than in Palomares, suggesting that the release of radiocaesium from Acerinox might not have made a significant contribution to the 137 Cs deposited in the soil because the direction of the wind was as shown in fig. 1, and the activity level of 137 Cs in the air of Palomares (890 mBq/m 3 ) was lower than in some locations of France (200-2430 Bq/m 3 ) and Italy (140-1700 Bq/m 3 ) [3].
Table 1. Activity levels of 137 Cs, 90 Sr, and 239+240 Pu, in Bq/kg d.w., detected in surface soil (0-5 cm) in Bazagona and Palomares.
| Location | 137Cs (Bq/kg) | 90Sr (Bq/kg) |
|---|---|---|
| Bazagona | 21.7 ± 1.6 | 1.00 ± 0.14 |
In order to verify the global fallout origin, in Bazagona the soil profile of 137 Cs and 90 Sr was also determined (fig. 2). The maximum activity for 137 Cs was detected in the surface layer, but for 90 Sr was deeper due to the different mobility of caesium and strontium in soil [9, 10]. To estimate the total inventory deposited in the soil, we fitted the experimental data to an exponential function that decreases with depth:
where I(z) is the cumulative inventory in Bq/m 2 down to depth z, I∞ is the total inventory to infinite depth in Bq/m 2 , α is the reciprocal of the relaxation length in cm -1 , and z is the linear depth. The results of the fit for 137 Cs and 90 Sr in the Bazagona soil were:
Considering the total inventory in the soil, the 137 Cs/ 90 Sr ratio is (1.1 ± 0.7). Given the associated uncertainty, this ratio is coherent with the value of 1.66 for global fallout at the latitude of Spain [9, 11].
Table 2 lists the percentages of the total activity of 137 Cs, 90 Sr, and 239+240 Pu detected in each fraction considered in the sequential extraction procedure. The results of the speciation for 137 Cs and 90 Sr are the same for both soils – most is found in the residual fraction, the percentages in the fractions extracted with MgCl2 and NaClO being beneath the detection limit of 0.028 and 0.020 Bq for 137 Cs and 90 Sr respectively. This suggested that the 137 Cs source was the same for the two soils. The percentage of 137 Cs bound to the organic matter fraction is coherent with the low percentage of radiocaesium that binds to humic and fulvic acids, which are a significant component of the organic matter of soil [12, 13]. For 239+240 Pu, the exchangeable fraction was the least important in both soils. Whereas in Bazagona these isotopes were mainly bound to organic matter, as found by other authors [12, 13, 14], in Palomares they were mainly detected in the residual fraction. Thi
|
s different association is probably due to the chemical form of plutonium incorporated to each soil.
|
In Palomares, the plutonium was spread as the result of conventional chemical explosions destroying the two H-bombs, whereas that of global fallout was spread mainly as the result of nuclear explosions with far higher temperatures involved.
Table 2. Percentages of 137 Cs, 90 Sr, and 239+240 Pu detected in exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual fractions in surface soil from Bazagona and Palomares. DL = detection limit.
| Fraction | Bazagona | | | Palomares | | |
|---|---|---|---|---|---|---|
| | 137Cs | 90Sr | 239+240Pu | 137Cs | 90Sr | 239+240Pu |
| MgCl 2 | DL | DL | 0.92 ± 0.19 | DL | DL | (9.4±1.7)·10-3 |
| NaClO | DL | DL | 61 ± 4 | DL | DL | 0.36 ± 0.05 |
References
[1] M. Llauradó, M. Vidal, G. Rauret, M.C. Roca, J. Fons, V.R. Vallejo, J. Environ. Radioactiv. 23 (1994) 81-100.
[2] M.K. Schultz, W.C. Burnett, K.G.W. Inn, J. Environ. Radioactiv. 40 (1998) 155-174.
[3] I. Palomino, F.Martín, S. Núñez, J. Gutiérrez, Radioprotección, 21 (1999) 31-42 (in Spanish)
[4] A. López, J.L. Ferrero, E. Navarro, A. Baeza, F.J. Guillén, in Proceedings the 24 th Annual Meeting of the Spanish Nuclear Society, Valladolid 1998. (in Spanish).
[5] C. Gascó, A. Álvarez, Sp ISSN 0081-3397. CIEMAT 617, Madrid, 1998. (in Spanish).
[6] E. Iranzo, A. Espinosa, A. Bellido, C. Gascó, A. Aragón, J. Gutiérrez, CIEMAT/IMA/UGIA/ M5A01 /03/92. CIEMAT, Madrid. (1992).
[7] J.J. LaRosa, E.L. Cooper, A. Ghods-Esphahani, V. Jansta, M. Makarewicz, S. Shawky, N. Vajda, J. Environ. Radioactiv. 17 (1992) 183-209.
[8] C.W. Sill, Nucl. Chem. Waste Manage. 7 (1987) 201-215.
[9] A. Baeza, M. del Río, C. Miró, J. Paniagua, J. Radioanal. Nucl. Chem. 174 (1993) 297-316.
[10] S. Forsberg, K. Rosén, F. Bréchignac, J. Environ. Radioactiv. 54 (2001) 253-265.
[11] UNSCEAR, in Ionizing radiation: sources and biological effects (1982)
[12] M.H. Lee, C.W. Lee, J. Environ. Radioactiv. 47 (2000) 253-262.
[13] Y. Fujikawa, J. Zheng, I. Cayer, M. Sugahara, H. Takigami, A. Kudo, J. Radioanal. Nucl. Chem. 240 (1999) 69-74.
[14] G.T. Cook, M.S. Baxter, H.J. Duncan, J. Toole, R. Malcolmson, Nucl. Instruments Methods 223 (1984) 517-522.
| 9,626
|
inside_word
|
This
|
remove_one_sentence
|
<url>
https://www.radioprotection.org/articles/radiopro/pdf/2005/02/p103.pdf
</url>
<text>
A study of the bioavailability of 90 Sr, 137 Cs, and 239+240 Pu in soils at two locations of Spain affected by different radionuclide contamination events
A. Baeza 1 , J. Guillén 1 , A. Espinosa 2 , A. Aragón 2 and J. Gutierrez 2
1
University of Extremadura, Department of Physics, Avda. de la Universidad s/n,
10071 Cáceres, Spain, e-mail: [email protected]
2 Centro de Investigaciones Energéticas Medioambientales y Tecnológicas, Madrid, Spain
Abstract. It is well known that the bioavailability of artifical radionuclides such as 90 Sr, 137 Cs and 239+240 Pu in contaminated soils depends on the source term origin of the contamination. Altough the behaviour of the mentioned radionuclides in the soil is also influenced by the time passed from the contamination event and the characteristics of the contamination receiving soils. The objective of the present work is to analyse the different bioavailability and possible chemical-physical associations of 90 Sr, 137 Cs, and 239+240 Pu in soils located in different Spanish ecosystems (Almeria and Cáceres provinces) by application of a sequential extraction procedure based on the NIST standard sequential extraction protocol. The resulting fractions obtained are: a) water soluble and exchangeable, b) associated to organic matter, and c) residual fraction. They will be studied jointly with the polluting sources (deposit of nuclear fallout-50s and 60s, Palomares accident in 1966 and the cesium release by Acerinox in 1998) in each ecosystem to interpret the observed behaviour of radionuclides.
1. INTRODUCTION
The bioavailability of artificial radionuclides in soilsdepends on the characteristics of the source, time passed from the contamination event and climatic conditions. The main sources of man-made radionuclides in different localities of Spain are: (a) global fallout in the 50s and 60s; (b) the Palomares accident in 1966, in which plutonium and americium were released; and (c) the radiocaesium release by Acerinox in 1998. Chernobyl fallout was not taken into consideration because in Spain it was negligible compared to global fallout [1]. To analyze the effect on the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu of the various sources we selected two ecosystems affected by each to a different degree – Bazagona and Palomares, located in Cáceres and Almería provinces respectively, and separated by more than 650 km (see fig. 1). Bazagona was presumed to be affected only by global fallout. At this location a profile of soil was also collected to estimate the inventory of the deposited 137Cs and 90Sr, which would confirm its origin. The soil of Palomares was presumed to be in principle affected by all three sources – global fallout, the Palomares accident, and the Acerinox release. Indeed, it was one of the few places in Spain affected by the last event, as can be seen in fig. 1. In both ecosystems, surface soil (0-5 cm) was collected and the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu was determined by means of a sequential extraction procedure based on the NIST standard extraction protocol [2]. Three fractions have been considered: exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual (extracted with HF + HNO3 ).
Article published by EDP Sciences and available at http://www.edpsciences.org/radiopro
or http://dx.doi.org/10.1051/radiopro:2005s1-010
2. MATERIALS AND METHODS
2.1 Sequential extraction
The sequential extraction procedure is based on the NIST standard sequential extraction protocol [2]. Three fraction have been obtained:
a) Exchangeable, extracted with MgCl2 0.4M with a liquid-soil ratio of 15:1 at room temperature for 4 h.
b) Bound to organic matter, extracted with NaClO 5% at pH 8.5 with a liquid-soil ratio of 15:1 at room temperature for 2 h.
c) Residue: this was acid digested with HNO3 and HF.
After each extraction, the liquid phase was separated from the solid phase by vacuum filtration through Whatman 42 filter paper and then through a 0.47 µm membrane filter. The filter was then calcined at 400 °C and added to the residue before the following extraction.
2.2 Radionuclide determination
All fractions were evaporated to dryness and the residues were put into 71 mm diameter, 30 mm deep, Petri dishes for gamma spectrometric assay. This was carried out using an n-type germanium detector with a 25% relative efficiency, a 1.87 keV resolution for the 1332 keV 60 Co peak, and a peak-to-Compton ratio of 57.5:1. The detector was coupled to a Compton effect suppressing device [4], which permits a better determination of the 137 Cs activity level since it reduces the contribution of the equipment's background that is largely due to the Compton scattering of photons from 40 K present in the samples. The reduction is by a factor of 2 in the 661.6 keV energy region of the 137 Cs emission.
After their gamma spectrometric analysis, the soil samples were calcined at 600 C to eliminate the organic matter prior to the 90 Sr radiochemical separation [5]. A second stage included acid digestion and precipitation of strontium and barium as nitrates. This precipitate was dissolved in distilled water, and iron and other multivalent elements precipitated out as hydroxides. With these elements removed from the solution, strontium was then precipitated out at pH 8 as SrCO3 onto a 5 cm diameter striated planchet. The recovery was determined by gravimetry. Once 90 Sr- 90 Y equilibrium had been reached, the sample was measured in a low background gas flow proportional counter (Canberra model 2401).
The procedure used for the determination of plutonium is based on an optimization of various methods proposed by other authors [6, 7]. The soil samples were calcined at 600 C, and acid digested with HF and HNO3. For the extraction, Fe was added to the solution, and the plutonium was coprecipitated with iron hydroxide. The iron and plutonium were reduced by adding hydrazine, with which plutonium passes to Pu (III). The plutonium valence was adjusted to IV by adding HNO3 and NaNO2, followed by separation in a column with Dowex 1x8 resin or AG 1x2 [6]. The samples were passed through in HNO3 8M to retain the plutonium and thorium. Thorium was eluted from the column with concentrated HCl, and plutonium with a combination of dilute HCl and hydroxylamine. The alpha sources were prepared by coprecipitation with NdF3 [8] and electrodeposition [6]. The alpha spectrometric analyses were carried out using silicon detectors with a mean efficiency of 23.2%, and a resolution of 38.7 keV for a source-detector distance of 6 mm.
3. RESULTS AND DISCUSSION
Table 1 lists the activity levels of 137 Cs, 90 Sr, and 239+240 Pu from the total fraction of the soils from Bazagona and Palomares. As can be seen, the greatest difference between the two soils was in the 239+240Pu content because of the plutonium released in the Palomares accident in 1996. The 90Sr contents were similar, suggesting that global fallout is their common origin. The 137 Cs content was higher in Bazagona than in Palomares, suggesting that the release of radiocaesium from Acerinox might not have made a significant contribution to the 137 Cs deposited in the soil because the direction of the wind was as shown in fig. 1, and the activity level of 137 Cs in the air of Palomares (890 mBq/m 3 ) was lower than in some locations of France (200-2430 Bq/m 3 ) and Italy (140-1700 Bq/m 3 ) [3].
Table 1. Activity levels of 137 Cs, 90 Sr, and 239+240 Pu, in Bq/kg d.w., detected in surface soil (0-5 cm) in Bazagona and Palomares.
| Location | 137Cs (Bq/kg) | 90Sr (Bq/kg) |
|---|---|---|
| Bazagona | 21.7 ± 1.6 | 1.00 ± 0.14 |
In order to verify the global fallout origin, in Bazagona the soil profile of 137 Cs and 90 Sr was also determined (fig. 2). The maximum activity for 137 Cs was detected in the surface layer, but for 90 Sr was deeper due to the different mobility of caesium and strontium in soil [9, 10]. To estimate the total inventory deposited in the soil, we fitted the experimental data to an exponential function that decreases with depth:
where I(z) is the cumulative inventory in Bq/m 2 down to depth z, I∞ is the total inventory to infinite depth in Bq/m 2 , α is the reciprocal of the relaxation length in cm -1 , and z is the linear depth. The results of the fit for 137 Cs and 90 Sr in the Bazagona soil were:
Considering the total inventory in the soil, the 137 Cs/ 90 Sr ratio is (1.1 ± 0.7). Given the associated uncertainty, this ratio is coherent with the value of 1.66 for global fallout at the latitude of Spain [9, 11].
Table 2 lists the percentages of the total activity of 137 Cs, 90 Sr, and 239+240 Pu detected in each fraction considered in the sequential extraction procedure. The results of the speciation for 137 Cs and 90 Sr are the same for both soils – most is found in the residual fraction, the percentages in the fractions extracted with MgCl2 and NaClO being beneath the detection limit of 0.028 and 0.020 Bq for 137 Cs and 90 Sr respectively. This suggested that the 137 Cs source was the same for the two soils. The percentage of 137 Cs bound to the organic matter fraction is coherent with the low percentage of radiocaesium that binds to humic and fulvic acids, which are a significant component of the organic matter of soil [12, 13]. For 239+240 Pu, the exchangeable fraction was the least important in both soils. Whereas in Bazagona these isotopes were mainly bound to organic matter, as found by other authors [12, 13, 14], in Palomares they were mainly detected in the residual fraction. Thi<cursor_is_here> In Palomares, the plutonium was spread as the result of conventional chemical explosions destroying the two H-bombs, whereas that of global fallout was spread mainly as the result of nuclear explosions with far higher temperatures involved.
Table 2. Percentages of 137 Cs, 90 Sr, and 239+240 Pu detected in exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual fractions in surface soil from Bazagona and Palomares. DL = detection limit.
| Fraction | Bazagona | | | Palomares | | |
|---|---|---|---|---|---|---|
| | 137Cs | 90Sr | 239+240Pu | 137Cs | 90Sr | 239+240Pu |
| MgCl 2 | DL | DL | 0.92 ± 0.19 | DL | DL | (9.4±1.7)·10-3 |
| NaClO | DL | DL | 61 ± 4 | DL | DL | 0.36 ± 0.05 |
References
[1] M. Llauradó, M. Vidal, G. Rauret, M.C. Roca, J. Fons, V.R. Vallejo, J. Environ. Radioactiv. 23 (1994) 81-100.
[2] M.K. Schultz, W.C. Burnett, K.G.W. Inn, J. Environ. Radioactiv. 40 (1998) 155-174.
[3] I. Palomino, F.Martín, S. Núñez, J. Gutiérrez, Radioprotección, 21 (1999) 31-42 (in Spanish)
[4] A. López, J.L. Ferrero, E. Navarro, A. Baeza, F.J. Guillén, in Proceedings the 24 th Annual Meeting of the Spanish Nuclear Society, Valladolid 1998. (in Spanish).
[5] C. Gascó, A. Álvarez, Sp ISSN 0081-3397. CIEMAT 617, Madrid, 1998. (in Spanish).
[6] E. Iranzo, A. Espinosa, A. Bellido, C. Gascó, A. Aragón, J. Gutiérrez, CIEMAT/IMA/UGIA/ M5A01 /03/92. CIEMAT, Madrid. (1992).
[7] J.J. LaRosa, E.L. Cooper, A. Ghods-Esphahani, V. Jansta, M. Makarewicz, S. Shawky, N. Vajda, J. Environ. Radioactiv. 17 (1992) 183-209.
[8] C.W. Sill, Nucl. Chem. Waste Manage. 7 (1987) 201-215.
[9] A. Baeza, M. del Río, C. Miró, J. Paniagua, J. Radioanal. Nucl. Chem. 174 (1993) 297-316.
[10] S. Forsberg, K. Rosén, F. Bréchignac, J. Environ. Radioactiv. 54 (2001) 253-265.
[11] UNSCEAR, in Ionizing radiation: sources and biological effects (1982)
[12] M.H. Lee, C.W. Lee, J. Environ. Radioactiv. 47 (2000) 253-262.
[13] Y. Fujikawa, J. Zheng, I. Cayer, M. Sugahara, H. Takigami, A. Kudo, J. Radioanal. Nucl. Chem. 240 (1999) 69-74.
[14] G.T. Cook, M.S. Baxter, H.J. Duncan, J. Toole, R. Malcolmson, Nucl. Instruments Methods 223 (1984) 517-522.
</text>
|
[
{
"content": "<url>\nhttps://www.radioprotection.org/articles/radiopro/pdf/2005/02/p103.pdf\n</url>\n<text>\nA study of the bioavailability of 90 Sr, 137 Cs, and 239+240 Pu in soils at two locations of Spain affected by different radionuclide contamination events\n\nA. Baeza 1 , J. Guillén 1 , A. Espinosa 2 , A. Aragón 2 and J. Gutierrez 2\n\n1\n\nUniversity of Extremadura, Department of Physics, Avda. de la Universidad s/n,\n\n10071 Cáceres, Spain, e-mail: [email protected]\n\n2 Centro de Investigaciones Energéticas Medioambientales y Tecnológicas, Madrid, Spain\n\nAbstract. It is well known that the bioavailability of artifical radionuclides such as 90 Sr, 137 Cs and 239+240 Pu in contaminated soils depends on the source term origin of the contamination. Altough the behaviour of the mentioned radionuclides in the soil is also influenced by the time passed from the contamination event and the characteristics of the contamination receiving soils. The objective of the present work is to analyse the different bioavailability and possible chemical-physical associations of 90 Sr, 137 Cs, and 239+240 Pu in soils located in different Spanish ecosystems (Almeria and Cáceres provinces) by application of a sequential extraction procedure based on the NIST standard sequential extraction protocol. The resulting fractions obtained are: a) water soluble and exchangeable, b) associated to organic matter, and c) residual fraction. They will be studied jointly with the polluting sources (deposit of nuclear fallout-50s and 60s, Palomares accident in 1966 and the cesium release by Acerinox in 1998) in each ecosystem to interpret the observed behaviour of radionuclides.\n\n1. INTRODUCTION\n\nThe bioavailability of artificial radionuclides in soilsdepends on the characteristics of the source, time passed from the contamination event and climatic conditions. The main sources of man-made radionuclides in different localities of Spain are: (a) global fallout in the 50s and 60s; (b) the Palomares accident in 1966, in which plutonium and americium were released; and (c) the radiocaesium release by Acerinox in 1998. Chernobyl fallout was not taken into consideration because in Spain it was negligible compared to global fallout [1]. To analyze the effect on the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu of the various sources we selected two ecosystems affected by each to a different degree – Bazagona and Palomares, located in Cáceres and Almería provinces respectively, and separated by more than 650 km (see fig. 1). Bazagona was presumed to be affected only by global fallout. At this location a profile of soil was also collected to estimate the inventory of the deposited 137Cs and 90Sr, which would confirm its origin. The soil of Palomares was presumed to be in principle affected by all three sources – global fallout, the Palomares accident, and the Acerinox release. Indeed, it was one of the few places in Spain affected by the last event, as can be seen in fig. 1. In both ecosystems, surface soil (0-5 cm) was collected and the bioavailability of 137 Cs, 90 Sr, and 239+240 Pu was determined by means of a sequential extraction procedure based on the NIST standard extraction protocol [2]. Three fractions have been considered: exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual (extracted with HF + HNO3 ).\n\nArticle published by EDP Sciences and available at http://www.edpsciences.org/radiopro\n\nor http://dx.doi.org/10.1051/radiopro:2005s1-010\n\n2. MATERIALS AND METHODS\n\n2.1 Sequential extraction\n\nThe sequential extraction procedure is based on the NIST standard sequential extraction protocol [2]. Three fraction have been obtained:\n\na) Exchangeable, extracted with MgCl2 0.4M with a liquid-soil ratio of 15:1 at room temperature for 4 h.\nb) Bound to organic matter, extracted with NaClO 5% at pH 8.5 with a liquid-soil ratio of 15:1 at room temperature for 2 h.\nc) Residue: this was acid digested with HNO3 and HF.\n\nAfter each extraction, the liquid phase was separated from the solid phase by vacuum filtration through Whatman 42 filter paper and then through a 0.47 µm membrane filter. The filter was then calcined at 400 °C and added to the residue before the following extraction.\n\n2.2 Radionuclide determination\n\nAll fractions were evaporated to dryness and the residues were put into 71 mm diameter, 30 mm deep, Petri dishes for gamma spectrometric assay. This was carried out using an n-type germanium detector with a 25% relative efficiency, a 1.87 keV resolution for the 1332 keV 60 Co peak, and a peak-to-Compton ratio of 57.5:1. The detector was coupled to a Compton effect suppressing device [4], which permits a better determination of the 137 Cs activity level since it reduces the contribution of the equipment's background that is largely due to the Compton scattering of photons from 40 K present in the samples. The reduction is by a factor of 2 in the 661.6 keV energy region of the 137 Cs emission.\n\nAfter their gamma spectrometric analysis, the soil samples were calcined at 600 C to eliminate the organic matter prior to the 90 Sr radiochemical separation [5]. A second stage included acid digestion and precipitation of strontium and barium as nitrates. This precipitate was dissolved in distilled water, and iron and other multivalent elements precipitated out as hydroxides. With these elements removed from the solution, strontium was then precipitated out at pH 8 as SrCO3 onto a 5 cm diameter striated planchet. The recovery was determined by gravimetry. Once 90 Sr- 90 Y equilibrium had been reached, the sample was measured in a low background gas flow proportional counter (Canberra model 2401).\n\nThe procedure used for the determination of plutonium is based on an optimization of various methods proposed by other authors [6, 7]. The soil samples were calcined at 600 C, and acid digested with HF and HNO3. For the extraction, Fe was added to the solution, and the plutonium was coprecipitated with iron hydroxide. The iron and plutonium were reduced by adding hydrazine, with which plutonium passes to Pu (III). The plutonium valence was adjusted to IV by adding HNO3 and NaNO2, followed by separation in a column with Dowex 1x8 resin or AG 1x2 [6]. The samples were passed through in HNO3 8M to retain the plutonium and thorium. Thorium was eluted from the column with concentrated HCl, and plutonium with a combination of dilute HCl and hydroxylamine. The alpha sources were prepared by coprecipitation with NdF3 [8] and electrodeposition [6]. The alpha spectrometric analyses were carried out using silicon detectors with a mean efficiency of 23.2%, and a resolution of 38.7 keV for a source-detector distance of 6 mm.\n\n3. RESULTS AND DISCUSSION\n\nTable 1 lists the activity levels of 137 Cs, 90 Sr, and 239+240 Pu from the total fraction of the soils from Bazagona and Palomares. As can be seen, the greatest difference between the two soils was in the 239+240Pu content because of the plutonium released in the Palomares accident in 1996. The 90Sr contents were similar, suggesting that global fallout is their common origin. The 137 Cs content was higher in Bazagona than in Palomares, suggesting that the release of radiocaesium from Acerinox might not have made a significant contribution to the 137 Cs deposited in the soil because the direction of the wind was as shown in fig. 1, and the activity level of 137 Cs in the air of Palomares (890 mBq/m 3 ) was lower than in some locations of France (200-2430 Bq/m 3 ) and Italy (140-1700 Bq/m 3 ) [3].\n\nTable 1. Activity levels of 137 Cs, 90 Sr, and 239+240 Pu, in Bq/kg d.w., detected in surface soil (0-5 cm) in Bazagona and Palomares.\n\n| Location | 137Cs (Bq/kg) | 90Sr (Bq/kg) |\n|---|---|---|\n| Bazagona | 21.7 ± 1.6 | 1.00 ± 0.14 |\n\nIn order to verify the global fallout origin, in Bazagona the soil profile of 137 Cs and 90 Sr was also determined (fig. 2). The maximum activity for 137 Cs was detected in the surface layer, but for 90 Sr was deeper due to the different mobility of caesium and strontium in soil [9, 10]. To estimate the total inventory deposited in the soil, we fitted the experimental data to an exponential function that decreases with depth:\n\nwhere I(z) is the cumulative inventory in Bq/m 2 down to depth z, I∞ is the total inventory to infinite depth in Bq/m 2 , α is the reciprocal of the relaxation length in cm -1 , and z is the linear depth. The results of the fit for 137 Cs and 90 Sr in the Bazagona soil were:\n\nConsidering the total inventory in the soil, the 137 Cs/ 90 Sr ratio is (1.1 ± 0.7). Given the associated uncertainty, this ratio is coherent with the value of 1.66 for global fallout at the latitude of Spain [9, 11].\n\nTable 2 lists the percentages of the total activity of 137 Cs, 90 Sr, and 239+240 Pu detected in each fraction considered in the sequential extraction procedure. The results of the speciation for 137 Cs and 90 Sr are the same for both soils – most is found in the residual fraction, the percentages in the fractions extracted with MgCl2 and NaClO being beneath the detection limit of 0.028 and 0.020 Bq for 137 Cs and 90 Sr respectively. This suggested that the 137 Cs source was the same for the two soils. The percentage of 137 Cs bound to the organic matter fraction is coherent with the low percentage of radiocaesium that binds to humic and fulvic acids, which are a significant component of the organic matter of soil [12, 13]. For 239+240 Pu, the exchangeable fraction was the least important in both soils. Whereas in Bazagona these isotopes were mainly bound to organic matter, as found by other authors [12, 13, 14], in Palomares they were mainly detected in the residual fraction. Thi<cursor_is_here> In Palomares, the plutonium was spread as the result of conventional chemical explosions destroying the two H-bombs, whereas that of global fallout was spread mainly as the result of nuclear explosions with far higher temperatures involved.\n\nTable 2. Percentages of 137 Cs, 90 Sr, and 239+240 Pu detected in exchangeable (extracted with MgCl2), bound to organic matter (extracted with NaClO), and residual fractions in surface soil from Bazagona and Palomares. DL = detection limit.\n\n| Fraction | Bazagona | | | Palomares | | |\n|---|---|---|---|---|---|---|\n| | 137Cs | 90Sr | 239+240Pu | 137Cs | 90Sr | 239+240Pu |\n| MgCl 2 | DL | DL | 0.92 ± 0.19 | DL | DL | (9.4±1.7)·10-3 |\n| NaClO | DL | DL | 61 ± 4 | DL | DL | 0.36 ± 0.05 |\n\nReferences\n\n[1] M. Llauradó, M. Vidal, G. Rauret, M.C. Roca, J. Fons, V.R. Vallejo, J. Environ. Radioactiv. 23 (1994) 81-100.\n[2] M.K. Schultz, W.C. Burnett, K.G.W. Inn, J. Environ. Radioactiv. 40 (1998) 155-174.\n[3] I. Palomino, F.Martín, S. Núñez, J. Gutiérrez, Radioprotección, 21 (1999) 31-42 (in Spanish)\n[4] A. López, J.L. Ferrero, E. Navarro, A. Baeza, F.J. Guillén, in Proceedings the 24 th Annual Meeting of the Spanish Nuclear Society, Valladolid 1998. (in Spanish).\n[5] C. Gascó, A. Álvarez, Sp ISSN 0081-3397. CIEMAT 617, Madrid, 1998. (in Spanish).\n[6] E. Iranzo, A. Espinosa, A. Bellido, C. Gascó, A. Aragón, J. Gutiérrez, CIEMAT/IMA/UGIA/ M5A01 /03/92. CIEMAT, Madrid. (1992).\n[7] J.J. LaRosa, E.L. Cooper, A. Ghods-Esphahani, V. Jansta, M. Makarewicz, S. Shawky, N. Vajda, J. Environ. Radioactiv. 17 (1992) 183-209.\n[8] C.W. Sill, Nucl. Chem. Waste Manage. 7 (1987) 201-215.\n[9] A. Baeza, M. del Río, C. Miró, J. Paniagua, J. Radioanal. Nucl. Chem. 174 (1993) 297-316.\n[10] S. Forsberg, K. Rosén, F. Bréchignac, J. Environ. Radioactiv. 54 (2001) 253-265.\n[11] UNSCEAR, in Ionizing radiation: sources and biological effects (1982)\n[12] M.H. Lee, C.W. Lee, J. Environ. Radioactiv. 47 (2000) 253-262.\n[13] Y. Fujikawa, J. Zheng, I. Cayer, M. Sugahara, H. Takigami, A. Kudo, J. Radioanal. Nucl. Chem. 240 (1999) 69-74.\n[14] G.T. Cook, M.S. Baxter, H.J. Duncan, J. Toole, R. Malcolmson, Nucl. Instruments Methods 223 (1984) 517-522.\n</text>\n",
"role": "user"
},
{
"content": "s different association is probably due to the chemical form of plutonium incorporated to each soil.",
"role": "assistant"
}
] |
Received April 28, 2009 / Accepted July 6, 2009 J. Technol. Manag. Innov. 2009, Volume 4, Issue 2
_________________________________________________________________________________
Graduate Formation in Intellectual Property in Brazil: A Study Based on Academic Production of Thesis and Dissertations
Heitor de Paula Filho 1 , Cristina Gomes de Souza 2
Abstract
The aim of this paper is to present information on the graduate formation in Intellectual Property in Brazil based on academic production of thesis and dissertations. This study analyzed data from 278 documents indexed in Bank of Thesis of Capes. The results show that: 1) only in the last years started the formation of professionals at the master's and doctorate degree levels being necessary efforts for learning and training in the area; 2) the formation of competences is much concentrated in the Southeast and South regions of the country and in the area of Law being necessary to correct these asymmetries; and 3) the principal focus of this academic production is related to intellectual property policy followed by patents.
Keywords: intellectual property; industrial property; academic production; graduate formation.
1 INPI – Instituto Nacional de Propriedade Industrial. Rua Mayrink Veiga, nº 9 – Centro – Rio de Janeiro/RJ – Cep: 20090-910. E-mail: [email protected]
2 CEFET/RJ – Programa de Pós-Graduação em Tecnologia. Bloco E – 5º. Andar – Av. Maracanã, nº 229 – Maracanã – Rio de Janeiro/RJ – Cep: 20271-110. E-mail: [email protected]
Introduction
Changes in economic environment such as globalization, growth of competition, transformation of the role of the state, rise of new industries based on technology and knowledge-intensive, preponderance of the networks of relationships and the need for sustainable development have transferred the emphasis from physical assets (tangible) to intangible assets. This context has increased the importance of Intellectual Property (IP) as mechanism to guarantee the rights and encouragement of investment (Buainain and Carvalho, 2000).
The World Trade Organization (WTO) is the main forum of international negotiations involving the intellectual property subject. In WTO are discussed questions concerning the various types of protection covered by IP rights affecting political, economic and social aspects of various countries. As there are several international agreements related to IP rights, the participation of the countries in these discussions is strategic to preserve and defend the national interests.
Therefore, it's essential the formation of competences in this theme – people who know to use the regulatory aspects and the mechanisms and procedures relating to the IP system to promote the technological development of the country. The capacity building can occur through various actions – training, courses, work experience, researches in graduate programs and others.
The aim of this paper is to present information on the graduate formation in IP in Brazil. The article tries to answer the following questions: Is there graduate formation in IP in the country? Where is the capacity building in IP located? What is the issue of this academic production and in which knowledge areas is concentrated? The research was based on data from 278 abstracts of dissertations and thesis retrieved of the Bank of Thesis of Capes.
Context
Intellectual Property is an expression that means a set of rights that refers to creations of the human mind as inventions, literary and artistic works, and symbols, names, images, and designs used in commerce (WIPO, 2009). IP includes industrial property, copyright and related rights, software register and sui generis protection (topography of integrated circuits, cultivars protection and traditional knowledge). Industrial property includes patents, trademarks, industrial designs and geographic indications of source or appellations of origin. The Brazilian Industrial Property Law (Law Nº 9.279/96) also covers technology transfer and repression of unfair competition.
The Union Convention of Paris – UCP was the first international treaty of industrial property. UCP was signed in 1883 by 14 countries including Brazil (INPI, 2009). After CUP, various others treaties and agreements were firmed as Berne Convention for the Protection of Literary and Artistic Works (1886), Madrid Agreement Concerning the International Registration of Marks (1891), Hague Agreement Concerning the International Registration of Industrial Designs (1934), Nice Agreement Concerning the International Classification of Goods and Services for the Purposes of the Registration of Marks (1957), Strasburg Agreement for the international classification of patents (1971), Patent Cooperation Treaty – PCT (1978) and others.
In the last decades of the twentieth century, because of the changes in the international scene caused by the economy globalization process, the increasing the importance of technology as competitive factor and the advent of the called Knowledge Society, the theme of IP rights returned to the center of discussions. Despite the resistance from developing countries, especially Brazil and India, in 1994 was signed the Agreement on Traderelated Aspects of Intellectual Property Rights – TRIPS, strengthening mechanisms of patent protection and requiring that all signatory countries recognize the patents in all technological fields, regardless of their stages of development and social and economic contexts (Gontijo, 2005).
According to Barbosa (2003 apud Chaves et al., 2007), the TRIPS Agreement has brought two important changes: the establishment of rigid rules on IP rights and loss of autonomy of each member country to adopt legislation to encourage their development. Another change was that World Trade Organization (old GATT) now has mechanisms to penalize countries that do not comply with the rules set out in agreements.
Buainain et al. (w.d.) say that the IP is still subject of controversies and disputes in various international forums because affects interests of different actors and countries. The authors cite questions yet unresolved: "What are the objects of protection? What is the minimum and maximum protection? How to harmonize the interests of innovative companies, the rights of IP holders and the interests of the society? How to balance the position of developed countries on IP – in favor of a strong system of protection – and the need to promote the development of poorer countries?"
Despite the controversy, Brandelli and Jaguaribe (2007) mention that all the countries with high technological performance make use of patent system. These countries invest significant amounts in the operation of their systems (USPTO – United States Patent and Trademark Office, for example, has an annual budget of about $ 1.6 billion). The authors also emphasize that IP systems are used with the following objectives: to give value to intangible assets; facilitate the financing of innovation and to make more attractive economically investments in R&D; enhance the attention and respect to demands of consumers; and promote technical and commercial cooperation in favour to innovation.
Nowadays Brazil is responsible for about 2% of global production of knowledge occupying the fifteenth position in the ranking of international publications indexed on the base of ISI/Web of Science. However, the same is not true in the case of patents indicator. In order to encourage technological development, the Brazilian government is promoting various actions such as the promulgation of the Innovation Law (Law N o . 10.973/04) and the Law of Well (Law 11.196/06), the creation of Sectorial Funds to finance projects of innovation, the supporting the creation of centers of technological innovation (agencies or nucleus) in the Science and Technology Institutions (STIs) to facilitate the university technology transfer and others.
This new scenario has increased the demand for professionals with IP knowledge. To attend this necessity various trainings, courses, workshops and events have been offered to spread the culture of IP in the country. With the aim of training people with higher level of qualification, it was created – in 2007 – the Innovations and Intelletual Property Master's Program offered by the
National Institute of Industrial Property (INPI) which is the Brazilian Office of Industrial Property. But, nowadays, what is the reality of expertise in IP in Brazil considering the formation of professionals at the master's and doctorate degree levels?
Method
Capes – Coordination for the Improvement of Higher Education Personnel is a Foundation within the Ministry of Education in Brazil whose activities are organized in four actions: assessment of graduate programs; access and dissemination of scientific production; investment in formation of high level researchers; and promoting of international scientific cooperation. Capes provides free access to abstracts of all theses and dissertations accepted by Brazilian universities since 1987. The large body of information in this database allows you to identify competences and research trends in various areas of knowledge.
The research to identify expertise in Intellectual Property in Brazil was based on abstracts of theses and dissertations indexed in this database. The information retrieval can be done by theme, author, institution and year. In this study, it was used the terms 'intellectual property' and 'industrial property' as parameter of search covering all documents since 1987.
The following data from the abstracts of thesis and dissertations were analyzed: level of academic degree; year (to show the evolution of academic production); region and Unit of the Federation; institution; area of academic knowledge; and content of the document based on reading of the abstracts. The contents of the documents were classified in: cultivars protection; topography of integrated circuits; traditional knowledge; software register; copyright and related rights; trademarks; patents; industrial design; geographic indications of source or appellations of origin; technological prospective; technology transfer; and industrial property policy.
Results
The search resulted in 233 abstracts retrieved with the term 'intellectual property' and 103 with the term 'industrial property'. Thirty-five (35) documents were retrieved with the two terms of search and were removed to avoid repeated duplication of information. Of the remaining 278 abstracts, 23 were discarded because they didn't specifically mention the subject studied. Then the universe of study was reduced to 278 abstracts – 221 (79,5%) abstracts of dissertations and 57 (20,5%) abstracts of thesis as showed in Figure 1.
Another aspect observed in the study was the distribution of the academic production of thesis and dissertations over the years with the objective of to identify if is happening an increased of interest by the theme. Figure 2 illustrates this evolution.
Although the database accessed covers all the thesis and dissertations of Brazilian universities since 1987, it was observed that the first academic production about IP – considering the parameters of search adopted – was in
1991. The growth of the number of thesis and dissertations was small in the period 1991-2001. Only in 2002 begins a significant increase of this academic production. It's possible to say that, in the last ten years, the growth
of the number of thesis and dissertations about IP was greater in percentage than the total of Brazilian dissertations and thesis considering all knowledge areas. In 1997, for example, there were only 7 dissertations and thesis about IP in the universe of 15.542. In 2008, this number increased to 58 in the universe of 41.645 as illustrated in Table 1.
Table 1 - Evolution of number of thesis and dissertations in the last ten years
Considering the five Brazilian regions, it's possible to observe that SE – Southeast region concentrates the greatest quantity of thesis and dissertations about IP of the country, representing 60% of the total. In sequence appear the regions S – South (21%), CW – Central-
West (10%), NE – Northeast (6%) and N – North (3%) as showed in Figure 3a. This result follows the distribution of GDP in which the Southeastern region represents 57% of total. The participation of the five Brazilians regions in GDP is illustrated in Figure 3b.
The results by Units of Federation showed that the universities of state of São Paulo – SP concentrate 88 thesis and dissertations about IP representing approximately 32% of national production. In the sequence are the following Units of Federation: Rio de Janeiro – RJ (58); Minas Gerais – MG (25); Distrito Federal – DF
(24); Rio Grande do Sul – RS (22); Paraná – PR (19); Santa Catarina – SC (15); Pernambuco – PE (6); Amazonas – AM (5); Bahia – BA (4); Paraíba – PB (3); Pará – PA (3); Ceará – CE (2); Goiás – GO (2); Espírito Santo – ES (1); and Mato Grosso do Sul – MS (1) as ilustrated in Figure 4.
This academic production analyzed was development in graduate programs of 65 institutions. The ranking of the 11 universities with the largest number of thesis and dissertations about IP is formed by USP (22); UFRJ (21);
PUC-SP (21); UNB (21); UNICAMP (15); UFSC (11); UFMG (9); UFPR (9); UNIMEP (8); UFRGS (7); and CEFET/RJ (7). Figure 5 presents the ranking of the universities that represent 53% of national production.
It was also identified the knowledge areas that concentrate expertise in IP subject. For this analyze was considered the classification adopted by Capes which is used by graduate programs in Brazil. The classification of
Capes divides the knowledge areas in Great Areas that are subdivided into subareas. Table 2 illustrates the distribution of the thesis and dissertation by Great Area of knowledge as informed by the graduate programs.
Table 2 - Distribution of thesis and dissertations by Great Areas of Knowledge
Table 2 shows that Applied Social Sciences area concentrates 154 documents that represent 55% of the production. In sequence are the following areas: Human Sciences (11,5%); Engineering (9,3%); Multidisciplinary (7,2%); Exact and Earth Sciences (6%); Health Sciences (5%); Agricultural Sciences (3%); Biological Sciences (1,7%); and Linguistics, Literature and Arts (0,7%). The concentration of thesis and dissertations in the Applied Social Sciences area can be explained by the presence of subarea of law that corresponds to 112 documents.
Based on the reading of the abstracts was made the classification of content of the 278 thesis and dissertations. The contents considered were those related in the section method of this paper adding the item others. Therefore were considered the following items: cultivars protection (C); topography of integrated circuits (IC); traditional knowledge (TK); software register (S); copyright and related rights (CO); trademarks (T); patents (P); industrial design (ID); geographic indications of source or appellations of origin (GI); technological prospective (TP); technology transfer (TT); industrial property policy (IPP); and others (O). It's important to mention that content of the thesis and dissertations could be classified in more than one item. Figure 6 illustrates the results of the classification of the abstracts by kind of content.
The results show that the 135 abstracts were classified as content related to (IPP) representing approximately 49% of the production followed by (P) with 43 abstracts, (C) and (CO) with 21, (S) with 20, (T) with 18, (TP)
with 17, (TT) with 13, (TK) with 11, (IC) with 5, (GI) with 3, (ID) with 1 and (O) with 9. Based on the results was created a chart (Figure 7) showing the relationship between knowledge area and kind of content.
Discussion
The results of the research showed that the Brazilian capacity building in IP – considering the formation of professionals at the master's and doctorate degree levels – is a fairly recent process. The first record of a dissertation in 1991 illustrates how the matter was not studied by the Academy until few years ago despite the country to have been one of the 14 members that signed the UCP in 1883 and to participate of various international agreements related to Intellectual Property.
diverse institutions that integrate the Brazilian National Innovation System. Efforts have been made in this direction such as the creation of the Academy of INPI that, since 2007, offers the Innovation and Intellectual Property Master's Program.
It seems that only with the implementation of TRIPs and the new Industrial Property Law in 1996 occurred the diffusion of this subject in the academic environment. Certainly these facts combined with a series of actions and regulations related to IP contributed to the spread of this issue reflecting in the expressive increase in the production of thesis and dissertations in the last years.
The trend for the next years is to continue increasing the academic production of thesis and dissertations about IP. It's an important aspect to reduce the shortage of expertise in the country and to attend the demand of
Another challenge is that the formation of graduate students is not well distributed into the country. This asymmetry was expected and happens in all areas of knowledge. It can be explained, among other factors, by the concentration of universities, research centers and graduate programs in the Southeast and South regions of Brazil. These are the regions more developed of the country presenting the greatest participation in the Brazilian Gross Domestic Product (GDP).
The position of scientific and technological leadership of the state of São Paulo is not also surprising. This Unit of Federation, which represents 33,86% of GDP, presents the largest investment in S&T (Science & Technology) of the country and concentrates the highest indices of publications in international journals indexed in ISI/Web of Science database which is used to measure the indicator of scientific production of the world.
The participation of the state of Rio de Janeiro in the production of thesis and dissertations related to IP is also significant accounting for 21% of the total. The fact of the seat of INPI (National Institute of Industrial Property) to be located in this Unit of Federation and the presence of important institutions like FIOCRUZ (Oswaldo Cruz Foundation), CENPES (Center of Research of Petrobras), UFRJ (Federal University of Rio de Janeiro) and others STIs contribute to the interest of the thematic in this state. The creation of the Academy of INPI with the goal of the formation of 25 new graduate students by year will increase considerably the participation of the state of Rio de Janeiro in this indicator in coming years.
The research showed that 55% of academic production is concentrated in Great Area of Applied Social Sciences. This concentration is result of the subarea law that represents 40% of all thesis and dissertations about IP in the country. This is another aspect that demands attention being necessary better distribution of formation of competences in others knowledge areas. Although the issue of IP has intensive relationship with legal aspects, the diffusion of this thematic in areas related to technology and management is fundamental to promote the technological development of the country.
The concentration of thesis and dissertations related to intellectual property policy (IPP) followed by patents (P) reflects the interest of research development about the public policy and the regulations to incentive the innovation adopted by the Brazilian government. In this aspect is positive to observe that the content (IPP) is present in thesis and dissertations in all knowledge areas except Linguistics, Literature and Arts (LLA). The content (P) also is present in areas with important potential of patenting as Health Sciences and Engineering.
It's necessary to emphasize that the search was based on the following terms: 'intellectual property' and 'industrial property' according to methodology adopted. Then it's possible that others thesis and dissertations related to patents, copyright, software etc. that did not use these specific terms in title or resume have not been recovered.
Conclusion
The intensification of discussions about IP in international forums, the implementation of TRIPs and the importance of innovation in a knowledge-intensive economy have made the intellectual property thematic strategic for the development of countries. In Brazil, the new Industrial Property Law (1996) and the establishment of policies and regulations such as the Law of Innovation (2004) created a demand for qualified people to attend issues relating to innovation, technology transfer and commercialization which involves intellectual property.
Based on information contained in the abstracts of thesis and dissertations related about IP retrieved of the Bank of Thesis of Capes it was possible to identify the dynamic of the process of capacity building in IP in Brazil. The results showed that only in the last years started the formation of professionals at the master's and doctorate degree levels being necessary efforts for learning and training in the area.
The research also showed that this capacity building is much concentrated in the Southeast and South regions of Brazil with emphasis on the states of São Paulo and Rio de Janeiro. These two states represent, together, more than 50% of the total of the national production of thesis and dissertations about IP of the country. It's important to reduce this asymmetry. It's also necessary a better distribution of the formation of competences in diverse knowledge areas. The results indicated that 40% of the documents analyzed are classified in the subarea law. The qualified formation of people not only related to legal aspects of intellectual property but also in areas related to technology and management is fundamental to promote the technological development of the country.
References
BUAINAIN, A. M., Carvalho, S.M.P. (2000). Propriedade Intelectual em um Mundo Globalizado. Parcerias Estratégicas, 9, 145-143.
BRANDELLI, O., Jaguaribe, R. (2007). Propriedade Intelectual: espaços para os países em desenvolvimento. In Villares F., ed. Propriedade Intelectual: tensões entre o capital e a sociedade. São Paulo: Ed. Paz e Terra, 270 – 305.
CHAVES, G. C., Oliveira, M. A., Hasenclever, L., Melo, L.. M. (2007). A evolução do sistema internacional de propriedade intelectual: proteção patentária para o setor farmacêutico e acesso a medicamentos, Cad. Saúde Pública, 23 (2), 257-267.
BUAINAIN, A.M., Carvalho, S.M.P.; Paulino, S.R.; Yamamura, S. (w.d.). Propriedade Intelectual e Inovação Tecnológica: algumas questões para o debate atual..http://www2.desenvolvimento.gov.br/arquivo/sti/pu blicacoes/futAmaDilOportunidades/futIndustria_2_00.pdf (accessed in 05/12/08?
WIPO World Intellectual Property Organization. (2009). What is IP? http://www.wipo.int/about-ip/en/ (accessed in 13/01/09).
INPI Instituto Nacional de Propriedade Industrial. (2009). Acordos Internacionais. http://www.inpi.gov. br/menu-esquerdo/patente/ pasta_acordos (accessed in 04/02/09)
GONTIJO, C. (2005). As transformações do sistema de patentes, da Convenção de Paris ao Acordo TRIPS. Fundação Heinrich Böll. http://boell-latinoamerica.org/ download_pt/trips_1105.pdf (accessed in 04/02/09)
|
<urn:uuid:d9b4fdb6-325b-41f4-b2af-f0ef496ed4e3>
|
CC-MAIN-2020-24
|
https://www.jotmi.org/index.php/GT/article/download/cas23/496/
|
2020-05-28T22:43:04+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-24/subset=warc/part-00250-b4a094ce-c3a1-4796-8c26-d927e48e4b4a.c000.gz.parquet
| 792,204,217
| 4,877
|
eng_Latn
|
eng_Latn
| 0.858277
|
eng_Latn
| 0.987509
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"por_Latn"
] | false
|
rolmOCR
|
[
1559,
5966,
10506,
11532,
12505,
13538,
15451,
18163,
22526,
23555
] |
Received April 28, 2009 / Accepted July 6, 2009 J. Technol. Manag. Innov. 2009, Volume 4, Issue 2
_________________________________________________________________________________
Graduate Formation in Intellectual Property in Brazil: A Study Based on Academic Production of Thesis and Dissertations
Heitor de Paula Filho 1 , Cristina Gomes de Souza 2
Abstract
The aim of this paper is to present information on the graduate formation in Intellectual Property in Brazil based on academic production of thesis and dissertations. This study analyzed data from 278 documents indexed in Bank of Thesis of Capes. The results show that: 1) only in the last years started the formation of professionals at the master's and doctorate degree levels being necessary efforts for learning and training in the area; 2) the formation of competences is much concentrated in the Southeast and South regions of the country and in the area of Law being necessary to correct these asymmetries; and 3) the principal focus of this academic production is related to intellectual property policy followed by patents.
Keywords: intellectual property; industrial property; academic production; graduate formation.
1 INPI – Instituto Nacional de Propriedade Industrial. Rua Mayrink Veiga, nº 9 – Centro – Rio de Janeiro/RJ – Cep: 20090-910. E-mail: [email protected]
2 CEFET/RJ – Programa de Pós-Graduação em Tecnologia. Bloco E – 5º. Andar – Av. Maracanã, nº 229 – Maracanã – Rio de Janeiro/RJ – Cep: 20271-110. E-mail: [email protected]
Introduction
Changes in economic environment such as globalization, growth of competition, transformation of the role of the state, rise of new industries based on technology and knowledge-intensive, preponderance of the networks of relationships and the need for sustainable development have transferred the emphasis from physical assets (tangible) to intangible assets. This context has increased the importance of Intellectual Property (IP) as mechanism to guarantee the rights and encouragement of investment (Buainain and Carvalho, 2000).
The World Trade Organization (WTO) is the main forum of international negotiations involving the intellectual property subject. In WTO are discussed questions concerning the various types of protection covered by IP rights affecting political, economic and social aspects of various countries. As there are several international agreements related to IP rights, the participation of the countries in these discussions is strategic to preserve and defend the national interests.
Therefore, it's essential the formation of competences in this theme – people who know to use the regulatory aspects and the mechanisms and procedures relating to the IP system to promote the technological develop
|
ment of the country.
| 2,808
|
inside_word
|
development
|
remove_all
|
<url>
https://www.jotmi.org/index.php/GT/article/download/cas23/496/
</url>
<text>
Received April 28, 2009 / Accepted July 6, 2009 J. Technol. Manag. Innov. 2009, Volume 4, Issue 2
_________________________________________________________________________________
Graduate Formation in Intellectual Property in Brazil: A Study Based on Academic Production of Thesis and Dissertations
Heitor de Paula Filho 1 , Cristina Gomes de Souza 2
Abstract
The aim of this paper is to present information on the graduate formation in Intellectual Property in Brazil based on academic production of thesis and dissertations. This study analyzed data from 278 documents indexed in Bank of Thesis of Capes. The results show that: 1) only in the last years started the formation of professionals at the master's and doctorate degree levels being necessary efforts for learning and training in the area; 2) the formation of competences is much concentrated in the Southeast and South regions of the country and in the area of Law being necessary to correct these asymmetries; and 3) the principal focus of this academic production is related to intellectual property policy followed by patents.
Keywords: intellectual property; industrial property; academic production; graduate formation.
1 INPI – Instituto Nacional de Propriedade Industrial. Rua Mayrink Veiga, nº 9 – Centro – Rio de Janeiro/RJ – Cep: 20090-910. E-mail: [email protected]
2 CEFET/RJ – Programa de Pós-Graduação em Tecnologia. Bloco E – 5º. Andar – Av. Maracanã, nº 229 – Maracanã – Rio de Janeiro/RJ – Cep: 20271-110. E-mail: [email protected]
Introduction
Changes in economic environment such as globalization, growth of competition, transformation of the role of the state, rise of new industries based on technology and knowledge-intensive, preponderance of the networks of relationships and the need for sustainable development have transferred the emphasis from physical assets (tangible) to intangible assets. This context has increased the importance of Intellectual Property (IP) as mechanism to guarantee the rights and encouragement of investment (Buainain and Carvalho, 2000).
The World Trade Organization (WTO) is the main forum of international negotiations involving the intellectual property subject. In WTO are discussed questions concerning the various types of protection covered by IP rights affecting political, economic and social aspects of various countries. As there are several international agreements related to IP rights, the participation of the countries in these discussions is strategic to preserve and defend the national interests.
Therefore, it's essential the formation of competences in this theme – people who know to use the regulatory aspects and the mechanisms and procedures relating to the IP system to promote the technological develop<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.jotmi.org/index.php/GT/article/download/cas23/496/\n</url>\n<text>\nReceived April 28, 2009 / Accepted July 6, 2009 J. Technol. Manag. Innov. 2009, Volume 4, Issue 2\n\n_________________________________________________________________________________\n\nGraduate Formation in Intellectual Property in Brazil: A Study Based on Academic Production of Thesis and Dissertations\n\nHeitor de Paula Filho 1 , Cristina Gomes de Souza 2\n\nAbstract\n\nThe aim of this paper is to present information on the graduate formation in Intellectual Property in Brazil based on academic production of thesis and dissertations. This study analyzed data from 278 documents indexed in Bank of Thesis of Capes. The results show that: 1) only in the last years started the formation of professionals at the master's and doctorate degree levels being necessary efforts for learning and training in the area; 2) the formation of competences is much concentrated in the Southeast and South regions of the country and in the area of Law being necessary to correct these asymmetries; and 3) the principal focus of this academic production is related to intellectual property policy followed by patents.\n\nKeywords: intellectual property; industrial property; academic production; graduate formation.\n\n1 INPI – Instituto Nacional de Propriedade Industrial. Rua Mayrink Veiga, nº 9 – Centro – Rio de Janeiro/RJ – Cep: 20090-910. E-mail: [email protected]\n\n2 CEFET/RJ – Programa de Pós-Graduação em Tecnologia. Bloco E – 5º. Andar – Av. Maracanã, nº 229 – Maracanã – Rio de Janeiro/RJ – Cep: 20271-110. E-mail: [email protected]\n\nIntroduction\n\nChanges in economic environment such as globalization, growth of competition, transformation of the role of the state, rise of new industries based on technology and knowledge-intensive, preponderance of the networks of relationships and the need for sustainable development have transferred the emphasis from physical assets (tangible) to intangible assets. This context has increased the importance of Intellectual Property (IP) as mechanism to guarantee the rights and encouragement of investment (Buainain and Carvalho, 2000).\n\nThe World Trade Organization (WTO) is the main forum of international negotiations involving the intellectual property subject. In WTO are discussed questions concerning the various types of protection covered by IP rights affecting political, economic and social aspects of various countries. As there are several international agreements related to IP rights, the participation of the countries in these discussions is strategic to preserve and defend the national interests.\n\nTherefore, it's essential the formation of competences in this theme – people who know to use the regulatory aspects and the mechanisms and procedures relating to the IP system to promote the technological develop<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "ment of the country.",
"role": "assistant"
}
] |
|
Duality as Metaphor in A Course in Miracles
Excerpts from the Workshop held at the Foundation for A Course in Miracles Roscoe NY
Kenneth Wapnick, Ph.D.
Part II
Heaven: The State of Oneness
We will begin talking about what Heaven is, what the state of Oneness is, what early in the text is called One-mindedness. Then we will talk about what the Course refers to as wrongmindedness, the thought system of the ego, which is the beginning of the thought system of duality, just as Oneness is the thought system of non-duality. Finally, we will talk about the correction or the undoing of the wrong-minded thought system of the ego, which is through the right-minded thought system of the Holy Spirit that centers around the teaching of forgiveness. These teachings of forgiveness all have to do with the reflection of truth. They are not true. They all belong to the world of duality, which means they should not be taken literally. When Jesus speaks about God and about the state of Heaven, he should be taken very literally. When he speaks about the ego, forgiveness, and the Holy Spirit's role, he is talking metaphorically or symbolically.
Let me go back to another musical example as a way of summarizing these three different types of mind: One-mindedness, wrong-mindedness and right-mindedness. About 30 years ago, I read a wonderful book on Beethoven by the British writer Marion Scott. She talked about Beethoven's three stages, which most music scholars talk about, the early, middle, and the late stage. The early stage is the period of the first 30 years of Beethoven's life, wherein the music he composed was very much based upon the formal technique that he learned from Mozart and Haydn. These are not his greatest works by any means. They are very much involved with form, and you can watch Beethoven learning how to master his craft. Then he entered into the second phase with the Eroica Symphony. His Symphonies Three to Eight, his last three piano concertos, some of his greatest piano sonatas, the middle quartets, and his opera Fidelio all belong to that period. Usually, this is the music that is the most accessible to music lovers and that really gave him his great reputation. His final stage, which begins with the Ninth Symphony and then goes into his late sonatas and the last quartets, is clearly his greatest music and probably the greatest music ever written. He transcended all the form, all the conventions, and basically gave a wonderful expression to the end of the spiritual journey.
Marion Scott spoke about Beethoven's first stage as where he looked at the material world through material eyes, where he basically was mastering the world of form, the world of materiality. In the second stage, he looked at the spiritual world through material eyes. Here he was really beginning to express the development and the deepening of his spiritual journey, which could be traced very clearly in his music, but he was still doing it within the framework of the world's forms. It was at the end of his life that he broke with all of these forms. Scott talked about this as when he looked at the spiritual world through spiritual eyes. That is why when you listen to this later music, especially the late sonatas and quartets, you realize that he was inhabiting a totally different realm from anything else he or anyone else had composed. That is what makes his music so other-worldly.
One could make the same kinds of statements about these three levels in A Course in Miracles. Wrong-mindedness is looking at the material world through material eyes. That is what the ego is all about. So those are all the passages in the Course that detail the dynamics of the ego and what specialness is all about, which was all predicated on the seeming reality of our guilt, our sinfulness, our need to project onto other people, cannibalize other people, and kill in order to get what we want.
The correction for this, right-mindedness, is Jesus looking at the material world, the ego thought system, but from the perspective of the spiritual. That is where he speaks very often using the term reflection. That is where he says that love is impossible in this world, but forgiveness, which is love's reflection, is possible here. He talks about the reflection of holiness here, which is what the holy relationship is. He talks about the holy instant. He uses the word holy even though holiness is not possible in this world, but the holy instant and the holy relationship are the reflections of what is true. Again, he is looking at the ego's thought system, a dualistic thought system, from the perspective of the spiritual, but the way that he writes about it, the way that it is presented, and the way that we are asked to practice it is as if we were here. It is looking at the material world, but through the eyes of vision. It is still within the world of duality, which means it is still illusory.
One-mindedness is looking at the spiritual world through spiritual sight. This is recognized in the passages that deal directly with what the state of Heaven is like. There are not many of them, because there is no way we could understand them. These are the passages in A Course in Miracles that tell us what truth is, what reality is, what non-duality is. When you understand that, at least intellectually, you have a perspective by which you can understand what illusion is, and what duality is. That is what would help you not fall into the mistake of taking passages out of context, twisting them around so they will mean what you want them to mean, which will always be to affirm the reality of your specialness at the expense of truth. When you truly understand what oneness, reality, and non-duality mean, you will not make that mistake. You will then have a perspective, a context, a framework in which to understand all of the statements of right-mindedness in the Course, all of the statements in the Course
that deal with the role of the Holy Spirit, and that deal with the role of the miracle and the role of forgiveness. If you do not have that perspective, you will think that what Jesus is talking about should be taken as literally true. It should not be taken as literally true, but he must speak to us on this level because that is where we believe we are.
Later we will look at passages that basically show us how Jesus was aware of this problem, and how he is aware of what he was doing in his course. The problem is that his students are not aware of what he is doing in the Course, and so in some way they skip over these passages because they do not seem that important, and therefore they miss the whole point. This will help you not miss the point, so that your lifetime's work with the Course will become a truly productive one and will be one that will truly lead you on the journey, which in the end will help you transcend your ego. If you are a student of the Course, you would not want to settle for anything less. That would always be the fundamental question you should ask yourself. Why would I settle for less when I could have everything? Why would I settle for a little glimpse of love when I could have that total experience of love? Why would I want Jesus' pinky when I could have his whole being? Why would I settle for less than everything? Yet that is what people do when they work with the Course, because they are not aware of what it is saying.
The state of Oneness or the state of Heaven is the perfect Unity and Oneness of God and Christ. The Course talks about the Mind of God, which is the Creator, and the Mind of Christ, which is what God created. This is always spelled with a capital M. The Mind of God and the Mind of Christ are totally unified. When we speak of something being non-dualistic, it means it is non-dual. There are not two; there is only one. This is the most important point to always keep in mind. This is the only level of reality. This is the only level of truth. Anything else that smacks of duality is only a reflection of reality or a reflection of truth, but not truth. Truth is only God and Christ and there is absolutely nothing else.
There is no way that this can be understood here, as we will see. The words God and Christ have no meaning in Heaven. The words Creator and Created have no meaning in Heaven. They do have meaning for us here, but these are dualistic terms. Obviously, we talk about God and we talk about Christ. We talk about the Father and we talk about the Son. We talk about God as the First Cause; we talk about Christ as the Effect. These are important words to us here because they are meaningful to us. In Heaven, there is no state of duality. There is no God as a separated consciousness that perceives Himself in relationship to His Son, Christ. There is no Christ as a separated consciousness that perceives Himself in relationship to His Creator. Again, these are dualistic terms; these are words. Later on, we will read an important passage where Jesus says that "words are but symbols of symbols. They are thus twice removed from reality" (M-21.1:9-10).
So the words God and Christ symbolize something, but we, who are creatures of duality and specialness, have no way of understanding what the concept of oneness means, what the concept of non-duality means. The idea that "nowhere does the Father end, the Son begin as something separate from Him" (W-pI.132.12:4) makes no sense to us. There are many passages in the Course that reflect this. There is not much we can say about it, but it is, once again, extremely important that you understand this is the bottom line. This is the only truth there is, the only reality. Everything else is a dream, everything else is totally made up.
This is one of the few places in the Course where you can actually see not only a description of Heaven, but almost a definition of it.
(T-18.VI.1:1) There is nothing outside you.
This is a perfectly clear non-dualistic statement.
(T-18.VI.1:2) That is what you must ultimately learn, for it is the realization that the Kingdom of Heaven is restored to you.
There are many places in the Course where Jesus says things like this. When he says this is something you must ultimately learn, he is telling you this is very important. If you read this course with colored markers ready, this is one of the statements you should underline. He is telling you this is what it is all about, that you learn "there is nothing outside you." That means there is no God outside you, there is no Holy Spirit outside you, there is no Jesus outside you, there is no world outside you. If you keep statements like this in mind, you will not fall into the trap of making the error real, of believing there is a world out there that you must do something about, that you must heal, save, run away from, want to join with, or to forgive.
(T-18.VI.1:3) For God created only this [namely the Kingdom of Heaven], and He did not depart from it nor leave it separate from Himself.
This is a classic non-dualistic statement. This is a reflection of the other important principle in the Course, ideas leave not their source. We are an idea in the Mind of God and we have never left our Source. That means the separation never happened. Early in the text, Jesus says the Kingdom of Heaven is not within you. "The Kingdom of Heaven is you" (T-4.III.1:4). You are the Kingdom of Heaven because you are one with God and God is the Kingdom.
(T-18.VI.1:4-6) The Kingdom of Heaven is the dwelling place of the Son of God, who left not his Father and dwells not apart from Him. [Once again, these are expressions of that perfect Oneness of God and Christ.] Heaven is not a place nor a condition. [And here is the definition:] It is merely an awareness of perfect Oneness, and the knowledge that there is nothing else; nothing outside this Oneness, and nothing else within.
If we truly could understand this, we would not need anything else in the Course. Later on I will read a passage where Jesus says, "We say 'God is,' and then we cease to speak . . ." (WpI.169.5:4). There is nothing else to say. God is. If God is, then His Son is also and there is nothing else. That is probably the closest we will get in the Course to a definition of Heaven. It is the "awareness of perfect Oneness and the knowledge that there is nothing else . . . ." When Jesus uses knowledge, he is not talking about knowledge in the conventional sense where you know something, you are aware of something. That is because these all occur within a dualistic framework. Knowledge in the Course is just a synonym for that state of perfect Oneness. It is the state of the Kingdom, of pure Being. It is the "knowledge that there is nothing else; nothing outside this Oneness, and nothing else within."
Some of you are familiar with the book Gloria and I wrote many years ago called Awaken from the Dream, where there is a lovely (if I might say so, speaking for both of us) description of this unity of Heaven:
… in the Beginning, before there was even a concept of beginning, there is God, our Source and the Source of all creation: a perfection and resplendence whose magnificence is beyond comprehension; love and gentleness of such an infinite nature that consciousness could not even begin its apprehension; a pristine stillness of uninterrupted joy; a motionless flow without friction to impede it; a vast, limitless, and all-encompassing Totality, beyond space, beyond time, in which there is no beginning, no ending, for there was never a time or place when God was not. …
Creation, like spirit, is abstract, formless, and unchanging. Its nature is unity, knowledge of which is that there is nowhere the Creator ends and the created begins. There is no boundary, no differentiation, no separation. Yet, included in this knowledge is the fact that we are not the Source of creation, though we remain One within It.
Can the Mind of God begin? Can the Mind of God end? Can a Thought that is part of that Mind be something other than that Mind? Surely not, since there is no subject or object in the state of Heaven; no observer or observed. There is no perception, simply the total knowledge of who we are: a glory of such unified resplendence that concepts of within-without have no meaning (Awaken from the Dream, pp. 3-4).
There is no way of understanding what that is, but you could at least begin to understand that nothing in this world has anything whatsoever, to do with that, in any way, shape, or form. We are talking about a concept of oneness and unity that totally transcends anything in this world. It transcends the role of the Holy Spirit. It transcends forgiveness. It transcends the miracle. It transcends A Course in Miracles. Those of you who are familiar with my book on Helen, Absence from Felicity, may remember that I discussed that Helen, who obviously had a very close relationship with Jesus and certainly experienced him as very real, occasionally would tell me of an experience she would have of a voice that was basically soundless and that transcended the voice of Jesus. That is what we are talking about. That experience
transcended the dualistic experience of having a relationship with Jesus. It was something beyond even what the Course is about, because the Course says it is not about Heaven and it is not about truth. It is about removing the interferences that we place between ourselves and truth.
Over and over again Jesus says, in one form or another, that knowledge is not the goal of this course, oneness is not the goal of this course. Peace is the goal of this course. And peace in A Course in Miracles is accomplished through the undoing of the ego's specialness. One does not have to understand or know what that oneness is. But, again, if you are going to really understand this course, then you must understand there is something beyond what you think these words are telling you. These words are telling you one thing on the level of form, but on the level of content, if you follow them along without pre-judging them, you will be led by them beyond everything in this world, as the Course says, right up to the gate of Heaven, and then the Course stops. It has carried out its purpose. Then, as Jesus says, God will reach down and lift you back unto Himself (C-4.8:3). That is not the Course goal. That happens afterward.
(W-pII.11.2:4) What God has willed to be forever One will still be One when time is over; and will not be changed throughout the course of time, remaining as it was before the thought of time began.
(W-pII.11.4:1-5) We are creation; we the Sons of God. We seem to be discrete, and unaware of our eternal unity with Him. Yet back of all our doubts, past all our fears, there still is certainty. For love remains with all its Thoughts, its sureness being theirs. God's memory is in our holy minds, which know their oneness and their unity with their Creator.
Here we see another very clear statement that the world of separation, of separate personalities, of individualities, the world of discreteness has nothing to do with Heaven. It is all part of the illusion. It is all part of the dream, and we remain, as the Course says, at home in God yet dreaming of exile (T-10.I.2:1). We remain at home with God in that state of perfect Oneness with Him.
(T-2.VII.6:1-3) It should especially be noted that God has only one Son. If all His creations are His Sons, every one must be an integral part of the whole Sonship. The Sonship in its Oneness transcends the sum of its parts.
That last line is an extremely important one. It is repeated several times in the Course in different ways. What Jesus is saying is that what constitutes Christ, what constitutes the one Son of God, is not adding up all of the seemingly separate fragments. What constitutes Christ is its perfect unity and wholeness. The Oneness transcends the sum of its parts. What defines Christ is this perfect Oneness, not the conglomerate or the sum total of all the seeming fragments. That is how we think of it here. That is why the whole thought of the hundredthmonkey idea, which many Course students adopt and think that is what the Course is talking about, misses the point entirely. That is a wonderful example of the kind of thing I was discussing earlier, where people will take things from the Course out of context and basically understand them within the context of their particular thought system, or their form of spirituality. If you understand that what defines Christ is His perfect wholeness and oneness, then you cannot add up a certain number of members of the Sonship, get a magic number that tilts the rest of the Sonship and everybody falls into God's lap. If you understand and you accept no compromise in which duality plays a part, you will not fall into that trap.
People take the section called "The Circle of Atonement," which talks about how teachers of innocence are gathered together and the implication of that section is that you get more and more people within the Sonship—people interpret that as saying that they have got to get more and more people studying the Course; governments, national and world leaders must study the Course. So we get more and more people into this circle and when we get enough people, everybody will be pulled into it and, again, we fall into Heaven. That is a very nice spirituality. It could work for people. It is not A Course in Miracles. Please, do not fall into that trap. If you accept no compromise in which duality plays a part, you could never fall into that trap because that is a dualistic statement, that you get people who are seemingly separate, and you just get enough of them in one place and something magical will happen. That is not what this Course is about.
If Christ is totally one, if as Jesus says in the teachers' manual, it is true that only one teacher of God is needed to save the world (M-12.1:1), then you do not add up numbers. This is not about getting converts. It is about each individual student of A Course in Miracles learning this course, accepting the Atonement for oneself, and then realizing that they are that one. Later on I will explain to you how that works psychologically, how that really works, how everyone really is part of the one. When you start adding people up, you are making the error real, you are making separation real, and you are saying a certain number of people are needed to save the world. The manual makes it very clear that only one is needed, and Jesus is not talking about himself. He would be an example of the one, but we are all examples of the one. Jesus is an example of one who has accepted the Atonement for himself, whose mind is perfectly healed, but in that awareness, in that healing, in that acceptance of the Atonement, he knows there are no separated Sons. He becomes the Christ because he now realizes that he is the Christ. He, as a separate personality, disappears because we are all Christ, we are all part of that whole.
There is no way anyone in this world can understand how that works, and Jesus does not ask us to understand how it works, but what he does ask us to do is understand how nothing else works. If you understand how nothing else works, then you will leave the door open for what truly works and in fact is the only thing that does work. This is very, very important. If you try to superimpose on A Course in Miracles your own spiritual path, which may have thousands, hundreds of thousands, and even millions of devotees, you will never learn what this course is saying. There is nothing else in this world like this course. It is not saying that you will not find God in other pathways, but you will not find God if you try to do that other pathway with the Course. And you certainly will not find it with the Course. You may construct your own spirituality based on little fragments from the Course and little fragments from this and little fragments from that, and that might work for you, but that has nothing to do with A Course in Miracles. If you change one teaching in this course, if you omit one teaching in this course, you have omitted the whole Course.
That is why Jesus says you either believe all of this course or none of it (T-22.II.7:4). This is not a course you can pick and choose from. It is not sinful, wicked, or bad, if you do, but then it is no longer A Course in Miracles. It is something else. It is eclectic spirituality. There is absolutely nothing wrong with anyone doing that, or promulgating it, or teaching it, but they should have the humility, the good sense, and the self-respect to be clear with the world that they are no longer teaching A Course in Miracles. Blend this with anything else and you will have lost what this is.
Just as Christ is defined by "the whole is greater than the sum of its parts" this course is the same way. This is greater than the sum of its individual teachings. Its individual teachings form a perfectly integrated whole that transcends any one statement or any one principle. That is what you must understand. That is what this hidden level of the Course is, that you realize the perfect totality that this thought system represents. Again, you do not have to be able to accept it totally. You do not have to live it totally. You do not have to understand it totally, but do understand that there is nothing else like it, and nothing else that you think it is saying is what it is saying. That will leave the door open.
This course, just like Christ, is greater than the sum of its parts, and if you want to know what it is teaching, you must give yourself to it totally. And the way you give yourself to it totally is to realize how much you do not want to give yourself to it totally, how much you want to withhold yourself from it. There is nothing wrong in doing that. In fact, there is something wrong in your not doing it, because if you think you are not doing it then you are a liar. You should assume you will do it. You will withhold from it; you will take out certain things that you are not comfortable with; you will blend it in with other things; and you will make the Course a statement of dualistic thinking instead of non-dualistic thinking. Don't be surprised when you do it, but don't be arrogant in thinking you don't do it. It is in realizing that you are trying to change the Course, just as you tried to change Heaven, that will help you get past all of your guilt over your seeming sin.
Everyone is going to "sin" with this course, because no one wants to hear what it says. If people wanted to hear what it said, then they would already know what it says and they would not need it. No one wanted to hear what Jesus said two thousand years ago either. That is not a sin. That is just a reflection of the original thought when you did not want to hear what God said either, which is the word of perfect Oneness. Therefore, you want to be aware of your attempting to subvert, pervert, distort, and change this course, but forgive yourself for it. Just don't arrogantly think you are not doing that.
Remember, the whole is greater than the sum of its parts. How many people are really ready to totally give themselves to the whole of this course, to the whole of Jesus' love without any reservation? That is what you want to look at in yourself and be humble about. That is what will allow you to forgive yourself, not for what you think you have done to Jesus or A Course in Miracles, but what you think you did to God and to Christ.
|
<urn:uuid:a090db7d-4dc2-4768-9fe6-34bfe107f0bd>
|
CC-MAIN-2019-43
|
https://d1wtq249fs8lkp.cloudfront.net/excerpt-series/duality-as-metaphor/Duality%20as%20Metaphor%20in%20A%20Course%20in%20Miracles%20-%20Part%20II.pdf
|
2019-10-19T16:00:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986696339.42/warc/CC-MAIN-20191019141654-20191019165154-00265.warc.gz
| 444,217,378
| 5,587
|
eng_Latn
|
eng_Latn
| 0.999048
|
eng_Latn
| 0.99919
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2522,
5949,
9098,
11876,
15142,
18826,
22174,
25103,
25539
] |
Duality as Metaphor in A Course in Miracles
Excerpts from the Workshop held at the Foundation for A Course in Miracles Roscoe NY
Kenneth Wapnick, Ph.D.
Part II
Heaven: The State of Oneness
We will begin talking about what Heaven is, what the state of Oneness is, what early in the text is called One-mindedness. Then we will talk about what the Course refers to as wrongmindedness, the thought system of the ego, which is the beginning of the thought system of duality, just as Oneness is the thought system of non-duality. Finally, we will talk about the correction or the undoing of the wrong-minded thought system of the ego, which is through the right-minded thought system of the Holy Spirit that centers around the teaching of forgiveness. These teachings of forgiveness all have to do with the reflection of truth. They are not true. They all belong to the world of duality, which means they should not be taken literally. When Jesus speaks about God and about the state of Heaven, he should be taken very literally. When he speaks about the ego, forgiveness, and the Holy Spirit's role, he is talking metaphorically or symbolically.
Let me go back to another musical example as a way of summarizing these three different types of mind: One-mindedness, wrong-mindedness and right-mindedness. About 30 years ago, I read a wonderful book on Beethoven by the British writer Marion Scott. She talked about Beethoven's three stages, which most music scholars talk about, the early, middle, and the late stage. The early stage is the period of the first 30 years of Beethoven's life, wherein the music he composed was very much based upon the formal technique that he learned from Mozart and Haydn. These are not his greatest works by any means. They are very much involved with form, and you can watch Beethoven learning how to master his craft. Then he entered into the second phase with the Eroica Symphony. His Symphonies Three to Eight, his last three piano concertos, some of his greatest piano sonatas, the middle quartets, and his opera Fidelio all belong to that period. Usually, this is the music that is the most accessible to music lovers and that really gave him his great reputation. His final stage, which begins with the Ninth Symphony and then goes into his late sonatas and the last quartets, is clearly his greatest music and probably the greatest music ever written. He transcended all the form, all the conventions, and basically gave a wonderful expression to the end of the spiritual journey.
Marion Scott spoke about Beethoven's first stage as where he looked at the material world through material eyes, where he basically was mastering the world of form, the world of materiality. In the second stage, he looked at the spiritual world through material eyes. Here he was really beginning to express the development and the deepening of his spiritual journey, which could be traced very clearly in his music, but he was still doing it within the framework of the world's forms. It was at the end of his life that he broke with all of these forms. Scott talked about this as when he looked at the spiritual world through spiritual eyes. That is why when you listen to this later music, especially the late sonatas and quartets, you realize that he was inhabiting a totally different realm from anything else he or anyone else had composed. That is what makes his music so other-worldly.
One could make the same kinds of statements about these three levels in A Course in Miracles. Wrong-mindedness is looking at the material world through material eyes. That is what the ego is all about. So those are all the passages in the Course that detail the dynamics of the ego and what specialness is all about, which was all predicated on the seeming reality of our guilt, our sinfulness, our need to project onto other people, cannibalize other people, and kill in order to get what we want.
The correction for this, right-mindedness, is Jesus looking at the material world, the ego thought system, but from the perspective of the spiritual. That is where he speaks very often using the term reflection. That is where he says that love is impossible in this world, but forgiveness, which is love's reflection, is possible here. He talks about the reflection of holiness here, which is what the holy relationship is. He talks about the holy instant. He uses the word holy even though holiness is not possible in this world, but the holy instant and the holy relationship are the reflections of what is true. Again, he is looking at the ego's thought system, a dualistic thought system, from the perspective of the spiritual, but the way that he writes about it, the way that it is presented, and the way that we are asked to practice it is as if we were here. It is looking at the material world, but through the eyes of vision. It is still within the world of duality, which means it is still illusory.
One-mindedness is looking at the spiritual world through spiritual sight. This is recognized in the passages that deal directly with what the state of Heaven is like. There are not many of them, because there is no way we could understand them. These are the passages in A Course in Miracles that tell us what truth is, what reality is, what non-duality is. When you understand that, at least intellectually, you have a perspective by which you can understand what illusion is, and what duality is. That is what would help you not fall into the mistake of taking passages out of context, twisting them around so they will mean what you want them to mean, which will always be to affirm the reality of your specialness at the expense of truth. When you truly understand what oneness, reality, and non-duality mean, you will not make that mistake. You will then have a perspective, a context, a framework in which to understand all of the statements of right-mindedness in the Course, all of the statements in the Course
that deal with the role of the Holy Spirit, and that deal with the role of the miracle and the role of forgiveness. If you do not have that perspective, you will think that what Jesus is talking about should be taken as literally true. It should not be taken as literally true, but he must speak to us on this level because that is where we believe we are.
Later we will look at passages that basically show us how Jesus was aware of this problem, and how he is aware of what he was doing in his course. The problem is that his students are not aware of what he is doing in the Course, and so in some way they skip over these passages because they do not seem that important, and therefore they miss the whole point. This will help you not miss the point, so that your lifetime's work with the Course will become a truly productive one and will be one that will truly lead you on the journey, which in the end will help you transcend your ego. If you are a student of the Course, you would not want to settle for anything less. That would always be the fundamental question you should ask yourself. Why would I settle for less when I could have everything? Why would I settle for a little glimpse of love when I could have that total experience of love? Why would I want Jesus' pinky when I could have his whole being? Why would I settle for less than everything? Yet that is what people do when they work with the Course, because they are not aware of what it is saying.
The state of Oneness or the state of Heaven is the perfect Unity and Oneness of God and Christ. The Course talks about the Mind of God, which is the Creator, and the Mind of Christ, which is what God created. This is always spelled with a capital M. The Mind of God and the Mind of Christ are totally unified. When we speak of something being non-dualistic, it means it is non-dual. There are not two; there is only one. This is the most important point to always keep in mind. This is the only level of reality. This is the only level of truth. Anything else that smacks of duality is only a reflection of reality or a reflection of truth, but not truth. Truth is only God and Christ and there is absolutely nothing else.
There is no way that this can be understood here, as we will see. The words God and Christ have no meaning in Heaven. The words Creator and Created have no meaning in Heaven. They do have meaning for us here, but these are dualistic terms. Obviously, we talk about God and we talk about Christ. We talk about the Father and we talk about the Son. We talk about God as the First Cause; we talk about Christ as the Effect. These are important words to us here because they are meaningful to us. In Heaven, there is no state of duality. There is no God as a separated consciousness that perceives Himself in relationship to His Son, Christ. There is no Christ as a separated consciousness that perceives Himself in relationship to His Creator. Again, these are dualistic terms; these are words. Later on, we will read an important passage where Jesus says that "words are but symbols of symbols. They are thus twice removed from reality" (M-21.1:9-10).
So the words God and Christ symbolize something, but we, who are creatures of duality and specialness, have no way of understanding what the concept of oneness means, what the concept of non-duality means. The idea that "nowhere does the Father end, the Son begin as something separate from Him" (W-pI.132.12:4) makes no sense to us. There are many passages in the Course that reflect this. There is not much we can say about it, but it is, once again, extremely important that you understand this is the bottom line. This is the only truth there is, the only reality. Everything else is a dream, everything else is totally made up.
This is one of the few places in the Course where you can actually see not only a description of Heaven, but almost a definition of it.
(T-18.VI.1:1) There is nothing outside you.
This is a perfectly clear non-dualistic statement.
(T-18.VI.1:2) That is what you must ultimately learn, for it is the realization that the Kingdom of Heaven is restored to you.
There are many places in the Course where Jesus says things like this. When he says this is something you must ultimately learn, he is telling you this is very important. If you read this course with colored markers ready, this is one of the statements you should underline. He is telling you this is what it is all about, that you learn "there is nothing outside you." That means there is no God outside you, there is no Holy Spirit outside you, there is no Jesus outside you, there is no world outside you. If you keep statements like this in mind, you will not fall into the trap of making the error real, of believing there is a world out there that you must do something about, that you must heal, save, run away from, want to join with, or to forgive.
(T-18.VI.1:3) For God created only this [namely the Kingdom of Heaven], and He did not depart from it nor leave it separate from Himself.
This is a classic non-dualistic statement. This is a reflection of the other important principle in the Course, ideas leave not their source. We are an idea in the Mind of God and we have never left our Source. That means the separation never happened. Early in the text, Jesus says the Kingdom of Heaven is not within you. "The Kingdom of Heaven is you" (T-4.III.1:4). You are the Kingdom of Heaven because you are one with God and God is the Kingdom.
(T-18.VI.1:4-6) The Kingdom of Heaven is the dwelling place of the Son of God, who left not his Father and dwells not apart from Him. [Once again, these are expressions of that perfect Oneness of God and Christ.] Heaven is not a place nor a condition. [And here is the definition:] It is merely an awareness of perfect Oneness, and the knowledge that there is nothing else; nothing outside this Oneness, and nothing else within.
If we truly could understand this, we would not need anything else in the Course. Later on I will read a passage where Jesus says, "We say 'God is,' and then we cease to speak . . ." (WpI.169.5:4). There is nothing else to say. God is. If God is, then His Son is also and there is nothing else. That is probably the closest we will get in the Course to a definition of Heaven. It is the "awareness of perfect Oneness and the knowledge that there is nothing else . . . ." When Jesus uses knowledge, he is not talking about knowledge in the conventional sense where you know something, you are aware of something. That is because these all occur within a dualistic framework. Knowledge in the Course is just a synonym for that state of perfect Oneness. It is the state of the Kingdom, of pure Being. It is the "knowledge that there is nothing else; nothing outside this Oneness, and nothing else within."
Some of you are familiar with the book Gloria and I wrote many years ago called Awaken from the Dream, where there is a lovely (if I might say so, speaking for both of us) description of this unity of Heaven:
… in the Beginning, before there was even a conc
|
ept of beginning, there is God, our Source and the Source of all creation: a perfection and resplendence whose magnificence is beyond comprehension; love and gentleness of such an infinite nature that consciousness could not even begin its apprehension; a pristine stillness of uninterrupted joy; a motionless flow without friction to impede it; a vast, limitless, and all-encompassing Totality, beyond space, beyond time, in which there is no beginning, no ending, for there was never a time or place when God was not.
|
…
Creation, like spirit, is abstract, formless, and unchanging. Its nature is unity, knowledge of which is that there is nowhere the Creator ends and the created begins. There is no boundary, no differentiation, no separation. Yet, included in this knowledge is the fact that we are not the Source of creation, though we remain One within It.
Can the Mind of God begin? Can the Mind of God end? Can a Thought that is part of that Mind be something other than that Mind? Surely not, since there is no subject or object in the state of Heaven; no observer or observed. There is no perception, simply the total knowledge of who we are: a glory of such unified resplendence that concepts of within-without have no meaning (Awaken from the Dream, pp. 3-4).
There is no way of understanding what that is, but you could at least begin to understand that nothing in this world has anything whatsoever, to do with that, in any way, shape, or form. We are talking about a concept of oneness and unity that totally transcends anything in this world. It transcends the role of the Holy Spirit. It transcends forgiveness. It transcends the miracle. It transcends A Course in Miracles. Those of you who are familiar with my book on Helen, Absence from Felicity, may remember that I discussed that Helen, who obviously had a very close relationship with Jesus and certainly experienced him as very real, occasionally would tell me of an experience she would have of a voice that was basically soundless and that transcended the voice of Jesus. That is what we are talking about. That experience
transcended the dualistic experience of having a relationship with Jesus. It was something beyond even what the Course is about, because the Course says it is not about Heaven and it is not about truth. It is about removing the interferences that we place between ourselves and truth.
Over and over again Jesus says, in one form or another, that knowledge is not the goal of this course, oneness is not the goal of this course. Peace is the goal of this course. And peace in A Course in Miracles is accomplished through the undoing of the ego's specialness. One does not have to understand or know what that oneness is. But, again, if you are going to really understand this course, then you must understand there is something beyond what you think these words are telling you. These words are telling you one thing on the level of form, but on the level of content, if you follow them along without pre-judging them, you will be led by them beyond everything in this world, as the Course says, right up to the gate of Heaven, and then the Course stops. It has carried out its purpose. Then, as Jesus says, God will reach down and lift you back unto Himself (C-4.8:3). That is not the Course goal. That happens afterward.
(W-pII.11.2:4) What God has willed to be forever One will still be One when time is over; and will not be changed throughout the course of time, remaining as it was before the thought of time began.
(W-pII.11.4:1-5) We are creation; we the Sons of God. We seem to be discrete, and unaware of our eternal unity with Him. Yet back of all our doubts, past all our fears, there still is certainty. For love remains with all its Thoughts, its sureness being theirs. God's memory is in our holy minds, which know their oneness and their unity with their Creator.
Here we see another very clear statement that the world of separation, of separate personalities, of individualities, the world of discreteness has nothing to do with Heaven. It is all part of the illusion. It is all part of the dream, and we remain, as the Course says, at home in God yet dreaming of exile (T-10.I.2:1). We remain at home with God in that state of perfect Oneness with Him.
(T-2.VII.6:1-3) It should especially be noted that God has only one Son. If all His creations are His Sons, every one must be an integral part of the whole Sonship. The Sonship in its Oneness transcends the sum of its parts.
That last line is an extremely important one. It is repeated several times in the Course in different ways. What Jesus is saying is that what constitutes Christ, what constitutes the one Son of God, is not adding up all of the seemingly separate fragments. What constitutes Christ is its perfect unity and wholeness. The Oneness transcends the sum of its parts. What defines Christ is this perfect Oneness, not the conglomerate or the sum total of all the seeming fragments. That is how we think of it here. That is why the whole thought of the hundredthmonkey idea, which many Course students adopt and think that is what the Course is talking about, misses the point entirely. That is a wonderful example of the kind of thing I was discussing earlier, where people will take things from the Course out of context and basically understand them within the context of their particular thought system, or their form of spirituality. If you understand that what defines Christ is His perfect wholeness and oneness, then you cannot add up a certain number of members of the Sonship, get a magic number that tilts the rest of the Sonship and everybody falls into God's lap. If you understand and you accept no compromise in which duality plays a part, you will not fall into that trap.
People take the section called "The Circle of Atonement," which talks about how teachers of innocence are gathered together and the implication of that section is that you get more and more people within the Sonship—people interpret that as saying that they have got to get more and more people studying the Course; governments, national and world leaders must study the Course. So we get more and more people into this circle and when we get enough people, everybody will be pulled into it and, again, we fall into Heaven. That is a very nice spirituality. It could work for people. It is not A Course in Miracles. Please, do not fall into that trap. If you accept no compromise in which duality plays a part, you could never fall into that trap because that is a dualistic statement, that you get people who are seemingly separate, and you just get enough of them in one place and something magical will happen. That is not what this Course is about.
If Christ is totally one, if as Jesus says in the teachers' manual, it is true that only one teacher of God is needed to save the world (M-12.1:1), then you do not add up numbers. This is not about getting converts. It is about each individual student of A Course in Miracles learning this course, accepting the Atonement for oneself, and then realizing that they are that one. Later on I will explain to you how that works psychologically, how that really works, how everyone really is part of the one. When you start adding people up, you are making the error real, you are making separation real, and you are saying a certain number of people are needed to save the world. The manual makes it very clear that only one is needed, and Jesus is not talking about himself. He would be an example of the one, but we are all examples of the one. Jesus is an example of one who has accepted the Atonement for himself, whose mind is perfectly healed, but in that awareness, in that healing, in that acceptance of the Atonement, he knows there are no separated Sons. He becomes the Christ because he now realizes that he is the Christ. He, as a separate personality, disappears because we are all Christ, we are all part of that whole.
There is no way anyone in this world can understand how that works, and Jesus does not ask us to understand how it works, but what he does ask us to do is understand how nothing else works. If you understand how nothing else works, then you will leave the door open for what truly works and in fact is the only thing that does work. This is very, very important. If you try to superimpose on A Course in Miracles your own spiritual path, which may have thousands, hundreds of thousands, and even millions of devotees, you will never learn what this course is saying. There is nothing else in this world like this course. It is not saying that you will not find God in other pathways, but you will not find God if you try to do that other pathway with the Course. And you certainly will not find it with the Course. You may construct your own spirituality based on little fragments from the Course and little fragments from this and little fragments from that, and that might work for you, but that has nothing to do with A Course in Miracles. If you change one teaching in this course, if you omit one teaching in this course, you have omitted the whole Course.
That is why Jesus says you either believe all of this course or none of it (T-22.II.7:4). This is not a course you can pick and choose from. It is not sinful, wicked, or bad, if you do, but then it is no longer A Course in Miracles. It is something else. It is eclectic spirituality. There is absolutely nothing wrong with anyone doing that, or promulgating it, or teaching it, but they should have the humility, the good sense, and the self-respect to be clear with the world that they are no longer teaching A Course in Miracles. Blend this with anything else and you will have lost what this is.
Just as Christ is defined by "the whole is greater than the sum of its parts" this course is the same way. This is greater than the sum of its individual teachings. Its individual teachings form a perfectly integrated whole that transcends any one statement or any one principle. That is what you must understand. That is what this hidden level of the Course is, that you realize the perfect totality that this thought system represents. Again, you do not have to be able to accept it totally. You do not have to live it totally. You do not have to understand it totally, but do understand that there is nothing else like it, and nothing else that you think it is saying is what it is saying. That will leave the door open.
This course, just like Christ, is greater than the sum of its parts, and if you want to know what it is teaching, you must give yourself to it totally. And the way you give yourself to it totally is to realize how much you do not want to give yourself to it totally, how much you want to withhold yourself from it. There is nothing wrong in doing that. In fact, there is something wrong in your not doing it, because if you think you are not doing it then you are a liar. You should assume you will do it. You will withhold from it; you will take out certain things that you are not comfortable with; you will blend it in with other things; and you will make the Course a statement of dualistic thinking instead of non-dualistic thinking. Don't be surprised when you do it, but don't be arrogant in thinking you don't do it. It is in realizing that you are trying to change the Course, just as you tried to change Heaven, that will help you get past all of your guilt over your seeming sin.
Everyone is going to "sin" with this course, because no one wants to hear what it says. If people wanted to hear what it said, then they would already know what it says and they would not need it. No one wanted to hear what Jesus said two thousand years ago either. That is not a sin. That is just a reflection of the original thought when you did not want to hear what God said either, which is the word of perfect Oneness. Therefore, you want to be aware of your attempting to subvert, pervert, distort, and change this course, but forgive yourself for it. Just don't arrogantly think you are not doing that.
Remember, the whole is greater than the sum of its parts. How many people are really ready to totally give themselves to the whole of this course, to the whole of Jesus' love without any reservation? That is what you want to look at in yourself and be humble about. That is what will allow you to forgive yourself, not for what you think you have done to Jesus or A Course in Miracles, but what you think you did to God and to Christ.
| 13,040
|
inside_word
|
concept
|
remove_one_sentence
|
<url>
https://d1wtq249fs8lkp.cloudfront.net/excerpt-series/duality-as-metaphor/Duality%20as%20Metaphor%20in%20A%20Course%20in%20Miracles%20-%20Part%20II.pdf
</url>
<text>
Duality as Metaphor in A Course in Miracles
Excerpts from the Workshop held at the Foundation for A Course in Miracles Roscoe NY
Kenneth Wapnick, Ph.D.
Part II
Heaven: The State of Oneness
We will begin talking about what Heaven is, what the state of Oneness is, what early in the text is called One-mindedness. Then we will talk about what the Course refers to as wrongmindedness, the thought system of the ego, which is the beginning of the thought system of duality, just as Oneness is the thought system of non-duality. Finally, we will talk about the correction or the undoing of the wrong-minded thought system of the ego, which is through the right-minded thought system of the Holy Spirit that centers around the teaching of forgiveness. These teachings of forgiveness all have to do with the reflection of truth. They are not true. They all belong to the world of duality, which means they should not be taken literally. When Jesus speaks about God and about the state of Heaven, he should be taken very literally. When he speaks about the ego, forgiveness, and the Holy Spirit's role, he is talking metaphorically or symbolically.
Let me go back to another musical example as a way of summarizing these three different types of mind: One-mindedness, wrong-mindedness and right-mindedness. About 30 years ago, I read a wonderful book on Beethoven by the British writer Marion Scott. She talked about Beethoven's three stages, which most music scholars talk about, the early, middle, and the late stage. The early stage is the period of the first 30 years of Beethoven's life, wherein the music he composed was very much based upon the formal technique that he learned from Mozart and Haydn. These are not his greatest works by any means. They are very much involved with form, and you can watch Beethoven learning how to master his craft. Then he entered into the second phase with the Eroica Symphony. His Symphonies Three to Eight, his last three piano concertos, some of his greatest piano sonatas, the middle quartets, and his opera Fidelio all belong to that period. Usually, this is the music that is the most accessible to music lovers and that really gave him his great reputation. His final stage, which begins with the Ninth Symphony and then goes into his late sonatas and the last quartets, is clearly his greatest music and probably the greatest music ever written. He transcended all the form, all the conventions, and basically gave a wonderful expression to the end of the spiritual journey.
Marion Scott spoke about Beethoven's first stage as where he looked at the material world through material eyes, where he basically was mastering the world of form, the world of materiality. In the second stage, he looked at the spiritual world through material eyes. Here he was really beginning to express the development and the deepening of his spiritual journey, which could be traced very clearly in his music, but he was still doing it within the framework of the world's forms. It was at the end of his life that he broke with all of these forms. Scott talked about this as when he looked at the spiritual world through spiritual eyes. That is why when you listen to this later music, especially the late sonatas and quartets, you realize that he was inhabiting a totally different realm from anything else he or anyone else had composed. That is what makes his music so other-worldly.
One could make the same kinds of statements about these three levels in A Course in Miracles. Wrong-mindedness is looking at the material world through material eyes. That is what the ego is all about. So those are all the passages in the Course that detail the dynamics of the ego and what specialness is all about, which was all predicated on the seeming reality of our guilt, our sinfulness, our need to project onto other people, cannibalize other people, and kill in order to get what we want.
The correction for this, right-mindedness, is Jesus looking at the material world, the ego thought system, but from the perspective of the spiritual. That is where he speaks very often using the term reflection. That is where he says that love is impossible in this world, but forgiveness, which is love's reflection, is possible here. He talks about the reflection of holiness here, which is what the holy relationship is. He talks about the holy instant. He uses the word holy even though holiness is not possible in this world, but the holy instant and the holy relationship are the reflections of what is true. Again, he is looking at the ego's thought system, a dualistic thought system, from the perspective of the spiritual, but the way that he writes about it, the way that it is presented, and the way that we are asked to practice it is as if we were here. It is looking at the material world, but through the eyes of vision. It is still within the world of duality, which means it is still illusory.
One-mindedness is looking at the spiritual world through spiritual sight. This is recognized in the passages that deal directly with what the state of Heaven is like. There are not many of them, because there is no way we could understand them. These are the passages in A Course in Miracles that tell us what truth is, what reality is, what non-duality is. When you understand that, at least intellectually, you have a perspective by which you can understand what illusion is, and what duality is. That is what would help you not fall into the mistake of taking passages out of context, twisting them around so they will mean what you want them to mean, which will always be to affirm the reality of your specialness at the expense of truth. When you truly understand what oneness, reality, and non-duality mean, you will not make that mistake. You will then have a perspective, a context, a framework in which to understand all of the statements of right-mindedness in the Course, all of the statements in the Course
that deal with the role of the Holy Spirit, and that deal with the role of the miracle and the role of forgiveness. If you do not have that perspective, you will think that what Jesus is talking about should be taken as literally true. It should not be taken as literally true, but he must speak to us on this level because that is where we believe we are.
Later we will look at passages that basically show us how Jesus was aware of this problem, and how he is aware of what he was doing in his course. The problem is that his students are not aware of what he is doing in the Course, and so in some way they skip over these passages because they do not seem that important, and therefore they miss the whole point. This will help you not miss the point, so that your lifetime's work with the Course will become a truly productive one and will be one that will truly lead you on the journey, which in the end will help you transcend your ego. If you are a student of the Course, you would not want to settle for anything less. That would always be the fundamental question you should ask yourself. Why would I settle for less when I could have everything? Why would I settle for a little glimpse of love when I could have that total experience of love? Why would I want Jesus' pinky when I could have his whole being? Why would I settle for less than everything? Yet that is what people do when they work with the Course, because they are not aware of what it is saying.
The state of Oneness or the state of Heaven is the perfect Unity and Oneness of God and Christ. The Course talks about the Mind of God, which is the Creator, and the Mind of Christ, which is what God created. This is always spelled with a capital M. The Mind of God and the Mind of Christ are totally unified. When we speak of something being non-dualistic, it means it is non-dual. There are not two; there is only one. This is the most important point to always keep in mind. This is the only level of reality. This is the only level of truth. Anything else that smacks of duality is only a reflection of reality or a reflection of truth, but not truth. Truth is only God and Christ and there is absolutely nothing else.
There is no way that this can be understood here, as we will see. The words God and Christ have no meaning in Heaven. The words Creator and Created have no meaning in Heaven. They do have meaning for us here, but these are dualistic terms. Obviously, we talk about God and we talk about Christ. We talk about the Father and we talk about the Son. We talk about God as the First Cause; we talk about Christ as the Effect. These are important words to us here because they are meaningful to us. In Heaven, there is no state of duality. There is no God as a separated consciousness that perceives Himself in relationship to His Son, Christ. There is no Christ as a separated consciousness that perceives Himself in relationship to His Creator. Again, these are dualistic terms; these are words. Later on, we will read an important passage where Jesus says that "words are but symbols of symbols. They are thus twice removed from reality" (M-21.1:9-10).
So the words God and Christ symbolize something, but we, who are creatures of duality and specialness, have no way of understanding what the concept of oneness means, what the concept of non-duality means. The idea that "nowhere does the Father end, the Son begin as something separate from Him" (W-pI.132.12:4) makes no sense to us. There are many passages in the Course that reflect this. There is not much we can say about it, but it is, once again, extremely important that you understand this is the bottom line. This is the only truth there is, the only reality. Everything else is a dream, everything else is totally made up.
This is one of the few places in the Course where you can actually see not only a description of Heaven, but almost a definition of it.
(T-18.VI.1:1) There is nothing outside you.
This is a perfectly clear non-dualistic statement.
(T-18.VI.1:2) That is what you must ultimately learn, for it is the realization that the Kingdom of Heaven is restored to you.
There are many places in the Course where Jesus says things like this. When he says this is something you must ultimately learn, he is telling you this is very important. If you read this course with colored markers ready, this is one of the statements you should underline. He is telling you this is what it is all about, that you learn "there is nothing outside you." That means there is no God outside you, there is no Holy Spirit outside you, there is no Jesus outside you, there is no world outside you. If you keep statements like this in mind, you will not fall into the trap of making the error real, of believing there is a world out there that you must do something about, that you must heal, save, run away from, want to join with, or to forgive.
(T-18.VI.1:3) For God created only this [namely the Kingdom of Heaven], and He did not depart from it nor leave it separate from Himself.
This is a classic non-dualistic statement. This is a reflection of the other important principle in the Course, ideas leave not their source. We are an idea in the Mind of God and we have never left our Source. That means the separation never happened. Early in the text, Jesus says the Kingdom of Heaven is not within you. "The Kingdom of Heaven is you" (T-4.III.1:4). You are the Kingdom of Heaven because you are one with God and God is the Kingdom.
(T-18.VI.1:4-6) The Kingdom of Heaven is the dwelling place of the Son of God, who left not his Father and dwells not apart from Him. [Once again, these are expressions of that perfect Oneness of God and Christ.] Heaven is not a place nor a condition. [And here is the definition:] It is merely an awareness of perfect Oneness, and the knowledge that there is nothing else; nothing outside this Oneness, and nothing else within.
If we truly could understand this, we would not need anything else in the Course. Later on I will read a passage where Jesus says, "We say 'God is,' and then we cease to speak . . ." (WpI.169.5:4). There is nothing else to say. God is. If God is, then His Son is also and there is nothing else. That is probably the closest we will get in the Course to a definition of Heaven. It is the "awareness of perfect Oneness and the knowledge that there is nothing else . . . ." When Jesus uses knowledge, he is not talking about knowledge in the conventional sense where you know something, you are aware of something. That is because these all occur within a dualistic framework. Knowledge in the Course is just a synonym for that state of perfect Oneness. It is the state of the Kingdom, of pure Being. It is the "knowledge that there is nothing else; nothing outside this Oneness, and nothing else within."
Some of you are familiar with the book Gloria and I wrote many years ago called Awaken from the Dream, where there is a lovely (if I might say so, speaking for both of us) description of this unity of Heaven:
… in the Beginning, before there was even a conc<cursor_is_here> …
Creation, like spirit, is abstract, formless, and unchanging. Its nature is unity, knowledge of which is that there is nowhere the Creator ends and the created begins. There is no boundary, no differentiation, no separation. Yet, included in this knowledge is the fact that we are not the Source of creation, though we remain One within It.
Can the Mind of God begin? Can the Mind of God end? Can a Thought that is part of that Mind be something other than that Mind? Surely not, since there is no subject or object in the state of Heaven; no observer or observed. There is no perception, simply the total knowledge of who we are: a glory of such unified resplendence that concepts of within-without have no meaning (Awaken from the Dream, pp. 3-4).
There is no way of understanding what that is, but you could at least begin to understand that nothing in this world has anything whatsoever, to do with that, in any way, shape, or form. We are talking about a concept of oneness and unity that totally transcends anything in this world. It transcends the role of the Holy Spirit. It transcends forgiveness. It transcends the miracle. It transcends A Course in Miracles. Those of you who are familiar with my book on Helen, Absence from Felicity, may remember that I discussed that Helen, who obviously had a very close relationship with Jesus and certainly experienced him as very real, occasionally would tell me of an experience she would have of a voice that was basically soundless and that transcended the voice of Jesus. That is what we are talking about. That experience
transcended the dualistic experience of having a relationship with Jesus. It was something beyond even what the Course is about, because the Course says it is not about Heaven and it is not about truth. It is about removing the interferences that we place between ourselves and truth.
Over and over again Jesus says, in one form or another, that knowledge is not the goal of this course, oneness is not the goal of this course. Peace is the goal of this course. And peace in A Course in Miracles is accomplished through the undoing of the ego's specialness. One does not have to understand or know what that oneness is. But, again, if you are going to really understand this course, then you must understand there is something beyond what you think these words are telling you. These words are telling you one thing on the level of form, but on the level of content, if you follow them along without pre-judging them, you will be led by them beyond everything in this world, as the Course says, right up to the gate of Heaven, and then the Course stops. It has carried out its purpose. Then, as Jesus says, God will reach down and lift you back unto Himself (C-4.8:3). That is not the Course goal. That happens afterward.
(W-pII.11.2:4) What God has willed to be forever One will still be One when time is over; and will not be changed throughout the course of time, remaining as it was before the thought of time began.
(W-pII.11.4:1-5) We are creation; we the Sons of God. We seem to be discrete, and unaware of our eternal unity with Him. Yet back of all our doubts, past all our fears, there still is certainty. For love remains with all its Thoughts, its sureness being theirs. God's memory is in our holy minds, which know their oneness and their unity with their Creator.
Here we see another very clear statement that the world of separation, of separate personalities, of individualities, the world of discreteness has nothing to do with Heaven. It is all part of the illusion. It is all part of the dream, and we remain, as the Course says, at home in God yet dreaming of exile (T-10.I.2:1). We remain at home with God in that state of perfect Oneness with Him.
(T-2.VII.6:1-3) It should especially be noted that God has only one Son. If all His creations are His Sons, every one must be an integral part of the whole Sonship. The Sonship in its Oneness transcends the sum of its parts.
That last line is an extremely important one. It is repeated several times in the Course in different ways. What Jesus is saying is that what constitutes Christ, what constitutes the one Son of God, is not adding up all of the seemingly separate fragments. What constitutes Christ is its perfect unity and wholeness. The Oneness transcends the sum of its parts. What defines Christ is this perfect Oneness, not the conglomerate or the sum total of all the seeming fragments. That is how we think of it here. That is why the whole thought of the hundredthmonkey idea, which many Course students adopt and think that is what the Course is talking about, misses the point entirely. That is a wonderful example of the kind of thing I was discussing earlier, where people will take things from the Course out of context and basically understand them within the context of their particular thought system, or their form of spirituality. If you understand that what defines Christ is His perfect wholeness and oneness, then you cannot add up a certain number of members of the Sonship, get a magic number that tilts the rest of the Sonship and everybody falls into God's lap. If you understand and you accept no compromise in which duality plays a part, you will not fall into that trap.
People take the section called "The Circle of Atonement," which talks about how teachers of innocence are gathered together and the implication of that section is that you get more and more people within the Sonship—people interpret that as saying that they have got to get more and more people studying the Course; governments, national and world leaders must study the Course. So we get more and more people into this circle and when we get enough people, everybody will be pulled into it and, again, we fall into Heaven. That is a very nice spirituality. It could work for people. It is not A Course in Miracles. Please, do not fall into that trap. If you accept no compromise in which duality plays a part, you could never fall into that trap because that is a dualistic statement, that you get people who are seemingly separate, and you just get enough of them in one place and something magical will happen. That is not what this Course is about.
If Christ is totally one, if as Jesus says in the teachers' manual, it is true that only one teacher of God is needed to save the world (M-12.1:1), then you do not add up numbers. This is not about getting converts. It is about each individual student of A Course in Miracles learning this course, accepting the Atonement for oneself, and then realizing that they are that one. Later on I will explain to you how that works psychologically, how that really works, how everyone really is part of the one. When you start adding people up, you are making the error real, you are making separation real, and you are saying a certain number of people are needed to save the world. The manual makes it very clear that only one is needed, and Jesus is not talking about himself. He would be an example of the one, but we are all examples of the one. Jesus is an example of one who has accepted the Atonement for himself, whose mind is perfectly healed, but in that awareness, in that healing, in that acceptance of the Atonement, he knows there are no separated Sons. He becomes the Christ because he now realizes that he is the Christ. He, as a separate personality, disappears because we are all Christ, we are all part of that whole.
There is no way anyone in this world can understand how that works, and Jesus does not ask us to understand how it works, but what he does ask us to do is understand how nothing else works. If you understand how nothing else works, then you will leave the door open for what truly works and in fact is the only thing that does work. This is very, very important. If you try to superimpose on A Course in Miracles your own spiritual path, which may have thousands, hundreds of thousands, and even millions of devotees, you will never learn what this course is saying. There is nothing else in this world like this course. It is not saying that you will not find God in other pathways, but you will not find God if you try to do that other pathway with the Course. And you certainly will not find it with the Course. You may construct your own spirituality based on little fragments from the Course and little fragments from this and little fragments from that, and that might work for you, but that has nothing to do with A Course in Miracles. If you change one teaching in this course, if you omit one teaching in this course, you have omitted the whole Course.
That is why Jesus says you either believe all of this course or none of it (T-22.II.7:4). This is not a course you can pick and choose from. It is not sinful, wicked, or bad, if you do, but then it is no longer A Course in Miracles. It is something else. It is eclectic spirituality. There is absolutely nothing wrong with anyone doing that, or promulgating it, or teaching it, but they should have the humility, the good sense, and the self-respect to be clear with the world that they are no longer teaching A Course in Miracles. Blend this with anything else and you will have lost what this is.
Just as Christ is defined by "the whole is greater than the sum of its parts" this course is the same way. This is greater than the sum of its individual teachings. Its individual teachings form a perfectly integrated whole that transcends any one statement or any one principle. That is what you must understand. That is what this hidden level of the Course is, that you realize the perfect totality that this thought system represents. Again, you do not have to be able to accept it totally. You do not have to live it totally. You do not have to understand it totally, but do understand that there is nothing else like it, and nothing else that you think it is saying is what it is saying. That will leave the door open.
This course, just like Christ, is greater than the sum of its parts, and if you want to know what it is teaching, you must give yourself to it totally. And the way you give yourself to it totally is to realize how much you do not want to give yourself to it totally, how much you want to withhold yourself from it. There is nothing wrong in doing that. In fact, there is something wrong in your not doing it, because if you think you are not doing it then you are a liar. You should assume you will do it. You will withhold from it; you will take out certain things that you are not comfortable with; you will blend it in with other things; and you will make the Course a statement of dualistic thinking instead of non-dualistic thinking. Don't be surprised when you do it, but don't be arrogant in thinking you don't do it. It is in realizing that you are trying to change the Course, just as you tried to change Heaven, that will help you get past all of your guilt over your seeming sin.
Everyone is going to "sin" with this course, because no one wants to hear what it says. If people wanted to hear what it said, then they would already know what it says and they would not need it. No one wanted to hear what Jesus said two thousand years ago either. That is not a sin. That is just a reflection of the original thought when you did not want to hear what God said either, which is the word of perfect Oneness. Therefore, you want to be aware of your attempting to subvert, pervert, distort, and change this course, but forgive yourself for it. Just don't arrogantly think you are not doing that.
Remember, the whole is greater than the sum of its parts. How many people are really ready to totally give themselves to the whole of this course, to the whole of Jesus' love without any reservation? That is what you want to look at in yourself and be humble about. That is what will allow you to forgive yourself, not for what you think you have done to Jesus or A Course in Miracles, but what you think you did to God and to Christ.
</text>
|
[
{
"content": "<url>\nhttps://d1wtq249fs8lkp.cloudfront.net/excerpt-series/duality-as-metaphor/Duality%20as%20Metaphor%20in%20A%20Course%20in%20Miracles%20-%20Part%20II.pdf\n</url>\n<text>\nDuality as Metaphor in A Course in Miracles\n\nExcerpts from the Workshop held at the Foundation for A Course in Miracles Roscoe NY\n\nKenneth Wapnick, Ph.D.\n\nPart II\n\nHeaven: The State of Oneness\n\nWe will begin talking about what Heaven is, what the state of Oneness is, what early in the text is called One-mindedness. Then we will talk about what the Course refers to as wrongmindedness, the thought system of the ego, which is the beginning of the thought system of duality, just as Oneness is the thought system of non-duality. Finally, we will talk about the correction or the undoing of the wrong-minded thought system of the ego, which is through the right-minded thought system of the Holy Spirit that centers around the teaching of forgiveness. These teachings of forgiveness all have to do with the reflection of truth. They are not true. They all belong to the world of duality, which means they should not be taken literally. When Jesus speaks about God and about the state of Heaven, he should be taken very literally. When he speaks about the ego, forgiveness, and the Holy Spirit's role, he is talking metaphorically or symbolically.\n\nLet me go back to another musical example as a way of summarizing these three different types of mind: One-mindedness, wrong-mindedness and right-mindedness. About 30 years ago, I read a wonderful book on Beethoven by the British writer Marion Scott. She talked about Beethoven's three stages, which most music scholars talk about, the early, middle, and the late stage. The early stage is the period of the first 30 years of Beethoven's life, wherein the music he composed was very much based upon the formal technique that he learned from Mozart and Haydn. These are not his greatest works by any means. They are very much involved with form, and you can watch Beethoven learning how to master his craft. Then he entered into the second phase with the Eroica Symphony. His Symphonies Three to Eight, his last three piano concertos, some of his greatest piano sonatas, the middle quartets, and his opera Fidelio all belong to that period. Usually, this is the music that is the most accessible to music lovers and that really gave him his great reputation. His final stage, which begins with the Ninth Symphony and then goes into his late sonatas and the last quartets, is clearly his greatest music and probably the greatest music ever written. He transcended all the form, all the conventions, and basically gave a wonderful expression to the end of the spiritual journey.\n\nMarion Scott spoke about Beethoven's first stage as where he looked at the material world through material eyes, where he basically was mastering the world of form, the world of materiality. In the second stage, he looked at the spiritual world through material eyes. Here he was really beginning to express the development and the deepening of his spiritual journey, which could be traced very clearly in his music, but he was still doing it within the framework of the world's forms. It was at the end of his life that he broke with all of these forms. Scott talked about this as when he looked at the spiritual world through spiritual eyes. That is why when you listen to this later music, especially the late sonatas and quartets, you realize that he was inhabiting a totally different realm from anything else he or anyone else had composed. That is what makes his music so other-worldly.\n\nOne could make the same kinds of statements about these three levels in A Course in Miracles. Wrong-mindedness is looking at the material world through material eyes. That is what the ego is all about. So those are all the passages in the Course that detail the dynamics of the ego and what specialness is all about, which was all predicated on the seeming reality of our guilt, our sinfulness, our need to project onto other people, cannibalize other people, and kill in order to get what we want.\n\nThe correction for this, right-mindedness, is Jesus looking at the material world, the ego thought system, but from the perspective of the spiritual. That is where he speaks very often using the term reflection. That is where he says that love is impossible in this world, but forgiveness, which is love's reflection, is possible here. He talks about the reflection of holiness here, which is what the holy relationship is. He talks about the holy instant. He uses the word holy even though holiness is not possible in this world, but the holy instant and the holy relationship are the reflections of what is true. Again, he is looking at the ego's thought system, a dualistic thought system, from the perspective of the spiritual, but the way that he writes about it, the way that it is presented, and the way that we are asked to practice it is as if we were here. It is looking at the material world, but through the eyes of vision. It is still within the world of duality, which means it is still illusory.\n\nOne-mindedness is looking at the spiritual world through spiritual sight. This is recognized in the passages that deal directly with what the state of Heaven is like. There are not many of them, because there is no way we could understand them. These are the passages in A Course in Miracles that tell us what truth is, what reality is, what non-duality is. When you understand that, at least intellectually, you have a perspective by which you can understand what illusion is, and what duality is. That is what would help you not fall into the mistake of taking passages out of context, twisting them around so they will mean what you want them to mean, which will always be to affirm the reality of your specialness at the expense of truth. When you truly understand what oneness, reality, and non-duality mean, you will not make that mistake. You will then have a perspective, a context, a framework in which to understand all of the statements of right-mindedness in the Course, all of the statements in the Course\n\nthat deal with the role of the Holy Spirit, and that deal with the role of the miracle and the role of forgiveness. If you do not have that perspective, you will think that what Jesus is talking about should be taken as literally true. It should not be taken as literally true, but he must speak to us on this level because that is where we believe we are.\n\nLater we will look at passages that basically show us how Jesus was aware of this problem, and how he is aware of what he was doing in his course. The problem is that his students are not aware of what he is doing in the Course, and so in some way they skip over these passages because they do not seem that important, and therefore they miss the whole point. This will help you not miss the point, so that your lifetime's work with the Course will become a truly productive one and will be one that will truly lead you on the journey, which in the end will help you transcend your ego. If you are a student of the Course, you would not want to settle for anything less. That would always be the fundamental question you should ask yourself. Why would I settle for less when I could have everything? Why would I settle for a little glimpse of love when I could have that total experience of love? Why would I want Jesus' pinky when I could have his whole being? Why would I settle for less than everything? Yet that is what people do when they work with the Course, because they are not aware of what it is saying.\n\nThe state of Oneness or the state of Heaven is the perfect Unity and Oneness of God and Christ. The Course talks about the Mind of God, which is the Creator, and the Mind of Christ, which is what God created. This is always spelled with a capital M. The Mind of God and the Mind of Christ are totally unified. When we speak of something being non-dualistic, it means it is non-dual. There are not two; there is only one. This is the most important point to always keep in mind. This is the only level of reality. This is the only level of truth. Anything else that smacks of duality is only a reflection of reality or a reflection of truth, but not truth. Truth is only God and Christ and there is absolutely nothing else.\n\nThere is no way that this can be understood here, as we will see. The words God and Christ have no meaning in Heaven. The words Creator and Created have no meaning in Heaven. They do have meaning for us here, but these are dualistic terms. Obviously, we talk about God and we talk about Christ. We talk about the Father and we talk about the Son. We talk about God as the First Cause; we talk about Christ as the Effect. These are important words to us here because they are meaningful to us. In Heaven, there is no state of duality. There is no God as a separated consciousness that perceives Himself in relationship to His Son, Christ. There is no Christ as a separated consciousness that perceives Himself in relationship to His Creator. Again, these are dualistic terms; these are words. Later on, we will read an important passage where Jesus says that \"words are but symbols of symbols. They are thus twice removed from reality\" (M-21.1:9-10).\n\nSo the words God and Christ symbolize something, but we, who are creatures of duality and specialness, have no way of understanding what the concept of oneness means, what the concept of non-duality means. The idea that \"nowhere does the Father end, the Son begin as something separate from Him\" (W-pI.132.12:4) makes no sense to us. There are many passages in the Course that reflect this. There is not much we can say about it, but it is, once again, extremely important that you understand this is the bottom line. This is the only truth there is, the only reality. Everything else is a dream, everything else is totally made up.\n\nThis is one of the few places in the Course where you can actually see not only a description of Heaven, but almost a definition of it.\n\n(T-18.VI.1:1) There is nothing outside you.\n\nThis is a perfectly clear non-dualistic statement.\n\n(T-18.VI.1:2) That is what you must ultimately learn, for it is the realization that the Kingdom of Heaven is restored to you.\n\nThere are many places in the Course where Jesus says things like this. When he says this is something you must ultimately learn, he is telling you this is very important. If you read this course with colored markers ready, this is one of the statements you should underline. He is telling you this is what it is all about, that you learn \"there is nothing outside you.\" That means there is no God outside you, there is no Holy Spirit outside you, there is no Jesus outside you, there is no world outside you. If you keep statements like this in mind, you will not fall into the trap of making the error real, of believing there is a world out there that you must do something about, that you must heal, save, run away from, want to join with, or to forgive.\n\n(T-18.VI.1:3) For God created only this [namely the Kingdom of Heaven], and He did not depart from it nor leave it separate from Himself.\n\nThis is a classic non-dualistic statement. This is a reflection of the other important principle in the Course, ideas leave not their source. We are an idea in the Mind of God and we have never left our Source. That means the separation never happened. Early in the text, Jesus says the Kingdom of Heaven is not within you. \"The Kingdom of Heaven is you\" (T-4.III.1:4). You are the Kingdom of Heaven because you are one with God and God is the Kingdom.\n\n(T-18.VI.1:4-6) The Kingdom of Heaven is the dwelling place of the Son of God, who left not his Father and dwells not apart from Him. [Once again, these are expressions of that perfect Oneness of God and Christ.] Heaven is not a place nor a condition. [And here is the definition:] It is merely an awareness of perfect Oneness, and the knowledge that there is nothing else; nothing outside this Oneness, and nothing else within.\n\nIf we truly could understand this, we would not need anything else in the Course. Later on I will read a passage where Jesus says, \"We say 'God is,' and then we cease to speak . . .\" (WpI.169.5:4). There is nothing else to say. God is. If God is, then His Son is also and there is nothing else. That is probably the closest we will get in the Course to a definition of Heaven. It is the \"awareness of perfect Oneness and the knowledge that there is nothing else . . . .\" When Jesus uses knowledge, he is not talking about knowledge in the conventional sense where you know something, you are aware of something. That is because these all occur within a dualistic framework. Knowledge in the Course is just a synonym for that state of perfect Oneness. It is the state of the Kingdom, of pure Being. It is the \"knowledge that there is nothing else; nothing outside this Oneness, and nothing else within.\"\n\nSome of you are familiar with the book Gloria and I wrote many years ago called Awaken from the Dream, where there is a lovely (if I might say so, speaking for both of us) description of this unity of Heaven:\n\n… in the Beginning, before there was even a conc<cursor_is_here> …\n\nCreation, like spirit, is abstract, formless, and unchanging. Its nature is unity, knowledge of which is that there is nowhere the Creator ends and the created begins. There is no boundary, no differentiation, no separation. Yet, included in this knowledge is the fact that we are not the Source of creation, though we remain One within It.\n\nCan the Mind of God begin? Can the Mind of God end? Can a Thought that is part of that Mind be something other than that Mind? Surely not, since there is no subject or object in the state of Heaven; no observer or observed. There is no perception, simply the total knowledge of who we are: a glory of such unified resplendence that concepts of within-without have no meaning (Awaken from the Dream, pp. 3-4).\n\nThere is no way of understanding what that is, but you could at least begin to understand that nothing in this world has anything whatsoever, to do with that, in any way, shape, or form. We are talking about a concept of oneness and unity that totally transcends anything in this world. It transcends the role of the Holy Spirit. It transcends forgiveness. It transcends the miracle. It transcends A Course in Miracles. Those of you who are familiar with my book on Helen, Absence from Felicity, may remember that I discussed that Helen, who obviously had a very close relationship with Jesus and certainly experienced him as very real, occasionally would tell me of an experience she would have of a voice that was basically soundless and that transcended the voice of Jesus. That is what we are talking about. That experience\n\ntranscended the dualistic experience of having a relationship with Jesus. It was something beyond even what the Course is about, because the Course says it is not about Heaven and it is not about truth. It is about removing the interferences that we place between ourselves and truth.\n\nOver and over again Jesus says, in one form or another, that knowledge is not the goal of this course, oneness is not the goal of this course. Peace is the goal of this course. And peace in A Course in Miracles is accomplished through the undoing of the ego's specialness. One does not have to understand or know what that oneness is. But, again, if you are going to really understand this course, then you must understand there is something beyond what you think these words are telling you. These words are telling you one thing on the level of form, but on the level of content, if you follow them along without pre-judging them, you will be led by them beyond everything in this world, as the Course says, right up to the gate of Heaven, and then the Course stops. It has carried out its purpose. Then, as Jesus says, God will reach down and lift you back unto Himself (C-4.8:3). That is not the Course goal. That happens afterward.\n\n(W-pII.11.2:4) What God has willed to be forever One will still be One when time is over; and will not be changed throughout the course of time, remaining as it was before the thought of time began.\n\n(W-pII.11.4:1-5) We are creation; we the Sons of God. We seem to be discrete, and unaware of our eternal unity with Him. Yet back of all our doubts, past all our fears, there still is certainty. For love remains with all its Thoughts, its sureness being theirs. God's memory is in our holy minds, which know their oneness and their unity with their Creator.\n\nHere we see another very clear statement that the world of separation, of separate personalities, of individualities, the world of discreteness has nothing to do with Heaven. It is all part of the illusion. It is all part of the dream, and we remain, as the Course says, at home in God yet dreaming of exile (T-10.I.2:1). We remain at home with God in that state of perfect Oneness with Him.\n\n(T-2.VII.6:1-3) It should especially be noted that God has only one Son. If all His creations are His Sons, every one must be an integral part of the whole Sonship. The Sonship in its Oneness transcends the sum of its parts.\n\nThat last line is an extremely important one. It is repeated several times in the Course in different ways. What Jesus is saying is that what constitutes Christ, what constitutes the one Son of God, is not adding up all of the seemingly separate fragments. What constitutes Christ is its perfect unity and wholeness. The Oneness transcends the sum of its parts. What defines Christ is this perfect Oneness, not the conglomerate or the sum total of all the seeming fragments. That is how we think of it here. That is why the whole thought of the hundredthmonkey idea, which many Course students adopt and think that is what the Course is talking about, misses the point entirely. That is a wonderful example of the kind of thing I was discussing earlier, where people will take things from the Course out of context and basically understand them within the context of their particular thought system, or their form of spirituality. If you understand that what defines Christ is His perfect wholeness and oneness, then you cannot add up a certain number of members of the Sonship, get a magic number that tilts the rest of the Sonship and everybody falls into God's lap. If you understand and you accept no compromise in which duality plays a part, you will not fall into that trap.\n\nPeople take the section called \"The Circle of Atonement,\" which talks about how teachers of innocence are gathered together and the implication of that section is that you get more and more people within the Sonship—people interpret that as saying that they have got to get more and more people studying the Course; governments, national and world leaders must study the Course. So we get more and more people into this circle and when we get enough people, everybody will be pulled into it and, again, we fall into Heaven. That is a very nice spirituality. It could work for people. It is not A Course in Miracles. Please, do not fall into that trap. If you accept no compromise in which duality plays a part, you could never fall into that trap because that is a dualistic statement, that you get people who are seemingly separate, and you just get enough of them in one place and something magical will happen. That is not what this Course is about.\n\nIf Christ is totally one, if as Jesus says in the teachers' manual, it is true that only one teacher of God is needed to save the world (M-12.1:1), then you do not add up numbers. This is not about getting converts. It is about each individual student of A Course in Miracles learning this course, accepting the Atonement for oneself, and then realizing that they are that one. Later on I will explain to you how that works psychologically, how that really works, how everyone really is part of the one. When you start adding people up, you are making the error real, you are making separation real, and you are saying a certain number of people are needed to save the world. The manual makes it very clear that only one is needed, and Jesus is not talking about himself. He would be an example of the one, but we are all examples of the one. Jesus is an example of one who has accepted the Atonement for himself, whose mind is perfectly healed, but in that awareness, in that healing, in that acceptance of the Atonement, he knows there are no separated Sons. He becomes the Christ because he now realizes that he is the Christ. He, as a separate personality, disappears because we are all Christ, we are all part of that whole.\n\nThere is no way anyone in this world can understand how that works, and Jesus does not ask us to understand how it works, but what he does ask us to do is understand how nothing else works. If you understand how nothing else works, then you will leave the door open for what truly works and in fact is the only thing that does work. This is very, very important. If you try to superimpose on A Course in Miracles your own spiritual path, which may have thousands, hundreds of thousands, and even millions of devotees, you will never learn what this course is saying. There is nothing else in this world like this course. It is not saying that you will not find God in other pathways, but you will not find God if you try to do that other pathway with the Course. And you certainly will not find it with the Course. You may construct your own spirituality based on little fragments from the Course and little fragments from this and little fragments from that, and that might work for you, but that has nothing to do with A Course in Miracles. If you change one teaching in this course, if you omit one teaching in this course, you have omitted the whole Course.\n\nThat is why Jesus says you either believe all of this course or none of it (T-22.II.7:4). This is not a course you can pick and choose from. It is not sinful, wicked, or bad, if you do, but then it is no longer A Course in Miracles. It is something else. It is eclectic spirituality. There is absolutely nothing wrong with anyone doing that, or promulgating it, or teaching it, but they should have the humility, the good sense, and the self-respect to be clear with the world that they are no longer teaching A Course in Miracles. Blend this with anything else and you will have lost what this is.\n\nJust as Christ is defined by \"the whole is greater than the sum of its parts\" this course is the same way. This is greater than the sum of its individual teachings. Its individual teachings form a perfectly integrated whole that transcends any one statement or any one principle. That is what you must understand. That is what this hidden level of the Course is, that you realize the perfect totality that this thought system represents. Again, you do not have to be able to accept it totally. You do not have to live it totally. You do not have to understand it totally, but do understand that there is nothing else like it, and nothing else that you think it is saying is what it is saying. That will leave the door open.\n\nThis course, just like Christ, is greater than the sum of its parts, and if you want to know what it is teaching, you must give yourself to it totally. And the way you give yourself to it totally is to realize how much you do not want to give yourself to it totally, how much you want to withhold yourself from it. There is nothing wrong in doing that. In fact, there is something wrong in your not doing it, because if you think you are not doing it then you are a liar. You should assume you will do it. You will withhold from it; you will take out certain things that you are not comfortable with; you will blend it in with other things; and you will make the Course a statement of dualistic thinking instead of non-dualistic thinking. Don't be surprised when you do it, but don't be arrogant in thinking you don't do it. It is in realizing that you are trying to change the Course, just as you tried to change Heaven, that will help you get past all of your guilt over your seeming sin.\n\nEveryone is going to \"sin\" with this course, because no one wants to hear what it says. If people wanted to hear what it said, then they would already know what it says and they would not need it. No one wanted to hear what Jesus said two thousand years ago either. That is not a sin. That is just a reflection of the original thought when you did not want to hear what God said either, which is the word of perfect Oneness. Therefore, you want to be aware of your attempting to subvert, pervert, distort, and change this course, but forgive yourself for it. Just don't arrogantly think you are not doing that.\n\nRemember, the whole is greater than the sum of its parts. How many people are really ready to totally give themselves to the whole of this course, to the whole of Jesus' love without any reservation? That is what you want to look at in yourself and be humble about. That is what will allow you to forgive yourself, not for what you think you have done to Jesus or A Course in Miracles, but what you think you did to God and to Christ.\n</text>\n",
"role": "user"
},
{
"content": "ept of beginning, there is God, our Source and the Source of all creation: a perfection and resplendence whose magnificence is beyond comprehension; love and gentleness of such an infinite nature that consciousness could not even begin its apprehension; a pristine stillness of uninterrupted joy; a motionless flow without friction to impede it; a vast, limitless, and all-encompassing Totality, beyond space, beyond time, in which there is no beginning, no ending, for there was never a time or place when God was not.",
"role": "assistant"
}
] |
Web Access to an Archaeological GIS
Andrea D'Andrea
CISA – Istituto Universitario Orientale Vicoletto I, S. Maria ad Agnone 8, 80139 Napoli, Italy
e-mail: [email protected]
Franco Niccolucci
University of Florence Via Pisana 56, 50143 Firenze, Italy e-mail: [email protected]
Marco Crescioli
Unirel SRL
Via Volturno 12, 50019 Sesto Fiorentino (FI), Italy
e-mail: [email protected]
Abstract
After examining the impact of publishing data on archaeological theory and methods on the Internet, we propose a client-server solution characterised by low costs and high processing power and which is at the same time easy to use. On the client side it requires only a commercial browser with no particular computer skill of the user. On the server side it is based on the Linux operating system with some freeware packages, integrated by a module created by us. This system, developed around an archaeological case study, is accessible on the Internet and has been conceived to host additional archaeological GIS applications.
Key words: GIS, Internet, remote access
1. GIS, theoretical issues and new ways of communication
The introduction of information technology in archaeology represents an element that is changing important aspects of the archaeological theory (Limp 1997, Moscati 1998, Voorrips 1997, Crescioli et al. 2000) such as, for instance, the investigation potential of 3D landscape using viewshed and cost surface analysis. Creating a new space-time framework, virtually constructed on the computer, has had important consequences both on the methodology and epistemology, contributing to the outline of what has been called a new perceptive metaphor of space (Wheatley 1993, Gillings 1997, Bampton 1997).
The use of GIS has already oriented the research in new previously unavailable directions, determining an innovative cognitive perspective of the landscape, which traditional methods could not explore (Barceló et al. 2000); using alternative economic, social and political models for the cultural investigation of the territory contributes to the social explanation of archaeological facts more than a simple description of the geometry of observed structures (Harris and Lock 1995).
However, notwithstanding significant advances, the use of GIS is not yet uniform. This is caused by different study and research backgrounds (arising from different traditions), which sometimes cause the unawareness of the methodological value of this new tool. Probably only a new and different way of communication between computer applications may defend computerised solutions (especially the GIS system) from a tenacious and resistant academic scepticism that prefers – at least in Italy – to consider the computer role as a modern and sophisticated "household appliance", ignoring the important consequences of its use on the theoretical and methodological side.
An obstacle in this evolution is presented in the limited visibility of GIS applications, which, so far, remain a theoretical subject of conferences instead of becoming a widely diffused technology. Every team, oriented into the construction of its own specific application instead of comparing the existing solutions, starts a new project ignoring the choices, methods and systems already adopted by others. Such behaviour should not be ascribed only to the limited co-operative attitude of different teams, but also to the limited circulation of existing applications. This results in the fact that most researchers ignore the procedures and methods adopted in individual solutions. An interesting recent debate on GIS and archaeological theory has therefore been confined to an abstract level, making it impossible to compare systems, and leaving only the comparison of system abstractions.
A necessary condition for this is the availability and visibility of applications: only thus, with direct access (even remote) to different solutions will it be possible to guarantee a real comparison, and avoid a mere quarrel between different schools and tendencies.
Even if it is not effective and manageable, including paper records in archaeological publications allows one to check data and to reconstruct the scientific process of discovery. In a similar way, the use of computers will significantly contribute to the dissemination of data, and not only the final synthesis and reconstruction. However, it is inconceivable that every researcher could learn to use the software programs necessary to understand the aims and
strategies of another research project. This limitation in data availability and access underlines a reflection based on technical problems as well as on methodological questions: it is perhaps the absence of user-friendly interfaces that excludes most scholars from the debate. By limiting the participation to computer-skilled archaeologists only, GIS applications become the object of the study instead of being a tool which would ease archaeological investigations and ensure more widely spread data circulation.
Our approach, based on the integration of GIS into the WWW (World Wide Web), aims at going beyond the limits of their application to archaeology: the difficulty of accessing information without the software used to create GIS, and the need to know how to operate different programs, with learning curves that always require a substantial investment of resources.
Existing GIS-Web applications (for a list see, for instance, Web GIS and Interactive Mapping Sites, or Ploewe 1997) have, in our opinion, several drawbacks. The first drawback is the cost which prevents most archaeological budgets from using GIS-Web applications. Secondly, a large number of applications require considerable computer skills for setting up: the rare freeware ones pay little attention to unskilled use and are not completely bug-free. Perhaps this is why no archaeological application of this technology has as yet been proposed, at least as far as we know.
So far Web use for archaeological research is not satisfactory even as far as the transmission of data and scientific results is concerned. Web sites have turned from embryonic presentation places, in a synthetic form and with limited illustration features, into real archaeological portals. The latter undoubtedly have the merit of favouring the circulation of data and information, but are often unable to go beyond the "search engine" logic (Guermandi 1999, Hermon and Niccolucci 2000).
Recently the Internet has begun to have a new impact on archaeological research thanks to the availability of papers, monographs and journals. Using the Internet in order to improve communication between professionals concerns also the diffusion of reports of still unedited investigations. This is particularly true in specific conditions: unequal development in different regions is typical for Internet archaeology, therefore successful anglo-american research or organisational models such as ADS (Archaeology Data Service) cannot be exported without adapting them to the local needs, culture, tradition and "prejudices".
In these cases, the Internet is still considered only as a modern (and extremely powerful) technological channel for information transmission, often substituting the traditional scientific printed publications with its high costs, but with a similar logic. From this perspective, Internet publishing will produce an improvement in the diffusion of scientific knowledge allowing a faster and wider distribution of contributions otherwise destined to remain accessible only to the chosen few. However, users and information providers are still unaware of the potential use of the Internet not only as a communication medium, but also as a tool to share and interchange processed and raw data.
Publishing alphanumeric and geographical data on the Internet, both with open remote access (Internet) and with restricted access (Intranet) will have two important consequences on scientific cooperation (Bogdanovich et al. in press, D'Andrea and Niccolucci 2000, Hermon and Niccolucci 2000). On the one hand it will induce data re-use, since other researchers will be able to use the same data to start new investigations, possibly from different perspectives. On the other hand, the network availability of data, and not only of the results, will ease the reconstruction of the scientific discovery process, allowing everybody, at least in theory, to re-examine the results starting from material sources as represented by their records. This consideration would naturally introduce the issue of metadata, which is not the central theme of the present paper and would lead us too far from its aim. However, it is necessary to be extremely cautious in taking for granted that there is an agreed – and simple – generalised metadata structure. In our opinion, many countries have still a very low metadata awareness and their attention focuses on semantic structures, thesauri and dictionaries, created by single teams. Therefore, to avoid another metadata proposal, we chose to take the easy way out, allowing a discursive description of data and leaving the responsibility of the description level to the authors, with the only constraint that an English translation is to be supplied: an issue that receives little attention by English-speaking people, being considered as obvious, what in other countries is decidedly not.
2. Publishing a GIS on the WWW: the features
In this paper we present a preliminary step in the path outlined above. Nonetheless, it has some features that deserve attention and that we wish to stress.
* The software we use is freely available, state-of-the-art and powerful.
It often happens that the search for software to be used in an application stops at the best seller, however this often proves later on to be limited and unreliable. The little effort required to learn a new package is returned in terms of reliability, power and money saving. This is perhaps in conflict with the supporters of the "household appliance" theory, who love off-the-shelf solutions that allow the most computer unskilled archaeologist to develop a computer application by themselves: unfortunately for them, some competence is required, here as everywhere else, in order to build something effective.
* The customisation requires only a few new software codes. This ensures that the product will be reliable, since most of it relies on long tested packages, and will ease maintenance and updates. Moreover the source code is publicly available (and can be easily read and understood), and everybody can check and hopefully improve it. The source codes of base packages are also available, so that they may be extended or otherwise changed if needed, for instance for linking additional libraries or modules.
* The user needs only a commercial browser to access data, that is to interrogate the GIS.
This allows a wider spread and easier use, ensures platform compatibility and will benefit of future improvements in the technology of browsers. In our opinion, browsers will be the glue to link different applications, since they already encapsulate (and this will only improve in the future) the tools to manage different protocols of information storage and transmission, as, for instance, XML (eXtensible Markup Language), (Goldfarb and Prescod
1998) and LDAP (Lightweight Directory Access Protocol), (Loshin 2000).
* Data formats are de-facto industry standards.
This reduces the cost of data migration from other applications and guarantees future conversion to new format standards.
* It has been conceived having archaeological applications in mind.
3. Case study
Starting from a previous experiment of remote access to an archaeological GIS, our case study considers the interrogation and the processing of alphanumeric and geographic data concerning the Etruscan cemetery of Pontecagnano (D'Andrea and Niccolucci 2000). Data was acquired during the investigation of a vast funerary area discovered by the expansion of the modern centre, and more than 8,000 burials were discovered, dating between the ninth and the third century BC. This vast amount of data has been stored and managed with a GIS, which aims at supporting scientific research, at improving administrative preservation activity and at the integration with the local Master Plan (D'Andrea 1999). This system is based on Mapinfo and consists of some thematic layers: modern cartography (at different scales: 1:10,000, 1:2,000); the cadastre (1:4,000); aerial photos; the limits of explored areas; and finally the tombs. Alphanumeric data concerning each tomb, such as its description, the osteologic remains and the goods found in the grave, are related to the graphical objects by means of a georelational model.
The first experiment was based on MapExtreme, a map server by Mapinfo based on Java classes. The prototype used a trial, limited time version with full functionality. This choice was immediately abandoned for the high cost (over 20,000 US$ at the time) and a development framework with low customisation possibility. However, it was an useful test to verify the potential of such an approach.
4. Publishing a GIS on the WWW: the application
The system we present uses the following software.
4.1. Server side
Operating system: Linux (SuSe distribution)
HTTP server: Apache with PHP3 module
GIS package: GRASS version 5.0
Apache is a well known web server, the most diffused in the world, and PHP3 is a scripting language used to generate HTML pages and to interface them to several packages as database management systems. PHP3 is included in the majority of Linux distribution.
GRASS is downloadable under the GNU licence from several sites in Europe and the USA. It is very powerful, has almost any conceivable function and now is endowed with a very nice GUI (Graphical User Interface) that substantially simplifies its use and makes it comparable with most other GIS. It also has an important feature for our aims, i.e. it works silently in the background obeying the command lines sent to him and sending the results to a "virtual" monitor, from which they can be picked and sent (after format conversion) to any other program, user's browser included. This is the mechanism we adopted to display maps, as explained in greater detail below. The format conversion is performed by a set of libraries included in the Linux distribution.
From this point of view, our solution derives from Grasslinks, the well-known University of Berkeley web Grass software. However, it has been completely re-engineered and greatly simplified, in order to be prepared for future improvements that may include the use of java applets and/or XML related archives instead of a relational database.
4.2. Client side
As already stated only a browser is necessary on the user side. The user gets HTML pages with maps included in them as GIF files, so storing the downloaded data for future use locally needs only the browser "Save as" function. The session history is also based on the "Back" and "Forward" browser buttons: this allows flawless navigation through the searches with no impact on the connection, simply using the cache memory of the browser. However, creating new maps, zooming and moving in the map window require a new computation, in order to always maintain the highest level of accuracy of the displayed map, which is re-calculated and re-drawn by the server using the original data. This is particularly important when zooming in: the resolution of the original raster or the precision of the original vector map avoids enlarging the displayed image based only on the poor screen resolution of the transmitted map.
Transmitted data is very "light" in terms of storage, so the system works quickly even with a limited bandwidth: a complicate map usually requires sending and image of no more than 30Kbyte.
4.3. Data formats
Raster maps may be stored in any of the standard raster formats, which can easily be converted to a web format (GIF, JPEG or PNG). Vector maps are archived as DXF files. Practically any GIS software has filters to export data to these formats, so data transfer from any previous application is easily performed.
4.4. The database
The database is based on PostgreSQL, a relational database management system (RDBMS) that can be linked to GRASS and interfaced by PHP3. PostgreSQL is included for free in the Linux distribution. This RDBMS is very powerful and flexible and may be customised according to the needs, introducing new functions and data types. The database will store alphanumeric data related to the case study and will also link the fuzzy database presented in this proceedings (Niccolucci et al. this volume) to its geographic information.
Connection to different kind of archives, such as free-text documents, is still under study, but there are plans to develop a prototype which links XML-encoded documents to geographic information contained in them within the year 2000.
4.5. How it works
From a functional point of view, the system is very simple. It consists of a CGI module (a short Unix shell script) that intercepts the browser request to the server and asks GRASS to prepare the desired map. After converting the result to a web-compatible graphical format (GIF, at present), it passes the image to the HTTP server that sends it back to the browser together with the HTML page. Introducing new GIS functions thus requires only adding more CGI modules, similar to the existing one. The mechanism, shown in figure 1, relies heavily on the browser-server dialogue characteristics and is therefore very robust. Moreover, it may include restriction in a very simple way, for instance to limit access during investigation only to authorised users.
In detail, the definition of the task is performed by means of some HTML forms filled by the user, choosing options with the usual mouse clicking. This creates a string of parameters that are passed on to the server and activate the map creation
The menu page accesses information which is contained in configuration files or, as far as the map list is concerned, within the GIS itself, so the display is always automatically updated to the latest version of the GIS and variations in the GIS structure require no further maintenance.
Since the user has only to choose among the menu options, no computer skill is required.
5. Conclusions
In our opinion, this application should prove the feasibility of what we stated as the inevitable future of Internet use in archaeology, namely data sharing and co-operative research. However, we conceived it also as a service, addressing two categories of archaeologists.
The first one consists of information providers, to whom we offer a simple, inexpensive and effective way to publish their information. Neighter a science-fiction laboratory nor a computer guru is needed for that, and also a small budget can afford the cost of maintaining a web site with the above described tools. The sec-
ond group is formed by the public body of archaeologists, who can thus benefit from a powerful tool for their research with a small investment of learning how to use the Internet, which nowadays they would be obliged to learn anyway.
References
BARCELÓ, J.A., SANDERS, D. and FORTE, M., (eds.), 2000. Virtual Reality in Archaeology, BAR International Series 843, Archaeopress, Oxford: 9-36.
BAMPTON, M., 1997. Archaeology and GIS: the view from outside. Archeologia e Calcolatori 8: 9-26.
BOGDANOVIC, I., VICENTE, O. and BARCELÓ, J.A., in press. A Theory of Archaeological Knowledge Building by using Internet: The Diaspora Project. Proceedings of the CAA International Conference, Dublin 1999.
CRESCIOLI, M., D'ANDREA, A., and NICCOLUCCI, F., 2000. A GIS-based analysis of the Etruscan cemetery of Pontecagnano using fuzzy logic. In Lock, G. (ed.), Beyond the Map: Archaeology and Spatial Technologies. IOS Press, Amsterdam: 157-179.
D'ANDREA, A., 1999. Il GIS nella produzione delle carte dell'impatto archeologico: l'esempio di Pontecagnano. Archeologia e Calcolatori 10: 227-237.
D'ANDREA, A. and NICCOLUCCI, F., 2000. A Web based access to GIS integrating geographical databases through the WWW. 2nd International Congress on "Science and technology for the safeguard of cultural heritage in the Mediterranean basin", 5-9 July 1999, Elsevier: Paris: 83-85.
GILLINGS, M., 1997. Not drowning but waving? – ReHumanising GIS, the Tisza floodplain revisited. In Bietti, A., Cazzella, A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1, Forlì: 69-84.
GOLDFARB, C.G. and PRESCOD, P., 1998. The XML Handbook. Upper Saddle River (NJ, USA): Prentice Hall PTR.
GUERMANDI, M.P., 1999. Dalle base dati alla rete: l'evoluzione del trattamento dei dati archeologici. Archeologia e Calcolatori 10: 89-99.
HARRIS, T.M. and LOCK, G.R., 1995. Toward an evaluation of GIS in European archaeology. The past, present and future of the theory and applications. In Lock, G. and Stančič, Z. (eds.), Archaeological and Geographical Information Systems: a European Perspective, 349-365. London: Taylor & Francis.
HERMON, S. and NICCOLUCCI, F., 2000. The impact of shared information technology on archaeological scientific research. CRIS2000 Conference, Helsinki April 2000, available at (as of 15/08/2000) ftp://ftp.cordis.lu/pub/cris2000/ docs/hermon_fulltext.pdf
LIMP, W.F., 1997. Developing methodologies in the analysis of spatially referenced data and their impacts on archaeological method and theory. In Bietti, A., Cazzella, A., Johnson,
I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì:115-125.
LOSHIN, P., 2000. The Big Book of Lightweight Directory Access Protocol RFCs. New York: Academic Press.
MOSCATTI, P., 1998. GIS applications in Italian archaeology. Archeologia e Calcolatori 9:191-236.
NICCOLUCCI, F., D'ANDREA, A. and CRESCIOLI, M., this volume. Archaeological applications of fuzzy databases.
PLOEWE, B., 1997. Gis Online. Information Retrieval, Mapping and the Internet Santa Fe, Onword Press
VOORRIPS, A., 1997. Archaeological theory and GIS, any relations? In Bietti, A., Cazzella A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì: 209-214.
WHEATLEY, D.W., 1993. Going over old ground: GIS, archaeological theory and the act of perception. In Andersen, J., Madsen, T. and Scollar, I. (eds.), Computing the past: Computer Applications and Quantitative Methods in Archaeology, CAA92: 133-138. Aarhus University Press, Aarhus.
Documents available on the World Wide Web:
ADS (Archaeology Data Service), http://ads.ahds.ac.uk/ (15/10/ 2000)
Grasslinks, http://www.regis.berkeley.edu/grasslinks/ (15/10/2000)
Web GIS and Interactive Mapping Sites, http://sunsite.berkeley. edu/GIS/intergis.html (15/10/2000)
|
<urn:uuid:5ff8163e-e9c7-4652-a92b-eb5f5be25587>
|
CC-MAIN-2020-45
|
https://proceedings.caaconference.org/files/2000/44_DAndrea_et_al_CAA_2000.pdf
|
2020-10-20T06:21:54+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-45/subset=warc/part-00150-6409130e-6e9b-44d1-90ec-9f9d0ade2504.c000.gz.parquet
| 502,773,687
| 4,891
|
eng_Latn
|
eng_Latn
| 0.90066
|
eng_Latn
| 0.994359
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
4507,
11344,
17021,
19984,
23152
] |
Web Access to an Archaeological GIS
Andrea D'Andrea
CISA – Istituto Universitario Orientale Vicoletto I, S. Maria ad Agnone 8, 80139 Napoli, Italy
e-mail: [email protected]
Franco Niccolucci
University of Florence Via Pisana 56, 50143 Firenze, Italy e-mail: [email protected]
Marco Crescioli
Unirel SRL
Via Volturno 12, 50019 Sesto Fiorentino (FI), Italy
e-mail: [email protected]
Abstract
After examining the impact of publishing data on archaeological theory and methods on the Internet, we propose a client-server solution characterised by low costs and high processing power and which is at the same time easy to use. On the client side it requires only a commercial browser with no particular computer skill of the user. On the server side it is based on the Linux operating system with some freeware packages, integrated by a module created by us. This system, developed around an archaeological case study, is accessible on the Internet and has been conceived to host additional archaeological GIS applications.
Key words: GIS, Internet, remote access
1. GIS, theoretical issues and new ways of communication
The introduction of information technology in archaeology represents an element that is changing important aspects of the archaeological theory (Limp 1997, Moscati 1998, Voorrips 1997, Crescioli et al. 2000) such as, for instance, the investigation potential of 3D landscape using viewshed and cost surface analysis. Creating a new space-time framework, virtually constructed on the computer, has had important consequences both on the methodology and epistemology, contributing to the outline of what has been called a new perceptive metaphor of space (Wheatley 1993, Gillings 1997, Bampton 1997).
The use of GIS has already oriented the research in new previously unavailable directions, determining an innovative cognitive perspective of the landscape, which traditional methods could not explore (Barceló et al. 2000); using alternative economic, social and political models for the cultural investigation of the territory contributes to the social explanation of archaeological facts more than a simple description of the geometry of observed structures (Harris and Lock 1995).
However, notwithstanding significant advances, the use of GIS is not yet uniform. This is caused by different study and research backgrounds (arising from different traditions), which sometimes cause the unawareness of the methodological value of this new tool. Probably only a new and different way of communication between computer applications may defend computerised solutions (especially the GIS system) from a tenacious and resistant academic scepticism that prefers – at least in Italy – to consider the computer role as a modern and sophisticated "household appliance", ignoring the important consequences of its use on the theoretical and methodological side.
An obstacle in this evolution is presented in the limited visibility of GIS applications, which, so far, remain a theoretical subject of conferences instead of becoming a widely diffused technology. Every team, oriented into the construction of its own specific application instead of comparing the existing solutions, starts a new project ignoring the choices, methods and systems already adopted by others. Such behaviour should not be ascribed only to the limited co-operative attitude of different teams, but also to the limited circulation of existing applications. This results in the fact that most researchers ignore the procedures and methods adopted in individual solutions. An interesting recent debate on GIS and archaeological theory has therefore been confined to an abstract level, making it impossible to compare systems, and leaving only the comparison of system abstractions.
A necessary condition for this is the availability and visibility of applications: only thus, with direct access (even remote) to different solutions will it be possible to guarantee a real comparison, and avoid a mere quarrel between different schools and tendencies.
Even if it is not effective and manageable, including paper records in archaeological publications allows one to check data and to reconstruct the scientific process of discovery. In a similar way, the use of computers will significantly contribute to the dissemination of data, and not only the final synthesis and reconstruction. However, it is inconceivable that every researcher could learn to use the software programs necessary to understand the aims and
strategies of another research project. This limitation in data availability and access underlines a reflection based on technical problems as well as on methodological questions: it is perhaps the absence of user-friendly interfaces that excludes most scholars from the debate. By limiting the participation to computer-skilled archaeologists only, GIS applications become the object of the study instead of being a tool which would ease archaeological investigations and ensure more widely spread data circulation.
Our approach, based on the integration of GIS into the WWW (World Wide Web), aims at going beyond the limits of their application to archaeology: the difficulty of accessing information without the software used to create GIS, and the need to know how to operate different programs, with learning curves that always require a substantial investment of resources.
Existing GIS-Web applications (for a list see, for instance, Web GIS and Interactive Mapping Sites, or Ploewe 1997) have, in our opinion, several drawbacks. The first drawback is the cost which prevents most archaeological budgets from using GIS-Web applications. Secondly, a large number of applications require considerable computer skills for setting up: the rare freeware ones pay little attention to unskilled use and are not completely bug-free. Perhaps this is why no archaeological application of this technology has as yet been proposed, at least as far as we know.
So far Web use for archaeological research is not satisfactory even as far as the transmission of data and scientific results is concerned. Web sites have turned from embryonic presentation places, in a synthetic form and with limited illustration features, into real archaeological portals. The latter undoubtedly have the merit of favouring the circulation of data and information, but are often unable to go beyond the "search engine" logic (Guermandi 1999, Hermon and Niccolucci 2000).
Recently the Internet has begun to have a new impact on archaeological research thanks to the availability of papers, monographs and journals. Using the Internet in order to improve communication between professionals concerns also the diffusion of reports of still unedited investigations. This is particularly true in specific conditions: unequal development in different regions is typical for Internet archaeology, therefore successful anglo-american research or organisational models such as ADS (Archaeology Data Service) cannot be exported without adapting them to the local needs, culture, tradition and "prejudices".
In these cases, the Internet is still considered only as a modern (and extremely powerful) technological channel for information transmission, often substituting the traditional scientific printed publications with its high costs, but with a similar logic. From this perspective, Internet publishing will produce an improvement in the diffusion of scientific knowledge allowing a faster and wider distribution of contributions otherwise destined to remain accessible only to the chosen few. However, users and information providers are still unaware of the potential use of the Internet not only as a communication medium, but also as a tool to share and interchange processed and raw data.
Publishing alphanumeric and geographical data on the Internet, both with open remote access (Internet) and with restricted access (Intranet) will have two important consequences on scientific cooperation (Bogdanovich et al. in press, D'Andrea and Niccolucci 2000, Hermon and Niccolucci 2000). On the one hand it will induce data re-use, since other researchers will be able to use the same data to start new investigations, possibly from different perspectives. On the other hand, the network availability of data, and not only of the results, will ease the reconstruction of the scientific discovery process, allowing everybody, at least in theory, to re-examine the results starting from material sources as represented by their records. This consideration would naturally introduce the issue of metadata, which is not the central theme of the present paper and would lead us too far from its aim. However, it is necessary to be extremely cautious in taking for granted that there is an agreed – and simple – generalised metadata structure. In our opinion, many countries have still a very low metadata awareness and their attention focuses on semantic structures, thesauri and dictionaries, created by single teams. Therefore, to avoid another metadata proposal, we chose to take the easy way out, allowing a discursive description of data and leaving the responsibility of the description level to the authors, with the only constraint that an English translation is to be supplied: an issue that receives little attention by English-speaking people, being considered as obvious, what in other countries is decidedly not.
2. Publishing a GIS on the WWW: the features
In this paper we present a preliminary step in the path outlined above. Nonetheless, it has some features that deserve attention and that we wish to stress.
* The software we use is freely available, state-of-the-art and powerful.
It often happens that the search for software to be used in an application stops at the best seller, however this often proves later on to be limited and unreliable. The little effort required to learn a new package is returned in terms of reliability, power and money saving. This is perhaps in conflict with the supporters of the "household appliance" theory, who love off-the-shelf solutions that allow the most computer unskilled archaeologist to develop a computer application by themselves: unfortunately for them, some competence is required, here as everywhere else, in order to build something effective.
* The customisation requires only a few new software codes. This ensures that the product will be reliable, since most of it relies on long tested packages, and will ease maintenance and updates. Moreover the source code is publicly available (and can be easily read and understood), and everybody can check and hopefully improve it. The source codes of base packages are also available, so that they may be extended or otherwise changed if needed, for instance for linking additional libraries or modules.
* The user needs only a commercial browser to access data, that is to interrogate the GIS.
This allows a wider spread and easier use, ensures platform compatibility and will benefit of future improvements in the technology of browsers. In our opinion, browsers will be the glue to link different applications, since they already encapsulate (and this will only improve in the future) the tools to manage different protocols of information storage and transmission, as, for instance, XML (eXtensible Markup Language), (Goldfarb and Prescod
1998) and LDAP (Lightweight Directory Access Protocol), (Loshin 2000).
* Data formats are de-facto industry standards.
This reduces the cost of data migration from other applications and guarantees future conversion to new format standards.
* It has been conceived having archaeological applications in mind.
3. Case study
Starting from a previous experiment of remote access to an archaeological GIS, our case study considers the interrogation and the processing of alphanumeric and geographic data concerning the Etruscan cemetery of Pontecagnano (D'Andrea and Niccolucci 2000). Data was acquired during the investigation of a vast funerary area discovered by the expansion of the modern centre, and more than 8,000 burials were discovered, dating between the ninth and the third century BC. This vast amount of data has been stored and managed with a GIS, which aims at supporting scientific research, at improving administrative preservation activity and at the integration with the local Master Plan (D'Andrea 1999). This system is based on Mapinfo and consists of some thematic layers: modern cartography (at different scales: 1:10,000, 1:2,000); the cadastre (1:4,000); aerial photos; the limits of explored areas; and finally the tombs. Alphanumeric data concerning each tomb, such as its description, the osteologic remains and the goods found in the grave, are related to the graphical objects by means of a georelational model.
The first experiment was based on MapExtreme, a map server by Mapinfo based on Java classes. The prototype used a trial, limited time version with full functionality. This choice was immediately abandoned for the high cost (over 20,000 US$ at the time) and a development framework with low customisation possibility. However, it was an useful test to verify the potential of such an approach.
4. Publishing a GIS on the WWW: the application
The system we present uses the following software.
4.1. Server side
Operating system: Linux (SuSe distribution)
HTTP server: Apache with PHP3 module
GIS package: GRASS version 5.0
Apache is a well known web server, the most diffused in the world, and PHP3 is a scripting language used to generate HTML pages and to interface them to several packages as database management systems. PHP3 is included in the majority of Linux distribution.
GRASS is downloadable under the GNU licence from several sites in Europe and the USA. It is very powerful, has almost any conceivable function and now is endowed with a very nice GUI (Graphical User Interface) that substantially simplifies its use and makes it comparable with most other GIS. It also has an important feature for our aims, i.e. it works silently in the background obeying the command lines sent to him and sending the results to a "virtual" monitor, from which they can be picked and sent (after format conversion) to any other program, user's browser included. This is the mechanism we adopted to display maps, as explained in greater detail below. The format conversion is performed by a set of libraries included in the Linux distribution.
From this point of view, our solution derives from Grasslinks, the well-known University of Berkeley web Grass software. However, it has been completely re-engineered and greatly simplified, in order to be prepared for future improvements that may include the use of java applets and/or XML related archives instead of a relational database.
4.2. Client side
As already stated only a browser is necessary on the user side. The user gets HTML pages with maps included in them as GIF files, so storing the downloaded data for future use locally needs only the browser "Save as" function. The session history is also based on the "Back" and "Forward" browser buttons: this allows flawless navigation through the searches with no impact on the connection, simply using the cache memory of the browser. However, creating new maps, zooming and moving in the map window require a new computation, in order to always maintain the highest level of accuracy of the displayed map, which is re-calculated and re-drawn by the server using the original data. This is particularly important when zooming in: the resolution of the original raster or the precision of the original vector map avoids enlarging the displayed image based only on the poor screen resolution of the transmitted map.
Transmitted data is very "light" in terms of storage, so the system works quickly even with a limited bandwidth: a complicate map usually requires sending and image of no more than 30Kbyte.
4.3. Data formats
Raster maps may be stored in any of the standard raster formats, which can easily be converted to a web format (GIF, JPEG or PNG). Vector maps are archived as DXF files. Practically any GIS software has filters to export data to these formats, so data transfer from any previous application is easily performed.
4.4. The database
The database is based on PostgreSQL, a relational database management system (RDBMS) that can be linked to GRASS and interfaced by PHP3. PostgreSQL is included for free in the Linux distribution. This RDBMS is very powerful and flexible and may be customised according to the needs, introducing new functions and data types. The database will store alphanumeric data related to the case study and will also link the fuzzy database presented in this proceedings (Niccolucci et al. this volume) to its geographic information.
Connection to different kind of archives, such as free-text documents, is still under study, but there are plans to develop a prototype which links XML-encoded documents to geographic information contained in them within the year 2000.
4.5. How it works
From a functional point of view, the system is very simple. It consists of a CGI module (a short Unix shell script) that intercepts the browser request to the server and asks GRASS to prepare the desired map. After converting the result to a web-compatible graphical format (GIF, at present), it passes the image to the HTTP server that sends it back to the browser together with the HTML page. Introducing new GIS functions thus requires only adding more CGI modules, similar to the existing one. The mechanism, shown in figure 1, relies heavily on the browser-server dialogue characteristics and is therefore very robust. Moreover, it may include restriction in a very simple way, for instance to limit access during investigation only to authorised users.
In detail, the definition of the task is performed by means of some HTML forms filled by the user, choosing options with the usual mouse clicking. This creates a string of parameters that are passed on to the server and activate the map creation
The menu page accesses information which is contained in configuration files or, as far as the map list is concerned, within the GIS itself, so the display is always automatically updated to the latest version of the GIS and variations in the GIS structure require no further maintenance.
Since the user has only to choose among the menu options, no computer skill is required.
5. Conclusions
In our opinion, this application should prove the feasibility of what we stated as the inevitable future of Internet use in archaeology, namely data sharing and co-operative research. However, we conceived it also as a service, addressing two categories of archaeologists.
The first one consists of information providers, to whom we offer a simple, inexpensive and effective way to publish their information. Neighter a science-fiction laboratory nor a computer guru is needed for that, and also a small budget can afford the cost of maintaining a web site with the above described tools. The sec-
ond group is formed by the public body of archaeologists, who can thus benefit from a powerful tool for their research with a small investment of learning how to use the Internet, which nowadays they would be obliged to learn anyway.
References
BARCELÓ, J.A., SANDERS, D. and FORTE, M., (eds.), 2000. Virtual Reality in Archaeology, BAR International Series 843, Archaeopress, Oxford: 9-36.
BAMPTON, M., 1997. Archaeology and GIS: the view from outside. Archeologia e Calcolatori 8: 9-26.
BOGDANOVIC, I., VICENTE, O. and BARCELÓ, J.A., in press. A Theory of Archaeological Knowledge Building by using Internet: The Diaspora Project. Proceedings of the CAA International Conference, Dublin 1999.
CRESCIOLI, M., D'ANDREA, A., and NICCOLUCCI, F., 2000. A GIS-based analysis of the Etruscan cemetery of Pontecagnano using fuzzy logic. In Lock, G. (ed.), Beyond the Map: Archaeology and Spatial Technologies. IO
|
S Press, Amsterdam: 157-179.
|
D'ANDREA, A., 1999. Il GIS nella produzione delle carte dell'impatto archeologico: l'esempio di Pontecagnano. Archeologia e Calcolatori 10: 227-237.
D'ANDREA, A. and NICCOLUCCI, F., 2000. A Web based access to GIS integrating geographical databases through the WWW. 2nd International Congress on "Science and technology for the safeguard of cultural heritage in the Mediterranean basin", 5-9 July 1999, Elsevier: Paris: 83-85.
GILLINGS, M., 1997. Not drowning but waving? – ReHumanising GIS, the Tisza floodplain revisited. In Bietti, A., Cazzella, A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1, Forlì: 69-84.
GOLDFARB, C.G. and PRESCOD, P., 1998. The XML Handbook. Upper Saddle River (NJ, USA): Prentice Hall PTR.
GUERMANDI, M.P., 1999. Dalle base dati alla rete: l'evoluzione del trattamento dei dati archeologici. Archeologia e Calcolatori 10: 89-99.
HARRIS, T.M. and LOCK, G.R., 1995. Toward an evaluation of GIS in European archaeology. The past, present and future of the theory and applications. In Lock, G. and Stančič, Z. (eds.), Archaeological and Geographical Information Systems: a European Perspective, 349-365. London: Taylor & Francis.
HERMON, S. and NICCOLUCCI, F., 2000. The impact of shared information technology on archaeological scientific research. CRIS2000 Conference, Helsinki April 2000, available at (as of 15/08/2000) ftp://ftp.cordis.lu/pub/cris2000/ docs/hermon_fulltext.pdf
LIMP, W.F., 1997. Developing methodologies in the analysis of spatially referenced data and their impacts on archaeological method and theory. In Bietti, A., Cazzella, A., Johnson,
I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì:115-125.
LOSHIN, P., 2000. The Big Book of Lightweight Directory Access Protocol RFCs. New York: Academic Press.
MOSCATTI, P., 1998. GIS applications in Italian archaeology. Archeologia e Calcolatori 9:191-236.
NICCOLUCCI, F., D'ANDREA, A. and CRESCIOLI, M., this volume. Archaeological applications of fuzzy databases.
PLOEWE, B., 1997. Gis Online. Information Retrieval, Mapping and the Internet Santa Fe, Onword Press
VOORRIPS, A., 1997. Archaeological theory and GIS, any relations? In Bietti, A., Cazzella A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì: 209-214.
WHEATLEY, D.W., 1993. Going over old ground: GIS, archaeological theory and the act of perception. In Andersen, J., Madsen, T. and Scollar, I. (eds.), Computing the past: Computer Applications and Quantitative Methods in Archaeology, CAA92: 133-138. Aarhus University Press, Aarhus.
Documents available on the World Wide Web:
ADS (Archaeology Data Service), http://ads.ahds.ac.uk/ (15/10/ 2000)
Grasslinks, http://www.regis.berkeley.edu/grasslinks/ (15/10/2000)
Web GIS and Interactive Mapping Sites, http://sunsite.berkeley. edu/GIS/intergis.html (15/10/2000)
| 19,972
|
inside_word
|
IOS
|
remove_one_sentence
|
<url>
https://proceedings.caaconference.org/files/2000/44_DAndrea_et_al_CAA_2000.pdf
</url>
<text>
Web Access to an Archaeological GIS
Andrea D'Andrea
CISA – Istituto Universitario Orientale Vicoletto I, S. Maria ad Agnone 8, 80139 Napoli, Italy
e-mail: [email protected]
Franco Niccolucci
University of Florence Via Pisana 56, 50143 Firenze, Italy e-mail: [email protected]
Marco Crescioli
Unirel SRL
Via Volturno 12, 50019 Sesto Fiorentino (FI), Italy
e-mail: [email protected]
Abstract
After examining the impact of publishing data on archaeological theory and methods on the Internet, we propose a client-server solution characterised by low costs and high processing power and which is at the same time easy to use. On the client side it requires only a commercial browser with no particular computer skill of the user. On the server side it is based on the Linux operating system with some freeware packages, integrated by a module created by us. This system, developed around an archaeological case study, is accessible on the Internet and has been conceived to host additional archaeological GIS applications.
Key words: GIS, Internet, remote access
1. GIS, theoretical issues and new ways of communication
The introduction of information technology in archaeology represents an element that is changing important aspects of the archaeological theory (Limp 1997, Moscati 1998, Voorrips 1997, Crescioli et al. 2000) such as, for instance, the investigation potential of 3D landscape using viewshed and cost surface analysis. Creating a new space-time framework, virtually constructed on the computer, has had important consequences both on the methodology and epistemology, contributing to the outline of what has been called a new perceptive metaphor of space (Wheatley 1993, Gillings 1997, Bampton 1997).
The use of GIS has already oriented the research in new previously unavailable directions, determining an innovative cognitive perspective of the landscape, which traditional methods could not explore (Barceló et al. 2000); using alternative economic, social and political models for the cultural investigation of the territory contributes to the social explanation of archaeological facts more than a simple description of the geometry of observed structures (Harris and Lock 1995).
However, notwithstanding significant advances, the use of GIS is not yet uniform. This is caused by different study and research backgrounds (arising from different traditions), which sometimes cause the unawareness of the methodological value of this new tool. Probably only a new and different way of communication between computer applications may defend computerised solutions (especially the GIS system) from a tenacious and resistant academic scepticism that prefers – at least in Italy – to consider the computer role as a modern and sophisticated "household appliance", ignoring the important consequences of its use on the theoretical and methodological side.
An obstacle in this evolution is presented in the limited visibility of GIS applications, which, so far, remain a theoretical subject of conferences instead of becoming a widely diffused technology. Every team, oriented into the construction of its own specific application instead of comparing the existing solutions, starts a new project ignoring the choices, methods and systems already adopted by others. Such behaviour should not be ascribed only to the limited co-operative attitude of different teams, but also to the limited circulation of existing applications. This results in the fact that most researchers ignore the procedures and methods adopted in individual solutions. An interesting recent debate on GIS and archaeological theory has therefore been confined to an abstract level, making it impossible to compare systems, and leaving only the comparison of system abstractions.
A necessary condition for this is the availability and visibility of applications: only thus, with direct access (even remote) to different solutions will it be possible to guarantee a real comparison, and avoid a mere quarrel between different schools and tendencies.
Even if it is not effective and manageable, including paper records in archaeological publications allows one to check data and to reconstruct the scientific process of discovery. In a similar way, the use of computers will significantly contribute to the dissemination of data, and not only the final synthesis and reconstruction. However, it is inconceivable that every researcher could learn to use the software programs necessary to understand the aims and
strategies of another research project. This limitation in data availability and access underlines a reflection based on technical problems as well as on methodological questions: it is perhaps the absence of user-friendly interfaces that excludes most scholars from the debate. By limiting the participation to computer-skilled archaeologists only, GIS applications become the object of the study instead of being a tool which would ease archaeological investigations and ensure more widely spread data circulation.
Our approach, based on the integration of GIS into the WWW (World Wide Web), aims at going beyond the limits of their application to archaeology: the difficulty of accessing information without the software used to create GIS, and the need to know how to operate different programs, with learning curves that always require a substantial investment of resources.
Existing GIS-Web applications (for a list see, for instance, Web GIS and Interactive Mapping Sites, or Ploewe 1997) have, in our opinion, several drawbacks. The first drawback is the cost which prevents most archaeological budgets from using GIS-Web applications. Secondly, a large number of applications require considerable computer skills for setting up: the rare freeware ones pay little attention to unskilled use and are not completely bug-free. Perhaps this is why no archaeological application of this technology has as yet been proposed, at least as far as we know.
So far Web use for archaeological research is not satisfactory even as far as the transmission of data and scientific results is concerned. Web sites have turned from embryonic presentation places, in a synthetic form and with limited illustration features, into real archaeological portals. The latter undoubtedly have the merit of favouring the circulation of data and information, but are often unable to go beyond the "search engine" logic (Guermandi 1999, Hermon and Niccolucci 2000).
Recently the Internet has begun to have a new impact on archaeological research thanks to the availability of papers, monographs and journals. Using the Internet in order to improve communication between professionals concerns also the diffusion of reports of still unedited investigations. This is particularly true in specific conditions: unequal development in different regions is typical for Internet archaeology, therefore successful anglo-american research or organisational models such as ADS (Archaeology Data Service) cannot be exported without adapting them to the local needs, culture, tradition and "prejudices".
In these cases, the Internet is still considered only as a modern (and extremely powerful) technological channel for information transmission, often substituting the traditional scientific printed publications with its high costs, but with a similar logic. From this perspective, Internet publishing will produce an improvement in the diffusion of scientific knowledge allowing a faster and wider distribution of contributions otherwise destined to remain accessible only to the chosen few. However, users and information providers are still unaware of the potential use of the Internet not only as a communication medium, but also as a tool to share and interchange processed and raw data.
Publishing alphanumeric and geographical data on the Internet, both with open remote access (Internet) and with restricted access (Intranet) will have two important consequences on scientific cooperation (Bogdanovich et al. in press, D'Andrea and Niccolucci 2000, Hermon and Niccolucci 2000). On the one hand it will induce data re-use, since other researchers will be able to use the same data to start new investigations, possibly from different perspectives. On the other hand, the network availability of data, and not only of the results, will ease the reconstruction of the scientific discovery process, allowing everybody, at least in theory, to re-examine the results starting from material sources as represented by their records. This consideration would naturally introduce the issue of metadata, which is not the central theme of the present paper and would lead us too far from its aim. However, it is necessary to be extremely cautious in taking for granted that there is an agreed – and simple – generalised metadata structure. In our opinion, many countries have still a very low metadata awareness and their attention focuses on semantic structures, thesauri and dictionaries, created by single teams. Therefore, to avoid another metadata proposal, we chose to take the easy way out, allowing a discursive description of data and leaving the responsibility of the description level to the authors, with the only constraint that an English translation is to be supplied: an issue that receives little attention by English-speaking people, being considered as obvious, what in other countries is decidedly not.
2. Publishing a GIS on the WWW: the features
In this paper we present a preliminary step in the path outlined above. Nonetheless, it has some features that deserve attention and that we wish to stress.
* The software we use is freely available, state-of-the-art and powerful.
It often happens that the search for software to be used in an application stops at the best seller, however this often proves later on to be limited and unreliable. The little effort required to learn a new package is returned in terms of reliability, power and money saving. This is perhaps in conflict with the supporters of the "household appliance" theory, who love off-the-shelf solutions that allow the most computer unskilled archaeologist to develop a computer application by themselves: unfortunately for them, some competence is required, here as everywhere else, in order to build something effective.
* The customisation requires only a few new software codes. This ensures that the product will be reliable, since most of it relies on long tested packages, and will ease maintenance and updates. Moreover the source code is publicly available (and can be easily read and understood), and everybody can check and hopefully improve it. The source codes of base packages are also available, so that they may be extended or otherwise changed if needed, for instance for linking additional libraries or modules.
* The user needs only a commercial browser to access data, that is to interrogate the GIS.
This allows a wider spread and easier use, ensures platform compatibility and will benefit of future improvements in the technology of browsers. In our opinion, browsers will be the glue to link different applications, since they already encapsulate (and this will only improve in the future) the tools to manage different protocols of information storage and transmission, as, for instance, XML (eXtensible Markup Language), (Goldfarb and Prescod
1998) and LDAP (Lightweight Directory Access Protocol), (Loshin 2000).
* Data formats are de-facto industry standards.
This reduces the cost of data migration from other applications and guarantees future conversion to new format standards.
* It has been conceived having archaeological applications in mind.
3. Case study
Starting from a previous experiment of remote access to an archaeological GIS, our case study considers the interrogation and the processing of alphanumeric and geographic data concerning the Etruscan cemetery of Pontecagnano (D'Andrea and Niccolucci 2000). Data was acquired during the investigation of a vast funerary area discovered by the expansion of the modern centre, and more than 8,000 burials were discovered, dating between the ninth and the third century BC. This vast amount of data has been stored and managed with a GIS, which aims at supporting scientific research, at improving administrative preservation activity and at the integration with the local Master Plan (D'Andrea 1999). This system is based on Mapinfo and consists of some thematic layers: modern cartography (at different scales: 1:10,000, 1:2,000); the cadastre (1:4,000); aerial photos; the limits of explored areas; and finally the tombs. Alphanumeric data concerning each tomb, such as its description, the osteologic remains and the goods found in the grave, are related to the graphical objects by means of a georelational model.
The first experiment was based on MapExtreme, a map server by Mapinfo based on Java classes. The prototype used a trial, limited time version with full functionality. This choice was immediately abandoned for the high cost (over 20,000 US$ at the time) and a development framework with low customisation possibility. However, it was an useful test to verify the potential of such an approach.
4. Publishing a GIS on the WWW: the application
The system we present uses the following software.
4.1. Server side
Operating system: Linux (SuSe distribution)
HTTP server: Apache with PHP3 module
GIS package: GRASS version 5.0
Apache is a well known web server, the most diffused in the world, and PHP3 is a scripting language used to generate HTML pages and to interface them to several packages as database management systems. PHP3 is included in the majority of Linux distribution.
GRASS is downloadable under the GNU licence from several sites in Europe and the USA. It is very powerful, has almost any conceivable function and now is endowed with a very nice GUI (Graphical User Interface) that substantially simplifies its use and makes it comparable with most other GIS. It also has an important feature for our aims, i.e. it works silently in the background obeying the command lines sent to him and sending the results to a "virtual" monitor, from which they can be picked and sent (after format conversion) to any other program, user's browser included. This is the mechanism we adopted to display maps, as explained in greater detail below. The format conversion is performed by a set of libraries included in the Linux distribution.
From this point of view, our solution derives from Grasslinks, the well-known University of Berkeley web Grass software. However, it has been completely re-engineered and greatly simplified, in order to be prepared for future improvements that may include the use of java applets and/or XML related archives instead of a relational database.
4.2. Client side
As already stated only a browser is necessary on the user side. The user gets HTML pages with maps included in them as GIF files, so storing the downloaded data for future use locally needs only the browser "Save as" function. The session history is also based on the "Back" and "Forward" browser buttons: this allows flawless navigation through the searches with no impact on the connection, simply using the cache memory of the browser. However, creating new maps, zooming and moving in the map window require a new computation, in order to always maintain the highest level of accuracy of the displayed map, which is re-calculated and re-drawn by the server using the original data. This is particularly important when zooming in: the resolution of the original raster or the precision of the original vector map avoids enlarging the displayed image based only on the poor screen resolution of the transmitted map.
Transmitted data is very "light" in terms of storage, so the system works quickly even with a limited bandwidth: a complicate map usually requires sending and image of no more than 30Kbyte.
4.3. Data formats
Raster maps may be stored in any of the standard raster formats, which can easily be converted to a web format (GIF, JPEG or PNG). Vector maps are archived as DXF files. Practically any GIS software has filters to export data to these formats, so data transfer from any previous application is easily performed.
4.4. The database
The database is based on PostgreSQL, a relational database management system (RDBMS) that can be linked to GRASS and interfaced by PHP3. PostgreSQL is included for free in the Linux distribution. This RDBMS is very powerful and flexible and may be customised according to the needs, introducing new functions and data types. The database will store alphanumeric data related to the case study and will also link the fuzzy database presented in this proceedings (Niccolucci et al. this volume) to its geographic information.
Connection to different kind of archives, such as free-text documents, is still under study, but there are plans to develop a prototype which links XML-encoded documents to geographic information contained in them within the year 2000.
4.5. How it works
From a functional point of view, the system is very simple. It consists of a CGI module (a short Unix shell script) that intercepts the browser request to the server and asks GRASS to prepare the desired map. After converting the result to a web-compatible graphical format (GIF, at present), it passes the image to the HTTP server that sends it back to the browser together with the HTML page. Introducing new GIS functions thus requires only adding more CGI modules, similar to the existing one. The mechanism, shown in figure 1, relies heavily on the browser-server dialogue characteristics and is therefore very robust. Moreover, it may include restriction in a very simple way, for instance to limit access during investigation only to authorised users.
In detail, the definition of the task is performed by means of some HTML forms filled by the user, choosing options with the usual mouse clicking. This creates a string of parameters that are passed on to the server and activate the map creation
The menu page accesses information which is contained in configuration files or, as far as the map list is concerned, within the GIS itself, so the display is always automatically updated to the latest version of the GIS and variations in the GIS structure require no further maintenance.
Since the user has only to choose among the menu options, no computer skill is required.
5. Conclusions
In our opinion, this application should prove the feasibility of what we stated as the inevitable future of Internet use in archaeology, namely data sharing and co-operative research. However, we conceived it also as a service, addressing two categories of archaeologists.
The first one consists of information providers, to whom we offer a simple, inexpensive and effective way to publish their information. Neighter a science-fiction laboratory nor a computer guru is needed for that, and also a small budget can afford the cost of maintaining a web site with the above described tools. The sec-
ond group is formed by the public body of archaeologists, who can thus benefit from a powerful tool for their research with a small investment of learning how to use the Internet, which nowadays they would be obliged to learn anyway.
References
BARCELÓ, J.A., SANDERS, D. and FORTE, M., (eds.), 2000. Virtual Reality in Archaeology, BAR International Series 843, Archaeopress, Oxford: 9-36.
BAMPTON, M., 1997. Archaeology and GIS: the view from outside. Archeologia e Calcolatori 8: 9-26.
BOGDANOVIC, I., VICENTE, O. and BARCELÓ, J.A., in press. A Theory of Archaeological Knowledge Building by using Internet: The Diaspora Project. Proceedings of the CAA International Conference, Dublin 1999.
CRESCIOLI, M., D'ANDREA, A., and NICCOLUCCI, F., 2000. A GIS-based analysis of the Etruscan cemetery of Pontecagnano using fuzzy logic. In Lock, G. (ed.), Beyond the Map: Archaeology and Spatial Technologies. IO<cursor_is_here>
D'ANDREA, A., 1999. Il GIS nella produzione delle carte dell'impatto archeologico: l'esempio di Pontecagnano. Archeologia e Calcolatori 10: 227-237.
D'ANDREA, A. and NICCOLUCCI, F., 2000. A Web based access to GIS integrating geographical databases through the WWW. 2nd International Congress on "Science and technology for the safeguard of cultural heritage in the Mediterranean basin", 5-9 July 1999, Elsevier: Paris: 83-85.
GILLINGS, M., 1997. Not drowning but waving? – ReHumanising GIS, the Tisza floodplain revisited. In Bietti, A., Cazzella, A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1, Forlì: 69-84.
GOLDFARB, C.G. and PRESCOD, P., 1998. The XML Handbook. Upper Saddle River (NJ, USA): Prentice Hall PTR.
GUERMANDI, M.P., 1999. Dalle base dati alla rete: l'evoluzione del trattamento dei dati archeologici. Archeologia e Calcolatori 10: 89-99.
HARRIS, T.M. and LOCK, G.R., 1995. Toward an evaluation of GIS in European archaeology. The past, present and future of the theory and applications. In Lock, G. and Stančič, Z. (eds.), Archaeological and Geographical Information Systems: a European Perspective, 349-365. London: Taylor & Francis.
HERMON, S. and NICCOLUCCI, F., 2000. The impact of shared information technology on archaeological scientific research. CRIS2000 Conference, Helsinki April 2000, available at (as of 15/08/2000) ftp://ftp.cordis.lu/pub/cris2000/ docs/hermon_fulltext.pdf
LIMP, W.F., 1997. Developing methodologies in the analysis of spatially referenced data and their impacts on archaeological method and theory. In Bietti, A., Cazzella, A., Johnson,
I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì:115-125.
LOSHIN, P., 2000. The Big Book of Lightweight Directory Access Protocol RFCs. New York: Academic Press.
MOSCATTI, P., 1998. GIS applications in Italian archaeology. Archeologia e Calcolatori 9:191-236.
NICCOLUCCI, F., D'ANDREA, A. and CRESCIOLI, M., this volume. Archaeological applications of fuzzy databases.
PLOEWE, B., 1997. Gis Online. Information Retrieval, Mapping and the Internet Santa Fe, Onword Press
VOORRIPS, A., 1997. Archaeological theory and GIS, any relations? In Bietti, A., Cazzella A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì: 209-214.
WHEATLEY, D.W., 1993. Going over old ground: GIS, archaeological theory and the act of perception. In Andersen, J., Madsen, T. and Scollar, I. (eds.), Computing the past: Computer Applications and Quantitative Methods in Archaeology, CAA92: 133-138. Aarhus University Press, Aarhus.
Documents available on the World Wide Web:
ADS (Archaeology Data Service), http://ads.ahds.ac.uk/ (15/10/ 2000)
Grasslinks, http://www.regis.berkeley.edu/grasslinks/ (15/10/2000)
Web GIS and Interactive Mapping Sites, http://sunsite.berkeley. edu/GIS/intergis.html (15/10/2000)
</text>
|
[
{
"content": "<url>\nhttps://proceedings.caaconference.org/files/2000/44_DAndrea_et_al_CAA_2000.pdf\n</url>\n<text>\nWeb Access to an Archaeological GIS\n\nAndrea D'Andrea\n\nCISA – Istituto Universitario Orientale Vicoletto I, S. Maria ad Agnone 8, 80139 Napoli, Italy\n\ne-mail: [email protected]\n\nFranco Niccolucci\n\nUniversity of Florence Via Pisana 56, 50143 Firenze, Italy e-mail: [email protected]\n\nMarco Crescioli\n\nUnirel SRL\n\nVia Volturno 12, 50019 Sesto Fiorentino (FI), Italy\n\ne-mail: [email protected]\n\nAbstract\n\nAfter examining the impact of publishing data on archaeological theory and methods on the Internet, we propose a client-server solution characterised by low costs and high processing power and which is at the same time easy to use. On the client side it requires only a commercial browser with no particular computer skill of the user. On the server side it is based on the Linux operating system with some freeware packages, integrated by a module created by us. This system, developed around an archaeological case study, is accessible on the Internet and has been conceived to host additional archaeological GIS applications.\n\nKey words: GIS, Internet, remote access\n\n1. GIS, theoretical issues and new ways of communication\n\nThe introduction of information technology in archaeology represents an element that is changing important aspects of the archaeological theory (Limp 1997, Moscati 1998, Voorrips 1997, Crescioli et al. 2000) such as, for instance, the investigation potential of 3D landscape using viewshed and cost surface analysis. Creating a new space-time framework, virtually constructed on the computer, has had important consequences both on the methodology and epistemology, contributing to the outline of what has been called a new perceptive metaphor of space (Wheatley 1993, Gillings 1997, Bampton 1997).\n\nThe use of GIS has already oriented the research in new previously unavailable directions, determining an innovative cognitive perspective of the landscape, which traditional methods could not explore (Barceló et al. 2000); using alternative economic, social and political models for the cultural investigation of the territory contributes to the social explanation of archaeological facts more than a simple description of the geometry of observed structures (Harris and Lock 1995).\n\nHowever, notwithstanding significant advances, the use of GIS is not yet uniform. This is caused by different study and research backgrounds (arising from different traditions), which sometimes cause the unawareness of the methodological value of this new tool. Probably only a new and different way of communication between computer applications may defend computerised solutions (especially the GIS system) from a tenacious and resistant academic scepticism that prefers – at least in Italy – to consider the computer role as a modern and sophisticated \"household appliance\", ignoring the important consequences of its use on the theoretical and methodological side.\n\nAn obstacle in this evolution is presented in the limited visibility of GIS applications, which, so far, remain a theoretical subject of conferences instead of becoming a widely diffused technology. Every team, oriented into the construction of its own specific application instead of comparing the existing solutions, starts a new project ignoring the choices, methods and systems already adopted by others. Such behaviour should not be ascribed only to the limited co-operative attitude of different teams, but also to the limited circulation of existing applications. This results in the fact that most researchers ignore the procedures and methods adopted in individual solutions. An interesting recent debate on GIS and archaeological theory has therefore been confined to an abstract level, making it impossible to compare systems, and leaving only the comparison of system abstractions.\n\nA necessary condition for this is the availability and visibility of applications: only thus, with direct access (even remote) to different solutions will it be possible to guarantee a real comparison, and avoid a mere quarrel between different schools and tendencies.\n\nEven if it is not effective and manageable, including paper records in archaeological publications allows one to check data and to reconstruct the scientific process of discovery. In a similar way, the use of computers will significantly contribute to the dissemination of data, and not only the final synthesis and reconstruction. However, it is inconceivable that every researcher could learn to use the software programs necessary to understand the aims and\n\nstrategies of another research project. This limitation in data availability and access underlines a reflection based on technical problems as well as on methodological questions: it is perhaps the absence of user-friendly interfaces that excludes most scholars from the debate. By limiting the participation to computer-skilled archaeologists only, GIS applications become the object of the study instead of being a tool which would ease archaeological investigations and ensure more widely spread data circulation.\n\nOur approach, based on the integration of GIS into the WWW (World Wide Web), aims at going beyond the limits of their application to archaeology: the difficulty of accessing information without the software used to create GIS, and the need to know how to operate different programs, with learning curves that always require a substantial investment of resources.\n\nExisting GIS-Web applications (for a list see, for instance, Web GIS and Interactive Mapping Sites, or Ploewe 1997) have, in our opinion, several drawbacks. The first drawback is the cost which prevents most archaeological budgets from using GIS-Web applications. Secondly, a large number of applications require considerable computer skills for setting up: the rare freeware ones pay little attention to unskilled use and are not completely bug-free. Perhaps this is why no archaeological application of this technology has as yet been proposed, at least as far as we know.\n\nSo far Web use for archaeological research is not satisfactory even as far as the transmission of data and scientific results is concerned. Web sites have turned from embryonic presentation places, in a synthetic form and with limited illustration features, into real archaeological portals. The latter undoubtedly have the merit of favouring the circulation of data and information, but are often unable to go beyond the \"search engine\" logic (Guermandi 1999, Hermon and Niccolucci 2000).\n\nRecently the Internet has begun to have a new impact on archaeological research thanks to the availability of papers, monographs and journals. Using the Internet in order to improve communication between professionals concerns also the diffusion of reports of still unedited investigations. This is particularly true in specific conditions: unequal development in different regions is typical for Internet archaeology, therefore successful anglo-american research or organisational models such as ADS (Archaeology Data Service) cannot be exported without adapting them to the local needs, culture, tradition and \"prejudices\".\n\nIn these cases, the Internet is still considered only as a modern (and extremely powerful) technological channel for information transmission, often substituting the traditional scientific printed publications with its high costs, but with a similar logic. From this perspective, Internet publishing will produce an improvement in the diffusion of scientific knowledge allowing a faster and wider distribution of contributions otherwise destined to remain accessible only to the chosen few. However, users and information providers are still unaware of the potential use of the Internet not only as a communication medium, but also as a tool to share and interchange processed and raw data.\n\nPublishing alphanumeric and geographical data on the Internet, both with open remote access (Internet) and with restricted access (Intranet) will have two important consequences on scientific cooperation (Bogdanovich et al. in press, D'Andrea and Niccolucci 2000, Hermon and Niccolucci 2000). On the one hand it will induce data re-use, since other researchers will be able to use the same data to start new investigations, possibly from different perspectives. On the other hand, the network availability of data, and not only of the results, will ease the reconstruction of the scientific discovery process, allowing everybody, at least in theory, to re-examine the results starting from material sources as represented by their records. This consideration would naturally introduce the issue of metadata, which is not the central theme of the present paper and would lead us too far from its aim. However, it is necessary to be extremely cautious in taking for granted that there is an agreed – and simple – generalised metadata structure. In our opinion, many countries have still a very low metadata awareness and their attention focuses on semantic structures, thesauri and dictionaries, created by single teams. Therefore, to avoid another metadata proposal, we chose to take the easy way out, allowing a discursive description of data and leaving the responsibility of the description level to the authors, with the only constraint that an English translation is to be supplied: an issue that receives little attention by English-speaking people, being considered as obvious, what in other countries is decidedly not.\n\n2. Publishing a GIS on the WWW: the features\n\nIn this paper we present a preliminary step in the path outlined above. Nonetheless, it has some features that deserve attention and that we wish to stress.\n\n* The software we use is freely available, state-of-the-art and powerful.\n\nIt often happens that the search for software to be used in an application stops at the best seller, however this often proves later on to be limited and unreliable. The little effort required to learn a new package is returned in terms of reliability, power and money saving. This is perhaps in conflict with the supporters of the \"household appliance\" theory, who love off-the-shelf solutions that allow the most computer unskilled archaeologist to develop a computer application by themselves: unfortunately for them, some competence is required, here as everywhere else, in order to build something effective.\n\n* The customisation requires only a few new software codes. This ensures that the product will be reliable, since most of it relies on long tested packages, and will ease maintenance and updates. Moreover the source code is publicly available (and can be easily read and understood), and everybody can check and hopefully improve it. The source codes of base packages are also available, so that they may be extended or otherwise changed if needed, for instance for linking additional libraries or modules.\n* The user needs only a commercial browser to access data, that is to interrogate the GIS.\n\nThis allows a wider spread and easier use, ensures platform compatibility and will benefit of future improvements in the technology of browsers. In our opinion, browsers will be the glue to link different applications, since they already encapsulate (and this will only improve in the future) the tools to manage different protocols of information storage and transmission, as, for instance, XML (eXtensible Markup Language), (Goldfarb and Prescod\n\n1998) and LDAP (Lightweight Directory Access Protocol), (Loshin 2000).\n\n* Data formats are de-facto industry standards.\n\nThis reduces the cost of data migration from other applications and guarantees future conversion to new format standards.\n\n* It has been conceived having archaeological applications in mind.\n\n3. Case study\n\nStarting from a previous experiment of remote access to an archaeological GIS, our case study considers the interrogation and the processing of alphanumeric and geographic data concerning the Etruscan cemetery of Pontecagnano (D'Andrea and Niccolucci 2000). Data was acquired during the investigation of a vast funerary area discovered by the expansion of the modern centre, and more than 8,000 burials were discovered, dating between the ninth and the third century BC. This vast amount of data has been stored and managed with a GIS, which aims at supporting scientific research, at improving administrative preservation activity and at the integration with the local Master Plan (D'Andrea 1999). This system is based on Mapinfo and consists of some thematic layers: modern cartography (at different scales: 1:10,000, 1:2,000); the cadastre (1:4,000); aerial photos; the limits of explored areas; and finally the tombs. Alphanumeric data concerning each tomb, such as its description, the osteologic remains and the goods found in the grave, are related to the graphical objects by means of a georelational model.\n\nThe first experiment was based on MapExtreme, a map server by Mapinfo based on Java classes. The prototype used a trial, limited time version with full functionality. This choice was immediately abandoned for the high cost (over 20,000 US$ at the time) and a development framework with low customisation possibility. However, it was an useful test to verify the potential of such an approach.\n\n4. Publishing a GIS on the WWW: the application\n\nThe system we present uses the following software.\n\n4.1. Server side\n\nOperating system: Linux (SuSe distribution)\n\nHTTP server: Apache with PHP3 module\n\nGIS package: GRASS version 5.0\n\nApache is a well known web server, the most diffused in the world, and PHP3 is a scripting language used to generate HTML pages and to interface them to several packages as database management systems. PHP3 is included in the majority of Linux distribution.\n\nGRASS is downloadable under the GNU licence from several sites in Europe and the USA. It is very powerful, has almost any conceivable function and now is endowed with a very nice GUI (Graphical User Interface) that substantially simplifies its use and makes it comparable with most other GIS. It also has an important feature for our aims, i.e. it works silently in the background obeying the command lines sent to him and sending the results to a \"virtual\" monitor, from which they can be picked and sent (after format conversion) to any other program, user's browser included. This is the mechanism we adopted to display maps, as explained in greater detail below. The format conversion is performed by a set of libraries included in the Linux distribution.\n\nFrom this point of view, our solution derives from Grasslinks, the well-known University of Berkeley web Grass software. However, it has been completely re-engineered and greatly simplified, in order to be prepared for future improvements that may include the use of java applets and/or XML related archives instead of a relational database.\n\n4.2. Client side\n\nAs already stated only a browser is necessary on the user side. The user gets HTML pages with maps included in them as GIF files, so storing the downloaded data for future use locally needs only the browser \"Save as\" function. The session history is also based on the \"Back\" and \"Forward\" browser buttons: this allows flawless navigation through the searches with no impact on the connection, simply using the cache memory of the browser. However, creating new maps, zooming and moving in the map window require a new computation, in order to always maintain the highest level of accuracy of the displayed map, which is re-calculated and re-drawn by the server using the original data. This is particularly important when zooming in: the resolution of the original raster or the precision of the original vector map avoids enlarging the displayed image based only on the poor screen resolution of the transmitted map.\n\nTransmitted data is very \"light\" in terms of storage, so the system works quickly even with a limited bandwidth: a complicate map usually requires sending and image of no more than 30Kbyte.\n\n4.3. Data formats\n\nRaster maps may be stored in any of the standard raster formats, which can easily be converted to a web format (GIF, JPEG or PNG). Vector maps are archived as DXF files. Practically any GIS software has filters to export data to these formats, so data transfer from any previous application is easily performed.\n\n4.4. The database\n\nThe database is based on PostgreSQL, a relational database management system (RDBMS) that can be linked to GRASS and interfaced by PHP3. PostgreSQL is included for free in the Linux distribution. This RDBMS is very powerful and flexible and may be customised according to the needs, introducing new functions and data types. The database will store alphanumeric data related to the case study and will also link the fuzzy database presented in this proceedings (Niccolucci et al. this volume) to its geographic information.\n\nConnection to different kind of archives, such as free-text documents, is still under study, but there are plans to develop a prototype which links XML-encoded documents to geographic information contained in them within the year 2000.\n\n4.5. How it works\n\nFrom a functional point of view, the system is very simple. It consists of a CGI module (a short Unix shell script) that intercepts the browser request to the server and asks GRASS to prepare the desired map. After converting the result to a web-compatible graphical format (GIF, at present), it passes the image to the HTTP server that sends it back to the browser together with the HTML page. Introducing new GIS functions thus requires only adding more CGI modules, similar to the existing one. The mechanism, shown in figure 1, relies heavily on the browser-server dialogue characteristics and is therefore very robust. Moreover, it may include restriction in a very simple way, for instance to limit access during investigation only to authorised users.\n\nIn detail, the definition of the task is performed by means of some HTML forms filled by the user, choosing options with the usual mouse clicking. This creates a string of parameters that are passed on to the server and activate the map creation\n\nThe menu page accesses information which is contained in configuration files or, as far as the map list is concerned, within the GIS itself, so the display is always automatically updated to the latest version of the GIS and variations in the GIS structure require no further maintenance.\n\nSince the user has only to choose among the menu options, no computer skill is required.\n\n5. Conclusions\n\nIn our opinion, this application should prove the feasibility of what we stated as the inevitable future of Internet use in archaeology, namely data sharing and co-operative research. However, we conceived it also as a service, addressing two categories of archaeologists.\n\nThe first one consists of information providers, to whom we offer a simple, inexpensive and effective way to publish their information. Neighter a science-fiction laboratory nor a computer guru is needed for that, and also a small budget can afford the cost of maintaining a web site with the above described tools. The sec-\n\nond group is formed by the public body of archaeologists, who can thus benefit from a powerful tool for their research with a small investment of learning how to use the Internet, which nowadays they would be obliged to learn anyway.\n\nReferences\n\nBARCELÓ, J.A., SANDERS, D. and FORTE, M., (eds.), 2000. Virtual Reality in Archaeology, BAR International Series 843, Archaeopress, Oxford: 9-36.\n\nBAMPTON, M., 1997. Archaeology and GIS: the view from outside. Archeologia e Calcolatori 8: 9-26.\n\nBOGDANOVIC, I., VICENTE, O. and BARCELÓ, J.A., in press. A Theory of Archaeological Knowledge Building by using Internet: The Diaspora Project. Proceedings of the CAA International Conference, Dublin 1999.\n\nCRESCIOLI, M., D'ANDREA, A., and NICCOLUCCI, F., 2000. A GIS-based analysis of the Etruscan cemetery of Pontecagnano using fuzzy logic. In Lock, G. (ed.), Beyond the Map: Archaeology and Spatial Technologies. IO<cursor_is_here>\n\nD'ANDREA, A., 1999. Il GIS nella produzione delle carte dell'impatto archeologico: l'esempio di Pontecagnano. Archeologia e Calcolatori 10: 227-237.\nD'ANDREA, A. and NICCOLUCCI, F., 2000. A Web based access to GIS integrating geographical databases through the WWW. 2nd International Congress on \"Science and technology for the safeguard of cultural heritage in the Mediterranean basin\", 5-9 July 1999, Elsevier: Paris: 83-85.\nGILLINGS, M., 1997. Not drowning but waving? – ReHumanising GIS, the Tisza floodplain revisited. In Bietti, A., Cazzella, A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1, Forlì: 69-84.\nGOLDFARB, C.G. and PRESCOD, P., 1998. The XML Handbook. Upper Saddle River (NJ, USA): Prentice Hall PTR.\nGUERMANDI, M.P., 1999. Dalle base dati alla rete: l'evoluzione del trattamento dei dati archeologici. Archeologia e Calcolatori 10: 89-99.\nHARRIS, T.M. and LOCK, G.R., 1995. Toward an evaluation of GIS in European archaeology. The past, present and future of the theory and applications. In Lock, G. and Stančič, Z. (eds.), Archaeological and Geographical Information Systems: a European Perspective, 349-365. London: Taylor & Francis.\nHERMON, S. and NICCOLUCCI, F., 2000. The impact of shared information technology on archaeological scientific research. CRIS2000 Conference, Helsinki April 2000, available at (as of 15/08/2000) ftp://ftp.cordis.lu/pub/cris2000/ docs/hermon_fulltext.pdf\nLIMP, W.F., 1997. Developing methodologies in the analysis of spatially referenced data and their impacts on archaeological method and theory. In Bietti, A., Cazzella, A., Johnson,\nI. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì:115-125.\nLOSHIN, P., 2000. The Big Book of Lightweight Directory Access Protocol RFCs. New York: Academic Press.\nMOSCATTI, P., 1998. GIS applications in Italian archaeology. Archeologia e Calcolatori 9:191-236.\nNICCOLUCCI, F., D'ANDREA, A. and CRESCIOLI, M., this volume. Archaeological applications of fuzzy databases.\nPLOEWE, B., 1997. Gis Online. Information Retrieval, Mapping and the Internet Santa Fe, Onword Press\nVOORRIPS, A., 1997. Archaeological theory and GIS, any relations? In Bietti, A., Cazzella A., Johnson, I. and Voorrips, A. (eds.), Theoretical and Methodological Problems, Proceedings of the XIIIth International Congress of Prehistoric and Protohistoric Sciences, vol. 1. Forlì: 209-214.\nWHEATLEY, D.W., 1993. Going over old ground: GIS, archaeological theory and the act of perception. In Andersen, J., Madsen, T. and Scollar, I. (eds.), Computing the past: Computer Applications and Quantitative Methods in Archaeology, CAA92: 133-138. Aarhus University Press, Aarhus.\n\nDocuments available on the World Wide Web:\n\nADS (Archaeology Data Service), http://ads.ahds.ac.uk/ (15/10/ 2000)\nGrasslinks, http://www.regis.berkeley.edu/grasslinks/ (15/10/2000)\nWeb GIS and Interactive Mapping Sites, http://sunsite.berkeley. edu/GIS/intergis.html (15/10/2000)\n</text>\n",
"role": "user"
},
{
"content": "S Press, Amsterdam: 157-179.",
"role": "assistant"
}
] |
RESEARCH ARTICLE
Maternal hepatitis B surface antigen carrier status increased the incidence of gestational diabetes mellitus
Songxu Peng, Zhihua Wan, Xiaofang Lin, Xiu Li and Yukai Du *
Abstract
Background: The relationship between chronic hepatitis B virus (HBV) infection with gestational diabetes mellitus (GDM) remains unclear. This study aimed to identify the association between maternal HBsAg-positive status and GDM.
Methods: A retrospective cohort study was performed on the pregnant women who delivered from June 2012 to May 2016 at Wuhan Medical Care Center for Women and Children, Wuhan, China. We compared the incidence of GDM between HBsAg-positive pregnant women and HBsAg-negative controls. A multivariate regression model was used to measure the independent association between maternal HBsAg carrier and the risk of developing GDM.
Results: In total, 964 HBsAg-positive pregnant women and 964 HBsAg-negative women were included into the study. We observed maternal HBsAg carrier (OR 1.47, 95% CI 1.06–2.03), age (OR 1.05, 95% CI 1.00–1.10) and family history of diabetes (OR 3.97, 95% CI 2.05–7.67) had an independent risk for GDM in multivariable logistical regression model. However, no significant association was found between HBeAg carrier status, other HBV markers or viral load in pregnancy and the incidence of GDM.
Conclusions: Our results indicated that maternal HBsAg carriage is an independent risk factor for GDM, but viral activity indicated by HBeAg status and viral load is not the main reason for this phenomenon. Further studies are warranted to clarify the possible mechanisms behind such association of HBV infection and the additional risk of GDM.
Keywords: Gestational diabetes mellitus, Hepatitis B virus infection, Hepatitis B surface antigen, Viral load
Background
Hepatitis B virus (HBV) infection is a major public health problem worldwide [1, 2]. With approximately 2 billion HBV-infected individuals around the world, more than 350 million persons have chronic HBV infection [3]. The global prevalence of HBV infection varies widely [4, 5]. However, the majority of hepatitis B infection patients live in Asia and Africa [6]. China is a highly endemic region, almost one third of chronic HBV carriers can be found there. The third national serological survey in 2006 shows that the hepatitis B surface antigen
(HBsAg) positivity rate of Chinese aged 1–59 years is 7.18% [7]. Consequently, up to 10% of pregnant women are identified as chronic hepatitis B carrier in the screening for HBsAg status during the antenatal checkup, resulting in persistent HBV transmission [8, 9].
* Correspondence: [email protected]
Department of Maternal and Child Health, School of Public Health, Tongji
Medical College, Huazhong University of Science and Technology, 13th
Hangkong Road, Wuhan 430030, Hubei, China
At present, a few studies have reported that HBV infection indicated by positive HBsAg status had a direct impact on pregnancy outcomes, such as threatened preterm labor, preterm birth, low birthweight, macrosomia, antepartum hemorrhage, pregnancy-induced hypertension [10–14]. However, the underlying mechanisms behind these associations have not yet been elucidated. As for the relationship between maternal HBsAg carrier and gestational diabetes mellitus (GDM), it remains controversial. Several studies have reported that chronic
Open Access
hepatitis B infection increased the risk of developing GDM [11, 15–17], and this result was confirmed by a latest study conducted by Lao et al. who performed a case-control study with 214 cases and 204 controls [18]. However, a meta-analysis by Kong et al. demonstrated that chronic hepatitis B surface antigenemia did not exert an additional risk for GDM in general population except Iranian [19]. Additionally, there are few studies that examined the effects of HBeAg status and maternal viral load in pregnancy on the development of GDM. In 2010, the new diagnostic criterion of GDM had been proposed due to associations between maternal hyperglycemia and adverse pregnancy outcomes [20]. Considering the high prevalence of chronic hepatitis B infection among pregnant women in China, it is extremely crucial to clarify whether or not HBsAg carrier status is associated with the risk of GDM.
Based on above, the objective of our study is not only to identify the correlation between HBsAg carrier and GDM, but also explore whether HBeAg status and maternal viral load in the third trimester are associated with an increased risk of GDM among HBsAg-positive pregnant women.
Methods
Study population
In the present study, the two groups of pregnant women including HBsAg-positive and HBsAg-negative mothers were recruited. HBsAg-positive pregnant women were from a pre-conception cohort in Wuhan which was designed to study the risk factors of HBV maternal-fetal transmission. HBsAg-positive pregnant women older than 20 who delivered from June 2012 to May 2016 were invited to participate in the cohort at Wuhan Medical Care Center for Women and Children, Wuhan, China. All HBsAg-positive women with singleton pregnancy and the complete results of oral glucose tolerance test (OGTT), who did not have current and previous medical complications (including HCV, HIV and Treponema pallidum infection), were assigned to HBsAg-positive group. A total of 964 HBsAg-positive women were eligible for the study (Fig. 1 ). Using the same criteria mentioned, the subjects of HBsAg-negative group were randomly chosen from electronic databases during the study period.
The present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. The written informed consent of all subjects had been obtained before participating the study.
Data collection and samples collection
The clinical records of the two groups were retrieved for data extraction. The demographic information, including age, height, prenatal weight, parity, history of abortion, ABO blood type, family history of diabetes, and OGTT results were obtained from clinical records. We adopted the IADPSG criterion to diagnose GDM, that is, the pregnant women were diagnosed with GDM during 24th -28th weeks of gestation when their OGTT results exceeded the following glucose values: fasting plasma glucose level > 5.1 mmol/L and/or 1-h plasma glucose level > 10 mmol/L and/or 2-h plasma glucose level > 8.5 mmol/L.
For all HBsAg-positive women, a venous blood sample had been collected in the third trimester once informed consent had been obtained. Blood samples were used to examine anti-HBsAg, HBeAg, anti-HBeAg, anti-HBcAg status and maternal viral load. Serum HBV markers were tested by enzyme-linked immune sorbent assay (Kehua Biotechnology, Shanghai, China). The hepatitis B viral load was quantified by fluorescence quantitative polymerase chain reaction (FQ-PCR) (Da'an Gene Co. Ltd., Sun Yat-Sen University, Guangdong, China). All procedures were performed strictly following the manufacturer's instructions.
Statistical analysis
In univariate analyses, continuous variables were analyzed by Student's t-tests and categorical data were compared by chi-square tests. Stratified analyses were used to identify confounders and effect modifiers, and the Breslow-Day test was used to assess the homogeneity of the odds ratios (ORs) for HBsAg carriage across each stratum of risk factors. Odds ratios and 95% confidence intervals (CIs) were estimated using multivariable logistical regression to measure the association between maternal HBsAg status and GDM. The variables were chosen according to their statistical and clinical relevance. The stepwise (Wald) method was used in the multivariate logistic regression analysis. Statistical significance was assessed at the 5% level (two-tail test). All analyses were performed using SPSS software version 18.0 (SPSS, Chicago, IL, USA).
Results
A total of 964 HBsAg-positive women and 964 HBsAg-negative women, according with the inclusion criteria, were enrolled during June 2012 to May 2016. In this study, the highest proportion of missing data is 4.8% for prenatal BMI, and the missing proportion of age, prenatal weight, height, parity, ABO type, history of abortion and family history of diabetes were 0.6, 4.2, 2.8, 0.5, 1.5, 2.4 and 3.7%, respectively. Because the missing rates are small, we did not perform an additional process for the missing data. The maternal characteristics of the study population and the incidence of GDM are presented in Table 1. Compared with HBsAg-negative mothers, HBsAg-positive women had a significantly higher age, proportion of multiparas and history of abortion. But there was no significant difference in prenatal weight, height, or calculated body mass index (BMI) between mothers in HBsAg-positive group and those in HBsAg-negative group. Neither the distribution of ABO blood types nor family history of diabetes showed statistical difference in the two groups.
The present study found that HBsAg carriers were more likely to suffer from GDM as compared to
Table 1 Maternal characteristics and incidence of GDM with respect to maternal HBsAg status
Abbreviation: BMI Body mass index, GDM Gestational diabetes mellitus a Chi-square test for categorical variables
HBsAg-negative women (16.5% vs 10.5%, P < 0.001, Table 1). To determine the interactions between each of known factors affecting the development of GDM and maternal HBsAg status, stratified analyses by HBsAg status were performed according to each of these factors, i.e. age ≥ or < 35 years, nullipara or multipara, the presence or absence of family history of diabetes, with or without history of abortion. As shown in Table 2, positive HBsAg status was associated with an increased risk of GDM in women aged < 35 years, having no family history of diabetes, with an odds ratio of 1.60(95% CI 1.19– 2.15) and 1.73(95% CI 1.27–2.23), respectively. Regardless of the parity and the status of history of abortion, positive HBsAg status exerted an additional risk for GDM and the differences reached statistical significance. However, when we used the Breslow-Day test to assess the homogeneity of the ORs for HBsAg carriage across each stratum of risk factors, no significant difference was seen in these stratification factors.
In univariate analyses, age and HBsAg carriage were associated with the increased incidence of GDM, with an OR value of 1.08(95% CI 1.04–1.11) and 1.67(95% CI 1.27–2.23), respectively. Family history of diabetes (OR 4.60, 95% CI 2.60–8.14) and history of abortion (OR 1.38, 95% CI 1.05–1.81) increased the incidence of GDM. But there was no significant difference in terms of parity and prenatal BMI between the mothers with GDM and those without. To determine whether HBsAg carriage was an independent risk factor for GDM, multivariable logistic regression analysis was performed,
Table 2 Incidence of GDM with respect to HBsAg status in pregnant women, stratified by risk factors
a
Abbreviation GDM
OR
CI
aP-values for interaction effect between each risk factor and HBsAg status on GDM:
Gestational diabetes mellitus, Odds ratio,
Confidence interval adjusting for the confounding effects of other factors that were also found to be significantly different between the two groups (age, parity, history of abortion) or considered as classical risk factors of GDM in previous study (prenatal BMI, family history of diabetes). Age, prenatal BMI, parity as continuous variables and history of abortion, family history of diabetes as categorical variables were included in the multivariable logistic regression analysis. After adjustment for these associated covariates, a significant association of maternal HBsAg carriage with the increased risk of GDM was observed (OR 1.47, 95% CI 1.06 – 2.03) (Table 3 ). Simultaneously, significant associations between age as well as family history of diabetes and the increased risk of GDM were detected. However, there was no significant association between the risk for GDM and other factors including prenatal BMI, parity, history of abortion.
HBeAg, HBcAg, did not show any significant association with the incidence of GDM. Among HBsAg-positive pregnant women, the distribution of viral load in third trimester were not significantly different in women with and without GDM.
Discussion
In the multivariable logistic regression analysis, the association between HBsAg carriage and the risk of GDM remained significant after adjustment for other covariates. Further analysis was performed to explore whether other HBV markers and maternal viral load were associated with the risk of GDM among HBsAg-positive pregnant women. As a result, no significant relationship was observed between HBeAg status and incidence of GDM among HBsAg carriers (data shown in Additional file 1: Tables S1). Similarly, the various antibodies to HBsAg,
Our study found an independent effect of maternal HBsAg carriage on GDM, and noted pregnant women with HBV infection had an increased risk of GDM, confirming the findings of a previous study [15]. When maternal age was taken into account, maternal HBV infection increased the risk of GDM in the mothers younger than 35 years of age, similar to that exerted on pregnant women without family history of diabetes. When parity or history of abortion was examined, HBsAg carriage increased the risk of GDM in nulliparous or multiparous women, and similar results could be obtained in the women with or without history of abortion. Despite of no significant difference in Breslow-Day test, it can be speculated that there were interactions between maternal HBsAg carriage and other maternal factors, which resulted in various risk for GDM in pregnant women. The results of this study showed that the risk of GDM heightened with the increase of age. Additionally, our study also indicated that the incidence of GDM
Table 3 Univariate and multivariate logistic regression analyses of factors related to GDM
Abbreviation: OROdds ratio,CIConfidence interval
increased in the pregnancy women with higher age or family history of diabetes, implying that increasing age and genetic factor were the important contributors to the development of GDM [21].
In the few published studies regarding the effects of HBV infection on pregnancy outcomes, some reported a positive association between HBV infection and the risk of GDM [11, 15–18]. Among them, several retrospective studies done by Lao et al. suggested HBsAg carrier was significantly associated with gestational diabetes mellitus [15, 16]. Our present study demonstrated HBsAg-positive pregnant women were more likely to suffer from GDM (OR 1.43, 95%CI 1.01–2.02) compared with HBsAgnegative mothers. However, this result was contradicted by many others, which supported the hypothesis that women with HBV infection did not have extra risk for GDM [12–14, 22]. This inconsistent result could be related to ethnic difference. Because the prevalence of HBV infection and genetic background differ in various ethnic groups [23, 24]. This may affect the actual association of HBsAg carriage and the risk of GDM. Additionally, the present study adopted the IADPSG criterion, and then more pregnant women were diagnosed with GDM.
Although some researchers noticed the correlation between HBV infection and GDM, and attempted to clarify the intrinsic links, the potential mechanism for this association is unclear. In addition, as shown in our study, different degree of viral activity indicated by HBeAg status and viral load in pregnancy could not explain the higher risk of GDM in HBV-infected women. Several previous reviews and reports established that the pathogenesis of GDM was related to insulin resistance associated with the chronic inflammatory state [25, 26]. In addition to the effects of the pregnancy itself, the factors involved in the inflammatory state were elevated levels of pro-inflammatory cytokines such as IL-2, IL-6, IL-10, and tumor necrosis factor-alpha (TNF-a), which can be accounted for by chronic HBV infection [27]. Second, some patients with HBV infection developed into liver fibrosis or cirrhosis, which has been identified as a cause of insulin resistance and glucose intolerance [28]. Third possible mechanism is the increased iron status caused by chronic HBV infection facilitates the development of GDM [16]. The main reason is that excess iron can affect insulin synthesis and secretion, facilitate oxidation of lipids and liver mediated insulin resistance [29, 30].
The strengths of the present study include the large number of subjects and the use of multivariable logistic regression analysis for adjusting potential confounding variables. Additionally, this study comprehensively explore the associations between HBV markers, viral load in pregnancy and GDM despite no statistically significant difference presented. However, the limitations of our study is also unavoidable. The first and most obvious limitation is that our study is a retrospective study that proved a positive correlation between HBsAg carrierage and GDM. But its capability of etiological inferences is limited. Therefore a large-scale prospective study on this causal relationship is needed. Second, we have only the data of prenatal maternal weight, and the pre-gravid maternal weight was missing in this study. Thereby we could not calculate the BMI before conception despite of its impact on the development of GDM. This might affect the authenticity of our results to a certain extent.
Conclusion
HBV infection can lightly increase the incidence of GDM and viral activity may not be the main reason generating this phenomenon. In view of unknown pathophysiologic mechanism of GDM and high prevalence of HBV infection in certain regions, further research in this area should obviously be needed to explain our present epidemiological observation.
Additional file
Additional file 1: Table S1. The association between HBV markers, maternal viral load and GDM in HBsAg-positive pregnant women. (DOCX 19 kb)
Abbreviations
BMI: Body mass index; CI: Confidence interval; GDM: Gestational diabetes mellitus; HBeAg: Hepatitis B envelope antigen; HBsAg: Hepatitis B surface antigen; HBV: Hepatitis B virus; HCV: Hepatitis C virus; HIV: Human immunodeficiency virus; IADPSG: International Association of Diabetes and Pregnancy Study Groups; OGTT: Oral glucose tolerance test; OR: Odds ratio; TP: Treponema pallidum
Acknowledgements
We are particularly grateful to subjects of this study. We also acknowledge the staff in Wuhan Women and Children Medical and Healthcare Center, Wuhan, China for their assistance.
Funding
This work was funded by the National Natural Science Foundation of China, grant number (NSFC-81172678) and (NSFC-81573166). The funding body plays no role in the design of the study and collection, analysis, and interpretation of data and in writing the manuscript.
Availability of data and materials
The datasets used and/or analysed during the current study are available from the corresponding author Yukai Du on reasonable request.
Authors' contributions
All authors contributed significantly to this work. SP collected the data, did the statistical analysis, and drafted the initial manuscript. ZW and XL helped design the study, collected the data. XL assisted with data collection, revised the manuscript. YD designed the study, directed the statistical analysis, and reviewed the manuscript. All the authors listed have seen and approved the contents of the submitted manuscript. All the authors have agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Ethics approval and consent to participate
The present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. Written
informed consent of all subjects had been obtained before participating the study.
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Received: 8 March 2018 Accepted: 28 January 2019
References
1. Schweitzer A, Horn J, Mikolajczyk RT, Krause G, Ott JJ. Estimations of worldwide prevalence of chronic hepatitis B virus infection: a systematic review of data published between 1965 and 2013. Lancet. 2015;386(10003): 1546–55.
2. Chen DS. Hepatitis B vaccination: the key towards elimination and eradication of hepatitis B. J Hepatol. 2009;50(4):805–16.
3. Sarri G, Westby M, Bermingham S, Hill-Cawthorne G, Thomas H, Guideline Development Group. Diagnosis and management of chronic hepatitis B in children, young people, and adults: summary of NICE guidance. BMJ. 2013; 346:f3893.
4. Liu J, Zhang S, Wang Q, Shen H, Zhang M, Zhang Y, Yan D, Liu M. Seroepidemiology of hepatitis B virus infection in 2 million men aged 21– 49 years in rural China: a population-based, cross-sectional study. Lancet Infect Dis. 2016;16(1):80–6.
5. Te HS, Jensen DM. Epidemiology of hepatitis B and C viruses: a global overview. Clin Liver Dis. 2010;14(1):1–21.
6. Ott JJ, Stevens GA, Groeger J, Wiersma ST. Global epidemiology of hepatitis B virus infection: new estimates of age-specific HBsAg seroprevalence and endemicity. Vaccine. 2012;30(12):2212–9.
7. Shen L, Wang F, Wang F, Cui F, Zhang S, Zheng H, Zhang Y, Liang X, Bi S. Efficacy of yeast-derived recombinant hepatitis B vaccine after being used for 12 years in highly endemic areas in China. Vaccine. 2012;30(47):6623–7.
8. Deng L, Li X, Shi Z, Jiang P, Chen D, Ma L. Maternal and perinatal outcome in cases of fulminant viral hepatitis in late pregnancy. Int J Gynaecol Obstet. 2012;119(2):145–8.
9. Salemi JL, Whiteman VE, August EM, Chandler K, Mbah AK, Salihu HM. Maternal hepatitis B and hepatitis C infection and neonatal neurological outcomes. J Viral Hepat. 2014;21(11):e144–53.
10. Connell LE, Salihu HM, Salemi JL, August EM, Weldeselasse H, Mbah AK. Maternal hepatitis B and hepatitis C carrier status and perinatal outcomes. Liver Int. 2011;31(8):1163–70.
11. Tse KY, Ho LF, Lao T. The impact of maternal HBsAg carrier status on pregnancy outcomes: a case-control study. J Hepatol. 2005;43(5):771–5.
12. Reddick KL, Jhaveri R, Gandhi M, James AH, Swamy GK. Pregnancy outcomes associated with viral hepatitis. J Viral Hepat. 2011;18(7):e394–8.
13. Lao TT, Sahota DS, Suen SS, Law LW, Leung TY. Maternal HBsAg status and
–
infant size--a Faustian bargain? J Viral Hepat. 2012;19(7):519 24.
14. Lao TT, Sahota DS, Cheng YK, Law LW, Leung TY. Maternal hepatitis B surface antigen status and incidence of pre-eclampsia. J Viral Hepat. 2013; 20(5):343–9.
15. Lao TT, Chan BC, Leung WC, Ho LF, Tse KY. Maternal hepatitis B infection and gestational diabetes mellitus. J Hepatol. 2007;47(1):46–50.
16. Lao TT, Tse KY, Chan LY, Tam KF, Ho LF. HBsAg carrier status and the association between gestational diabetes with increased serum ferritin concentration in Chinese women. Diabetes Care. 2003;26(11):3011–6.
17. Sirilert S, Traisrisilp K, Sirivatanapa P, Tongsong T. Pregnancy outcomes among chronic carriers of hepatitis B virus. Int J Gynaecol Obstet. 2014; 126(2):106–10.
18. Lao TT, Chung MK, Cheung TK, Law LW. Antenatal hepatitis B and increased risk of gestational diabetes mellitus - implications for obstetric care. J Inf Secur. 2016;72(5):625–6.
19. Kong D, Liu H, Wei S, Wang Y, Hu A, Han W, Zhao N, Lu Y, Zheng Y. A meta-analysis of the association between gestational diabetes mellitus and chronic hepatitis B infection during pregnancy. BMC Res Notes. 2014;7:139.
20. International Association of Diabetes and Pregnancy Study Groups Consensus Panel, Metzger BE, Gabbe SG, Persson B, Buchanan TA, Catalano PA, Damm P, Dyer AR, Leiva A, et al. International association of diabetes and pregnancy study groups recommendations on the diagnosis and classification of hyperglycemia in pregnancy. Diabetes Care. 2010;33(3):676–82.
21. Retnakaran R, Connelly PW, Sermer M, Zinman B, Hanley AJ. The impact of family history of diabetes on risk factors for gestational diabetes. Clin Endocrinol. 2007;67(5):754–60.
22. Cui AM, Cheng XY, Shao JG, Li HB, Wang XL, Shen Y, Mao LJ, Zhang S, Liu HY, Zhang L, et al. Maternal hepatitis B virus carrier status and pregnancy outcomes: a prospective cohort study. BMC Pregnancy Childbirth. 2016; 16(1):87.
23. Hedderson M, Ehrlich S, Sridhar S, Darbinian J, Moore S, Ferrara A. Racial/ ethnic disparities in the prevalence of gestational diabetes mellitus by BMI. Diabetes Care. 2012;35(7):1492–8.
24. Strong C, Lee S, Tanaka M, Juon HS. Ethnic differences in prevalence and barriers of HBV screening and vaccination among Asian Americans. J Community Health. 2012;37(5):1071–80.
25. Gomes CP, Torloni MR, Gueuvoghlanian-Silva BY, Alexandre SM, Mattar R, Daher S. Cytokine levels in gestational diabetes mellitus: a systematic review of the literature. Am J Reprod Immunol. 2013;69(6):545–57.
26. Bossick AS, Peters RM, Burmeister C, Kakumanu N, Shill JE, Cassidy-Bushrow AE. Antenatal inflammation and gestational diabetes mellitus risk among pregnant African-American women. J Reprod Immunol. 2016;115:1–5.
27. He D, Li M, Guo S, Zhu P, Huang H, Yan G, Wu Q, Tao S, Tan Z, Wang Y. Expression pattern of serum cytokines in hepatitis B virus infected patients with persistently normal alanine aminotransferase levels. J Clin Immunol. 2013;33(7):1240–9.
28. Elkrief L, Rautou PE, Sarin S, Valla D, Paradis V, Moreau R. Diabetes mellitus in patients with cirrhosis: clinical implications and management. Liver Int. 2016;36(7):936–48.
29. Simcox JA, McClain DA. Iron and diabetes risk. Cell Metab. 2013;17(3):329–41.
30. Kim CH, Kim HK, Bae SJ, Park JY, Lee KU. Association of elevated serum ferritin concentration with insulin resistance and impaired glucose metabolism in Korean men and women. Metabolism. 2011;60(3):414–20.
|
<urn:uuid:21d46aa4-89bf-40d8-86f6-be7472ff5a28>
|
CC-MAIN-2024-38
|
https://bmcinfectdis.biomedcentral.com/counter/pdf/10.1186/s12879-019-3749-1.pdf
|
2024-09-10T21:11:31+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-38/subset=warc/part-00167-781f89b0-54ef-4e32-b51d-e5860e733e3a.c000.gz.parquet
| 124,521,066
| 6,149
|
eng_Latn
|
eng_Latn
| 0.943133
|
eng_Latn
| 0.983637
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3411,
6455,
10920,
14072,
19996,
26128
] |
RESEARCH ARTICLE
Maternal hepatitis B surface antigen carrier status increased the incidence of gestational diabetes mellitus
Songxu Peng, Zhihua Wan, Xiaofang Lin, Xiu Li and Yukai Du *
Abstract
Background: The relationship between chronic hepatitis B virus (HBV) infection with gestational diabetes mellitus (GDM) remains unclear. This study aimed to identify the association between maternal HBsAg-positive status and GDM.
Methods: A retrospective cohort study was performed on the pregnant women who delivered from June 2012 to May 2016 at Wuhan Medical Care Center for Women and Children, Wuhan, China. We compared the incidence of GDM between HBsAg-positive pregnant women and HBsAg-negative controls. A multivariate regression model was used to measure the independent association between maternal HBsAg carrier and the risk of developing GDM.
Results: In total, 964 HBsAg-positive pregnant women and 964 HBsAg-negative women were included into the study. We observed maternal HBsAg carrier (OR 1.47, 95% CI 1.06–2.03), age (OR 1.05, 95% CI 1.00–1.10) and family history of diabetes (OR 3.97, 95% CI 2.05–7.67) had an independent risk for GDM in multivariable logistical regression model. However, no significant association was found between HBeAg carrier status, other HBV markers or viral load in pregnancy and the incidence of GDM.
Conclusions: Our results indicated that maternal HBsAg carriage is an independent risk factor for GDM, but viral activity indicated by HBeAg status and viral load is not the main reason for this phenomenon. Further studies are warranted to clarify the possible mechanisms behind such association of HBV infection and the additional risk of GDM.
Keywords: Gestational diabetes mellitus, Hepatitis B virus infection, Hepatitis B surface antigen, Viral load
Background
Hepatitis B virus (HBV) infection is a major public health problem worldwide [1, 2]. With approximately 2 billion HBV-infected individuals around the world, more than 350 million persons have chronic HBV infection [3]. The global prevalence of HBV infection varies widely [4, 5]. However, the majority of hepatitis B infection patients live in Asia and Africa [6]. China is a highly endemic region, almost one third of chronic HBV carriers can be found there. The third national serological survey in 2006 shows that the hepatitis B surface antigen
(HBsAg) positivity rate of Chinese aged 1–59 years is 7.18% [7]. Consequently, up to 10% of pregnant women are identified as chronic hepatitis B carrier in the screening for HBsAg status during the antenatal checkup, resulting in persistent HBV transmission [8, 9].
* Correspondence: [email protected]
Department of Maternal and Child Health, School of Public Health, Tongji
Medical College, Huazhong University of Science and Technology, 13th
Hangkong Road, Wuhan 430030, Hubei, China
At present, a few studies have reported that HBV infection indicated by positive HBsAg status had a direct impact on pregnancy outcomes, such as threatened preterm labor, preterm birth, low birthweight, macrosomia, antepartum hemorrhage, pregnancy-induced hypertension [10–14]. However, the underlying mechanisms behind these associations have not yet been elucidated. As for the relationship between maternal HBsAg carrier and gestational diabetes mellitus (GDM), it remains controversial. Several studies have reported that chronic
Open Access
hepatitis B infection increased the risk of developing GDM [11, 15–17], and this result was confirmed by a latest study conducted by Lao et al. who performed a case-control study with 214 cases and 204 controls [18]. However, a meta-analysis by Kong et al. demonstrated that chronic hepatitis B surface antigenemia did not exert an additional risk for GDM in general population except Iranian [19]. Additionally, there are few studies that examined the effects of HBeAg status and maternal viral load in pregnancy on the development of GDM. In 2010, the new diagnostic criterion of GDM had been proposed due to associations between maternal hyperglycemia and adverse pregnancy outcomes [20]. Considering the high prevalence of chronic hepatitis B infection among pregnant women in China, it is extremely crucial to clarify whether or not HBsAg carrier status is associated with the risk of GDM.
Based on above, the objective of our study is not only to identify the correlation between HBsAg carrier and GDM, but also explore whether HBeAg status and maternal viral load in the third trimester are associated with an increased risk of GDM among HBsAg-positive pregnant women.
Methods
Study population
In the present study, the two groups of pregnant women including HBsAg-positive and HBsAg-negative mothers were recruited. HBsAg-positive pregnant women were from a pre-conception cohort in Wuhan which was designed to study the risk factors of HBV maternal-fetal transmission. HBsAg-positive pregnant women older than 20 who delivered from June 2012 to May 2016 were invited to participate in the cohort at Wuhan Medical Care Center for Women and Children, Wuhan, China. All HBsAg-positive women with singleton pregnancy and the complete results of oral glucose tolerance test (OGTT), who did not have current and previous medical complications (including HCV, HIV and Treponema pallidum infection), were assigned to HBsAg-positive group. A total of 964 HBsAg-positive women were eligible for the study (Fig. 1 ). Using the same criteria mentioned, the subjects of HBsAg-negative group were randomly chosen from electronic databases during the study period.
The present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. The written informed consent of all subjects had been obtained before participating the study.
Data collection and samples collection
The clinical records of the two groups were retrieved for data extraction. The demographic information, including age, height, prenatal weight, parity, history of abortion, ABO blood type, family history of diabetes, and OGTT results were obtained from clinical records. We adopted the IADPSG criterion to diagnose GDM, that is, the pregnant women were diagnosed with GDM during 24th -28th weeks of gestation when their OGTT results exceeded the following glucose values: fasting plasma glucose level > 5.1 mmol/L and/or 1-h plasma glucose level > 10 mmol/L and/or 2-h plasma glucose level > 8.5 mmol/L.
For all HBsAg-positive women, a venous blood sample had been collected in the third trimester once informed consent had been obtained. Blood samples were used to examine anti-HBsAg, HBeAg, anti-HBeAg, anti-HBcAg status and maternal viral load. Serum HBV markers were tested by enzyme-linked immune sorbent assay (Kehua Biotechnology, Shanghai, China). The hepatitis B viral load was quantified by fluorescence quantitative polymerase chain reaction (FQ-PCR) (Da'an Gene Co. Ltd., Sun Yat-Sen University, Guangdong, China). All procedures were performed strictly following the manufacturer's instructions.
Statistical analysis
In univariate analyses, continuous variables were analyzed by Student's t-tests and categorical data were compared by chi-square tests. Stratified analyses were used to identify confounders and effect modifiers, and the Breslow-Day test was used
|
to assess the homogeneity of the odds ratios (ORs) for HBsAg carriage across each stratum of risk factors.
|
Odds ratios and 95% confidence intervals (CIs) were estimated using multivariable logistical regression to measure the association between maternal HBsAg status and GDM. The variables were chosen according to their statistical and clinical relevance. The stepwise (Wald) method was used in the multivariate logistic regression analysis. Statistical significance was assessed at the 5% level (two-tail test). All analyses were performed using SPSS software version 18.0 (SPSS, Chicago, IL, USA).
Results
A total of 964 HBsAg-positive women and 964 HBsAg-negative women, according with the inclusion criteria, were enrolled during June 2012 to May 2016. In this study, the highest proportion of missing data is 4.8% for prenatal BMI, and the missing proportion of age, prenatal weight, height, parity, ABO type, history of abortion and family history of diabetes were 0.6, 4.2, 2.8, 0.5, 1.5, 2.4 and 3.7%, respectively. Because the missing rates are small, we did not perform an additional process for the missing data. The maternal characteristics of the study population and the incidence of GDM are presented in Table 1. Compared with HBsAg-negative mothers, HBsAg-positive women had a significantly higher age, proportion of multiparas and history of abortion. But there was no significant difference in prenatal weight, height, or calculated body mass index (BMI) between mothers in HBsAg-positive group and those in HBsAg-negative group. Neither the distribution of ABO blood types nor family history of diabetes showed statistical difference in the two groups.
The present study found that HBsAg carriers were more likely to suffer from GDM as compared to
Table 1 Maternal characteristics and incidence of GDM with respect to maternal HBsAg status
Abbreviation: BMI Body mass index, GDM Gestational diabetes mellitus a Chi-square test for categorical variables
HBsAg-negative women (16.5% vs 10.5%, P < 0.001, Table 1). To determine the interactions between each of known factors affecting the development of GDM and maternal HBsAg status, stratified analyses by HBsAg status were performed according to each of these factors, i.e. age ≥ or < 35 years, nullipara or multipara, the presence or absence of family history of diabetes, with or without history of abortion. As shown in Table 2, positive HBsAg status was associated with an increased risk of GDM in women aged < 35 years, having no family history of diabetes, with an odds ratio of 1.60(95% CI 1.19– 2.15) and 1.73(95% CI 1.27–2.23), respectively. Regardless of the parity and the status of history of abortion, positive HBsAg status exerted an additional risk for GDM and the differences reached statistical significance. However, when we used the Breslow-Day test to assess the homogeneity of the ORs for HBsAg carriage across each stratum of risk factors, no significant difference was seen in these stratification factors.
In univariate analyses, age and HBsAg carriage were associated with the increased incidence of GDM, with an OR value of 1.08(95% CI 1.04–1.11) and 1.67(95% CI 1.27–2.23), respectively. Family history of diabetes (OR 4.60, 95% CI 2.60–8.14) and history of abortion (OR 1.38, 95% CI 1.05–1.81) increased the incidence of GDM. But there was no significant difference in terms of parity and prenatal BMI between the mothers with GDM and those without. To determine whether HBsAg carriage was an independent risk factor for GDM, multivariable logistic regression analysis was performed,
Table 2 Incidence of GDM with respect to HBsAg status in pregnant women, stratified by risk factors
a
Abbreviation GDM
OR
CI
aP-values for interaction effect between each risk factor and HBsAg status on GDM:
Gestational diabetes mellitus, Odds ratio,
Confidence interval adjusting for the confounding effects of other factors that were also found to be significantly different between the two groups (age, parity, history of abortion) or considered as classical risk factors of GDM in previous study (prenatal BMI, family history of diabetes). Age, prenatal BMI, parity as continuous variables and history of abortion, family history of diabetes as categorical variables were included in the multivariable logistic regression analysis. After adjustment for these associated covariates, a significant association of maternal HBsAg carriage with the increased risk of GDM was observed (OR 1.47, 95% CI 1.06 – 2.03) (Table 3 ). Simultaneously, significant associations between age as well as family history of diabetes and the increased risk of GDM were detected. However, there was no significant association between the risk for GDM and other factors including prenatal BMI, parity, history of abortion.
HBeAg, HBcAg, did not show any significant association with the incidence of GDM. Among HBsAg-positive pregnant women, the distribution of viral load in third trimester were not significantly different in women with and without GDM.
Discussion
In the multivariable logistic regression analysis, the association between HBsAg carriage and the risk of GDM remained significant after adjustment for other covariates. Further analysis was performed to explore whether other HBV markers and maternal viral load were associated with the risk of GDM among HBsAg-positive pregnant women. As a result, no significant relationship was observed between HBeAg status and incidence of GDM among HBsAg carriers (data shown in Additional file 1: Tables S1). Similarly, the various antibodies to HBsAg,
Our study found an independent effect of maternal HBsAg carriage on GDM, and noted pregnant women with HBV infection had an increased risk of GDM, confirming the findings of a previous study [15]. When maternal age was taken into account, maternal HBV infection increased the risk of GDM in the mothers younger than 35 years of age, similar to that exerted on pregnant women without family history of diabetes. When parity or history of abortion was examined, HBsAg carriage increased the risk of GDM in nulliparous or multiparous women, and similar results could be obtained in the women with or without history of abortion. Despite of no significant difference in Breslow-Day test, it can be speculated that there were interactions between maternal HBsAg carriage and other maternal factors, which resulted in various risk for GDM in pregnant women. The results of this study showed that the risk of GDM heightened with the increase of age. Additionally, our study also indicated that the incidence of GDM
Table 3 Univariate and multivariate logistic regression analyses of factors related to GDM
Abbreviation: OROdds ratio,CIConfidence interval
increased in the pregnancy women with higher age or family history of diabetes, implying that increasing age and genetic factor were the important contributors to the development of GDM [21].
In the few published studies regarding the effects of HBV infection on pregnancy outcomes, some reported a positive association between HBV infection and the risk of GDM [11, 15–18]. Among them, several retrospective studies done by Lao et al. suggested HBsAg carrier was significantly associated with gestational diabetes mellitus [15, 16]. Our present study demonstrated HBsAg-positive pregnant women were more likely to suffer from GDM (OR 1.43, 95%CI 1.01–2.02) compared with HBsAgnegative mothers. However, this result was contradicted by many others, which supported the hypothesis that women with HBV infection did not have extra risk for GDM [12–14, 22]. This inconsistent result could be related to ethnic difference. Because the prevalence of HBV infection and genetic background differ in various ethnic groups [23, 24]. This may affect the actual association of HBsAg carriage and the risk of GDM. Additionally, the present study adopted the IADPSG criterion, and then more pregnant women were diagnosed with GDM.
Although some researchers noticed the correlation between HBV infection and GDM, and attempted to clarify the intrinsic links, the potential mechanism for this association is unclear. In addition, as shown in our study, different degree of viral activity indicated by HBeAg status and viral load in pregnancy could not explain the higher risk of GDM in HBV-infected women. Several previous reviews and reports established that the pathogenesis of GDM was related to insulin resistance associated with the chronic inflammatory state [25, 26]. In addition to the effects of the pregnancy itself, the factors involved in the inflammatory state were elevated levels of pro-inflammatory cytokines such as IL-2, IL-6, IL-10, and tumor necrosis factor-alpha (TNF-a), which can be accounted for by chronic HBV infection [27]. Second, some patients with HBV infection developed into liver fibrosis or cirrhosis, which has been identified as a cause of insulin resistance and glucose intolerance [28]. Third possible mechanism is the increased iron status caused by chronic HBV infection facilitates the development of GDM [16]. The main reason is that excess iron can affect insulin synthesis and secretion, facilitate oxidation of lipids and liver mediated insulin resistance [29, 30].
The strengths of the present study include the large number of subjects and the use of multivariable logistic regression analysis for adjusting potential confounding variables. Additionally, this study comprehensively explore the associations between HBV markers, viral load in pregnancy and GDM despite no statistically significant difference presented. However, the limitations of our study is also unavoidable. The first and most obvious limitation is that our study is a retrospective study that proved a positive correlation between HBsAg carrierage and GDM. But its capability of etiological inferences is limited. Therefore a large-scale prospective study on this causal relationship is needed. Second, we have only the data of prenatal maternal weight, and the pre-gravid maternal weight was missing in this study. Thereby we could not calculate the BMI before conception despite of its impact on the development of GDM. This might affect the authenticity of our results to a certain extent.
Conclusion
HBV infection can lightly increase the incidence of GDM and viral activity may not be the main reason generating this phenomenon. In view of unknown pathophysiologic mechanism of GDM and high prevalence of HBV infection in certain regions, further research in this area should obviously be needed to explain our present epidemiological observation.
Additional file
Additional file 1: Table S1. The association between HBV markers, maternal viral load and GDM in HBsAg-positive pregnant women. (DOCX 19 kb)
Abbreviations
BMI: Body mass index; CI: Confidence interval; GDM: Gestational diabetes mellitus; HBeAg: Hepatitis B envelope antigen; HBsAg: Hepatitis B surface antigen; HBV: Hepatitis B virus; HCV: Hepatitis C virus; HIV: Human immunodeficiency virus; IADPSG: International Association of Diabetes and Pregnancy Study Groups; OGTT: Oral glucose tolerance test; OR: Odds ratio; TP: Treponema pallidum
Acknowledgements
We are particularly grateful to subjects of this study. We also acknowledge the staff in Wuhan Women and Children Medical and Healthcare Center, Wuhan, China for their assistance.
Funding
This work was funded by the National Natural Science Foundation of China, grant number (NSFC-81172678) and (NSFC-81573166). The funding body plays no role in the design of the study and collection, analysis, and interpretation of data and in writing the manuscript.
Availability of data and materials
The datasets used and/or analysed during the current study are available from the corresponding author Yukai Du on reasonable request.
Authors' contributions
All authors contributed significantly to this work. SP collected the data, did the statistical analysis, and drafted the initial manuscript. ZW and XL helped design the study, collected the data. XL assisted with data collection, revised the manuscript. YD designed the study, directed the statistical analysis, and reviewed the manuscript. All the authors listed have seen and approved the contents of the submitted manuscript. All the authors have agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Ethics approval and consent to participate
The present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. Written
informed consent of all subjects had been obtained before participating the study.
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Received: 8 March 2018 Accepted: 28 January 2019
References
1. Schweitzer A, Horn J, Mikolajczyk RT, Krause G, Ott JJ. Estimations of worldwide prevalence of chronic hepatitis B virus infection: a systematic review of data published between 1965 and 2013. Lancet. 2015;386(10003): 1546–55.
2. Chen DS. Hepatitis B vaccination: the key towards elimination and eradication of hepatitis B. J Hepatol. 2009;50(4):805–16.
3. Sarri G, Westby M, Bermingham S, Hill-Cawthorne G, Thomas H, Guideline Development Group. Diagnosis and management of chronic hepatitis B in children, young people, and adults: summary of NICE guidance. BMJ. 2013; 346:f3893.
4. Liu J, Zhang S, Wang Q, Shen H, Zhang M, Zhang Y, Yan D, Liu M. Seroepidemiology of hepatitis B virus infection in 2 million men aged 21– 49 years in rural China: a population-based, cross-sectional study. Lancet Infect Dis. 2016;16(1):80–6.
5. Te HS, Jensen DM. Epidemiology of hepatitis B and C viruses: a global overview. Clin Liver Dis. 2010;14(1):1–21.
6. Ott JJ, Stevens GA, Groeger J, Wiersma ST. Global epidemiology of hepatitis B virus infection: new estimates of age-specific HBsAg seroprevalence and endemicity. Vaccine. 2012;30(12):2212–9.
7. Shen L, Wang F, Wang F, Cui F, Zhang S, Zheng H, Zhang Y, Liang X, Bi S. Efficacy of yeast-derived recombinant hepatitis B vaccine after being used for 12 years in highly endemic areas in China. Vaccine. 2012;30(47):6623–7.
8. Deng L, Li X, Shi Z, Jiang P, Chen D, Ma L. Maternal and perinatal outcome in cases of fulminant viral hepatitis in late pregnancy. Int J Gynaecol Obstet. 2012;119(2):145–8.
9. Salemi JL, Whiteman VE, August EM, Chandler K, Mbah AK, Salihu HM. Maternal hepatitis B and hepatitis C infection and neonatal neurological outcomes. J Viral Hepat. 2014;21(11):e144–53.
10. Connell LE, Salihu HM, Salemi JL, August EM, Weldeselasse H, Mbah AK. Maternal hepatitis B and hepatitis C carrier status and perinatal outcomes. Liver Int. 2011;31(8):1163–70.
11. Tse KY, Ho LF, Lao T. The impact of maternal HBsAg carrier status on pregnancy outcomes: a case-control study. J Hepatol. 2005;43(5):771–5.
12. Reddick KL, Jhaveri R, Gandhi M, James AH, Swamy GK. Pregnancy outcomes associated with viral hepatitis. J Viral Hepat. 2011;18(7):e394–8.
13. Lao TT, Sahota DS, Suen SS, Law LW, Leung TY. Maternal HBsAg status and
–
infant size--a Faustian bargain? J Viral Hepat. 2012;19(7):519 24.
14. Lao TT, Sahota DS, Cheng YK, Law LW, Leung TY. Maternal hepatitis B surface antigen status and incidence of pre-eclampsia. J Viral Hepat. 2013; 20(5):343–9.
15. Lao TT, Chan BC, Leung WC, Ho LF, Tse KY. Maternal hepatitis B infection and gestational diabetes mellitus. J Hepatol. 2007;47(1):46–50.
16. Lao TT, Tse KY, Chan LY, Tam KF, Ho LF. HBsAg carrier status and the association between gestational diabetes with increased serum ferritin concentration in Chinese women. Diabetes Care. 2003;26(11):3011–6.
17. Sirilert S, Traisrisilp K, Sirivatanapa P, Tongsong T. Pregnancy outcomes among chronic carriers of hepatitis B virus. Int J Gynaecol Obstet. 2014; 126(2):106–10.
18. Lao TT, Chung MK, Cheung TK, Law LW. Antenatal hepatitis B and increased risk of gestational diabetes mellitus - implications for obstetric care. J Inf Secur. 2016;72(5):625–6.
19. Kong D, Liu H, Wei S, Wang Y, Hu A, Han W, Zhao N, Lu Y, Zheng Y. A meta-analysis of the association between gestational diabetes mellitus and chronic hepatitis B infection during pregnancy. BMC Res Notes. 2014;7:139.
20. International Association of Diabetes and Pregnancy Study Groups Consensus Panel, Metzger BE, Gabbe SG, Persson B, Buchanan TA, Catalano PA, Damm P, Dyer AR, Leiva A, et al. International association of diabetes and pregnancy study groups recommendations on the diagnosis and classification of hyperglycemia in pregnancy. Diabetes Care. 2010;33(3):676–82.
21. Retnakaran R, Connelly PW, Sermer M, Zinman B, Hanley AJ. The impact of family history of diabetes on risk factors for gestational diabetes. Clin Endocrinol. 2007;67(5):754–60.
22. Cui AM, Cheng XY, Shao JG, Li HB, Wang XL, Shen Y, Mao LJ, Zhang S, Liu HY, Zhang L, et al. Maternal hepatitis B virus carrier status and pregnancy outcomes: a prospective cohort study. BMC Pregnancy Childbirth. 2016; 16(1):87.
23. Hedderson M, Ehrlich S, Sridhar S, Darbinian J, Moore S, Ferrara A. Racial/ ethnic disparities in the prevalence of gestational diabetes mellitus by BMI. Diabetes Care. 2012;35(7):1492–8.
24. Strong C, Lee S, Tanaka M, Juon HS. Ethnic differences in prevalence and barriers of HBV screening and vaccination among Asian Americans. J Community Health. 2012;37(5):1071–80.
25. Gomes CP, Torloni MR, Gueuvoghlanian-Silva BY, Alexandre SM, Mattar R, Daher S. Cytokine levels in gestational diabetes mellitus: a systematic review of the literature. Am J Reprod Immunol. 2013;69(6):545–57.
26. Bossick AS, Peters RM, Burmeister C, Kakumanu N, Shill JE, Cassidy-Bushrow AE. Antenatal inflammation and gestational diabetes mellitus risk among pregnant African-American women. J Reprod Immunol. 2016;115:1–5.
27. He D, Li M, Guo S, Zhu P, Huang H, Yan G, Wu Q, Tao S, Tan Z, Wang Y. Expression pattern of serum cytokines in hepatitis B virus infected patients with persistently normal alanine aminotransferase levels. J Clin Immunol. 2013;33(7):1240–9.
28. Elkrief L, Rautou PE, Sarin S, Valla D, Paradis V, Moreau R. Diabetes mellitus in patients with cirrhosis: clinical implications and management. Liver Int. 2016;36(7):936–48.
29. Simcox JA, McClain DA. Iron and diabetes risk. Cell Metab. 2013;17(3):329–41.
30. Kim CH, Kim HK, Bae SJ, Park JY, Lee KU. Association of elevated serum ferritin concentration with insulin resistance and impaired glucose metabolism in Korean men and women. Metabolism. 2011;60(3):414–20.
| 7,326
|
inside_word
|
to
|
remove_one_sentence
|
<url>
https://bmcinfectdis.biomedcentral.com/counter/pdf/10.1186/s12879-019-3749-1.pdf
</url>
<text>
RESEARCH ARTICLE
Maternal hepatitis B surface antigen carrier status increased the incidence of gestational diabetes mellitus
Songxu Peng, Zhihua Wan, Xiaofang Lin, Xiu Li and Yukai Du *
Abstract
Background: The relationship between chronic hepatitis B virus (HBV) infection with gestational diabetes mellitus (GDM) remains unclear. This study aimed to identify the association between maternal HBsAg-positive status and GDM.
Methods: A retrospective cohort study was performed on the pregnant women who delivered from June 2012 to May 2016 at Wuhan Medical Care Center for Women and Children, Wuhan, China. We compared the incidence of GDM between HBsAg-positive pregnant women and HBsAg-negative controls. A multivariate regression model was used to measure the independent association between maternal HBsAg carrier and the risk of developing GDM.
Results: In total, 964 HBsAg-positive pregnant women and 964 HBsAg-negative women were included into the study. We observed maternal HBsAg carrier (OR 1.47, 95% CI 1.06–2.03), age (OR 1.05, 95% CI 1.00–1.10) and family history of diabetes (OR 3.97, 95% CI 2.05–7.67) had an independent risk for GDM in multivariable logistical regression model. However, no significant association was found between HBeAg carrier status, other HBV markers or viral load in pregnancy and the incidence of GDM.
Conclusions: Our results indicated that maternal HBsAg carriage is an independent risk factor for GDM, but viral activity indicated by HBeAg status and viral load is not the main reason for this phenomenon. Further studies are warranted to clarify the possible mechanisms behind such association of HBV infection and the additional risk of GDM.
Keywords: Gestational diabetes mellitus, Hepatitis B virus infection, Hepatitis B surface antigen, Viral load
Background
Hepatitis B virus (HBV) infection is a major public health problem worldwide [1, 2]. With approximately 2 billion HBV-infected individuals around the world, more than 350 million persons have chronic HBV infection [3]. The global prevalence of HBV infection varies widely [4, 5]. However, the majority of hepatitis B infection patients live in Asia and Africa [6]. China is a highly endemic region, almost one third of chronic HBV carriers can be found there. The third national serological survey in 2006 shows that the hepatitis B surface antigen
(HBsAg) positivity rate of Chinese aged 1–59 years is 7.18% [7]. Consequently, up to 10% of pregnant women are identified as chronic hepatitis B carrier in the screening for HBsAg status during the antenatal checkup, resulting in persistent HBV transmission [8, 9].
* Correspondence: [email protected]
Department of Maternal and Child Health, School of Public Health, Tongji
Medical College, Huazhong University of Science and Technology, 13th
Hangkong Road, Wuhan 430030, Hubei, China
At present, a few studies have reported that HBV infection indicated by positive HBsAg status had a direct impact on pregnancy outcomes, such as threatened preterm labor, preterm birth, low birthweight, macrosomia, antepartum hemorrhage, pregnancy-induced hypertension [10–14]. However, the underlying mechanisms behind these associations have not yet been elucidated. As for the relationship between maternal HBsAg carrier and gestational diabetes mellitus (GDM), it remains controversial. Several studies have reported that chronic
Open Access
hepatitis B infection increased the risk of developing GDM [11, 15–17], and this result was confirmed by a latest study conducted by Lao et al. who performed a case-control study with 214 cases and 204 controls [18]. However, a meta-analysis by Kong et al. demonstrated that chronic hepatitis B surface antigenemia did not exert an additional risk for GDM in general population except Iranian [19]. Additionally, there are few studies that examined the effects of HBeAg status and maternal viral load in pregnancy on the development of GDM. In 2010, the new diagnostic criterion of GDM had been proposed due to associations between maternal hyperglycemia and adverse pregnancy outcomes [20]. Considering the high prevalence of chronic hepatitis B infection among pregnant women in China, it is extremely crucial to clarify whether or not HBsAg carrier status is associated with the risk of GDM.
Based on above, the objective of our study is not only to identify the correlation between HBsAg carrier and GDM, but also explore whether HBeAg status and maternal viral load in the third trimester are associated with an increased risk of GDM among HBsAg-positive pregnant women.
Methods
Study population
In the present study, the two groups of pregnant women including HBsAg-positive and HBsAg-negative mothers were recruited. HBsAg-positive pregnant women were from a pre-conception cohort in Wuhan which was designed to study the risk factors of HBV maternal-fetal transmission. HBsAg-positive pregnant women older than 20 who delivered from June 2012 to May 2016 were invited to participate in the cohort at Wuhan Medical Care Center for Women and Children, Wuhan, China. All HBsAg-positive women with singleton pregnancy and the complete results of oral glucose tolerance test (OGTT), who did not have current and previous medical complications (including HCV, HIV and Treponema pallidum infection), were assigned to HBsAg-positive group. A total of 964 HBsAg-positive women were eligible for the study (Fig. 1 ). Using the same criteria mentioned, the subjects of HBsAg-negative group were randomly chosen from electronic databases during the study period.
The present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. The written informed consent of all subjects had been obtained before participating the study.
Data collection and samples collection
The clinical records of the two groups were retrieved for data extraction. The demographic information, including age, height, prenatal weight, parity, history of abortion, ABO blood type, family history of diabetes, and OGTT results were obtained from clinical records. We adopted the IADPSG criterion to diagnose GDM, that is, the pregnant women were diagnosed with GDM during 24th -28th weeks of gestation when their OGTT results exceeded the following glucose values: fasting plasma glucose level > 5.1 mmol/L and/or 1-h plasma glucose level > 10 mmol/L and/or 2-h plasma glucose level > 8.5 mmol/L.
For all HBsAg-positive women, a venous blood sample had been collected in the third trimester once informed consent had been obtained. Blood samples were used to examine anti-HBsAg, HBeAg, anti-HBeAg, anti-HBcAg status and maternal viral load. Serum HBV markers were tested by enzyme-linked immune sorbent assay (Kehua Biotechnology, Shanghai, China). The hepatitis B viral load was quantified by fluorescence quantitative polymerase chain reaction (FQ-PCR) (Da'an Gene Co. Ltd., Sun Yat-Sen University, Guangdong, China). All procedures were performed strictly following the manufacturer's instructions.
Statistical analysis
In univariate analyses, continuous variables were analyzed by Student's t-tests and categorical data were compared by chi-square tests. Stratified analyses were used to identify confounders and effect modifiers, and the Breslow-Day test was used <cursor_is_here> Odds ratios and 95% confidence intervals (CIs) were estimated using multivariable logistical regression to measure the association between maternal HBsAg status and GDM. The variables were chosen according to their statistical and clinical relevance. The stepwise (Wald) method was used in the multivariate logistic regression analysis. Statistical significance was assessed at the 5% level (two-tail test). All analyses were performed using SPSS software version 18.0 (SPSS, Chicago, IL, USA).
Results
A total of 964 HBsAg-positive women and 964 HBsAg-negative women, according with the inclusion criteria, were enrolled during June 2012 to May 2016. In this study, the highest proportion of missing data is 4.8% for prenatal BMI, and the missing proportion of age, prenatal weight, height, parity, ABO type, history of abortion and family history of diabetes were 0.6, 4.2, 2.8, 0.5, 1.5, 2.4 and 3.7%, respectively. Because the missing rates are small, we did not perform an additional process for the missing data. The maternal characteristics of the study population and the incidence of GDM are presented in Table 1. Compared with HBsAg-negative mothers, HBsAg-positive women had a significantly higher age, proportion of multiparas and history of abortion. But there was no significant difference in prenatal weight, height, or calculated body mass index (BMI) between mothers in HBsAg-positive group and those in HBsAg-negative group. Neither the distribution of ABO blood types nor family history of diabetes showed statistical difference in the two groups.
The present study found that HBsAg carriers were more likely to suffer from GDM as compared to
Table 1 Maternal characteristics and incidence of GDM with respect to maternal HBsAg status
Abbreviation: BMI Body mass index, GDM Gestational diabetes mellitus a Chi-square test for categorical variables
HBsAg-negative women (16.5% vs 10.5%, P < 0.001, Table 1). To determine the interactions between each of known factors affecting the development of GDM and maternal HBsAg status, stratified analyses by HBsAg status were performed according to each of these factors, i.e. age ≥ or < 35 years, nullipara or multipara, the presence or absence of family history of diabetes, with or without history of abortion. As shown in Table 2, positive HBsAg status was associated with an increased risk of GDM in women aged < 35 years, having no family history of diabetes, with an odds ratio of 1.60(95% CI 1.19– 2.15) and 1.73(95% CI 1.27–2.23), respectively. Regardless of the parity and the status of history of abortion, positive HBsAg status exerted an additional risk for GDM and the differences reached statistical significance. However, when we used the Breslow-Day test to assess the homogeneity of the ORs for HBsAg carriage across each stratum of risk factors, no significant difference was seen in these stratification factors.
In univariate analyses, age and HBsAg carriage were associated with the increased incidence of GDM, with an OR value of 1.08(95% CI 1.04–1.11) and 1.67(95% CI 1.27–2.23), respectively. Family history of diabetes (OR 4.60, 95% CI 2.60–8.14) and history of abortion (OR 1.38, 95% CI 1.05–1.81) increased the incidence of GDM. But there was no significant difference in terms of parity and prenatal BMI between the mothers with GDM and those without. To determine whether HBsAg carriage was an independent risk factor for GDM, multivariable logistic regression analysis was performed,
Table 2 Incidence of GDM with respect to HBsAg status in pregnant women, stratified by risk factors
a
Abbreviation GDM
OR
CI
aP-values for interaction effect between each risk factor and HBsAg status on GDM:
Gestational diabetes mellitus, Odds ratio,
Confidence interval adjusting for the confounding effects of other factors that were also found to be significantly different between the two groups (age, parity, history of abortion) or considered as classical risk factors of GDM in previous study (prenatal BMI, family history of diabetes). Age, prenatal BMI, parity as continuous variables and history of abortion, family history of diabetes as categorical variables were included in the multivariable logistic regression analysis. After adjustment for these associated covariates, a significant association of maternal HBsAg carriage with the increased risk of GDM was observed (OR 1.47, 95% CI 1.06 – 2.03) (Table 3 ). Simultaneously, significant associations between age as well as family history of diabetes and the increased risk of GDM were detected. However, there was no significant association between the risk for GDM and other factors including prenatal BMI, parity, history of abortion.
HBeAg, HBcAg, did not show any significant association with the incidence of GDM. Among HBsAg-positive pregnant women, the distribution of viral load in third trimester were not significantly different in women with and without GDM.
Discussion
In the multivariable logistic regression analysis, the association between HBsAg carriage and the risk of GDM remained significant after adjustment for other covariates. Further analysis was performed to explore whether other HBV markers and maternal viral load were associated with the risk of GDM among HBsAg-positive pregnant women. As a result, no significant relationship was observed between HBeAg status and incidence of GDM among HBsAg carriers (data shown in Additional file 1: Tables S1). Similarly, the various antibodies to HBsAg,
Our study found an independent effect of maternal HBsAg carriage on GDM, and noted pregnant women with HBV infection had an increased risk of GDM, confirming the findings of a previous study [15]. When maternal age was taken into account, maternal HBV infection increased the risk of GDM in the mothers younger than 35 years of age, similar to that exerted on pregnant women without family history of diabetes. When parity or history of abortion was examined, HBsAg carriage increased the risk of GDM in nulliparous or multiparous women, and similar results could be obtained in the women with or without history of abortion. Despite of no significant difference in Breslow-Day test, it can be speculated that there were interactions between maternal HBsAg carriage and other maternal factors, which resulted in various risk for GDM in pregnant women. The results of this study showed that the risk of GDM heightened with the increase of age. Additionally, our study also indicated that the incidence of GDM
Table 3 Univariate and multivariate logistic regression analyses of factors related to GDM
Abbreviation: OROdds ratio,CIConfidence interval
increased in the pregnancy women with higher age or family history of diabetes, implying that increasing age and genetic factor were the important contributors to the development of GDM [21].
In the few published studies regarding the effects of HBV infection on pregnancy outcomes, some reported a positive association between HBV infection and the risk of GDM [11, 15–18]. Among them, several retrospective studies done by Lao et al. suggested HBsAg carrier was significantly associated with gestational diabetes mellitus [15, 16]. Our present study demonstrated HBsAg-positive pregnant women were more likely to suffer from GDM (OR 1.43, 95%CI 1.01–2.02) compared with HBsAgnegative mothers. However, this result was contradicted by many others, which supported the hypothesis that women with HBV infection did not have extra risk for GDM [12–14, 22]. This inconsistent result could be related to ethnic difference. Because the prevalence of HBV infection and genetic background differ in various ethnic groups [23, 24]. This may affect the actual association of HBsAg carriage and the risk of GDM. Additionally, the present study adopted the IADPSG criterion, and then more pregnant women were diagnosed with GDM.
Although some researchers noticed the correlation between HBV infection and GDM, and attempted to clarify the intrinsic links, the potential mechanism for this association is unclear. In addition, as shown in our study, different degree of viral activity indicated by HBeAg status and viral load in pregnancy could not explain the higher risk of GDM in HBV-infected women. Several previous reviews and reports established that the pathogenesis of GDM was related to insulin resistance associated with the chronic inflammatory state [25, 26]. In addition to the effects of the pregnancy itself, the factors involved in the inflammatory state were elevated levels of pro-inflammatory cytokines such as IL-2, IL-6, IL-10, and tumor necrosis factor-alpha (TNF-a), which can be accounted for by chronic HBV infection [27]. Second, some patients with HBV infection developed into liver fibrosis or cirrhosis, which has been identified as a cause of insulin resistance and glucose intolerance [28]. Third possible mechanism is the increased iron status caused by chronic HBV infection facilitates the development of GDM [16]. The main reason is that excess iron can affect insulin synthesis and secretion, facilitate oxidation of lipids and liver mediated insulin resistance [29, 30].
The strengths of the present study include the large number of subjects and the use of multivariable logistic regression analysis for adjusting potential confounding variables. Additionally, this study comprehensively explore the associations between HBV markers, viral load in pregnancy and GDM despite no statistically significant difference presented. However, the limitations of our study is also unavoidable. The first and most obvious limitation is that our study is a retrospective study that proved a positive correlation between HBsAg carrierage and GDM. But its capability of etiological inferences is limited. Therefore a large-scale prospective study on this causal relationship is needed. Second, we have only the data of prenatal maternal weight, and the pre-gravid maternal weight was missing in this study. Thereby we could not calculate the BMI before conception despite of its impact on the development of GDM. This might affect the authenticity of our results to a certain extent.
Conclusion
HBV infection can lightly increase the incidence of GDM and viral activity may not be the main reason generating this phenomenon. In view of unknown pathophysiologic mechanism of GDM and high prevalence of HBV infection in certain regions, further research in this area should obviously be needed to explain our present epidemiological observation.
Additional file
Additional file 1: Table S1. The association between HBV markers, maternal viral load and GDM in HBsAg-positive pregnant women. (DOCX 19 kb)
Abbreviations
BMI: Body mass index; CI: Confidence interval; GDM: Gestational diabetes mellitus; HBeAg: Hepatitis B envelope antigen; HBsAg: Hepatitis B surface antigen; HBV: Hepatitis B virus; HCV: Hepatitis C virus; HIV: Human immunodeficiency virus; IADPSG: International Association of Diabetes and Pregnancy Study Groups; OGTT: Oral glucose tolerance test; OR: Odds ratio; TP: Treponema pallidum
Acknowledgements
We are particularly grateful to subjects of this study. We also acknowledge the staff in Wuhan Women and Children Medical and Healthcare Center, Wuhan, China for their assistance.
Funding
This work was funded by the National Natural Science Foundation of China, grant number (NSFC-81172678) and (NSFC-81573166). The funding body plays no role in the design of the study and collection, analysis, and interpretation of data and in writing the manuscript.
Availability of data and materials
The datasets used and/or analysed during the current study are available from the corresponding author Yukai Du on reasonable request.
Authors' contributions
All authors contributed significantly to this work. SP collected the data, did the statistical analysis, and drafted the initial manuscript. ZW and XL helped design the study, collected the data. XL assisted with data collection, revised the manuscript. YD designed the study, directed the statistical analysis, and reviewed the manuscript. All the authors listed have seen and approved the contents of the submitted manuscript. All the authors have agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Ethics approval and consent to participate
The present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. Written
informed consent of all subjects had been obtained before participating the study.
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Received: 8 March 2018 Accepted: 28 January 2019
References
1. Schweitzer A, Horn J, Mikolajczyk RT, Krause G, Ott JJ. Estimations of worldwide prevalence of chronic hepatitis B virus infection: a systematic review of data published between 1965 and 2013. Lancet. 2015;386(10003): 1546–55.
2. Chen DS. Hepatitis B vaccination: the key towards elimination and eradication of hepatitis B. J Hepatol. 2009;50(4):805–16.
3. Sarri G, Westby M, Bermingham S, Hill-Cawthorne G, Thomas H, Guideline Development Group. Diagnosis and management of chronic hepatitis B in children, young people, and adults: summary of NICE guidance. BMJ. 2013; 346:f3893.
4. Liu J, Zhang S, Wang Q, Shen H, Zhang M, Zhang Y, Yan D, Liu M. Seroepidemiology of hepatitis B virus infection in 2 million men aged 21– 49 years in rural China: a population-based, cross-sectional study. Lancet Infect Dis. 2016;16(1):80–6.
5. Te HS, Jensen DM. Epidemiology of hepatitis B and C viruses: a global overview. Clin Liver Dis. 2010;14(1):1–21.
6. Ott JJ, Stevens GA, Groeger J, Wiersma ST. Global epidemiology of hepatitis B virus infection: new estimates of age-specific HBsAg seroprevalence and endemicity. Vaccine. 2012;30(12):2212–9.
7. Shen L, Wang F, Wang F, Cui F, Zhang S, Zheng H, Zhang Y, Liang X, Bi S. Efficacy of yeast-derived recombinant hepatitis B vaccine after being used for 12 years in highly endemic areas in China. Vaccine. 2012;30(47):6623–7.
8. Deng L, Li X, Shi Z, Jiang P, Chen D, Ma L. Maternal and perinatal outcome in cases of fulminant viral hepatitis in late pregnancy. Int J Gynaecol Obstet. 2012;119(2):145–8.
9. Salemi JL, Whiteman VE, August EM, Chandler K, Mbah AK, Salihu HM. Maternal hepatitis B and hepatitis C infection and neonatal neurological outcomes. J Viral Hepat. 2014;21(11):e144–53.
10. Connell LE, Salihu HM, Salemi JL, August EM, Weldeselasse H, Mbah AK. Maternal hepatitis B and hepatitis C carrier status and perinatal outcomes. Liver Int. 2011;31(8):1163–70.
11. Tse KY, Ho LF, Lao T. The impact of maternal HBsAg carrier status on pregnancy outcomes: a case-control study. J Hepatol. 2005;43(5):771–5.
12. Reddick KL, Jhaveri R, Gandhi M, James AH, Swamy GK. Pregnancy outcomes associated with viral hepatitis. J Viral Hepat. 2011;18(7):e394–8.
13. Lao TT, Sahota DS, Suen SS, Law LW, Leung TY. Maternal HBsAg status and
–
infant size--a Faustian bargain? J Viral Hepat. 2012;19(7):519 24.
14. Lao TT, Sahota DS, Cheng YK, Law LW, Leung TY. Maternal hepatitis B surface antigen status and incidence of pre-eclampsia. J Viral Hepat. 2013; 20(5):343–9.
15. Lao TT, Chan BC, Leung WC, Ho LF, Tse KY. Maternal hepatitis B infection and gestational diabetes mellitus. J Hepatol. 2007;47(1):46–50.
16. Lao TT, Tse KY, Chan LY, Tam KF, Ho LF. HBsAg carrier status and the association between gestational diabetes with increased serum ferritin concentration in Chinese women. Diabetes Care. 2003;26(11):3011–6.
17. Sirilert S, Traisrisilp K, Sirivatanapa P, Tongsong T. Pregnancy outcomes among chronic carriers of hepatitis B virus. Int J Gynaecol Obstet. 2014; 126(2):106–10.
18. Lao TT, Chung MK, Cheung TK, Law LW. Antenatal hepatitis B and increased risk of gestational diabetes mellitus - implications for obstetric care. J Inf Secur. 2016;72(5):625–6.
19. Kong D, Liu H, Wei S, Wang Y, Hu A, Han W, Zhao N, Lu Y, Zheng Y. A meta-analysis of the association between gestational diabetes mellitus and chronic hepatitis B infection during pregnancy. BMC Res Notes. 2014;7:139.
20. International Association of Diabetes and Pregnancy Study Groups Consensus Panel, Metzger BE, Gabbe SG, Persson B, Buchanan TA, Catalano PA, Damm P, Dyer AR, Leiva A, et al. International association of diabetes and pregnancy study groups recommendations on the diagnosis and classification of hyperglycemia in pregnancy. Diabetes Care. 2010;33(3):676–82.
21. Retnakaran R, Connelly PW, Sermer M, Zinman B, Hanley AJ. The impact of family history of diabetes on risk factors for gestational diabetes. Clin Endocrinol. 2007;67(5):754–60.
22. Cui AM, Cheng XY, Shao JG, Li HB, Wang XL, Shen Y, Mao LJ, Zhang S, Liu HY, Zhang L, et al. Maternal hepatitis B virus carrier status and pregnancy outcomes: a prospective cohort study. BMC Pregnancy Childbirth. 2016; 16(1):87.
23. Hedderson M, Ehrlich S, Sridhar S, Darbinian J, Moore S, Ferrara A. Racial/ ethnic disparities in the prevalence of gestational diabetes mellitus by BMI. Diabetes Care. 2012;35(7):1492–8.
24. Strong C, Lee S, Tanaka M, Juon HS. Ethnic differences in prevalence and barriers of HBV screening and vaccination among Asian Americans. J Community Health. 2012;37(5):1071–80.
25. Gomes CP, Torloni MR, Gueuvoghlanian-Silva BY, Alexandre SM, Mattar R, Daher S. Cytokine levels in gestational diabetes mellitus: a systematic review of the literature. Am J Reprod Immunol. 2013;69(6):545–57.
26. Bossick AS, Peters RM, Burmeister C, Kakumanu N, Shill JE, Cassidy-Bushrow AE. Antenatal inflammation and gestational diabetes mellitus risk among pregnant African-American women. J Reprod Immunol. 2016;115:1–5.
27. He D, Li M, Guo S, Zhu P, Huang H, Yan G, Wu Q, Tao S, Tan Z, Wang Y. Expression pattern of serum cytokines in hepatitis B virus infected patients with persistently normal alanine aminotransferase levels. J Clin Immunol. 2013;33(7):1240–9.
28. Elkrief L, Rautou PE, Sarin S, Valla D, Paradis V, Moreau R. Diabetes mellitus in patients with cirrhosis: clinical implications and management. Liver Int. 2016;36(7):936–48.
29. Simcox JA, McClain DA. Iron and diabetes risk. Cell Metab. 2013;17(3):329–41.
30. Kim CH, Kim HK, Bae SJ, Park JY, Lee KU. Association of elevated serum ferritin concentration with insulin resistance and impaired glucose metabolism in Korean men and women. Metabolism. 2011;60(3):414–20.
</text>
|
[
{
"content": "<url>\nhttps://bmcinfectdis.biomedcentral.com/counter/pdf/10.1186/s12879-019-3749-1.pdf\n</url>\n<text>\nRESEARCH ARTICLE\n\nMaternal hepatitis B surface antigen carrier status increased the incidence of gestational diabetes mellitus\n\nSongxu Peng, Zhihua Wan, Xiaofang Lin, Xiu Li and Yukai Du *\n\nAbstract\n\nBackground: The relationship between chronic hepatitis B virus (HBV) infection with gestational diabetes mellitus (GDM) remains unclear. This study aimed to identify the association between maternal HBsAg-positive status and GDM.\n\nMethods: A retrospective cohort study was performed on the pregnant women who delivered from June 2012 to May 2016 at Wuhan Medical Care Center for Women and Children, Wuhan, China. We compared the incidence of GDM between HBsAg-positive pregnant women and HBsAg-negative controls. A multivariate regression model was used to measure the independent association between maternal HBsAg carrier and the risk of developing GDM.\n\nResults: In total, 964 HBsAg-positive pregnant women and 964 HBsAg-negative women were included into the study. We observed maternal HBsAg carrier (OR 1.47, 95% CI 1.06–2.03), age (OR 1.05, 95% CI 1.00–1.10) and family history of diabetes (OR 3.97, 95% CI 2.05–7.67) had an independent risk for GDM in multivariable logistical regression model. However, no significant association was found between HBeAg carrier status, other HBV markers or viral load in pregnancy and the incidence of GDM.\n\nConclusions: Our results indicated that maternal HBsAg carriage is an independent risk factor for GDM, but viral activity indicated by HBeAg status and viral load is not the main reason for this phenomenon. Further studies are warranted to clarify the possible mechanisms behind such association of HBV infection and the additional risk of GDM.\n\nKeywords: Gestational diabetes mellitus, Hepatitis B virus infection, Hepatitis B surface antigen, Viral load\n\nBackground\n\nHepatitis B virus (HBV) infection is a major public health problem worldwide [1, 2]. With approximately 2 billion HBV-infected individuals around the world, more than 350 million persons have chronic HBV infection [3]. The global prevalence of HBV infection varies widely [4, 5]. However, the majority of hepatitis B infection patients live in Asia and Africa [6]. China is a highly endemic region, almost one third of chronic HBV carriers can be found there. The third national serological survey in 2006 shows that the hepatitis B surface antigen\n\n(HBsAg) positivity rate of Chinese aged 1–59 years is 7.18% [7]. Consequently, up to 10% of pregnant women are identified as chronic hepatitis B carrier in the screening for HBsAg status during the antenatal checkup, resulting in persistent HBV transmission [8, 9].\n\n* Correspondence: [email protected]\n\nDepartment of Maternal and Child Health, School of Public Health, Tongji\n\nMedical College, Huazhong University of Science and Technology, 13th\n\nHangkong Road, Wuhan 430030, Hubei, China\n\nAt present, a few studies have reported that HBV infection indicated by positive HBsAg status had a direct impact on pregnancy outcomes, such as threatened preterm labor, preterm birth, low birthweight, macrosomia, antepartum hemorrhage, pregnancy-induced hypertension [10–14]. However, the underlying mechanisms behind these associations have not yet been elucidated. As for the relationship between maternal HBsAg carrier and gestational diabetes mellitus (GDM), it remains controversial. Several studies have reported that chronic\n\nOpen Access\n\nhepatitis B infection increased the risk of developing GDM [11, 15–17], and this result was confirmed by a latest study conducted by Lao et al. who performed a case-control study with 214 cases and 204 controls [18]. However, a meta-analysis by Kong et al. demonstrated that chronic hepatitis B surface antigenemia did not exert an additional risk for GDM in general population except Iranian [19]. Additionally, there are few studies that examined the effects of HBeAg status and maternal viral load in pregnancy on the development of GDM. In 2010, the new diagnostic criterion of GDM had been proposed due to associations between maternal hyperglycemia and adverse pregnancy outcomes [20]. Considering the high prevalence of chronic hepatitis B infection among pregnant women in China, it is extremely crucial to clarify whether or not HBsAg carrier status is associated with the risk of GDM.\n\nBased on above, the objective of our study is not only to identify the correlation between HBsAg carrier and GDM, but also explore whether HBeAg status and maternal viral load in the third trimester are associated with an increased risk of GDM among HBsAg-positive pregnant women.\n\nMethods\n\nStudy population\n\nIn the present study, the two groups of pregnant women including HBsAg-positive and HBsAg-negative mothers were recruited. HBsAg-positive pregnant women were from a pre-conception cohort in Wuhan which was designed to study the risk factors of HBV maternal-fetal transmission. HBsAg-positive pregnant women older than 20 who delivered from June 2012 to May 2016 were invited to participate in the cohort at Wuhan Medical Care Center for Women and Children, Wuhan, China. All HBsAg-positive women with singleton pregnancy and the complete results of oral glucose tolerance test (OGTT), who did not have current and previous medical complications (including HCV, HIV and Treponema pallidum infection), were assigned to HBsAg-positive group. A total of 964 HBsAg-positive women were eligible for the study (Fig. 1 ). Using the same criteria mentioned, the subjects of HBsAg-negative group were randomly chosen from electronic databases during the study period.\n\nThe present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. The written informed consent of all subjects had been obtained before participating the study.\n\nData collection and samples collection\n\nThe clinical records of the two groups were retrieved for data extraction. The demographic information, including age, height, prenatal weight, parity, history of abortion, ABO blood type, family history of diabetes, and OGTT results were obtained from clinical records. We adopted the IADPSG criterion to diagnose GDM, that is, the pregnant women were diagnosed with GDM during 24th -28th weeks of gestation when their OGTT results exceeded the following glucose values: fasting plasma glucose level > 5.1 mmol/L and/or 1-h plasma glucose level > 10 mmol/L and/or 2-h plasma glucose level > 8.5 mmol/L.\n\nFor all HBsAg-positive women, a venous blood sample had been collected in the third trimester once informed consent had been obtained. Blood samples were used to examine anti-HBsAg, HBeAg, anti-HBeAg, anti-HBcAg status and maternal viral load. Serum HBV markers were tested by enzyme-linked immune sorbent assay (Kehua Biotechnology, Shanghai, China). The hepatitis B viral load was quantified by fluorescence quantitative polymerase chain reaction (FQ-PCR) (Da'an Gene Co. Ltd., Sun Yat-Sen University, Guangdong, China). All procedures were performed strictly following the manufacturer's instructions.\n\nStatistical analysis\n\nIn univariate analyses, continuous variables were analyzed by Student's t-tests and categorical data were compared by chi-square tests. Stratified analyses were used to identify confounders and effect modifiers, and the Breslow-Day test was used <cursor_is_here> Odds ratios and 95% confidence intervals (CIs) were estimated using multivariable logistical regression to measure the association between maternal HBsAg status and GDM. The variables were chosen according to their statistical and clinical relevance. The stepwise (Wald) method was used in the multivariate logistic regression analysis. Statistical significance was assessed at the 5% level (two-tail test). All analyses were performed using SPSS software version 18.0 (SPSS, Chicago, IL, USA).\n\nResults\n\nA total of 964 HBsAg-positive women and 964 HBsAg-negative women, according with the inclusion criteria, were enrolled during June 2012 to May 2016. In this study, the highest proportion of missing data is 4.8% for prenatal BMI, and the missing proportion of age, prenatal weight, height, parity, ABO type, history of abortion and family history of diabetes were 0.6, 4.2, 2.8, 0.5, 1.5, 2.4 and 3.7%, respectively. Because the missing rates are small, we did not perform an additional process for the missing data. The maternal characteristics of the study population and the incidence of GDM are presented in Table 1. Compared with HBsAg-negative mothers, HBsAg-positive women had a significantly higher age, proportion of multiparas and history of abortion. But there was no significant difference in prenatal weight, height, or calculated body mass index (BMI) between mothers in HBsAg-positive group and those in HBsAg-negative group. Neither the distribution of ABO blood types nor family history of diabetes showed statistical difference in the two groups.\n\nThe present study found that HBsAg carriers were more likely to suffer from GDM as compared to\n\nTable 1 Maternal characteristics and incidence of GDM with respect to maternal HBsAg status\n\nAbbreviation: BMI Body mass index, GDM Gestational diabetes mellitus a Chi-square test for categorical variables\n\nHBsAg-negative women (16.5% vs 10.5%, P < 0.001, Table 1). To determine the interactions between each of known factors affecting the development of GDM and maternal HBsAg status, stratified analyses by HBsAg status were performed according to each of these factors, i.e. age ≥ or < 35 years, nullipara or multipara, the presence or absence of family history of diabetes, with or without history of abortion. As shown in Table 2, positive HBsAg status was associated with an increased risk of GDM in women aged < 35 years, having no family history of diabetes, with an odds ratio of 1.60(95% CI 1.19– 2.15) and 1.73(95% CI 1.27–2.23), respectively. Regardless of the parity and the status of history of abortion, positive HBsAg status exerted an additional risk for GDM and the differences reached statistical significance. However, when we used the Breslow-Day test to assess the homogeneity of the ORs for HBsAg carriage across each stratum of risk factors, no significant difference was seen in these stratification factors.\n\nIn univariate analyses, age and HBsAg carriage were associated with the increased incidence of GDM, with an OR value of 1.08(95% CI 1.04–1.11) and 1.67(95% CI 1.27–2.23), respectively. Family history of diabetes (OR 4.60, 95% CI 2.60–8.14) and history of abortion (OR 1.38, 95% CI 1.05–1.81) increased the incidence of GDM. But there was no significant difference in terms of parity and prenatal BMI between the mothers with GDM and those without. To determine whether HBsAg carriage was an independent risk factor for GDM, multivariable logistic regression analysis was performed,\n\nTable 2 Incidence of GDM with respect to HBsAg status in pregnant women, stratified by risk factors\n\na\n\nAbbreviation GDM\n\nOR\n\nCI\n\naP-values for interaction effect between each risk factor and HBsAg status on GDM:\n\nGestational diabetes mellitus, Odds ratio,\n\nConfidence interval adjusting for the confounding effects of other factors that were also found to be significantly different between the two groups (age, parity, history of abortion) or considered as classical risk factors of GDM in previous study (prenatal BMI, family history of diabetes). Age, prenatal BMI, parity as continuous variables and history of abortion, family history of diabetes as categorical variables were included in the multivariable logistic regression analysis. After adjustment for these associated covariates, a significant association of maternal HBsAg carriage with the increased risk of GDM was observed (OR 1.47, 95% CI 1.06 – 2.03) (Table 3 ). Simultaneously, significant associations between age as well as family history of diabetes and the increased risk of GDM were detected. However, there was no significant association between the risk for GDM and other factors including prenatal BMI, parity, history of abortion.\n\nHBeAg, HBcAg, did not show any significant association with the incidence of GDM. Among HBsAg-positive pregnant women, the distribution of viral load in third trimester were not significantly different in women with and without GDM.\n\nDiscussion\n\nIn the multivariable logistic regression analysis, the association between HBsAg carriage and the risk of GDM remained significant after adjustment for other covariates. Further analysis was performed to explore whether other HBV markers and maternal viral load were associated with the risk of GDM among HBsAg-positive pregnant women. As a result, no significant relationship was observed between HBeAg status and incidence of GDM among HBsAg carriers (data shown in Additional file 1: Tables S1). Similarly, the various antibodies to HBsAg,\n\nOur study found an independent effect of maternal HBsAg carriage on GDM, and noted pregnant women with HBV infection had an increased risk of GDM, confirming the findings of a previous study [15]. When maternal age was taken into account, maternal HBV infection increased the risk of GDM in the mothers younger than 35 years of age, similar to that exerted on pregnant women without family history of diabetes. When parity or history of abortion was examined, HBsAg carriage increased the risk of GDM in nulliparous or multiparous women, and similar results could be obtained in the women with or without history of abortion. Despite of no significant difference in Breslow-Day test, it can be speculated that there were interactions between maternal HBsAg carriage and other maternal factors, which resulted in various risk for GDM in pregnant women. The results of this study showed that the risk of GDM heightened with the increase of age. Additionally, our study also indicated that the incidence of GDM\n\nTable 3 Univariate and multivariate logistic regression analyses of factors related to GDM\n\nAbbreviation: OROdds ratio,CIConfidence interval\n\nincreased in the pregnancy women with higher age or family history of diabetes, implying that increasing age and genetic factor were the important contributors to the development of GDM [21].\n\nIn the few published studies regarding the effects of HBV infection on pregnancy outcomes, some reported a positive association between HBV infection and the risk of GDM [11, 15–18]. Among them, several retrospective studies done by Lao et al. suggested HBsAg carrier was significantly associated with gestational diabetes mellitus [15, 16]. Our present study demonstrated HBsAg-positive pregnant women were more likely to suffer from GDM (OR 1.43, 95%CI 1.01–2.02) compared with HBsAgnegative mothers. However, this result was contradicted by many others, which supported the hypothesis that women with HBV infection did not have extra risk for GDM [12–14, 22]. This inconsistent result could be related to ethnic difference. Because the prevalence of HBV infection and genetic background differ in various ethnic groups [23, 24]. This may affect the actual association of HBsAg carriage and the risk of GDM. Additionally, the present study adopted the IADPSG criterion, and then more pregnant women were diagnosed with GDM.\n\nAlthough some researchers noticed the correlation between HBV infection and GDM, and attempted to clarify the intrinsic links, the potential mechanism for this association is unclear. In addition, as shown in our study, different degree of viral activity indicated by HBeAg status and viral load in pregnancy could not explain the higher risk of GDM in HBV-infected women. Several previous reviews and reports established that the pathogenesis of GDM was related to insulin resistance associated with the chronic inflammatory state [25, 26]. In addition to the effects of the pregnancy itself, the factors involved in the inflammatory state were elevated levels of pro-inflammatory cytokines such as IL-2, IL-6, IL-10, and tumor necrosis factor-alpha (TNF-a), which can be accounted for by chronic HBV infection [27]. Second, some patients with HBV infection developed into liver fibrosis or cirrhosis, which has been identified as a cause of insulin resistance and glucose intolerance [28]. Third possible mechanism is the increased iron status caused by chronic HBV infection facilitates the development of GDM [16]. The main reason is that excess iron can affect insulin synthesis and secretion, facilitate oxidation of lipids and liver mediated insulin resistance [29, 30].\n\nThe strengths of the present study include the large number of subjects and the use of multivariable logistic regression analysis for adjusting potential confounding variables. Additionally, this study comprehensively explore the associations between HBV markers, viral load in pregnancy and GDM despite no statistically significant difference presented. However, the limitations of our study is also unavoidable. The first and most obvious limitation is that our study is a retrospective study that proved a positive correlation between HBsAg carrierage and GDM. But its capability of etiological inferences is limited. Therefore a large-scale prospective study on this causal relationship is needed. Second, we have only the data of prenatal maternal weight, and the pre-gravid maternal weight was missing in this study. Thereby we could not calculate the BMI before conception despite of its impact on the development of GDM. This might affect the authenticity of our results to a certain extent.\n\nConclusion\n\nHBV infection can lightly increase the incidence of GDM and viral activity may not be the main reason generating this phenomenon. In view of unknown pathophysiologic mechanism of GDM and high prevalence of HBV infection in certain regions, further research in this area should obviously be needed to explain our present epidemiological observation.\n\nAdditional file\n\nAdditional file 1: Table S1. The association between HBV markers, maternal viral load and GDM in HBsAg-positive pregnant women. (DOCX 19 kb)\n\nAbbreviations\n\nBMI: Body mass index; CI: Confidence interval; GDM: Gestational diabetes mellitus; HBeAg: Hepatitis B envelope antigen; HBsAg: Hepatitis B surface antigen; HBV: Hepatitis B virus; HCV: Hepatitis C virus; HIV: Human immunodeficiency virus; IADPSG: International Association of Diabetes and Pregnancy Study Groups; OGTT: Oral glucose tolerance test; OR: Odds ratio; TP: Treponema pallidum\n\nAcknowledgements\n\nWe are particularly grateful to subjects of this study. We also acknowledge the staff in Wuhan Women and Children Medical and Healthcare Center, Wuhan, China for their assistance.\n\nFunding\n\nThis work was funded by the National Natural Science Foundation of China, grant number (NSFC-81172678) and (NSFC-81573166). The funding body plays no role in the design of the study and collection, analysis, and interpretation of data and in writing the manuscript.\n\nAvailability of data and materials\n\nThe datasets used and/or analysed during the current study are available from the corresponding author Yukai Du on reasonable request.\n\nAuthors' contributions\n\nAll authors contributed significantly to this work. SP collected the data, did the statistical analysis, and drafted the initial manuscript. ZW and XL helped design the study, collected the data. XL assisted with data collection, revised the manuscript. YD designed the study, directed the statistical analysis, and reviewed the manuscript. All the authors listed have seen and approved the contents of the submitted manuscript. All the authors have agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.\n\nEthics approval and consent to participate\n\nThe present study was approved by the Institutional Review Board of Tongji Medical College, Huazhong University of Science and Technology. Written\n\ninformed consent of all subjects had been obtained before participating the study.\n\nConsent for publication\n\nNot applicable.\n\nCompeting interests\n\nThe authors declare that they have no competing interests.\n\nPublisher's Note\n\nSpringer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\nReceived: 8 March 2018 Accepted: 28 January 2019\n\nReferences\n\n1. Schweitzer A, Horn J, Mikolajczyk RT, Krause G, Ott JJ. Estimations of worldwide prevalence of chronic hepatitis B virus infection: a systematic review of data published between 1965 and 2013. Lancet. 2015;386(10003): 1546–55.\n2. Chen DS. Hepatitis B vaccination: the key towards elimination and eradication of hepatitis B. J Hepatol. 2009;50(4):805–16.\n3. Sarri G, Westby M, Bermingham S, Hill-Cawthorne G, Thomas H, Guideline Development Group. Diagnosis and management of chronic hepatitis B in children, young people, and adults: summary of NICE guidance. BMJ. 2013; 346:f3893.\n4. Liu J, Zhang S, Wang Q, Shen H, Zhang M, Zhang Y, Yan D, Liu M. Seroepidemiology of hepatitis B virus infection in 2 million men aged 21– 49 years in rural China: a population-based, cross-sectional study. Lancet Infect Dis. 2016;16(1):80–6.\n5. Te HS, Jensen DM. Epidemiology of hepatitis B and C viruses: a global overview. Clin Liver Dis. 2010;14(1):1–21.\n6. Ott JJ, Stevens GA, Groeger J, Wiersma ST. Global epidemiology of hepatitis B virus infection: new estimates of age-specific HBsAg seroprevalence and endemicity. Vaccine. 2012;30(12):2212–9.\n7. Shen L, Wang F, Wang F, Cui F, Zhang S, Zheng H, Zhang Y, Liang X, Bi S. Efficacy of yeast-derived recombinant hepatitis B vaccine after being used for 12 years in highly endemic areas in China. Vaccine. 2012;30(47):6623–7.\n8. Deng L, Li X, Shi Z, Jiang P, Chen D, Ma L. Maternal and perinatal outcome in cases of fulminant viral hepatitis in late pregnancy. Int J Gynaecol Obstet. 2012;119(2):145–8.\n9. Salemi JL, Whiteman VE, August EM, Chandler K, Mbah AK, Salihu HM. Maternal hepatitis B and hepatitis C infection and neonatal neurological outcomes. J Viral Hepat. 2014;21(11):e144–53.\n10. Connell LE, Salihu HM, Salemi JL, August EM, Weldeselasse H, Mbah AK. Maternal hepatitis B and hepatitis C carrier status and perinatal outcomes. Liver Int. 2011;31(8):1163–70.\n11. Tse KY, Ho LF, Lao T. The impact of maternal HBsAg carrier status on pregnancy outcomes: a case-control study. J Hepatol. 2005;43(5):771–5.\n12. Reddick KL, Jhaveri R, Gandhi M, James AH, Swamy GK. Pregnancy outcomes associated with viral hepatitis. J Viral Hepat. 2011;18(7):e394–8.\n\n13. Lao TT, Sahota DS, Suen SS, Law LW, Leung TY. Maternal HBsAg status and\n\n–\n\ninfant size--a Faustian bargain? J Viral Hepat. 2012;19(7):519 24.\n\n14. Lao TT, Sahota DS, Cheng YK, Law LW, Leung TY. Maternal hepatitis B surface antigen status and incidence of pre-eclampsia. J Viral Hepat. 2013; 20(5):343–9.\n15. Lao TT, Chan BC, Leung WC, Ho LF, Tse KY. Maternal hepatitis B infection and gestational diabetes mellitus. J Hepatol. 2007;47(1):46–50.\n16. Lao TT, Tse KY, Chan LY, Tam KF, Ho LF. HBsAg carrier status and the association between gestational diabetes with increased serum ferritin concentration in Chinese women. Diabetes Care. 2003;26(11):3011–6.\n17. Sirilert S, Traisrisilp K, Sirivatanapa P, Tongsong T. Pregnancy outcomes among chronic carriers of hepatitis B virus. Int J Gynaecol Obstet. 2014; 126(2):106–10.\n18. Lao TT, Chung MK, Cheung TK, Law LW. Antenatal hepatitis B and increased risk of gestational diabetes mellitus - implications for obstetric care. J Inf Secur. 2016;72(5):625–6.\n19. Kong D, Liu H, Wei S, Wang Y, Hu A, Han W, Zhao N, Lu Y, Zheng Y. A meta-analysis of the association between gestational diabetes mellitus and chronic hepatitis B infection during pregnancy. BMC Res Notes. 2014;7:139.\n20. International Association of Diabetes and Pregnancy Study Groups Consensus Panel, Metzger BE, Gabbe SG, Persson B, Buchanan TA, Catalano PA, Damm P, Dyer AR, Leiva A, et al. International association of diabetes and pregnancy study groups recommendations on the diagnosis and classification of hyperglycemia in pregnancy. Diabetes Care. 2010;33(3):676–82.\n21. Retnakaran R, Connelly PW, Sermer M, Zinman B, Hanley AJ. The impact of family history of diabetes on risk factors for gestational diabetes. Clin Endocrinol. 2007;67(5):754–60.\n22. Cui AM, Cheng XY, Shao JG, Li HB, Wang XL, Shen Y, Mao LJ, Zhang S, Liu HY, Zhang L, et al. Maternal hepatitis B virus carrier status and pregnancy outcomes: a prospective cohort study. BMC Pregnancy Childbirth. 2016; 16(1):87.\n23. Hedderson M, Ehrlich S, Sridhar S, Darbinian J, Moore S, Ferrara A. Racial/ ethnic disparities in the prevalence of gestational diabetes mellitus by BMI. Diabetes Care. 2012;35(7):1492–8.\n24. Strong C, Lee S, Tanaka M, Juon HS. Ethnic differences in prevalence and barriers of HBV screening and vaccination among Asian Americans. J Community Health. 2012;37(5):1071–80.\n25. Gomes CP, Torloni MR, Gueuvoghlanian-Silva BY, Alexandre SM, Mattar R, Daher S. Cytokine levels in gestational diabetes mellitus: a systematic review of the literature. Am J Reprod Immunol. 2013;69(6):545–57.\n26. Bossick AS, Peters RM, Burmeister C, Kakumanu N, Shill JE, Cassidy-Bushrow AE. Antenatal inflammation and gestational diabetes mellitus risk among pregnant African-American women. J Reprod Immunol. 2016;115:1–5.\n27. He D, Li M, Guo S, Zhu P, Huang H, Yan G, Wu Q, Tao S, Tan Z, Wang Y. Expression pattern of serum cytokines in hepatitis B virus infected patients with persistently normal alanine aminotransferase levels. J Clin Immunol. 2013;33(7):1240–9.\n28. Elkrief L, Rautou PE, Sarin S, Valla D, Paradis V, Moreau R. Diabetes mellitus in patients with cirrhosis: clinical implications and management. Liver Int. 2016;36(7):936–48.\n29. Simcox JA, McClain DA. Iron and diabetes risk. Cell Metab. 2013;17(3):329–41.\n30. Kim CH, Kim HK, Bae SJ, Park JY, Lee KU. Association of elevated serum ferritin concentration with insulin resistance and impaired glucose metabolism in Korean men and women. Metabolism. 2011;60(3):414–20.\n</text>\n",
"role": "user"
},
{
"content": "to assess the homogeneity of the odds ratios (ORs) for HBsAg carriage across each stratum of risk factors.",
"role": "assistant"
}
] |
EXTERIOR – DAY by George Malko
"This was just before we met." The small dining table was covered with piles of papers and faded manila folders clumsily stacked. Six years after her husband's death Johnny Luddin's mother finally went down to the basement and had the super bring up several boxes of old papers. She had been going through them for several days now, examining some, a few of them over and over, others put aside almost brusquely, with barely a glance. Or so it seemed to Johnny. What she wanted him to see was a black & white photograph, ornately crenelated around the edges; it was not a place, it was a picture of a group of men.
It took Johnny several moments to recognize his father among them. In the lower left corner of the photograph someone had diagonally written, "Mer Noire, 1934," in tiny, precise letters. It was Pyotr Mikhailovitch's handwriting and covered a patch of bare ground faded by time to look even paler. The men in the picture had been arranged on the few steps and veranda of an old house made of rough-hewn timbers. The photographer had backed up far enough to make sure everyone would be included. There was a small open area fanning out in front of all of them; it looked like a modest little apron. "Who are these people?" Johnny asked. "What was Papa doing with them?"
"A script," his mother said. "A revolutionary scenario. They were all writing it together."
Johnny laughed, then scrutinized the picture more intently. "That's crazy. All of them writing together? Why? Papa would never do that."
"He did it for the food," his mother said. "They were able to make it go on for months. In the mornings they swam."
© All Rights Reserved
There were other photographs in the thick brown folder, some Johnny recognized as having seen or been shown when he was younger. But most were unknown to him, curiosities, preserved faces his mother herself had difficulty identifying or even placing geographically. A few were quite remarkable. Most of them were mounted on stiff cardboard to create frames and borders. One such border was imprinted, in French.
"Photogr. des Theatres Imperiaux"
G. A. Fischer
Sankt Petersbourg
"I think this was when your father was first invited to study in the theater school," Johnny's mother said. "He was the youngest to have a serious audition. He was eight years old." The boy in the handsome school uniform solemnly staring out at Johnny did not look like anyone he knew, or had ever known.
There was another photograph, even more singular. It was of Pyotr Mikhailovitch in his teens. He still wore a school uniform, but the shiny buttons were gone. The tunic no longer had a handsome high collar and the sleeves were cuffless. The date on the picture was 1925. "I do not know where this is," Johnny's mother said.
In the photograph, Johnny's father sat on a wooden bench with his mother, his father, and another man of about the same age who resembled Johnny's grandfather. Johnny guessed it was an uncle. The adults sat on one part of the bench, aware of the camera, their looks in its direction clearly acknowledging its presence though their expressions were ill at ease, with something very polite, almost tolerant. They were letting the picture be taken. Johnny's father sat towards the other end of the bench. It was out-of-doors, a country setting, the weathered wooden wall of a hut or fence behind the group. Pyotr Mikhailovitch held a book, elbows propped on knees, and gave the book his full attention. He was partly turned away from the others. In his threadbare outfit, his eyes fixed on the pages he held, Johnny sensed his father's resentment. Pyotr Mikhailovitch, he understood, clearly wished to be elsewhere. Studying the face more closely, Johnny saw that his father was, at the age of sixteen, trying to grow a beard.
Johnny looked again at the Black Sea photograph taken in 1934 and saw that his father was beardless and much more cheerful even though almost everyone else in the picture seemed either sullen or solemn. Pyotr Mikhailovitch's inscription, though in French, didn't lighten the mood. "The Black Sea," Johnny's mother said over his shoulder. "Your father said parts of old Hollywood reminded him of Sochi."
"How?"
"Palm trees?" she suggested and then frowned. "Some of the architecture was ornate." She nodded to herself and the frown disappeared. "Yes, he said it was old and ornate." She spotted a face in the photograph and lightly rested the tip of her index finger on it. "This is ... yes, Lev Sovalin. He was your father's closest friend."
Surprised, Johnny peered more closely at the barely distinct countenance visible between the shoulders of others. "I never heard of him."
"Your father seldom mentioned his name. I think something happened to him." Johnny's mother cleared her throat, almost politely. Johnny understood. He did not have to ask what that "something" might have been. As ignorant as he was of the fate some had suffered, her words carried the same oblique pronouncement of doom he had heard before, about others. "Your father once told me Lev had encouraged him to leave."
"Maybe he helped him escape," Johnny said, and felt his breath suddenly quicken. Suddenly, he was close to a clue, a real clue.
"Your father did not have to make any escape," his mother replied, and then added the words Johnny had been hearing all his life: "He just left." It was so pointedly empty an explanation, it left Johnny with nothing to grasp, to force into
himself and make the vagueness of it all bearable. Meanwhile the question itself remained, became quickly fixed; with time, it became the central mystery of Johnny's life.
"But why, Mama?" Johnny found himself asking yet again. "He was known in Russia, his work was being recognized. Why would he walk away from doing what he loved?"
"Well," Johnny's mother began, her tone reasoned, as if calmly laying out the key points of a solid dissertation, "you know the restrictions which existed under the Soviets. And here—" she indicated the Black Sea photograph "—they went as much for their art as to be fed. No, with his ambitions, it would not have been impossible for him to make such a decision."
"But he loved Russia—he dreamed in Russian, thought in Russian." Johnny hesitated, wanting so desperately to know. "Mama," he pressed, "Papa prayed in Russian."
"Yes," his mother said quietly, nodding her head. "I will tell you what I think, what I have always believed. He never said this, but I think he always thought it would be temporary. A look at life in the West. Some work. His name achieving some recognition. And then home."
"Would you have gone with him?"
Johnny's mother nodded again, without any hesitation. "Of course. Wherever he went." She looked at her son and the faint traces of a smile touched her eyes and mouth. The smile faded and she gave a small shake of her head, not of dismissal but regret. "I have not thought of these things for a long time. I have never liked trying to speak of them." She scanned the papers and folders and photographs spread out on the dining table. "It is looking through this. I thought it would be easier." She turned without looking at her son and started for the door. "You must excuse me."
Johnny looked back at the group photograph, seeking some clue to their state of mind, their... what? Maybe they looked the way they did because some Moscow big shot wanted a photograph to show the Minister of Culture; maybe this was the way one was supposed to look when pretending collectively to produce a script. Maybe his mother was right. They were just hungry. He looked back at the papers and folders and manila envelopes strewn about on the table.
A pale blue folder caught his eye because it had the name of a movie studio embossed in the lower right-hand corner. Johnny opened it and found a prim sheet of vellum quality personal stationery, "Harry Remsher, Artists' Representative," in raised faded gold letters across the top, an address on Wilshire Boulevard below it. The typed letter was dated May 6, 1942. "Dear Pete:" it began, "They read it, for what that's worth, and the answer is 'No.'" It was from Pyotr Mikhailovitch's agent during the two fruitless years the family had lived in Hollywood; he was the one who had persuaded Johnny's father to change his name from Ludinev to Luddin. Peter Luddin. He thought it would help him get work. "They're all fools," the letter went on, "and of course I told them they are. They agreed you're the kind of class guy they should be working with, but on this particular movie they obviously are thinking about something else. God only knows what. Pete, you're brilliant, and about this you're probably right in some esthetic corner of your soul. But for our sake, yours and mine, don't embellish. Ever. Rewrite, but don't change. You know what I mean, so stop pulling your hair. I couldn't decide whether or not to share their comments with you and then figured what the hell, you're a pro, maybe it'll give you a slant on how to romance them next time. The point though is, don't ever take any of it personally. "Warmest, (this was written in pen) H.R.
"P.S. For what it's worth, I loved it. I understood it, I liked the people you wanted me to like, I was with them. I think you should finish it.
"P.P.S. I don't quite know what your real point is, but I really loved it." Under the agent's letter, Johnny found a smaller piece of paper engraved with a single raised initial, "D". The note, written by hand, was brief, and harsh. "You read this and sent it to me anyway? For Christ's sake, Harry, he moved it to some Russian city! What fucking good is that to me, please tell me? I am shooting up around Tahoe, it's going to look like Minnesota, and the Black Sea is full of foreigners. I was so stunned, I read the whole thing. I don't get it. What's it about? You promise me talent, I want talent. Talent, to me, is somebody who knows that a movie about two loveable lunks from Minnesota is not a movie about two intellectuals in Russia. I don't care about them and don't want to care about them. Screw the bastard who had to stay behind!"
Under this, Johnny found another note, a long one in his father's hand, along with several carbon copy pages of a screenplay, withered and going brown. They were held together by a rusted paper clip. Johnny's heart began beating rapidly, the ancient carbons rustling like husks as he separated them with frightened fingers. "Have you seen this?" he called out to his mother.
The tone of his voice made her appear in the doorway and she saw the folder Johnny held. "What is it?" Johnny held it up, the letter from the agent on top. Her gaze went to it and she saw and recognized the name on the stationery. "Hollywood," she said, and Johnny saw her body stiffen. "I am not interested in what those people had to say to your father."
"But this is Papa's writing." Johnny showed her his father's note, trying to keep calm.
"No," his mother said firmly. "They wasted his time, they insulted him." "So then you've seen this, you've read it."
"Not one word." For a moment Johnny thought this was just her old stubbornness, a glimpse of that personal but cold intractability she silently insisted was hers to invoke. But then he saw the angry set of her mouth, her lips compressed, something making them go rigid. Anger flared in her eyes as well, and with it Johnny saw and began to understand the resentment; it was as if once, so long ago, she had said nothing when her husband had been flayed by the futility of trying to satisfy the unwritten rules of a business that had absolutely no interest in who he was, or what he had ever done. Hollywood had forced Pyotr Mikhailovitch to see that he lacked any significance. His widow was still furious with them both, the film community for doing it with such silky indifference, her beloved husband for allowing it to be done to him, even for one moment. When his mother turned and left again, Johnny said nothing.
His father's note, he immediately understood, had been intended as a memorandum to the producer, "D":
Most in the group you will meet are not bound to one another by any particular sentiment. They are not a "band of brothers." Simple good luck (and a bit of clever intriguing) has brought them to this oasis. Art doesn't unite them. It is ambition. So think of them (even the two who genuinely are friends) more as ... frolicking musketeers. Oleg has something of Athos, or Porthos (endearing flamboyance with a dark side, the young drinker already brooding). Misha is a convenient d'Artagnan; he is more d'Artagnan's first cousin, forever nameless. Let us remember, as we think of the film we wish SUMMER to be, that the musketeers never openly betrayed one another. Their fate--those truly close--was to break one another's hearts. I am very enthusiastic.
Beneath the memorandum, the first of the surviving screenplay pages was numbered "8". Johnny began to read.
EXTERIOR/SOCHI - DAY
We are in this legendary seaport and resort city on the shores of the Black Sea. The sun is bright and very warm. There are palm trees.
Men in open-necked white shirts and women in loose summer dresses promenade. Deserving workers of the State on holiday, they are clearly enjoying themselves.
OLEG
comes out of the dim doorway of a featureless office building. He wears his only
8
jacket over his wrinkled white shirt. Both jacket and shirt are drenched in sweat.
Oleg stops to take off the jacket, but first takes a crumpled piece of paper out of his jacket pocket--he has looked at it already, he knows what is written on it.
He slings the jacket over his shoulder and heads down the street. Near the corner a man has stopped to light a cigarette. Oleg stops before him and indicates he would like a light, too.
The man holds the burning match out. Oleg ignites the piece of paper, nods a thank you, and walks off, the paper burning up in his hand.
INTERIOR/BEDROOM - DAY
In the tiny room, a battered dresser with no bottom drawer stands between two cots.
Oleg has the top drawer open and rummages through it. He still wears his good pants but is shirtless, his undershirt gray with old and new sweat.
MISHA'S VOICE
My clean shirt, for your information, is hanging up to dry.
Oleg turns. Apprehension flickers for a moment in his eyes.
MISHA
leans against the doorframe, a comb in one hand, scissors in the other.
MISHA Should I grow a beard again?
Absolutely.
OLEG
Misha crosses to toss comb and scissors into the still-open drawer, which he then closes.
MISHA
How did the "interview" go? What did they ask about? Let me guess: "Who is drinking too much?" "Who is talking too much?"
Johnny stopped reading. What he was holding had to be autobiographical— Sochi, the two friends. So which one of them is my father? There were no physical descriptions. Except for mention of a beard. Had his father ever worn one? Misha or
Oleg? The dialogue would have to do it.
MISHA
How did the "interview" go? What did they ask about? Let me guess: "Who is drinking too much?" "Who is talking too much?"
OLEG
"Who is eating too much?"
(delighted)
MISHA
Really?
OLEG
"Is anyone religious?"
MISHA
I hope you told them I pray regularly. Daily. Twice. Morning and evening.
OLEG
They would not believe me.
MISHA
No interest in our work?
OLEG
"Who is doing little or no work?"
(rewarded)
MISHA
Ahh ...
OLEG
"Who is doing too much?"
MISHA
Idiots. I thought it was our French visitors that were making them nervous.
OLEG
Well, yes ... they want us to keep an eye on them.
(a tiny hesitation)
MISHA
Did you tell them we are, you and I in particular? At least on Juliette.
OLEG
I do not think that is what they had in mind.
MISHA
What they have in mind is a mystery, my dear friend.
He goes over to perch on the window sill and looks out.
OLEG
Misha ...
(almost a warning—)
But his friend has seen something.
MISHA
(turns)
She is swimming nude again.
I hope you did not tell them she does that often.
OLEG
They already knew.
Misha collapses with laughter. After a moment, he partially recovers.
MISHA
So, what do you think they really wanted?
(still grinning)
He looks questioningly at his friend.
Johnny stopped and reread the last few speeches. Misha was his father. Whether there had ever been a French woman in his life was immaterial. The rhetoric, the sense of almost tender contempt, the implicit irony. There was no question about it. Pyotr Mikhailovitch was Misha.
EXTERIOR/THE MAIN CABIN - EVENING
Young people make their way along the birch-lined path.
On the broad cabin veranda some sit, handing around a bottle of wine. Oleg and Misha are to one side, JULIETTE standing on the ground before them.
JULIETTE
I want to wear something special.
(French accent)
She touches Misha's hand and smiles warmly at him before hurrying off. Misha sighs happily.
OLEG
Misha ... be careful.
MISHA
They leave tomorrow. Tonight I intend to be happy.
OLEG
You are always happy.
He rises and crosses to secure one of the bottles--not wine, vodka. He returns, swigging deeply, and offers the bottle to Misha, who gives a shake of his head.
MISHA
Not tonight. I do not need it.
I do.
OLEG
Johnny's father always had something to offer guests, usually a bottle of vodka waiting in the freezer, flavored with translucent peels of lemon or orange which Pyotr Mikhailovitch methodically removed from the fruit with a very sharp knife and then slipped into the neck of the bottle. He sometimes let Johnny put in a peel. Together they would watch it glide down and settle into the clear liquid. Pyotr Mikhailovitch himself seldom drank, except for an occasional glass of wine.
(quietly)
MISHA
Oleg ... tomorrow they are gone! Who here cares? Who is watching? You, maybe. And you are too busy to watch.
Misha—
OLEG
MISHA
Hear me out, dear friend. All of us have been asked to watch this or that. We nod, and do nothing.
OLEG
It is not just the French they want me to watch.
He takes another swallow. This time Misha watches, sensing something.
Who?
MISHA
OLEG
They made it very objective. No one person singled out.
At random ...
MISHA
OLEG
I stuck my hand into a bowl and pulled out a name.
One of us?
MISHA
He waits until Oleg has to nod.
MISHA (CONTD)
What if you had chosen your own?
OLEG
What a stupid system ...
They told me mine was the only one left out. (clearly distressed)
He takes another drink.
So?
MISHA
OLEG
Misha, for God's sake! Don't you understand?
MISHA
(a quizzical pause)
Me?
He begins to laugh.
MISHA (CONTD)
How sublime! You may as well have chosen yourself.
HOLD ON his face as he roars with laughter.
INTERIOR/THE MAIN CABIN - NIGHT
Smoky, crowded, people at several tables eating noisily.
AT ONE TABLE
Oleg sits catty-corner with Misha, Juliette to Misha's left. Oleg is leaning over, voice low but intense, talking to Misha, hand clutching a full vodka glass, his face red.
OLEG
All they suggested was you might have "ambitions."
MISHA
I assume you laughed.
OLEG
(pauses, clearly uncertain)
I said your ambitions are artistic, creative.
—Like mine.
MISHA
They make you the authority on me.
(grown thoughtful)
Oleg suddenly grabs Misha's hand, spilling vodka.
OLEG
You watch, you will be asked about somebody, too.
MISHA
It should be you. Forget the bowl. You watch me, I watch you. It would make things so simple.
OLEG
I am not "watching" you!
The words hang in the silence between them.
EXTERIOR/NEAR THE SMALLER CABINS - NIGHT
A full moon hangs over the still waters. MISHA
fills a wooden bucket at the shore and heads back towards
THE SMALL SAUNA
in a grove of birch trees, smoke curling from its chimney.
INTERIOR/THE SAUNA - NIGHT
Oleg sits on one of the top benches, stripped to the waist, weakly slapping at himself
with a birch branch.
Misha comes in, pulls off his own shirt, and throws water on
HOT ROCKS
which send up clouds of dense steam.
Oleg shrinks into himself with discomfort, muzzily shaking his head.
OLEG
Ayii — it's scalding!
He looks around, as if recognizing his surroundings.
OLEG (CONTD)
Where are the girls?
Asleep hours ago.
MISHA
OLEG
(rising unsteadily)
Me, too ...
Misha's hand slows him.
MISHA Oleg, are you going to watch me tomorrow?
OLEG
It was out of a bowl! You will see. Next week you will have your own bowl.
MISHA
No. This one was for you.
(shakes his head)
(sees Oleg's confusion)
They know we are friends. Close friends.
OLEG
The closest. Brothers, almost.
(reaffirming it)
MISHA
They want that. You, to watch me.
OLEG
It could have been ... anyone!
No. Only me.
MISHA
—The bowl ...
OLEG
MISHA
All mine. The only name in it.
OLEG
No—!
(suddenly devastated)
And knows it is true, has to be true.
MISHA
Did they threaten you? Tell me, what if you have nothing to report about me? Absolutely nothing.
(after a moment)
OLEG
They would not believe me.
(sad cunning)
MISHA
And—a for instance—if I do disappear...
OLEG
They will be furious.
Misha gets up and pours more water onto the rocks. They steam heavily, obscuring the small room.
MISHA
It will satisfy them, though. Confirm their suspicions.
OLEG
They would kill me.
Misha comes over and sits down next to his friend.
MISHA
I do not think so. Not if you rush to them shouting, "You were right! You were so right!"
There is a silence, and then Oleg lifts his head to stare through the steam at his friend.
OLEG
away?
My God ... Misha ... Are you thinking of trying to go
MISHA
The thought had never entered my mind.
Oleg sighs with obvious relief, and then crosses himself. His eyes close. He sits back. He hears more water splash onto the hot rocks. Steam obscures him momentarily.
He reappears, his face wet with steam and perspiration. He wipes it. His eyes open.
OLEG
We will just have to be careful. Very, very careful.
There is no answer.
Yes, Misha?
He looks around.
THE STEAM
in the small room is dense. It is not settling.
Oleg rises, leaning on a wall to balance himself.
Misha—?
OLEG (CONTD)
From his face, a look of alarm slowly appearing on it, we —
EXTERIOR/A CRUISE SHIP - DAY
The ship sails along the coastline of the Black Sea.
EXTERIOR/ON DECK - DAY
Juliette stands at the rail, staring across the water. Something makes her turn.
MISHA
stands nearby, looking at her.
JULIETTE
(French accent)
OLEG (CONTD)
DISSOLVE TO:
You came!
She is immediately at his side, clutching his arm to gaze at him adoringly.
JULIETTE (CONTD) How long can you stay with us?
Misha turns and looks at the distant shore.
Ask me tomorrow.
MISHA
JULIETTE
Tomorrow we will be in Istanbul.
MISHA
After I take you to lunch in Istanbul. Ask me then.
JULIETTE
What shall we do now?
Hide ...
MISHA
There the pages ended.
Johnny reread them slowly, his hands trembling as he tried to absorb the stunning truth he held. He took the photograph and went over to the window, where the light was better, and found Sovalin's face. It seemed more discernible now. Very ordinary, there was nothing unusual about it. It was just a face, seen between two other heads. One of Sovalin's shoulders was visible, someone's hand on it. Johnny followed the dim shadowy form of the hand and arm. It was his father's, resting on his best friend's shoulder.
|
<urn:uuid:ad4f4563-4481-43d3-bfed-5f3152e37e4f>
|
CC-MAIN-2017-34
|
http://georgemalko.com/images/Exterior-Day_GeorgeMalko.pdf
|
2017-08-22T12:42:59Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110774.86/warc/CC-MAIN-20170822123737-20170822143737-00310.warc.gz
| 175,867,747
| 5,615
|
eng_Latn
|
eng_Latn
| 0.999631
|
eng_Latn
| 0.999759
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1687,
3825,
5495,
7704,
10154,
12016,
13392,
14958,
15716,
16840,
18051,
18766,
19888,
20689,
21592,
22483,
23386
] |
EXTERIOR – DAY by George Malko
"This was just before we met." The small dining table was covered with piles of papers and faded manila folders clumsily stacked. Six years after her husband's death Johnny Luddin's mother finally went down to the basement and had the super bring up several boxes of old papers. She had been going through them for several days now, examining some, a few of them over and over, others put aside almost brusquely, with barely a glance. Or so it seemed to Johnny. What she wanted him to see was a black & white photograph, ornately crenelated around the edges; it was not a place, it was a picture of a group of men.
It took Johnny several moments to recognize his father among them. In the lower left corner of the photograph someone had diagonally written, "Mer Noire, 1934," in tiny, precise letters. It was Pyotr Mikhailovitch's handwriting and covered a patch of bare ground faded by time to look even paler. The men in the picture had been arranged on the few steps and veranda of an old house made of rough-hewn timbers. The photographer had backed up far enough to make sure everyone would be included. There was a small open area fanning out in front of all of them; it looked like a modest little apron. "Who are these people?" Johnny asked. "What was Papa doing with them?"
"A script," his mother said. "A revolutionary scenario. They were all writing it together."
Johnny laughed, then scrutinized the picture more intently. "That's crazy. All of them writing together? Why? Papa would never do that."
"He did it for the food," his mother said. "They were able to make it go on for months. In the mornings they swam."
© All Rights Reserved
There were other photographs in the thick brown folder, some Johnny recognized as having seen or been shown when he was younger. But most were unknown to him, curiosities, preserved faces his mother herself had difficulty identifying or even placing geographically. A few were quite remarkable. Most of them were mounted on stiff cardboard to create frames and borders. One such border was imprinted, in French.
"Photogr. des Theatres Imperiaux"
G. A. Fischer
Sankt Petersbourg
"I think this was when your father was first invited to study in the theater school," Johnny's mother said. "He was the youngest to have a serious audition. He was eight years old." The boy in the handsome school uniform solemnly staring out at Johnny did not look like anyone he knew, or had ever known.
There was another photograph, even more singular. It was of Pyotr Mikhailovitch in his teens. He still wore a school uniform, but the shiny buttons were gone. The tunic no longer had a handsome high collar and the sleeves were cuffless. The date on the picture was 1925. "I do not know where this is," Johnny's mother said.
In the photograph, Johnny's father sat on a wooden bench with his mother, his father, and another man of about the same age who resembled Johnny's grandfather. Johnny guessed it was an uncle. The adults sat on one part of the bench, aware of the camera, their looks in its direction clearly acknowledging its presence though their expressions were ill at ease, with something very polite, almost tolerant. They were letting the picture be taken. Johnny's father sat towards the other end of the bench. It was out-of-doors, a country setting, the weathered wooden wall of a hut or fence behind the group. Pyotr Mikhailovitch held a book, elbows propped on knees, and gave the book his full attention. He was partly turned away from the others. In his threadbare outfit, his eyes fixed on the pages he held, Johnny sensed his father's resentment. Pyotr Mikhailovitch, he understood, clearly wished to be elsewhere. Studying the face more closely, Johnny saw that his father was, at the age of sixteen, trying to grow a beard.
Johnny looked again at the Black Sea photograph taken in 1934 and saw that his father was beardless and much more cheerful even though almost everyone else in the picture seemed either sullen or solemn. Pyotr Mikhailovitch's inscription, though in French, didn't lighten the mood. "The Black Sea," Johnny's mother said over his shoulder. "Your father said parts of old Hollywood reminded him of Sochi."
"How?"
"Palm trees?" she suggested and then frowned. "Some of the architecture was ornate." She nodded to herself and the frown disappeared. "Yes, he said it was old and ornate." She spotted a face in the photograph and lightly rested the tip of her index finger on it. "This is ... yes, Lev Sovalin. He was your father's closest friend."
Surprised, Johnny peered more closely at the barely distinct countenance visible between the shoulders of others. "I never heard of him."
"Your father seldom mentioned his name. I think something happened to him." Johnny's mother cleared her throat, almost politely. Johnny understood. He did not have to ask what that "something" might have been. As ignorant as he was of the fate some had suffered, her words carried the same oblique pronouncement of doom he had heard before, about others. "Your father once told me Lev had encouraged him to leave."
"Maybe he helped him escape," Johnny said, and felt his breath suddenly quicken. Suddenly, he was close to a clue, a real clue.
"Your father did not have to make any escape," his mother replied, and then added the words Johnny had been hearing all his life: "He just left." It was so pointedly empty an explanation, it left Johnny with nothing to grasp, to force into
himself and make the vagueness of it all bearable. Meanwhile the question itself remained, became quickly fixed; with time, it became the central mystery of Johnny's life.
"But why, Mama?" Johnny found himself asking yet again. "He was known in Russia, his work was being recognized. Why would he walk away from doing what he loved?"
"Well," Johnny's mother began, her tone reasoned, as if calmly laying out the key points of a solid dissertation, "you know the restrictions which existed under the Soviets. And here—" she indicated the Black Sea photograph "—they went as much for their art as to be fed. No, with his ambitions, it would not have been impossible for him to make such a decision."
"But he loved Russia—he dreamed in Russian, thought in Russian." Johnny hesitated, wanting so desperately to know. "Mama," he pressed, "Papa prayed in Russian."
"Yes," his mother said quietly, nodding her head. "I will tell you what I think, what I have always believed. He never said this, but I think he always thought it would be temporary. A look at life in the West. Some work. His name achieving some recognition. And then home."
"Would you have gone with him?"
Johnny's mother nodded again, without any hesitation. "Of course. Wherever he went." She looked at her son and the faint traces of a smile touched her eyes and mouth. The smile faded and she gave a small shake of her head, not of dismissal but regret. "I have not thought of these things for a long time. I have never liked trying to speak of them." She scanned the papers and folders and photographs spread out on the dining table. "It is looking through this. I thought it would be easier." She turned without looking at her son and started for the door. "You must excuse me."
Johnny looked back at the group photograph, seeking some clue to their state of mind, their... what? Maybe they looked the way they did because some Moscow big shot wanted a photograph to show the Minister of Culture; maybe this was the way one was supposed to look when pretending collectively to produce a script. Maybe his mother was right. They were just hungry. He looked back at the papers and folders and manila envelopes strewn about on the table.
A pale blue folder caught his eye because it had the name of a movie studio embossed in the lower right-hand corner. Johnny opened it and found a prim sheet of vellum quality personal stationery, "Harry Remsher, Artists' Representative," in raised faded gold letters across the top, an address on Wilshire Boulevard below it. The typed letter was dated May 6, 1942. "Dear Pete:" it began, "They read it, for what that's worth, and the answer is 'No.'" It was from Pyotr Mikhailovitch's agent during the two fruitless years the family had lived in Hollywood; he was the one who had persuaded Johnny's father to change his name from Ludinev to Luddin. Peter Luddin. He thought it would help him get work. "They're all fools," the letter went on, "and of course I told them they are. They agreed you're the kind of class guy they should be working with, but on this particular movie they obviously are thinking about something else. God only knows what. Pete, you're brilliant, and about this you're probably right in some esthetic corner of your soul. But for our sake, yours and mine, don't embellish. Ever. Rewrite, but don't change. You know what I mean, so stop pulling your hair. I couldn't decide whether or not to share their comments with you and then figured what the hell, you're a pro, maybe it'll give you a slant on how to romance them next time. The point though is, don't ever take any of it personally. "Warmest, (this was written in pen) H.R.
"P.S. For what it's worth, I loved it. I understood it, I liked the people you wanted me to like, I was with them. I think you should finish it.
"P.P.S. I don't quite know what your real point is, but I really loved it." Under the agent's letter, Johnny found a smaller piece of paper engraved with a single raised initial, "D". The note, written by hand, was brief, and harsh. "You read this and sent it to me anyway? For Christ's sake, Harry, he moved it to some Russian city! What fucking good is that to me, please tell me? I am shooting up around Tahoe, it's going to look like Minnesota, and the Black Sea is full of foreigners. I was so stunned, I read the whole thing. I don't get it. What's it about? You promise me talent, I want talent. Talent, to me, is somebody who knows that a movie about two loveable lunks from Minnesota is not a movie about two intellectuals in Russia. I don't care about them and don't want to care about them. Screw the bastard who had to stay behind!"
Under this, Johnny found another note, a long one in his father's hand, along with several carbon copy pages of a screenplay, withered and going brown. They were held together by a rusted paper clip. Johnny's heart began beating rapidly, the ancient carbons rustling like husks as he separated them with frightened fingers. "Have you seen this?" he called out to his mother.
The tone of his voice made her appear in the doorway and she saw the folder Johnny held. "What is it?" Johnny held it up, the letter from the agent on top. Her gaze went to it and she saw and recognized the name on the stationery. "Hollywood," she said, and Johnny saw her body stiffen. "I am not interested in what those people had to say to your father."
"But this is Papa's writing." Johnny showed her his father's note, trying to keep calm.
"No," his mother said firmly. "They wasted his time, they insulted him." "So then you've seen this, you've read it."
"Not one word." For a moment Johnny thought this was just her old stubbornness, a glimpse of that personal but cold intractability she silently insisted was hers to invoke. But then he saw the angry set of her mouth, her lips compressed, something making them go rigid. Anger flared in her eyes as well, and with it Johnny saw and began to understand the resentment; it was as if once, so long ago, she had said nothing when her husband had been flayed by the futility of trying to satisfy the unwritten rules of a business that had absolutely no interest in who he was, or what he had ever done. Hollywood had forced Pyotr Mikhailovitch to see that he lacked any significance. His widow was still furious with them both, the film community for doing it with such silky indifference, her beloved husband for allowing it to be done to him, even for one moment. When his mother turned and left again, Johnny said nothing.
His father's note, he immediately understood, had been intended as a memorandum to the producer, "D":
Most in the group you will meet are not bound to one another by any particular sentiment. They are not a "band of brothers." Simple good luck (and a bit of clever intriguing) has brought them to this oasis. Art doesn't unite them. It is ambition. So think of them (even the two who genuinely are friends) more as ... frolicking musketeers. Oleg has something of Athos, or Porthos (endearing flamboyance with a dark side, the young drinker already brooding). Misha is a convenient d'Artagnan; he is more d'Artagnan's first cousin, forever nameless. Let us remember, as we think of the film we wish SUMMER to be, that the musketeers never openly betrayed one another. Their fate--those truly close--was to break one another's hearts. I am very enthusiastic.
Beneath the memorandum, the first of the surviving screenplay pages was numbered "8". Johnny began to read.
EXTERIOR/SOCHI - DAY
We are in this legendary seaport and resort city on the shores of the Black Sea. The sun is bright and very warm. There a
|
re palm trees.
|
Men in open-necked white shirts and women in loose summer dresses promenade. Deserving workers of the State on holiday, they are clearly enjoying themselves.
OLEG
comes out of the dim doorway of a featureless office building. He wears his only
8
jacket over his wrinkled white shirt. Both jacket and shirt are drenched in sweat.
Oleg stops to take off the jacket, but first takes a crumpled piece of paper out of his jacket pocket--he has looked at it already, he knows what is written on it.
He slings the jacket over his shoulder and heads down the street. Near the corner a man has stopped to light a cigarette. Oleg stops before him and indicates he would like a light, too.
The man holds the burning match out. Oleg ignites the piece of paper, nods a thank you, and walks off, the paper burning up in his hand.
INTERIOR/BEDROOM - DAY
In the tiny room, a battered dresser with no bottom drawer stands between two cots.
Oleg has the top drawer open and rummages through it. He still wears his good pants but is shirtless, his undershirt gray with old and new sweat.
MISHA'S VOICE
My clean shirt, for your information, is hanging up to dry.
Oleg turns. Apprehension flickers for a moment in his eyes.
MISHA
leans against the doorframe, a comb in one hand, scissors in the other.
MISHA Should I grow a beard again?
Absolutely.
OLEG
Misha crosses to toss comb and scissors into the still-open drawer, which he then closes.
MISHA
How did the "interview" go? What did they ask about? Let me guess: "Who is drinking too much?" "Who is talking too much?"
Johnny stopped reading. What he was holding had to be autobiographical— Sochi, the two friends. So which one of them is my father? There were no physical descriptions. Except for mention of a beard. Had his father ever worn one? Misha or
Oleg? The dialogue would have to do it.
MISHA
How did the "interview" go? What did they ask about? Let me guess: "Who is drinking too much?" "Who is talking too much?"
OLEG
"Who is eating too much?"
(delighted)
MISHA
Really?
OLEG
"Is anyone religious?"
MISHA
I hope you told them I pray regularly. Daily. Twice. Morning and evening.
OLEG
They would not believe me.
MISHA
No interest in our work?
OLEG
"Who is doing little or no work?"
(rewarded)
MISHA
Ahh ...
OLEG
"Who is doing too much?"
MISHA
Idiots. I thought it was our French visitors that were making them nervous.
OLEG
Well, yes ... they want us to keep an eye on them.
(a tiny hesitation)
MISHA
Did you tell them we are, you and I in particular? At least on Juliette.
OLEG
I do not think that is what they had in mind.
MISHA
What they have in mind is a mystery, my dear friend.
He goes over to perch on the window sill and looks out.
OLEG
Misha ...
(almost a warning—)
But his friend has seen something.
MISHA
(turns)
She is swimming nude again.
I hope you did not tell them she does that often.
OLEG
They already knew.
Misha collapses with laughter. After a moment, he partially recovers.
MISHA
So, what do you think they really wanted?
(still grinning)
He looks questioningly at his friend.
Johnny stopped and reread the last few speeches. Misha was his father. Whether there had ever been a French woman in his life was immaterial. The rhetoric, the sense of almost tender contempt, the implicit irony. There was no question about it. Pyotr Mikhailovitch was Misha.
EXTERIOR/THE MAIN CABIN - EVENING
Young people make their way along the birch-lined path.
On the broad cabin veranda some sit, handing around a bottle of wine. Oleg and Misha are to one side, JULIETTE standing on the ground before them.
JULIETTE
I want to wear something special.
(French accent)
She touches Misha's hand and smiles warmly at him before hurrying off. Misha sighs happily.
OLEG
Misha ... be careful.
MISHA
They leave tomorrow. Tonight I intend to be happy.
OLEG
You are always happy.
He rises and crosses to secure one of the bottles--not wine, vodka. He returns, swigging deeply, and offers the bottle to Misha, who gives a shake of his head.
MISHA
Not tonight. I do not need it.
I do.
OLEG
Johnny's father always had something to offer guests, usually a bottle of vodka waiting in the freezer, flavored with translucent peels of lemon or orange which Pyotr Mikhailovitch methodically removed from the fruit with a very sharp knife and then slipped into the neck of the bottle. He sometimes let Johnny put in a peel. Together they would watch it glide down and settle into the clear liquid. Pyotr Mikhailovitch himself seldom drank, except for an occasional glass of wine.
(quietly)
MISHA
Oleg ... tomorrow they are gone! Who here cares? Who is watching? You, maybe. And you are too busy to watch.
Misha—
OLEG
MISHA
Hear me out, dear friend. All of us have been asked to watch this or that. We nod, and do nothing.
OLEG
It is not just the French they want me to watch.
He takes another swallow. This time Misha watches, sensing something.
Who?
MISHA
OLEG
They made it very objective. No one person singled out.
At random ...
MISHA
OLEG
I stuck my hand into a bowl and pulled out a name.
One of us?
MISHA
He waits until Oleg has to nod.
MISHA (CONTD)
What if you had chosen your own?
OLEG
What a stupid system ...
They told me mine was the only one left out. (clearly distressed)
He takes another drink.
So?
MISHA
OLEG
Misha, for God's sake! Don't you understand?
MISHA
(a quizzical pause)
Me?
He begins to laugh.
MISHA (CONTD)
How sublime! You may as well have chosen yourself.
HOLD ON his face as he roars with laughter.
INTERIOR/THE MAIN CABIN - NIGHT
Smoky, crowded, people at several tables eating noisily.
AT ONE TABLE
Oleg sits catty-corner with Misha, Juliette to Misha's left. Oleg is leaning over, voice low but intense, talking to Misha, hand clutching a full vodka glass, his face red.
OLEG
All they suggested was you might have "ambitions."
MISHA
I assume you laughed.
OLEG
(pauses, clearly uncertain)
I said your ambitions are artistic, creative.
—Like mine.
MISHA
They make you the authority on me.
(grown thoughtful)
Oleg suddenly grabs Misha's hand, spilling vodka.
OLEG
You watch, you will be asked about somebody, too.
MISHA
It should be you. Forget the bowl. You watch me, I watch you. It would make things so simple.
OLEG
I am not "watching" you!
The words hang in the silence between them.
EXTERIOR/NEAR THE SMALLER CABINS - NIGHT
A full moon hangs over the still waters. MISHA
fills a wooden bucket at the shore and heads back towards
THE SMALL SAUNA
in a grove of birch trees, smoke curling from its chimney.
INTERIOR/THE SAUNA - NIGHT
Oleg sits on one of the top benches, stripped to the waist, weakly slapping at himself
with a birch branch.
Misha comes in, pulls off his own shirt, and throws water on
HOT ROCKS
which send up clouds of dense steam.
Oleg shrinks into himself with discomfort, muzzily shaking his head.
OLEG
Ayii — it's scalding!
He looks around, as if recognizing his surroundings.
OLEG (CONTD)
Where are the girls?
Asleep hours ago.
MISHA
OLEG
(rising unsteadily)
Me, too ...
Misha's hand slows him.
MISHA Oleg, are you going to watch me tomorrow?
OLEG
It was out of a bowl! You will see. Next week you will have your own bowl.
MISHA
No. This one was for you.
(shakes his head)
(sees Oleg's confusion)
They know we are friends. Close friends.
OLEG
The closest. Brothers, almost.
(reaffirming it)
MISHA
They want that. You, to watch me.
OLEG
It could have been ... anyone!
No. Only me.
MISHA
—The bowl ...
OLEG
MISHA
All mine. The only name in it.
OLEG
No—!
(suddenly devastated)
And knows it is true, has to be true.
MISHA
Did they threaten you? Tell me, what if you have nothing to report about me? Absolutely nothing.
(after a moment)
OLEG
They would not believe me.
(sad cunning)
MISHA
And—a for instance—if I do disappear...
OLEG
They will be furious.
Misha gets up and pours more water onto the rocks. They steam heavily, obscuring the small room.
MISHA
It will satisfy them, though. Confirm their suspicions.
OLEG
They would kill me.
Misha comes over and sits down next to his friend.
MISHA
I do not think so. Not if you rush to them shouting, "You were right! You were so right!"
There is a silence, and then Oleg lifts his head to stare through the steam at his friend.
OLEG
away?
My God ... Misha ... Are you thinking of trying to go
MISHA
The thought had never entered my mind.
Oleg sighs with obvious relief, and then crosses himself. His eyes close. He sits back. He hears more water splash onto the hot rocks. Steam obscures him momentarily.
He reappears, his face wet with steam and perspiration. He wipes it. His eyes open.
OLEG
We will just have to be careful. Very, very careful.
There is no answer.
Yes, Misha?
He looks around.
THE STEAM
in the small room is dense. It is not settling.
Oleg rises, leaning on a wall to balance himself.
Misha—?
OLEG (CONTD)
From his face, a look of alarm slowly appearing on it, we —
EXTERIOR/A CRUISE SHIP - DAY
The ship sails along the coastline of the Black Sea.
EXTERIOR/ON DECK - DAY
Juliette stands at the rail, staring across the water. Something makes her turn.
MISHA
stands nearby, looking at her.
JULIETTE
(French accent)
OLEG (CONTD)
DISSOLVE TO:
You came!
She is immediately at his side, clutching his arm to gaze at him adoringly.
JULIETTE (CONTD) How long can you stay with us?
Misha turns and looks at the distant shore.
Ask me tomorrow.
MISHA
JULIETTE
Tomorrow we will be in Istanbul.
MISHA
After I take you to lunch in Istanbul. Ask me then.
JULIETTE
What shall we do now?
Hide ...
MISHA
There the pages ended.
Johnny reread them slowly, his hands trembling as he tried to absorb the stunning truth he held. He took the photograph and went over to the window, where the light was better, and found Sovalin's face. It seemed more discernible now. Very ordinary, there was nothing unusual about it. It was just a face, seen between two other heads. One of Sovalin's shoulders was visible, someone's hand on it. Johnny followed the dim shadowy form of the hand and arm. It was his father's, resting on his best friend's shoulder.
| 13,130
|
inside_word
|
are
|
remove_one_sentence
|
<url>
http://georgemalko.com/images/Exterior-Day_GeorgeMalko.pdf
</url>
<text>
EXTERIOR – DAY by George Malko
"This was just before we met." The small dining table was covered with piles of papers and faded manila folders clumsily stacked. Six years after her husband's death Johnny Luddin's mother finally went down to the basement and had the super bring up several boxes of old papers. She had been going through them for several days now, examining some, a few of them over and over, others put aside almost brusquely, with barely a glance. Or so it seemed to Johnny. What she wanted him to see was a black & white photograph, ornately crenelated around the edges; it was not a place, it was a picture of a group of men.
It took Johnny several moments to recognize his father among them. In the lower left corner of the photograph someone had diagonally written, "Mer Noire, 1934," in tiny, precise letters. It was Pyotr Mikhailovitch's handwriting and covered a patch of bare ground faded by time to look even paler. The men in the picture had been arranged on the few steps and veranda of an old house made of rough-hewn timbers. The photographer had backed up far enough to make sure everyone would be included. There was a small open area fanning out in front of all of them; it looked like a modest little apron. "Who are these people?" Johnny asked. "What was Papa doing with them?"
"A script," his mother said. "A revolutionary scenario. They were all writing it together."
Johnny laughed, then scrutinized the picture more intently. "That's crazy. All of them writing together? Why? Papa would never do that."
"He did it for the food," his mother said. "They were able to make it go on for months. In the mornings they swam."
© All Rights Reserved
There were other photographs in the thick brown folder, some Johnny recognized as having seen or been shown when he was younger. But most were unknown to him, curiosities, preserved faces his mother herself had difficulty identifying or even placing geographically. A few were quite remarkable. Most of them were mounted on stiff cardboard to create frames and borders. One such border was imprinted, in French.
"Photogr. des Theatres Imperiaux"
G. A. Fischer
Sankt Petersbourg
"I think this was when your father was first invited to study in the theater school," Johnny's mother said. "He was the youngest to have a serious audition. He was eight years old." The boy in the handsome school uniform solemnly staring out at Johnny did not look like anyone he knew, or had ever known.
There was another photograph, even more singular. It was of Pyotr Mikhailovitch in his teens. He still wore a school uniform, but the shiny buttons were gone. The tunic no longer had a handsome high collar and the sleeves were cuffless. The date on the picture was 1925. "I do not know where this is," Johnny's mother said.
In the photograph, Johnny's father sat on a wooden bench with his mother, his father, and another man of about the same age who resembled Johnny's grandfather. Johnny guessed it was an uncle. The adults sat on one part of the bench, aware of the camera, their looks in its direction clearly acknowledging its presence though their expressions were ill at ease, with something very polite, almost tolerant. They were letting the picture be taken. Johnny's father sat towards the other end of the bench. It was out-of-doors, a country setting, the weathered wooden wall of a hut or fence behind the group. Pyotr Mikhailovitch held a book, elbows propped on knees, and gave the book his full attention. He was partly turned away from the others. In his threadbare outfit, his eyes fixed on the pages he held, Johnny sensed his father's resentment. Pyotr Mikhailovitch, he understood, clearly wished to be elsewhere. Studying the face more closely, Johnny saw that his father was, at the age of sixteen, trying to grow a beard.
Johnny looked again at the Black Sea photograph taken in 1934 and saw that his father was beardless and much more cheerful even though almost everyone else in the picture seemed either sullen or solemn. Pyotr Mikhailovitch's inscription, though in French, didn't lighten the mood. "The Black Sea," Johnny's mother said over his shoulder. "Your father said parts of old Hollywood reminded him of Sochi."
"How?"
"Palm trees?" she suggested and then frowned. "Some of the architecture was ornate." She nodded to herself and the frown disappeared. "Yes, he said it was old and ornate." She spotted a face in the photograph and lightly rested the tip of her index finger on it. "This is ... yes, Lev Sovalin. He was your father's closest friend."
Surprised, Johnny peered more closely at the barely distinct countenance visible between the shoulders of others. "I never heard of him."
"Your father seldom mentioned his name. I think something happened to him." Johnny's mother cleared her throat, almost politely. Johnny understood. He did not have to ask what that "something" might have been. As ignorant as he was of the fate some had suffered, her words carried the same oblique pronouncement of doom he had heard before, about others. "Your father once told me Lev had encouraged him to leave."
"Maybe he helped him escape," Johnny said, and felt his breath suddenly quicken. Suddenly, he was close to a clue, a real clue.
"Your father did not have to make any escape," his mother replied, and then added the words Johnny had been hearing all his life: "He just left." It was so pointedly empty an explanation, it left Johnny with nothing to grasp, to force into
himself and make the vagueness of it all bearable. Meanwhile the question itself remained, became quickly fixed; with time, it became the central mystery of Johnny's life.
"But why, Mama?" Johnny found himself asking yet again. "He was known in Russia, his work was being recognized. Why would he walk away from doing what he loved?"
"Well," Johnny's mother began, her tone reasoned, as if calmly laying out the key points of a solid dissertation, "you know the restrictions which existed under the Soviets. And here—" she indicated the Black Sea photograph "—they went as much for their art as to be fed. No, with his ambitions, it would not have been impossible for him to make such a decision."
"But he loved Russia—he dreamed in Russian, thought in Russian." Johnny hesitated, wanting so desperately to know. "Mama," he pressed, "Papa prayed in Russian."
"Yes," his mother said quietly, nodding her head. "I will tell you what I think, what I have always believed. He never said this, but I think he always thought it would be temporary. A look at life in the West. Some work. His name achieving some recognition. And then home."
"Would you have gone with him?"
Johnny's mother nodded again, without any hesitation. "Of course. Wherever he went." She looked at her son and the faint traces of a smile touched her eyes and mouth. The smile faded and she gave a small shake of her head, not of dismissal but regret. "I have not thought of these things for a long time. I have never liked trying to speak of them." She scanned the papers and folders and photographs spread out on the dining table. "It is looking through this. I thought it would be easier." She turned without looking at her son and started for the door. "You must excuse me."
Johnny looked back at the group photograph, seeking some clue to their state of mind, their... what? Maybe they looked the way they did because some Moscow big shot wanted a photograph to show the Minister of Culture; maybe this was the way one was supposed to look when pretending collectively to produce a script. Maybe his mother was right. They were just hungry. He looked back at the papers and folders and manila envelopes strewn about on the table.
A pale blue folder caught his eye because it had the name of a movie studio embossed in the lower right-hand corner. Johnny opened it and found a prim sheet of vellum quality personal stationery, "Harry Remsher, Artists' Representative," in raised faded gold letters across the top, an address on Wilshire Boulevard below it. The typed letter was dated May 6, 1942. "Dear Pete:" it began, "They read it, for what that's worth, and the answer is 'No.'" It was from Pyotr Mikhailovitch's agent during the two fruitless years the family had lived in Hollywood; he was the one who had persuaded Johnny's father to change his name from Ludinev to Luddin. Peter Luddin. He thought it would help him get work. "They're all fools," the letter went on, "and of course I told them they are. They agreed you're the kind of class guy they should be working with, but on this particular movie they obviously are thinking about something else. God only knows what. Pete, you're brilliant, and about this you're probably right in some esthetic corner of your soul. But for our sake, yours and mine, don't embellish. Ever. Rewrite, but don't change. You know what I mean, so stop pulling your hair. I couldn't decide whether or not to share their comments with you and then figured what the hell, you're a pro, maybe it'll give you a slant on how to romance them next time. The point though is, don't ever take any of it personally. "Warmest, (this was written in pen) H.R.
"P.S. For what it's worth, I loved it. I understood it, I liked the people you wanted me to like, I was with them. I think you should finish it.
"P.P.S. I don't quite know what your real point is, but I really loved it." Under the agent's letter, Johnny found a smaller piece of paper engraved with a single raised initial, "D". The note, written by hand, was brief, and harsh. "You read this and sent it to me anyway? For Christ's sake, Harry, he moved it to some Russian city! What fucking good is that to me, please tell me? I am shooting up around Tahoe, it's going to look like Minnesota, and the Black Sea is full of foreigners. I was so stunned, I read the whole thing. I don't get it. What's it about? You promise me talent, I want talent. Talent, to me, is somebody who knows that a movie about two loveable lunks from Minnesota is not a movie about two intellectuals in Russia. I don't care about them and don't want to care about them. Screw the bastard who had to stay behind!"
Under this, Johnny found another note, a long one in his father's hand, along with several carbon copy pages of a screenplay, withered and going brown. They were held together by a rusted paper clip. Johnny's heart began beating rapidly, the ancient carbons rustling like husks as he separated them with frightened fingers. "Have you seen this?" he called out to his mother.
The tone of his voice made her appear in the doorway and she saw the folder Johnny held. "What is it?" Johnny held it up, the letter from the agent on top. Her gaze went to it and she saw and recognized the name on the stationery. "Hollywood," she said, and Johnny saw her body stiffen. "I am not interested in what those people had to say to your father."
"But this is Papa's writing." Johnny showed her his father's note, trying to keep calm.
"No," his mother said firmly. "They wasted his time, they insulted him." "So then you've seen this, you've read it."
"Not one word." For a moment Johnny thought this was just her old stubbornness, a glimpse of that personal but cold intractability she silently insisted was hers to invoke. But then he saw the angry set of her mouth, her lips compressed, something making them go rigid. Anger flared in her eyes as well, and with it Johnny saw and began to understand the resentment; it was as if once, so long ago, she had said nothing when her husband had been flayed by the futility of trying to satisfy the unwritten rules of a business that had absolutely no interest in who he was, or what he had ever done. Hollywood had forced Pyotr Mikhailovitch to see that he lacked any significance. His widow was still furious with them both, the film community for doing it with such silky indifference, her beloved husband for allowing it to be done to him, even for one moment. When his mother turned and left again, Johnny said nothing.
His father's note, he immediately understood, had been intended as a memorandum to the producer, "D":
Most in the group you will meet are not bound to one another by any particular sentiment. They are not a "band of brothers." Simple good luck (and a bit of clever intriguing) has brought them to this oasis. Art doesn't unite them. It is ambition. So think of them (even the two who genuinely are friends) more as ... frolicking musketeers. Oleg has something of Athos, or Porthos (endearing flamboyance with a dark side, the young drinker already brooding). Misha is a convenient d'Artagnan; he is more d'Artagnan's first cousin, forever nameless. Let us remember, as we think of the film we wish SUMMER to be, that the musketeers never openly betrayed one another. Their fate--those truly close--was to break one another's hearts. I am very enthusiastic.
Beneath the memorandum, the first of the surviving screenplay pages was numbered "8". Johnny began to read.
EXTERIOR/SOCHI - DAY
We are in this legendary seaport and resort city on the shores of the Black Sea. The sun is bright and very warm. There a<cursor_is_here>
Men in open-necked white shirts and women in loose summer dresses promenade. Deserving workers of the State on holiday, they are clearly enjoying themselves.
OLEG
comes out of the dim doorway of a featureless office building. He wears his only
8
jacket over his wrinkled white shirt. Both jacket and shirt are drenched in sweat.
Oleg stops to take off the jacket, but first takes a crumpled piece of paper out of his jacket pocket--he has looked at it already, he knows what is written on it.
He slings the jacket over his shoulder and heads down the street. Near the corner a man has stopped to light a cigarette. Oleg stops before him and indicates he would like a light, too.
The man holds the burning match out. Oleg ignites the piece of paper, nods a thank you, and walks off, the paper burning up in his hand.
INTERIOR/BEDROOM - DAY
In the tiny room, a battered dresser with no bottom drawer stands between two cots.
Oleg has the top drawer open and rummages through it. He still wears his good pants but is shirtless, his undershirt gray with old and new sweat.
MISHA'S VOICE
My clean shirt, for your information, is hanging up to dry.
Oleg turns. Apprehension flickers for a moment in his eyes.
MISHA
leans against the doorframe, a comb in one hand, scissors in the other.
MISHA Should I grow a beard again?
Absolutely.
OLEG
Misha crosses to toss comb and scissors into the still-open drawer, which he then closes.
MISHA
How did the "interview" go? What did they ask about? Let me guess: "Who is drinking too much?" "Who is talking too much?"
Johnny stopped reading. What he was holding had to be autobiographical— Sochi, the two friends. So which one of them is my father? There were no physical descriptions. Except for mention of a beard. Had his father ever worn one? Misha or
Oleg? The dialogue would have to do it.
MISHA
How did the "interview" go? What did they ask about? Let me guess: "Who is drinking too much?" "Who is talking too much?"
OLEG
"Who is eating too much?"
(delighted)
MISHA
Really?
OLEG
"Is anyone religious?"
MISHA
I hope you told them I pray regularly. Daily. Twice. Morning and evening.
OLEG
They would not believe me.
MISHA
No interest in our work?
OLEG
"Who is doing little or no work?"
(rewarded)
MISHA
Ahh ...
OLEG
"Who is doing too much?"
MISHA
Idiots. I thought it was our French visitors that were making them nervous.
OLEG
Well, yes ... they want us to keep an eye on them.
(a tiny hesitation)
MISHA
Did you tell them we are, you and I in particular? At least on Juliette.
OLEG
I do not think that is what they had in mind.
MISHA
What they have in mind is a mystery, my dear friend.
He goes over to perch on the window sill and looks out.
OLEG
Misha ...
(almost a warning—)
But his friend has seen something.
MISHA
(turns)
She is swimming nude again.
I hope you did not tell them she does that often.
OLEG
They already knew.
Misha collapses with laughter. After a moment, he partially recovers.
MISHA
So, what do you think they really wanted?
(still grinning)
He looks questioningly at his friend.
Johnny stopped and reread the last few speeches. Misha was his father. Whether there had ever been a French woman in his life was immaterial. The rhetoric, the sense of almost tender contempt, the implicit irony. There was no question about it. Pyotr Mikhailovitch was Misha.
EXTERIOR/THE MAIN CABIN - EVENING
Young people make their way along the birch-lined path.
On the broad cabin veranda some sit, handing around a bottle of wine. Oleg and Misha are to one side, JULIETTE standing on the ground before them.
JULIETTE
I want to wear something special.
(French accent)
She touches Misha's hand and smiles warmly at him before hurrying off. Misha sighs happily.
OLEG
Misha ... be careful.
MISHA
They leave tomorrow. Tonight I intend to be happy.
OLEG
You are always happy.
He rises and crosses to secure one of the bottles--not wine, vodka. He returns, swigging deeply, and offers the bottle to Misha, who gives a shake of his head.
MISHA
Not tonight. I do not need it.
I do.
OLEG
Johnny's father always had something to offer guests, usually a bottle of vodka waiting in the freezer, flavored with translucent peels of lemon or orange which Pyotr Mikhailovitch methodically removed from the fruit with a very sharp knife and then slipped into the neck of the bottle. He sometimes let Johnny put in a peel. Together they would watch it glide down and settle into the clear liquid. Pyotr Mikhailovitch himself seldom drank, except for an occasional glass of wine.
(quietly)
MISHA
Oleg ... tomorrow they are gone! Who here cares? Who is watching? You, maybe. And you are too busy to watch.
Misha—
OLEG
MISHA
Hear me out, dear friend. All of us have been asked to watch this or that. We nod, and do nothing.
OLEG
It is not just the French they want me to watch.
He takes another swallow. This time Misha watches, sensing something.
Who?
MISHA
OLEG
They made it very objective. No one person singled out.
At random ...
MISHA
OLEG
I stuck my hand into a bowl and pulled out a name.
One of us?
MISHA
He waits until Oleg has to nod.
MISHA (CONTD)
What if you had chosen your own?
OLEG
What a stupid system ...
They told me mine was the only one left out. (clearly distressed)
He takes another drink.
So?
MISHA
OLEG
Misha, for God's sake! Don't you understand?
MISHA
(a quizzical pause)
Me?
He begins to laugh.
MISHA (CONTD)
How sublime! You may as well have chosen yourself.
HOLD ON his face as he roars with laughter.
INTERIOR/THE MAIN CABIN - NIGHT
Smoky, crowded, people at several tables eating noisily.
AT ONE TABLE
Oleg sits catty-corner with Misha, Juliette to Misha's left. Oleg is leaning over, voice low but intense, talking to Misha, hand clutching a full vodka glass, his face red.
OLEG
All they suggested was you might have "ambitions."
MISHA
I assume you laughed.
OLEG
(pauses, clearly uncertain)
I said your ambitions are artistic, creative.
—Like mine.
MISHA
They make you the authority on me.
(grown thoughtful)
Oleg suddenly grabs Misha's hand, spilling vodka.
OLEG
You watch, you will be asked about somebody, too.
MISHA
It should be you. Forget the bowl. You watch me, I watch you. It would make things so simple.
OLEG
I am not "watching" you!
The words hang in the silence between them.
EXTERIOR/NEAR THE SMALLER CABINS - NIGHT
A full moon hangs over the still waters. MISHA
fills a wooden bucket at the shore and heads back towards
THE SMALL SAUNA
in a grove of birch trees, smoke curling from its chimney.
INTERIOR/THE SAUNA - NIGHT
Oleg sits on one of the top benches, stripped to the waist, weakly slapping at himself
with a birch branch.
Misha comes in, pulls off his own shirt, and throws water on
HOT ROCKS
which send up clouds of dense steam.
Oleg shrinks into himself with discomfort, muzzily shaking his head.
OLEG
Ayii — it's scalding!
He looks around, as if recognizing his surroundings.
OLEG (CONTD)
Where are the girls?
Asleep hours ago.
MISHA
OLEG
(rising unsteadily)
Me, too ...
Misha's hand slows him.
MISHA Oleg, are you going to watch me tomorrow?
OLEG
It was out of a bowl! You will see. Next week you will have your own bowl.
MISHA
No. This one was for you.
(shakes his head)
(sees Oleg's confusion)
They know we are friends. Close friends.
OLEG
The closest. Brothers, almost.
(reaffirming it)
MISHA
They want that. You, to watch me.
OLEG
It could have been ... anyone!
No. Only me.
MISHA
—The bowl ...
OLEG
MISHA
All mine. The only name in it.
OLEG
No—!
(suddenly devastated)
And knows it is true, has to be true.
MISHA
Did they threaten you? Tell me, what if you have nothing to report about me? Absolutely nothing.
(after a moment)
OLEG
They would not believe me.
(sad cunning)
MISHA
And—a for instance—if I do disappear...
OLEG
They will be furious.
Misha gets up and pours more water onto the rocks. They steam heavily, obscuring the small room.
MISHA
It will satisfy them, though. Confirm their suspicions.
OLEG
They would kill me.
Misha comes over and sits down next to his friend.
MISHA
I do not think so. Not if you rush to them shouting, "You were right! You were so right!"
There is a silence, and then Oleg lifts his head to stare through the steam at his friend.
OLEG
away?
My God ... Misha ... Are you thinking of trying to go
MISHA
The thought had never entered my mind.
Oleg sighs with obvious relief, and then crosses himself. His eyes close. He sits back. He hears more water splash onto the hot rocks. Steam obscures him momentarily.
He reappears, his face wet with steam and perspiration. He wipes it. His eyes open.
OLEG
We will just have to be careful. Very, very careful.
There is no answer.
Yes, Misha?
He looks around.
THE STEAM
in the small room is dense. It is not settling.
Oleg rises, leaning on a wall to balance himself.
Misha—?
OLEG (CONTD)
From his face, a look of alarm slowly appearing on it, we —
EXTERIOR/A CRUISE SHIP - DAY
The ship sails along the coastline of the Black Sea.
EXTERIOR/ON DECK - DAY
Juliette stands at the rail, staring across the water. Something makes her turn.
MISHA
stands nearby, looking at her.
JULIETTE
(French accent)
OLEG (CONTD)
DISSOLVE TO:
You came!
She is immediately at his side, clutching his arm to gaze at him adoringly.
JULIETTE (CONTD) How long can you stay with us?
Misha turns and looks at the distant shore.
Ask me tomorrow.
MISHA
JULIETTE
Tomorrow we will be in Istanbul.
MISHA
After I take you to lunch in Istanbul. Ask me then.
JULIETTE
What shall we do now?
Hide ...
MISHA
There the pages ended.
Johnny reread them slowly, his hands trembling as he tried to absorb the stunning truth he held. He took the photograph and went over to the window, where the light was better, and found Sovalin's face. It seemed more discernible now. Very ordinary, there was nothing unusual about it. It was just a face, seen between two other heads. One of Sovalin's shoulders was visible, someone's hand on it. Johnny followed the dim shadowy form of the hand and arm. It was his father's, resting on his best friend's shoulder.
</text>
|
[
{
"content": "<url>\nhttp://georgemalko.com/images/Exterior-Day_GeorgeMalko.pdf\n</url>\n<text>\nEXTERIOR – DAY by George Malko\n\n\"This was just before we met.\" The small dining table was covered with piles of papers and faded manila folders clumsily stacked. Six years after her husband's death Johnny Luddin's mother finally went down to the basement and had the super bring up several boxes of old papers. She had been going through them for several days now, examining some, a few of them over and over, others put aside almost brusquely, with barely a glance. Or so it seemed to Johnny. What she wanted him to see was a black & white photograph, ornately crenelated around the edges; it was not a place, it was a picture of a group of men.\n\nIt took Johnny several moments to recognize his father among them. In the lower left corner of the photograph someone had diagonally written, \"Mer Noire, 1934,\" in tiny, precise letters. It was Pyotr Mikhailovitch's handwriting and covered a patch of bare ground faded by time to look even paler. The men in the picture had been arranged on the few steps and veranda of an old house made of rough-hewn timbers. The photographer had backed up far enough to make sure everyone would be included. There was a small open area fanning out in front of all of them; it looked like a modest little apron. \"Who are these people?\" Johnny asked. \"What was Papa doing with them?\"\n\n\"A script,\" his mother said. \"A revolutionary scenario. They were all writing it together.\"\n\nJohnny laughed, then scrutinized the picture more intently. \"That's crazy. All of them writing together? Why? Papa would never do that.\"\n\n\"He did it for the food,\" his mother said. \"They were able to make it go on for months. In the mornings they swam.\"\n\n© All Rights Reserved\n\nThere were other photographs in the thick brown folder, some Johnny recognized as having seen or been shown when he was younger. But most were unknown to him, curiosities, preserved faces his mother herself had difficulty identifying or even placing geographically. A few were quite remarkable. Most of them were mounted on stiff cardboard to create frames and borders. One such border was imprinted, in French.\n\n\"Photogr. des Theatres Imperiaux\"\n\nG. A. Fischer\n\nSankt Petersbourg\n\n\"I think this was when your father was first invited to study in the theater school,\" Johnny's mother said. \"He was the youngest to have a serious audition. He was eight years old.\" The boy in the handsome school uniform solemnly staring out at Johnny did not look like anyone he knew, or had ever known.\n\nThere was another photograph, even more singular. It was of Pyotr Mikhailovitch in his teens. He still wore a school uniform, but the shiny buttons were gone. The tunic no longer had a handsome high collar and the sleeves were cuffless. The date on the picture was 1925. \"I do not know where this is,\" Johnny's mother said.\n\nIn the photograph, Johnny's father sat on a wooden bench with his mother, his father, and another man of about the same age who resembled Johnny's grandfather. Johnny guessed it was an uncle. The adults sat on one part of the bench, aware of the camera, their looks in its direction clearly acknowledging its presence though their expressions were ill at ease, with something very polite, almost tolerant. They were letting the picture be taken. Johnny's father sat towards the other end of the bench. It was out-of-doors, a country setting, the weathered wooden wall of a hut or fence behind the group. Pyotr Mikhailovitch held a book, elbows propped on knees, and gave the book his full attention. He was partly turned away from the others. In his threadbare outfit, his eyes fixed on the pages he held, Johnny sensed his father's resentment. Pyotr Mikhailovitch, he understood, clearly wished to be elsewhere. Studying the face more closely, Johnny saw that his father was, at the age of sixteen, trying to grow a beard.\n\nJohnny looked again at the Black Sea photograph taken in 1934 and saw that his father was beardless and much more cheerful even though almost everyone else in the picture seemed either sullen or solemn. Pyotr Mikhailovitch's inscription, though in French, didn't lighten the mood. \"The Black Sea,\" Johnny's mother said over his shoulder. \"Your father said parts of old Hollywood reminded him of Sochi.\"\n\n\"How?\"\n\n\"Palm trees?\" she suggested and then frowned. \"Some of the architecture was ornate.\" She nodded to herself and the frown disappeared. \"Yes, he said it was old and ornate.\" She spotted a face in the photograph and lightly rested the tip of her index finger on it. \"This is ... yes, Lev Sovalin. He was your father's closest friend.\"\n\nSurprised, Johnny peered more closely at the barely distinct countenance visible between the shoulders of others. \"I never heard of him.\"\n\n\"Your father seldom mentioned his name. I think something happened to him.\" Johnny's mother cleared her throat, almost politely. Johnny understood. He did not have to ask what that \"something\" might have been. As ignorant as he was of the fate some had suffered, her words carried the same oblique pronouncement of doom he had heard before, about others. \"Your father once told me Lev had encouraged him to leave.\"\n\n\"Maybe he helped him escape,\" Johnny said, and felt his breath suddenly quicken. Suddenly, he was close to a clue, a real clue.\n\n\"Your father did not have to make any escape,\" his mother replied, and then added the words Johnny had been hearing all his life: \"He just left.\" It was so pointedly empty an explanation, it left Johnny with nothing to grasp, to force into\n\nhimself and make the vagueness of it all bearable. Meanwhile the question itself remained, became quickly fixed; with time, it became the central mystery of Johnny's life.\n\n\"But why, Mama?\" Johnny found himself asking yet again. \"He was known in Russia, his work was being recognized. Why would he walk away from doing what he loved?\"\n\n\"Well,\" Johnny's mother began, her tone reasoned, as if calmly laying out the key points of a solid dissertation, \"you know the restrictions which existed under the Soviets. And here—\" she indicated the Black Sea photograph \"—they went as much for their art as to be fed. No, with his ambitions, it would not have been impossible for him to make such a decision.\"\n\n\"But he loved Russia—he dreamed in Russian, thought in Russian.\" Johnny hesitated, wanting so desperately to know. \"Mama,\" he pressed, \"Papa prayed in Russian.\"\n\n\"Yes,\" his mother said quietly, nodding her head. \"I will tell you what I think, what I have always believed. He never said this, but I think he always thought it would be temporary. A look at life in the West. Some work. His name achieving some recognition. And then home.\"\n\n\"Would you have gone with him?\"\n\nJohnny's mother nodded again, without any hesitation. \"Of course. Wherever he went.\" She looked at her son and the faint traces of a smile touched her eyes and mouth. The smile faded and she gave a small shake of her head, not of dismissal but regret. \"I have not thought of these things for a long time. I have never liked trying to speak of them.\" She scanned the papers and folders and photographs spread out on the dining table. \"It is looking through this. I thought it would be easier.\" She turned without looking at her son and started for the door. \"You must excuse me.\"\n\nJohnny looked back at the group photograph, seeking some clue to their state of mind, their... what? Maybe they looked the way they did because some Moscow big shot wanted a photograph to show the Minister of Culture; maybe this was the way one was supposed to look when pretending collectively to produce a script. Maybe his mother was right. They were just hungry. He looked back at the papers and folders and manila envelopes strewn about on the table.\n\nA pale blue folder caught his eye because it had the name of a movie studio embossed in the lower right-hand corner. Johnny opened it and found a prim sheet of vellum quality personal stationery, \"Harry Remsher, Artists' Representative,\" in raised faded gold letters across the top, an address on Wilshire Boulevard below it. The typed letter was dated May 6, 1942. \"Dear Pete:\" it began, \"They read it, for what that's worth, and the answer is 'No.'\" It was from Pyotr Mikhailovitch's agent during the two fruitless years the family had lived in Hollywood; he was the one who had persuaded Johnny's father to change his name from Ludinev to Luddin. Peter Luddin. He thought it would help him get work. \"They're all fools,\" the letter went on, \"and of course I told them they are. They agreed you're the kind of class guy they should be working with, but on this particular movie they obviously are thinking about something else. God only knows what. Pete, you're brilliant, and about this you're probably right in some esthetic corner of your soul. But for our sake, yours and mine, don't embellish. Ever. Rewrite, but don't change. You know what I mean, so stop pulling your hair. I couldn't decide whether or not to share their comments with you and then figured what the hell, you're a pro, maybe it'll give you a slant on how to romance them next time. The point though is, don't ever take any of it personally. \"Warmest, (this was written in pen) H.R.\n\n\"P.S. For what it's worth, I loved it. I understood it, I liked the people you wanted me to like, I was with them. I think you should finish it.\n\"P.P.S. I don't quite know what your real point is, but I really loved it.\" Under the agent's letter, Johnny found a smaller piece of paper engraved with a single raised initial, \"D\". The note, written by hand, was brief, and harsh. \"You read this and sent it to me anyway? For Christ's sake, Harry, he moved it to some Russian city! What fucking good is that to me, please tell me? I am shooting up around Tahoe, it's going to look like Minnesota, and the Black Sea is full of foreigners. I was so stunned, I read the whole thing. I don't get it. What's it about? You promise me talent, I want talent. Talent, to me, is somebody who knows that a movie about two loveable lunks from Minnesota is not a movie about two intellectuals in Russia. I don't care about them and don't want to care about them. Screw the bastard who had to stay behind!\"\n\nUnder this, Johnny found another note, a long one in his father's hand, along with several carbon copy pages of a screenplay, withered and going brown. They were held together by a rusted paper clip. Johnny's heart began beating rapidly, the ancient carbons rustling like husks as he separated them with frightened fingers. \"Have you seen this?\" he called out to his mother.\n\nThe tone of his voice made her appear in the doorway and she saw the folder Johnny held. \"What is it?\" Johnny held it up, the letter from the agent on top. Her gaze went to it and she saw and recognized the name on the stationery. \"Hollywood,\" she said, and Johnny saw her body stiffen. \"I am not interested in what those people had to say to your father.\"\n\n\"But this is Papa's writing.\" Johnny showed her his father's note, trying to keep calm.\n\n\"No,\" his mother said firmly. \"They wasted his time, they insulted him.\" \"So then you've seen this, you've read it.\"\n\n\"Not one word.\" For a moment Johnny thought this was just her old stubbornness, a glimpse of that personal but cold intractability she silently insisted was hers to invoke. But then he saw the angry set of her mouth, her lips compressed, something making them go rigid. Anger flared in her eyes as well, and with it Johnny saw and began to understand the resentment; it was as if once, so long ago, she had said nothing when her husband had been flayed by the futility of trying to satisfy the unwritten rules of a business that had absolutely no interest in who he was, or what he had ever done. Hollywood had forced Pyotr Mikhailovitch to see that he lacked any significance. His widow was still furious with them both, the film community for doing it with such silky indifference, her beloved husband for allowing it to be done to him, even for one moment. When his mother turned and left again, Johnny said nothing.\n\nHis father's note, he immediately understood, had been intended as a memorandum to the producer, \"D\":\n\nMost in the group you will meet are not bound to one another by any particular sentiment. They are not a \"band of brothers.\" Simple good luck (and a bit of clever intriguing) has brought them to this oasis. Art doesn't unite them. It is ambition. So think of them (even the two who genuinely are friends) more as ... frolicking musketeers. Oleg has something of Athos, or Porthos (endearing flamboyance with a dark side, the young drinker already brooding). Misha is a convenient d'Artagnan; he is more d'Artagnan's first cousin, forever nameless. Let us remember, as we think of the film we wish SUMMER to be, that the musketeers never openly betrayed one another. Their fate--those truly close--was to break one another's hearts. I am very enthusiastic.\n\nBeneath the memorandum, the first of the surviving screenplay pages was numbered \"8\". Johnny began to read.\n\nEXTERIOR/SOCHI - DAY\n\nWe are in this legendary seaport and resort city on the shores of the Black Sea. The sun is bright and very warm. There a<cursor_is_here>\n\nMen in open-necked white shirts and women in loose summer dresses promenade. Deserving workers of the State on holiday, they are clearly enjoying themselves.\n\nOLEG\n\ncomes out of the dim doorway of a featureless office building. He wears his only\n\n8\n\njacket over his wrinkled white shirt. Both jacket and shirt are drenched in sweat.\n\nOleg stops to take off the jacket, but first takes a crumpled piece of paper out of his jacket pocket--he has looked at it already, he knows what is written on it.\n\nHe slings the jacket over his shoulder and heads down the street. Near the corner a man has stopped to light a cigarette. Oleg stops before him and indicates he would like a light, too.\n\nThe man holds the burning match out. Oleg ignites the piece of paper, nods a thank you, and walks off, the paper burning up in his hand.\n\nINTERIOR/BEDROOM - DAY\n\nIn the tiny room, a battered dresser with no bottom drawer stands between two cots.\n\nOleg has the top drawer open and rummages through it. He still wears his good pants but is shirtless, his undershirt gray with old and new sweat.\n\nMISHA'S VOICE\n\nMy clean shirt, for your information, is hanging up to dry.\n\nOleg turns. Apprehension flickers for a moment in his eyes.\n\nMISHA\n\nleans against the doorframe, a comb in one hand, scissors in the other.\n\nMISHA Should I grow a beard again?\n\nAbsolutely.\n\nOLEG\n\nMisha crosses to toss comb and scissors into the still-open drawer, which he then closes.\n\nMISHA\n\nHow did the \"interview\" go? What did they ask about? Let me guess: \"Who is drinking too much?\" \"Who is talking too much?\"\n\nJohnny stopped reading. What he was holding had to be autobiographical— Sochi, the two friends. So which one of them is my father? There were no physical descriptions. Except for mention of a beard. Had his father ever worn one? Misha or\n\nOleg? The dialogue would have to do it.\n\nMISHA\n\nHow did the \"interview\" go? What did they ask about? Let me guess: \"Who is drinking too much?\" \"Who is talking too much?\"\n\nOLEG\n\n\"Who is eating too much?\"\n\n(delighted)\n\nMISHA\n\nReally?\n\nOLEG\n\n\"Is anyone religious?\"\n\nMISHA\n\nI hope you told them I pray regularly. Daily. Twice. Morning and evening.\n\nOLEG\n\nThey would not believe me.\n\nMISHA\n\nNo interest in our work?\n\nOLEG\n\n\"Who is doing little or no work?\"\n\n(rewarded)\n\nMISHA\n\nAhh ...\n\nOLEG\n\n\"Who is doing too much?\"\n\nMISHA\n\nIdiots. I thought it was our French visitors that were making them nervous.\n\nOLEG\n\nWell, yes ... they want us to keep an eye on them.\n\n(a tiny hesitation)\n\nMISHA\n\nDid you tell them we are, you and I in particular? At least on Juliette.\n\nOLEG\n\nI do not think that is what they had in mind.\n\nMISHA\n\nWhat they have in mind is a mystery, my dear friend.\n\nHe goes over to perch on the window sill and looks out.\n\nOLEG\n\nMisha ...\n\n(almost a warning—)\n\nBut his friend has seen something.\n\nMISHA\n\n(turns)\n\nShe is swimming nude again.\n\nI hope you did not tell them she does that often.\n\nOLEG\n\nThey already knew.\n\nMisha collapses with laughter. After a moment, he partially recovers.\n\nMISHA\n\nSo, what do you think they really wanted?\n\n(still grinning)\n\nHe looks questioningly at his friend.\n\nJohnny stopped and reread the last few speeches. Misha was his father. Whether there had ever been a French woman in his life was immaterial. The rhetoric, the sense of almost tender contempt, the implicit irony. There was no question about it. Pyotr Mikhailovitch was Misha.\n\nEXTERIOR/THE MAIN CABIN - EVENING\n\nYoung people make their way along the birch-lined path.\n\nOn the broad cabin veranda some sit, handing around a bottle of wine. Oleg and Misha are to one side, JULIETTE standing on the ground before them.\n\nJULIETTE\n\nI want to wear something special.\n\n(French accent)\n\nShe touches Misha's hand and smiles warmly at him before hurrying off. Misha sighs happily.\n\nOLEG\n\nMisha ... be careful.\n\nMISHA\n\nThey leave tomorrow. Tonight I intend to be happy.\n\nOLEG\n\nYou are always happy.\n\nHe rises and crosses to secure one of the bottles--not wine, vodka. He returns, swigging deeply, and offers the bottle to Misha, who gives a shake of his head.\n\nMISHA\n\nNot tonight. I do not need it.\n\nI do.\n\nOLEG\n\nJohnny's father always had something to offer guests, usually a bottle of vodka waiting in the freezer, flavored with translucent peels of lemon or orange which Pyotr Mikhailovitch methodically removed from the fruit with a very sharp knife and then slipped into the neck of the bottle. He sometimes let Johnny put in a peel. Together they would watch it glide down and settle into the clear liquid. Pyotr Mikhailovitch himself seldom drank, except for an occasional glass of wine.\n\n(quietly)\n\nMISHA\n\nOleg ... tomorrow they are gone! Who here cares? Who is watching? You, maybe. And you are too busy to watch.\n\nMisha—\n\nOLEG\n\nMISHA\n\nHear me out, dear friend. All of us have been asked to watch this or that. We nod, and do nothing.\n\nOLEG\n\nIt is not just the French they want me to watch.\n\nHe takes another swallow. This time Misha watches, sensing something.\n\nWho?\n\nMISHA\n\nOLEG\n\nThey made it very objective. No one person singled out.\n\nAt random ...\n\nMISHA\n\nOLEG\n\nI stuck my hand into a bowl and pulled out a name.\n\nOne of us?\n\nMISHA\n\nHe waits until Oleg has to nod.\n\nMISHA (CONTD)\n\nWhat if you had chosen your own?\n\nOLEG\n\nWhat a stupid system ...\n\nThey told me mine was the only one left out. (clearly distressed)\n\nHe takes another drink.\n\nSo?\n\nMISHA\n\nOLEG\n\nMisha, for God's sake! Don't you understand?\n\nMISHA\n\n(a quizzical pause)\n\nMe?\n\nHe begins to laugh.\n\nMISHA (CONTD)\n\nHow sublime! You may as well have chosen yourself.\n\nHOLD ON his face as he roars with laughter.\n\nINTERIOR/THE MAIN CABIN - NIGHT\n\nSmoky, crowded, people at several tables eating noisily.\n\nAT ONE TABLE\n\nOleg sits catty-corner with Misha, Juliette to Misha's left. Oleg is leaning over, voice low but intense, talking to Misha, hand clutching a full vodka glass, his face red.\n\nOLEG\n\nAll they suggested was you might have \"ambitions.\"\n\nMISHA\n\nI assume you laughed.\n\nOLEG\n\n(pauses, clearly uncertain)\n\nI said your ambitions are artistic, creative.\n\n—Like mine.\n\nMISHA\n\nThey make you the authority on me.\n\n(grown thoughtful)\n\nOleg suddenly grabs Misha's hand, spilling vodka.\n\nOLEG\n\nYou watch, you will be asked about somebody, too.\n\nMISHA\n\nIt should be you. Forget the bowl. You watch me, I watch you. It would make things so simple.\n\nOLEG\n\nI am not \"watching\" you!\n\nThe words hang in the silence between them.\n\nEXTERIOR/NEAR THE SMALLER CABINS - NIGHT\n\nA full moon hangs over the still waters. MISHA\n\nfills a wooden bucket at the shore and heads back towards\n\nTHE SMALL SAUNA\n\nin a grove of birch trees, smoke curling from its chimney.\n\nINTERIOR/THE SAUNA - NIGHT\n\nOleg sits on one of the top benches, stripped to the waist, weakly slapping at himself\n\nwith a birch branch.\n\nMisha comes in, pulls off his own shirt, and throws water on\n\nHOT ROCKS\n\nwhich send up clouds of dense steam.\n\nOleg shrinks into himself with discomfort, muzzily shaking his head.\n\nOLEG\n\nAyii — it's scalding!\n\nHe looks around, as if recognizing his surroundings.\n\nOLEG (CONTD)\n\nWhere are the girls?\n\nAsleep hours ago.\n\nMISHA\n\nOLEG\n\n(rising unsteadily)\n\nMe, too ...\n\nMisha's hand slows him.\n\nMISHA Oleg, are you going to watch me tomorrow?\n\nOLEG\n\nIt was out of a bowl! You will see. Next week you will have your own bowl.\n\nMISHA\n\nNo. This one was for you.\n\n(shakes his head)\n\n(sees Oleg's confusion)\n\nThey know we are friends. Close friends.\n\nOLEG\n\nThe closest. Brothers, almost.\n\n(reaffirming it)\n\nMISHA\n\nThey want that. You, to watch me.\n\nOLEG\n\nIt could have been ... anyone!\n\nNo. Only me.\n\nMISHA\n\n—The bowl ...\n\nOLEG\n\nMISHA\n\nAll mine. The only name in it.\n\nOLEG\n\nNo—!\n\n(suddenly devastated)\n\nAnd knows it is true, has to be true.\n\nMISHA\n\nDid they threaten you? Tell me, what if you have nothing to report about me? Absolutely nothing.\n\n(after a moment)\n\nOLEG\n\nThey would not believe me.\n\n(sad cunning)\n\nMISHA\n\nAnd—a for instance—if I do disappear...\n\nOLEG\n\nThey will be furious.\n\nMisha gets up and pours more water onto the rocks. They steam heavily, obscuring the small room.\n\nMISHA\n\nIt will satisfy them, though. Confirm their suspicions.\n\nOLEG\n\nThey would kill me.\n\nMisha comes over and sits down next to his friend.\n\nMISHA\n\nI do not think so. Not if you rush to them shouting, \"You were right! You were so right!\"\n\nThere is a silence, and then Oleg lifts his head to stare through the steam at his friend.\n\nOLEG\n\naway?\n\nMy God ... Misha ... Are you thinking of trying to go\n\nMISHA\n\nThe thought had never entered my mind.\n\nOleg sighs with obvious relief, and then crosses himself. His eyes close. He sits back. He hears more water splash onto the hot rocks. Steam obscures him momentarily.\n\nHe reappears, his face wet with steam and perspiration. He wipes it. His eyes open.\n\nOLEG\n\nWe will just have to be careful. Very, very careful.\n\nThere is no answer.\n\nYes, Misha?\n\nHe looks around.\n\nTHE STEAM\n\nin the small room is dense. It is not settling.\n\nOleg rises, leaning on a wall to balance himself.\n\nMisha—?\n\nOLEG (CONTD)\n\nFrom his face, a look of alarm slowly appearing on it, we —\n\nEXTERIOR/A CRUISE SHIP - DAY\n\nThe ship sails along the coastline of the Black Sea.\n\nEXTERIOR/ON DECK - DAY\n\nJuliette stands at the rail, staring across the water. Something makes her turn.\n\nMISHA\n\nstands nearby, looking at her.\n\nJULIETTE\n\n(French accent)\n\nOLEG (CONTD)\n\nDISSOLVE TO:\n\nYou came!\n\nShe is immediately at his side, clutching his arm to gaze at him adoringly.\n\nJULIETTE (CONTD) How long can you stay with us?\n\nMisha turns and looks at the distant shore.\n\nAsk me tomorrow.\n\nMISHA\n\nJULIETTE\n\nTomorrow we will be in Istanbul.\n\nMISHA\n\nAfter I take you to lunch in Istanbul. Ask me then.\n\nJULIETTE\n\nWhat shall we do now?\n\nHide ...\n\nMISHA\n\nThere the pages ended.\n\nJohnny reread them slowly, his hands trembling as he tried to absorb the stunning truth he held. He took the photograph and went over to the window, where the light was better, and found Sovalin's face. It seemed more discernible now. Very ordinary, there was nothing unusual about it. It was just a face, seen between two other heads. One of Sovalin's shoulders was visible, someone's hand on it. Johnny followed the dim shadowy form of the hand and arm. It was his father's, resting on his best friend's shoulder.\n</text>\n",
"role": "user"
},
{
"content": "re palm trees.",
"role": "assistant"
}
] |
IN VITRO INDUCTION OF CALLUS FROM COTYLEDON AND HYPOCOTYL EXPLANTS OF Glycine wightii (Wight & Arn.) Verdc.
ANDRÉ LUIS COELHO DA SILVA 1 CECÍLIA SULZBACHER CARUSO 2 RENATO DE AZEVEDO MOREIRA 3 ANA CECÍLIA GÓES HORTA4
ABSTRACT – With the objective to promote in vitro callus induction, cotyledon and hypocotyl segments of "perennial soybean" (Glycine wightii (Wight & Arn.) Verdc.) were inoculated in basal medium MS supplemented with sucrose (1.5 e 3%) and 0.8% agar and different concentrations of 2,4dichlorophenoxyacetic acid (2,4-D) and 6furfurylaminopurine (kinetin). The explants were maintained in a dark growth room at 28 o C. The best callus induction was observed in explants (cotyledon and hypocotyl) maintained in medium containing the combination of 2,4-D (1 mg.L -1 ), kinetin (0.1 mg.L -1 ) and 3% sucrose. To promote callus subculture, the MS
medium was supplemented with different combinations of 2,4-D (0.5 to 4.0 mg.L -1 ), with or without kinetin (0.1 mg.L -1 ) and sucrose (1.5 e 3%). The calli were maintained 35 days in a dark growth room at 28 o C. The results indicated that the use of 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3% provided the highest average weight of cotyledons calli fresh matter, whereas the use of 2,4-D 2.0 mg.L -1 + kinetin 0.1 mg.L 1 + sucrose 3% provided the highest average weight of hypocotyl calli fresh matter. High concentrations of 2,4-D, independent of kinetin and sucrose concentrations, promoted oxidation and reduction in fresh weight from calli of cotyledon and hypocotyls.
INDEX TERMS: Glycine wightii, leguminosae, callogenesis, tissue culture.
INDUÇÃO IN VITRO DE CALOS EM EXPLANTES DE COTILÉDONES E HIPOCÓTILOS DE Glycine wightii (Wight & Arn.) Verdc.
RESUMO – Com o objetivo de promover a indução in vitro de calos, segmentos cotiledonares e de hipocótilos de plântulas de "soja perene" (Glycine wightii (Wight & Arn.) Verdc.) foram inoculados em meio básico MS contendo diferentes concentrações a diferentes de ácido 2,4-diclorofenoxiacético (2,4-D) e 6-furfurilaminopurina (cinetina), suplementado com sacarose (1,5 e 3%) e 0,8% de agar. Os explantes foram mantidos na ausência de luz, em sala de crescimento, com a temperatura de 28 o C. A melhor indução de calos (em cotilédones e hipocótilos) foi observada em explantes inoculados em meio contendo 2,4-D (1,0 mg.L -1 ), cinetina (0,1 mg.L -1 ) e 3% de sacarose. Para promover o subcultivo de calos produzidos, foram utilizadas diferentes concentrações de 2,4-D (0,5 a 4,0 mg.L -1 ), com e sem cinetina (0,1 mg.L -1 ), acrescentando-se sacarose (1,5 e 3%). Os calos foram mantidos por 25 dias na ausência de luz, em sala de crescimento com temperatura de 28 o C. Os resultados indicaram que a combinação de 2,4-D 1,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos cotiledonares, enquanto que a combinação de 2,4-D 2,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos de hipocótilos. Altas concentrações de 2,4-D independentes das concentrações de cinetina e sacarose, promoveram oxidação e diminuição no peso fresco dos calos de cotilédones e de hipocótilos.
TERMOS PARA INDEXAÇÃO: Glycine wightii, leguminosae, calogênese, cultura de tecidos.
1. Engenheiro Agrônomo, MSc., Grupo de Biofísica Molecular e Espectroscopia/USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP, [email protected].
2. Dra., USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP.
3. Professor Titular, Dr., LABLEC-DBBM/UFC, Caixa Postal 6020, 60451-970, Fortaleza, CE.
4. Professor Adjunto, Dra., LABLEC-DBBM/UFC.
INTRODUCTION
Glycine wightii (Wight & Arn.) Verdc. is an important specie belonging to the Leguminosae family, sub-family Papilionoideae, genus Glycine and subgenus Bracteata. It is a perennial creeper plant, native of the South Africa and of the Southwest Asia, generally used for erosion control. In Brazil this plant is known as "perennial soybean".
Among the several applications of the tissue culture, we should emphasize that it is a valuable tool to study the metabolism, physiology and development of plants with specific properties, such as, accumulation of active substances of interest (ROUT et al., 2000; DORAN, 2000).
Research with calli formed from fragments of stems, leaves and roots is mainly carried out to determine the culture conditions required by the explants to survive and grow (SAMOYLOV et al., 1998), to study cell development (LITTLE et al., 2000), to exploit products coming from the primary and secondary metabolism and to obtain cell suspension in propagation (ROUT et al., 2000).
The nutritional requirements necessary for the growth of a tissue in in vitro conditions vary for different species, variety and even between different parts of the plant. So, it is necessary to optimize the culture means (NAGAO et al., 1994). However, there is no standard formulation for this optimization, but the MS medium (MURASHIGE and SKOOG, 1962), with its modifications and dilutions, has presented satisfactory results for several species (ROUT and DAS, 1997).
The production of callus depends mainly on the determination of an adequate balance of growth regulators. However, this balance varies largely in relation to the explant type and to the plant species under investigation. The manipulation of the appropriate levels of auxins and cytokinins is crucial to define the balance of growth regulators so that there is induction of callus formation in the different types of explant (FRANKLIN and DIXON, 1994).
The objective of this work was to promote the in vitro establishment of the "perennial soybean" (Glycine wightii), through the induction and formation of callus, using segments of cotyledons and of hypocotyls as explants, as well as identifying the most adequate medium for the subcultive of formed callus.
MATERIALS AND METHODS
The experiments were carried out in the Laboratory of Lectins and Glycoconjugates (LABLEC), Department of Biochemistry and Molecular Biology (Federal University of Ceará). Glycine wightii seeds, collected in the city of São Carlos-SP (Brazil) were submitted to the treatment of chemical scarification for 10 min with sulfuric acid (98 %) to break the latency. After that, they were washed with sterile distilled water and left to germinate in Petri plates, under dark conditions, at 28 o C in the germination chamber. After 7 days, the seedlings were moved and sterilized with NaClO 2.5 % for 15 minutes, and then washed with sterile distilled water.
Induction of the callogenesis
Segments of cotyledons and hypocotyls with an approximate size of 18 ± 2 mm were used as explants. The explants were inoculated in a basal medium MS (MURASHIGE and SKOOG, 1962) containing different concentrations of the growth regulators (2,4-D and kinetin) and of sucrose according to the treatments: 1) medium without regulators and without sucrose (control); 2) medium without growth regulators with sucrose 1.5 %; 3) medium without growth regulators with sucrose 3 %; 4) medium with kinetin 0.1 mg.L -1 without sucrose; 5) medium with kinetin 0.1 mg.L -1 + sucrose 1.5 %; 6) medium with kinetin 0.1 mg.L -1 + sucrose 3 %; 7) medium with 2,4-D 0.5 mg.L -1 without sucrose; 8) medium with of 2,4-D 0.1 mg.L -1 + sucrose 1.5 %; 9) medium with 2,4-D 0.1 mg.L -1 + sucrose 3 %; 10) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 11) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 12) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 13) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 14) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 15) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %; 16) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 17) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 18) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 19) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 20) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 21) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %. The culture media were solidified with 8.0 g.L -1 agar (Merk), the final pH being adjusted to 5.8.
The sterilization was performed in autoclave, at 121 o C for 15 minutes.
The experiments were completely randomized with 21 treatments, 5 replications per treatment, and 25 explants per replication. After 35 days, a visual evaluation was made, in which the formation of callus, coloration and oxidation degree were observed. The results were submitted to the analysis of variance and the mean values of percentages of the formed callus were compared using the Tukey's test at the 5 % level of significance.
Subculture of the callus.
The calli obtained from cotyledons of hypocotyls (from the culture means that were more efficient in the induction of callus) were divided and inoculated in means supplemented with different concentrations of 2,4-D (0.5; 1.0; 2.0 and 4.0 mg.L -1 ), of kinetin (0 and 0.1 mg.L -1 ) and of sucrose (1.5 and 3%), with the objective of determining the influence of growth regulators and of sucrose on the maintenance and development of the calli. The basal medium used was the MS (MURASHIGE and SKOOG, 1962) containing 8.0 g.L 1 of agar (Merk), the final pH being adjusted to 5.8, before the autoclave was used. For five weeks, the following points were evaluated: growth (fresh matter), morphology and habituation (capacity of the callus to continue growing) of the cotyledons and hypocotyls callus. The completely randomized experiment was conducted in the darkness, at 28 o C. There were 16 treatments with 4 replications, with 5 fragments of callus in each treatment. The results were submitted to the analysis of variance and the mean values of fresh matter were compared by using the Tukey's test at the of 5% level of significance.
RESULTS AND DISCUSSION
Induction of the callogenesis
The production of callus was observed in almost all treatments, except for treatments 1 to 3 which composition did not contain 2,4-D and kinetin, and for treatment 4, which did not contain 2,4-D and sucrose (tables 1 and 2). Treatments 5 and 6, which contained only cytokinin and sucrose, were able to induce the formation of callus. The only difference between these treatments and the treatment 4 was the presence of sucrose and this can be an indication that the addition of only kinetin to the MS basal medium is not enough to induce the formation of callus in cotyledons or in hypocotyls of G. wightii . The cells and tissues of plants cultured in vitro are all practically heterotrophic (PASQUAL et al., 1998), a fact that may be another explanation for the no formation of callus. Besides the hormonal stimulus to induce the beginning of the cell multiplication and the resulting formation of callus, it is necessary the incorporation of a external source providing energy, rich in structures containing carbon, in this case sucrose, necessary for the formation of the framework of cell macromolecules. However, this last possibility is more likely to occur when there is the establishment and maintenance of calli, and not exactly in the callogenesis induction, since the treatments 7, 10, 13, 16 and 19, which did not contain sucrose, were capable to induce the formation of calli. That confirms the results obtained with other species of the genus Glycine , in which the appropriate levels of 2,4-D and the cytokinin, either isolated or interacting with each other, are able to induce the formation of calli. Also, the new cells produced in the callus would probably use minerals and other source of carbon other than sucrose, contained in the MS basal medium and in the agar (FRANKLIN and DIXON, 1994).
The addition of the regulators 2,4-D and/or cytokinin to the MS culture basal medium seems to be essential for the induction of callus of G. wightii, regarless their source (cotyledons or hypocotyls), as it can be observed for the treatments from 7 to 21, where all of them produced callus in cotyledons as well as in hypocotyls. In some cases, the use of sucrose did not seem to be an essential condition for the production of calli of G. wightii as it was observed for the treatments 7, 10, 13, 16 and 19.
The most adequate levels of the components of the MS basal medium, modified for the formation of callus in cotyledons and hypocotyls were: 2,4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 of and sucrose 3%, used in the treatment 18.
Among the regulators added to the medium, the 2,4-D is known as the main synthetic auxin used to induce the callogenesis, because one of its main characteristics is the capacity to efficiently stimulate the cell division in tissues of several plants (GEORGE, 1996). To induce the growth of callus in explants of dicotyledonous plants, a cytokinin is frequently added to the medium in addition to an auxin. In some cases the 2,4dichlorophenoxyacetic acid can be used separated from other hormones, like the cytokinins, to induce the formation of callus (GASPAR et al., 1996). According to Pasqual et al. (1998), for the induction of callus in plants of wide leaves, the 2,4-D is generally used in levels between 4.5 mM – 13.6 mM (1.0 – 3.0 mg.L -1 ). In spite of 2,4-D be one of the most important factors in the process of stimulating the cell division, it is also important to observe the interactive effects that can happen with other hormones.
The optimum level of sucrose to induce morphogenesis or cell growth differs among genotypes, but is generally between 2 and 4 % (PASQUAL et al., 1998). In the case of G. wightii it was found an optimum concentration of 3 %, thus confirming the results obtained in other works related to the induction of the callogenesis.
Several formulations of medium have been used in the in vitro cultures. According to Bertolucci (2000), the basal medium MS is the most used in tissue cultures. In the case of soybean, this medium is used mostly for the induction of callogenesis and of somatic embryogenesis, but there are examples of modifications, yielting optimization with consequent increase in the amount of formed callus (SAMOYLOV et al., 1998). The results presented in this stage of the work demonstrated, therefore, the optimisation of the basal medium MS for the formation of callus of G. wightii, by the addition of 2,4-D, kinetin and sucrose at the levels of 1.0 mg.L -1 , 0.1 mg.L -1 and 3%, respectively.
TABLE 1 – Percentages of calli obtained in treatments used for induction of callogenesis in cotyledons of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.
LDS = Low Difference Significant 5 % = 4.53
*Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).
TABLE 2 – Percentages of calli obtained in treatments used for induction of callogenesis em hypocotyls of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.
LDS = Low Difference Significant 5 % = 5.43
* Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).
Subculture of the callus
The calli obtained from cotyledons, subcultured in the means containing 1.0 mg.L -1 of 2,4-D, presented the largest mean values of fresh matter, independent of the used concentrations of kinetin and of sucrose. The smallest mean values were observed in the treatments containing 4.0 mg.L -1 of 2,4-D (figure 1). It was also observed that, in these treatments, the calli presented dark brown coloration and hardened consistency, differently from the calli obtained from the media containing 1.0 mg.L -1 of 2,4-D, which presented whitish coloration, friable consistency and diameter of ~ 1.3 cm (Figure 3).
The concentrations of 3 % of sucrose and 0.1 mg.L -1 of kinetin, independent of the used concentrations of 2,4-D, caused an increment in the weight of the calli, during the period of subcultive.
Regarding the subcultive of hypocotyl callus, the medium supplemented with 2,4-D 2.0 m,g.L -1 , kinetin 0.1mg.L -1 of and sucrose 3 % presented the largest mean value of fresh matter (figure 2). All the other medium containing 2.0 or 4.0 mg.L -1 of 2,4-D, presented lower mean values than the other tested media. As can be observed in figures 1, 2 and 3, the high concentration of 2,4-D (4.0 mg.L -1 ) affected the development of the callus in a negative way, delaying the growth and promoting the darkening of the cotyledons and hypocotyls calli.
B D
CONCLUSION
The experimental results obtained in the present work demonstrate that the ideal combination of the concentrations of growth regulators (2,4-D and kinetin) and of sucrose is essential for the induction and subcultive of the cotyledons callus (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 %, for induction as well as for the subculture) and of hypocotyls (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % - for induction and 2.4-D 2.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % for the subculture) of G. wightii. It was also demon- strated that the addition of high concentrations of 2,4-D (4 mg.L -1 ) to the medium of culture promotes a delay in the development of the calli of cotyledons as well as of hypocotyls.
ACKNOWLEDGMENTS
This work was supported by grants from the Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq), Coordenadoria de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) and Fundação Cearense de Amparo à Pesquisa (FUNCAP).
REFERENCES
BERTOLUCCI, S. K. V. Micropropagação, calogênese e abordagem fitoquímica in vivo e in vitro de Tournefortia cf paniculata Chan. 2000. 79 p. Dissertação (Mestrado em Fitotecnia) - Universidade Federal de Lavras, Lavras, 2000.
DORAN, P. M. Foreing protein production in plant tissue cultures. Current Opinion in Biotechnology, London, v. 11, p. 199-204, 2000.
FRANKLIN, C. I.; DIXON, R. A. Initiation and maintenance of callus and cell suspension culture. In: DIXON, R. A.; GONZALES, R. A. (Eds.). Plant cell culture: a pratical approach. Oxford: Oxford University, 1994. p. 1-26.
GASPAR, T.; KEVERS, C.; PENEL, C.; GREPPIN, H.; REID, D. M.; THORPE, T. A. Plant hormones and plant growth regulators in tissue culture. In Vitro Cellular and Development Biology-Plant, Columbia, v. 32, p. 272-289, 1996.
GEORGE, E. F. Plant propagantion by tissue culture: the technology. 2. ed. [S.l.]: Edington Exegetics, 1996. 1574 p.
LITTLE, E. L.; MAGBANUA, Z. V.; PARROTT, W. A. A protocol for repetitive somatic embryogenesis from mature epicotyls of peanut. Plant Cell Report, [S.l.], v. 19, p. 351-357, 2000.
MURASHIGE, T.; SKOOG, F. A revised medium for rapid growth and biossays with tobaco tissue cultures. Physiology Plant, Minneapolis, v. 15, p. 473-479, 1962.
NAGAO, E. O.; PASQUAL, M.; RAMOS, J. D. Efeitos da sacarose e do nitrogênio inorgânico sobre a multiplicação in vitro de brotações de porta-enxerto de citros. Bragantia, Campinas, v. 53, n. 1, p. 25-31, 1994.
PASQUAL, M.; HOFFMANN, A.; RAMOS, J. D. Cultura de tecidos vegetais: tecnologia e aplicações: meios de cultura. Lavras: UFLA/FAEPE, 1998. 127 p.
ROUT, G. R.; DAS, P. Techniques of micropropagation in vitro. In: BOSE, T. K.; MITRA, S. K.; SADHU, M. K.; DAS, P. (Eds.). Propagation of tropical and sub-tropical horticultural crops. Calcutta: Kalyani, 1997. p. 105-16.
ROUT, G. R.; SAMANTARAY, S.; DAS, P. In vitro manipulation and propagation of medicinal plants. Biotechnology Advances, New York, v. 18, p. 91120, 2000.
SAMOYLOV, V. M.; TUCKER, D. M.; PARROTT, W. A. Soybean (Glycine max (L.) Merrill.) embryogenic cultures: the role of sucrose and total nitrogen content on proliferation. In Vitro Cellular and Development Biology-Plant, Columbia, v. 34, p. 8-13, 1998.
|
<urn:uuid:56e9eac0-12e2-4f45-9df7-871a01aed262>
|
CC-MAIN-2021-39
|
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.883.6345&rep=rep1&type=pdf
|
2021-09-19T20:50:28+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00040-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 12,846,475
| 5,898
|
eng_Latn
|
eng_Latn
| 0.678553
|
eng_Latn
| 0.880966
|
[
"por_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"por_Latn"
] | false
|
rolmOCR
|
[
3658,
8384,
13210,
15001,
16720,
17778,
20043
] |
IN VITRO INDUCTION OF CALLUS FROM COTYLEDON AND HYPOCOTYL EXPLANTS OF Glycine wightii (Wight & Arn.) Verdc.
ANDRÉ LUIS COELHO DA SILVA 1 CECÍLIA SULZBACHER CARUSO 2 RENATO DE AZEVEDO MOREIRA 3 ANA CECÍLIA GÓES HORTA4
ABSTRACT – With the objective to promote in vitro callus induction, cotyledon and hypocotyl segments of "perennial soybean" (Glycine wightii (Wight & Arn.) Verdc.) were inoculated in basal medium MS supplemented with sucrose (1.5 e 3%) and 0.8% agar and different concentrations of 2,4dichlorophenoxyacetic acid (2,4-D) and 6furfurylaminopurine (kinetin). The explants were maintained in a dark growth room at 28 o C. The best callus induction was observed in explants (cotyledon and hypocotyl) maintained in medium containing the combination of 2,4-D (1 mg.L -1 ), kinetin (0.1 mg.L -1 ) and 3% sucrose. To promote callus subculture, the MS
medium was supplemented with different combinations of 2,4-D (0.5 to 4.0 mg.L -1 ), with or without kinetin (0.1 mg.L -1 ) and sucrose (1.5 e 3%). The calli were maintained 35 days in a dark growth room at 28 o C. The results indicated that the use of 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3% provided the highest average weight of cotyledons calli fresh matter, whereas the use of 2,4-D 2.0 mg.L -1 + kinetin 0.1 mg.L 1 + sucrose 3% provided the highest average weight of hypocotyl calli fresh matter. High concentrations of 2,4-D, independent of kinetin and sucrose concentrations, promoted oxidation and reduction in fresh weight from calli of cotyledon and hypocotyls.
INDEX TERMS: Glycine wightii, leguminosae, callogenesis, tissue culture.
INDUÇÃO IN VITRO DE CALOS EM EXPLANTES DE COTILÉDONES E HIPOCÓTILOS DE Glycine wightii (Wight & Arn.) Verdc.
RESUMO – Com o objetivo de promover a indução in vitro de calos, segmentos cotiledonares e de hipocótilos de plântulas de "soja perene" (Glycine wightii (Wight & Arn.) Verdc.) foram inoculados em meio básico MS contendo diferentes concentrações a diferentes de ácido 2,4-diclorofenoxiacético (2,4-D) e 6-furfurilaminopurina (cinetina), suplementado com sacarose (1,5 e 3%) e 0,8% de agar. Os explantes foram mantidos na ausência de luz, em sala de crescimento, com a temperatura de 28 o C. A melhor indução de calos (em cotilédones e hipocótilos) foi observada em explantes inoculados em meio contendo 2,4-D (1,0 mg.L -1 ), cinetina (0,1 mg.L -1 ) e 3% de sacarose. Para promover o subcultivo de calos produzidos, foram utilizadas diferentes concentrações de 2,4-D (0,5 a 4,0 mg.L -1 ), com e sem cinetina (0,1 mg.L -1 ), acrescentando-se sacarose (1,5 e 3%). Os calos foram mantidos por 25 dias na ausência de luz, em sala de crescimento com temperatura de 28 o C. Os resultados indicaram que a combinação de 2,4-D 1,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos cotiledonares, enquanto que a combinação de 2,4-D 2,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos de hipocótilos. Altas concentrações de 2,4-D independentes das concentrações de cinetina e sacarose, promoveram oxidação e diminuição no peso fresco dos calos de cotilédones e de hipocótilos.
TERMOS PARA INDEXAÇÃO: Glycine wightii, leguminosae, calogênese, cultura de tecidos.
1. Engenheiro Agrônomo, MSc., Grupo de Biofísica Molecular e Espectroscopia/USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP, [email protected].
2. Dra., USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP.
3. Professor Titular, Dr., LABLEC-DBBM/UFC, Caixa Postal 6020, 60451-970, Fortaleza, CE.
4. Professor Adjunto, Dra., LABLEC-DBBM/UFC.
INTRODUCTION
Glycine wightii (Wight & Arn.) Verdc. is an important specie belonging to the Leguminosae family, sub-family Papilionoideae, genus Glycine and subgenus Bracteata. It is a perennial creeper plant, native of the South Africa and of the Southwest Asia, generally used for erosion control. In Brazil this plant is known as "perennial soybean".
Among the several applications of the tissue culture, we should emphasize that it is a valuable tool to study the metabolism, physiology and development of plants with specific properties, such as, accumulation of active substances of interest (ROUT et al., 2000; DORAN, 2000).
Research with calli formed from fragments of stems, leaves and roots is mainly carried out to determine the culture conditions required by the explants to survive and grow (SAMOYLOV et al., 1998), to study cell development (LITTLE et al., 2000), to exploit products coming from the primary and secondary metabolism and to obtain cell suspension in propagation (ROUT et al., 2000).
The nutritional requirements necessary for the growth of a tissue in in vitro conditions vary for different species, variety and even between different parts of the plant. So, it is necessary to optimize the culture means (NAGAO et al., 1994). However, there is no standard formulation for this optimization, but the MS medium (MURASHIGE and SKOOG, 1962), with its modifications and dilutions, has presented satisfactory results for several species (ROUT and DAS, 1997).
The production of callus depends mainly on the determination of an adequate balance of growth regulators. However, this balance varies largely in relation to the explant type and to the plant species under investigation. The manipulation of the appropriate levels of auxins and cytokinins is crucial to define the balance of growth regulators so that there is induction of callus formation in the different types of explant (FRANKLIN and DIXON, 1994).
The objective of this work was to promote the in vitro establishment of the "perennial soybean" (Glycine wightii), through the induction and formation of callus, using segments of cotyledons and of hypocotyls as explants, as well as identifying the most adequate medium for the subcultive of formed callus.
MATERIALS AND METHODS
The experiments were carried out in the Laboratory of Lectins and Glycoconjugates (LABLEC), Department of Biochemistry and Molecular Biology (Federal University of Ceará). Glycine wightii seeds, collected in the city of São Carlos-SP (Brazil) were submitted to the treatment of chemical scarification for 10 min with sulfuric acid (98 %) to break the latency. After that, they were washed with sterile distilled water and left to germinate in Petri plates, under dark conditions, at 28 o C in the germination chamber. After 7 days, the seedlings were moved and sterilized with NaClO 2.5 % for 15 minutes, and then washed with sterile distilled water.
Induction of the callogenesis
Segments of cotyledons and hypocotyls with an approximate size of 18 ± 2 mm were used as explants. The explants were inoculated in a basal medium MS (MURASHIGE and SKOOG, 1962) containing different concentrations of the growth regulators (2,4-D and kinetin) and of sucrose according to the treatments: 1) medium without regulators and without sucrose (control); 2) medium without growth regulators with sucrose 1.5 %; 3) medium without growth regulators with sucrose 3 %; 4) medium with kinetin 0.1 mg.L -1 without sucrose; 5) medium with kinetin 0.1 mg.L -1 + sucrose 1.5 %; 6) medium with kinetin 0.1 mg.L -1 + sucrose 3 %; 7) medium with 2,4-D 0.5 mg.L -1 without sucrose; 8) medium with of 2,4-D 0.1 mg.L -1 + sucrose 1.5 %; 9) medium with 2,4-D 0.1 mg.L -1 + sucrose 3 %; 10) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 11) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 12) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 13) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 14) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 15) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %; 16) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 17) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 18) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 19) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 20) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 21) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %. The culture media were solidified with 8.0 g.L -1 agar (Merk), the final pH being adjusted to 5.8.
The sterilization was performed in autoclave, at 121 o C for 15 minutes.
The experiments were completely randomized with 21 treatments, 5 replications per treatment, and 25 explants per replication. After 35 days, a visual evaluation was made, in which the formation of callus, coloration and oxidation degree were observed. The results were submitted to the analysis of variance and the mean values of percentages of the formed callus were compared using the Tukey's test at the 5 % level of significance.
Subculture of the callus.
The calli obtained from cotyledons of hypocotyls (from the culture means that were more efficient in the induction of callus) were divided and inoculated in means supplemented with different concentrations of 2,4-D (0.5; 1.0; 2.0 and 4.0 mg.L -1 ), of kinetin (0 and 0.1 mg.L -1 ) and of sucrose (1.5 and 3%), with the objective of determining the influence of growth regulators and of sucrose on the maintenance and development of the calli. The basal medium used was the MS (MURASHIGE and SKOOG, 1962) containing 8.0 g.L 1 of agar (Merk), the final pH being adjusted to 5.8, before the autoclave was used. For five weeks, the following points were evaluated: growth (fresh matter), morphology and habituation (capacity of the callus to continue growing) of the cotyledons and hypocotyls callus. The completely randomized experiment was conducted in the darkness, at 28 o C. There were 16 treatments with 4 replications, with 5 fragments of callus in each treatment. The results were submitted to the analysis of variance and the mean values of fresh matter were compared by using the Tukey's test at the of 5% level of significance.
RESULTS AND DISCUSSION
Induction of the callogenesis
The production of callus was observed in almost all treatments, except for treatments 1 to 3 which composition did not contain 2,4-D and kinetin, and for treatment 4, which did not contain 2,4-D and sucrose (tables 1 and 2). Treatments 5 and 6, which contained only cytokinin and sucrose, were able to induce the formation of callus. The only difference between these treatments and the treatment 4 was the presence of sucrose and this can be an indication that the addition of only kinetin to the MS basal medium is not enough to induce the formation of callus in cotyledons or in hypocotyls of G. wightii . The cells and tissues of plants cultured in vitro are all practically heterotrophic (PASQUAL et al., 1998), a fact that may be another explanation for the no formation of callus. Besides the hormonal stimulus to induce the beginning of the cell multiplication and the resulting formation of callus, it is necessary the incorporation of a external source providing energy, rich in structures containing carbon, in this case sucrose, necessary for the formation of the framework of cell macromolecules. However, this last possibility is more likely to occur when there is the establishment and maintenance of calli, and not exactly in the callogenesis induction, since the treatments 7, 10, 13, 16 and 19, which did not contain sucrose, were capable to induce the formation of calli. That confirms the results obtained with other species of the genus Glycine , in which the appropriate levels of 2,4-D and the cytokinin, either isolated or interacting with each other, a
|
re able to induce the formation of calli.
|
Also, the new cells produced in the callus would probably use minerals and other source of carbon other than sucrose, contained in the MS basal medium and in the agar (FRANKLIN and DIXON, 1994).
The addition of the regulators 2,4-D and/or cytokinin to the MS culture basal medium seems to be essential for the induction of callus of G. wightii, regarless their source (cotyledons or hypocotyls), as it can be observed for the treatments from 7 to 21, where all of them produced callus in cotyledons as well as in hypocotyls. In some cases, the use of sucrose did not seem to be an essential condition for the production of calli of G. wightii as it was observed for the treatments 7, 10, 13, 16 and 19.
The most adequate levels of the components of the MS basal medium, modified for the formation of callus in cotyledons and hypocotyls were: 2,4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 of and sucrose 3%, used in the treatment 18.
Among the regulators added to the medium, the 2,4-D is known as the main synthetic auxin used to induce the callogenesis, because one of its main characteristics is the capacity to efficiently stimulate the cell division in tissues of several plants (GEORGE, 1996). To induce the growth of callus in explants of dicotyledonous plants, a cytokinin is frequently added to the medium in addition to an auxin. In some cases the 2,4dichlorophenoxyacetic acid can be used separated from other hormones, like the cytokinins, to induce the formation of callus (GASPAR et al., 1996). According to Pasqual et al. (1998), for the induction of callus in plants of wide leaves, the 2,4-D is generally used in levels between 4.5 mM – 13.6 mM (1.0 – 3.0 mg.L -1 ). In spite of 2,4-D be one of the most important factors in the process of stimulating the cell division, it is also important to observe the interactive effects that can happen with other hormones.
The optimum level of sucrose to induce morphogenesis or cell growth differs among genotypes, but is generally between 2 and 4 % (PASQUAL et al., 1998). In the case of G. wightii it was found an optimum concentration of 3 %, thus confirming the results obtained in other works related to the induction of the callogenesis.
Several formulations of medium have been used in the in vitro cultures. According to Bertolucci (2000), the basal medium MS is the most used in tissue cultures. In the case of soybean, this medium is used mostly for the induction of callogenesis and of somatic embryogenesis, but there are examples of modifications, yielting optimization with consequent increase in the amount of formed callus (SAMOYLOV et al., 1998). The results presented in this stage of the work demonstrated, therefore, the optimisation of the basal medium MS for the formation of callus of G. wightii, by the addition of 2,4-D, kinetin and sucrose at the levels of 1.0 mg.L -1 , 0.1 mg.L -1 and 3%, respectively.
TABLE 1 – Percentages of calli obtained in treatments used for induction of callogenesis in cotyledons of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.
LDS = Low Difference Significant 5 % = 4.53
*Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).
TABLE 2 – Percentages of calli obtained in treatments used for induction of callogenesis em hypocotyls of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.
LDS = Low Difference Significant 5 % = 5.43
* Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).
Subculture of the callus
The calli obtained from cotyledons, subcultured in the means containing 1.0 mg.L -1 of 2,4-D, presented the largest mean values of fresh matter, independent of the used concentrations of kinetin and of sucrose. The smallest mean values were observed in the treatments containing 4.0 mg.L -1 of 2,4-D (figure 1). It was also observed that, in these treatments, the calli presented dark brown coloration and hardened consistency, differently from the calli obtained from the media containing 1.0 mg.L -1 of 2,4-D, which presented whitish coloration, friable consistency and diameter of ~ 1.3 cm (Figure 3).
The concentrations of 3 % of sucrose and 0.1 mg.L -1 of kinetin, independent of the used concentrations of 2,4-D, caused an increment in the weight of the calli, during the period of subcultive.
Regarding the subcultive of hypocotyl callus, the medium supplemented with 2,4-D 2.0 m,g.L -1 , kinetin 0.1mg.L -1 of and sucrose 3 % presented the largest mean value of fresh matter (figure 2). All the other medium containing 2.0 or 4.0 mg.L -1 of 2,4-D, presented lower mean values than the other tested media. As can be observed in figures 1, 2 and 3, the high concentration of 2,4-D (4.0 mg.L -1 ) affected the development of the callus in a negative way, delaying the growth and promoting the darkening of the cotyledons and hypocotyls calli.
B D
CONCLUSION
The experimental results obtained in the present work demonstrate that the ideal combination of the concentrations of growth regulators (2,4-D and kinetin) and of sucrose is essential for the induction and subcultive of the cotyledons callus (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 %, for induction as well as for the subculture) and of hypocotyls (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % - for induction and 2.4-D 2.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % for the subculture) of G. wightii. It was also demon- strated that the addition of high concentrations of 2,4-D (4 mg.L -1 ) to the medium of culture promotes a delay in the development of the calli of cotyledons as well as of hypocotyls.
ACKNOWLEDGMENTS
This work was supported by grants from the Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq), Coordenadoria de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) and Fundação Cearense de Amparo à Pesquisa (FUNCAP).
REFERENCES
BERTOLUCCI, S. K. V. Micropropagação, calogênese e abordagem fitoquímica in vivo e in vitro de Tournefortia cf paniculata Chan. 2000. 79 p. Dissertação (Mestrado em Fitotecnia) - Universidade Federal de Lavras, Lavras, 2000.
DORAN, P. M. Foreing protein production in plant tissue cultures. Current Opinion in Biotechnology, London, v. 11, p. 199-204, 2000.
FRANKLIN, C. I.; DIXON, R. A. Initiation and maintenance of callus and cell suspension culture. In: DIXON, R. A.; GONZALES, R. A. (Eds.). Plant cell culture: a pratical approach. Oxford: Oxford University, 1994. p. 1-26.
GASPAR, T.; KEVERS, C.; PENEL, C.; GREPPIN, H.; REID, D. M.; THORPE, T. A. Plant hormones and plant growth regulators in tissue culture. In Vitro Cellular and Development Biology-Plant, Columbia, v. 32, p. 272-289, 1996.
GEORGE, E. F. Plant propagantion by tissue culture: the technology. 2. ed. [S.l.]: Edington Exegetics, 1996. 1574 p.
LITTLE, E. L.; MAGBANUA, Z. V.; PARROTT, W. A. A protocol for repetitive somatic embryogenesis from mature epicotyls of peanut. Plant Cell Report, [S.l.], v. 19, p. 351-357, 2000.
MURASHIGE, T.; SKOOG, F. A revised medium for rapid growth and biossays with tobaco tissue cultures. Physiology Plant, Minneapolis, v. 15, p. 473-479, 1962.
NAGAO, E. O.; PASQUAL, M.; RAMOS, J. D. Efeitos da sacarose e do nitrogênio inorgânico sobre a multiplicação in vitro de brotações de porta-enxerto de citros. Bragantia, Campinas, v. 53, n. 1, p. 25-31, 1994.
PASQUAL, M.; HOFFMANN, A.; RAMOS, J. D. Cultura de tecidos vegetais: tecnologia e aplicações: meios de cultura. Lavras: UFLA/FAEPE, 1998. 127 p.
ROUT, G. R.; DAS, P. Techniques of micropropagation in vitro. In: BOSE, T. K.; MITRA, S. K.; SADHU, M. K.; DAS, P. (Eds.). Propagation of tropical and sub-tropical horticultural crops. Calcutta: Kalyani, 1997. p. 105-16.
ROUT, G. R.; SAMANTARAY, S.; DAS, P. In vitro manipulation and propagation of medicinal plants. Biotechnology Advances, New York, v. 18, p. 91120, 2000.
SAMOYLOV, V. M.; TUCKER, D. M.; PARROTT, W. A. Soybean (Glycine max (L.) Merrill.) embryogenic cultures: the role of sucrose and total nitrogen content on proliferation. In Vitro Cellular and Development Biology-Plant, Columbia, v. 34, p. 8-13, 1998.
| 11,711
|
inside_word
|
are
|
remove_one_sentence
|
<url>
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.883.6345&rep=rep1&type=pdf
</url>
<text>
IN VITRO INDUCTION OF CALLUS FROM COTYLEDON AND HYPOCOTYL EXPLANTS OF Glycine wightii (Wight & Arn.) Verdc.
ANDRÉ LUIS COELHO DA SILVA 1 CECÍLIA SULZBACHER CARUSO 2 RENATO DE AZEVEDO MOREIRA 3 ANA CECÍLIA GÓES HORTA4
ABSTRACT – With the objective to promote in vitro callus induction, cotyledon and hypocotyl segments of "perennial soybean" (Glycine wightii (Wight & Arn.) Verdc.) were inoculated in basal medium MS supplemented with sucrose (1.5 e 3%) and 0.8% agar and different concentrations of 2,4dichlorophenoxyacetic acid (2,4-D) and 6furfurylaminopurine (kinetin). The explants were maintained in a dark growth room at 28 o C. The best callus induction was observed in explants (cotyledon and hypocotyl) maintained in medium containing the combination of 2,4-D (1 mg.L -1 ), kinetin (0.1 mg.L -1 ) and 3% sucrose. To promote callus subculture, the MS
medium was supplemented with different combinations of 2,4-D (0.5 to 4.0 mg.L -1 ), with or without kinetin (0.1 mg.L -1 ) and sucrose (1.5 e 3%). The calli were maintained 35 days in a dark growth room at 28 o C. The results indicated that the use of 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3% provided the highest average weight of cotyledons calli fresh matter, whereas the use of 2,4-D 2.0 mg.L -1 + kinetin 0.1 mg.L 1 + sucrose 3% provided the highest average weight of hypocotyl calli fresh matter. High concentrations of 2,4-D, independent of kinetin and sucrose concentrations, promoted oxidation and reduction in fresh weight from calli of cotyledon and hypocotyls.
INDEX TERMS: Glycine wightii, leguminosae, callogenesis, tissue culture.
INDUÇÃO IN VITRO DE CALOS EM EXPLANTES DE COTILÉDONES E HIPOCÓTILOS DE Glycine wightii (Wight & Arn.) Verdc.
RESUMO – Com o objetivo de promover a indução in vitro de calos, segmentos cotiledonares e de hipocótilos de plântulas de "soja perene" (Glycine wightii (Wight & Arn.) Verdc.) foram inoculados em meio básico MS contendo diferentes concentrações a diferentes de ácido 2,4-diclorofenoxiacético (2,4-D) e 6-furfurilaminopurina (cinetina), suplementado com sacarose (1,5 e 3%) e 0,8% de agar. Os explantes foram mantidos na ausência de luz, em sala de crescimento, com a temperatura de 28 o C. A melhor indução de calos (em cotilédones e hipocótilos) foi observada em explantes inoculados em meio contendo 2,4-D (1,0 mg.L -1 ), cinetina (0,1 mg.L -1 ) e 3% de sacarose. Para promover o subcultivo de calos produzidos, foram utilizadas diferentes concentrações de 2,4-D (0,5 a 4,0 mg.L -1 ), com e sem cinetina (0,1 mg.L -1 ), acrescentando-se sacarose (1,5 e 3%). Os calos foram mantidos por 25 dias na ausência de luz, em sala de crescimento com temperatura de 28 o C. Os resultados indicaram que a combinação de 2,4-D 1,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos cotiledonares, enquanto que a combinação de 2,4-D 2,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos de hipocótilos. Altas concentrações de 2,4-D independentes das concentrações de cinetina e sacarose, promoveram oxidação e diminuição no peso fresco dos calos de cotilédones e de hipocótilos.
TERMOS PARA INDEXAÇÃO: Glycine wightii, leguminosae, calogênese, cultura de tecidos.
1. Engenheiro Agrônomo, MSc., Grupo de Biofísica Molecular e Espectroscopia/USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP, [email protected].
2. Dra., USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP.
3. Professor Titular, Dr., LABLEC-DBBM/UFC, Caixa Postal 6020, 60451-970, Fortaleza, CE.
4. Professor Adjunto, Dra., LABLEC-DBBM/UFC.
INTRODUCTION
Glycine wightii (Wight & Arn.) Verdc. is an important specie belonging to the Leguminosae family, sub-family Papilionoideae, genus Glycine and subgenus Bracteata. It is a perennial creeper plant, native of the South Africa and of the Southwest Asia, generally used for erosion control. In Brazil this plant is known as "perennial soybean".
Among the several applications of the tissue culture, we should emphasize that it is a valuable tool to study the metabolism, physiology and development of plants with specific properties, such as, accumulation of active substances of interest (ROUT et al., 2000; DORAN, 2000).
Research with calli formed from fragments of stems, leaves and roots is mainly carried out to determine the culture conditions required by the explants to survive and grow (SAMOYLOV et al., 1998), to study cell development (LITTLE et al., 2000), to exploit products coming from the primary and secondary metabolism and to obtain cell suspension in propagation (ROUT et al., 2000).
The nutritional requirements necessary for the growth of a tissue in in vitro conditions vary for different species, variety and even between different parts of the plant. So, it is necessary to optimize the culture means (NAGAO et al., 1994). However, there is no standard formulation for this optimization, but the MS medium (MURASHIGE and SKOOG, 1962), with its modifications and dilutions, has presented satisfactory results for several species (ROUT and DAS, 1997).
The production of callus depends mainly on the determination of an adequate balance of growth regulators. However, this balance varies largely in relation to the explant type and to the plant species under investigation. The manipulation of the appropriate levels of auxins and cytokinins is crucial to define the balance of growth regulators so that there is induction of callus formation in the different types of explant (FRANKLIN and DIXON, 1994).
The objective of this work was to promote the in vitro establishment of the "perennial soybean" (Glycine wightii), through the induction and formation of callus, using segments of cotyledons and of hypocotyls as explants, as well as identifying the most adequate medium for the subcultive of formed callus.
MATERIALS AND METHODS
The experiments were carried out in the Laboratory of Lectins and Glycoconjugates (LABLEC), Department of Biochemistry and Molecular Biology (Federal University of Ceará). Glycine wightii seeds, collected in the city of São Carlos-SP (Brazil) were submitted to the treatment of chemical scarification for 10 min with sulfuric acid (98 %) to break the latency. After that, they were washed with sterile distilled water and left to germinate in Petri plates, under dark conditions, at 28 o C in the germination chamber. After 7 days, the seedlings were moved and sterilized with NaClO 2.5 % for 15 minutes, and then washed with sterile distilled water.
Induction of the callogenesis
Segments of cotyledons and hypocotyls with an approximate size of 18 ± 2 mm were used as explants. The explants were inoculated in a basal medium MS (MURASHIGE and SKOOG, 1962) containing different concentrations of the growth regulators (2,4-D and kinetin) and of sucrose according to the treatments: 1) medium without regulators and without sucrose (control); 2) medium without growth regulators with sucrose 1.5 %; 3) medium without growth regulators with sucrose 3 %; 4) medium with kinetin 0.1 mg.L -1 without sucrose; 5) medium with kinetin 0.1 mg.L -1 + sucrose 1.5 %; 6) medium with kinetin 0.1 mg.L -1 + sucrose 3 %; 7) medium with 2,4-D 0.5 mg.L -1 without sucrose; 8) medium with of 2,4-D 0.1 mg.L -1 + sucrose 1.5 %; 9) medium with 2,4-D 0.1 mg.L -1 + sucrose 3 %; 10) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 11) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 12) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 13) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 14) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 15) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %; 16) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 17) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 18) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 19) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 20) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 21) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %. The culture media were solidified with 8.0 g.L -1 agar (Merk), the final pH being adjusted to 5.8.
The sterilization was performed in autoclave, at 121 o C for 15 minutes.
The experiments were completely randomized with 21 treatments, 5 replications per treatment, and 25 explants per replication. After 35 days, a visual evaluation was made, in which the formation of callus, coloration and oxidation degree were observed. The results were submitted to the analysis of variance and the mean values of percentages of the formed callus were compared using the Tukey's test at the 5 % level of significance.
Subculture of the callus.
The calli obtained from cotyledons of hypocotyls (from the culture means that were more efficient in the induction of callus) were divided and inoculated in means supplemented with different concentrations of 2,4-D (0.5; 1.0; 2.0 and 4.0 mg.L -1 ), of kinetin (0 and 0.1 mg.L -1 ) and of sucrose (1.5 and 3%), with the objective of determining the influence of growth regulators and of sucrose on the maintenance and development of the calli. The basal medium used was the MS (MURASHIGE and SKOOG, 1962) containing 8.0 g.L 1 of agar (Merk), the final pH being adjusted to 5.8, before the autoclave was used. For five weeks, the following points were evaluated: growth (fresh matter), morphology and habituation (capacity of the callus to continue growing) of the cotyledons and hypocotyls callus. The completely randomized experiment was conducted in the darkness, at 28 o C. There were 16 treatments with 4 replications, with 5 fragments of callus in each treatment. The results were submitted to the analysis of variance and the mean values of fresh matter were compared by using the Tukey's test at the of 5% level of significance.
RESULTS AND DISCUSSION
Induction of the callogenesis
The production of callus was observed in almost all treatments, except for treatments 1 to 3 which composition did not contain 2,4-D and kinetin, and for treatment 4, which did not contain 2,4-D and sucrose (tables 1 and 2). Treatments 5 and 6, which contained only cytokinin and sucrose, were able to induce the formation of callus. The only difference between these treatments and the treatment 4 was the presence of sucrose and this can be an indication that the addition of only kinetin to the MS basal medium is not enough to induce the formation of callus in cotyledons or in hypocotyls of G. wightii . The cells and tissues of plants cultured in vitro are all practically heterotrophic (PASQUAL et al., 1998), a fact that may be another explanation for the no formation of callus. Besides the hormonal stimulus to induce the beginning of the cell multiplication and the resulting formation of callus, it is necessary the incorporation of a external source providing energy, rich in structures containing carbon, in this case sucrose, necessary for the formation of the framework of cell macromolecules. However, this last possibility is more likely to occur when there is the establishment and maintenance of calli, and not exactly in the callogenesis induction, since the treatments 7, 10, 13, 16 and 19, which did not contain sucrose, were capable to induce the formation of calli. That confirms the results obtained with other species of the genus Glycine , in which the appropriate levels of 2,4-D and the cytokinin, either isolated or interacting with each other, a<cursor_is_here> Also, the new cells produced in the callus would probably use minerals and other source of carbon other than sucrose, contained in the MS basal medium and in the agar (FRANKLIN and DIXON, 1994).
The addition of the regulators 2,4-D and/or cytokinin to the MS culture basal medium seems to be essential for the induction of callus of G. wightii, regarless their source (cotyledons or hypocotyls), as it can be observed for the treatments from 7 to 21, where all of them produced callus in cotyledons as well as in hypocotyls. In some cases, the use of sucrose did not seem to be an essential condition for the production of calli of G. wightii as it was observed for the treatments 7, 10, 13, 16 and 19.
The most adequate levels of the components of the MS basal medium, modified for the formation of callus in cotyledons and hypocotyls were: 2,4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 of and sucrose 3%, used in the treatment 18.
Among the regulators added to the medium, the 2,4-D is known as the main synthetic auxin used to induce the callogenesis, because one of its main characteristics is the capacity to efficiently stimulate the cell division in tissues of several plants (GEORGE, 1996). To induce the growth of callus in explants of dicotyledonous plants, a cytokinin is frequently added to the medium in addition to an auxin. In some cases the 2,4dichlorophenoxyacetic acid can be used separated from other hormones, like the cytokinins, to induce the formation of callus (GASPAR et al., 1996). According to Pasqual et al. (1998), for the induction of callus in plants of wide leaves, the 2,4-D is generally used in levels between 4.5 mM – 13.6 mM (1.0 – 3.0 mg.L -1 ). In spite of 2,4-D be one of the most important factors in the process of stimulating the cell division, it is also important to observe the interactive effects that can happen with other hormones.
The optimum level of sucrose to induce morphogenesis or cell growth differs among genotypes, but is generally between 2 and 4 % (PASQUAL et al., 1998). In the case of G. wightii it was found an optimum concentration of 3 %, thus confirming the results obtained in other works related to the induction of the callogenesis.
Several formulations of medium have been used in the in vitro cultures. According to Bertolucci (2000), the basal medium MS is the most used in tissue cultures. In the case of soybean, this medium is used mostly for the induction of callogenesis and of somatic embryogenesis, but there are examples of modifications, yielting optimization with consequent increase in the amount of formed callus (SAMOYLOV et al., 1998). The results presented in this stage of the work demonstrated, therefore, the optimisation of the basal medium MS for the formation of callus of G. wightii, by the addition of 2,4-D, kinetin and sucrose at the levels of 1.0 mg.L -1 , 0.1 mg.L -1 and 3%, respectively.
TABLE 1 – Percentages of calli obtained in treatments used for induction of callogenesis in cotyledons of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.
LDS = Low Difference Significant 5 % = 4.53
*Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).
TABLE 2 – Percentages of calli obtained in treatments used for induction of callogenesis em hypocotyls of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.
LDS = Low Difference Significant 5 % = 5.43
* Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).
Subculture of the callus
The calli obtained from cotyledons, subcultured in the means containing 1.0 mg.L -1 of 2,4-D, presented the largest mean values of fresh matter, independent of the used concentrations of kinetin and of sucrose. The smallest mean values were observed in the treatments containing 4.0 mg.L -1 of 2,4-D (figure 1). It was also observed that, in these treatments, the calli presented dark brown coloration and hardened consistency, differently from the calli obtained from the media containing 1.0 mg.L -1 of 2,4-D, which presented whitish coloration, friable consistency and diameter of ~ 1.3 cm (Figure 3).
The concentrations of 3 % of sucrose and 0.1 mg.L -1 of kinetin, independent of the used concentrations of 2,4-D, caused an increment in the weight of the calli, during the period of subcultive.
Regarding the subcultive of hypocotyl callus, the medium supplemented with 2,4-D 2.0 m,g.L -1 , kinetin 0.1mg.L -1 of and sucrose 3 % presented the largest mean value of fresh matter (figure 2). All the other medium containing 2.0 or 4.0 mg.L -1 of 2,4-D, presented lower mean values than the other tested media. As can be observed in figures 1, 2 and 3, the high concentration of 2,4-D (4.0 mg.L -1 ) affected the development of the callus in a negative way, delaying the growth and promoting the darkening of the cotyledons and hypocotyls calli.
B D
CONCLUSION
The experimental results obtained in the present work demonstrate that the ideal combination of the concentrations of growth regulators (2,4-D and kinetin) and of sucrose is essential for the induction and subcultive of the cotyledons callus (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 %, for induction as well as for the subculture) and of hypocotyls (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % - for induction and 2.4-D 2.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % for the subculture) of G. wightii. It was also demon- strated that the addition of high concentrations of 2,4-D (4 mg.L -1 ) to the medium of culture promotes a delay in the development of the calli of cotyledons as well as of hypocotyls.
ACKNOWLEDGMENTS
This work was supported by grants from the Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq), Coordenadoria de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) and Fundação Cearense de Amparo à Pesquisa (FUNCAP).
REFERENCES
BERTOLUCCI, S. K. V. Micropropagação, calogênese e abordagem fitoquímica in vivo e in vitro de Tournefortia cf paniculata Chan. 2000. 79 p. Dissertação (Mestrado em Fitotecnia) - Universidade Federal de Lavras, Lavras, 2000.
DORAN, P. M. Foreing protein production in plant tissue cultures. Current Opinion in Biotechnology, London, v. 11, p. 199-204, 2000.
FRANKLIN, C. I.; DIXON, R. A. Initiation and maintenance of callus and cell suspension culture. In: DIXON, R. A.; GONZALES, R. A. (Eds.). Plant cell culture: a pratical approach. Oxford: Oxford University, 1994. p. 1-26.
GASPAR, T.; KEVERS, C.; PENEL, C.; GREPPIN, H.; REID, D. M.; THORPE, T. A. Plant hormones and plant growth regulators in tissue culture. In Vitro Cellular and Development Biology-Plant, Columbia, v. 32, p. 272-289, 1996.
GEORGE, E. F. Plant propagantion by tissue culture: the technology. 2. ed. [S.l.]: Edington Exegetics, 1996. 1574 p.
LITTLE, E. L.; MAGBANUA, Z. V.; PARROTT, W. A. A protocol for repetitive somatic embryogenesis from mature epicotyls of peanut. Plant Cell Report, [S.l.], v. 19, p. 351-357, 2000.
MURASHIGE, T.; SKOOG, F. A revised medium for rapid growth and biossays with tobaco tissue cultures. Physiology Plant, Minneapolis, v. 15, p. 473-479, 1962.
NAGAO, E. O.; PASQUAL, M.; RAMOS, J. D. Efeitos da sacarose e do nitrogênio inorgânico sobre a multiplicação in vitro de brotações de porta-enxerto de citros. Bragantia, Campinas, v. 53, n. 1, p. 25-31, 1994.
PASQUAL, M.; HOFFMANN, A.; RAMOS, J. D. Cultura de tecidos vegetais: tecnologia e aplicações: meios de cultura. Lavras: UFLA/FAEPE, 1998. 127 p.
ROUT, G. R.; DAS, P. Techniques of micropropagation in vitro. In: BOSE, T. K.; MITRA, S. K.; SADHU, M. K.; DAS, P. (Eds.). Propagation of tropical and sub-tropical horticultural crops. Calcutta: Kalyani, 1997. p. 105-16.
ROUT, G. R.; SAMANTARAY, S.; DAS, P. In vitro manipulation and propagation of medicinal plants. Biotechnology Advances, New York, v. 18, p. 91120, 2000.
SAMOYLOV, V. M.; TUCKER, D. M.; PARROTT, W. A. Soybean (Glycine max (L.) Merrill.) embryogenic cultures: the role of sucrose and total nitrogen content on proliferation. In Vitro Cellular and Development Biology-Plant, Columbia, v. 34, p. 8-13, 1998.
</text>
|
[
{
"content": "<url>\nhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.883.6345&rep=rep1&type=pdf\n</url>\n<text>\nIN VITRO INDUCTION OF CALLUS FROM COTYLEDON AND HYPOCOTYL EXPLANTS OF Glycine wightii (Wight & Arn.) Verdc.\n\nANDRÉ LUIS COELHO DA SILVA 1 CECÍLIA SULZBACHER CARUSO 2 RENATO DE AZEVEDO MOREIRA 3 ANA CECÍLIA GÓES HORTA4\n\nABSTRACT – With the objective to promote in vitro callus induction, cotyledon and hypocotyl segments of \"perennial soybean\" (Glycine wightii (Wight & Arn.) Verdc.) were inoculated in basal medium MS supplemented with sucrose (1.5 e 3%) and 0.8% agar and different concentrations of 2,4dichlorophenoxyacetic acid (2,4-D) and 6furfurylaminopurine (kinetin). The explants were maintained in a dark growth room at 28 o C. The best callus induction was observed in explants (cotyledon and hypocotyl) maintained in medium containing the combination of 2,4-D (1 mg.L -1 ), kinetin (0.1 mg.L -1 ) and 3% sucrose. To promote callus subculture, the MS\n\nmedium was supplemented with different combinations of 2,4-D (0.5 to 4.0 mg.L -1 ), with or without kinetin (0.1 mg.L -1 ) and sucrose (1.5 e 3%). The calli were maintained 35 days in a dark growth room at 28 o C. The results indicated that the use of 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3% provided the highest average weight of cotyledons calli fresh matter, whereas the use of 2,4-D 2.0 mg.L -1 + kinetin 0.1 mg.L 1 + sucrose 3% provided the highest average weight of hypocotyl calli fresh matter. High concentrations of 2,4-D, independent of kinetin and sucrose concentrations, promoted oxidation and reduction in fresh weight from calli of cotyledon and hypocotyls.\n\nINDEX TERMS: Glycine wightii, leguminosae, callogenesis, tissue culture.\n\nINDUÇÃO IN VITRO DE CALOS EM EXPLANTES DE COTILÉDONES E HIPOCÓTILOS DE Glycine wightii (Wight & Arn.) Verdc.\n\nRESUMO – Com o objetivo de promover a indução in vitro de calos, segmentos cotiledonares e de hipocótilos de plântulas de \"soja perene\" (Glycine wightii (Wight & Arn.) Verdc.) foram inoculados em meio básico MS contendo diferentes concentrações a diferentes de ácido 2,4-diclorofenoxiacético (2,4-D) e 6-furfurilaminopurina (cinetina), suplementado com sacarose (1,5 e 3%) e 0,8% de agar. Os explantes foram mantidos na ausência de luz, em sala de crescimento, com a temperatura de 28 o C. A melhor indução de calos (em cotilédones e hipocótilos) foi observada em explantes inoculados em meio contendo 2,4-D (1,0 mg.L -1 ), cinetina (0,1 mg.L -1 ) e 3% de sacarose. Para promover o subcultivo de calos produzidos, foram utilizadas diferentes concentrações de 2,4-D (0,5 a 4,0 mg.L -1 ), com e sem cinetina (0,1 mg.L -1 ), acrescentando-se sacarose (1,5 e 3%). Os calos foram mantidos por 25 dias na ausência de luz, em sala de crescimento com temperatura de 28 o C. Os resultados indicaram que a combinação de 2,4-D 1,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos cotiledonares, enquanto que a combinação de 2,4-D 2,0 mg.L -1 + cinetina 0,1 mg.L -1 + sacarose 3% proporcionou a maior média de peso de matéria fresca de calos de hipocótilos. Altas concentrações de 2,4-D independentes das concentrações de cinetina e sacarose, promoveram oxidação e diminuição no peso fresco dos calos de cotilédones e de hipocótilos.\n\nTERMOS PARA INDEXAÇÃO: Glycine wightii, leguminosae, calogênese, cultura de tecidos.\n\n1. Engenheiro Agrônomo, MSc., Grupo de Biofísica Molecular e Espectroscopia/USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP, [email protected].\n\n2. Dra., USP-IFSC, Caixa Postal 369, 13560-970, São Carlos, SP.\n\n3. Professor Titular, Dr., LABLEC-DBBM/UFC, Caixa Postal 6020, 60451-970, Fortaleza, CE.\n\n4. Professor Adjunto, Dra., LABLEC-DBBM/UFC.\n\nINTRODUCTION\n\nGlycine wightii (Wight & Arn.) Verdc. is an important specie belonging to the Leguminosae family, sub-family Papilionoideae, genus Glycine and subgenus Bracteata. It is a perennial creeper plant, native of the South Africa and of the Southwest Asia, generally used for erosion control. In Brazil this plant is known as \"perennial soybean\".\n\nAmong the several applications of the tissue culture, we should emphasize that it is a valuable tool to study the metabolism, physiology and development of plants with specific properties, such as, accumulation of active substances of interest (ROUT et al., 2000; DORAN, 2000).\n\nResearch with calli formed from fragments of stems, leaves and roots is mainly carried out to determine the culture conditions required by the explants to survive and grow (SAMOYLOV et al., 1998), to study cell development (LITTLE et al., 2000), to exploit products coming from the primary and secondary metabolism and to obtain cell suspension in propagation (ROUT et al., 2000).\n\nThe nutritional requirements necessary for the growth of a tissue in in vitro conditions vary for different species, variety and even between different parts of the plant. So, it is necessary to optimize the culture means (NAGAO et al., 1994). However, there is no standard formulation for this optimization, but the MS medium (MURASHIGE and SKOOG, 1962), with its modifications and dilutions, has presented satisfactory results for several species (ROUT and DAS, 1997).\n\nThe production of callus depends mainly on the determination of an adequate balance of growth regulators. However, this balance varies largely in relation to the explant type and to the plant species under investigation. The manipulation of the appropriate levels of auxins and cytokinins is crucial to define the balance of growth regulators so that there is induction of callus formation in the different types of explant (FRANKLIN and DIXON, 1994).\n\nThe objective of this work was to promote the in vitro establishment of the \"perennial soybean\" (Glycine wightii), through the induction and formation of callus, using segments of cotyledons and of hypocotyls as explants, as well as identifying the most adequate medium for the subcultive of formed callus.\n\nMATERIALS AND METHODS\n\nThe experiments were carried out in the Laboratory of Lectins and Glycoconjugates (LABLEC), Department of Biochemistry and Molecular Biology (Federal University of Ceará). Glycine wightii seeds, collected in the city of São Carlos-SP (Brazil) were submitted to the treatment of chemical scarification for 10 min with sulfuric acid (98 %) to break the latency. After that, they were washed with sterile distilled water and left to germinate in Petri plates, under dark conditions, at 28 o C in the germination chamber. After 7 days, the seedlings were moved and sterilized with NaClO 2.5 % for 15 minutes, and then washed with sterile distilled water.\n\nInduction of the callogenesis\n\nSegments of cotyledons and hypocotyls with an approximate size of 18 ± 2 mm were used as explants. The explants were inoculated in a basal medium MS (MURASHIGE and SKOOG, 1962) containing different concentrations of the growth regulators (2,4-D and kinetin) and of sucrose according to the treatments: 1) medium without regulators and without sucrose (control); 2) medium without growth regulators with sucrose 1.5 %; 3) medium without growth regulators with sucrose 3 %; 4) medium with kinetin 0.1 mg.L -1 without sucrose; 5) medium with kinetin 0.1 mg.L -1 + sucrose 1.5 %; 6) medium with kinetin 0.1 mg.L -1 + sucrose 3 %; 7) medium with 2,4-D 0.5 mg.L -1 without sucrose; 8) medium with of 2,4-D 0.1 mg.L -1 + sucrose 1.5 %; 9) medium with 2,4-D 0.1 mg.L -1 + sucrose 3 %; 10) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 11) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 12) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 13) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 14) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 15) medium with 2,4-D 0.5 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %; 16) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 without sucrose; 17) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 1.5 %; 18) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.1 mg.L -1 + sucrose 3 %; 19) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 without sucrose; 20) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 1.5 %; 21) medium with 2,4-D 1.0 mg.L -1 + kinetin 0.5 mg.L -1 + sucrose 3 %. The culture media were solidified with 8.0 g.L -1 agar (Merk), the final pH being adjusted to 5.8.\n\nThe sterilization was performed in autoclave, at 121 o C for 15 minutes.\n\nThe experiments were completely randomized with 21 treatments, 5 replications per treatment, and 25 explants per replication. After 35 days, a visual evaluation was made, in which the formation of callus, coloration and oxidation degree were observed. The results were submitted to the analysis of variance and the mean values of percentages of the formed callus were compared using the Tukey's test at the 5 % level of significance.\n\nSubculture of the callus.\n\nThe calli obtained from cotyledons of hypocotyls (from the culture means that were more efficient in the induction of callus) were divided and inoculated in means supplemented with different concentrations of 2,4-D (0.5; 1.0; 2.0 and 4.0 mg.L -1 ), of kinetin (0 and 0.1 mg.L -1 ) and of sucrose (1.5 and 3%), with the objective of determining the influence of growth regulators and of sucrose on the maintenance and development of the calli. The basal medium used was the MS (MURASHIGE and SKOOG, 1962) containing 8.0 g.L 1 of agar (Merk), the final pH being adjusted to 5.8, before the autoclave was used. For five weeks, the following points were evaluated: growth (fresh matter), morphology and habituation (capacity of the callus to continue growing) of the cotyledons and hypocotyls callus. The completely randomized experiment was conducted in the darkness, at 28 o C. There were 16 treatments with 4 replications, with 5 fragments of callus in each treatment. The results were submitted to the analysis of variance and the mean values of fresh matter were compared by using the Tukey's test at the of 5% level of significance.\n\nRESULTS AND DISCUSSION\n\nInduction of the callogenesis\n\nThe production of callus was observed in almost all treatments, except for treatments 1 to 3 which composition did not contain 2,4-D and kinetin, and for treatment 4, which did not contain 2,4-D and sucrose (tables 1 and 2). Treatments 5 and 6, which contained only cytokinin and sucrose, were able to induce the formation of callus. The only difference between these treatments and the treatment 4 was the presence of sucrose and this can be an indication that the addition of only kinetin to the MS basal medium is not enough to induce the formation of callus in cotyledons or in hypocotyls of G. wightii . The cells and tissues of plants cultured in vitro are all practically heterotrophic (PASQUAL et al., 1998), a fact that may be another explanation for the no formation of callus. Besides the hormonal stimulus to induce the beginning of the cell multiplication and the resulting formation of callus, it is necessary the incorporation of a external source providing energy, rich in structures containing carbon, in this case sucrose, necessary for the formation of the framework of cell macromolecules. However, this last possibility is more likely to occur when there is the establishment and maintenance of calli, and not exactly in the callogenesis induction, since the treatments 7, 10, 13, 16 and 19, which did not contain sucrose, were capable to induce the formation of calli. That confirms the results obtained with other species of the genus Glycine , in which the appropriate levels of 2,4-D and the cytokinin, either isolated or interacting with each other, a<cursor_is_here> Also, the new cells produced in the callus would probably use minerals and other source of carbon other than sucrose, contained in the MS basal medium and in the agar (FRANKLIN and DIXON, 1994).\n\nThe addition of the regulators 2,4-D and/or cytokinin to the MS culture basal medium seems to be essential for the induction of callus of G. wightii, regarless their source (cotyledons or hypocotyls), as it can be observed for the treatments from 7 to 21, where all of them produced callus in cotyledons as well as in hypocotyls. In some cases, the use of sucrose did not seem to be an essential condition for the production of calli of G. wightii as it was observed for the treatments 7, 10, 13, 16 and 19.\n\nThe most adequate levels of the components of the MS basal medium, modified for the formation of callus in cotyledons and hypocotyls were: 2,4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 of and sucrose 3%, used in the treatment 18.\n\nAmong the regulators added to the medium, the 2,4-D is known as the main synthetic auxin used to induce the callogenesis, because one of its main characteristics is the capacity to efficiently stimulate the cell division in tissues of several plants (GEORGE, 1996). To induce the growth of callus in explants of dicotyledonous plants, a cytokinin is frequently added to the medium in addition to an auxin. In some cases the 2,4dichlorophenoxyacetic acid can be used separated from other hormones, like the cytokinins, to induce the formation of callus (GASPAR et al., 1996). According to Pasqual et al. (1998), for the induction of callus in plants of wide leaves, the 2,4-D is generally used in levels between 4.5 mM – 13.6 mM (1.0 – 3.0 mg.L -1 ). In spite of 2,4-D be one of the most important factors in the process of stimulating the cell division, it is also important to observe the interactive effects that can happen with other hormones.\n\nThe optimum level of sucrose to induce morphogenesis or cell growth differs among genotypes, but is generally between 2 and 4 % (PASQUAL et al., 1998). In the case of G. wightii it was found an optimum concentration of 3 %, thus confirming the results obtained in other works related to the induction of the callogenesis.\n\nSeveral formulations of medium have been used in the in vitro cultures. According to Bertolucci (2000), the basal medium MS is the most used in tissue cultures. In the case of soybean, this medium is used mostly for the induction of callogenesis and of somatic embryogenesis, but there are examples of modifications, yielting optimization with consequent increase in the amount of formed callus (SAMOYLOV et al., 1998). The results presented in this stage of the work demonstrated, therefore, the optimisation of the basal medium MS for the formation of callus of G. wightii, by the addition of 2,4-D, kinetin and sucrose at the levels of 1.0 mg.L -1 , 0.1 mg.L -1 and 3%, respectively.\n\nTABLE 1 – Percentages of calli obtained in treatments used for induction of callogenesis in cotyledons of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.\n\nLDS = Low Difference Significant 5 % = 4.53\n\n*Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).\n\nTABLE 2 – Percentages of calli obtained in treatments used for induction of callogenesis em hypocotyls of G. wigthii in relation to different concentrations of 2,4-D, kinetin and sucrose.\n\nLDS = Low Difference Significant 5 % = 5.43\n\n* Mean values followed by the same letter do not differ significantly by the Tukey's test (p<0.05).\n\nSubculture of the callus\n\nThe calli obtained from cotyledons, subcultured in the means containing 1.0 mg.L -1 of 2,4-D, presented the largest mean values of fresh matter, independent of the used concentrations of kinetin and of sucrose. The smallest mean values were observed in the treatments containing 4.0 mg.L -1 of 2,4-D (figure 1). It was also observed that, in these treatments, the calli presented dark brown coloration and hardened consistency, differently from the calli obtained from the media containing 1.0 mg.L -1 of 2,4-D, which presented whitish coloration, friable consistency and diameter of ~ 1.3 cm (Figure 3).\n\nThe concentrations of 3 % of sucrose and 0.1 mg.L -1 of kinetin, independent of the used concentrations of 2,4-D, caused an increment in the weight of the calli, during the period of subcultive.\n\nRegarding the subcultive of hypocotyl callus, the medium supplemented with 2,4-D 2.0 m,g.L -1 , kinetin 0.1mg.L -1 of and sucrose 3 % presented the largest mean value of fresh matter (figure 2). All the other medium containing 2.0 or 4.0 mg.L -1 of 2,4-D, presented lower mean values than the other tested media. As can be observed in figures 1, 2 and 3, the high concentration of 2,4-D (4.0 mg.L -1 ) affected the development of the callus in a negative way, delaying the growth and promoting the darkening of the cotyledons and hypocotyls calli.\n\nB D\n\nCONCLUSION\n\nThe experimental results obtained in the present work demonstrate that the ideal combination of the concentrations of growth regulators (2,4-D and kinetin) and of sucrose is essential for the induction and subcultive of the cotyledons callus (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 %, for induction as well as for the subculture) and of hypocotyls (2.4-D 1.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % - for induction and 2.4-D 2.0 mg.L -1 , kinetin 0.1 mg.L -1 and sucrose 3 % for the subculture) of G. wightii. It was also demon- strated that the addition of high concentrations of 2,4-D (4 mg.L -1 ) to the medium of culture promotes a delay in the development of the calli of cotyledons as well as of hypocotyls.\n\nACKNOWLEDGMENTS\n\nThis work was supported by grants from the Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq), Coordenadoria de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) and Fundação Cearense de Amparo à Pesquisa (FUNCAP).\n\nREFERENCES\n\nBERTOLUCCI, S. K. V. Micropropagação, calogênese e abordagem fitoquímica in vivo e in vitro de Tournefortia cf paniculata Chan. 2000. 79 p. Dissertação (Mestrado em Fitotecnia) - Universidade Federal de Lavras, Lavras, 2000.\n\nDORAN, P. M. Foreing protein production in plant tissue cultures. Current Opinion in Biotechnology, London, v. 11, p. 199-204, 2000.\n\nFRANKLIN, C. I.; DIXON, R. A. Initiation and maintenance of callus and cell suspension culture. In: DIXON, R. A.; GONZALES, R. A. (Eds.). Plant cell culture: a pratical approach. Oxford: Oxford University, 1994. p. 1-26.\n\nGASPAR, T.; KEVERS, C.; PENEL, C.; GREPPIN, H.; REID, D. M.; THORPE, T. A. Plant hormones and plant growth regulators in tissue culture. In Vitro Cellular and Development Biology-Plant, Columbia, v. 32, p. 272-289, 1996.\n\nGEORGE, E. F. Plant propagantion by tissue culture: the technology. 2. ed. [S.l.]: Edington Exegetics, 1996. 1574 p.\n\nLITTLE, E. L.; MAGBANUA, Z. V.; PARROTT, W. A. A protocol for repetitive somatic embryogenesis from mature epicotyls of peanut. Plant Cell Report, [S.l.], v. 19, p. 351-357, 2000.\n\nMURASHIGE, T.; SKOOG, F. A revised medium for rapid growth and biossays with tobaco tissue cultures. Physiology Plant, Minneapolis, v. 15, p. 473-479, 1962.\n\nNAGAO, E. O.; PASQUAL, M.; RAMOS, J. D. Efeitos da sacarose e do nitrogênio inorgânico sobre a multiplicação in vitro de brotações de porta-enxerto de citros. Bragantia, Campinas, v. 53, n. 1, p. 25-31, 1994.\n\nPASQUAL, M.; HOFFMANN, A.; RAMOS, J. D. Cultura de tecidos vegetais: tecnologia e aplicações: meios de cultura. Lavras: UFLA/FAEPE, 1998. 127 p.\n\nROUT, G. R.; DAS, P. Techniques of micropropagation in vitro. In: BOSE, T. K.; MITRA, S. K.; SADHU, M. K.; DAS, P. (Eds.). Propagation of tropical and sub-tropical horticultural crops. Calcutta: Kalyani, 1997. p. 105-16.\n\nROUT, G. R.; SAMANTARAY, S.; DAS, P. In vitro manipulation and propagation of medicinal plants. Biotechnology Advances, New York, v. 18, p. 91120, 2000.\n\nSAMOYLOV, V. M.; TUCKER, D. M.; PARROTT, W. A. Soybean (Glycine max (L.) Merrill.) embryogenic cultures: the role of sucrose and total nitrogen content on proliferation. In Vitro Cellular and Development Biology-Plant, Columbia, v. 34, p. 8-13, 1998.\n</text>\n",
"role": "user"
},
{
"content": "re able to induce the formation of calli.",
"role": "assistant"
}
] |
CHICAGO SUBURBS
Office Market Report
DIRECT AVAILABILITY RATE
4Q 2018
GROSS ASKING RENT (DIRECT)
DIRECT VACANCY RATE
2Q18 21.25%
4Q17 $23.59
2Q18 $24.24
4Q17 21.60%
4Q17 18.18%
2Q18 17.06%
Suburban Office Market Rallies, As Micro-Markets Achieve Record Low Vacancy
As 2018 came to a close, the suburban office market continued its multi-year trend of shrinking vacancy and record investment sales. Direct availability and vacancy both fell from 21.60% to 20.41% and 17.06% to 16.52%, respectively, while direct weighted asking rents climbed to $24.38 from $23.59, year over year. The 2018 year-end total space absorption was a net positive 438,780 sf.
Activity in the Northern submarket accounted for nearly 50% of the area's year-end positive absorption. Contributing factors included Baxford Credit Union moving into the Continental Executive Parke III (75,444 sf) and Astellas Pharma moving into the West Plaza (39,244 sf). Although large subleases (like Walgreens') and potential availabilities (like Takeda and Shire) created an atmosphere of uncertainty, new ownership and redevelopments along the I-94/I-294 4-way interchanges performed well due to their location and low, Lake County taxes.
The O'Hare submarket posted the lowest vacancy rates of the region at 12.80% for all properties, and 8.22% for properties with vacant space under 50,000 sf (see ALL PROPERTIES V. <50K SF). Revealing the submarket's health are completely leased buildings like 2800 & 2860 S River Road and 6400 Shafer Court, where occupancy levels struggled in the past. Trepidation was present when tenants like Wilson Sporting Goods vacated Triangle Plaza for the CBD, but was alleviated when the space was quickly re-let.
Reasonable fear about the future health of the Oakbrook Mall Office micro-market of the EW Corridor abounded when McDonald's announced its intention to vacate its campus for Chicago's Fulton Market. Yet the move triggered much needed plans to repurpose its acreage and develop new office supply. To this point, many of the Class A and B+ properties in the Greater Oakbrook area are 90% occupied with gross asking rates well over $30psf, a first since the "dot-com" economic boom of the late 1990s.
ECONOMIC INDICATORS
Notable Trends
Pressure to Modernize Hits the Suburbs. The amenities' race witnessed in the CBD for years is now present in suburban submarkets, too. Office landlords are learning they need to continually make common area improvements, offer fitness/wellness centers and tenant lounges, and create move-in ready suites to compete for the attention and investment of the area's entrepreneurial and emerging tenants in the market.
Sales Volume High; Leasing Lag-Time Low. According to CoStar, 2018 recorded the third-highest year in gross sales volume in the area ($1.32 billion), behind the sales volume only of 2006 ($1.89 billion) and 2007 ($2.02 billion). For example, office properties in the EW Corridor (Westbrook Corporate Center, Executive Towers, and Central Park of Lisle) the Northern Suburbs (Arbor Lake Centre) and O'Hare (Triangle, Presidents Plaza and O'Hare International Center) all sold at historically high prices this past year. In addition, CoStar reported leases took on average only 14 months to close, a low not seen since 2010
| 4Q17 | 4Q18 |
|---|---|
| 122.1 | |
| 122.1 | |
| 4.10% | |
| 4.50% | |
| 4.70% | |
| 3.90% | |
| INVENTORY (SF) | AVERAGE BUILDING SIZE (SF) | DIRECT AVAILABLE RATE (%) | SUBLET AVAILABLE RATE (%) | DIRECT VACANCY RATE (%) | SUBLET VACANCY RATE (%) | MAX AVAILABLE FLOOR CONTIGUOUS SPACE (SF) | MAX AVAILABLE BUILDING CONTIGUOUS SPACE (SF) | GROSS WEIGHTED ASKING RENTS (DIRECT) | DIRECT NET ABSORPTION 4Q18 (SF) |
|---|---|---|---|---|---|---|---|---|---|
| 122,858,159 | 113,442 | 20.41% | 1.97% | 16.52% | 0.98% | 325,000 | 1,300,000 | $24.38 | 258,690 |
| 74,033,592 | 205,649 | 21.36% | 2.13% | 17.65% | 0.93% | 325,000 | 1,300,000 | $27.38 | 279,802 |
| 48,824,567 | 67,531 | 18.96% | 1.73% | 14.81% | 1.06% | 183,973 | 568,382 | $19.68 | (21,112) |
| 48,910,558 | 100,227 | 17.39% | 2.00% | 13.83% | 1.45% | 79,999 | 329,783 | $24.33 | 13,920 |
| 24,115,606 | 104,397 | 16.64% | 2.30% | 12.93% | 1.71% | 66,451 | 163,254 | $25.59 | (123,365) |
| 14,064,202 | 209,913 | 15.89% | 1.63% | 12.55% | 0.74% | 52,344 | 163,254 | $29.82 | (119,681) |
| 10,051,404 | 61,289 | 17.67% | 3.23% | 13.46% | 3.08% | 66,451 | 127,446 | $19.99 | (3,684) |
| 3,777,869 | 59,966 | 18.16% | 0.18% | 14.64% | 0.00% | 79,999 | 147,740 | $22.42 | (5,766) |
| 1,548,756 | 140,796 | 18.18% | 0.45% | 18.66% | 0.00% | 79,999 | 147,740 | $27.64 | 4,414 |
| 2,229,113 | 42,868 | 18.15% | 0.00% | 11.85% | 0.00% | 46,624 | 46,624 | $20.18 | (10,180) |
| 21,017,083 | 108,335 | 18.11% | 1.98% | 14.71% | 1.40% | 73,828 | 329,783 | $23.15 | 143,051 |
| 12,269,960 | 204,499 | 19.54% | 2.36% | 16.57% | 1.97% | 69,974 | 329,783 | $25.57 | 130,510 |
| 8,747,123 | 65,277 | 16.10% | 1.45% | 12.10% | 0.59% | 73,828 | 194,954 | $19.33 | 12,541 |
| 30,126,390 | 113,257 | 18.45% | 3.41% | 15.23% | 1.11% | 183,973 | 302,678 | $25.10 | 30,622 |
| 9,303,923 | 120,830 | 11.20% | 1.40% | 9.01% | 0.77% | 183,973 | 205,724 | $25.59 | 48,245 |
| 4,358,601 | 181,608 | 12.73% | 1.97% | 11.95% | 1.48% | 77,902 | 168,167 | $27.93 | 39,766 |
| 4,945,322 | 93,308 | 9.84% | 0.90% | 6.42% | 0.15% | 183,973 | 205,724 | $22.14 | 8,479 |
| 16,179,308 | 112,356 | 22.57% | 4.55% | 19.97% | 1.16% | 174,886 | 302,678 | $22.05 | 32,504 |
| 10,882,578 | 164,888 | 27.14% | 4.72% | 24.95% | 0.69% | 174,886 | 302,678 | $25.84 | 32,703 |
| 5,296,730 | 67,907 | 13.20% | 4.22% | 9.73% | 2.11% | 98,105 | 105,486 | $19.82 | (199) |
| 4,643,159 | 103,181 | 18.61% | 3.44% | 11.21% | 1.65% | 160,000 | 160,000 | $29.28 | (50,127) |
| 2,374,069 | 169,576 | 10.81% | 4.83% | 5.64% | 3.22% | 25,383 | 25,383 | $35.98 | (21,667) |
| 2,269,090 | 73,196 | 26.78% | 1.99% | 17.04% | 0.00% | 160,000 | 160,000 | $23.84 | (28,460) |
| 30,945,916 | 126,310 | 28.09% | 0.95% | 23.58% | 0.40% | 325,000 | 1,300,000 | $22.60 | 93,727 |
| 4,598,914 | 104,521 | 31.92% | 0.27% | 29.39% | 0.00% | 125,523 | 284,094 | $22.15 | 16,963 |
| 2,985,468 | 199,031 | 30.19% | 0.42% | 29.83% | 0.00% | 34,191 | 284,094 | $25.23 | 16,963 |
| 1,613,446 | 55,636 | 35.11% | 0.00% | 28.58% | 0.00% | 125,523 | 125,523 | $16.88 | 0 |
| 26,347,002 | 131,080 | 27.42% | 1.06% | 22.57% | 0.47% | 325,000 | 1,300,000 | $22.73 | 76,764 |
| 17,081,200 | 275,503 | 27.11% | 1.21% | 21.53% | 0.53% | 325,000 | 1,300,000 | $25.09 | 121,470 |
| 9,265,802 | 66,660 | 27.99% | 0.79% | 24.49% | 0.36% | 54,641 | 568,382 | $19.41 | (44,706) |
| 12,875,295 | 153,277 | 18.01% | 0.94% | 12.80% | 0.30% | 53,427 | 143,001 | $28.68 | 120,421 |
| 8,468,758 | 206,555 | 18.93% | 1.37% | 12.32% | 0.42% | 53,427 | 143,001 | $32.94 | 75,324 |
| 4,406,537 | 102,478 | 16.24% | 0.11% | 13.72% | 0.08% | 31,809 | 47,847 | $19.66 | 45,097 |
RENT PSF, QUARTER CHANGE
BY THE NUMBERS
| | CBD A & B ONLY | SUBURBAN A & B ONLY |
|---|---|---|
| Direct Available | 13.93% | |
| Direct Availability % <50,000 SF | 6.12% | |
| Sublet Available | 2.05% | |
| Direct Vacancy | 11.84% | |
| Direct Vacancy % <50,000 SF | 5.66% | |
| Average Months to Lease | 10 | |
| Gross Asking Rate | $43.67 | |
| Current Quarter Absorption | 165,704 | |
| Max Contiguous Space | 363,204 | |
SUBMARKET VACANCY & ABSORPTION
200South Michigan Avenue,18th Floor, Chicago, Illinois 60604
MAX BUILDING AVAILABLE CONTIGUOUS SPACE
SUBLET AVAILABLE SPACE
| PROPERTY | SUBMARKET | CLASS |
|---|---|---|
| AT&T Center / Lakewood Center, Hoffman Estates | Schaumburg | A |
| 2001 Lakewood Boulevard, Hoffman Estates | Schaumburg | B |
| PROPERTY | SUBMARKET | CLASS | MAX AVAILABLE SPACE (SF) |
|---|---|---|---|
| Walgreens (1411,1415,1417 & 1419 Lake Cook), Deerfield | North Northern | A/B | 425,961 |
| 215 W Diehl Road, Naperville | West / East-West Corridor | A | 162,000 |
NOTEWORTHY LEASES
| PROPERTY | SUBMARKET | SF |
|---|---|---|
| Naperville Woods Office Center, Naperville | West / East-West Corridor | 113,389 |
| Bannockburn Lakes, Bannockburn | North Northern | 100,000 |
| Woodfield Preserve Office Corridor, Schaumburg | Schaumburg | 75,000 |
| 2400 Ogden, Lisle | West / East-West Corridor | 71,000 |
SALES TRANSACTIONS
| Schaumburg | 910,000 | CT Acquisitions | Walton Street Capital |
|---|---|---|---|
| O'Hare | 631,145 | Shidler Group | Equity Commonwealth |
| North Northern | 560,000 | AbbVie | UBS Realty Advisors |
| O'Hare | 517,640 | Bridge Investment Group | Simon Property Group and Blackstone |
ALL PROPERTIES V. PROPERTIES WITH < 50,000 SF AVAILABLE SPACE
| PROPERTY | ALL PROPERTIES' AVAILABILITIES | PROPERTIES WITH <50,000 SF AVAILABLE | PERCENT DIFFERENCE | ALL PROPERTIES' VACANCIES | PROPERTIES WITH <50,000 SF VACANT |
|---|---|---|---|---|---|
| Suburban All | 20.41% | 10.04% | 10.37% | 16.52% | 8.22% |
| Suburban A | 21.36% | 8.10% | 13.26% | 17.65% | 6.92% |
| Suburban B | 18.96% | 12.22% | 6.74% | 14.81% | 9.68% |
| East-West Corridor | 17.39% | 10.76% | 6.63% | 13.83% | 8.72% |
| North | 18.45% | 8.44% | 10.01% | 15.23% | 6.92% |
| Northwest | 28.09% | 10.04% | 18.05% | 23.58% | 8.22% |
| O'Hare | 18.01% | 10.04% | 7.97% | 12.80% | 8.22% |
200South Michigan Avenue,18th Floor, Chicago, Illinois 60604
|
<urn:uuid:28a64914-e8cf-4089-92a7-845cf19f313b>
|
CC-MAIN-2023-23
|
https://www.bradfordallen.com/wp-content/uploads/2019/01/Market_Report_Suburban_4Q_2018.pdf
|
2023-06-02T14:54:41+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-23/subset=warc/part-00207-ffa3bf93-6ba1-4a27-adea-b0baae3b4389.c000.gz.parquet
| 747,865,954
| 3,832
|
eng_Latn
|
eng_Latn
| 0.461264
|
eng_Latn
| 0.992087
|
[
"eng_Latn",
"unknown",
"dan_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3399,
6939,
7473,
9345
] |
CHICAGO SUBURBS
Office Market Report
DIRECT AVAILABILITY RATE
4Q 2018
GROSS ASKING RENT (DIRECT)
DIRECT VACANCY RATE
2Q18 21.25%
4Q17 $23.59
2Q18 $24.24
4Q17 21.60%
4Q17 18.18%
2Q18 17.06%
Suburban Office Market Rallies, As Micro-Markets Achieve Record Low Vacancy
As 2018 came to a close, the suburban office market continued its multi-year trend of shrinking vacancy and record investment sales. Direct availability and vacancy both fell from 21.60% to 20.41% and 17.06% to 16.52%, respectively, while direct weighted asking rents climbed to $24.38 from $23.59, year over year. The 2018 year-end total space absorption was a net positive 438,780 sf.
Activity in the Northern submarket accounted for nearly 50% of the area's year-end positive absorption. Contributing factors included Baxford Credit Union moving into the Continental Executive Parke III (75,444 sf) and Astellas Pharma moving into the West Plaza (39,244 sf). Although large subleases (like Walgreens') and potential availabilities (like Takeda and Shire) created an atmosphere of uncertainty, new ownership and redevelopments along the I-94/I-294 4-way interchanges performed well due to their location and low, Lake County taxes.
The O'Hare submarket posted the lowest vacancy rates of the region at 12.80% for all properties, and 8.22% for properties with vacant space under 50,000 sf (see ALL PROPERTIES V. <50K SF). Revealing the submarket's health are completely leased buildings like 2800 & 2860 S River Road and 6400 Shafer Court, where occupancy levels strugg
|
led in the past.
|
Trepidation was present when tenants like Wilson Sporting Goods vacated Triangle Plaza for the CBD, but was alleviated when the space was quickly re-let.
Reasonable fear about the future health of the Oakbrook Mall Office micro-market of the EW Corridor abounded when McDonald's announced its intention to vacate its campus for Chicago's Fulton Market. Yet the move triggered much needed plans to repurpose its acreage and develop new office supply. To this point, many of the Class A and B+ properties in the Greater Oakbrook area are 90% occupied with gross asking rates well over $30psf, a first since the "dot-com" economic boom of the late 1990s.
ECONOMIC INDICATORS
Notable Trends
Pressure to Modernize Hits the Suburbs. The amenities' race witnessed in the CBD for years is now present in suburban submarkets, too. Office landlords are learning they need to continually make common area improvements, offer fitness/wellness centers and tenant lounges, and create move-in ready suites to compete for the attention and investment of the area's entrepreneurial and emerging tenants in the market.
Sales Volume High; Leasing Lag-Time Low. According to CoStar, 2018 recorded the third-highest year in gross sales volume in the area ($1.32 billion), behind the sales volume only of 2006 ($1.89 billion) and 2007 ($2.02 billion). For example, office properties in the EW Corridor (Westbrook Corporate Center, Executive Towers, and Central Park of Lisle) the Northern Suburbs (Arbor Lake Centre) and O'Hare (Triangle, Presidents Plaza and O'Hare International Center) all sold at historically high prices this past year. In addition, CoStar reported leases took on average only 14 months to close, a low not seen since 2010
| 4Q17 | 4Q18 |
|---|---|
| 122.1 | |
| 122.1 | |
| 4.10% | |
| 4.50% | |
| 4.70% | |
| 3.90% | |
| INVENTORY (SF) | AVERAGE BUILDING SIZE (SF) | DIRECT AVAILABLE RATE (%) | SUBLET AVAILABLE RATE (%) | DIRECT VACANCY RATE (%) | SUBLET VACANCY RATE (%) | MAX AVAILABLE FLOOR CONTIGUOUS SPACE (SF) | MAX AVAILABLE BUILDING CONTIGUOUS SPACE (SF) | GROSS WEIGHTED ASKING RENTS (DIRECT) | DIRECT NET ABSORPTION 4Q18 (SF) |
|---|---|---|---|---|---|---|---|---|---|
| 122,858,159 | 113,442 | 20.41% | 1.97% | 16.52% | 0.98% | 325,000 | 1,300,000 | $24.38 | 258,690 |
| 74,033,592 | 205,649 | 21.36% | 2.13% | 17.65% | 0.93% | 325,000 | 1,300,000 | $27.38 | 279,802 |
| 48,824,567 | 67,531 | 18.96% | 1.73% | 14.81% | 1.06% | 183,973 | 568,382 | $19.68 | (21,112) |
| 48,910,558 | 100,227 | 17.39% | 2.00% | 13.83% | 1.45% | 79,999 | 329,783 | $24.33 | 13,920 |
| 24,115,606 | 104,397 | 16.64% | 2.30% | 12.93% | 1.71% | 66,451 | 163,254 | $25.59 | (123,365) |
| 14,064,202 | 209,913 | 15.89% | 1.63% | 12.55% | 0.74% | 52,344 | 163,254 | $29.82 | (119,681) |
| 10,051,404 | 61,289 | 17.67% | 3.23% | 13.46% | 3.08% | 66,451 | 127,446 | $19.99 | (3,684) |
| 3,777,869 | 59,966 | 18.16% | 0.18% | 14.64% | 0.00% | 79,999 | 147,740 | $22.42 | (5,766) |
| 1,548,756 | 140,796 | 18.18% | 0.45% | 18.66% | 0.00% | 79,999 | 147,740 | $27.64 | 4,414 |
| 2,229,113 | 42,868 | 18.15% | 0.00% | 11.85% | 0.00% | 46,624 | 46,624 | $20.18 | (10,180) |
| 21,017,083 | 108,335 | 18.11% | 1.98% | 14.71% | 1.40% | 73,828 | 329,783 | $23.15 | 143,051 |
| 12,269,960 | 204,499 | 19.54% | 2.36% | 16.57% | 1.97% | 69,974 | 329,783 | $25.57 | 130,510 |
| 8,747,123 | 65,277 | 16.10% | 1.45% | 12.10% | 0.59% | 73,828 | 194,954 | $19.33 | 12,541 |
| 30,126,390 | 113,257 | 18.45% | 3.41% | 15.23% | 1.11% | 183,973 | 302,678 | $25.10 | 30,622 |
| 9,303,923 | 120,830 | 11.20% | 1.40% | 9.01% | 0.77% | 183,973 | 205,724 | $25.59 | 48,245 |
| 4,358,601 | 181,608 | 12.73% | 1.97% | 11.95% | 1.48% | 77,902 | 168,167 | $27.93 | 39,766 |
| 4,945,322 | 93,308 | 9.84% | 0.90% | 6.42% | 0.15% | 183,973 | 205,724 | $22.14 | 8,479 |
| 16,179,308 | 112,356 | 22.57% | 4.55% | 19.97% | 1.16% | 174,886 | 302,678 | $22.05 | 32,504 |
| 10,882,578 | 164,888 | 27.14% | 4.72% | 24.95% | 0.69% | 174,886 | 302,678 | $25.84 | 32,703 |
| 5,296,730 | 67,907 | 13.20% | 4.22% | 9.73% | 2.11% | 98,105 | 105,486 | $19.82 | (199) |
| 4,643,159 | 103,181 | 18.61% | 3.44% | 11.21% | 1.65% | 160,000 | 160,000 | $29.28 | (50,127) |
| 2,374,069 | 169,576 | 10.81% | 4.83% | 5.64% | 3.22% | 25,383 | 25,383 | $35.98 | (21,667) |
| 2,269,090 | 73,196 | 26.78% | 1.99% | 17.04% | 0.00% | 160,000 | 160,000 | $23.84 | (28,460) |
| 30,945,916 | 126,310 | 28.09% | 0.95% | 23.58% | 0.40% | 325,000 | 1,300,000 | $22.60 | 93,727 |
| 4,598,914 | 104,521 | 31.92% | 0.27% | 29.39% | 0.00% | 125,523 | 284,094 | $22.15 | 16,963 |
| 2,985,468 | 199,031 | 30.19% | 0.42% | 29.83% | 0.00% | 34,191 | 284,094 | $25.23 | 16,963 |
| 1,613,446 | 55,636 | 35.11% | 0.00% | 28.58% | 0.00% | 125,523 | 125,523 | $16.88 | 0 |
| 26,347,002 | 131,080 | 27.42% | 1.06% | 22.57% | 0.47% | 325,000 | 1,300,000 | $22.73 | 76,764 |
| 17,081,200 | 275,503 | 27.11% | 1.21% | 21.53% | 0.53% | 325,000 | 1,300,000 | $25.09 | 121,470 |
| 9,265,802 | 66,660 | 27.99% | 0.79% | 24.49% | 0.36% | 54,641 | 568,382 | $19.41 | (44,706) |
| 12,875,295 | 153,277 | 18.01% | 0.94% | 12.80% | 0.30% | 53,427 | 143,001 | $28.68 | 120,421 |
| 8,468,758 | 206,555 | 18.93% | 1.37% | 12.32% | 0.42% | 53,427 | 143,001 | $32.94 | 75,324 |
| 4,406,537 | 102,478 | 16.24% | 0.11% | 13.72% | 0.08% | 31,809 | 47,847 | $19.66 | 45,097 |
RENT PSF, QUARTER CHANGE
BY THE NUMBERS
| | CBD A & B ONLY | SUBURBAN A & B ONLY |
|---|---|---|
| Direct Available | 13.93% | |
| Direct Availability % <50,000 SF | 6.12% | |
| Sublet Available | 2.05% | |
| Direct Vacancy | 11.84% | |
| Direct Vacancy % <50,000 SF | 5.66% | |
| Average Months to Lease | 10 | |
| Gross Asking Rate | $43.67 | |
| Current Quarter Absorption | 165,704 | |
| Max Contiguous Space | 363,204 | |
SUBMARKET VACANCY & ABSORPTION
200South Michigan Avenue,18th Floor, Chicago, Illinois 60604
MAX BUILDING AVAILABLE CONTIGUOUS SPACE
SUBLET AVAILABLE SPACE
| PROPERTY | SUBMARKET | CLASS |
|---|---|---|
| AT&T Center / Lakewood Center, Hoffman Estates | Schaumburg | A |
| 2001 Lakewood Boulevard, Hoffman Estates | Schaumburg | B |
| PROPERTY | SUBMARKET | CLASS | MAX AVAILABLE SPACE (SF) |
|---|---|---|---|
| Walgreens (1411,1415,1417 & 1419 Lake Cook), Deerfield | North Northern | A/B | 425,961 |
| 215 W Diehl Road, Naperville | West / East-West Corridor | A | 162,000 |
NOTEWORTHY LEASES
| PROPERTY | SUBMARKET | SF |
|---|---|---|
| Naperville Woods Office Center, Naperville | West / East-West Corridor | 113,389 |
| Bannockburn Lakes, Bannockburn | North Northern | 100,000 |
| Woodfield Preserve Office Corridor, Schaumburg | Schaumburg | 75,000 |
| 2400 Ogden, Lisle | West / East-West Corridor | 71,000 |
SALES TRANSACTIONS
| Schaumburg | 910,000 | CT Acquisitions | Walton Street Capital |
|---|---|---|---|
| O'Hare | 631,145 | Shidler Group | Equity Commonwealth |
| North Northern | 560,000 | AbbVie | UBS Realty Advisors |
| O'Hare | 517,640 | Bridge Investment Group | Simon Property Group and Blackstone |
ALL PROPERTIES V. PROPERTIES WITH < 50,000 SF AVAILABLE SPACE
| PROPERTY | ALL PROPERTIES' AVAILABILITIES | PROPERTIES WITH <50,000 SF AVAILABLE | PERCENT DIFFERENCE | ALL PROPERTIES' VACANCIES | PROPERTIES WITH <50,000 SF VACANT |
|---|---|---|---|---|---|
| Suburban All | 20.41% | 10.04% | 10.37% | 16.52% | 8.22% |
| Suburban A | 21.36% | 8.10% | 13.26% | 17.65% | 6.92% |
| Suburban B | 18.96% | 12.22% | 6.74% | 14.81% | 9.68% |
| East-West Corridor | 17.39% | 10.76% | 6.63% | 13.83% | 8.72% |
| North | 18.45% | 8.44% | 10.01% | 15.23% | 6.92% |
| Northwest | 28.09% | 10.04% | 18.05% | 23.58% | 8.22% |
| O'Hare | 18.01% | 10.04% | 7.97% | 12.80% | 8.22% |
200South Michigan Avenue,18th Floor, Chicago, Illinois 60604
| 1,550
|
inside_word
|
struggled
|
remove_one_sentence
|
<url>
https://www.bradfordallen.com/wp-content/uploads/2019/01/Market_Report_Suburban_4Q_2018.pdf
</url>
<text>
CHICAGO SUBURBS
Office Market Report
DIRECT AVAILABILITY RATE
4Q 2018
GROSS ASKING RENT (DIRECT)
DIRECT VACANCY RATE
2Q18 21.25%
4Q17 $23.59
2Q18 $24.24
4Q17 21.60%
4Q17 18.18%
2Q18 17.06%
Suburban Office Market Rallies, As Micro-Markets Achieve Record Low Vacancy
As 2018 came to a close, the suburban office market continued its multi-year trend of shrinking vacancy and record investment sales. Direct availability and vacancy both fell from 21.60% to 20.41% and 17.06% to 16.52%, respectively, while direct weighted asking rents climbed to $24.38 from $23.59, year over year. The 2018 year-end total space absorption was a net positive 438,780 sf.
Activity in the Northern submarket accounted for nearly 50% of the area's year-end positive absorption. Contributing factors included Baxford Credit Union moving into the Continental Executive Parke III (75,444 sf) and Astellas Pharma moving into the West Plaza (39,244 sf). Although large subleases (like Walgreens') and potential availabilities (like Takeda and Shire) created an atmosphere of uncertainty, new ownership and redevelopments along the I-94/I-294 4-way interchanges performed well due to their location and low, Lake County taxes.
The O'Hare submarket posted the lowest vacancy rates of the region at 12.80% for all properties, and 8.22% for properties with vacant space under 50,000 sf (see ALL PROPERTIES V. <50K SF). Revealing the submarket's health are completely leased buildings like 2800 & 2860 S River Road and 6400 Shafer Court, where occupancy levels strugg<cursor_is_here> Trepidation was present when tenants like Wilson Sporting Goods vacated Triangle Plaza for the CBD, but was alleviated when the space was quickly re-let.
Reasonable fear about the future health of the Oakbrook Mall Office micro-market of the EW Corridor abounded when McDonald's announced its intention to vacate its campus for Chicago's Fulton Market. Yet the move triggered much needed plans to repurpose its acreage and develop new office supply. To this point, many of the Class A and B+ properties in the Greater Oakbrook area are 90% occupied with gross asking rates well over $30psf, a first since the "dot-com" economic boom of the late 1990s.
ECONOMIC INDICATORS
Notable Trends
Pressure to Modernize Hits the Suburbs. The amenities' race witnessed in the CBD for years is now present in suburban submarkets, too. Office landlords are learning they need to continually make common area improvements, offer fitness/wellness centers and tenant lounges, and create move-in ready suites to compete for the attention and investment of the area's entrepreneurial and emerging tenants in the market.
Sales Volume High; Leasing Lag-Time Low. According to CoStar, 2018 recorded the third-highest year in gross sales volume in the area ($1.32 billion), behind the sales volume only of 2006 ($1.89 billion) and 2007 ($2.02 billion). For example, office properties in the EW Corridor (Westbrook Corporate Center, Executive Towers, and Central Park of Lisle) the Northern Suburbs (Arbor Lake Centre) and O'Hare (Triangle, Presidents Plaza and O'Hare International Center) all sold at historically high prices this past year. In addition, CoStar reported leases took on average only 14 months to close, a low not seen since 2010
| 4Q17 | 4Q18 |
|---|---|
| 122.1 | |
| 122.1 | |
| 4.10% | |
| 4.50% | |
| 4.70% | |
| 3.90% | |
| INVENTORY (SF) | AVERAGE BUILDING SIZE (SF) | DIRECT AVAILABLE RATE (%) | SUBLET AVAILABLE RATE (%) | DIRECT VACANCY RATE (%) | SUBLET VACANCY RATE (%) | MAX AVAILABLE FLOOR CONTIGUOUS SPACE (SF) | MAX AVAILABLE BUILDING CONTIGUOUS SPACE (SF) | GROSS WEIGHTED ASKING RENTS (DIRECT) | DIRECT NET ABSORPTION 4Q18 (SF) |
|---|---|---|---|---|---|---|---|---|---|
| 122,858,159 | 113,442 | 20.41% | 1.97% | 16.52% | 0.98% | 325,000 | 1,300,000 | $24.38 | 258,690 |
| 74,033,592 | 205,649 | 21.36% | 2.13% | 17.65% | 0.93% | 325,000 | 1,300,000 | $27.38 | 279,802 |
| 48,824,567 | 67,531 | 18.96% | 1.73% | 14.81% | 1.06% | 183,973 | 568,382 | $19.68 | (21,112) |
| 48,910,558 | 100,227 | 17.39% | 2.00% | 13.83% | 1.45% | 79,999 | 329,783 | $24.33 | 13,920 |
| 24,115,606 | 104,397 | 16.64% | 2.30% | 12.93% | 1.71% | 66,451 | 163,254 | $25.59 | (123,365) |
| 14,064,202 | 209,913 | 15.89% | 1.63% | 12.55% | 0.74% | 52,344 | 163,254 | $29.82 | (119,681) |
| 10,051,404 | 61,289 | 17.67% | 3.23% | 13.46% | 3.08% | 66,451 | 127,446 | $19.99 | (3,684) |
| 3,777,869 | 59,966 | 18.16% | 0.18% | 14.64% | 0.00% | 79,999 | 147,740 | $22.42 | (5,766) |
| 1,548,756 | 140,796 | 18.18% | 0.45% | 18.66% | 0.00% | 79,999 | 147,740 | $27.64 | 4,414 |
| 2,229,113 | 42,868 | 18.15% | 0.00% | 11.85% | 0.00% | 46,624 | 46,624 | $20.18 | (10,180) |
| 21,017,083 | 108,335 | 18.11% | 1.98% | 14.71% | 1.40% | 73,828 | 329,783 | $23.15 | 143,051 |
| 12,269,960 | 204,499 | 19.54% | 2.36% | 16.57% | 1.97% | 69,974 | 329,783 | $25.57 | 130,510 |
| 8,747,123 | 65,277 | 16.10% | 1.45% | 12.10% | 0.59% | 73,828 | 194,954 | $19.33 | 12,541 |
| 30,126,390 | 113,257 | 18.45% | 3.41% | 15.23% | 1.11% | 183,973 | 302,678 | $25.10 | 30,622 |
| 9,303,923 | 120,830 | 11.20% | 1.40% | 9.01% | 0.77% | 183,973 | 205,724 | $25.59 | 48,245 |
| 4,358,601 | 181,608 | 12.73% | 1.97% | 11.95% | 1.48% | 77,902 | 168,167 | $27.93 | 39,766 |
| 4,945,322 | 93,308 | 9.84% | 0.90% | 6.42% | 0.15% | 183,973 | 205,724 | $22.14 | 8,479 |
| 16,179,308 | 112,356 | 22.57% | 4.55% | 19.97% | 1.16% | 174,886 | 302,678 | $22.05 | 32,504 |
| 10,882,578 | 164,888 | 27.14% | 4.72% | 24.95% | 0.69% | 174,886 | 302,678 | $25.84 | 32,703 |
| 5,296,730 | 67,907 | 13.20% | 4.22% | 9.73% | 2.11% | 98,105 | 105,486 | $19.82 | (199) |
| 4,643,159 | 103,181 | 18.61% | 3.44% | 11.21% | 1.65% | 160,000 | 160,000 | $29.28 | (50,127) |
| 2,374,069 | 169,576 | 10.81% | 4.83% | 5.64% | 3.22% | 25,383 | 25,383 | $35.98 | (21,667) |
| 2,269,090 | 73,196 | 26.78% | 1.99% | 17.04% | 0.00% | 160,000 | 160,000 | $23.84 | (28,460) |
| 30,945,916 | 126,310 | 28.09% | 0.95% | 23.58% | 0.40% | 325,000 | 1,300,000 | $22.60 | 93,727 |
| 4,598,914 | 104,521 | 31.92% | 0.27% | 29.39% | 0.00% | 125,523 | 284,094 | $22.15 | 16,963 |
| 2,985,468 | 199,031 | 30.19% | 0.42% | 29.83% | 0.00% | 34,191 | 284,094 | $25.23 | 16,963 |
| 1,613,446 | 55,636 | 35.11% | 0.00% | 28.58% | 0.00% | 125,523 | 125,523 | $16.88 | 0 |
| 26,347,002 | 131,080 | 27.42% | 1.06% | 22.57% | 0.47% | 325,000 | 1,300,000 | $22.73 | 76,764 |
| 17,081,200 | 275,503 | 27.11% | 1.21% | 21.53% | 0.53% | 325,000 | 1,300,000 | $25.09 | 121,470 |
| 9,265,802 | 66,660 | 27.99% | 0.79% | 24.49% | 0.36% | 54,641 | 568,382 | $19.41 | (44,706) |
| 12,875,295 | 153,277 | 18.01% | 0.94% | 12.80% | 0.30% | 53,427 | 143,001 | $28.68 | 120,421 |
| 8,468,758 | 206,555 | 18.93% | 1.37% | 12.32% | 0.42% | 53,427 | 143,001 | $32.94 | 75,324 |
| 4,406,537 | 102,478 | 16.24% | 0.11% | 13.72% | 0.08% | 31,809 | 47,847 | $19.66 | 45,097 |
RENT PSF, QUARTER CHANGE
BY THE NUMBERS
| | CBD A & B ONLY | SUBURBAN A & B ONLY |
|---|---|---|
| Direct Available | 13.93% | |
| Direct Availability % <50,000 SF | 6.12% | |
| Sublet Available | 2.05% | |
| Direct Vacancy | 11.84% | |
| Direct Vacancy % <50,000 SF | 5.66% | |
| Average Months to Lease | 10 | |
| Gross Asking Rate | $43.67 | |
| Current Quarter Absorption | 165,704 | |
| Max Contiguous Space | 363,204 | |
SUBMARKET VACANCY & ABSORPTION
200South Michigan Avenue,18th Floor, Chicago, Illinois 60604
MAX BUILDING AVAILABLE CONTIGUOUS SPACE
SUBLET AVAILABLE SPACE
| PROPERTY | SUBMARKET | CLASS |
|---|---|---|
| AT&T Center / Lakewood Center, Hoffman Estates | Schaumburg | A |
| 2001 Lakewood Boulevard, Hoffman Estates | Schaumburg | B |
| PROPERTY | SUBMARKET | CLASS | MAX AVAILABLE SPACE (SF) |
|---|---|---|---|
| Walgreens (1411,1415,1417 & 1419 Lake Cook), Deerfield | North Northern | A/B | 425,961 |
| 215 W Diehl Road, Naperville | West / East-West Corridor | A | 162,000 |
NOTEWORTHY LEASES
| PROPERTY | SUBMARKET | SF |
|---|---|---|
| Naperville Woods Office Center, Naperville | West / East-West Corridor | 113,389 |
| Bannockburn Lakes, Bannockburn | North Northern | 100,000 |
| Woodfield Preserve Office Corridor, Schaumburg | Schaumburg | 75,000 |
| 2400 Ogden, Lisle | West / East-West Corridor | 71,000 |
SALES TRANSACTIONS
| Schaumburg | 910,000 | CT Acquisitions | Walton Street Capital |
|---|---|---|---|
| O'Hare | 631,145 | Shidler Group | Equity Commonwealth |
| North Northern | 560,000 | AbbVie | UBS Realty Advisors |
| O'Hare | 517,640 | Bridge Investment Group | Simon Property Group and Blackstone |
ALL PROPERTIES V. PROPERTIES WITH < 50,000 SF AVAILABLE SPACE
| PROPERTY | ALL PROPERTIES' AVAILABILITIES | PROPERTIES WITH <50,000 SF AVAILABLE | PERCENT DIFFERENCE | ALL PROPERTIES' VACANCIES | PROPERTIES WITH <50,000 SF VACANT |
|---|---|---|---|---|---|
| Suburban All | 20.41% | 10.04% | 10.37% | 16.52% | 8.22% |
| Suburban A | 21.36% | 8.10% | 13.26% | 17.65% | 6.92% |
| Suburban B | 18.96% | 12.22% | 6.74% | 14.81% | 9.68% |
| East-West Corridor | 17.39% | 10.76% | 6.63% | 13.83% | 8.72% |
| North | 18.45% | 8.44% | 10.01% | 15.23% | 6.92% |
| Northwest | 28.09% | 10.04% | 18.05% | 23.58% | 8.22% |
| O'Hare | 18.01% | 10.04% | 7.97% | 12.80% | 8.22% |
200South Michigan Avenue,18th Floor, Chicago, Illinois 60604
</text>
|
[
{
"content": "<url>\nhttps://www.bradfordallen.com/wp-content/uploads/2019/01/Market_Report_Suburban_4Q_2018.pdf\n</url>\n<text>\nCHICAGO SUBURBS\n\nOffice Market Report\n\nDIRECT AVAILABILITY RATE\n\n4Q 2018\n\nGROSS ASKING RENT (DIRECT)\n\nDIRECT VACANCY RATE\n\n2Q18 21.25%\n\n4Q17 $23.59\n\n2Q18 $24.24\n\n4Q17 21.60%\n\n4Q17 18.18%\n\n2Q18 17.06%\n\nSuburban Office Market Rallies, As Micro-Markets Achieve Record Low Vacancy\n\nAs 2018 came to a close, the suburban office market continued its multi-year trend of shrinking vacancy and record investment sales. Direct availability and vacancy both fell from 21.60% to 20.41% and 17.06% to 16.52%, respectively, while direct weighted asking rents climbed to $24.38 from $23.59, year over year. The 2018 year-end total space absorption was a net positive 438,780 sf.\n\nActivity in the Northern submarket accounted for nearly 50% of the area's year-end positive absorption. Contributing factors included Baxford Credit Union moving into the Continental Executive Parke III (75,444 sf) and Astellas Pharma moving into the West Plaza (39,244 sf). Although large subleases (like Walgreens') and potential availabilities (like Takeda and Shire) created an atmosphere of uncertainty, new ownership and redevelopments along the I-94/I-294 4-way interchanges performed well due to their location and low, Lake County taxes.\n\nThe O'Hare submarket posted the lowest vacancy rates of the region at 12.80% for all properties, and 8.22% for properties with vacant space under 50,000 sf (see ALL PROPERTIES V. <50K SF). Revealing the submarket's health are completely leased buildings like 2800 & 2860 S River Road and 6400 Shafer Court, where occupancy levels strugg<cursor_is_here> Trepidation was present when tenants like Wilson Sporting Goods vacated Triangle Plaza for the CBD, but was alleviated when the space was quickly re-let.\n\nReasonable fear about the future health of the Oakbrook Mall Office micro-market of the EW Corridor abounded when McDonald's announced its intention to vacate its campus for Chicago's Fulton Market. Yet the move triggered much needed plans to repurpose its acreage and develop new office supply. To this point, many of the Class A and B+ properties in the Greater Oakbrook area are 90% occupied with gross asking rates well over $30psf, a first since the \"dot-com\" economic boom of the late 1990s.\n\nECONOMIC INDICATORS\n\nNotable Trends\n\nPressure to Modernize Hits the Suburbs. The amenities' race witnessed in the CBD for years is now present in suburban submarkets, too. Office landlords are learning they need to continually make common area improvements, offer fitness/wellness centers and tenant lounges, and create move-in ready suites to compete for the attention and investment of the area's entrepreneurial and emerging tenants in the market.\n\nSales Volume High; Leasing Lag-Time Low. According to CoStar, 2018 recorded the third-highest year in gross sales volume in the area ($1.32 billion), behind the sales volume only of 2006 ($1.89 billion) and 2007 ($2.02 billion). For example, office properties in the EW Corridor (Westbrook Corporate Center, Executive Towers, and Central Park of Lisle) the Northern Suburbs (Arbor Lake Centre) and O'Hare (Triangle, Presidents Plaza and O'Hare International Center) all sold at historically high prices this past year. In addition, CoStar reported leases took on average only 14 months to close, a low not seen since 2010\n\n| 4Q17 | 4Q18 |\n|---|---|\n| 122.1 | |\n| 122.1 | |\n| 4.10% | |\n| 4.50% | |\n| 4.70% | |\n| 3.90% | |\n\n| INVENTORY (SF) | AVERAGE BUILDING SIZE (SF) | DIRECT AVAILABLE RATE (%) | SUBLET AVAILABLE RATE (%) | DIRECT VACANCY RATE (%) | SUBLET VACANCY RATE (%) | MAX AVAILABLE FLOOR CONTIGUOUS SPACE (SF) | MAX AVAILABLE BUILDING CONTIGUOUS SPACE (SF) | GROSS WEIGHTED ASKING RENTS (DIRECT) | DIRECT NET ABSORPTION 4Q18 (SF) |\n|---|---|---|---|---|---|---|---|---|---|\n| 122,858,159 | 113,442 | 20.41% | 1.97% | 16.52% | 0.98% | 325,000 | 1,300,000 | $24.38 | 258,690 |\n| 74,033,592 | 205,649 | 21.36% | 2.13% | 17.65% | 0.93% | 325,000 | 1,300,000 | $27.38 | 279,802 |\n| 48,824,567 | 67,531 | 18.96% | 1.73% | 14.81% | 1.06% | 183,973 | 568,382 | $19.68 | (21,112) |\n| 48,910,558 | 100,227 | 17.39% | 2.00% | 13.83% | 1.45% | 79,999 | 329,783 | $24.33 | 13,920 |\n| 24,115,606 | 104,397 | 16.64% | 2.30% | 12.93% | 1.71% | 66,451 | 163,254 | $25.59 | (123,365) |\n| 14,064,202 | 209,913 | 15.89% | 1.63% | 12.55% | 0.74% | 52,344 | 163,254 | $29.82 | (119,681) |\n| 10,051,404 | 61,289 | 17.67% | 3.23% | 13.46% | 3.08% | 66,451 | 127,446 | $19.99 | (3,684) |\n| 3,777,869 | 59,966 | 18.16% | 0.18% | 14.64% | 0.00% | 79,999 | 147,740 | $22.42 | (5,766) |\n| 1,548,756 | 140,796 | 18.18% | 0.45% | 18.66% | 0.00% | 79,999 | 147,740 | $27.64 | 4,414 |\n| 2,229,113 | 42,868 | 18.15% | 0.00% | 11.85% | 0.00% | 46,624 | 46,624 | $20.18 | (10,180) |\n| 21,017,083 | 108,335 | 18.11% | 1.98% | 14.71% | 1.40% | 73,828 | 329,783 | $23.15 | 143,051 |\n| 12,269,960 | 204,499 | 19.54% | 2.36% | 16.57% | 1.97% | 69,974 | 329,783 | $25.57 | 130,510 |\n| 8,747,123 | 65,277 | 16.10% | 1.45% | 12.10% | 0.59% | 73,828 | 194,954 | $19.33 | 12,541 |\n| 30,126,390 | 113,257 | 18.45% | 3.41% | 15.23% | 1.11% | 183,973 | 302,678 | $25.10 | 30,622 |\n| 9,303,923 | 120,830 | 11.20% | 1.40% | 9.01% | 0.77% | 183,973 | 205,724 | $25.59 | 48,245 |\n| 4,358,601 | 181,608 | 12.73% | 1.97% | 11.95% | 1.48% | 77,902 | 168,167 | $27.93 | 39,766 |\n| 4,945,322 | 93,308 | 9.84% | 0.90% | 6.42% | 0.15% | 183,973 | 205,724 | $22.14 | 8,479 |\n| 16,179,308 | 112,356 | 22.57% | 4.55% | 19.97% | 1.16% | 174,886 | 302,678 | $22.05 | 32,504 |\n| 10,882,578 | 164,888 | 27.14% | 4.72% | 24.95% | 0.69% | 174,886 | 302,678 | $25.84 | 32,703 |\n| 5,296,730 | 67,907 | 13.20% | 4.22% | 9.73% | 2.11% | 98,105 | 105,486 | $19.82 | (199) |\n| 4,643,159 | 103,181 | 18.61% | 3.44% | 11.21% | 1.65% | 160,000 | 160,000 | $29.28 | (50,127) |\n| 2,374,069 | 169,576 | 10.81% | 4.83% | 5.64% | 3.22% | 25,383 | 25,383 | $35.98 | (21,667) |\n| 2,269,090 | 73,196 | 26.78% | 1.99% | 17.04% | 0.00% | 160,000 | 160,000 | $23.84 | (28,460) |\n| 30,945,916 | 126,310 | 28.09% | 0.95% | 23.58% | 0.40% | 325,000 | 1,300,000 | $22.60 | 93,727 |\n| 4,598,914 | 104,521 | 31.92% | 0.27% | 29.39% | 0.00% | 125,523 | 284,094 | $22.15 | 16,963 |\n| 2,985,468 | 199,031 | 30.19% | 0.42% | 29.83% | 0.00% | 34,191 | 284,094 | $25.23 | 16,963 |\n| 1,613,446 | 55,636 | 35.11% | 0.00% | 28.58% | 0.00% | 125,523 | 125,523 | $16.88 | 0 |\n| 26,347,002 | 131,080 | 27.42% | 1.06% | 22.57% | 0.47% | 325,000 | 1,300,000 | $22.73 | 76,764 |\n| 17,081,200 | 275,503 | 27.11% | 1.21% | 21.53% | 0.53% | 325,000 | 1,300,000 | $25.09 | 121,470 |\n| 9,265,802 | 66,660 | 27.99% | 0.79% | 24.49% | 0.36% | 54,641 | 568,382 | $19.41 | (44,706) |\n| 12,875,295 | 153,277 | 18.01% | 0.94% | 12.80% | 0.30% | 53,427 | 143,001 | $28.68 | 120,421 |\n| 8,468,758 | 206,555 | 18.93% | 1.37% | 12.32% | 0.42% | 53,427 | 143,001 | $32.94 | 75,324 |\n| 4,406,537 | 102,478 | 16.24% | 0.11% | 13.72% | 0.08% | 31,809 | 47,847 | $19.66 | 45,097 |\n\nRENT PSF, QUARTER CHANGE\n\nBY THE NUMBERS\n\n| | CBD A & B ONLY | SUBURBAN A & B ONLY |\n|---|---|---|\n| Direct Available | 13.93% | |\n| Direct Availability % <50,000 SF | 6.12% | |\n| Sublet Available | 2.05% | |\n| Direct Vacancy | 11.84% | |\n| Direct Vacancy % <50,000 SF | 5.66% | |\n| Average Months to Lease | 10 | |\n| Gross Asking Rate | $43.67 | |\n| Current Quarter Absorption | 165,704 | |\n| Max Contiguous Space | 363,204 | |\n\nSUBMARKET VACANCY & ABSORPTION\n\n200South Michigan Avenue,18th Floor, Chicago, Illinois 60604\n\nMAX BUILDING AVAILABLE CONTIGUOUS SPACE\n\nSUBLET AVAILABLE SPACE\n\n| PROPERTY | SUBMARKET | CLASS |\n|---|---|---|\n| AT&T Center / Lakewood Center, Hoffman Estates | Schaumburg | A |\n| 2001 Lakewood Boulevard, Hoffman Estates | Schaumburg | B |\n\n| PROPERTY | SUBMARKET | CLASS | MAX AVAILABLE SPACE (SF) |\n|---|---|---|---|\n| Walgreens (1411,1415,1417 & 1419 Lake Cook), Deerfield | North Northern | A/B | 425,961 |\n| 215 W Diehl Road, Naperville | West / East-West Corridor | A | 162,000 |\n\nNOTEWORTHY LEASES\n\n| PROPERTY | SUBMARKET | SF |\n|---|---|---|\n| Naperville Woods Office Center, Naperville | West / East-West Corridor | 113,389 |\n| Bannockburn Lakes, Bannockburn | North Northern | 100,000 |\n| Woodfield Preserve Office Corridor, Schaumburg | Schaumburg | 75,000 |\n| 2400 Ogden, Lisle | West / East-West Corridor | 71,000 |\n\nSALES TRANSACTIONS\n\n| Schaumburg | 910,000 | CT Acquisitions | Walton Street Capital |\n|---|---|---|---|\n| O'Hare | 631,145 | Shidler Group | Equity Commonwealth |\n| North Northern | 560,000 | AbbVie | UBS Realty Advisors |\n| O'Hare | 517,640 | Bridge Investment Group | Simon Property Group and Blackstone |\n\nALL PROPERTIES V. PROPERTIES WITH < 50,000 SF AVAILABLE SPACE\n\n| PROPERTY | ALL PROPERTIES' AVAILABILITIES | PROPERTIES WITH <50,000 SF AVAILABLE | PERCENT DIFFERENCE | ALL PROPERTIES' VACANCIES | PROPERTIES WITH <50,000 SF VACANT |\n|---|---|---|---|---|---|\n| Suburban All | 20.41% | 10.04% | 10.37% | 16.52% | 8.22% |\n| Suburban A | 21.36% | 8.10% | 13.26% | 17.65% | 6.92% |\n| Suburban B | 18.96% | 12.22% | 6.74% | 14.81% | 9.68% |\n| East-West Corridor | 17.39% | 10.76% | 6.63% | 13.83% | 8.72% |\n| North | 18.45% | 8.44% | 10.01% | 15.23% | 6.92% |\n| Northwest | 28.09% | 10.04% | 18.05% | 23.58% | 8.22% |\n| O'Hare | 18.01% | 10.04% | 7.97% | 12.80% | 8.22% |\n\n200South Michigan Avenue,18th Floor, Chicago, Illinois 60604\n</text>\n",
"role": "user"
},
{
"content": "led in the past.",
"role": "assistant"
}
] |
Official Transcript of Proceedings
NUCLEAR REGULATORY COMMISSION
Title:
Augmented Inspection Team Exit Meeting with Southern California Edison Company DVD 4/4
Docket Number: (n/a)
Location:
Date:
Work Order No.:
San Juan Capistrano, California
Monday, June 18, 2012
NRC-1798
NEAL R. GROSS AND CO., INC. Court Reporters and Transcribers 1323 Rhode Island Avenue, N.W. Washington, D.C. 20005 (202) 234-4433
Pages 1-20
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
(202) 234-4433
UNITED STATES OF AMERICA
NUCLEAR REGULATORY COMMISSION
+ + + + +
AUGMENTED INSPECTION TEAM EXIT MEETING WITH SOUTHERN
CALIFORNIA EDISON COMPANY
+ + + + +
MONDAY
JUNE 18, 2012
+ + + + +
SAN JUAN CAPISTRANO, CALIFORNIA
DVD 4/4
+ + + + +
The meeting convened in the Community Hall at the San Juan Capistrano Community Center at 25925 Camino Del Avion, San Juan Capistrano, California, at 6:00 p.m., Richard Daniel, presiding.
NRC STAFF PRESENT:
RICHARD DANIEL, Facilitator
THOMAS BLOUNT
ELMO COLLINS
GEORGE CRAVER
EMMETT MURPHY
JOHN REYNOSO
JOEL RIVERA-ORTIZ
GREGORY WARNICK
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
PRESENT: (CONTINUED)
GREGORY WERNER
ALSO PRESENT:
PETER DIETRICH, Southern California Edison Co.
DOUGLAS BAUDER, Southern California Edison Co.
THOMAS PALMISANO, Southern California Edison Co.
NEAL R. GROSS
(202) 234-4433
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
P-R-O-C-E-E-D-I-N-G-S
(2:23 p.m.)
MR. WERNER: Actually, the steam generators -- and Emmett might be able to help me too -- the original steam generators had what they call a square bend. The new steam generators have a U bend, and so they are actually shaped like a U. The other ones were more a square type arrangement.
As far as the whistle blower, I'm not aware of -- you have to give me a little more details. I'm not aware of a whistle blower.
PARTICIPANT: In the press a while back, there was a whistle blower who came to light and I don't know what he whistle blew. I'm wondering if those concerns were generated in way on any of these issues?
MR. WERNER: I don't have any knowledge of the individual that you're talking about or what the concern was. I'm sorry.
MR. COLLINS: And I would add, by policy and I think for good reason, when people bring us concerns, we protect their identity in that process to the maximum extent we can. And so if we did know of it, I don't think I would be able to convey that to you in a way that might connect it to -- and confirm that someone had brought us concerns.
NEAL R. GROSS
(202) 234-4433
MS. MAGDA: Thank you. I'm Marnie Magda (phonetic) and I appreciate, Mr. Collins, you being here, again. I did hear you last September. And that's when I got the most frightened because you said 7.0 protection against earthquake was adequate.
So now that we look at this steam generator problem and you're telling us that it's only guaranteed at a 7.0 earthquake, and we look at the way in which I hear the language sometimes "I think" or "It's my understanding," and I remember Toni Iseman standing there giving us a quote of a man who said, "These are going to be the best. They will be wonderful." And the response from one of you was "Well, that was before my time."
So, my question is who is ultimately accountable? Whose name goes on this forever that we can all say, "This name, this person said that these were safe," because there is not a person in this room that has confidence in people with the nuclear regulatory system or Edison. The language -- I already knew when you said tube-to-tube, you were hiding something. You do this to protect yourselves and I guess to make us feel comfortable. None of us feel comfortable.
We -- the latest concern of these steam
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
generators -- not just an earthquake could ruin things. We haven't even talked about firestorm that could come through 140 homes in Laguna Beach, that every September, we go against firestorms that could put all of the men working and women working at San Onofre at stake.
And what if we have at the same time steam generator pipes that start to crack? What are -- what is your back up for all of these possible contingencies, and who ends up -- whose name goes on this for the history of the world if we go to Fukushima? Whose name is saying this is safe?
FACILITATOR DANIEL: Thank you.
MR. COLLINS: There was a lot in your question. I think we've already talked about seismic. Size of the earthquake, I think, is translated in ground motion at the site. That's what it's designed for.
We are requiring all licensees to reasses that seismic hazard with the latest scientific information that's available, and update it if necessary. So, more work to be done on seismic to make sure that we have a facility that's built the way it needs to be built.
With respect to whose name goes on -- okay, I licensed Southern California Edison. That is the name on the license. They are the ones that primarily take
NEAL R. GROSS
(202) 234-4433
the responsibility for safety, to make sure the regulations are met, and to make sure that the facility is operated as it is supposed to be operated.
And for this specific issue, you know, I'm looking to make sure that when steam generators are changed that it's done properly, and the design objectives are met.
And so that's what -- that's my job as a federal regulator, and we conduct inspection programs and assessment programs to check that, to check that along the way, so, within the law and within our procedures and our guidelines.
But it's the name on the license that bears the responsibility for safety. So --
FACILITATOR DANIEL: All right. Thank you, Elmo. Charles has a question about the steam generator.
MR. MURRAY: It's Charles Michael Murray (phonetic) from Laguna Beach. Am I understanding that the new generators that have gone in both reactor Unit 3 are unique, that there is one that is kind of similar someplace else, but they are unique, and there isn't anything identical on the planet that we can compare and contrast to, so the situation is unique and we are being exposed to this. Am I understanding this
NEAL R. GROSS
(202) 234-4433
correctly?
MR. WERNER: You're correct. These generators are the only type of generators in the world. There are similar generators at Palo Verde, Waterford, ANO, Fort Calhoun, St. Lucie. But again, these specific generators designed by Mitsubishi, these are unique generators, here at -- yes, the size-wise.
MR. MURRAY: If that's the case, how did they get approved to be placed in an environment with eight million people?
MR. WERNER: Again, as we discussed earlier they were -- they did go through the 50.59 review process and we are still reviewing that process, but at this time we have not identified anything that would have required a License Amendment, other than those two items I talked about earlier that did go through the License Amendment review.
FACILITATOR DANIEL: Thank you Greg. Gene.
MR. STONE: Residents Organized for a Safe Environment would like to ask that before the plant is restarted, that a cost analysis be done by the California Public Utility Commission to determine whether it is cost-effective for the citizens to have the plant reopen, and within that investigation, it should be
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
considered the twice-through cooling that is required by state law, but both nuclear power plants in California are only doing once-through cooling and have been given a three-year extension because they say it is too expensive to do.
But the law is -- and they have closed coal-fired plants for this and gas-fired plants for this once-through cooling, and why shouldn't California Edison and this be considered into the cost benefit analysis?
MR. COLLINS: If I understand your question, it's about -- you requested that some information be provided to the California Public Utilities Commission and then the cost, the implementation of the cooling that's employed.
I don't know if Pete or anyone from Edison would want to tackle -- I'm not cognizant, the NRC does not have purview over the interactions with the California Public Utilities Commission. So I guess I'm unable to be responsive to your request.
FACILITATOR DANIEL: All right, folks. It's getting a little late and I promised one gentleman that I would get back and let him finish, so I'm going to do that. And I'm not done yet, okay?
MR. HEADRICK: Thank you very much.
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
There's been some great questions asked tonight, much more analytical. I tend to be more, just, going with the analogy of the intervention. And so I thought it was important and I just want to finish up my final conclusion.
It has been mentioned a little bit tonight and I know there's some questions, gray areas of jurisdictions and stuff, but it's a real, human question and I just want to finish my thought please.
It has been a rewarding game for some and we are grateful, especially considering Japan's fate, that we have not lost everything in one bad bet. Nature holds the wild card where anything is possible. And so far she has been kind to us.
We are here to tell you it is time to take your winnings and go home. Don't even ask to place one more bet. That would only confirm your gambling disorder and codependent relationship.
This is the time for introspection and reconciliation. We look forward to getting to a place where everybody wins, embracing the future with a healthy, renewed perspective. Thank you.
FACILITATOR DANIEL: Thank you, Gary.
(Applause)
FACILITATOR DANIEL: Folks we are going to
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
take three more questions and then I'm going to ask that you submit any remaining questions on those feedback forms that I spoke of earlier. They are out in the lobby on the table.
So, we are going to have three last questions and we are going to wrap it up for the night. Do you want to stand.
MS. CUMMINGS: My name is Tara Cummings ***2:31:23 (notes have Coving but I think she says Cummings, phonetic). I'm a pediatric nurse. One of the things that has been in the news lately is that because of new information about the external and internal radiation exposures to children, the new recommendations now are that they do not receive as many or as intensive imaging because they found that they have increased the amount of leukemia and brain tumors in these children by seven times.
We have a number of children that live close to San Onofre. There is a direct proportional increase in risk for leukemia and other things and the amount of time living near a nuclear reactor.
We have lots of different radiation exposures that continue to fall upon us. Some are being released by San Onofre. Some are coming over through the jet stream from Fukushima. Some of it has been here
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
since the nuclear testing that went on in the '50s.
Who is adding up the total exposure for our area? Some of these radioisotopes can stay lethal, harmful for hundreds of thousands of years. Who is adding up the total and measuring the total amount of radiation exposure in our population and determining what level of risk, and how are the new information -- what were you guys calling it, the learnings -- the new learnings about the true risks to human life being implicated into the testing that's being done and the regulations that are being used to determine the risk assessment on this nuclear power plant?
(Applause)
FACILITATOR DANIEL: Thank you Tara.
MR. WERNER: I share your concerns about children with radiation. I have a six-year-old. And actually, up until about a year and a half or two years ago, I didn't realize how much radiation a CAT scan, that's the study that you're talking about, I actually heard that the other day.
For perspective, a CAT scan, a whole body CAT scan, gets -- you get between 2,000 to 5,000 millirem for each whole body CAT scan. And again, for a child that has to be weighed, that's something you talk to
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
the medical doctor to see if the benefit outweighs the risk. You're absolutely correct. As compared to like what the plant released last year, like I said, it was around 0.1, 0.1 millirem versus 2,000 to 5,000 millirem.
I think as Greg indicated, naturally occurring radiation is about 360 millirem, and then from other sources about 600, 650 millirem per year.
MS. CUMMINGS: (Off-mic)
MR. WERNER: Again, those actually, those -- the radiation was measured here along the coast, again, very low levels. But yes, actually, it does all add up. But again, still very low levels as compared to, for instance, the CAT scan. They are talking, you know, thousands of more times of radiation due to CAT scans as what you get naturally.
MR. COLLINS: I'd like to add a few thoughts. Your question about who adds it up, and who takes a look at the total picture, I think it's well established, I think, you know, and the NRC believes, you know, there is no threshold linear relationship, and any, any exposure to radiation has the prospect.
Now at the levels we're talking about, it is practically negligible and incalculable. But there are many other sources of radiation. For who, for NRC-licensed material, which is the nuclear power plant
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
and most medical uses, you know, cobalt therapies and many of the diagnostic treatments, you know, we look at those, look at those radiation exposures.
In terms of risk to people off-site at San Onofre, we are engaged currently with the National Academy of Sciences to propel another cancer study to see what the data does show with respect to that.
The previous study did not show a correlation of increased cancer with respect to exposure from the nuclear power plant, but we are engaged again to redo that study.
It's a very difficult study because when you take a 0.1, perhaps, calculable dose and compare that to two rem, five rem, you know, from CAT scans and other radiation, how do you tease that out in the study. And that's what the National Academy of Science is struggling with that right now, how they are going to do that and what data they are going to get.
So, we are serious about that and we want to complete that study and get the best data we can. So, we'll see where it goes.
MR. COLLINS: You're potentially referring to the EPA radiation network -- potentially.
MS. CUMMINGS: (Off-mic)
FACILITATOR DANIEL: We wouldn't be in a
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
position to --
MR. COLLINS: I just don't have the information on that, so --
FACILITATOR DANIEL: We are going to hear from Lyn Harris-Hicks here.
MS. HARRIS-HICKS: I live two miles from San Onofre. I have lived there for most of my life, and my children and grandchildren are living in the radiation that you put forth.
And we know that it has raised what they call the natural background. There is no natural background of radiation. It is a man-made poison. It is the worst poison that we have every discovered how to put out, to kill people.
And it is being used to kill people in the countries overseas in the armaments. And we just can't keep on doing this. And so when you sit there and talk about -- you have to look a little more to see what happened on this one or that one, and you don't have any idea whether when you -- once you start it again, that the next week it might be all over again in different ones of those tubes, because the truth of it is that the metals are the basic fault here, and that won't be mentioned because that's the way the nuclear industry has gotten all of its -- and I shouldn't say all, never
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
say all -- the nuclear industry has gotten its guarantees, loan guarantees, because without the loan guarantees they couldn't build anything.
And they waited a generation. Oh now, I mustn't get off on that. The point is that when you know you have not been able to create an alloy which can resist the terrible destructive action of this terrible technology, why do you go ahead looking for the little bits of fragments of what might have influenced making it worse, or less worse, when our lives are in the -- our lives, eight million, right of us -and probably a lot more than that, because we are learning every day about, from Fukushima, that that radiation is coming over us and it is making more and more people, and particularly the children -- how can you do that? How can you look in the mirror and do that?
FACILITATOR DANIEL: Thank you, Ms. Hicks.
(Applause)
FACILITATOR DANIEL: Charles.
MR. COLLINS: Well, I'd like to just comment. And you know, there is really probably nothing I can say to say Ms. Hicks, you know, except I do appreciate her sentiment and her challenge to us as the Nuclear Regulatory Commission to make sure we do our job with respect to safety.
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
And on these particular issues, I'll just tell you, we are committed to make sure that we understand this, with the best science and engineering that is available right now, and San Onofre is not going to run again until we are satisfied. So, thank you for your comment.
FACILITATOR DANIEL: All right. It's going to be -- Elmo?
MR. COLLINS: Well, I'm just doing a time check. We have to be out by 10.
FACILITATOR DANIEL: Okay. This is going to be our final question. Charles.
MR. GRIFFIN: My name is Charles Griffin (phonetic). I'd like to speak about the tubes. My wife just passed away in December from lung cancer. Isn't that interesting. Okay.
But about the tubes, and you've learned tonight that this is a different design, and I've learned tonight that it's quite a bit different design than what was originally there.
And why didn't it trigger -- I initiated the California Environmental Quality Act in 1970. It was passed by Nixon and Governor Brown passed the California Environmental Quality Act.
Why isn't there an Environmental Impact
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Statement for the National Environmental Protection Act, and why haven't we got an Environmental Impact Report for the tubes on this?
And because it involves looking for alternatives, and certainly we have cheap, natural gas and that's certainly a workable alternative, we just built a natural gas facility at John Wayne Airport.
So, we can build local ones. We can put them out in the desert. We don't have to cover our desert with solar cells. But we also can build an alternative utilizing hydrogen and boron and make a fusion reactor there that's the size of a bathroom and you can put in any substation and diversify this with a smart grid. Thank you.
FACILITATOR DANIEL: Thank you, Charles.
MR. COLLINS: I want to make sure I understand the question.
MR. GRIFFIN: We need an Environmental Impact Report. Why haven't we got it?
MR. COLLINS: Yes, okay, good. Thank you. Federal law tells us when the Environmental Impact Statement --
MR. GRIFFIN: (Off-mic)
MR. COLLINS: I'm sorry. I stated that poorly. That wasn't what I was trying to convey. First
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
of all, Mr. Griffin, let me express my condolences on the loss of your wife. I'm sorry to hear that.
But the licensee, I mean the NRC in the implementation of our provisions, you know, has those in our regulations about when an Environmental Impact Statement should be triggered.
And we believe we followed those regulations in this instance, but we also acknowledge because of the prospect for a License Amendment which might trigger additional reviews or additional federal actions, and at least a statement of no significant hazards determination.
We have got to go back and do our inspection and review and make sure we got this one right. It's actually a question we're asking ourselves, as well, and we haven't arrived at the answer yet. So, thank you.
FACILITATOR DANIEL: Ladies and gentlemen, I'm sorry. The night is wearing long. Please give us your questions on those feedback forms, but before you go, I want to thank you for the thoughtful questions and comments that you have all come out and asked.
And I want to thank you again for your time. You have been a wonderful audience. Thank you very much. And I am going to let Mr. Collins have the last
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
word here.
MR. COLLINS: Yes, I just want to -- Rick already said what I wanted to say and that's my personal appreciation for you taking the time to come out.
Your questions, we have done our best to try to answer your question and be forthright with it. And just to restate what we've indicated a number of times, we're not satisfied yet. A lot of work has to be done for this difficult technical issue.
We are going to have more meetings and we are going to continue to talk about it before NRC makes a decision. So I expect I am going to get to see you again and we'll get to talk about this some more. So thank you very much for your attendance tonight.
(Applause)
(Whereupon, at 2:44 p.m., DVD 4 ended, marking the end of the meeting)
NEAL R. GROSS
(202) 234-4433
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
(202) 234-4433
1323 RHODE ISLAND AVE., N.W. WASHINGTON, D.C. 20005-3701
|
<urn:uuid:7bb91c11-bf9a-4099-853a-2df1a2c6b28d>
|
CC-MAIN-2018-39
|
https://www.nrc.gov/docs/ML1222/ML12221A376.pdf
|
2018-09-24T14:19:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160454.88/warc/CC-MAIN-20180924125835-20180924150235-00068.warc.gz
| 819,311,939
| 6,260
|
eng_Latn
|
eng_Latn
| 0.865329
|
eng_Latn
| 0.997227
|
[
"eng_Latn",
"pol_Latn",
"run_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
428,
1235,
1583,
2828,
4141,
5479,
6656,
7907,
9264,
10607,
11925,
13206,
14574,
15946,
17214,
18523,
19805,
21095,
22391,
23290,
23393
] |
Official Transcript of Proceedings
NUCLEAR REGULATORY COMMISSION
Title:
Augmented Inspection Team Exit Meeting with Southern California Edison Company DVD 4/4
Docket Number: (n/a)
Location:
Date:
Work Order No.:
San Juan Capistrano, California
Monday, June 18, 2012
NRC-1798
NEAL R. GROSS AND CO., INC. Court Reporters and Transcribers 1323 Rhode Island Avenue, N.W. Washington, D.C. 20005 (202) 234-4433
Pages 1-20
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
(202) 234-4433
UNITED STATES OF AMERICA
NUCLEAR REGULATORY COMMISSION
+ + + + +
AUGMENTED INSPECTION TEAM EXIT MEETING WITH SOUTHERN
CALIFORNIA EDISON COMPANY
+ + + + +
MONDAY
JUNE 18, 2012
+ + + + +
SAN JUAN CAPISTRANO, CALIFORNIA
DVD 4/4
+ + + + +
The meeting convened in the Community Hall at the San Juan Capistrano Community Center at 25925 Camino Del Avion, San Juan Capistrano, California, at 6:00 p.m., Richard Daniel, presiding.
NRC STAFF PRESENT:
RICHARD DANIEL, Facilitator
THOMAS BLOUNT
ELMO COLLINS
GEORGE CRAVER
EMMETT MURPHY
JOHN REYNOSO
JOEL RIVERA-ORTIZ
GREGORY WARNICK
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
PRESENT: (CONTINUED)
GREGORY WERNER
ALSO PRESENT:
PETER DIETRICH, Southern California Edison Co.
DOUGLAS BAUDER, Southern California Edison Co.
THOMAS PALMISANO, Southern California Edison Co.
NEAL R. GROSS
(202) 234-4433
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
P-R-O-C-E-E-D-I-N-G-S
(2:23 p.m.)
MR. WERNER: Actually, the steam generators -- and Emmett might be able to help me too -- the original steam generators had what they call a square bend. The new steam generators have a U bend, and so they are actually shaped like a U. The other ones were more a square type arrangement.
As far as the whistle blower, I'm not aware of -- you have to give me a little more details. I'm not aware of a whistle blower.
PARTICIPANT: In the press a while back, there was a whistle blower who came to light and I don't know what he whistle blew. I'm wondering if those concerns were generated in way on any of these issues?
MR. WERNER: I don't have any knowledge of the individual that you're talking about or what the concern was. I'm sorry.
MR. COLLINS: And I would add, by policy and I think for good reason, when people bring us concerns, we protect their identity in that process to the maximum extent we can. And so if we did know of it, I don't think I would be able to convey that to you in a way that might connect it to -- and confirm that someone had brought us concerns.
NEAL R. GROSS
(202) 234-4433
MS. MAGDA: Thank you. I'm Marnie Magda (phonetic) and I appreciate, Mr. Collins, you being here, again. I did hear you last September. And that's when I got the most frightened because you said 7.0 protection against earthquake was adequate.
So now that we look at this steam generator problem and you're telling us that it's only guaranteed at a 7.0 earthquake, and we look at the way in which I hear the language sometimes "I think" or "It's my understanding," and I remember Toni Iseman standing there giving us a quote of a man who said, "These are going to be the best. They will be wonderful." And the response from one of you was "Well, that was before my time."
So, my question is who is ultimately accountable? Whose name goes on this forever that we can all say, "This name, this person said that these were safe," because there is not a person in this room that has confidence in people with the nuclear regulatory system or Edison. The language -- I already knew when you said tube-to-tube, you were hiding something. You do this to protect yourselves and I guess to make us feel comfortable. None of us feel comfortable.
We -- the latest concern of these steam
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
generators -- not just an earthquake could ruin things. We haven't even talked about firestorm that could come through 140 homes in Laguna Beach, that every September, we go against firestorms that could put all of the men working and women working at San Onofre at stake.
And what if we have at the same time steam generator pipes that start to crack? What are -- what is your back up for all of these possible contingencies, and who ends up -- whose name goes on this for the history of the world if we go to Fukushima? Whose name is saying this is safe?
FACILITATOR DANIEL: Thank you.
MR. COLLINS: There was a lot in your question. I think we've already talked about seismic. Size of the earthquake, I think, is translated in ground motion at the site. That's what it's designed for.
We are requiring all licensees to reasses that seismic hazard with the latest scientific information that's available, and update it if necessary. So, more work to be done on seismic to make sure that we have a facility that's built the way it needs to be built.
With respect to whose name goes on -- okay, I licensed Southern California Edison. That is the name on the license. They are the ones that primarily take
NEAL R. GROSS
(202) 234-4433
the responsibility for safety, to make sure the regulations are met, and to make sure that the facility is operated as it is supposed to be operated.
And for this specific issue, you know, I'm looking to make sure that when steam generators are changed that it's done properly, and the design objectives are met.
And so that's what -- that's my job as a federal regulator, and we conduct inspection programs and assessment programs to check that, to check that along the way, so, within the law and within our procedures and our guidelines.
But it's the name on the license that bears the responsibility for safety. So --
FACILITATOR DANIEL: All right. Thank you, Elmo. Charles has a question about the steam generator.
MR. MURRAY: It's Charles Michael Murray (phonetic) from Laguna Beach. Am I understanding that the new generators that have gone in both reactor Unit 3 are unique, that there is one that is kind of similar someplace else, but they are unique, and there isn't anything identical on the planet that we can compare and contrast to, so the situation is unique and we are being exposed to this. Am I understanding this
NEAL R. GROSS
(202) 234-4433
correctly?
MR. WERNER: You're correct. These generators are the only type of generators in the world. There are similar generators at Palo Verde, Waterford, ANO, Fort Calhoun, St. Lucie. But again, these specific generators designed by Mitsubishi, these are unique generators, here at -- yes, the size-wise.
MR. MURRAY: If that's the case, how did they get approved to be placed in an environment with eight million people?
MR. WERNER: Again, as we discussed earlier they were -- they did go through the 50.59 review process and we are still reviewing that process, but at this time we have not identified anything that would have required a License Amendment, other than those two items I talked about earlier that did go through the License Amendment review.
FACILITATOR DANIEL: Thank you Greg. Gene.
MR. STONE: Residents Organized for a Safe Environment would like to ask that before the plant is restarted, that a cost analysis be done by the California Public Utility Commission to determine whether it is cost-effective for the citizens to have the plant reopen, and within that investigation, it should be
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
considered the twice-through cooling that is required by state law, but both nuclear power plants in California are only doing once-through cooling and have been given a three-year extension because they say it is too expensive to do.
But the law is -- and they have closed coal-fired plants for this and gas-fired plants for this once-through cooling, and why shouldn't California Edison and this be considered into the cost benefit analysis?
MR. COLLINS: If I understand your question, it's about -- you requested that some information be provided to the California Public Utilities Commission and then the cost, the implementation of the cooling that's employed.
I don't know if Pete or anyone fro
|
m Edison would want to tackle -- I'm not cognizant, the NRC does not have purview over the interactions with the California Public Utilities Commission.
|
So I guess I'm unable to be responsive to your request.
FACILITATOR DANIEL: All right, folks. It's getting a little late and I promised one gentleman that I would get back and let him finish, so I'm going to do that. And I'm not done yet, okay?
MR. HEADRICK: Thank you very much.
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
There's been some great questions asked tonight, much more analytical. I tend to be more, just, going with the analogy of the intervention. And so I thought it was important and I just want to finish up my final conclusion.
It has been mentioned a little bit tonight and I know there's some questions, gray areas of jurisdictions and stuff, but it's a real, human question and I just want to finish my thought please.
It has been a rewarding game for some and we are grateful, especially considering Japan's fate, that we have not lost everything in one bad bet. Nature holds the wild card where anything is possible. And so far she has been kind to us.
We are here to tell you it is time to take your winnings and go home. Don't even ask to place one more bet. That would only confirm your gambling disorder and codependent relationship.
This is the time for introspection and reconciliation. We look forward to getting to a place where everybody wins, embracing the future with a healthy, renewed perspective. Thank you.
FACILITATOR DANIEL: Thank you, Gary.
(Applause)
FACILITATOR DANIEL: Folks we are going to
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
take three more questions and then I'm going to ask that you submit any remaining questions on those feedback forms that I spoke of earlier. They are out in the lobby on the table.
So, we are going to have three last questions and we are going to wrap it up for the night. Do you want to stand.
MS. CUMMINGS: My name is Tara Cummings ***2:31:23 (notes have Coving but I think she says Cummings, phonetic). I'm a pediatric nurse. One of the things that has been in the news lately is that because of new information about the external and internal radiation exposures to children, the new recommendations now are that they do not receive as many or as intensive imaging because they found that they have increased the amount of leukemia and brain tumors in these children by seven times.
We have a number of children that live close to San Onofre. There is a direct proportional increase in risk for leukemia and other things and the amount of time living near a nuclear reactor.
We have lots of different radiation exposures that continue to fall upon us. Some are being released by San Onofre. Some are coming over through the jet stream from Fukushima. Some of it has been here
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
since the nuclear testing that went on in the '50s.
Who is adding up the total exposure for our area? Some of these radioisotopes can stay lethal, harmful for hundreds of thousands of years. Who is adding up the total and measuring the total amount of radiation exposure in our population and determining what level of risk, and how are the new information -- what were you guys calling it, the learnings -- the new learnings about the true risks to human life being implicated into the testing that's being done and the regulations that are being used to determine the risk assessment on this nuclear power plant?
(Applause)
FACILITATOR DANIEL: Thank you Tara.
MR. WERNER: I share your concerns about children with radiation. I have a six-year-old. And actually, up until about a year and a half or two years ago, I didn't realize how much radiation a CAT scan, that's the study that you're talking about, I actually heard that the other day.
For perspective, a CAT scan, a whole body CAT scan, gets -- you get between 2,000 to 5,000 millirem for each whole body CAT scan. And again, for a child that has to be weighed, that's something you talk to
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
the medical doctor to see if the benefit outweighs the risk. You're absolutely correct. As compared to like what the plant released last year, like I said, it was around 0.1, 0.1 millirem versus 2,000 to 5,000 millirem.
I think as Greg indicated, naturally occurring radiation is about 360 millirem, and then from other sources about 600, 650 millirem per year.
MS. CUMMINGS: (Off-mic)
MR. WERNER: Again, those actually, those -- the radiation was measured here along the coast, again, very low levels. But yes, actually, it does all add up. But again, still very low levels as compared to, for instance, the CAT scan. They are talking, you know, thousands of more times of radiation due to CAT scans as what you get naturally.
MR. COLLINS: I'd like to add a few thoughts. Your question about who adds it up, and who takes a look at the total picture, I think it's well established, I think, you know, and the NRC believes, you know, there is no threshold linear relationship, and any, any exposure to radiation has the prospect.
Now at the levels we're talking about, it is practically negligible and incalculable. But there are many other sources of radiation. For who, for NRC-licensed material, which is the nuclear power plant
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
and most medical uses, you know, cobalt therapies and many of the diagnostic treatments, you know, we look at those, look at those radiation exposures.
In terms of risk to people off-site at San Onofre, we are engaged currently with the National Academy of Sciences to propel another cancer study to see what the data does show with respect to that.
The previous study did not show a correlation of increased cancer with respect to exposure from the nuclear power plant, but we are engaged again to redo that study.
It's a very difficult study because when you take a 0.1, perhaps, calculable dose and compare that to two rem, five rem, you know, from CAT scans and other radiation, how do you tease that out in the study. And that's what the National Academy of Science is struggling with that right now, how they are going to do that and what data they are going to get.
So, we are serious about that and we want to complete that study and get the best data we can. So, we'll see where it goes.
MR. COLLINS: You're potentially referring to the EPA radiation network -- potentially.
MS. CUMMINGS: (Off-mic)
FACILITATOR DANIEL: We wouldn't be in a
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
position to --
MR. COLLINS: I just don't have the information on that, so --
FACILITATOR DANIEL: We are going to hear from Lyn Harris-Hicks here.
MS. HARRIS-HICKS: I live two miles from San Onofre. I have lived there for most of my life, and my children and grandchildren are living in the radiation that you put forth.
And we know that it has raised what they call the natural background. There is no natural background of radiation. It is a man-made poison. It is the worst poison that we have every discovered how to put out, to kill people.
And it is being used to kill people in the countries overseas in the armaments. And we just can't keep on doing this. And so when you sit there and talk about -- you have to look a little more to see what happened on this one or that one, and you don't have any idea whether when you -- once you start it again, that the next week it might be all over again in different ones of those tubes, because the truth of it is that the metals are the basic fault here, and that won't be mentioned because that's the way the nuclear industry has gotten all of its -- and I shouldn't say all, never
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
say all -- the nuclear industry has gotten its guarantees, loan guarantees, because without the loan guarantees they couldn't build anything.
And they waited a generation. Oh now, I mustn't get off on that. The point is that when you know you have not been able to create an alloy which can resist the terrible destructive action of this terrible technology, why do you go ahead looking for the little bits of fragments of what might have influenced making it worse, or less worse, when our lives are in the -- our lives, eight million, right of us -and probably a lot more than that, because we are learning every day about, from Fukushima, that that radiation is coming over us and it is making more and more people, and particularly the children -- how can you do that? How can you look in the mirror and do that?
FACILITATOR DANIEL: Thank you, Ms. Hicks.
(Applause)
FACILITATOR DANIEL: Charles.
MR. COLLINS: Well, I'd like to just comment. And you know, there is really probably nothing I can say to say Ms. Hicks, you know, except I do appreciate her sentiment and her challenge to us as the Nuclear Regulatory Commission to make sure we do our job with respect to safety.
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
And on these particular issues, I'll just tell you, we are committed to make sure that we understand this, with the best science and engineering that is available right now, and San Onofre is not going to run again until we are satisfied. So, thank you for your comment.
FACILITATOR DANIEL: All right. It's going to be -- Elmo?
MR. COLLINS: Well, I'm just doing a time check. We have to be out by 10.
FACILITATOR DANIEL: Okay. This is going to be our final question. Charles.
MR. GRIFFIN: My name is Charles Griffin (phonetic). I'd like to speak about the tubes. My wife just passed away in December from lung cancer. Isn't that interesting. Okay.
But about the tubes, and you've learned tonight that this is a different design, and I've learned tonight that it's quite a bit different design than what was originally there.
And why didn't it trigger -- I initiated the California Environmental Quality Act in 1970. It was passed by Nixon and Governor Brown passed the California Environmental Quality Act.
Why isn't there an Environmental Impact
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Statement for the National Environmental Protection Act, and why haven't we got an Environmental Impact Report for the tubes on this?
And because it involves looking for alternatives, and certainly we have cheap, natural gas and that's certainly a workable alternative, we just built a natural gas facility at John Wayne Airport.
So, we can build local ones. We can put them out in the desert. We don't have to cover our desert with solar cells. But we also can build an alternative utilizing hydrogen and boron and make a fusion reactor there that's the size of a bathroom and you can put in any substation and diversify this with a smart grid. Thank you.
FACILITATOR DANIEL: Thank you, Charles.
MR. COLLINS: I want to make sure I understand the question.
MR. GRIFFIN: We need an Environmental Impact Report. Why haven't we got it?
MR. COLLINS: Yes, okay, good. Thank you. Federal law tells us when the Environmental Impact Statement --
MR. GRIFFIN: (Off-mic)
MR. COLLINS: I'm sorry. I stated that poorly. That wasn't what I was trying to convey. First
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
of all, Mr. Griffin, let me express my condolences on the loss of your wife. I'm sorry to hear that.
But the licensee, I mean the NRC in the implementation of our provisions, you know, has those in our regulations about when an Environmental Impact Statement should be triggered.
And we believe we followed those regulations in this instance, but we also acknowledge because of the prospect for a License Amendment which might trigger additional reviews or additional federal actions, and at least a statement of no significant hazards determination.
We have got to go back and do our inspection and review and make sure we got this one right. It's actually a question we're asking ourselves, as well, and we haven't arrived at the answer yet. So, thank you.
FACILITATOR DANIEL: Ladies and gentlemen, I'm sorry. The night is wearing long. Please give us your questions on those feedback forms, but before you go, I want to thank you for the thoughtful questions and comments that you have all come out and asked.
And I want to thank you again for your time. You have been a wonderful audience. Thank you very much. And I am going to let Mr. Collins have the last
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
word here.
MR. COLLINS: Yes, I just want to -- Rick already said what I wanted to say and that's my personal appreciation for you taking the time to come out.
Your questions, we have done our best to try to answer your question and be forthright with it. And just to restate what we've indicated a number of times, we're not satisfied yet. A lot of work has to be done for this difficult technical issue.
We are going to have more meetings and we are going to continue to talk about it before NRC makes a decision. So I expect I am going to get to see you again and we'll get to talk about this some more. So thank you very much for your attendance tonight.
(Applause)
(Whereupon, at 2:44 p.m., DVD 4 ended, marking the end of the meeting)
NEAL R. GROSS
(202) 234-4433
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
(202) 234-4433
1323 RHODE ISLAND AVE., N.W. WASHINGTON, D.C. 20005-3701
| 8,701
|
inside_word
|
from
|
remove_one_sentence
|
<url>
https://www.nrc.gov/docs/ML1222/ML12221A376.pdf
</url>
<text>
Official Transcript of Proceedings
NUCLEAR REGULATORY COMMISSION
Title:
Augmented Inspection Team Exit Meeting with Southern California Edison Company DVD 4/4
Docket Number: (n/a)
Location:
Date:
Work Order No.:
San Juan Capistrano, California
Monday, June 18, 2012
NRC-1798
NEAL R. GROSS AND CO., INC. Court Reporters and Transcribers 1323 Rhode Island Avenue, N.W. Washington, D.C. 20005 (202) 234-4433
Pages 1-20
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
(202) 234-4433
UNITED STATES OF AMERICA
NUCLEAR REGULATORY COMMISSION
+ + + + +
AUGMENTED INSPECTION TEAM EXIT MEETING WITH SOUTHERN
CALIFORNIA EDISON COMPANY
+ + + + +
MONDAY
JUNE 18, 2012
+ + + + +
SAN JUAN CAPISTRANO, CALIFORNIA
DVD 4/4
+ + + + +
The meeting convened in the Community Hall at the San Juan Capistrano Community Center at 25925 Camino Del Avion, San Juan Capistrano, California, at 6:00 p.m., Richard Daniel, presiding.
NRC STAFF PRESENT:
RICHARD DANIEL, Facilitator
THOMAS BLOUNT
ELMO COLLINS
GEORGE CRAVER
EMMETT MURPHY
JOHN REYNOSO
JOEL RIVERA-ORTIZ
GREGORY WARNICK
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
PRESENT: (CONTINUED)
GREGORY WERNER
ALSO PRESENT:
PETER DIETRICH, Southern California Edison Co.
DOUGLAS BAUDER, Southern California Edison Co.
THOMAS PALMISANO, Southern California Edison Co.
NEAL R. GROSS
(202) 234-4433
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
P-R-O-C-E-E-D-I-N-G-S
(2:23 p.m.)
MR. WERNER: Actually, the steam generators -- and Emmett might be able to help me too -- the original steam generators had what they call a square bend. The new steam generators have a U bend, and so they are actually shaped like a U. The other ones were more a square type arrangement.
As far as the whistle blower, I'm not aware of -- you have to give me a little more details. I'm not aware of a whistle blower.
PARTICIPANT: In the press a while back, there was a whistle blower who came to light and I don't know what he whistle blew. I'm wondering if those concerns were generated in way on any of these issues?
MR. WERNER: I don't have any knowledge of the individual that you're talking about or what the concern was. I'm sorry.
MR. COLLINS: And I would add, by policy and I think for good reason, when people bring us concerns, we protect their identity in that process to the maximum extent we can. And so if we did know of it, I don't think I would be able to convey that to you in a way that might connect it to -- and confirm that someone had brought us concerns.
NEAL R. GROSS
(202) 234-4433
MS. MAGDA: Thank you. I'm Marnie Magda (phonetic) and I appreciate, Mr. Collins, you being here, again. I did hear you last September. And that's when I got the most frightened because you said 7.0 protection against earthquake was adequate.
So now that we look at this steam generator problem and you're telling us that it's only guaranteed at a 7.0 earthquake, and we look at the way in which I hear the language sometimes "I think" or "It's my understanding," and I remember Toni Iseman standing there giving us a quote of a man who said, "These are going to be the best. They will be wonderful." And the response from one of you was "Well, that was before my time."
So, my question is who is ultimately accountable? Whose name goes on this forever that we can all say, "This name, this person said that these were safe," because there is not a person in this room that has confidence in people with the nuclear regulatory system or Edison. The language -- I already knew when you said tube-to-tube, you were hiding something. You do this to protect yourselves and I guess to make us feel comfortable. None of us feel comfortable.
We -- the latest concern of these steam
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
generators -- not just an earthquake could ruin things. We haven't even talked about firestorm that could come through 140 homes in Laguna Beach, that every September, we go against firestorms that could put all of the men working and women working at San Onofre at stake.
And what if we have at the same time steam generator pipes that start to crack? What are -- what is your back up for all of these possible contingencies, and who ends up -- whose name goes on this for the history of the world if we go to Fukushima? Whose name is saying this is safe?
FACILITATOR DANIEL: Thank you.
MR. COLLINS: There was a lot in your question. I think we've already talked about seismic. Size of the earthquake, I think, is translated in ground motion at the site. That's what it's designed for.
We are requiring all licensees to reasses that seismic hazard with the latest scientific information that's available, and update it if necessary. So, more work to be done on seismic to make sure that we have a facility that's built the way it needs to be built.
With respect to whose name goes on -- okay, I licensed Southern California Edison. That is the name on the license. They are the ones that primarily take
NEAL R. GROSS
(202) 234-4433
the responsibility for safety, to make sure the regulations are met, and to make sure that the facility is operated as it is supposed to be operated.
And for this specific issue, you know, I'm looking to make sure that when steam generators are changed that it's done properly, and the design objectives are met.
And so that's what -- that's my job as a federal regulator, and we conduct inspection programs and assessment programs to check that, to check that along the way, so, within the law and within our procedures and our guidelines.
But it's the name on the license that bears the responsibility for safety. So --
FACILITATOR DANIEL: All right. Thank you, Elmo. Charles has a question about the steam generator.
MR. MURRAY: It's Charles Michael Murray (phonetic) from Laguna Beach. Am I understanding that the new generators that have gone in both reactor Unit 3 are unique, that there is one that is kind of similar someplace else, but they are unique, and there isn't anything identical on the planet that we can compare and contrast to, so the situation is unique and we are being exposed to this. Am I understanding this
NEAL R. GROSS
(202) 234-4433
correctly?
MR. WERNER: You're correct. These generators are the only type of generators in the world. There are similar generators at Palo Verde, Waterford, ANO, Fort Calhoun, St. Lucie. But again, these specific generators designed by Mitsubishi, these are unique generators, here at -- yes, the size-wise.
MR. MURRAY: If that's the case, how did they get approved to be placed in an environment with eight million people?
MR. WERNER: Again, as we discussed earlier they were -- they did go through the 50.59 review process and we are still reviewing that process, but at this time we have not identified anything that would have required a License Amendment, other than those two items I talked about earlier that did go through the License Amendment review.
FACILITATOR DANIEL: Thank you Greg. Gene.
MR. STONE: Residents Organized for a Safe Environment would like to ask that before the plant is restarted, that a cost analysis be done by the California Public Utility Commission to determine whether it is cost-effective for the citizens to have the plant reopen, and within that investigation, it should be
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
considered the twice-through cooling that is required by state law, but both nuclear power plants in California are only doing once-through cooling and have been given a three-year extension because they say it is too expensive to do.
But the law is -- and they have closed coal-fired plants for this and gas-fired plants for this once-through cooling, and why shouldn't California Edison and this be considered into the cost benefit analysis?
MR. COLLINS: If I understand your question, it's about -- you requested that some information be provided to the California Public Utilities Commission and then the cost, the implementation of the cooling that's employed.
I don't know if Pete or anyone fro<cursor_is_here> So I guess I'm unable to be responsive to your request.
FACILITATOR DANIEL: All right, folks. It's getting a little late and I promised one gentleman that I would get back and let him finish, so I'm going to do that. And I'm not done yet, okay?
MR. HEADRICK: Thank you very much.
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
There's been some great questions asked tonight, much more analytical. I tend to be more, just, going with the analogy of the intervention. And so I thought it was important and I just want to finish up my final conclusion.
It has been mentioned a little bit tonight and I know there's some questions, gray areas of jurisdictions and stuff, but it's a real, human question and I just want to finish my thought please.
It has been a rewarding game for some and we are grateful, especially considering Japan's fate, that we have not lost everything in one bad bet. Nature holds the wild card where anything is possible. And so far she has been kind to us.
We are here to tell you it is time to take your winnings and go home. Don't even ask to place one more bet. That would only confirm your gambling disorder and codependent relationship.
This is the time for introspection and reconciliation. We look forward to getting to a place where everybody wins, embracing the future with a healthy, renewed perspective. Thank you.
FACILITATOR DANIEL: Thank you, Gary.
(Applause)
FACILITATOR DANIEL: Folks we are going to
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
take three more questions and then I'm going to ask that you submit any remaining questions on those feedback forms that I spoke of earlier. They are out in the lobby on the table.
So, we are going to have three last questions and we are going to wrap it up for the night. Do you want to stand.
MS. CUMMINGS: My name is Tara Cummings ***2:31:23 (notes have Coving but I think she says Cummings, phonetic). I'm a pediatric nurse. One of the things that has been in the news lately is that because of new information about the external and internal radiation exposures to children, the new recommendations now are that they do not receive as many or as intensive imaging because they found that they have increased the amount of leukemia and brain tumors in these children by seven times.
We have a number of children that live close to San Onofre. There is a direct proportional increase in risk for leukemia and other things and the amount of time living near a nuclear reactor.
We have lots of different radiation exposures that continue to fall upon us. Some are being released by San Onofre. Some are coming over through the jet stream from Fukushima. Some of it has been here
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
since the nuclear testing that went on in the '50s.
Who is adding up the total exposure for our area? Some of these radioisotopes can stay lethal, harmful for hundreds of thousands of years. Who is adding up the total and measuring the total amount of radiation exposure in our population and determining what level of risk, and how are the new information -- what were you guys calling it, the learnings -- the new learnings about the true risks to human life being implicated into the testing that's being done and the regulations that are being used to determine the risk assessment on this nuclear power plant?
(Applause)
FACILITATOR DANIEL: Thank you Tara.
MR. WERNER: I share your concerns about children with radiation. I have a six-year-old. And actually, up until about a year and a half or two years ago, I didn't realize how much radiation a CAT scan, that's the study that you're talking about, I actually heard that the other day.
For perspective, a CAT scan, a whole body CAT scan, gets -- you get between 2,000 to 5,000 millirem for each whole body CAT scan. And again, for a child that has to be weighed, that's something you talk to
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
the medical doctor to see if the benefit outweighs the risk. You're absolutely correct. As compared to like what the plant released last year, like I said, it was around 0.1, 0.1 millirem versus 2,000 to 5,000 millirem.
I think as Greg indicated, naturally occurring radiation is about 360 millirem, and then from other sources about 600, 650 millirem per year.
MS. CUMMINGS: (Off-mic)
MR. WERNER: Again, those actually, those -- the radiation was measured here along the coast, again, very low levels. But yes, actually, it does all add up. But again, still very low levels as compared to, for instance, the CAT scan. They are talking, you know, thousands of more times of radiation due to CAT scans as what you get naturally.
MR. COLLINS: I'd like to add a few thoughts. Your question about who adds it up, and who takes a look at the total picture, I think it's well established, I think, you know, and the NRC believes, you know, there is no threshold linear relationship, and any, any exposure to radiation has the prospect.
Now at the levels we're talking about, it is practically negligible and incalculable. But there are many other sources of radiation. For who, for NRC-licensed material, which is the nuclear power plant
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
and most medical uses, you know, cobalt therapies and many of the diagnostic treatments, you know, we look at those, look at those radiation exposures.
In terms of risk to people off-site at San Onofre, we are engaged currently with the National Academy of Sciences to propel another cancer study to see what the data does show with respect to that.
The previous study did not show a correlation of increased cancer with respect to exposure from the nuclear power plant, but we are engaged again to redo that study.
It's a very difficult study because when you take a 0.1, perhaps, calculable dose and compare that to two rem, five rem, you know, from CAT scans and other radiation, how do you tease that out in the study. And that's what the National Academy of Science is struggling with that right now, how they are going to do that and what data they are going to get.
So, we are serious about that and we want to complete that study and get the best data we can. So, we'll see where it goes.
MR. COLLINS: You're potentially referring to the EPA radiation network -- potentially.
MS. CUMMINGS: (Off-mic)
FACILITATOR DANIEL: We wouldn't be in a
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
position to --
MR. COLLINS: I just don't have the information on that, so --
FACILITATOR DANIEL: We are going to hear from Lyn Harris-Hicks here.
MS. HARRIS-HICKS: I live two miles from San Onofre. I have lived there for most of my life, and my children and grandchildren are living in the radiation that you put forth.
And we know that it has raised what they call the natural background. There is no natural background of radiation. It is a man-made poison. It is the worst poison that we have every discovered how to put out, to kill people.
And it is being used to kill people in the countries overseas in the armaments. And we just can't keep on doing this. And so when you sit there and talk about -- you have to look a little more to see what happened on this one or that one, and you don't have any idea whether when you -- once you start it again, that the next week it might be all over again in different ones of those tubes, because the truth of it is that the metals are the basic fault here, and that won't be mentioned because that's the way the nuclear industry has gotten all of its -- and I shouldn't say all, never
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
say all -- the nuclear industry has gotten its guarantees, loan guarantees, because without the loan guarantees they couldn't build anything.
And they waited a generation. Oh now, I mustn't get off on that. The point is that when you know you have not been able to create an alloy which can resist the terrible destructive action of this terrible technology, why do you go ahead looking for the little bits of fragments of what might have influenced making it worse, or less worse, when our lives are in the -- our lives, eight million, right of us -and probably a lot more than that, because we are learning every day about, from Fukushima, that that radiation is coming over us and it is making more and more people, and particularly the children -- how can you do that? How can you look in the mirror and do that?
FACILITATOR DANIEL: Thank you, Ms. Hicks.
(Applause)
FACILITATOR DANIEL: Charles.
MR. COLLINS: Well, I'd like to just comment. And you know, there is really probably nothing I can say to say Ms. Hicks, you know, except I do appreciate her sentiment and her challenge to us as the Nuclear Regulatory Commission to make sure we do our job with respect to safety.
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
And on these particular issues, I'll just tell you, we are committed to make sure that we understand this, with the best science and engineering that is available right now, and San Onofre is not going to run again until we are satisfied. So, thank you for your comment.
FACILITATOR DANIEL: All right. It's going to be -- Elmo?
MR. COLLINS: Well, I'm just doing a time check. We have to be out by 10.
FACILITATOR DANIEL: Okay. This is going to be our final question. Charles.
MR. GRIFFIN: My name is Charles Griffin (phonetic). I'd like to speak about the tubes. My wife just passed away in December from lung cancer. Isn't that interesting. Okay.
But about the tubes, and you've learned tonight that this is a different design, and I've learned tonight that it's quite a bit different design than what was originally there.
And why didn't it trigger -- I initiated the California Environmental Quality Act in 1970. It was passed by Nixon and Governor Brown passed the California Environmental Quality Act.
Why isn't there an Environmental Impact
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Statement for the National Environmental Protection Act, and why haven't we got an Environmental Impact Report for the tubes on this?
And because it involves looking for alternatives, and certainly we have cheap, natural gas and that's certainly a workable alternative, we just built a natural gas facility at John Wayne Airport.
So, we can build local ones. We can put them out in the desert. We don't have to cover our desert with solar cells. But we also can build an alternative utilizing hydrogen and boron and make a fusion reactor there that's the size of a bathroom and you can put in any substation and diversify this with a smart grid. Thank you.
FACILITATOR DANIEL: Thank you, Charles.
MR. COLLINS: I want to make sure I understand the question.
MR. GRIFFIN: We need an Environmental Impact Report. Why haven't we got it?
MR. COLLINS: Yes, okay, good. Thank you. Federal law tells us when the Environmental Impact Statement --
MR. GRIFFIN: (Off-mic)
MR. COLLINS: I'm sorry. I stated that poorly. That wasn't what I was trying to convey. First
NEAL R. GROSS
COURT REPORTERS AND TRANSCRIBERS
1323 RHODE ISLAND AVE., N.W.
WASHINGTON, D.C. 20005-3701
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
of all, Mr. Griffin, let me express my condolences on the loss of your wife. I'm sorry to hear that.
But the licensee, I mean the NRC in the implementation of our provisions, you know, has those in our regulations about when an Environmental Impact Statement should be triggered.
And we believe we followed those regulations in this instance, but we also acknowledge because of the prospect for a License Amendment which might trigger additional reviews or additional federal actions, and at least a statement of no significant hazards determination.
We have got to go back and do our inspection and review and make sure we got this one right. It's actually a question we're asking ourselves, as well, and we haven't arrived at the answer yet. So, thank you.
FACILITATOR DANIEL: Ladies and gentlemen, I'm sorry. The night is wearing long. Please give us your questions on those feedback forms, but before you go, I want to thank you for the thoughtful questions and comments that you have all come out and asked.
And I want to thank you again for your time. You have been a wonderful audience. Thank you very much. And I am going to let Mr. Collins have the last
NEAL R. GROSS
(202) 234-4433
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
word here.
MR. COLLINS: Yes, I just want to -- Rick already said what I wanted to say and that's my personal appreciation for you taking the time to come out.
Your questions, we have done our best to try to answer your question and be forthright with it. And just to restate what we've indicated a number of times, we're not satisfied yet. A lot of work has to be done for this difficult technical issue.
We are going to have more meetings and we are going to continue to talk about it before NRC makes a decision. So I expect I am going to get to see you again and we'll get to talk about this some more. So thank you very much for your attendance tonight.
(Applause)
(Whereupon, at 2:44 p.m., DVD 4 ended, marking the end of the meeting)
NEAL R. GROSS
(202) 234-4433
WASHINGTON, D.C. 20005-3701
2
3
4
5
6
7
8
9
10
(202) 234-4433
1323 RHODE ISLAND AVE., N.W. WASHINGTON, D.C. 20005-3701
</text>
|
[
{
"content": "<url>\nhttps://www.nrc.gov/docs/ML1222/ML12221A376.pdf\n</url>\n<text>\nOfficial Transcript of Proceedings\n\nNUCLEAR REGULATORY COMMISSION\n\nTitle:\n\nAugmented Inspection Team Exit Meeting with Southern California Edison Company DVD 4/4\n\nDocket Number: (n/a)\n\nLocation:\n\nDate:\n\nWork Order No.:\n\nSan Juan Capistrano, California\n\nMonday, June 18, 2012\n\nNRC-1798\n\nNEAL R. GROSS AND CO., INC. Court Reporters and Transcribers 1323 Rhode Island Avenue, N.W. Washington, D.C. 20005 (202) 234-4433\n\nPages 1-20\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\n(202) 234-4433\n\nUNITED STATES OF AMERICA\n\nNUCLEAR REGULATORY COMMISSION\n\n+ + + + +\n\nAUGMENTED INSPECTION TEAM EXIT MEETING WITH SOUTHERN\n\nCALIFORNIA EDISON COMPANY\n\n+ + + + +\n\nMONDAY\n\nJUNE 18, 2012\n\n+ + + + +\n\nSAN JUAN CAPISTRANO, CALIFORNIA\n\nDVD 4/4\n\n+ + + + +\n\nThe meeting convened in the Community Hall at the San Juan Capistrano Community Center at 25925 Camino Del Avion, San Juan Capistrano, California, at 6:00 p.m., Richard Daniel, presiding.\n\nNRC STAFF PRESENT:\n\nRICHARD DANIEL, Facilitator\n\nTHOMAS BLOUNT\n\nELMO COLLINS\n\nGEORGE CRAVER\n\nEMMETT MURPHY\n\nJOHN REYNOSO\n\nJOEL RIVERA-ORTIZ\n\nGREGORY WARNICK\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nPRESENT: (CONTINUED)\n\nGREGORY WERNER\n\nALSO PRESENT:\n\nPETER DIETRICH, Southern California Edison Co.\n\nDOUGLAS BAUDER, Southern California Edison Co.\n\nTHOMAS PALMISANO, Southern California Edison Co.\n\nNEAL R. GROSS\n\n(202) 234-4433\n\nWASHINGTON, D.C. 20005-3701\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nP-R-O-C-E-E-D-I-N-G-S\n\n(2:23 p.m.)\n\nMR. WERNER: Actually, the steam generators -- and Emmett might be able to help me too -- the original steam generators had what they call a square bend. The new steam generators have a U bend, and so they are actually shaped like a U. The other ones were more a square type arrangement.\n\nAs far as the whistle blower, I'm not aware of -- you have to give me a little more details. I'm not aware of a whistle blower.\n\nPARTICIPANT: In the press a while back, there was a whistle blower who came to light and I don't know what he whistle blew. I'm wondering if those concerns were generated in way on any of these issues?\n\nMR. WERNER: I don't have any knowledge of the individual that you're talking about or what the concern was. I'm sorry.\n\nMR. COLLINS: And I would add, by policy and I think for good reason, when people bring us concerns, we protect their identity in that process to the maximum extent we can. And so if we did know of it, I don't think I would be able to convey that to you in a way that might connect it to -- and confirm that someone had brought us concerns.\n\nNEAL R. GROSS\n\n(202) 234-4433\n\nMS. MAGDA: Thank you. I'm Marnie Magda (phonetic) and I appreciate, Mr. Collins, you being here, again. I did hear you last September. And that's when I got the most frightened because you said 7.0 protection against earthquake was adequate.\n\nSo now that we look at this steam generator problem and you're telling us that it's only guaranteed at a 7.0 earthquake, and we look at the way in which I hear the language sometimes \"I think\" or \"It's my understanding,\" and I remember Toni Iseman standing there giving us a quote of a man who said, \"These are going to be the best. They will be wonderful.\" And the response from one of you was \"Well, that was before my time.\"\n\nSo, my question is who is ultimately accountable? Whose name goes on this forever that we can all say, \"This name, this person said that these were safe,\" because there is not a person in this room that has confidence in people with the nuclear regulatory system or Edison. The language -- I already knew when you said tube-to-tube, you were hiding something. You do this to protect yourselves and I guess to make us feel comfortable. None of us feel comfortable.\n\nWe -- the latest concern of these steam\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\ngenerators -- not just an earthquake could ruin things. We haven't even talked about firestorm that could come through 140 homes in Laguna Beach, that every September, we go against firestorms that could put all of the men working and women working at San Onofre at stake.\n\nAnd what if we have at the same time steam generator pipes that start to crack? What are -- what is your back up for all of these possible contingencies, and who ends up -- whose name goes on this for the history of the world if we go to Fukushima? Whose name is saying this is safe?\n\nFACILITATOR DANIEL: Thank you.\n\nMR. COLLINS: There was a lot in your question. I think we've already talked about seismic. Size of the earthquake, I think, is translated in ground motion at the site. That's what it's designed for.\n\nWe are requiring all licensees to reasses that seismic hazard with the latest scientific information that's available, and update it if necessary. So, more work to be done on seismic to make sure that we have a facility that's built the way it needs to be built.\n\nWith respect to whose name goes on -- okay, I licensed Southern California Edison. That is the name on the license. They are the ones that primarily take\n\nNEAL R. GROSS\n\n(202) 234-4433\n\nthe responsibility for safety, to make sure the regulations are met, and to make sure that the facility is operated as it is supposed to be operated.\n\nAnd for this specific issue, you know, I'm looking to make sure that when steam generators are changed that it's done properly, and the design objectives are met.\n\nAnd so that's what -- that's my job as a federal regulator, and we conduct inspection programs and assessment programs to check that, to check that along the way, so, within the law and within our procedures and our guidelines.\n\nBut it's the name on the license that bears the responsibility for safety. So --\n\nFACILITATOR DANIEL: All right. Thank you, Elmo. Charles has a question about the steam generator.\n\nMR. MURRAY: It's Charles Michael Murray (phonetic) from Laguna Beach. Am I understanding that the new generators that have gone in both reactor Unit 3 are unique, that there is one that is kind of similar someplace else, but they are unique, and there isn't anything identical on the planet that we can compare and contrast to, so the situation is unique and we are being exposed to this. Am I understanding this\n\nNEAL R. GROSS\n\n(202) 234-4433\n\ncorrectly?\n\nMR. WERNER: You're correct. These generators are the only type of generators in the world. There are similar generators at Palo Verde, Waterford, ANO, Fort Calhoun, St. Lucie. But again, these specific generators designed by Mitsubishi, these are unique generators, here at -- yes, the size-wise.\n\nMR. MURRAY: If that's the case, how did they get approved to be placed in an environment with eight million people?\n\nMR. WERNER: Again, as we discussed earlier they were -- they did go through the 50.59 review process and we are still reviewing that process, but at this time we have not identified anything that would have required a License Amendment, other than those two items I talked about earlier that did go through the License Amendment review.\n\nFACILITATOR DANIEL: Thank you Greg. Gene.\n\nMR. STONE: Residents Organized for a Safe Environment would like to ask that before the plant is restarted, that a cost analysis be done by the California Public Utility Commission to determine whether it is cost-effective for the citizens to have the plant reopen, and within that investigation, it should be\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nconsidered the twice-through cooling that is required by state law, but both nuclear power plants in California are only doing once-through cooling and have been given a three-year extension because they say it is too expensive to do.\n\nBut the law is -- and they have closed coal-fired plants for this and gas-fired plants for this once-through cooling, and why shouldn't California Edison and this be considered into the cost benefit analysis?\n\nMR. COLLINS: If I understand your question, it's about -- you requested that some information be provided to the California Public Utilities Commission and then the cost, the implementation of the cooling that's employed.\n\nI don't know if Pete or anyone fro<cursor_is_here> So I guess I'm unable to be responsive to your request.\n\nFACILITATOR DANIEL: All right, folks. It's getting a little late and I promised one gentleman that I would get back and let him finish, so I'm going to do that. And I'm not done yet, okay?\n\nMR. HEADRICK: Thank you very much.\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nThere's been some great questions asked tonight, much more analytical. I tend to be more, just, going with the analogy of the intervention. And so I thought it was important and I just want to finish up my final conclusion.\n\nIt has been mentioned a little bit tonight and I know there's some questions, gray areas of jurisdictions and stuff, but it's a real, human question and I just want to finish my thought please.\n\nIt has been a rewarding game for some and we are grateful, especially considering Japan's fate, that we have not lost everything in one bad bet. Nature holds the wild card where anything is possible. And so far she has been kind to us.\n\nWe are here to tell you it is time to take your winnings and go home. Don't even ask to place one more bet. That would only confirm your gambling disorder and codependent relationship.\n\nThis is the time for introspection and reconciliation. We look forward to getting to a place where everybody wins, embracing the future with a healthy, renewed perspective. Thank you.\n\nFACILITATOR DANIEL: Thank you, Gary.\n\n(Applause)\n\nFACILITATOR DANIEL: Folks we are going to\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\ntake three more questions and then I'm going to ask that you submit any remaining questions on those feedback forms that I spoke of earlier. They are out in the lobby on the table.\n\nSo, we are going to have three last questions and we are going to wrap it up for the night. Do you want to stand.\n\nMS. CUMMINGS: My name is Tara Cummings ***2:31:23 (notes have Coving but I think she says Cummings, phonetic). I'm a pediatric nurse. One of the things that has been in the news lately is that because of new information about the external and internal radiation exposures to children, the new recommendations now are that they do not receive as many or as intensive imaging because they found that they have increased the amount of leukemia and brain tumors in these children by seven times.\n\nWe have a number of children that live close to San Onofre. There is a direct proportional increase in risk for leukemia and other things and the amount of time living near a nuclear reactor.\n\nWe have lots of different radiation exposures that continue to fall upon us. Some are being released by San Onofre. Some are coming over through the jet stream from Fukushima. Some of it has been here\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nsince the nuclear testing that went on in the '50s.\n\nWho is adding up the total exposure for our area? Some of these radioisotopes can stay lethal, harmful for hundreds of thousands of years. Who is adding up the total and measuring the total amount of radiation exposure in our population and determining what level of risk, and how are the new information -- what were you guys calling it, the learnings -- the new learnings about the true risks to human life being implicated into the testing that's being done and the regulations that are being used to determine the risk assessment on this nuclear power plant?\n\n(Applause)\n\nFACILITATOR DANIEL: Thank you Tara.\n\nMR. WERNER: I share your concerns about children with radiation. I have a six-year-old. And actually, up until about a year and a half or two years ago, I didn't realize how much radiation a CAT scan, that's the study that you're talking about, I actually heard that the other day.\n\nFor perspective, a CAT scan, a whole body CAT scan, gets -- you get between 2,000 to 5,000 millirem for each whole body CAT scan. And again, for a child that has to be weighed, that's something you talk to\n\nNEAL R. GROSS\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nthe medical doctor to see if the benefit outweighs the risk. You're absolutely correct. As compared to like what the plant released last year, like I said, it was around 0.1, 0.1 millirem versus 2,000 to 5,000 millirem.\n\nI think as Greg indicated, naturally occurring radiation is about 360 millirem, and then from other sources about 600, 650 millirem per year.\n\nMS. CUMMINGS: (Off-mic)\n\nMR. WERNER: Again, those actually, those -- the radiation was measured here along the coast, again, very low levels. But yes, actually, it does all add up. But again, still very low levels as compared to, for instance, the CAT scan. They are talking, you know, thousands of more times of radiation due to CAT scans as what you get naturally.\n\nMR. COLLINS: I'd like to add a few thoughts. Your question about who adds it up, and who takes a look at the total picture, I think it's well established, I think, you know, and the NRC believes, you know, there is no threshold linear relationship, and any, any exposure to radiation has the prospect.\n\nNow at the levels we're talking about, it is practically negligible and incalculable. But there are many other sources of radiation. For who, for NRC-licensed material, which is the nuclear power plant\n\nNEAL R. GROSS\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nand most medical uses, you know, cobalt therapies and many of the diagnostic treatments, you know, we look at those, look at those radiation exposures.\n\nIn terms of risk to people off-site at San Onofre, we are engaged currently with the National Academy of Sciences to propel another cancer study to see what the data does show with respect to that.\n\nThe previous study did not show a correlation of increased cancer with respect to exposure from the nuclear power plant, but we are engaged again to redo that study.\n\nIt's a very difficult study because when you take a 0.1, perhaps, calculable dose and compare that to two rem, five rem, you know, from CAT scans and other radiation, how do you tease that out in the study. And that's what the National Academy of Science is struggling with that right now, how they are going to do that and what data they are going to get.\n\nSo, we are serious about that and we want to complete that study and get the best data we can. So, we'll see where it goes.\n\nMR. COLLINS: You're potentially referring to the EPA radiation network -- potentially.\n\nMS. CUMMINGS: (Off-mic)\n\nFACILITATOR DANIEL: We wouldn't be in a\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nposition to --\n\nMR. COLLINS: I just don't have the information on that, so --\n\nFACILITATOR DANIEL: We are going to hear from Lyn Harris-Hicks here.\n\nMS. HARRIS-HICKS: I live two miles from San Onofre. I have lived there for most of my life, and my children and grandchildren are living in the radiation that you put forth.\n\nAnd we know that it has raised what they call the natural background. There is no natural background of radiation. It is a man-made poison. It is the worst poison that we have every discovered how to put out, to kill people.\n\nAnd it is being used to kill people in the countries overseas in the armaments. And we just can't keep on doing this. And so when you sit there and talk about -- you have to look a little more to see what happened on this one or that one, and you don't have any idea whether when you -- once you start it again, that the next week it might be all over again in different ones of those tubes, because the truth of it is that the metals are the basic fault here, and that won't be mentioned because that's the way the nuclear industry has gotten all of its -- and I shouldn't say all, never\n\nNEAL R. GROSS\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nsay all -- the nuclear industry has gotten its guarantees, loan guarantees, because without the loan guarantees they couldn't build anything.\n\nAnd they waited a generation. Oh now, I mustn't get off on that. The point is that when you know you have not been able to create an alloy which can resist the terrible destructive action of this terrible technology, why do you go ahead looking for the little bits of fragments of what might have influenced making it worse, or less worse, when our lives are in the -- our lives, eight million, right of us -and probably a lot more than that, because we are learning every day about, from Fukushima, that that radiation is coming over us and it is making more and more people, and particularly the children -- how can you do that? How can you look in the mirror and do that?\n\nFACILITATOR DANIEL: Thank you, Ms. Hicks.\n\n(Applause)\n\nFACILITATOR DANIEL: Charles.\n\nMR. COLLINS: Well, I'd like to just comment. And you know, there is really probably nothing I can say to say Ms. Hicks, you know, except I do appreciate her sentiment and her challenge to us as the Nuclear Regulatory Commission to make sure we do our job with respect to safety.\n\nNEAL R. GROSS\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nAnd on these particular issues, I'll just tell you, we are committed to make sure that we understand this, with the best science and engineering that is available right now, and San Onofre is not going to run again until we are satisfied. So, thank you for your comment.\n\nFACILITATOR DANIEL: All right. It's going to be -- Elmo?\n\nMR. COLLINS: Well, I'm just doing a time check. We have to be out by 10.\n\nFACILITATOR DANIEL: Okay. This is going to be our final question. Charles.\n\nMR. GRIFFIN: My name is Charles Griffin (phonetic). I'd like to speak about the tubes. My wife just passed away in December from lung cancer. Isn't that interesting. Okay.\n\nBut about the tubes, and you've learned tonight that this is a different design, and I've learned tonight that it's quite a bit different design than what was originally there.\n\nAnd why didn't it trigger -- I initiated the California Environmental Quality Act in 1970. It was passed by Nixon and Governor Brown passed the California Environmental Quality Act.\n\nWhy isn't there an Environmental Impact\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nStatement for the National Environmental Protection Act, and why haven't we got an Environmental Impact Report for the tubes on this?\n\nAnd because it involves looking for alternatives, and certainly we have cheap, natural gas and that's certainly a workable alternative, we just built a natural gas facility at John Wayne Airport.\n\nSo, we can build local ones. We can put them out in the desert. We don't have to cover our desert with solar cells. But we also can build an alternative utilizing hydrogen and boron and make a fusion reactor there that's the size of a bathroom and you can put in any substation and diversify this with a smart grid. Thank you.\n\nFACILITATOR DANIEL: Thank you, Charles.\n\nMR. COLLINS: I want to make sure I understand the question.\n\nMR. GRIFFIN: We need an Environmental Impact Report. Why haven't we got it?\n\nMR. COLLINS: Yes, okay, good. Thank you. Federal law tells us when the Environmental Impact Statement --\n\nMR. GRIFFIN: (Off-mic)\n\nMR. COLLINS: I'm sorry. I stated that poorly. That wasn't what I was trying to convey. First\n\nNEAL R. GROSS\n\nCOURT REPORTERS AND TRANSCRIBERS\n\n1323 RHODE ISLAND AVE., N.W.\n\nWASHINGTON, D.C. 20005-3701\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nof all, Mr. Griffin, let me express my condolences on the loss of your wife. I'm sorry to hear that.\n\nBut the licensee, I mean the NRC in the implementation of our provisions, you know, has those in our regulations about when an Environmental Impact Statement should be triggered.\n\nAnd we believe we followed those regulations in this instance, but we also acknowledge because of the prospect for a License Amendment which might trigger additional reviews or additional federal actions, and at least a statement of no significant hazards determination.\n\nWe have got to go back and do our inspection and review and make sure we got this one right. It's actually a question we're asking ourselves, as well, and we haven't arrived at the answer yet. So, thank you.\n\nFACILITATOR DANIEL: Ladies and gentlemen, I'm sorry. The night is wearing long. Please give us your questions on those feedback forms, but before you go, I want to thank you for the thoughtful questions and comments that you have all come out and asked.\n\nAnd I want to thank you again for your time. You have been a wonderful audience. Thank you very much. And I am going to let Mr. Collins have the last\n\nNEAL R. GROSS\n\n(202) 234-4433\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n11\n\n12\n\n13\n\n14\n\n15\n\n16\n\n17\n\n18\n\n19\n\n20\n\n21\n\n22\n\n23\n\n24\n\n25\n\nword here.\n\nMR. COLLINS: Yes, I just want to -- Rick already said what I wanted to say and that's my personal appreciation for you taking the time to come out.\n\nYour questions, we have done our best to try to answer your question and be forthright with it. And just to restate what we've indicated a number of times, we're not satisfied yet. A lot of work has to be done for this difficult technical issue.\n\nWe are going to have more meetings and we are going to continue to talk about it before NRC makes a decision. So I expect I am going to get to see you again and we'll get to talk about this some more. So thank you very much for your attendance tonight.\n\n(Applause)\n\n(Whereupon, at 2:44 p.m., DVD 4 ended, marking the end of the meeting)\n\nNEAL R. GROSS\n\n(202) 234-4433\n\nWASHINGTON, D.C. 20005-3701\n\n2\n\n3\n\n4\n\n5\n\n6\n\n7\n\n8\n\n9\n\n10\n\n(202) 234-4433\n\n1323 RHODE ISLAND AVE., N.W. WASHINGTON, D.C. 20005-3701\n</text>\n",
"role": "user"
},
{
"content": "m Edison would want to tackle -- I'm not cognizant, the NRC does not have purview over the interactions with the California Public Utilities Commission.",
"role": "assistant"
}
] |
Roundtable
FIDLEG and Capital Markets Transactions
March 2016
Baker & McKenzie Zurich is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a "partner" means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an "office" means an office of any such law firm.
© 2016 Baker & McKenzie Zurich
Duty to Publish a Prospectus and
Exceptions
Content, Form and Publication of the
Prospectus
Review of the Prospectus and
Transitional Rules
KID, Liability and Criminal Sanctions
Philip Spoerlé
Anette Waygood
Duty to Publish a Prospectus and Exceptions
General Duty to Publish a Prospectus
Rule
* A public offer for the acquisition of securities, or
* seeking the admission of securities to trading on a trading facility
* Prior publication of a prospectus
* Shares and bonds
* New: derivatives and structured products
* Any stock exchange, or
* any multilateral trading system,
* but not any organised trading systems
Securities
Trading facility
General Duty to Publish a Prospectus
Public offer
* Any offer to the public, i.e. any statement to the public that contains sufficient information about the conditions of the offer and the securities
* Current interpretation to continue
* Limited circle of addresses
* Rule of thumb: approx. 20 or less addressees
* Primary offerings
* Secondary offerings
* Secondary offerings
* If no participation in the public offering of its securities, no duty to cooperate in the preparation of the prospectus
Type of offerings
Involvement of the issuer
5
Exceptions
Type of offer
Type of securities
Admission to trading
Customer Segmentation
Private customers
All non-professional customers
High-net-worth individuals
Professional and institutional customers (opting in)
Professional customers
Institutional customers
Banks, securities dealers, qualified asset managers, fund management companies
Insurance companies
Foreign customers subject to an equivalent supervision
Central banks
Public entities and entities with professional treasury operations
Pension funds
Choices
High net worth individuals (opting out in writing)
Opting-out: High-net worth individuals as "professional customers" (further requirements)
Opting-in: Professional and institutional customers as "private customers"
Opting-down: Institutional customers as "professional customers"
Exceptions by Type of Offer
Limited need for customer protection
Limited number of addresses
Limited potential for damages
* Investors that qualify as professional customers
* Investors acquiring securities for a value of at least CHF 100,000
* Minimum denomination of CHF 100'000 per unit
* Less than 150 investors qualifying as private customers
* Offer does not exceed value of CHF 100,000 over a 12-month period
8
Exceptions by Type of Offer
No automatic continuation of the applicability of an exception
* Each public offer for resale of securities is subject to the publication of a prospectus unless an exception applies
No obligation to publish a prospectus for a later public securities offering
* Existence of a valid prospectus, and
* consent to use by issuer or the persons who have assumed responsibility for the prospectus
Exceptions by Type of Securities
Principle
* No protection of investors necessary in cases when investors are equally informed about the securities
Reliance on existing / former prospectus
Adequate other information
* Equity securities issued outside the scope of a capital increase in exchange for previously issued equity securities of the same class
* Equity securities issues upon the conversion or exchange of financial instruments, e.g. convertible bonds upon conversion
* Equity securities issued or supplied following the execution of a right linked to financial instruments
* Securities offered in connection with a take-over
* Securities offered / allocated in connection with mergers, divisions, conversions, transfer of assets
* Equity securities distributed as dividend
* Employee schemes
Exceptions by Type of Securities
Existing customer protection
* Securities with an unlimited and irrevocable guarantee from the Confederation or cantons, from an international or supranational public entity, from the Swiss National Bank or from foreign central banks
No commercial purpose
Mere saving tool / low default risk
Derivatives
* Securities issued by non-profit institutions for raising funds for noncommercial purposes
* Medium-term notes (Kassenobligationen)
* Securities with a term of less than one year (money market instruments)
* Not offered in the form of an issue, e.g. concluded on Eurex
Exceptions Admission to Trading
Based on EU Prospectus Directive
* Equity securities that over a period of 12 months account for less than 10% of the number of equity securities of the same category already admitted to trading on the same trading venue
* Equity securities issued upon the conversion or exchange of financial instruments or following the execution of rights linked to financial instruments, provided they are equity securities of the same category as those already admitted to trading
* Securities admitted to trading on a foreign trading venue whose regulation, supervision and transparency are acknowledged as being appropriate by the domestic trading venue or whose transparency for investors is ensured in another manner
* Securities for which admission is sought for a trading segment open exclusively to professional clients trading for their own account or for the account solely of professional clients
Matthias Courvoisier
Content, Form and Publication of the Prospectus
Content and Form of the Prospectus
All
information
that is rele-
vant for the
investor to
take an
investment
decision
Informa-
tion on the
issuer and
the
guarantor
Informa-
tion on the
securities
Informa-
tion on the
offer
* Details to be set out in an ordinance (art. 48 FinSA) and not in stock exchange rules anymore
* May I rely on the content lists in the ordinance?
* Does the liability risk change since the law provides the content?
Content and Form of the Prospectus
Summary
Final offer terms at the end of the offer period
Indicative offer terms at the time of the public offer
Description of the securities may be separated from the base prospectus
(Base) prospectus with information on issuer and guarantor but not the offer terms – may or may not include description of securities – without such description: 'registration form'
Content and Form of the Prospectus
Language
* German, French, Italian or English
Inclusion by reference
Exemptions as to certain information may be granted by the review body
* Will be generally allowed, except in the summary
* Ordinance will certainly limit this, possibly to documents filed with the review body
* Information that would harm the issuer, provided deletion is not misleading
* Information of minor importance
* Information on traded securities where, for the last three years, the periodic reporting by the issuer was in line with relevant accounting principles
Content and Form of the Prospectus
Exemptions are possible in the following cases – to be further defined in the ordinance:
Small Issuers that do not exceed two of the following criteria in the previous financial year
Type of issuers and offers
Total assets of CHF 20 million
Turnover of CHF 40 million
250 employees on average
Issuers with small capitalization at the trading venue
Rights issues
Issuers that submit offers regularly
Issuers that are admitted at a foreign recognized trading venue
Content and Form of the Prospectus
* Educated guesses on content:
EU or SIX?
Business situation and prospects:
[x] necessity of an MD&A in more complex cases?
[x] necessity of market description and projections?
Summary:
[x] summary of the risks, just as usual?
[x] length of the summary - 7%, max. 15 pages?
Will bond prospectuses become more equity prospectus style?
Content and Form of the Prospectus
* Article 41 FinSA as special rule in case there is no prospectus required:
Equal treatment of investors with respect to information
Necessity to give those investors effective access
* Likely only applicable in case of a public offer
Publication
Form of publication
Time of publication
Rules for reference
* Filing with review body
* Publication of prospectus in different media possible
* Published form needs to fully comply with filed form
* At the beginning of the offer
* Issues of new equity securities require minimum term of availability of prospectus of six days
* Documents that all together form a prospectus need to refer to each other
Supplements
Requirement
Procedure
Effect
* Event occurs or is detected that may significantly influence the valuation of the securities
* Prompt notification of review body of the amendment
* Decision by review body within not more than seven calendar days unless topic is exempt from approval process
* Prompt publication after approval and amendment of the summary
* Revocation of tenders by investors possible
* Extension of offer period to two days after publication of amendment
Philip Spoerlé
Review of the Prospectus and Transitional Rules
Subject of Review
Completeness
Prospectus contains all information according to Article 42 FinSA (information regarding the issuer and guarantor / information on the offer / information on the securities)
Consistency
Prospectus does not contain inherent inconsistencies
Comprehensibility
Prospectus is understandable for potential investors
No review of correctness of the content of the prospectus!
Timing – General Process
Conclu sion
Conclusion
Time-to-market will be longer than under current regime
Risk of non-approval depends upon interpretation of the new regime by review body
Process is inspired by EUPD regime (cf. Article 13 EUPD)
Liability of review body?
Timing – Exceptions
Post-publication Review
* For certain financial instruments to be defined in ordinance, review process can take place after publication of the prospectus
* Precondition: Bank or investment firm confirms that prospectus to be published contains most important information regarding the issuer
* Fact that no pre-publication review took place has to be disclosed in prospectus
Exception is expected to apply to bonds
General Exception from Review Process
* No review of prospectuses of collective investment schemes
* Approval of foreign collective investment schemes according to articles 15(1)(e) and 120 CISA remains reserved
Review Body
In General
* Review body needs to be approved by FINMA; one or more review bodies possible (FINMA is likely to appoint only one entity)
* FIDLEG favors appointment of a private entity as review body (as opposed to situation in EU where this task if performed by governmental agencies)
Requirements
* Organisation: Review body has to be organized in a way to ensure the independent fulfilment of its tasks
* Quality Assurance: Review body and its employees have to guarantee the proper conduct of business operations and have the relevant professional qualifications
Presumably SIX Exchange Regulations will apply for the review body function
Validity of Prospectus and Supplements
Ordinary Prospectuses
Validity of 12 months after approval for same securities of same issuer
Prospectuses of debt securities issued under an issuance programme
Validity until no further debt securities will be issued under the relevant prospectus
Only for debt securities issued under an issuance programme of a bank or an investment firm
Validity of Prospectus and Supplements
Validity of Prospectus and Supplements
Content of Supplements
* Change of content of prospectus which is potentially affected by new circumstances
* Change of relevant summary items
Exceptions
* Review body to publish a (not exhaustive) list of circumstances / developments which are not subject to review by the review body
* Supplements relating to excluded circumstances / developments have to be published and transmitted to review body at the same time
Approval of Foreign Prospectuses
On an ad hoc basis
On a general basis
* Review body may approve foreign prospectuses on an ad hoc basis if
prospectus has been established according to international standards (e.g. IOSCO International Disclosure Standards for Crossborder Offerings and Initial Listings by Foreign Issuers); and
* Review body may approve prospectuses which have been reviewed by review bodies of certain states on a general basis
information duties under foreign regime are equivalent to Swiss standards
* Establishment of a list of countries whose prospectuses will generally be accepted
List likely to include EUPD and US law compliant prospectuses
There is no legal basis that a prospectus reviewed and approved by the Swiss review body will be accepted/passported within the EU – it is in the discretion of each EU member state to accept "Swiss" prospectuses ("Wrapper" solution?)
On the other hand, it is likely that EUPD compliant prospectuses will be generally accepted by Swiss review body
Transitional Rules
* After two years from their entering into force, the new prospectus and KID regimes apply
to securities which (i) have been publicly offered or (ii) for which a request for the admission to trading on a regulated market has been made before the new regimes entered into force
for securities which have been offered to private individuals before the new regimes entered into force
Potentially significant administrative burden for banks and other issuers issuing securities on a regular basis
Transitional rules will in particular be relevant for open-end products within the scope of the new regime
Marcel Giger
KID, Liability and Criminal Sanctions
Key Information Document (KID) Duty
* KID (Basisinformationsblatt) required if financial instrument is offered to retail clients (Privatkunden)
* Duty with producer (Ersteller) of financial instrument, but financial service provider must make available KID to retail clients
* Term "producer" unclear ("Ersteller sind Personen die ein Finanzinstrument erstellen…..")
* Producer can delegate to qualified third parties, but remains responsible
* If offer to retail clients on indicative basis: Draft KID with indicative information needed
Key Information Document (KID) Exceptions
* No need for KID if offering of securities in the form of shares (including similar participation rights)
* No exception for bonds or convertible bonds
* Leads to change in capital markets documentation for bonds
* Equivalent documents under foreign law can be used
* In any case: no approval required
Key Information Document (KID) Content
* KID must contain essential information so that investors can (i) make a "well-founded" (fundierte) investment decision and (ii) compare different financial instruments
* Reference to "well-founded" investment decision problematic (also in view of liability provision)
* Included must be, for example:
Risk / Return profile, specifying also maximum loss
The cost of the financial instrument
Key Information Document (KID) Format, Update and Publication
* Stand-alone document distinguished from advertising material
* Must be "easy to understand"
* Duty of producer (Ersteller) to regularly check information and update KID in the event of material changes (delegation to qualified third parties possible)
* If public offer: publication same as prospectus
* Further details in ordinance
Example Germany: not more than 3 pages (2 if instrument is not complex)
Advertising
* Advertising must be clearly identified as such
* It must refer to prospectus and KID and indicate where these documents can be obtained
* Advertising and other information intended for investors must be "in line" (übereinstimmen) with information contained in prospectus and KID
* Botschaft refers to Unfair Competition Act, i.e. no "incorrect or misleading information"
* This new provision combined with amended liability provision will increase exposure for advertising
* Covers flyers, newspaper ads, road show material etc.
Liability
* Mainly based on existing liability scheme (existing art. 652a, 752 and 1156 CO will be deleted)
* Covers information that is inaccurate, misleading or not in line with statutory requirements in prospectus, KID or similar communications
* But one main change: "fault" will be presumed by law (against current precedent of Federal Supreme Court and certain part of legal scholars)
* Shifts burden of prove to defendant
* Changes for due diligence defence or due diligence procedure?
Liability
* Information in summaries: Liability is limited to cases where information is misleading, inaccurate or inconsistent when read together with other parts of the prospectus
* Similar concept should apply to KID (currently not foreseen)
* False or misleading information regarding main prospects (wesentliche Perspektiven): liability if information has been provided or distributed
"despite better knowledge" or
without reference to uncertainty regarding future developments (requires typical disclaimer regarding "forward-looking statements")
Criminal Provisions
* Fine not exceeding CHF 500,000 on a person who "wilfully" (vorsätzlich):
provides false information or withholds material facts in the prospectus or the KID
fails to publish the prospectus or KID
* Problematic provision in various respects, e.g.
No qualification of false information
Reference to very broad and not defined terms
Criminal Provisions
* Problematic provision in various respects, e.g.
Who can be charged? "in particular the issuer" (Botschaft) but
Other parties could be deemed to "withhold" material facts or to commit a crime due to "non-acting" (pflichtwidriges Untätigwerden) in accordance art. 11 Swiss Criminal Code
Liability claims would often start with criminal charges
* Would have a big impact on capital markets transactions (e.g. increased exposure, due diligence)
Your Team
42
Matthias Courvoisier
Partner Baker & McKenzie Zurich Holbeinstrasse 30 Postfach 8034 Zurich
+41 (44) 384 1340 (telephone)
+41 (44) 384 1284 (facsimile)
[email protected]
Dr. iur. Matthias Courvoisier joined Baker & McKenzie in 1998 after he graduated from the University of Zurich as Master in Law and worked at the Centre for Private International Law for two years as research and teaching assistant.
In 2000, he was admitted to the bar. In 2004 he graduated from London Business School as Master of Science in Finance with distinction. After he returned to Switzerland he obtained his doctorate from the University of Zurich with summa cum laude. Matthias became a partner in 2009. He focuses mainly on advising and representing clients in public and private M&A-Transactions, IPO and other capital markets transactions, and in Finance Litigations. Matthias Courvoisier co-heads the Firm's Capital Markets Practice Group in Zurich.
For a list of selected legal matters, see:
http://www.bakermckenzie.com/MatthiasCourvoisier/
Marcel Giger
Partner Baker & McKenzie Zurich Holbeinstrasse 30 Postfach 8034 Zurich
+41 (44) 384 1316 (telephone)
+41 (44) 384 1284 (facsimile)
[email protected]
Dr. iur. Marcel Giger is a graduate of University of St. Gallen (HSG) and earned an M.C.J. at the New York University, School of Law. Prior to joining Baker & McKenzie, he worked as in-house counsel for a major Swiss bank.
Marcel Giger is co-head of the B&M Zurich Capital Markets as well as of the Financial Services Practice Group. He focuses on all legal aspects of capital market transactions, banking and financing matters as well as regulatory compliance issues.
He advises financial institutions as well as corporate clients in transactions within his practice areas.
For a list of selected legal matters, see:
http://www.bakermckenzie.com/MarcelGiger/
44
Lukas Glanzmann
Partner Baker & McKenzie Zurich Holbeinstrasse 30 Postfach 8034 Zurich
+41 (44) 384 1355 (telephone)
+41 (44) 384 1284 (facsimile)
[email protected]
Prof. Dr. iur. Lukas Glanzmann joined Baker & McKenzie in 1998 and became a partner in 2004. He concentrates his practice in the areas of loans and credit facilities, restructuring, private equity, mergers & acquisitions as well as capital markets and securities. Lukas Glanzmann graduated from the University of St. Gallen law school and obtained a doctoral degree in the field of corporate law from the University of St. Gallen and a LL.M. degree from Harvard Law School. In 2006, Lukas Glanzmann finished his habilitation and today, he holds the position of a titular professor of business law at the University of St. Gallen. Lukas Glanzmann has published various articles and books in the fields of corporate law and finance, corporate restructuring and corporate governance. Since 2012 he has been a member of the Federal Commission of Experts for the Commercial Register.
For a list of selected legal matters, see:
http://www.bakermckenzie.com/LukasGlanzmann/
45
Philip Spoerlé
Associate Baker & McKenzie Zurich Holbeinstrasse 30 Postfach 8034 Zurich
+41 (44) 384 1496 (telephone)
+41 (44) 384 1284 (facsimile)
[email protected]
Dr. iur. Philip Spoerlé is an associate in Baker & McKenzie's Zurich office. He studied law and economics at the University of St. Gallen (M.A. HSG in Law & Economics 2011) and Osgoode Hall Law School of York University, Toronto (2009). After his admission to the Zurich bar, Philip Spoerlé obtained his PhD from the University of St. Gallen in 2015 with a doctoral thesis in the area of corporate law.
Prior to joining Baker & McKenzie in February 2015, Philip Spoerlé worked for a global investment bank in the area of fixed income securities trading (2012–2013). He also worked as a teaching assistant at the University of St. Gallen and as a law clerk at Baker & McKenzie Zurich (2010–2012).
His practice mainly focuses on the areas of equity and debt capital markets, derivatives, loans and credit facilities, mergers & acquisitions, corporate restructurings as well as general corporate and commercial matters.
For a list of selected legal matters, see:
http://www.bakermckenzie.com/PhilipSpoerle/
46
Anette Waygood
Associate Baker & McKenzie Zurich Holbeinstrasse 30 Postfach 8034 Zurich
+41 (44) 384 1336 (telephone) +41 (44) 384 1284 (facsimile) [email protected]
Dr. iur. Anette Waygood-Weiner joined the Firm's Zurich office as associate in 2010.
She graduated from the University of St. Gallen Law School in 2007 (M.A. HSG). Between 2007 and 2008, she completed her clerkship at Baker & McKenzie and was subsequently admitted to the bar in Zurich in 2009. In 2014, Anette was awarded a doctoral degree from the University of St. Gallen with a thesis on "Inducements and conflicts of interest in the financial services industry".
Anette focuses on advising international and domestic clients in areas of capital markets and securities transactions, as well as mergers and acquisitions transactions in the financial services industry. She regularly provides legal advice to issuers and investment banks on equity and debt capital market transactions, including ongoing compliance with securities laws and financial regulatory matters. Anette is a member of the Capital Markets as well as the Financial Services Practice Group.
For a list of selected legal matters, see:
http://www.bakermckenzie.com/AnetteWeiner
47
|
<urn:uuid:f6eb9333-4d8d-450f-bc9f-d0d63aa0df4f>
|
CC-MAIN-2020-40
|
https://www.bakermckenzie.com/-/media/files/people/courvoisier-matthias/pn_zurich_roundtablefidleg_mar16.pdf?la=en
|
2020-09-25T23:21:18+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00103-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 742,896,205
| 5,096
|
eng_Latn
|
eng_Latn
| 0.93536
|
eng_Latn
| 0.982003
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
482,
676,
737,
1137,
1689,
1758,
2516,
2940,
3364,
4172,
4786,
5716,
5787,
6230,
6638,
7223,
7732,
8107,
8381,
8800,
9289,
9354,
9762,
10039,
10692,
11352,
11739,
11779,
12242,
13265,
13890,
13943,
14483,
14830,
15265,
15736,
16281,
16776,
17332,
17690,
18159,
18174,
19231,
20080,
21240,
22439,
23681
] |
Roundtable
FIDLEG and Capital Markets Transactions
March 2016
Baker & McKenzie Zurich is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a "partner" means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an "office" means an office of any such law firm.
© 2016 Baker & McKenzie Zurich
Duty to Publish a Prospectus and
Exceptions
Content, Form and Publication of the
Prospectus
Review of the Prospectus and
Transitional Rules
KID, Liability and Criminal Sanctions
Philip Spoerlé
Anette Waygood
Duty to Publish a Prospectus and Exceptions
General Duty to Publish a Prospectus
Rule
* A public offer for the acquisition of securities, or
* seeking the admission of securities to trading on a trading facility
* Prior publication of a prospectus
* Shares and bonds
* New: derivatives and structured products
* Any stock exchange, or
* any multilateral trading system,
* but not any organised trading systems
Securities
Trading facility
General Duty to Publish a Prospectus
Public offer
* Any offer to the public, i.e. any statement to the public that contains sufficient information about the conditions of the offer and the securities
* Current interpretation to continue
* Limited circle of addresses
* Rule of thumb: approx. 20 or less addressees
* Primary offerings
* Secondary offerings
* Secondary offerings
* If no participation in the public offering of its securities, no duty to cooperate in the preparation of the prospectus
Type of offerings
Involvement of the issuer
5
Exceptions
Type of offer
Type of securities
Admission to trading
Customer Segmentation
Private customers
All non-professional customers
High-net-worth individuals
Professional and institutional customers (opting in)
Professional customers
Institutional customers
Banks, securities dealers, qualified asset managers, fund management companies
Insurance companies
Foreign customers subject to an equivalent supervision
Central banks
Public entities and entities with professional treasury operations
Pension funds
Choices
High net worth individuals (opting out in writing)
Opting-out: High-net worth individuals as "professional customers" (further requirements)
Opting-in: Professional and institutional customers as "private customers"
Opting-down: Institutional customers as "professional customers"
Exceptions by Type of Offer
Limited need for customer protection
Limited number of addresses
Limited potential for damages
* Investors that qualify as professional customers
* Investors acquiring securities for a value of at least CHF 100,000
* Minimum denomination of CHF 100'000 per unit
* Less than 150 investors qualifying as private customers
* Offer does not exceed value of CHF 100,000 over a 12-month period
8
Exceptions by Type of Offer
No automatic continuation of the applicability of an exception
* Each public offer for resale of securities is subject to the publication of a prospectus unless an exception applies
No obligation to publish a prospectus for a later public securities offering
* Existence of a valid prospectus, and
* consent to use by issuer or the persons who have assumed responsibility for the prospectus
Exceptions by Type of Securities
Principle
* No protection of investors necessary in cases when investors are equally informed about the securities
Reliance on existing / former prospectus
Adequate other information
* Equity securities issued outside the scope of a capital increase in exchange for previously issued equity securities of the same class
* Equity securities issues upon the conversion or exchange of financial instruments, e.g. convertible bonds upon conversion
* Equity securities issued or supplied following the execution of a right linked to financial instruments
* Securities offered in connection with a take-over
* Securities offered / allocated in connection with mergers, divisions, conversions, transfer of assets
* Equity securities distributed as dividend
* Employee schemes
Exceptions by Type of Securities
Existing customer protection
* Securities with an unlimited and irrevocable guarantee from the Confederation or cantons, from an international or supranational public entity, from the Swiss National Bank or from foreign central banks
No commercial purpose
Mere saving tool / low default risk
Derivatives
* Securities issued by non-profit institutions for raising funds for noncommercial purposes
* Medium-term notes (Kassenobligationen)
* Securities with a term of less than one year (money market instruments)
* Not offered in the form of an issue, e.g. concluded on Eurex
Exceptions Admission to Trading
Based on EU Prospectus Directive
* Equity securities that over a period of 12 months account for less than 10% of the number of equity securities of the same category already admitted to trading on the same trading venue
* Equity securities issued upon the conversion or exchange of financial instruments or following the execution of rights linked to financial instruments, provided they are equity securities of the same category as those already admitted to trading
* Securities admitted to trading on a foreign trading venue whose regulation, supervision and transparency are acknowledged as being appropriate by the domestic trading venue or whose transparency for investors is ensured in another manner
* Securities for which admission is sought for a trading segment open exclusively to professional clients trading for their own account or for the account solely of professional clients
Matthias Courvoisier
Content, Form and Publication of the Prospectus
Content and Form of the Prospectus
All
information
that is rele-
vant for the
investor to
take an
investment
decision
Informa-
tion on the
issuer and
the
guarantor
Informa-
tion on the
securities
Informa-
tion on the
offer
* Details to be set out in an ordinance (art. 48 FinSA) and not in stock exchange rules anymore
* May I rely on the content lists in the ordinance?
* Does the liability risk change since the law provides the content?
Content and Form of the Prospectus
Summary
Final offer terms at the end of the offer period
Indicative offer terms at the time of the public offer
Description of the securities may be separated from the base prospectus
(Base) prospectus with information on issuer and guarantor but not the offer terms – may or may not include description of securities – without such description: 'registration form'
Content and Form of the Prospectus
Language
* German, French, Italian or English
Inclusion by reference
Exemptions as to certain information may be granted by the review body
* Will be generally allowed, except in the summary
* Ordinance will certainly limit this, possibly to documents filed with the review body
* Information that would harm the issuer, provided deletion is not misleading
* Information of minor importance
* Information on traded securities where, for the last three years, the periodic reporting by the issuer was in line with relevant accounting principles
Content and Form of the Prospectus
Exemptions are possible in the following cases – to be further defined in the ordinance:
Small Issuers that do not exceed two of the following criteria in the previous financial year
Type of issuers and offers
Total assets of CHF 20 million
Turnover of CHF 40 million
250 employees on average
Issuers with small capitalization at the trading venue
Rights issues
Issuers that submit offers regularly
Issuers that are admitted at a foreign recognized trading venue
Content and Form of the Prospectus
* Educated guesses on content:
EU or SIX?
Business situation and prospects:
[x] necessity of an MD&A in more complex cases?
[x] necessity of market description and projections?
Summary:
[x] summary of the risks, just as usual?
[x] length of the summary - 7%, max. 15 pages?
Will bond prospectuses become more equity prospectus style?
Content and Form of the Prospectus
* Article 41 FinSA as special rule in case there is no prospectus required:
Equal treatment of investors with respect to information
Necessity to give those investors effective access
* Likely only applicable in case of a public offer
Publication
Form of publication
Time of publication
Rules for reference
* Filing with review body
* Publication of prospectus in different media possible
* Published form needs to fully comply with filed form
* At the beginning of the offer
* Issues of new equity securities require minimum term of availability of prospectus of six days
* Documents that all together form a prospectus need to refer to each other
Supplements
Requirement
Procedure
Effec
|
t
* Event occurs or is detected that may significantly influence the valuation of the securities
* Prompt notification of review body of the amendment
* Decision by review body within not more than seven calendar days unless topic is exempt from approval process
* Prompt publication after approval and amendment of the summary
* Revocation of tenders by investors possible
* Extension of offer period to two days after publication of amendment
Philip Spoerlé
Review of the Prospectus and Transitional Rules
Subject of Review
Completeness
Prospectus contains all information according to Article 42 FinSA (information regarding the issuer and guarantor / information on the offer / information on the securities)
Consistency
Prospectus does not contain inherent inconsistencies
Comprehensibility
Prospectus is understandable for potential investors
No review of correctness of the content of the prospectus!
| 8,844
|
inside_word
|
Effect
|
remove_all
|
<url>
https://www.bakermckenzie.com/-/media/files/people/courvoisier-matthias/pn_zurich_roundtablefidleg_mar16.pdf?la=en
</url>
<text>
Roundtable
FIDLEG and Capital Markets Transactions
March 2016
Baker & McKenzie Zurich is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a "partner" means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an "office" means an office of any such law firm.
© 2016 Baker & McKenzie Zurich
Duty to Publish a Prospectus and
Exceptions
Content, Form and Publication of the
Prospectus
Review of the Prospectus and
Transitional Rules
KID, Liability and Criminal Sanctions
Philip Spoerlé
Anette Waygood
Duty to Publish a Prospectus and Exceptions
General Duty to Publish a Prospectus
Rule
* A public offer for the acquisition of securities, or
* seeking the admission of securities to trading on a trading facility
* Prior publication of a prospectus
* Shares and bonds
* New: derivatives and structured products
* Any stock exchange, or
* any multilateral trading system,
* but not any organised trading systems
Securities
Trading facility
General Duty to Publish a Prospectus
Public offer
* Any offer to the public, i.e. any statement to the public that contains sufficient information about the conditions of the offer and the securities
* Current interpretation to continue
* Limited circle of addresses
* Rule of thumb: approx. 20 or less addressees
* Primary offerings
* Secondary offerings
* Secondary offerings
* If no participation in the public offering of its securities, no duty to cooperate in the preparation of the prospectus
Type of offerings
Involvement of the issuer
5
Exceptions
Type of offer
Type of securities
Admission to trading
Customer Segmentation
Private customers
All non-professional customers
High-net-worth individuals
Professional and institutional customers (opting in)
Professional customers
Institutional customers
Banks, securities dealers, qualified asset managers, fund management companies
Insurance companies
Foreign customers subject to an equivalent supervision
Central banks
Public entities and entities with professional treasury operations
Pension funds
Choices
High net worth individuals (opting out in writing)
Opting-out: High-net worth individuals as "professional customers" (further requirements)
Opting-in: Professional and institutional customers as "private customers"
Opting-down: Institutional customers as "professional customers"
Exceptions by Type of Offer
Limited need for customer protection
Limited number of addresses
Limited potential for damages
* Investors that qualify as professional customers
* Investors acquiring securities for a value of at least CHF 100,000
* Minimum denomination of CHF 100'000 per unit
* Less than 150 investors qualifying as private customers
* Offer does not exceed value of CHF 100,000 over a 12-month period
8
Exceptions by Type of Offer
No automatic continuation of the applicability of an exception
* Each public offer for resale of securities is subject to the publication of a prospectus unless an exception applies
No obligation to publish a prospectus for a later public securities offering
* Existence of a valid prospectus, and
* consent to use by issuer or the persons who have assumed responsibility for the prospectus
Exceptions by Type of Securities
Principle
* No protection of investors necessary in cases when investors are equally informed about the securities
Reliance on existing / former prospectus
Adequate other information
* Equity securities issued outside the scope of a capital increase in exchange for previously issued equity securities of the same class
* Equity securities issues upon the conversion or exchange of financial instruments, e.g. convertible bonds upon conversion
* Equity securities issued or supplied following the execution of a right linked to financial instruments
* Securities offered in connection with a take-over
* Securities offered / allocated in connection with mergers, divisions, conversions, transfer of assets
* Equity securities distributed as dividend
* Employee schemes
Exceptions by Type of Securities
Existing customer protection
* Securities with an unlimited and irrevocable guarantee from the Confederation or cantons, from an international or supranational public entity, from the Swiss National Bank or from foreign central banks
No commercial purpose
Mere saving tool / low default risk
Derivatives
* Securities issued by non-profit institutions for raising funds for noncommercial purposes
* Medium-term notes (Kassenobligationen)
* Securities with a term of less than one year (money market instruments)
* Not offered in the form of an issue, e.g. concluded on Eurex
Exceptions Admission to Trading
Based on EU Prospectus Directive
* Equity securities that over a period of 12 months account for less than 10% of the number of equity securities of the same category already admitted to trading on the same trading venue
* Equity securities issued upon the conversion or exchange of financial instruments or following the execution of rights linked to financial instruments, provided they are equity securities of the same category as those already admitted to trading
* Securities admitted to trading on a foreign trading venue whose regulation, supervision and transparency are acknowledged as being appropriate by the domestic trading venue or whose transparency for investors is ensured in another manner
* Securities for which admission is sought for a trading segment open exclusively to professional clients trading for their own account or for the account solely of professional clients
Matthias Courvoisier
Content, Form and Publication of the Prospectus
Content and Form of the Prospectus
All
information
that is rele-
vant for the
investor to
take an
investment
decision
Informa-
tion on the
issuer and
the
guarantor
Informa-
tion on the
securities
Informa-
tion on the
offer
* Details to be set out in an ordinance (art. 48 FinSA) and not in stock exchange rules anymore
* May I rely on the content lists in the ordinance?
* Does the liability risk change since the law provides the content?
Content and Form of the Prospectus
Summary
Final offer terms at the end of the offer period
Indicative offer terms at the time of the public offer
Description of the securities may be separated from the base prospectus
(Base) prospectus with information on issuer and guarantor but not the offer terms – may or may not include description of securities – without such description: 'registration form'
Content and Form of the Prospectus
Language
* German, French, Italian or English
Inclusion by reference
Exemptions as to certain information may be granted by the review body
* Will be generally allowed, except in the summary
* Ordinance will certainly limit this, possibly to documents filed with the review body
* Information that would harm the issuer, provided deletion is not misleading
* Information of minor importance
* Information on traded securities where, for the last three years, the periodic reporting by the issuer was in line with relevant accounting principles
Content and Form of the Prospectus
Exemptions are possible in the following cases – to be further defined in the ordinance:
Small Issuers that do not exceed two of the following criteria in the previous financial year
Type of issuers and offers
Total assets of CHF 20 million
Turnover of CHF 40 million
250 employees on average
Issuers with small capitalization at the trading venue
Rights issues
Issuers that submit offers regularly
Issuers that are admitted at a foreign recognized trading venue
Content and Form of the Prospectus
* Educated guesses on content:
EU or SIX?
Business situation and prospects:
[x] necessity of an MD&A in more complex cases?
[x] necessity of market description and projections?
Summary:
[x] summary of the risks, just as usual?
[x] length of the summary - 7%, max. 15 pages?
Will bond prospectuses become more equity prospectus style?
Content and Form of the Prospectus
* Article 41 FinSA as special rule in case there is no prospectus required:
Equal treatment of investors with respect to information
Necessity to give those investors effective access
* Likely only applicable in case of a public offer
Publication
Form of publication
Time of publication
Rules for reference
* Filing with review body
* Publication of prospectus in different media possible
* Published form needs to fully comply with filed form
* At the beginning of the offer
* Issues of new equity securities require minimum term of availability of prospectus of six days
* Documents that all together form a prospectus need to refer to each other
Supplements
Requirement
Procedure
Effec<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.bakermckenzie.com/-/media/files/people/courvoisier-matthias/pn_zurich_roundtablefidleg_mar16.pdf?la=en\n</url>\n<text>\nRoundtable\n\nFIDLEG and Capital Markets Transactions\n\nMarch 2016\n\nBaker & McKenzie Zurich is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a \"partner\" means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an \"office\" means an office of any such law firm.\n\n© 2016 Baker & McKenzie Zurich\n\nDuty to Publish a Prospectus and\nExceptions\nContent, Form and Publication of the\nProspectus\nReview of the Prospectus and\nTransitional Rules\nKID, Liability and Criminal Sanctions\nPhilip Spoerlé\n\nAnette Waygood\n\nDuty to Publish a Prospectus and Exceptions\n\nGeneral Duty to Publish a Prospectus\n\nRule\n\n* A public offer for the acquisition of securities, or\n* seeking the admission of securities to trading on a trading facility\n* Prior publication of a prospectus\n* Shares and bonds\n* New: derivatives and structured products\n* Any stock exchange, or\n* any multilateral trading system,\n* but not any organised trading systems\n\nSecurities\n\nTrading facility\n\nGeneral Duty to Publish a Prospectus\n\nPublic offer\n\n* Any offer to the public, i.e. any statement to the public that contains sufficient information about the conditions of the offer and the securities\n* Current interpretation to continue\n* Limited circle of addresses\n* Rule of thumb: approx. 20 or less addressees\n* Primary offerings\n* Secondary offerings\n* Secondary offerings\n* If no participation in the public offering of its securities, no duty to cooperate in the preparation of the prospectus\n\nType of offerings\n\nInvolvement of the issuer\n\n5\n\nExceptions\n\nType of offer\n\nType of securities\n\nAdmission to trading\n\nCustomer Segmentation\n\nPrivate customers\n\n All non-professional customers\n High-net-worth individuals\n Professional and institutional customers (opting in)\n\nProfessional customers\n\nInstitutional customers\n\n Banks, securities dealers, qualified asset managers, fund management companies\n Insurance companies\n Foreign customers subject to an equivalent supervision\n Central banks\n Public entities and entities with professional treasury operations\n Pension funds\n\nChoices\n\n High net worth individuals (opting out in writing)\n Opting-out: High-net worth individuals as \"professional customers\" (further requirements)\n Opting-in: Professional and institutional customers as \"private customers\"\n Opting-down: Institutional customers as \"professional customers\"\n\nExceptions by Type of Offer\n\nLimited need for customer protection\n\nLimited number of addresses\n\nLimited potential for damages\n\n* Investors that qualify as professional customers\n* Investors acquiring securities for a value of at least CHF 100,000\n* Minimum denomination of CHF 100'000 per unit\n* Less than 150 investors qualifying as private customers\n* Offer does not exceed value of CHF 100,000 over a 12-month period\n\n8\n\nExceptions by Type of Offer\n\nNo automatic continuation of the applicability of an exception\n\n* Each public offer for resale of securities is subject to the publication of a prospectus unless an exception applies\n\nNo obligation to publish a prospectus for a later public securities offering\n\n* Existence of a valid prospectus, and\n* consent to use by issuer or the persons who have assumed responsibility for the prospectus\n\nExceptions by Type of Securities\n\nPrinciple\n\n* No protection of investors necessary in cases when investors are equally informed about the securities\n\nReliance on existing / former prospectus\n\nAdequate other information\n\n* Equity securities issued outside the scope of a capital increase in exchange for previously issued equity securities of the same class\n* Equity securities issues upon the conversion or exchange of financial instruments, e.g. convertible bonds upon conversion\n* Equity securities issued or supplied following the execution of a right linked to financial instruments\n* Securities offered in connection with a take-over\n* Securities offered / allocated in connection with mergers, divisions, conversions, transfer of assets\n* Equity securities distributed as dividend\n* Employee schemes\n\nExceptions by Type of Securities\n\nExisting customer protection\n\n* Securities with an unlimited and irrevocable guarantee from the Confederation or cantons, from an international or supranational public entity, from the Swiss National Bank or from foreign central banks\n\nNo commercial purpose\n\nMere saving tool / low default risk\n\nDerivatives\n\n* Securities issued by non-profit institutions for raising funds for noncommercial purposes\n* Medium-term notes (Kassenobligationen)\n* Securities with a term of less than one year (money market instruments)\n* Not offered in the form of an issue, e.g. concluded on Eurex\n\nExceptions Admission to Trading\n\nBased on EU Prospectus Directive\n\n* Equity securities that over a period of 12 months account for less than 10% of the number of equity securities of the same category already admitted to trading on the same trading venue\n* Equity securities issued upon the conversion or exchange of financial instruments or following the execution of rights linked to financial instruments, provided they are equity securities of the same category as those already admitted to trading\n* Securities admitted to trading on a foreign trading venue whose regulation, supervision and transparency are acknowledged as being appropriate by the domestic trading venue or whose transparency for investors is ensured in another manner\n* Securities for which admission is sought for a trading segment open exclusively to professional clients trading for their own account or for the account solely of professional clients\n\nMatthias Courvoisier\n\nContent, Form and Publication of the Prospectus\n\nContent and Form of the Prospectus\n\nAll\ninformation\nthat is rele-\nvant for the\ninvestor to\ntake an\ninvestment\ndecision\nInforma-\ntion on the\nissuer and\nthe\nguarantor\nInforma-\ntion on the\nsecurities\nInforma-\ntion on the\noffer\n\n* Details to be set out in an ordinance (art. 48 FinSA) and not in stock exchange rules anymore\n* May I rely on the content lists in the ordinance?\n* Does the liability risk change since the law provides the content?\n\nContent and Form of the Prospectus\n\nSummary\n\nFinal offer terms at the end of the offer period\n\nIndicative offer terms at the time of the public offer\n\nDescription of the securities may be separated from the base prospectus\n\n(Base) prospectus with information on issuer and guarantor but not the offer terms – may or may not include description of securities – without such description: 'registration form'\n\nContent and Form of the Prospectus\n\nLanguage\n\n* German, French, Italian or English\n\nInclusion by reference\n\nExemptions as to certain information may be granted by the review body\n\n* Will be generally allowed, except in the summary\n* Ordinance will certainly limit this, possibly to documents filed with the review body\n* Information that would harm the issuer, provided deletion is not misleading\n* Information of minor importance\n* Information on traded securities where, for the last three years, the periodic reporting by the issuer was in line with relevant accounting principles\n\nContent and Form of the Prospectus\n\nExemptions are possible in the following cases – to be further defined in the ordinance:\n\nSmall Issuers that do not exceed two of the following criteria in the previous financial year\n\nType of issuers and offers\n\nTotal assets of CHF 20 million\n\nTurnover of CHF 40 million\n\n250 employees on average\n\nIssuers with small capitalization at the trading venue\n\nRights issues\n\nIssuers that submit offers regularly\n\nIssuers that are admitted at a foreign recognized trading venue\n\nContent and Form of the Prospectus\n\n* Educated guesses on content:\n EU or SIX?\n Business situation and prospects:\n[x] necessity of an MD&A in more complex cases?\n[x] necessity of market description and projections?\n Summary:\n[x] summary of the risks, just as usual?\n[x] length of the summary - 7%, max. 15 pages?\n Will bond prospectuses become more equity prospectus style?\n\nContent and Form of the Prospectus\n\n* Article 41 FinSA as special rule in case there is no prospectus required:\n Equal treatment of investors with respect to information\n Necessity to give those investors effective access\n* Likely only applicable in case of a public offer\n\nPublication\n\nForm of publication\n\nTime of publication\n\nRules for reference\n\n* Filing with review body\n* Publication of prospectus in different media possible\n* Published form needs to fully comply with filed form\n* At the beginning of the offer\n* Issues of new equity securities require minimum term of availability of prospectus of six days\n* Documents that all together form a prospectus need to refer to each other\n\nSupplements\n\nRequirement\n\nProcedure\n\nEffec<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "t\n\n* Event occurs or is detected that may significantly influence the valuation of the securities\n* Prompt notification of review body of the amendment\n* Decision by review body within not more than seven calendar days unless topic is exempt from approval process\n* Prompt publication after approval and amendment of the summary\n* Revocation of tenders by investors possible\n* Extension of offer period to two days after publication of amendment\n\nPhilip Spoerlé\n\nReview of the Prospectus and Transitional Rules\n\nSubject of Review\n\nCompleteness\n\nProspectus contains all information according to Article 42 FinSA (information regarding the issuer and guarantor / information on the offer / information on the securities)\n\nConsistency\n\nProspectus does not contain inherent inconsistencies\n\nComprehensibility\n\nProspectus is understandable for potential investors\n\nNo review of correctness of the content of the prospectus!",
"role": "assistant"
}
] |
|
Autumn Term
Global Theme:
Identity and Diversity
Focus:
Belonging
Autumn 2
Our Class Community
Core text:
This is Our House
Hook:
Reception Long Term Map
Spring Term
Global Theme:
Sustainable Development
Focus:
Preserving the Environment
Spring 1
Spring 2
Climate Change and
Animal Habitats
Core text:
The Polar Bear‟s Home
Hook:
Have footprints from each of the animals leading to different parts of the classroom where the children find small world toy or puppet of each animal.
Minibeast
Conservation
Core text:
Christopher Nibble
Hook:
Summer Term
Global Theme:
Social Justice and Equity
Focus:
Helping Others
Summer 1
Sharing with Others
Summer 2
Problem Solving
Core text:
Yummy
Hook:
Have a surprise new „toy‟ (or role play area) and explain that only certain adults (e.g. Only Mrs. Ramsay is allowed to play in here!) and/or children can play in it – discuss rules around this and how it makes us feel. Find the new book inside.
Have Zoolab minibeasts
OR
Can someone bring in a pet guinea pig??
OR Have a selection of flowers in the classroom but
all of the buds picked off –
Oh no! What happened to our flowers? Can we enjoy
Core text:
Dear Mother Goose
Hook:
Have a picnic basket left in the middle of the classroom with different foods from around the world for all of the children to find. Also have the book and other objects for them to explore from the text inside the picnic basket.
Have a mailbox appear in the classroom – children find letters posted to them from children and/or adults around the school with questions. Do you think we could answer these letters?
these anymore?? Etc.
All of our topics cover the broad areas of our curriculum and also focus upon the learning required to meet our Early Learning Goals.
ELG1: Listening
ELG2: Speaking
ELG10: Writing
ELG3: Gross Motor Skills
ELG4: Fine Motor Skills
ELG5: Self-Regulation
ELG6: Managing Self
ELG7: Building Relationships
ELG8: Comprehension
ELG9: Word Reading
ELG11: Number
ELG12: Numerical Patterns
ELG13: Past and Present
ELG14: People, Cultures and Communities
ELG15: The Natural World
ELG16: Creating with Materials
ELG17: Performing
Whilst delivering a broad and balanced range of activities for the children during both child-led and adult-directed, the core texts will have a particular focus in the following areas, supporting knowledge, understanding and skills, with learning towards:
Past and Present(a): Talk about the lives of the people around them and their roles in society Past and Present(b): Know some similarities and
People, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on
Comprehension(a): Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Comprehension(a):
Comprehension(a):
Self-Regulation(a): Show an understanding of their own feelings and those of others, and regulate their behaviour accordingly
Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Autumn 1 All About Me
Core text:
It‟s Okay to be Different
Hook:
Have familiar adults from around the school (e.g. Mrs. Blain, Mrs. Johnson)
Self-Regulation
(b): Have a positive sense of self and
show resilience and perseverance in the face of
challenge
Self-Regulation
(c): Pay attention to their teacher
and follow multi-step instructions.
Building Relationships
Work and play cooperatively and take
turns with others
Building Relationships(b):
Form positive attachments and friendships
Building Relationships
(c):
Show sensitivities to others‟
needs.
The Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World(c): Understand the effect of the changing seasons on the natural world around them.
(a):
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Past and Present
(c):
Recall some important narratives, characters and
figures from the past encountered in books read
in class
People, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on knowledge from stories, non-fiction texts and – when appropriate – maps.
knowledge from stories, non-fiction texts and – when appropriate – maps.
The Natural World
(a):
Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World
(b):
Know some similarities and differences between the
natural world around them and contrasting
environments, drawing on their experiences and what
has been read in class
The Natural World
(c):
Understand the effect of the changing seasons on the
natural world around them.
Creating with Materials
(a):
Draw and paint using a range of materials, tools
and techniques, experimenting with colour,
design, texture, form and function
Creating with Materials
(b):
Share their creations, explaining the process they
have used
Creating with Materials
(c):
Make use of props and materials when role-playing
characters in narratives and stories.
Phonics - Children have a daily phonics session in groups that at their skill level and regularly reviewed. Each phonic lesson supports the following goals:
(a): Say a sound for each letter in the alphabet and at least 10 digraphs
(b): Read words consistent with their phonic knowledge by sound-blending
(c): Read aloud simple sentences and books that are consistent with their phonic knowledge, including common exception words.
(d): Write recognisable letters, most of which are correctly formed
(e): Spell words by identifying sounds in them and representing the sounds with a letter or letters
(f): Write simple phrases and sentences that can be read by others.
Values:
Values:
Values:
Respect
To know it‟s alright to be different
To recognise differences in others
Respect
To show appreciation for people who help us
Collaboration
To share ideas, help each
Integrity
To do the right thing without expecting praise
Curiosity
To wonder why?
Responsibility their own words and new vocabulary
Comprehension
(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension(c): Use new vocabulary during discussions about stories, non-fiction, rhymes and poems and during role-play Writing(c): Write simple phrases and sentences that can be read by others.
The Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World(b): Know some similarities and differences between the natural world around them and contrasting environments, drawing on their experiences and what has been read in class;
their own words and new vocabulary
Comprehension(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension
(c): Use new vocabulary during
discussions about stories, non-fiction, rhymes and
poems and during role-play
Past and Present
(b): Know some similarities and
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Past and Present
(c):
Recall some important narratives, characters and
figures from the past encountered in books read
in class
People, Cultures and
Communities
(c): Explain some similarities and
differences between life in this country and life in other
countries, drawing on knowledge from stories,
non-fiction texts and – when appropriate – maps.
their own words and new vocabulary
Comprehension
(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension
(c): Use new vocabulary during
discussions about stories, non-fiction, rhymes and
poems and during role-play
Writing
(c): Write simple phrases and sentences that
can be read by others.
Past and Present
(b): Know some similarities and
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Performing
(a): Sing a range of well-known
nursery rhymes and songs
Performing
(b): Perform songs, rhymes, poems and
stories with others, and –
when appropriate – move in time with music
Performing
(c): Co- construct, invent, adapt and
recount narratives and stories with peers and their
teacher.
Mathematics - Children will have a daily discrete number/mathematics session as a whole class. This will help the children work towards the following goals:
(a): Have an understanding of number to 10, linking names of numbers, numerals, their value, and their position in the counting order
(b): Subitise (recognise quantities without counting) up to 5
(c): Automatically recall number bonds for numbers 0-5 and for 10, including corresponding partitioning facts
(d): Automatically recall double facts up to 5+5
(e): Compare sets of objects up to 10 in different contexts, considering size and difference
(f): Explore patterns of numbers within numbers up to 10, including evens and odds
Values:
Kindness
Creativity
Values: Curiosity Responsibility
Values: Bravery Responsibility Resilience Gratitude
Kindness
To help a friend who is upset or having difficulties
other and to listen to each other
Gratitude
To show thanks
To care about what is happening to our planet
Gratitude
To show thanks for what we have
others, including families. E.g. community walks, selfportraits, photography
Digital Literacy and Communication
Children will experience listening to audio recordings e.g. audiobooks and podcasts and use iPads to develop their own Children to use cameras to take self-portraits and portraits of their friends
STEAM
Children will explore using mark making tools to make controlled lines, and circles. Apply these skills to make self-portraits.
Curriculum Skills
Literacy
Word Reading
* Identify the initial sound in a word when given a choice.
* Hear and say the initial sound in words.
* Blend the onset then rime to identify an object e.g. d-og.
* Hear the final sound at the end of a CVC word.
* Hear the sound in the middle of a CVC word (medial sound).
* Orally blend CVC words, e.g. "b-a-t", "bat".
* Orally blend the sounds in CCVC/CVCC words.
* Recognise some* letters to read some CVC words.
* Recognise all letters to read some CVC words.
Curriculum Skills Literacy Comprehension
* Anticipate key events in rhymes, poems and stories.
* Sequence a story/recount using visual prompts.
* Talk about key features of favourite stories including character and setting.
* Know that stories have a title.
model effective feedback. Managing own feelings and behaviour and supporting others to make positive choices and find a compromise. Identifying own feelings and the feelings of others.
Digital Literacy and Communication
Children to use cameras to document evidence of their learning and behaviour in the classroom.
STEAM
Construction, building inclusive spaces e.g. dens and homes. Exploring different textiles and techniques.
questions and explain what they have found out.
Children will use their knowledge of 3D shapes and collage materials to design and create animal habitats
Enquiry
Children will use their observations about habitats and animals to talk about our own actions and the impact it has on living things.
Finance and Enterprise Children will look at how to raise money for the WWF.
Curriculum Skills Literacy Word Reading
* Recognise all letters to read some CCVC/CVCC/VCVC words.
* Recognise some* split digraphs to read some CVC words.
* Recognise all digraphs to read some CVC words.
* Attempt to read unfamiliar words using a phonics strategy.
* Know that print is read (in English) top to bottom, left to right.
* Read a simple sentence.
Curriculum Skills Literacy
Comprehension
* Know that the role of the author is to write the words in the book and the illustrator creates the images.
* Apply new language from books to first hand situations.
* Know the difference between fiction and non-fiction books.
* Recall and applies information from non-fiction books to real life situations.
these observations to form questions and explain what they have found out.
Children will research, plan and create a home for the minibeasts and reflect on their design choices and processes.
Enquiry
Children will use their observations about habitats and animals to talk about our own actions and the impact it has on living things.
Enquiry
Children will recall times in their lives when they experienced injustice and talk about how this was solved.
Digital Literacy and Communication: Children will use ICT software, e.g. cameras to capture their observations and examples of positive behaviour.
Physical Health and Well Being:
Children will learn about the different food groups and the importance of a healthy diet. They will learn about food preparation including following a recipe, using tools effectively and safely etc.
resolution from last half term by writing their own solutions.
Curriculum Drivers: Physical Health and Wellbeing:
The children will explore their own feelings, actions, and the feelings and actions of others. They will look at how to negotiate familiar problems and solve them without aggression. The children will look at what it means to be a good role model and how to teach others to solve problems.
Digital Literacy and Communication: Children will use ICT software, e.g. cameras or iPad to interview and record younger and elder pupils.
Curriculum Skills Literacy Word Reading
* Sight read all CVC common exception words.
* Read some* common exception words by sight.
* Read all 45 common exception words by sight.
* Reads simple sentences with increasing fluency.
Curriculum Skills
Literacy
Comprehension
* Follow a story without pictures or prompts.
* Know that books include different elements such as a cover, contents page, blurb, etc.
* Share ideas and feelings about a story from their own point of view.
* Share ideas and feelings about a story from the point of view of a character.
* Answer simple questions about a story which has just been read.
* Retell familiar stories.
Curriculum Skills Literacy Writing - Spelling
* Hear and say the initial sound in words
* Orally segment simple words.
* Link known sounds to their phoneme.
* Write own name using a capital letter.
* Link all single letter graphemes to their phoneme.
* Write initial sounds in words
* Write end sounds in words
* Write CVC words
* Attempt to spell unfamiliar words using a phonics strategy.
* Write short captions
Curriculum Skills Literacy
Writing - Handwriting
* Form clearly identifiable letters to communicate meaning.
* Hold pencil with dynamic tripod grip with good control.
* Use precursive conventions in writing.
* Form the letters in my name correctly.
Curriculum Skills
Literacy Writing - Composition
* Mark makes in a variety of forms for different purposes e.g. shopping list, label
* Retell familiar stories within imaginative play (small world or role play).
* Uses newly introduced vocabulary within their play.
* Plan what they will draw, paint and write linked to a particular theme.
* Make links between familiar stories.
* Answer questions about a story including characters or/and events.
* Orally retell a simple 5 part story
* Read and talk about what they have just read.
* Make a prediction about what happens next
Curriculum Skills Literacy Writing - Spelling
* Write CVCC words
* Write a simple sentence
* Write simple sentences which can be read by myself and others
* Use phase 3 digraphs in writing.
Curriculum Skills Literacy Writing - Handwriting
* Form the vast majority of letters correctly.
* Control the size of my writing.
* Write all letters using a correct sequence of movements
* Begin to join letters
Curriculum Skills Literacy Writing - Composition
* Talk about the characters, settings and events in a story I am creating.
* Add verbs to dictated stories to describe what characters are doing
* Begin to use some story language e.g. once upon a time…
*
Speak using compound sentences ready for
* Answers why and how questions about a book.
Curriculum Skills
Literacy
Writing - Spelling
* Write 3 linked sentences
* Spell at least 35 out of 45 Reception key words correctly
* Consistently use finger spaces.
* Begin to use capital letters and full stops.
* Name the letters of the alphabet matched to their grapheme.
Curriculum Skills
Literacy
Writing - Handwriting
Consolidate all skills
Curriculum Skills Literacy
Writing - Composition
* Dictate and invent own compositions.
* Use adjectives within my story to describe objects, characters and settings my stories.
* Think about what to write ahead of writing.
* Include newly introduced vocabulary when formulating ideas for writing.
* Dictate a simple sentence.
* Talk about real life events in the correct order.
* Break sentences down into the individual words they contain or will use.
* Create own storylines which they act out within their play.
* Develop and acts narratives as part of a small group.
Curriculum Skills Art
* Experiment with different materials when making with a product in mind
* Interpret an object through drawing
* Express their feelings through drawing e.g. happy or sad
* Make choices when experiment with a range of painting equipment
* Use found objects to build with a design in mind
* Select and use appropriate 3D shapes to build and recreate models
* Cut and tear paper and card for their collages
* Use a simple painting program to create a picture
* Begin to use drawing, painting and sculpture to develop and share their ideas, experiences and imagination
Curriculum Skills Computing
* Explore and interact with their environment using a range of equipment. (e.g. using an iPad to record videos and photos)
* Recognise and use simple icons, buttons or shortcuts
* Use available applications and software to create original content sometimes for a planned outcome
* Collect information using ICT. (e.g. take photographs, voice recordings, text, share tapestry)
Curriculum Skills Design Technology
* Use their senses to explore and describe objects
* Make models of their own choosing
* Explore making, with different equipment including new ways of joining (e.g. split pins, staples, tags, string)
transcription, beginning to connectives such as "and, then, so, but, next".
* Talk about what happens at the beginning, middle and end of a story.
* Make up simple stories when given a visual prompt e.g. a character, object and place.
Curriculum Skills Art
* Draw controlled lines and use the skill to make different shapes
* Paint controlled lines and use the skill to make different shapes
* Mix colours and describe how they change
* Use different tools through printing to create marks
* Create a simple pattern
* Use their senses to make observations about the different types of textiles
* Experiment using different tools in an application
* Explain the process that they have used
Curriculum Skills Computing
* Develop familiarity with the letters of the keyboard so that they are able to type their name
* Recognise and use simple keyboard commands (space bar, enter, delete and backspace)
* Understand the appropriate vocabulary according to equipment available
Curriculum Skills Design Technology
* Talk about what they want to make
* Think of some ideas of their own
* Explain what they are making
*
Use tools safely
* Understand the purposes of different genres for writing and uses them appropriately e.g. lists, messages, labels, stories, instructions etc.
* Use titles within my writing to name my stories.
* Use a range of openers/endings within my storytelling
Curriculum Skills Art
* Repeat a print to make a simple pattern
* Manipulate fabric to achieve a desired effect? (e.g. weaving, costume making, paper making)
* Weave a pattern
* Build layers of materials to create an image with support
* Say what they liked about their artwork or what they did well
* Describe what they can see and like in the work of another artist/craft maker/designer
Curriculum Skills Computing
* Use the functions of a simple programming tool (e.g. Ozobot)
* Begin to plan and test instructions
* Understand that some content is not appropriate for their age
* Know what to do if they find something they are unsure of (including identifying people who can help)
Curriculum Skills Design Technology
* Make observations about the features of objects
* Plan how best to approach a task
* Select appropriate resources and tools
*
Explain which tools they are using and why
* Be proud of what they have made
* Be aware that ingredients are available from a range of sources (shops, markets, grown at home)
* Complete basic hygiene tasks (e.g. wash hands)
* Talk about foods they like and dislike with reasons
* Discuss the food that they eat during special occasions or cultural celebrations
* (e.g. birthday, Eid, etc.)
* Be willing to try new foods
* Understand the importance of healthy food choices
Curriculum Skills Geography
* Talk about and describe their immediate environment using knowledge from observation, discussion, stories, non-fiction texts and maps;
* Discuss the weather and the changes within it
* Know the immediate surroundings of the school
* Describe the local environment using simple geographical vocabulary - e.g. street, house, forest, school
Curriculum Skills History
* Recall information from stories, pictures and artefacts from the past
* Makes comments about what they have heard or seen.
* Recall events from stories from the past.
* Talk about the lives of people around them and their roles in society
* Understand that they have had more than one birthday
* Know that the days and months change
Curriculum Skills MFL
Not taught
Curriculum Skills Music
* Perform their own songs and chants
* Perform songs and rhymes with others
* Share their creations, explaining the process they have used
Curriculum Skills Geography
* Explore books about the world
* Look at and recognise places on maps, globes and atlases.
* Use a given map to plan a route e.g. walk around Northumberlandia, walk to the park
* Know some similarities and differences between contrasting environments, drawing on their experiences and what has been read in class;
* Know that Ponteland is in England/UK
Curriculum Skills History
* Recall and talk about old and new items within their home and school environment
* Use simple words and phrases to describe the past – then and now
* To make comparisons about when they were a baby and now
Curriculum Skills MFL
* Show the beginning of interest and participation.
* Begin to maintain attention to words in other languages.
Curriculum Skills Music
* Move in time with the music
*
Make a range of sounds with their voice
* Use tools to manipulate materials
* Identify success and next steps
* Change their strategy as needed
* Select and use appropriate tools needed for a recipe
* Use tools effectively and safely
* Identify and use the appropriate ingredients for a recipe
Curriculum Skills Geography
* Draw simple plans and maps of a known area/made up place and talk about them
* Explain some similarities and differences between life in this country and life in other countries, drawing on knowledge from stories, non-fiction texts and – when appropriate – maps
Curriculum Skills History
* Observe and handle artefacts and use this to begin to ask and answer questions.
* Talk about significant events in their own past
* Recall some important narratives, characters and figures from the past
Curriculum Skills MFL
* Repeat simple vocabulary for common nouns and verbs.
* Repeat simple phrases, sometimes without understanding.
Curriculum Skills
Music
* Sing a range of well-known nursery rhymes and songs;
*
Begin to sequence sounds to create a rhythm or beat
RE
*
Learning songs to perform by heart
* Children clap short rhythmic patterns
*
Begin to describe the sounds? (e.g. loud, soft, high, low,
*
Experiment with creating sounds with different fast, slow)
*
Make a range of sounds with instruments
*
Can say if they like or dislike a piece of music
|
<urn:uuid:1969b6a3-3a15-4831-a8e6-10dd7399544c>
|
CC-MAIN-2020-16
|
https://www.pontelandprimary.co.uk/wp-content/uploads/2020/01/Curriculum-Framework-Reception-2019_20-1.pdf
|
2020-04-01T20:38:54+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-16/subset=warc/part-00293-5e0433ee-fa15-4837-b2dc-d6f38301af97.c000.gz.parquet
| 1,104,968,293
| 5,155
|
eng_Latn
|
eng_Latn
| 0.993558
|
eng_Latn
| 0.99613
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3434,
9505,
9722,
14505,
17436,
20961,
24236,
24543
] |
Autumn Term
Global Theme:
Identity and Diversity
Focus:
Belonging
Autumn 2
Our Class Community
Core text:
This is Our House
Hook:
Reception Long Term Map
Spring Term
Global Theme:
Sustainable Development
Focus:
Preserving the Environment
Spring 1
Spring 2
Climate Change and
Animal Habitats
Core text:
The Polar Bear‟s Home
Hook:
Have footprints from each of the animals leading to different parts of the classroom where the children find small world toy or puppet of each animal.
Minibeast
Conservation
Core text:
Christopher Nibble
Hook:
Summer Term
Global Theme:
Social Justice and Equity
Focus:
Helping Others
Summer 1
Sharing with Others
Summer 2
Problem Solving
Core text:
Yummy
Hook:
Have a surprise new „toy‟ (or role play area) and explain that only certain adults (e.g. Only Mrs. Ramsay is allowed to play in here!) and/or children can play in it – discuss rules around this and how it makes us feel. Find the new book inside.
Have Zoolab minibeasts
OR
Can someone bring in a pet guinea pig??
OR Have a selection of flowers in the classroom but
all of the buds picked off –
Oh no! What happened to our flowers? Can we enjoy
Core text:
Dear Mother Goose
Hook:
Have a picnic basket left in the middle of the classroom with different foods from around the world for all of the children to find. Also have the book and other objects for them to explore from the text inside the picnic basket.
Have a mailbox appear in the classroom – children find letters posted to them from children and/or adults around the school with questions. Do you think we could answer these letters?
these anymore?? Etc.
All of our topics cover the broad areas of our curriculum and also focus upon the learning required to meet our Early Learning Goals.
ELG1: Listening
ELG2: Speaking
ELG10: Writing
ELG3: Gross Motor Skills
ELG4: Fine Motor Skills
ELG5: Self-Regulation
ELG6: Managing Self
ELG7: Building Relationships
ELG8: Comprehension
ELG9: Word Reading
ELG11: Number
ELG12: Numerical Patterns
ELG13: Past and Present
ELG14: People, Cultures and Communities
ELG15: The Natural World
ELG16: Creating with Materials
ELG17: Performing
Whilst delivering a broad and balanced range of activities for the children during both child-led and adult-directed, the core texts will have a particular focus in the following areas, supporting knowledge, understanding and skills, with learning towards:
Past and Present(a): Talk about the lives of the people around them and their roles in society Past and Present(b): Know some similarities and
People, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on
Comprehension(a): Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Comprehension(a):
Comprehension(a):
Self-Regulation(a): Show an understanding of their own feelings and those of others, and regulate their behaviour accordingly
Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Autumn 1 All About Me
Core text:
It‟s Okay to be Different
Hook:
Have familiar adults from around the school (e.g. Mrs. Blain, Mrs. Johnson)
Self-Regulation
(b): Have a positive sense of self and
show resilience and perseverance in the face of
challenge
Self-Regulation
(c): Pay attention to their teacher
and follow multi-step instructions.
Building Relationships
Work and play cooperatively and take
turns with others
Building Relationships(b):
Form positive attachments and friendships
Building Relationships
(c):
Show sensitivities to others‟
needs.
The Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World(c): Understand the effect of the changing seasons on the natural world around them.
(a):
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Past and Present
(c):
Recall some important narratives, characters and
figures from the past encountered in books read
in class
People, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on knowledge from stories, non-fiction texts and – when appropriate – maps.
knowledge from stories, non-fiction texts and – when appropriate – maps.
The Natural World
(a):
Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World
(b):
Know some similarities and differences between the
natural world around them and contrasting
environments, drawing on their experiences and what
has been read in class
The Natural World
(c):
Understand the effect of the changing seasons on the
natural world around them.
Creating with Materials
(a):
Draw and paint using a range of materials, tools
and techniques, experimenting with colour,
design, texture, form and function
Creating with Materials
(b):
Share their creations, explaining the process they
have used
Creating with Materials
(c):
Make use of props and materials when role-playing
characters in narratives and stories.
Phonics - Children have a daily phonics session in groups that at their skill level and regularly reviewed. Each phonic lesson supports the following goals:
(a): Say a sound for each letter in the alphabet and at least 10 digraphs
(b): Read words consistent with their phonic knowledge by sound-blending
(c): Read aloud simple sentences and books that are consistent with their phonic knowledge, including common exception words.
(d): Write recognisable letters, most of which are correctly formed
(e): Spell words by identifying sounds in them and representing the sounds with a letter or letters
(f): Write simple phrases and sentences that can be read by others.
Values:
Values:
Values:
Respect
To know it‟s alright to be different
To recognise differences in others
Respect
To show appreciation for people who help us
Collaboration
To share ideas, help each
Integrity
To do the right thing without expecting praise
Curiosity
To wonder why?
Responsibility their own words and new vocabulary
Comprehension
(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension(c): Use new vocabulary during discussions about stories, non-fiction, rhymes and poems and during role-play Writing(c): Write simple phrases and sentences that can be read by others.
The Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World(b): Know some similarities and differences between the natural world around them and contrasting environments, drawing on their experiences and what has been read in class;
their own words and new vocabulary
Comprehension(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension
(c): Use new vocabulary during
discussions about stories, non-fiction, rhymes and
poems and during role-play
Past and Present
(b): Know some similarities and
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Past and Present
(c):
Recall some important narratives, characters and
figures from the past encountered in books read
in class
People, Cultures and
Communities
(c): Explain some similarities and
differences between life in this country and life in other
countries, drawing on knowledge from stories,
non-fiction texts and – when appropriate – maps.
their own words and new vocabulary
Comprehension
(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension
(c): Use new vocabulary during
discussions about stories, non-fiction, rhymes and
poems and during role-play
Writing
(c): Write simple phrases and sentences that
can be read by others.
Past and Present
(b): Know some similarities and
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Performing
(a): Sing a range of well-known
nursery rhymes and songs
Performing
(b): Perform songs, rhymes, poems and
stories with others, and –
when appropriate – move in time with music
Performing
(c): Co- construct, invent, adapt and
recount narratives and stories with peers and their
teacher.
Mathematics - Children will have a daily discrete number/mathematics session as a whole class. This will help the children work towards the following goals:
(a): Have an understanding of number to 10, linking names of numbers, numerals, their value, and their position in the counting order
(b): Subitise (recognise quantities without counting) up to 5
(c): Automatically recall number bonds for numbers 0-5 and for 10, including corresponding partitioning facts
(d): Automatically recall double facts up to 5+5
(e): Compare sets of objects up to 10 in different contexts, considering size and difference
(f): Explore patterns of numbers within numbers up to 10, including evens and odds
Values:
Kindness
Creativity
Values: Curiosity Responsibility
Values: Bravery Responsibility Resilience Gratitude
Kindness
To help a friend who is upset or having difficulties
other and to listen to each other
Gratitude
To show thanks
To care about what is happening to our planet
Gratitude
To show thanks for what we have
others, including families. E.g. community walks, selfportraits, photography
Digital Literacy and Communication
Children will experience listening to audio recordings e.g. audiobooks and podcasts and use iPads to develop their own Children to use cameras to take self-portraits and portraits of their friends
STEAM
Children will explore using mark making tools to make controlled lines, and circles. Apply these skills to make self-portraits.
Curriculum Skills
Literacy
Word Reading
* Identify the initial sound in a word when given a choice.
* Hear and say the initial sound in words.
* Blend the onset then rime to identify an object e.g. d-og.
* Hear the final sound at the end of a CVC word.
* Hear the sound in the middle of a CVC word (medial sound).
* Orally blend CVC words, e.g. "b-a-t", "bat".
* Orally blend the sounds in CCVC/CVCC words.
* Recognise some* letters to read some CVC words.
* Recognise all letters to read some CVC words.
Curriculum Skills Literacy Comprehension
* Anticipate key events in rhymes, poems and stories.
* Sequence a story/recount using visual prompts.
* Talk about key features of favourite stories including character and setting.
* Know that stories have a title.
model effective
|
feedback.
| 10,956
|
end_of_word
|
effective
|
remove_all
|
<url>
https://www.pontelandprimary.co.uk/wp-content/uploads/2020/01/Curriculum-Framework-Reception-2019_20-1.pdf
</url>
<text>
Autumn Term
Global Theme:
Identity and Diversity
Focus:
Belonging
Autumn 2
Our Class Community
Core text:
This is Our House
Hook:
Reception Long Term Map
Spring Term
Global Theme:
Sustainable Development
Focus:
Preserving the Environment
Spring 1
Spring 2
Climate Change and
Animal Habitats
Core text:
The Polar Bear‟s Home
Hook:
Have footprints from each of the animals leading to different parts of the classroom where the children find small world toy or puppet of each animal.
Minibeast
Conservation
Core text:
Christopher Nibble
Hook:
Summer Term
Global Theme:
Social Justice and Equity
Focus:
Helping Others
Summer 1
Sharing with Others
Summer 2
Problem Solving
Core text:
Yummy
Hook:
Have a surprise new „toy‟ (or role play area) and explain that only certain adults (e.g. Only Mrs. Ramsay is allowed to play in here!) and/or children can play in it – discuss rules around this and how it makes us feel. Find the new book inside.
Have Zoolab minibeasts
OR
Can someone bring in a pet guinea pig??
OR Have a selection of flowers in the classroom but
all of the buds picked off –
Oh no! What happened to our flowers? Can we enjoy
Core text:
Dear Mother Goose
Hook:
Have a picnic basket left in the middle of the classroom with different foods from around the world for all of the children to find. Also have the book and other objects for them to explore from the text inside the picnic basket.
Have a mailbox appear in the classroom – children find letters posted to them from children and/or adults around the school with questions. Do you think we could answer these letters?
these anymore?? Etc.
All of our topics cover the broad areas of our curriculum and also focus upon the learning required to meet our Early Learning Goals.
ELG1: Listening
ELG2: Speaking
ELG10: Writing
ELG3: Gross Motor Skills
ELG4: Fine Motor Skills
ELG5: Self-Regulation
ELG6: Managing Self
ELG7: Building Relationships
ELG8: Comprehension
ELG9: Word Reading
ELG11: Number
ELG12: Numerical Patterns
ELG13: Past and Present
ELG14: People, Cultures and Communities
ELG15: The Natural World
ELG16: Creating with Materials
ELG17: Performing
Whilst delivering a broad and balanced range of activities for the children during both child-led and adult-directed, the core texts will have a particular focus in the following areas, supporting knowledge, understanding and skills, with learning towards:
Past and Present(a): Talk about the lives of the people around them and their roles in society Past and Present(b): Know some similarities and
People, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on
Comprehension(a): Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Comprehension(a):
Comprehension(a):
Self-Regulation(a): Show an understanding of their own feelings and those of others, and regulate their behaviour accordingly
Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using
Autumn 1 All About Me
Core text:
It‟s Okay to be Different
Hook:
Have familiar adults from around the school (e.g. Mrs. Blain, Mrs. Johnson)
Self-Regulation
(b): Have a positive sense of self and
show resilience and perseverance in the face of
challenge
Self-Regulation
(c): Pay attention to their teacher
and follow multi-step instructions.
Building Relationships
Work and play cooperatively and take
turns with others
Building Relationships(b):
Form positive attachments and friendships
Building Relationships
(c):
Show sensitivities to others‟
needs.
The Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World(c): Understand the effect of the changing seasons on the natural world around them.
(a):
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Past and Present
(c):
Recall some important narratives, characters and
figures from the past encountered in books read
in class
People, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on knowledge from stories, non-fiction texts and – when appropriate – maps.
knowledge from stories, non-fiction texts and – when appropriate – maps.
The Natural World
(a):
Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World
(b):
Know some similarities and differences between the
natural world around them and contrasting
environments, drawing on their experiences and what
has been read in class
The Natural World
(c):
Understand the effect of the changing seasons on the
natural world around them.
Creating with Materials
(a):
Draw and paint using a range of materials, tools
and techniques, experimenting with colour,
design, texture, form and function
Creating with Materials
(b):
Share their creations, explaining the process they
have used
Creating with Materials
(c):
Make use of props and materials when role-playing
characters in narratives and stories.
Phonics - Children have a daily phonics session in groups that at their skill level and regularly reviewed. Each phonic lesson supports the following goals:
(a): Say a sound for each letter in the alphabet and at least 10 digraphs
(b): Read words consistent with their phonic knowledge by sound-blending
(c): Read aloud simple sentences and books that are consistent with their phonic knowledge, including common exception words.
(d): Write recognisable letters, most of which are correctly formed
(e): Spell words by identifying sounds in them and representing the sounds with a letter or letters
(f): Write simple phrases and sentences that can be read by others.
Values:
Values:
Values:
Respect
To know it‟s alright to be different
To recognise differences in others
Respect
To show appreciation for people who help us
Collaboration
To share ideas, help each
Integrity
To do the right thing without expecting praise
Curiosity
To wonder why?
Responsibility their own words and new vocabulary
Comprehension
(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension(c): Use new vocabulary during discussions about stories, non-fiction, rhymes and poems and during role-play Writing(c): Write simple phrases and sentences that can be read by others.
The Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants
The Natural World(b): Know some similarities and differences between the natural world around them and contrasting environments, drawing on their experiences and what has been read in class;
their own words and new vocabulary
Comprehension(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension
(c): Use new vocabulary during
discussions about stories, non-fiction, rhymes and
poems and during role-play
Past and Present
(b): Know some similarities and
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Past and Present
(c):
Recall some important narratives, characters and
figures from the past encountered in books read
in class
People, Cultures and
Communities
(c): Explain some similarities and
differences between life in this country and life in other
countries, drawing on knowledge from stories,
non-fiction texts and – when appropriate – maps.
their own words and new vocabulary
Comprehension
(b):
Anticipate – where appropriate – key events in
stories, non-fiction, rhymes and poems
Comprehension
(c): Use new vocabulary during
discussions about stories, non-fiction, rhymes and
poems and during role-play
Writing
(c): Write simple phrases and sentences that
can be read by others.
Past and Present
(b): Know some similarities and
differences between things in the past and now,
drawing on their experiences and what has
been read in class
Performing
(a): Sing a range of well-known
nursery rhymes and songs
Performing
(b): Perform songs, rhymes, poems and
stories with others, and –
when appropriate – move in time with music
Performing
(c): Co- construct, invent, adapt and
recount narratives and stories with peers and their
teacher.
Mathematics - Children will have a daily discrete number/mathematics session as a whole class. This will help the children work towards the following goals:
(a): Have an understanding of number to 10, linking names of numbers, numerals, their value, and their position in the counting order
(b): Subitise (recognise quantities without counting) up to 5
(c): Automatically recall number bonds for numbers 0-5 and for 10, including corresponding partitioning facts
(d): Automatically recall double facts up to 5+5
(e): Compare sets of objects up to 10 in different contexts, considering size and difference
(f): Explore patterns of numbers within numbers up to 10, including evens and odds
Values:
Kindness
Creativity
Values: Curiosity Responsibility
Values: Bravery Responsibility Resilience Gratitude
Kindness
To help a friend who is upset or having difficulties
other and to listen to each other
Gratitude
To show thanks
To care about what is happening to our planet
Gratitude
To show thanks for what we have
others, including families. E.g. community walks, selfportraits, photography
Digital Literacy and Communication
Children will experience listening to audio recordings e.g. audiobooks and podcasts and use iPads to develop their own Children to use cameras to take self-portraits and portraits of their friends
STEAM
Children will explore using mark making tools to make controlled lines, and circles. Apply these skills to make self-portraits.
Curriculum Skills
Literacy
Word Reading
* Identify the initial sound in a word when given a choice.
* Hear and say the initial sound in words.
* Blend the onset then rime to identify an object e.g. d-og.
* Hear the final sound at the end of a CVC word.
* Hear the sound in the middle of a CVC word (medial sound).
* Orally blend CVC words, e.g. "b-a-t", "bat".
* Orally blend the sounds in CCVC/CVCC words.
* Recognise some* letters to read some CVC words.
* Recognise all letters to read some CVC words.
Curriculum Skills Literacy Comprehension
* Anticipate key events in rhymes, poems and stories.
* Sequence a story/recount using visual prompts.
* Talk about key features of favourite stories including character and setting.
* Know that stories have a title.
model effective<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.pontelandprimary.co.uk/wp-content/uploads/2020/01/Curriculum-Framework-Reception-2019_20-1.pdf\n</url>\n<text>\nAutumn Term\n\nGlobal Theme:\n\nIdentity and Diversity\n\nFocus:\n\nBelonging\n\nAutumn 2\n\nOur Class Community\n\nCore text:\n\nThis is Our House\n\nHook:\n\nReception Long Term Map\n\nSpring Term\n\nGlobal Theme:\n\nSustainable Development\n\nFocus:\n\nPreserving the Environment\n\nSpring 1\n\nSpring 2\n\nClimate Change and\n\nAnimal Habitats\n\nCore text:\n\nThe Polar Bear‟s Home\n\nHook:\n\nHave footprints from each of the animals leading to different parts of the classroom where the children find small world toy or puppet of each animal.\n\nMinibeast\n\nConservation\n\nCore text:\n\nChristopher Nibble\n\nHook:\n\nSummer Term\n\nGlobal Theme:\n\nSocial Justice and Equity\n\nFocus:\n\nHelping Others\n\nSummer 1\n\nSharing with Others\n\nSummer 2\n\nProblem Solving\n\nCore text:\n\nYummy\n\nHook:\n\nHave a surprise new „toy‟ (or role play area) and explain that only certain adults (e.g. Only Mrs. Ramsay is allowed to play in here!) and/or children can play in it – discuss rules around this and how it makes us feel. Find the new book inside.\n\nHave Zoolab minibeasts\n\nOR\n\nCan someone bring in a pet guinea pig??\n\nOR Have a selection of flowers in the classroom but\n\nall of the buds picked off –\n\nOh no! What happened to our flowers? Can we enjoy\n\nCore text:\n\nDear Mother Goose\n\nHook:\n\nHave a picnic basket left in the middle of the classroom with different foods from around the world for all of the children to find. Also have the book and other objects for them to explore from the text inside the picnic basket.\n\nHave a mailbox appear in the classroom – children find letters posted to them from children and/or adults around the school with questions. Do you think we could answer these letters?\n\nthese anymore?? Etc.\n\nAll of our topics cover the broad areas of our curriculum and also focus upon the learning required to meet our Early Learning Goals.\n\nELG1: Listening\n\nELG2: Speaking\n\nELG10: Writing\n\nELG3: Gross Motor Skills\n\nELG4: Fine Motor Skills\n\nELG5: Self-Regulation\n\nELG6: Managing Self\n\nELG7: Building Relationships\n\nELG8: Comprehension\n\nELG9: Word Reading\n\nELG11: Number\n\nELG12: Numerical Patterns\n\nELG13: Past and Present\n\nELG14: People, Cultures and Communities\n\nELG15: The Natural World\n\nELG16: Creating with Materials\n\nELG17: Performing\n\nWhilst delivering a broad and balanced range of activities for the children during both child-led and adult-directed, the core texts will have a particular focus in the following areas, supporting knowledge, understanding and skills, with learning towards:\n\nPast and Present(a): Talk about the lives of the people around them and their roles in society Past and Present(b): Know some similarities and\n\nPeople, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on\n\nComprehension(a): Demonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using\n\nComprehension(a):\n\nComprehension(a):\n\nSelf-Regulation(a): Show an understanding of their own feelings and those of others, and regulate their behaviour accordingly\n\nDemonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using\n\nDemonstrate an understanding of what they have read and has been read to them by retelling stories and narratives using\n\nAutumn 1 All About Me\n\nCore text:\n\nIt‟s Okay to be Different\n\nHook:\n\nHave familiar adults from around the school (e.g. Mrs. Blain, Mrs. Johnson)\n\nSelf-Regulation\n\n(b): Have a positive sense of self and\n\nshow resilience and perseverance in the face of\n\nchallenge\n\nSelf-Regulation\n\n(c): Pay attention to their teacher\n\nand follow multi-step instructions.\n\nBuilding Relationships\n\nWork and play cooperatively and take\n\nturns with others\n\nBuilding Relationships(b):\n\nForm positive attachments and friendships\n\nBuilding Relationships\n\n(c):\n\nShow sensitivities to others‟\n\nneeds.\n\nThe Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants\n\nThe Natural World(c): Understand the effect of the changing seasons on the natural world around them.\n\n(a):\n\ndifferences between things in the past and now,\n\ndrawing on their experiences and what has\n\nbeen read in class\n\nPast and Present\n\n(c):\n\nRecall some important narratives, characters and\n\nfigures from the past encountered in books read\n\nin class\n\nPeople, Cultures and Communities(c): Explain some similarities and differences between life in this country and life in other countries, drawing on knowledge from stories, non-fiction texts and – when appropriate – maps.\n\nknowledge from stories, non-fiction texts and – when appropriate – maps.\n\nThe Natural World\n\n(a):\n\nExplore the natural world around them, making observations and drawing pictures of animals and plants\n\nThe Natural World\n\n(b):\n\nKnow some similarities and differences between the\n\nnatural world around them and contrasting\n\nenvironments, drawing on their experiences and what\n\nhas been read in class\n\nThe Natural World\n\n(c):\n\nUnderstand the effect of the changing seasons on the\n\nnatural world around them.\n\nCreating with Materials\n\n(a):\n\nDraw and paint using a range of materials, tools\n\nand techniques, experimenting with colour,\n\ndesign, texture, form and function\n\nCreating with Materials\n\n(b):\n\nShare their creations, explaining the process they\n\nhave used\n\nCreating with Materials\n\n(c):\n\nMake use of props and materials when role-playing\n\ncharacters in narratives and stories.\n\nPhonics - Children have a daily phonics session in groups that at their skill level and regularly reviewed. Each phonic lesson supports the following goals:\n\n(a): Say a sound for each letter in the alphabet and at least 10 digraphs\n(b): Read words consistent with their phonic knowledge by sound-blending\n(c): Read aloud simple sentences and books that are consistent with their phonic knowledge, including common exception words.\n(d): Write recognisable letters, most of which are correctly formed\n(e): Spell words by identifying sounds in them and representing the sounds with a letter or letters\n(f): Write simple phrases and sentences that can be read by others.\n\nValues:\n\nValues:\n\nValues:\n\nRespect\n\nTo know it‟s alright to be different\n\nTo recognise differences in others\n\nRespect\n\nTo show appreciation for people who help us\n\nCollaboration\n\nTo share ideas, help each\n\nIntegrity\n\nTo do the right thing without expecting praise\n\nCuriosity\n\nTo wonder why?\n\nResponsibility their own words and new vocabulary\n\nComprehension\n\n(b):\n\nAnticipate – where appropriate – key events in\n\nstories, non-fiction, rhymes and poems\n\nComprehension(c): Use new vocabulary during discussions about stories, non-fiction, rhymes and poems and during role-play Writing(c): Write simple phrases and sentences that can be read by others.\n\nThe Natural World(a): Explore the natural world around them, making observations and drawing pictures of animals and plants\n\nThe Natural World(b): Know some similarities and differences between the natural world around them and contrasting environments, drawing on their experiences and what has been read in class;\n\ntheir own words and new vocabulary\n\nComprehension(b):\n\nAnticipate – where appropriate – key events in\n\nstories, non-fiction, rhymes and poems\n\nComprehension\n\n(c): Use new vocabulary during\n\ndiscussions about stories, non-fiction, rhymes and\n\npoems and during role-play\n\nPast and Present\n\n(b): Know some similarities and\n\ndifferences between things in the past and now,\n\ndrawing on their experiences and what has\n\nbeen read in class\n\nPast and Present\n\n(c):\n\nRecall some important narratives, characters and\n\nfigures from the past encountered in books read\n\nin class\n\nPeople, Cultures and\n\nCommunities\n\n(c): Explain some similarities and\n\ndifferences between life in this country and life in other\n\ncountries, drawing on knowledge from stories,\n\nnon-fiction texts and – when appropriate – maps.\n\ntheir own words and new vocabulary\n\nComprehension\n\n(b):\n\nAnticipate – where appropriate – key events in\n\nstories, non-fiction, rhymes and poems\n\nComprehension\n\n(c): Use new vocabulary during\n\ndiscussions about stories, non-fiction, rhymes and\n\npoems and during role-play\n\nWriting\n\n(c): Write simple phrases and sentences that\n\ncan be read by others.\n\nPast and Present\n\n(b): Know some similarities and\n\ndifferences between things in the past and now,\n\ndrawing on their experiences and what has\n\nbeen read in class\n\nPerforming\n\n(a): Sing a range of well-known\n\nnursery rhymes and songs\n\nPerforming\n\n(b): Perform songs, rhymes, poems and\n\nstories with others, and –\n\nwhen appropriate – move in time with music\n\nPerforming\n\n(c): Co- construct, invent, adapt and\n\nrecount narratives and stories with peers and their\n\nteacher.\n\nMathematics - Children will have a daily discrete number/mathematics session as a whole class. This will help the children work towards the following goals:\n\n(a): Have an understanding of number to 10, linking names of numbers, numerals, their value, and their position in the counting order\n(b): Subitise (recognise quantities without counting) up to 5\n(c): Automatically recall number bonds for numbers 0-5 and for 10, including corresponding partitioning facts\n(d): Automatically recall double facts up to 5+5\n(e): Compare sets of objects up to 10 in different contexts, considering size and difference\n(f): Explore patterns of numbers within numbers up to 10, including evens and odds\n\nValues:\n\nKindness\n\nCreativity\n\nValues: Curiosity Responsibility\n\nValues: Bravery Responsibility Resilience Gratitude\n\nKindness\n\nTo help a friend who is upset or having difficulties\n\nother and to listen to each other\n\nGratitude\n\nTo show thanks\n\nTo care about what is happening to our planet\n\nGratitude\n\nTo show thanks for what we have\n\nothers, including families. E.g. community walks, selfportraits, photography\n\nDigital Literacy and Communication\n\nChildren will experience listening to audio recordings e.g. audiobooks and podcasts and use iPads to develop their own Children to use cameras to take self-portraits and portraits of their friends\n\nSTEAM\n\nChildren will explore using mark making tools to make controlled lines, and circles. Apply these skills to make self-portraits.\n\nCurriculum Skills\n\nLiteracy\n\nWord Reading\n\n* Identify the initial sound in a word when given a choice.\n* Hear and say the initial sound in words.\n* Blend the onset then rime to identify an object e.g. d-og.\n* Hear the final sound at the end of a CVC word.\n* Hear the sound in the middle of a CVC word (medial sound).\n* Orally blend CVC words, e.g. \"b-a-t\", \"bat\".\n* Orally blend the sounds in CCVC/CVCC words.\n* Recognise some* letters to read some CVC words.\n* Recognise all letters to read some CVC words.\n\nCurriculum Skills Literacy Comprehension\n\n* Anticipate key events in rhymes, poems and stories.\n* Sequence a story/recount using visual prompts.\n* Talk about key features of favourite stories including character and setting.\n* Know that stories have a title.\n\nmodel effective<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": " feedback.",
"role": "assistant"
}
] |
|
Articles of Interest:
* Our website is undergoing some changes, so please be patient and we‟ll keep you informed of progress.
http://ukigolf.org.au
This issue:
HEY GUYS REMEMBER!
If your opponent has trouble remembering whether he shot a 6 or 7, he probably shot an 8 (or worse)
AUVGC Newsletter
April 2010
Editor's Corner
Pryvit vsim! / Greetings!
What a glorious day was had at Gisborne recently. The weather was perfect and we had 33 keen players.
We also had 3 guests playing with us – Michael, Paul and Lidia Lesiw, who have since joined our club as new members.
Welcome from all of us!
This was as a direct result from our Community Day held last month.
After the game we had a BBQ which was enjoyed by all.
It was lovely to see Greg & Osija Anolak and Anne Horban, who joined us for the BBQ. Greg is currently recuperating after his surgery. He hopes to be fit enough to play at Club Championship.
I would also like to welcome back Victor Rudewych who will hopefully be able to play with us soon.
Now, on a more personal note, guess who‟s going to become grandparents! You got it! Slawko and I.
Symon and Sarah are expecting a baby in October.
………Marijka Kohut
Next Game – Club Championship
Date:
17 April 2010 –Mooroopna Golf Course, Fairway Dve
Mooroopna
Meeting time: 7.00am
Tee-off:
7.30am on 10
th
TEE
Date:
18 April 2010 –Shepparton Golf Course, Golf Drive
Shepparton
Meeting time: 7.00am
Tee-off:
7.30am
Cost:
$60 for both days golf + BBQ
$20 for non-golfers
ALL PLAYERS MUST REGISTER WITH GEORGE MAKOHON PRIOR TO THE GAME
Organisers:
Captain & Match Committee
IMPORTANT See page 6 on rules of qualification.
Members not on permanent list, please confirm your booking with George Makohon on 9306 9184 or 0418 553 226.
Upcoming Events
Sydney/Melbourne Challenge (Queen's birthday weekend)
MEMBERSHIP FEES DUE:
SUN, 13 JUNE 2010 – (refer page 8)
1 JANUARY 2010 - $30
2010 Golf Fixture
| | Date | | Venue | | Meeting Time | | Game Format |
|---|---|---|---|---|---|---|---|
| 17 & 18/04/2010 | | Mooroopna/Shepparton | | 7.00 am | | Club Championship - Stroke | |
| 30/05/2010 | | Goonawarra | | 8.00 am | | Match play Final & Stableford | |
| 13/06/2010 | | Albury | | TBC | | Melb vs Sydney Stableford | |
| 27/06/2010 | | Yarrambat | | 8.15 am | | Par | |
| 25/07/2010 | | Cape Schanck ( RACV) | | 8.00 am | | Winter C up - Stableford | |
| 22/08/2010 | | Broadford | | 8.00 am | | 4BBB Stableford | |
| 26/09/2010 | | Werribee Park | | 8.00 am | | Match play Qualifying 2011-Stroke AGM | |
| 31/10/2010 | | Albert Park | | 8.00 am | | Match play Round 1 & Stableford | |
| 28/11/2010 | | Emerald | | 8.30 am | | Match play Round 2 & Stroke | |
| 12/12/2010 | | Sunshine | | 7.30 am | | Stableford | |
Birthday Greetings
Многая Літа / Happy Birthday to the following members for April:
Greg Anolak
Leon Charuckyj
Steve Kosylo
Gerry Romanyk
Pavlo Seniw
Roman Zachariak
Captain's Report - Gisborne – 21 MARCH 2010
What a beautiful morning, and what a great turnout of members for this monthly game at Gisborne!
I would like to thank all our members for their patience with respect to the delay in our teeoff time. Our group was delayed by approx 30 minutes due to a hold-up with the previous social group.
Teeing off on the first hole went very well and everyone, or should I say, almost everyone (except for Tony Kastropil) managed to hit a reasonable drive. Tony did you make the ladies tee? Tony had the shortest drive on that hole and there were consequently a lot of comments flying around about it afterwards. Hope your game improved from then on Tony!
I must say my own game was not pleasant at all, on reflection, looking back on the 13 th hole 456m downhill being 6ft from the bunker in front of the green for 2 and finishing the hole with a 10. How embarrassing! Then there were the other holes, too boring to mention. Needless to say, I was not happy with my game!
The course presented itself very well and played hard, as always. The greens were so hard to read and master. The pin placements all-in-all were also quite a test!
All 33 players enjoyed the day including the BBQ, presentation and raffle afterwards.
Until we meet again at Club Championship in Shepparton/Mooroopna.
Club Captain Roman Popowycz.
PS Great to see some new faces in the ranks, and to see some of the old ones after long injuries, namely the Lesiw family, Paul Teres and Michael Kwas.
Gisborne Results – 21 March 2010
Number of players …33………………ACR ..72…………. CCR......31............
How CCR was calculated?
21-27 players 3
rd best score, 28-35 - 4
th best score, 36-43 - 5
th best score
MATCH PLAY RESULTS
G. Makohon over S. Galas + 2 | Slawko Kohut over S. Felniak + 2
Feature hole winners
NTP holes
No. 2
George Makohon
No. 4
Stan Niemczyk
No. 12
-
Drive & chip hole No 9
Michael Lesiw
Longest drive
Marijka Kohut
NTP Hole No 4
Stan Niemczyk
Grade winners –
A Grade (0-18)
Lou Karfut – 39 pts (18 hcp)
B Grade (19-27)
Roman Galas – 37 pts (22 hcp)
C Grade (28-36)
Stan Niemczyk – 29 pts (33 hcp)
Have you ever thought why sometimes there are two grade winners and sometimes there are three?
2 grades only - if 30 or less players
3 grades awarded - if 31 or more
Ball Comp (24 pts)
The following visitors also received a ball:
Michael Lesiw
Lidia Lesiw
Paul Lesiw
Club Championship – Mooroopna/Shepparton – 17 & 18 April 2010
17 April 2010
Mooroopna Golf Course
Meeting time:
7.00am
Tee off:
7.30am – on 10 th tee.
Presentation BBQ: After the Saturday game at Victoria Lakes Caravan Park.
18 April 2010 Shepparton Golf Course
Meeting time:
7.00am
Tee off:
7.30am
Cost
Both games & Sat BBQ/Presentation - $60 pp.
Non-players Sat BBQ - $20 pp
Accommodation choices
1. SERVICED APARTMENTS - 507 Wyndham St, Shepparton - Glenda (5821 4482)
Modern 4-star quality apartments: www.sheppapartments.com.au
2BR / 3 toilets / full kitchen / full laundry
Same price as last year!
$170 per night (4 people) 2 queen beds or 4 singles or 1 queen & 2 singles
Have folding divan downstairs so can sleep additional 1 or 2 people at extra $10 pp/p night. Therefore could sleep 5 for $180/night or 6 (two on the divan?) for $190/night.
2. VICTORIA LAKE CARAVAN PARK Melissa/Glenys 5821 5431…(10% discount for us)
THIS IS WHERE THE BBQ WILL BE AFTER SATURDAY'S GAME!
All cabins are self-contained with bathroom & cooking facilities.
Three standards:
Luxury 2 bedroom Cabin with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $125.00 + $12 each extra person per night.
Deluxe 2 bedroom with QB in 1st bedroom and DB with single bunk over in 2nd bedroom. Price per night is $105.00 for two people plus $12 each extra person per night.
Deluxe 2 bedroom with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $105.00 for two people plus $12 each extra person per night.
Ensuite cabin with DB in the bedroom and a set of triple bunks in the hallway opposite the ensuite. Price per night is $87.00 for two people plus $12.00 ea extra.
Instructions
: To secure your booking you will need to phone with your credit card details. One night‟s tariff will be charged against your credit card as deposit.
Guys, I have included an excerpt from our current AUVGC Rules and Code of Conduct for you to review before Club Championship.
Excerpt from AUVGC Rules & Code OF Conduct – for your review
2.3 CONDUCT OF THE AUVGC‟s CLUB CHAMPIONSHIPS
2.3.1 The Ukrainian Club Championship shall be conducted each year as a 36-hole stroke event and where possible played over two (2) consecutive days to determine:
(i) Scratch Champion,
(ii) Handicap Champion; and
(iii) Divisional Champions
(a) The conditions of play for AUVGC Championships shall be decided by the Committee and published in the newsletter prior to the said event.
(b) In conjunction with the Club Championships being played, there will be a daily "Handicap Event" conducted on each day of the Championships. These events will be treated like a normal monthly event and there will be:
(i) Winners for Divisional Grades
(ii) Nearest the Pin holes
(iii) Longest Drive, and
(iv) Drive & Chip hole.
(c) The „Scratch Champion and the „Handicap Champion‟ are ineligible to be considered for Divisional Grade Championship trophies.
2.3.2 Eligibility
(a) Members must be financial members of the AUVGC.
(b) Members must have played a minimum of three (3) monthly games that can be handicapped in the current year, so as to establish a current handicap with the AUVGC prior to the Club Championship event.
(c) Members must be financial to enter the Club Championships. Entry to the competition will not be accepted unless the prescribed fees and any other monies still owing to the AUVGC are paid.
(d) However, those members who do not meet the required criteria for Championship events [refer to Clause 2.2.2(b) & (c)] are still able to contest the Daily Handicap event. The daily handicap event is a stroke event.
2.3.3 Handicaps
(a) Handicaps for Championship Events shall apply to both the 1st and 2nd rounds.
(b) However for the purposes of the second day's "daily event", which is held in conjunction with the Club Championship, handicaps will be readjusted depending on results of the first day's score.
2.3.4 Players Draw
(a) First Round: The Club Captain will conduct a draw in conjunction with the Match Committee to determine the order in which player‟s tee-off.
(b) Second Round: The results of the first round will determine the order in which player‟s tee-off.
2.3.5 Tied Scores
(a) In the event of a tie for either the Scratch or Handicap Champion after 36 holes, then there will be a play-off at a date and venue to be decided by the Committee.
(b) However, in the event of a tie in Divisional Grades then the Australian countback system will be used to determine the winner.
2.3.6 Conditions of Play
(a) Where possible, play is to be off the member‟s markers on the day.
(b) Ride-on carts may be used at all events.
(c) Ball is to be played as it lies unless otherwise directed by the Match Committee [refer to Local Rules].
(d) Lost Ball or Out of Bounds: Take a two (2) stroke penalty and play the next shot from where the ball went out of bounds or where the ball is deemed to be lost. Otherwise all ball penalties are as specified in Clause 2.1.3 (iii) – (iv).
(e) Scorecards must be completed correctly. Player must ensure the correct handicap is recorded on the card, scores are totalled, card is signed (by player & marker) and dated before being handed in, otherwise it may result in the player being disqualified.
2.3.7 Disputes & Rulings
Disputes are to be referred immediately to the Club Captain or the Match Committee at the conclusion of the round for resolution. This must be done prior to the cards being signed.
2.3.8 Trophies Allocated to Club Championship Winners
Trophies will be presented to winners of AUVGC Club Championship events at an Annual Presentation Function.
Sydney/Melbourne Challenge –
When?
Queen‟s birthday weekend – June 13, 2010 Albury Golf Course
Where?
Accommodation:
Best Western Meramie Motor Inn www.bestwestern.com.au/meramie
Reservations: 131 779
Rooms will be held until 31 March booked under Ukrainian Golf Club, after such time they will be released to the public. So be quick!
2 night minimum stay.
What‟s on:
2 markets, wine festival and loads more.
*******************************
Members are encouraged to bring wives/partners. Let‟s make an event out of it! Numbers have been pretty small over the past few years.
Albury isn‟t that far away, so how about it?
Could be fun!
HANDICAPS – April 2010
* Handicapper discretion
Happy Handicapper Notes
Just a reminder that everyone is playing off their "Playing Handicap" for Club Championship.
AUVGC Matchplay Championship 2009/10
1st Round
2nd Round
3rd Round
Final Round
Champion
Gisborne game memories
Michael, Paul, Lidia Lesiw and Slawko
Our Sponsor:
Thank you to Dyson for their continued support to our club!
COMMITTEE
President
Secretary
Treasurer
Captain
Handicapper
Booking Officer
Fundraising Officer
Newsletter & Web Editor
Match Committee
Slawko Kohut [email protected]
Tony Kastropil
Michael Kwas [email protected]
[email protected]
Roman Popowych [email protected]
Michael Masendycz [email protected]
George Makohon [email protected]
Roman Galas
Marijka Kohut
Leon Charuckyj
Michael Wityk
Wally Orfini [email protected]
[email protected] [email protected]
[email protected] [email protected]
|
<urn:uuid:07d0c9e9-412f-4061-8c3d-b5499cf598cc>
|
CC-MAIN-2023-50
|
https://www.ukigolf.org.au/_files/ugd/b6c876_63933d1f4dfa4371afcf10e141393961.pdf
|
2023-12-04T23:15:05+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-50/subset=warc/part-00028-e565b809-b335-4c1d-90fd-54a9a2b7113d.c000.gz.parquet
| 1,173,969,947
| 3,500
|
eng_Latn
|
eng_Latn
| 0.847452
|
eng_Latn
| 0.99455
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1928,
2980,
4500,
5458,
6706,
8721,
11138,
11790,
11814,
11959,
12053,
12116,
12764
] |
Articles of Interest:
* Our website is undergoing some changes, so please be patient and we‟ll keep you informed of progress.
http://ukigolf.org.au
This issue:
HEY GUYS REMEMBER!
If your opponent has trouble remembering whether he shot a 6 or 7, he probably shot an 8 (or worse)
AUVGC Newsletter
April 2010
Editor's Corner
Pryvit vsim! / Greetings!
What a glorious day was had at Gisborne recently. The weather was perfect and we had 33 keen players.
We also had 3 guests playing with us – Michael, Paul and Lidia Lesiw, who have since joined our club as new members.
Welcome from all of us!
This was as a direct result from our Community Day held last month.
After the game we had a BBQ which was enjoyed by all.
It was lovely to see Greg & Osija Anolak and Anne Horban, who joined us for the BBQ. Greg is currently recuperating after his surgery. He hopes to be fit enough to play at Club Championship.
I would also like to welcome back Victor Rudewych who will hopefully be able to play with us soon.
Now, on a more personal note, guess who‟s going to become grandparents! You got it! Slawko and I.
Symon and Sarah are expecting a baby in October.
………Marijka Kohut
Next Game – Club Championship
Date:
17 April 2010 –Mooroopna Golf Course, Fairway Dve
Mooroopna
Meeting time: 7.00am
Tee-off:
7.30am on 10
th
TEE
Date:
18 April 2010 –Shepparton Golf Course, Golf Drive
Shepparton
Meeting time: 7.00am
Tee-off:
7.30am
Cost:
$60 for both days golf + BBQ
$20 for non-golfers
ALL PLAYERS MUST REGISTER WITH GEORGE MAKOHON PRIOR TO THE GAME
Organisers:
Captain & Match Committee
IMPORTANT See page 6 on rules of qualification.
Members not on permanent list, please confirm your booking with George Makohon on 9306 9184 or 0418 553 226.
Upcoming Events
Sydney/Melbourne Challenge (Queen's birthday weekend)
MEMBERSHIP FEES DUE:
SUN, 13 JUNE 2010 – (refer page 8)
1 JANUARY 2010 - $30
2010 Golf Fixture
| | Date | | Venue | | Meeting Time | | Game Format |
|---|---|---|---|---|---|---|---|
| 17 & 18/04/2010 | | Mooroopna/Shepparton | | 7.00 am | | Club Championship - Stroke | |
| 30/05/2010 | | Goonawarra | | 8.00 am | | Match play Final & Stableford | |
| 13/06/2010 | | Albury | | TBC | | Melb vs Sydney Stableford | |
| 27/06/2010 | | Yarrambat | | 8.15 am | | Par | |
| 25/07/2010 | | Cape Schanck ( RACV) | | 8.00 am | | Winter C up - Stableford | |
| 22/08/2010 | | Broadford | | 8.00 am | | 4BBB Stableford | |
| 26/09/2010 | | Werribee Park | | 8.00 am | | Match play Qualifying 2011-Stroke AGM | |
| 31/10/2010 | | Albert Park | | 8.00 am | | Match play Round 1 & Stableford | |
| 28/11/2010 | | Emerald | | 8.30 am | | Match play Round 2 & Stroke | |
| 12/12/2010 | | Sunshine | | 7.30 am | | Stableford | |
Birthday Greetings
Многая Літа / Happy Birthday to the following members for April:
Greg Anolak
Leon Charuckyj
Steve Kosylo
Gerry Romanyk
Pavlo Seniw
Roman Zachariak
Captain's Report - Gisborne – 21 MARCH 2010
What a beautiful morning, and what a great turnout of members for this monthly game at Gisborne!
I would like to thank all our members for their patience with respect to the delay in our teeoff time. Our group was delayed by approx 30 minutes due to a hold-up with the previous social group.
Teeing off on the first hole went very well and everyone, or should I say, almost everyone (except for Tony Kastropil) managed to hit a reasonable drive. Tony did you make the ladies tee? Tony had the shortest drive on that hole and there were consequently a lot of comments flying around about it afterwards. Hope your game improved from then on Tony!
I must say my own game was not pleasant at all, on reflection, looking back on the 13 th hole 456m downhill being 6ft from the bunker in front of the green for 2 and finishing the hole with a 10. How embarrassing! Then there were the other holes, too boring to mention. Needless to say, I was not happy with my game!
The course presented itself very well and played hard, as always. The greens were so hard to read and master. The pin placements all-in-all were also quite a test!
All 33 players enjoyed the day including the BBQ, presentation and raffle afterwards.
Until we meet again at Club Championship in Shepparton/Mooroopna.
Club Captain Roman Popowycz.
PS Great to see some new faces in the ranks, and to see some of the old ones after long injuries, namely the Lesiw family, Paul Teres and Michael Kwas.
Gisborne Results – 21 March 2010
Number of players …33………………ACR ..72…………. CCR......31............
How CCR was calculated?
21-27 players 3
rd best score, 28-35 - 4
th best score, 36-43 - 5
th best score
MATCH PLAY RESULTS
G. Makohon over S. Galas + 2 | Slawko Kohut over S. Felniak + 2
Feature hole winners
NTP holes
No. 2
George Makohon
No. 4
Stan Niemczyk
No. 12
-
Drive & chip hole No 9
Michael Lesiw
Longest drive
Marijka Kohut
NTP Hole No 4
Stan Niemczyk
Grade winners –
A Grade (0-18)
Lou Karfut – 39 pts (18 hcp)
B Grade (19-27)
Roman Galas – 37 pts (22 hcp)
C Grade (28-36)
Stan Niemczyk – 29 pts (33 hcp)
Have you ever thought why sometimes there are two grade winners and sometimes there are three?
2 grades only - if 30 or less players
3 grades awarded - if 31 or more
Ball Comp (24 pts)
The following visitors also received a ball:
Michael Lesiw
Lidia Lesiw
Paul Lesiw
Club Championship – Mooroopna/Shepparton – 17 & 18 April 2010
17 April 2010
Mooroopna Golf Course
Meeting time:
7.00am
Tee off:
7.30am – on 10 th tee.
Presentation BBQ: After the Saturday game at Victoria Lakes Caravan Park.
18 April 2010 Shepparton Golf Course
Meeting time:
7.00am
Tee off:
7.30am
Cost
Both games & Sat BBQ/Presentation - $60 pp.
Non-players Sat BBQ - $20 pp
Accommodation choices
1. SERVICED APARTMENTS - 507 Wyndham St, Shepparton - Glenda (5821 4482)
Modern 4-star quality apartments: www.sheppapartments.com.au
2BR / 3 toilets / full kitchen / full laundry
Same price as last year!
$170 per night (4 people) 2 queen beds or 4 singles or 1 queen & 2 singles
Have folding divan downstairs so can sleep additional 1 or 2 people at extra $10 pp/p night. Therefore could sleep 5 for $180/night or 6 (two on the divan?) for $190/night.
2. VICTORIA LAKE CARAVAN PARK Melissa/Glenys 5821 5431…(10% discount for us)
THIS IS WHERE THE BBQ WILL BE AFTER SATURDAY'S GAME!
All cabins are self-contained with bathroom & cooking facilities.
Three standards:
Luxury 2 bedroom Cabin with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $125.00 + $12 each extra person per night.
Deluxe 2 bedroom with QB in 1st bedroom and DB with single bunk over in 2nd bedroom. Price per night is $105.00 for two people plus $12 each extra person per night.
Deluxe 2 bedroom with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $105.00 for two people plus $12 each extra person per night.
Ensuite cabin with DB in the bedroom and a set of triple bunks in the hallway opposite the ensuite. Price per night is $87.00 for two people plus $12.00 ea extra.
Instructions
: To secure your booking you will need to pho
|
ne with your credit card details.
|
One night‟s tariff will be charged against your credit card as deposit.
Guys, I have included an excerpt from our current AUVGC Rules and Code of Conduct for you to review before Club Championship.
Excerpt from AUVGC Rules & Code OF Conduct – for your review
2.3 CONDUCT OF THE AUVGC‟s CLUB CHAMPIONSHIPS
2.3.1 The Ukrainian Club Championship shall be conducted each year as a 36-hole stroke event and where possible played over two (2) consecutive days to determine:
(i) Scratch Champion,
(ii) Handicap Champion; and
(iii) Divisional Champions
(a) The conditions of play for AUVGC Championships shall be decided by the Committee and published in the newsletter prior to the said event.
(b) In conjunction with the Club Championships being played, there will be a daily "Handicap Event" conducted on each day of the Championships. These events will be treated like a normal monthly event and there will be:
(i) Winners for Divisional Grades
(ii) Nearest the Pin holes
(iii) Longest Drive, and
(iv) Drive & Chip hole.
(c) The „Scratch Champion and the „Handicap Champion‟ are ineligible to be considered for Divisional Grade Championship trophies.
2.3.2 Eligibility
(a) Members must be financial members of the AUVGC.
(b) Members must have played a minimum of three (3) monthly games that can be handicapped in the current year, so as to establish a current handicap with the AUVGC prior to the Club Championship event.
(c) Members must be financial to enter the Club Championships. Entry to the competition will not be accepted unless the prescribed fees and any other monies still owing to the AUVGC are paid.
(d) However, those members who do not meet the required criteria for Championship events [refer to Clause 2.2.2(b) & (c)] are still able to contest the Daily Handicap event. The daily handicap event is a stroke event.
2.3.3 Handicaps
(a) Handicaps for Championship Events shall apply to both the 1st and 2nd rounds.
(b) However for the purposes of the second day's "daily event", which is held in conjunction with the Club Championship, handicaps will be readjusted depending on results of the first day's score.
2.3.4 Players Draw
(a) First Round: The Club Captain will conduct a draw in conjunction with the Match Committee to determine the order in which player‟s tee-off.
(b) Second Round: The results of the first round will determine the order in which player‟s tee-off.
2.3.5 Tied Scores
(a) In the event of a tie for either the Scratch or Handicap Champion after 36 holes, then there will be a play-off at a date and venue to be decided by the Committee.
(b) However, in the event of a tie in Divisional Grades then the Australian countback system will be used to determine the winner.
2.3.6 Conditions of Play
(a) Where possible, play is to be off the member‟s markers on the day.
(b) Ride-on carts may be used at all events.
(c) Ball is to be played as it lies unless otherwise directed by the Match Committee [refer to Local Rules].
(d) Lost Ball or Out of Bounds: Take a two (2) stroke penalty and play the next shot from where the ball went out of bounds or where the ball is deemed to be lost. Otherwise all ball penalties are as specified in Clause 2.1.3 (iii) – (iv).
(e) Scorecards must be completed correctly. Player must ensure the correct handicap is recorded on the card, scores are totalled, card is signed (by player & marker) and dated before being handed in, otherwise it may result in the player being disqualified.
2.3.7 Disputes & Rulings
Disputes are to be referred immediately to the Club Captain or the Match Committee at the conclusion of the round for resolution. This must be done prior to the cards being signed.
2.3.8 Trophies Allocated to Club Championship Winners
Trophies will be presented to winners of AUVGC Club Championship events at an Annual Presentation Function.
Sydney/Melbourne Challenge –
When?
Queen‟s birthday weekend – June 13, 2010 Albury Golf Course
Where?
Accommodation:
Best Western Meramie Motor Inn www.bestwestern.com.au/meramie
Reservations: 131 779
Rooms will be held until 31 March booked under Ukrainian Golf Club, after such time they will be released to the public. So be quick!
2 night minimum stay.
What‟s on:
2 markets, wine festival and loads more.
*******************************
Members are encouraged to bring wives/partners. Let‟s make an event out of it! Numbers have been pretty small over the past few years.
Albury isn‟t that far away, so how about it?
Could be fun!
HANDICAPS – April 2010
* Handicapper discretion
Happy Handicapper Notes
Just a reminder that everyone is playing off their "Playing Handicap" for Club Championship.
AUVGC Matchplay Championship 2009/10
1st Round
2nd Round
3rd Round
Final Round
Champion
Gisborne game memories
Michael, Paul, Lidia Lesiw and Slawko
Our Sponsor:
Thank you to Dyson for their continued support to our club!
COMMITTEE
President
Secretary
Treasurer
Captain
Handicapper
Booking Officer
Fundraising Officer
Newsletter & Web Editor
Match Committee
Slawko Kohut [email protected]
Tony Kastropil
Michael Kwas [email protected]
[email protected]
Roman Popowych [email protected]
Michael Masendycz [email protected]
George Makohon [email protected]
Roman Galas
Marijka Kohut
Leon Charuckyj
Michael Wityk
Wally Orfini [email protected]
[email protected] [email protected]
[email protected] [email protected]
| 7,259
|
inside_word
|
phone
|
remove_one_sentence
|
<url>
https://www.ukigolf.org.au/_files/ugd/b6c876_63933d1f4dfa4371afcf10e141393961.pdf
</url>
<text>
Articles of Interest:
* Our website is undergoing some changes, so please be patient and we‟ll keep you informed of progress.
http://ukigolf.org.au
This issue:
HEY GUYS REMEMBER!
If your opponent has trouble remembering whether he shot a 6 or 7, he probably shot an 8 (or worse)
AUVGC Newsletter
April 2010
Editor's Corner
Pryvit vsim! / Greetings!
What a glorious day was had at Gisborne recently. The weather was perfect and we had 33 keen players.
We also had 3 guests playing with us – Michael, Paul and Lidia Lesiw, who have since joined our club as new members.
Welcome from all of us!
This was as a direct result from our Community Day held last month.
After the game we had a BBQ which was enjoyed by all.
It was lovely to see Greg & Osija Anolak and Anne Horban, who joined us for the BBQ. Greg is currently recuperating after his surgery. He hopes to be fit enough to play at Club Championship.
I would also like to welcome back Victor Rudewych who will hopefully be able to play with us soon.
Now, on a more personal note, guess who‟s going to become grandparents! You got it! Slawko and I.
Symon and Sarah are expecting a baby in October.
………Marijka Kohut
Next Game – Club Championship
Date:
17 April 2010 –Mooroopna Golf Course, Fairway Dve
Mooroopna
Meeting time: 7.00am
Tee-off:
7.30am on 10
th
TEE
Date:
18 April 2010 –Shepparton Golf Course, Golf Drive
Shepparton
Meeting time: 7.00am
Tee-off:
7.30am
Cost:
$60 for both days golf + BBQ
$20 for non-golfers
ALL PLAYERS MUST REGISTER WITH GEORGE MAKOHON PRIOR TO THE GAME
Organisers:
Captain & Match Committee
IMPORTANT See page 6 on rules of qualification.
Members not on permanent list, please confirm your booking with George Makohon on 9306 9184 or 0418 553 226.
Upcoming Events
Sydney/Melbourne Challenge (Queen's birthday weekend)
MEMBERSHIP FEES DUE:
SUN, 13 JUNE 2010 – (refer page 8)
1 JANUARY 2010 - $30
2010 Golf Fixture
| | Date | | Venue | | Meeting Time | | Game Format |
|---|---|---|---|---|---|---|---|
| 17 & 18/04/2010 | | Mooroopna/Shepparton | | 7.00 am | | Club Championship - Stroke | |
| 30/05/2010 | | Goonawarra | | 8.00 am | | Match play Final & Stableford | |
| 13/06/2010 | | Albury | | TBC | | Melb vs Sydney Stableford | |
| 27/06/2010 | | Yarrambat | | 8.15 am | | Par | |
| 25/07/2010 | | Cape Schanck ( RACV) | | 8.00 am | | Winter C up - Stableford | |
| 22/08/2010 | | Broadford | | 8.00 am | | 4BBB Stableford | |
| 26/09/2010 | | Werribee Park | | 8.00 am | | Match play Qualifying 2011-Stroke AGM | |
| 31/10/2010 | | Albert Park | | 8.00 am | | Match play Round 1 & Stableford | |
| 28/11/2010 | | Emerald | | 8.30 am | | Match play Round 2 & Stroke | |
| 12/12/2010 | | Sunshine | | 7.30 am | | Stableford | |
Birthday Greetings
Многая Літа / Happy Birthday to the following members for April:
Greg Anolak
Leon Charuckyj
Steve Kosylo
Gerry Romanyk
Pavlo Seniw
Roman Zachariak
Captain's Report - Gisborne – 21 MARCH 2010
What a beautiful morning, and what a great turnout of members for this monthly game at Gisborne!
I would like to thank all our members for their patience with respect to the delay in our teeoff time. Our group was delayed by approx 30 minutes due to a hold-up with the previous social group.
Teeing off on the first hole went very well and everyone, or should I say, almost everyone (except for Tony Kastropil) managed to hit a reasonable drive. Tony did you make the ladies tee? Tony had the shortest drive on that hole and there were consequently a lot of comments flying around about it afterwards. Hope your game improved from then on Tony!
I must say my own game was not pleasant at all, on reflection, looking back on the 13 th hole 456m downhill being 6ft from the bunker in front of the green for 2 and finishing the hole with a 10. How embarrassing! Then there were the other holes, too boring to mention. Needless to say, I was not happy with my game!
The course presented itself very well and played hard, as always. The greens were so hard to read and master. The pin placements all-in-all were also quite a test!
All 33 players enjoyed the day including the BBQ, presentation and raffle afterwards.
Until we meet again at Club Championship in Shepparton/Mooroopna.
Club Captain Roman Popowycz.
PS Great to see some new faces in the ranks, and to see some of the old ones after long injuries, namely the Lesiw family, Paul Teres and Michael Kwas.
Gisborne Results – 21 March 2010
Number of players …33………………ACR ..72…………. CCR......31............
How CCR was calculated?
21-27 players 3
rd best score, 28-35 - 4
th best score, 36-43 - 5
th best score
MATCH PLAY RESULTS
G. Makohon over S. Galas + 2 | Slawko Kohut over S. Felniak + 2
Feature hole winners
NTP holes
No. 2
George Makohon
No. 4
Stan Niemczyk
No. 12
-
Drive & chip hole No 9
Michael Lesiw
Longest drive
Marijka Kohut
NTP Hole No 4
Stan Niemczyk
Grade winners –
A Grade (0-18)
Lou Karfut – 39 pts (18 hcp)
B Grade (19-27)
Roman Galas – 37 pts (22 hcp)
C Grade (28-36)
Stan Niemczyk – 29 pts (33 hcp)
Have you ever thought why sometimes there are two grade winners and sometimes there are three?
2 grades only - if 30 or less players
3 grades awarded - if 31 or more
Ball Comp (24 pts)
The following visitors also received a ball:
Michael Lesiw
Lidia Lesiw
Paul Lesiw
Club Championship – Mooroopna/Shepparton – 17 & 18 April 2010
17 April 2010
Mooroopna Golf Course
Meeting time:
7.00am
Tee off:
7.30am – on 10 th tee.
Presentation BBQ: After the Saturday game at Victoria Lakes Caravan Park.
18 April 2010 Shepparton Golf Course
Meeting time:
7.00am
Tee off:
7.30am
Cost
Both games & Sat BBQ/Presentation - $60 pp.
Non-players Sat BBQ - $20 pp
Accommodation choices
1. SERVICED APARTMENTS - 507 Wyndham St, Shepparton - Glenda (5821 4482)
Modern 4-star quality apartments: www.sheppapartments.com.au
2BR / 3 toilets / full kitchen / full laundry
Same price as last year!
$170 per night (4 people) 2 queen beds or 4 singles or 1 queen & 2 singles
Have folding divan downstairs so can sleep additional 1 or 2 people at extra $10 pp/p night. Therefore could sleep 5 for $180/night or 6 (two on the divan?) for $190/night.
2. VICTORIA LAKE CARAVAN PARK Melissa/Glenys 5821 5431…(10% discount for us)
THIS IS WHERE THE BBQ WILL BE AFTER SATURDAY'S GAME!
All cabins are self-contained with bathroom & cooking facilities.
Three standards:
Luxury 2 bedroom Cabin with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $125.00 + $12 each extra person per night.
Deluxe 2 bedroom with QB in 1st bedroom and DB with single bunk over in 2nd bedroom. Price per night is $105.00 for two people plus $12 each extra person per night.
Deluxe 2 bedroom with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $105.00 for two people plus $12 each extra person per night.
Ensuite cabin with DB in the bedroom and a set of triple bunks in the hallway opposite the ensuite. Price per night is $87.00 for two people plus $12.00 ea extra.
Instructions
: To secure your booking you will need to pho<cursor_is_here> One night‟s tariff will be charged against your credit card as deposit.
Guys, I have included an excerpt from our current AUVGC Rules and Code of Conduct for you to review before Club Championship.
Excerpt from AUVGC Rules & Code OF Conduct – for your review
2.3 CONDUCT OF THE AUVGC‟s CLUB CHAMPIONSHIPS
2.3.1 The Ukrainian Club Championship shall be conducted each year as a 36-hole stroke event and where possible played over two (2) consecutive days to determine:
(i) Scratch Champion,
(ii) Handicap Champion; and
(iii) Divisional Champions
(a) The conditions of play for AUVGC Championships shall be decided by the Committee and published in the newsletter prior to the said event.
(b) In conjunction with the Club Championships being played, there will be a daily "Handicap Event" conducted on each day of the Championships. These events will be treated like a normal monthly event and there will be:
(i) Winners for Divisional Grades
(ii) Nearest the Pin holes
(iii) Longest Drive, and
(iv) Drive & Chip hole.
(c) The „Scratch Champion and the „Handicap Champion‟ are ineligible to be considered for Divisional Grade Championship trophies.
2.3.2 Eligibility
(a) Members must be financial members of the AUVGC.
(b) Members must have played a minimum of three (3) monthly games that can be handicapped in the current year, so as to establish a current handicap with the AUVGC prior to the Club Championship event.
(c) Members must be financial to enter the Club Championships. Entry to the competition will not be accepted unless the prescribed fees and any other monies still owing to the AUVGC are paid.
(d) However, those members who do not meet the required criteria for Championship events [refer to Clause 2.2.2(b) & (c)] are still able to contest the Daily Handicap event. The daily handicap event is a stroke event.
2.3.3 Handicaps
(a) Handicaps for Championship Events shall apply to both the 1st and 2nd rounds.
(b) However for the purposes of the second day's "daily event", which is held in conjunction with the Club Championship, handicaps will be readjusted depending on results of the first day's score.
2.3.4 Players Draw
(a) First Round: The Club Captain will conduct a draw in conjunction with the Match Committee to determine the order in which player‟s tee-off.
(b) Second Round: The results of the first round will determine the order in which player‟s tee-off.
2.3.5 Tied Scores
(a) In the event of a tie for either the Scratch or Handicap Champion after 36 holes, then there will be a play-off at a date and venue to be decided by the Committee.
(b) However, in the event of a tie in Divisional Grades then the Australian countback system will be used to determine the winner.
2.3.6 Conditions of Play
(a) Where possible, play is to be off the member‟s markers on the day.
(b) Ride-on carts may be used at all events.
(c) Ball is to be played as it lies unless otherwise directed by the Match Committee [refer to Local Rules].
(d) Lost Ball or Out of Bounds: Take a two (2) stroke penalty and play the next shot from where the ball went out of bounds or where the ball is deemed to be lost. Otherwise all ball penalties are as specified in Clause 2.1.3 (iii) – (iv).
(e) Scorecards must be completed correctly. Player must ensure the correct handicap is recorded on the card, scores are totalled, card is signed (by player & marker) and dated before being handed in, otherwise it may result in the player being disqualified.
2.3.7 Disputes & Rulings
Disputes are to be referred immediately to the Club Captain or the Match Committee at the conclusion of the round for resolution. This must be done prior to the cards being signed.
2.3.8 Trophies Allocated to Club Championship Winners
Trophies will be presented to winners of AUVGC Club Championship events at an Annual Presentation Function.
Sydney/Melbourne Challenge –
When?
Queen‟s birthday weekend – June 13, 2010 Albury Golf Course
Where?
Accommodation:
Best Western Meramie Motor Inn www.bestwestern.com.au/meramie
Reservations: 131 779
Rooms will be held until 31 March booked under Ukrainian Golf Club, after such time they will be released to the public. So be quick!
2 night minimum stay.
What‟s on:
2 markets, wine festival and loads more.
*******************************
Members are encouraged to bring wives/partners. Let‟s make an event out of it! Numbers have been pretty small over the past few years.
Albury isn‟t that far away, so how about it?
Could be fun!
HANDICAPS – April 2010
* Handicapper discretion
Happy Handicapper Notes
Just a reminder that everyone is playing off their "Playing Handicap" for Club Championship.
AUVGC Matchplay Championship 2009/10
1st Round
2nd Round
3rd Round
Final Round
Champion
Gisborne game memories
Michael, Paul, Lidia Lesiw and Slawko
Our Sponsor:
Thank you to Dyson for their continued support to our club!
COMMITTEE
President
Secretary
Treasurer
Captain
Handicapper
Booking Officer
Fundraising Officer
Newsletter & Web Editor
Match Committee
Slawko Kohut [email protected]
Tony Kastropil
Michael Kwas [email protected]
[email protected]
Roman Popowych [email protected]
Michael Masendycz [email protected]
George Makohon [email protected]
Roman Galas
Marijka Kohut
Leon Charuckyj
Michael Wityk
Wally Orfini [email protected]
[email protected] [email protected]
[email protected] [email protected]
</text>
|
[
{
"content": "<url>\nhttps://www.ukigolf.org.au/_files/ugd/b6c876_63933d1f4dfa4371afcf10e141393961.pdf\n</url>\n<text>\nArticles of Interest:\n\n* Our website is undergoing some changes, so please be patient and we‟ll keep you informed of progress.\n\nhttp://ukigolf.org.au\n\nThis issue:\n\nHEY GUYS REMEMBER!\n\nIf your opponent has trouble remembering whether he shot a 6 or 7, he probably shot an 8 (or worse)\n\nAUVGC Newsletter\n\nApril 2010\n\nEditor's Corner\n\nPryvit vsim! / Greetings!\n\nWhat a glorious day was had at Gisborne recently. The weather was perfect and we had 33 keen players.\n\nWe also had 3 guests playing with us – Michael, Paul and Lidia Lesiw, who have since joined our club as new members.\n\nWelcome from all of us!\n\nThis was as a direct result from our Community Day held last month.\n\nAfter the game we had a BBQ which was enjoyed by all.\n\nIt was lovely to see Greg & Osija Anolak and Anne Horban, who joined us for the BBQ. Greg is currently recuperating after his surgery. He hopes to be fit enough to play at Club Championship.\n\nI would also like to welcome back Victor Rudewych who will hopefully be able to play with us soon.\n\nNow, on a more personal note, guess who‟s going to become grandparents! You got it! Slawko and I.\n\nSymon and Sarah are expecting a baby in October.\n\n………Marijka Kohut\n\nNext Game – Club Championship\n\nDate:\n\n17 April 2010 –Mooroopna Golf Course, Fairway Dve\n\nMooroopna\n\nMeeting time: 7.00am\n\nTee-off:\n\n7.30am on 10\n\nth\n\nTEE\n\nDate:\n\n18 April 2010 –Shepparton Golf Course, Golf Drive\n\nShepparton\n\nMeeting time: 7.00am\n\nTee-off:\n\n7.30am\n\nCost:\n\n$60 for both days golf + BBQ\n\n$20 for non-golfers\n\nALL PLAYERS MUST REGISTER WITH GEORGE MAKOHON PRIOR TO THE GAME\n\nOrganisers:\n\nCaptain & Match Committee\n\nIMPORTANT See page 6 on rules of qualification.\n\nMembers not on permanent list, please confirm your booking with George Makohon on 9306 9184 or 0418 553 226.\n\nUpcoming Events\n\nSydney/Melbourne Challenge (Queen's birthday weekend)\n\nMEMBERSHIP FEES DUE:\n\nSUN, 13 JUNE 2010 – (refer page 8)\n\n1 JANUARY 2010 - $30\n\n2010 Golf Fixture\n\n| | Date | | Venue | | Meeting Time | | Game Format |\n|---|---|---|---|---|---|---|---|\n| 17 & 18/04/2010 | | Mooroopna/Shepparton | | 7.00 am | | Club Championship - Stroke | |\n| 30/05/2010 | | Goonawarra | | 8.00 am | | Match play Final & Stableford | |\n| 13/06/2010 | | Albury | | TBC | | Melb vs Sydney Stableford | |\n| 27/06/2010 | | Yarrambat | | 8.15 am | | Par | |\n| 25/07/2010 | | Cape Schanck ( RACV) | | 8.00 am | | Winter C up - Stableford | |\n| 22/08/2010 | | Broadford | | 8.00 am | | 4BBB Stableford | |\n| 26/09/2010 | | Werribee Park | | 8.00 am | | Match play Qualifying 2011-Stroke AGM | |\n| 31/10/2010 | | Albert Park | | 8.00 am | | Match play Round 1 & Stableford | |\n| 28/11/2010 | | Emerald | | 8.30 am | | Match play Round 2 & Stroke | |\n| 12/12/2010 | | Sunshine | | 7.30 am | | Stableford | |\n\nBirthday Greetings\n\nМногая Літа / Happy Birthday to the following members for April:\n\nGreg Anolak\nLeon Charuckyj\nSteve Kosylo\nGerry Romanyk\nPavlo Seniw\nRoman Zachariak\n\nCaptain's Report - Gisborne – 21 MARCH 2010\n\nWhat a beautiful morning, and what a great turnout of members for this monthly game at Gisborne!\n\nI would like to thank all our members for their patience with respect to the delay in our teeoff time. Our group was delayed by approx 30 minutes due to a hold-up with the previous social group.\n\nTeeing off on the first hole went very well and everyone, or should I say, almost everyone (except for Tony Kastropil) managed to hit a reasonable drive. Tony did you make the ladies tee? Tony had the shortest drive on that hole and there were consequently a lot of comments flying around about it afterwards. Hope your game improved from then on Tony!\n\nI must say my own game was not pleasant at all, on reflection, looking back on the 13 th hole 456m downhill being 6ft from the bunker in front of the green for 2 and finishing the hole with a 10. How embarrassing! Then there were the other holes, too boring to mention. Needless to say, I was not happy with my game!\n\nThe course presented itself very well and played hard, as always. The greens were so hard to read and master. The pin placements all-in-all were also quite a test!\n\nAll 33 players enjoyed the day including the BBQ, presentation and raffle afterwards.\n\nUntil we meet again at Club Championship in Shepparton/Mooroopna.\n\nClub Captain Roman Popowycz.\n\nPS Great to see some new faces in the ranks, and to see some of the old ones after long injuries, namely the Lesiw family, Paul Teres and Michael Kwas.\n\nGisborne Results – 21 March 2010\n\nNumber of players …33………………ACR ..72…………. CCR......31............\n\nHow CCR was calculated?\n\n21-27 players 3\n\nrd best score, 28-35 - 4\n\nth best score, 36-43 - 5\n\nth best score\n\nMATCH PLAY RESULTS\n\nG. Makohon over S. Galas + 2 | Slawko Kohut over S. Felniak + 2\n\nFeature hole winners\n\nNTP holes\n\nNo. 2\n\nGeorge Makohon\n\nNo. 4\n\nStan Niemczyk\n\nNo. 12\n\n-\n\nDrive & chip hole No 9\n\nMichael Lesiw\n\nLongest drive\n\nMarijka Kohut\n\nNTP Hole No 4\n\nStan Niemczyk\n\nGrade winners –\n\nA Grade (0-18)\n\nLou Karfut – 39 pts (18 hcp)\n\nB Grade (19-27)\n\nRoman Galas – 37 pts (22 hcp)\n\nC Grade (28-36)\n\nStan Niemczyk – 29 pts (33 hcp)\n\nHave you ever thought why sometimes there are two grade winners and sometimes there are three?\n\n2 grades only - if 30 or less players\n\n3 grades awarded - if 31 or more\n\nBall Comp (24 pts)\n\nThe following visitors also received a ball:\n\nMichael Lesiw\n\nLidia Lesiw\n\nPaul Lesiw\n\nClub Championship – Mooroopna/Shepparton – 17 & 18 April 2010\n\n17 April 2010\n\nMooroopna Golf Course\n\nMeeting time:\n\n7.00am\n\nTee off:\n\n7.30am – on 10 th tee.\n\nPresentation BBQ: After the Saturday game at Victoria Lakes Caravan Park.\n\n18 April 2010 Shepparton Golf Course\n\nMeeting time:\n\n7.00am\n\nTee off:\n\n7.30am\n\nCost\n\nBoth games & Sat BBQ/Presentation - $60 pp.\n\nNon-players Sat BBQ - $20 pp\n\nAccommodation choices\n\n1. SERVICED APARTMENTS - 507 Wyndham St, Shepparton - Glenda (5821 4482)\n\nModern 4-star quality apartments: www.sheppapartments.com.au\n\n2BR / 3 toilets / full kitchen / full laundry\n\nSame price as last year!\n\n$170 per night (4 people) 2 queen beds or 4 singles or 1 queen & 2 singles\n\nHave folding divan downstairs so can sleep additional 1 or 2 people at extra $10 pp/p night. Therefore could sleep 5 for $180/night or 6 (two on the divan?) for $190/night.\n\n2. VICTORIA LAKE CARAVAN PARK Melissa/Glenys 5821 5431…(10% discount for us)\n\nTHIS IS WHERE THE BBQ WILL BE AFTER SATURDAY'S GAME!\n\nAll cabins are self-contained with bathroom & cooking facilities.\n\nThree standards:\n\nLuxury 2 bedroom Cabin with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $125.00 + $12 each extra person per night.\n\nDeluxe 2 bedroom with QB in 1st bedroom and DB with single bunk over in 2nd bedroom. Price per night is $105.00 for two people plus $12 each extra person per night.\nDeluxe 2 bedroom with QB in the 1st bedroom and 2 sets of bunks in the 2nd bedroom. Price per night $105.00 for two people plus $12 each extra person per night.\nEnsuite cabin with DB in the bedroom and a set of triple bunks in the hallway opposite the ensuite. Price per night is $87.00 for two people plus $12.00 ea extra.\n\nInstructions\n\n: To secure your booking you will need to pho<cursor_is_here> One night‟s tariff will be charged against your credit card as deposit.\n\nGuys, I have included an excerpt from our current AUVGC Rules and Code of Conduct for you to review before Club Championship.\n\nExcerpt from AUVGC Rules & Code OF Conduct – for your review\n\n2.3 CONDUCT OF THE AUVGC‟s CLUB CHAMPIONSHIPS\n\n2.3.1 The Ukrainian Club Championship shall be conducted each year as a 36-hole stroke event and where possible played over two (2) consecutive days to determine:\n(i) Scratch Champion,\n\n(ii) Handicap Champion; and\n(iii) Divisional Champions\n(a) The conditions of play for AUVGC Championships shall be decided by the Committee and published in the newsletter prior to the said event.\n(b) In conjunction with the Club Championships being played, there will be a daily \"Handicap Event\" conducted on each day of the Championships. These events will be treated like a normal monthly event and there will be:\n(i) Winners for Divisional Grades\n(ii) Nearest the Pin holes\n(iii) Longest Drive, and\n(iv) Drive & Chip hole.\n(c) The „Scratch Champion and the „Handicap Champion‟ are ineligible to be considered for Divisional Grade Championship trophies.\n\n2.3.2 Eligibility\n\n(a) Members must be financial members of the AUVGC.\n(b) Members must have played a minimum of three (3) monthly games that can be handicapped in the current year, so as to establish a current handicap with the AUVGC prior to the Club Championship event.\n\n(c) Members must be financial to enter the Club Championships. Entry to the competition will not be accepted unless the prescribed fees and any other monies still owing to the AUVGC are paid.\n(d) However, those members who do not meet the required criteria for Championship events [refer to Clause 2.2.2(b) & (c)] are still able to contest the Daily Handicap event. The daily handicap event is a stroke event.\n\n2.3.3 Handicaps\n\n(a) Handicaps for Championship Events shall apply to both the 1st and 2nd rounds.\n(b) However for the purposes of the second day's \"daily event\", which is held in conjunction with the Club Championship, handicaps will be readjusted depending on results of the first day's score.\n\n2.3.4 Players Draw\n\n(a) First Round: The Club Captain will conduct a draw in conjunction with the Match Committee to determine the order in which player‟s tee-off.\n(b) Second Round: The results of the first round will determine the order in which player‟s tee-off.\n\n2.3.5 Tied Scores\n\n(a) In the event of a tie for either the Scratch or Handicap Champion after 36 holes, then there will be a play-off at a date and venue to be decided by the Committee.\n(b) However, in the event of a tie in Divisional Grades then the Australian countback system will be used to determine the winner.\n\n2.3.6 Conditions of Play\n\n(a) Where possible, play is to be off the member‟s markers on the day.\n(b) Ride-on carts may be used at all events.\n(c) Ball is to be played as it lies unless otherwise directed by the Match Committee [refer to Local Rules].\n(d) Lost Ball or Out of Bounds: Take a two (2) stroke penalty and play the next shot from where the ball went out of bounds or where the ball is deemed to be lost. Otherwise all ball penalties are as specified in Clause 2.1.3 (iii) – (iv).\n(e) Scorecards must be completed correctly. Player must ensure the correct handicap is recorded on the card, scores are totalled, card is signed (by player & marker) and dated before being handed in, otherwise it may result in the player being disqualified.\n\n2.3.7 Disputes & Rulings\n\nDisputes are to be referred immediately to the Club Captain or the Match Committee at the conclusion of the round for resolution. This must be done prior to the cards being signed.\n\n2.3.8 Trophies Allocated to Club Championship Winners\n\nTrophies will be presented to winners of AUVGC Club Championship events at an Annual Presentation Function.\n\nSydney/Melbourne Challenge –\n\nWhen?\n\nQueen‟s birthday weekend – June 13, 2010 Albury Golf Course\n\nWhere?\n\nAccommodation:\n\nBest Western Meramie Motor Inn www.bestwestern.com.au/meramie\n\nReservations: 131 779\n\nRooms will be held until 31 March booked under Ukrainian Golf Club, after such time they will be released to the public. So be quick!\n\n2 night minimum stay.\n\nWhat‟s on:\n\n2 markets, wine festival and loads more.\n\n*******************************\n\nMembers are encouraged to bring wives/partners. Let‟s make an event out of it! Numbers have been pretty small over the past few years.\n\nAlbury isn‟t that far away, so how about it?\n\nCould be fun!\n\nHANDICAPS – April 2010\n\n* Handicapper discretion\n\nHappy Handicapper Notes\n\nJust a reminder that everyone is playing off their \"Playing Handicap\" for Club Championship.\n\nAUVGC Matchplay Championship 2009/10\n\n1st Round\n\n2nd Round\n\n3rd Round\n\nFinal Round\n\nChampion\n\nGisborne game memories\n\nMichael, Paul, Lidia Lesiw and Slawko\n\nOur Sponsor:\n\nThank you to Dyson for their continued support to our club!\n\nCOMMITTEE\n\nPresident\n\nSecretary\n\nTreasurer\n\nCaptain\n\nHandicapper\n\nBooking Officer\n\nFundraising Officer\n\nNewsletter & Web Editor\n\nMatch Committee\n\nSlawko Kohut [email protected]\n\nTony Kastropil\n\nMichael Kwas [email protected]\n\[email protected]\n\nRoman Popowych [email protected]\n\nMichael Masendycz [email protected]\n\nGeorge Makohon [email protected]\n\nRoman Galas\n\nMarijka Kohut\n\nLeon Charuckyj\n\nMichael Wityk\n\nWally Orfini [email protected]\n\[email protected] [email protected]\n\[email protected] [email protected]\n</text>\n",
"role": "user"
},
{
"content": "ne with your credit card details.",
"role": "assistant"
}
] |
AGENDA SUBMITTAL
TO: GCSD Board of Directors
FROM: Peter Kampa, General Manager
DATE: October 9, 2018
SUBJECT: Item 5. Old Business
A. Adoption of a Resolution Approving a 2018/2019 Fiscal Year Budget Amendment
SUMMARY
The budget format was significantly revamped and improved for the 2018/19 fiscal year; with the Preliminary Budget adopted on June 11, 2018 and the Final Budget adopted on August 13, 2018. Unfortunately, several errors occurred in the drafting of the final budget as a result of adding the March 2018 Storm Restoration expenses and revenue, which should be remedied with a budget amendment.
The California Government Code authorizes budget amendments as follows:
61111. (a) At any regular meeting or properly noticed special meeting after the adoption of its final budget, the board of directors may adopt a resolution amending the budget and ordering the transfer of funds between categories, other than transfers from the designated reserve for capital outlay and the designated reserve for contingencies.
Following are the proposed budget amendments:
1. Added to Capital Outlay Administrative Office parking lot resurfacing - $70,000. This expense is paid by each of the service funds at the Administrative Cost Allocation Formula: Water-56%, Sewer-38%, Fire-1% and Park-5%. This amount was shown on the budget sheet and discussed with the Board, but the spreadsheet formula was incorrect.
2. Added -$4,300 to office administrative expense for printing, required actuarial reports and office equipment rental to more accurately reflect expected costs. This amount is also split by the Administrative Allocation Formula above.
3. The formula was corrected for the sewer fund grant reimbursement revenue in the amount of +$374,259. Adding this correctly into the current budget reduces the amount of drawdown of the sewer fund balance by the same amount.
4. Sewer and Water Capital Outlay increased by $40,000 each for the Ferretti Road Flood Damage Restoration Project; with $30,000 in CDAA grant funds added to Sewer and Water Revenue respectively.
ATTACHMENT:
- Draft Budget amendment resolution
- Amended Budget, District-Wide Total summary Sheet
- Amended Budget, Capital Outlay Sheet
RECOMMENDED ACTION
No action recommended at this time.
## Groveland Community Services District
### Amended 2018/2019 Annual Budget
| | WATER | SEWER | FIRE | PARKS |
|----------------------|-------------|-------------|-------------|-------------|
| **Beginning Fund Balance** | | | | |
| | 17/18 | 18/19 | 18/19 | 17/18 |
| | % Diff | % Diff | % Diff | % Diff |
| | 2,670,867 | 1,919,446 | 1,465,960 | 814,331 |
| **Revenue** | | | | |
| Service Charges | $ 2,262,332 | $ 2,379,890 | $ 1,404,691 | $ 1,624,455 |
| | 62,541 | 62,030 | 25,787 | 11,000 |
| | -1% | -1% | 15% | 53% |
| Taxes | $ 591 | $ 591 | $ 591 | $ 591 |
| | 1,750 | 1,750 | 1,750 | 1,750 |
| Other Revenue | $ 2,981 | $ 224,000 | $ 194,076 | $ 1,380,296 |
| | 2,335,864 | 2,665,920 | 1,440,080 | 1,020,051 |
| | 14% | 14% | 11% | 11% |
| **TOTAL FUND REVENUE** | | | | |
| | $ 386,000 | $ 386,097 | $ 313,710 | $ 335,109 |
| | 174,805 | 167,715 | 145,735 | 144,235 |
| | 48% | 48% | 48% | 48% |
| | 55,760 | 52,400 | 26,240 | 5,560 |
| | -12% | -16% | -50% | -16% |
| | 220,174 | 254,837 | 134,673 | 132,988 |
| | 16% | 16% | 16% | 16% |
| | 137,572 | 172,600 | 114,388 | 190,100 |
| | 25% | 25% | 25% | 65% |
| | 425,191 | 398,050 | 249,544 | 241,595 |
| | -6% | -6% | -3% | -3% |
| | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |
| | 29% | 29% | 29% | 29% |
| | 657,080 | 758,080 | 452,310 | 500,882 |
| | 104% | 104% | 104% | 104% |
| **Operating Expenses** | | | | |
| Salaries | $ 2,064,522 | $ 2,193,338 | $ 1,462,760 | $ 1,574,349 |
| | 2,193,338 | 1,462,760 | 1,574,349 | 1,416,359 |
| | 104% | 104% | 104% | 104% |
| Benefits | $ 715,322 | $ 478,092 | $ 228,880 | $ 228,880 |
| | 478,092 | 228,880 | 228,880 | 228,880 |
| | 104% | 104% | 104% | 104% |
| General Manager Services | | | | |
| Retiree Medical | $ 63,700 | $ 55,760 | $ 52,400 | $ 26,240 |
| | 55,760 | 52,400 | 26,240 | 5,560 |
| | -12% | -16% | -50% | -16% |
| Admin Operating Expense | | | | |
| Equip., Auto, Maint., & Repairs | $ 220,174 | $ 254,837 | $ 134,673 | $ 132,988 |
| | 254,837 | 134,673 | 132,988 | 132,988 |
| | 16% | 16% | 16% | 16% |
| Outside Services | $ 137,572 | $ 172,600 | $ 114,388 | $ 190,100 |
| | 172,600 | 114,388 | 190,100 | 190,100 |
| | 25% | 25% | 25% | 65% |
| CAL FIRE (Schedule A + Amador Contracts) | $ 425,191 | $ 398,050 | $ 249,544 | $ 241,595 |
| | 398,050 | 249,544 | 241,595 | 241,595 |
| | -6% | -6% | -3% | -3% |
| Other (incl. OPEB, Leases, Cost of Water) | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |
| | 1,485,659 | 1,010,450 | 1,070,487 | 1,070,487 |
| | 29% | 29% | 29% | 29% |
| **TOTAL FUND EXPENSES** | | | | |
| Administrative Cost Allocation | $ 657,080 | $ 758,080 | $ 452,310 | $ 500,882 |
| | 758,080 | 452,310 | 500,882 | 500,882 |
| | 104% | 104% | 104% | 104% |
| **TOTAL OPERATING EXPENSES** | | | | |
| | $ 2,721,322 | $ 2,971,420 | $ 1,915,059 | $ 2,093,236 |
| | 2,971,420 | 1,915,059 | 2,093,236 | 2,093,236 |
| | 104% | 104% | 104% | 104% |
### Capital Expenses and Revenue
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| **Capital Reserve, Construction/Capacity Fees, Reserve Transfer** | | | | |
| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |
| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |
| | -50% | -50% | -50% | -50% |
| **NET CAPITAL EXPENSES** | | | | |
| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |
| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |
| | -50% | -50% | -50% | -50% |
| **Reserve Set-Aside** | | | | |
| Designated Reserve for Capital Outlay | | | | |
| **TOTAL RESERVE SET-ASIDE** | | | | |
| **Debt Service Expenses and Revenue** | | | | |
| Debt Service Charge Revenue | $ 605,000 | $ 604,801 | $ 410,651 | $ 325,658 |
| | 604,801 | 410,651 | 325,658 | 325,658 |
| | -0.2% | -0.2% | -0.2% | -0.2% |
| Debt Service Payments | ($84,248) | ($86,233) | ($22,710) | ($20,885) |
| | 86,233 | 22,710 | 20,885 | 20,885 |
| | -100% | -100% | -100% | -100% |
| **NET DEBT SERVICE** | | | | |
| | ($79,248) | ($81,223) | $ 87,951 | $ 4,773 |
| | 81,223 | 87,951 | 4,773 | 4,773 |
| | -100% | -100% | 100% | 100% |
### TOTAL EXPENSES
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
### ENDING FUND BALANCE
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
### Parks
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
---
Revision 1, October 9 2018
## ADMIN CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 31,250 |
| Parking lot repairs, seal coat | 70,000 |
| **TOTAL CAPITAL OUTLAY** | **101,250** |
## WATER CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Downtown Groveland/BOF Rehab Planning | 189,108 |
| AWS Tank 2 Booster System | 5,000 |
| Water Pump Replacements | 30,000 |
| Building Upgrades/Repairs | 68,000 |
| General Water Distribution Improv. | 60,000 |
| Truck #9 Replacement | 20,400 |
| Ferretti Rd. Water Main Storm Damage | 40,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 17,500 |
| Parking lot repairs, seal coat | 39,200 |
| **TOTAL CAPITAL OUTLAY** | **469,208** |
## SEWER CAPITAL OUTLAY
| Project | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Downtown Groveland/BOF Rehab Planning | 155,000 |
| Sludge Drying Bed Concrete Slab, Res 10-18 | 90,969 |
| Replace STP Reservoir 1 Valves | 20,000 |
| Replacement of Storm Damaged Sewer | 549,120 |
| Wastewater Pump Replacements | 24,000 |
| Building Upgrades/Repairs | 32,000 |
| Repair/Replace Rd. Culvert & Restore Perc Ponds | 200,000 |
| Truck #9 Replacement | 9,600 |
| WWTP Flume Storm Damage Repair 2017 Floods | 409,470 |
| WWTP Flume Storm Damage Repair 2018 Floods | 343,863 |
| Ferretti Rd. Sewer Main Storm Damage | 40,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 11,875 |
| Parking lot repairs, seal coat | 26,600 |
| **TOTAL CAPITAL OUTLAY** | **1,912,497** |
## FIRE CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Driveway Repairs | 30,000 |
| SCBA Fill Station | 45,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 313 |
| Parking lot repairs, seal coat | 700 |
| **TOTAL CAPITAL OUTLAY** | **76,013** |
## PARK CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Park Restoration Project | 200,000 |
| Culvert Extension | 6,630 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 1,563 |
| Parking lot repairs, seal coat | 3,500 |
| **TOTAL CAPITAL OUTLAY** | **211,693** |
|
<urn:uuid:f7d39491-bac1-41eb-8c43-cc3a8ba2ac55>
|
CC-MAIN-2024-51
|
https://www.gcsd.org/files/afedde954/2018-2019+Annual+Budget+Complete%2C+Final+Amended+10-9-18.pdf
|
2024-12-10T05:11:05+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-51/subset=warc/part-00121-b392068a-8e35-4497-8fab-a691b1a71843.c000.gz.parquet
| 698,024,358
| 4,101
|
eng_Latn
|
eng_Latn
| 0.541871
|
eng_Latn
| 0.993687
|
[
"eng_Latn",
"eng_Latn",
"crs_Latn"
] | false
|
docling
|
[
2278,
11632,
16203
] |
AGENDA SUBMITTAL
TO: GCSD Board of Directors
FROM: Peter Kampa, General Manager
DATE: October 9, 2018
SUBJECT: Item 5. Old Business
A. Adoption of a Resolution Approving a 2018/2019 Fiscal Year Budget Amendment
SUMMARY
The budget format was significantly revamped and improved for the 2018/19 fiscal year; with the Preliminary Budget adopted on June 11, 2018 and the Final Budget adopted on August 13, 2018. Unfortunately, several errors occurred in the drafting of the final budget as a result of adding the March 2018 Storm Restoration expenses and revenue, which should be remedied with a budget amendment.
The California Government Code authorizes budget amendments as follows:
61111. (a) At any regular meeting or properly noticed special meeting after the adoption of its final budget, the board of directors may adopt a resolution amending the budget and ordering the transfer of funds between categories, other than transfers from the designated reserve for capital outlay and the designated reserve for contingencies.
Following are the proposed budget amendments:
1. Added to Capital Outlay Administrative Office parking lot resurfacing - $70,000. This expense is paid by each of the service funds at the Administrative Cost Allocation Formula: Water-56%, Sewer-38%, Fire-1% and Park-5%. This amount was shown on the budget sheet and discussed with the Board, but the spreadsheet formula was incorrect.
2. Added -$4,300 to office administrative expense for printing, required actuarial reports and office equipment rental to more accurately reflect expected costs. This amount is also split by the Administrative Allocation Formula above.
3. The formula was corrected for the sewer fund grant reimbursement revenue in the amount of +$374,259. Adding this correctly into the current budget reduces the amount of drawdown of the sewer fund balance by the same amount.
4. Sewer and Water Capital Outlay increased by $40,000 each for the Ferretti Road Flood Damage Restoration Project; with $30,000 in CDAA grant funds added to Sewer and Water Revenue respectively.
ATTACHMENT:
- Draft Budget amendment resolution
- Amended Budget, District-Wide Total summary Sheet
- Amended Budget, Capital Outlay Sheet
RECOMMENDED ACTION
No action recommended at this time.
## Groveland Community Services District
### Amended 2018/2019 Annual Budget
| | WATER | SEWER | FIRE | PARKS |
|----------------------|-------------|-------------|-------------|-------------|
| **Beginning Fund Balance** | | | | |
| | 17/18 | 18/19 | 18/19 | 17/18 |
| | % Diff | % Diff | % Diff | % Diff |
| | 2,670,867 | 1,919,446 | 1,465,960 | 814,331 |
| **Revenue** | | | | |
| Service Charges | $ 2,262,332 | $ 2,379,890 | $ 1,404,691 | $ 1,624,455 |
| | 62,541 | 62,030 | 25,787 | 11,000 |
| | -1% | -1% | 15% | 53% |
| Taxes | $ 591 | $ 591 | $ 591 | $ 591 |
| | 1,750 | 1,750 | 1,750 | 1,750 |
| Other Revenue | $ 2,981 | $ 224,000 | $ 194,076 | $ 1,380,296 |
| | 2,335,864 | 2,665,920 | 1,440,080 | 1,020,051 |
| | 14% | 14% | 11% | 11% |
| **TOTAL FUND REVENUE** | | | | |
| | $ 386,000 | $ 386,097 | $ 313,710 | $ 335,109 |
| | 174,805 | 167,715 | 145,735 | 144,235 |
| | 48% | 48% | 48% | 48% |
| | 55,760 | 52,400 | 26,240 | 5,560 |
| | -12% | -16% | -50% | -16% |
| | 220,174 | 254,837 | 134,673 | 132,988 |
| | 16% | 16% | 16% | 16% |
| | 137,572 | 172,600 | 114,388 | 190,100 |
| | 25% | 25% | 25% | 65% |
| | 425,191 | 398,050 | 249,544 | 241,595 |
| | -6% | -6% | -3% | -3% |
| | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |
| | 29% | 29% | 29% | 29% |
| | 657,080 | 758,080 | 452,310 | 500,882 |
| | 104% | 104% | 104% | 104% |
| **Operating Expenses** | | | | |
| Salaries | $ 2,064,522 | $ 2,193,338 | $ 1,462,760 | $ 1,574,349 |
| | 2,193,338 | 1,462,760 | 1,574,349 | 1,416,359 |
| | 104% | 104% | 104% | 104% |
| Benefits | $ 715,322 | $ 478,092 | $ 228,880 | $ 228,880 |
| | 478,092 | 228,880 | 228,880 | 228,880 |
| | 104% | 104% | 104% | 104% |
| General Manager Services | | | | |
| Retiree Medical | $ 63,700 | $ 55,760 | $ 52,400 | $ 26,240 |
| | 55,760 | 52,400 | 26,240 | 5,560 |
| | -12% | -16% | -50% | -16% |
| Admin Operating Expense | | | | |
| Equip., Auto, Maint., & Repairs | $ 220,174 | $ 254,837 | $ 134,673 | $ 132,988 |
| | 254,837 | 134,673 | 132,988 | 132,988 |
| | 16% | 16% | 16% | 16% |
| Outside Services | $ 137,572 | $ 172,600 | $ 114,388 | $ 190,100 |
| | 172,600 | 114,388 | 190,100 | 190,100 |
| | 25% | 25% | 25% | 65% |
| CAL FIRE (Schedule A + Amador Contracts) | $ 425,191 | $ 398,050 | $ 249,544 | $ 241,595 |
| | 398,050 | 249,544 | 241,595 | 241,595 |
| | -6% | -6% | -3% | -3% |
| Other (incl. OPEB, Leases, Cost of Water) | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |
| | 1,485,659 | 1,010,450 | 1,070,487 | 1,070,487 |
| | 29% | 29% | 29% | 29% |
| **TOTAL FUND EXPENSES** | | | | |
| Administrative Cost Allocation | $ 657,080 | $ 758,080 | $ 452,310 | $ 500,882 |
| | 758,080 | 452,310 | 500,882 | 500,882 |
| | 104% | 104% | 104% | 104% |
| **TOTAL OPERATING EXPENSES** | | | | |
| | $ 2,721,322 | $ 2,971,420 | $ 1,915,059 | $ 2,093,236 |
| | 2,971,420 | 1,915,059 | 2,093,236 | 2,093,236 |
| | 104% | 104% | 104% | 104% |
### Capital Expenses and Revenue
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| **Capital Reserve, Construction/Capacity Fees, Reserve Transfer** | | | | |
| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |
| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |
| | -50% | -50% | -50% | -50% |
| **NET CAPITAL EXPENSES** | | | | |
| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |
| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |
| | -50% | -50% | -50% | -50% |
| **Reserve Set-Aside** | | | | |
| Designated Reserve for Capital Outlay | | | | |
| **TOTAL RESERVE SET-ASIDE** | | | | |
| **Debt Service Expenses and Revenue** | | | | |
| Debt Service Charge Revenue | $ 605,000 | $ 604,801 | $ 410,651 | $ 325,658 |
| | 604,801 | 410,651 | 325,658 | 325,658 |
| | -0.2% | -0.2% | -0.2% | -0.2% |
| Debt Service Payments | ($84,248) | ($86,233) | ($22,710) | ($20,885) |
| | 86,233 | 22,710 | 20,885 | 20,885 |
| | -100% | -100% | -100% | -100% |
| **NET DEBT SERVICE** | | | | |
| | ($79,248) | ($81,223) | $ 87,951 | $ 4,773 |
| | 81,223 | 87,951 | 4,773 | 4,773 |
| | -100% | -100% | 100% | 100% |
### TOTAL EXPENSES
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
### ENDING FUND BALANCE
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
### Parks
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
---
Revision 1, October 9 2018
## ADMIN CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
|
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 31,250 |
| Parking lot repairs, seal coat | 70,000 |
| **TOTAL CAPITAL OUTLAY** | **101,250** |
## WATER CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Downtown Groveland/BOF Rehab Planning | 189,108 |
| AWS Tank 2 Booster System | 5,000 |
| Water Pump Replacements | 30,000 |
| Building Upgrades/Repairs | 68,000 |
| General Water Distribution Improv.
|
| 60,000 |
| Truck #9 Replacement | 20,400 |
| Ferretti Rd. Water Main Storm Damage | 40,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 17,500 |
| Parking lot repairs, seal coat | 39,200 |
| **TOTAL CAPITAL OUTLAY** | **469,208** |
## SEWER CAPITAL OUTLAY
| Project | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Downtown Groveland/BOF Rehab Planning | 155,000 |
| Sludge Drying Bed Concrete Slab, Res 10-18 | 90,969 |
| Replace STP Reservoir 1 Valves | 20,000 |
| Replacement of Storm Damaged Sewer | 549,120 |
| Wastewater Pump Replacements | 24,000 |
| Building Upgrades/Repairs | 32,000 |
| Repair/Replace Rd. Culvert & Restore Perc Ponds | 200,000 |
| Truck #9 Replacement | 9,600 |
| WWTP Flume Storm Damage Repair 2017 Floods | 409,470 |
| WWTP Flume Storm Damage Repair 2018 Floods | 343,863 |
| Ferretti Rd. Sewer Main Storm Damage | 40,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 11,875 |
| Parking lot repairs, seal coat | 26,600 |
| **TOTAL CAPITAL OUTLAY** | **1,912,497** |
## FIRE CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Driveway Repairs | 30,000 |
| SCBA Fill Station | 45,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 313 |
| Parking lot repairs, seal coat | 700 |
| **TOTAL CAPITAL OUTLAY** | **76,013** |
## PARK CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Park Restoration Project | 200,000 |
| Culvert Extension | 6,630 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 1,563 |
| Parking lot repairs, seal coat | 3,500 |
| **TOTAL CAPITAL OUTLAY** | **211,693** |
| 11,846
|
inside_word
|
|
|
remove_one_sentence
|
<url>
https://www.gcsd.org/files/afedde954/2018-2019+Annual+Budget+Complete%2C+Final+Amended+10-9-18.pdf
</url>
<text>
AGENDA SUBMITTAL
TO: GCSD Board of Directors
FROM: Peter Kampa, General Manager
DATE: October 9, 2018
SUBJECT: Item 5. Old Business
A. Adoption of a Resolution Approving a 2018/2019 Fiscal Year Budget Amendment
SUMMARY
The budget format was significantly revamped and improved for the 2018/19 fiscal year; with the Preliminary Budget adopted on June 11, 2018 and the Final Budget adopted on August 13, 2018. Unfortunately, several errors occurred in the drafting of the final budget as a result of adding the March 2018 Storm Restoration expenses and revenue, which should be remedied with a budget amendment.
The California Government Code authorizes budget amendments as follows:
61111. (a) At any regular meeting or properly noticed special meeting after the adoption of its final budget, the board of directors may adopt a resolution amending the budget and ordering the transfer of funds between categories, other than transfers from the designated reserve for capital outlay and the designated reserve for contingencies.
Following are the proposed budget amendments:
1. Added to Capital Outlay Administrative Office parking lot resurfacing - $70,000. This expense is paid by each of the service funds at the Administrative Cost Allocation Formula: Water-56%, Sewer-38%, Fire-1% and Park-5%. This amount was shown on the budget sheet and discussed with the Board, but the spreadsheet formula was incorrect.
2. Added -$4,300 to office administrative expense for printing, required actuarial reports and office equipment rental to more accurately reflect expected costs. This amount is also split by the Administrative Allocation Formula above.
3. The formula was corrected for the sewer fund grant reimbursement revenue in the amount of +$374,259. Adding this correctly into the current budget reduces the amount of drawdown of the sewer fund balance by the same amount.
4. Sewer and Water Capital Outlay increased by $40,000 each for the Ferretti Road Flood Damage Restoration Project; with $30,000 in CDAA grant funds added to Sewer and Water Revenue respectively.
ATTACHMENT:
- Draft Budget amendment resolution
- Amended Budget, District-Wide Total summary Sheet
- Amended Budget, Capital Outlay Sheet
RECOMMENDED ACTION
No action recommended at this time.
## Groveland Community Services District
### Amended 2018/2019 Annual Budget
| | WATER | SEWER | FIRE | PARKS |
|----------------------|-------------|-------------|-------------|-------------|
| **Beginning Fund Balance** | | | | |
| | 17/18 | 18/19 | 18/19 | 17/18 |
| | % Diff | % Diff | % Diff | % Diff |
| | 2,670,867 | 1,919,446 | 1,465,960 | 814,331 |
| **Revenue** | | | | |
| Service Charges | $ 2,262,332 | $ 2,379,890 | $ 1,404,691 | $ 1,624,455 |
| | 62,541 | 62,030 | 25,787 | 11,000 |
| | -1% | -1% | 15% | 53% |
| Taxes | $ 591 | $ 591 | $ 591 | $ 591 |
| | 1,750 | 1,750 | 1,750 | 1,750 |
| Other Revenue | $ 2,981 | $ 224,000 | $ 194,076 | $ 1,380,296 |
| | 2,335,864 | 2,665,920 | 1,440,080 | 1,020,051 |
| | 14% | 14% | 11% | 11% |
| **TOTAL FUND REVENUE** | | | | |
| | $ 386,000 | $ 386,097 | $ 313,710 | $ 335,109 |
| | 174,805 | 167,715 | 145,735 | 144,235 |
| | 48% | 48% | 48% | 48% |
| | 55,760 | 52,400 | 26,240 | 5,560 |
| | -12% | -16% | -50% | -16% |
| | 220,174 | 254,837 | 134,673 | 132,988 |
| | 16% | 16% | 16% | 16% |
| | 137,572 | 172,600 | 114,388 | 190,100 |
| | 25% | 25% | 25% | 65% |
| | 425,191 | 398,050 | 249,544 | 241,595 |
| | -6% | -6% | -3% | -3% |
| | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |
| | 29% | 29% | 29% | 29% |
| | 657,080 | 758,080 | 452,310 | 500,882 |
| | 104% | 104% | 104% | 104% |
| **Operating Expenses** | | | | |
| Salaries | $ 2,064,522 | $ 2,193,338 | $ 1,462,760 | $ 1,574,349 |
| | 2,193,338 | 1,462,760 | 1,574,349 | 1,416,359 |
| | 104% | 104% | 104% | 104% |
| Benefits | $ 715,322 | $ 478,092 | $ 228,880 | $ 228,880 |
| | 478,092 | 228,880 | 228,880 | 228,880 |
| | 104% | 104% | 104% | 104% |
| General Manager Services | | | | |
| Retiree Medical | $ 63,700 | $ 55,760 | $ 52,400 | $ 26,240 |
| | 55,760 | 52,400 | 26,240 | 5,560 |
| | -12% | -16% | -50% | -16% |
| Admin Operating Expense | | | | |
| Equip., Auto, Maint., & Repairs | $ 220,174 | $ 254,837 | $ 134,673 | $ 132,988 |
| | 254,837 | 134,673 | 132,988 | 132,988 |
| | 16% | 16% | 16% | 16% |
| Outside Services | $ 137,572 | $ 172,600 | $ 114,388 | $ 190,100 |
| | 172,600 | 114,388 | 190,100 | 190,100 |
| | 25% | 25% | 25% | 65% |
| CAL FIRE (Schedule A + Amador Contracts) | $ 425,191 | $ 398,050 | $ 249,544 | $ 241,595 |
| | 398,050 | 249,544 | 241,595 | 241,595 |
| | -6% | -6% | -3% | -3% |
| Other (incl. OPEB, Leases, Cost of Water) | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |
| | 1,485,659 | 1,010,450 | 1,070,487 | 1,070,487 |
| | 29% | 29% | 29% | 29% |
| **TOTAL FUND EXPENSES** | | | | |
| Administrative Cost Allocation | $ 657,080 | $ 758,080 | $ 452,310 | $ 500,882 |
| | 758,080 | 452,310 | 500,882 | 500,882 |
| | 104% | 104% | 104% | 104% |
| **TOTAL OPERATING EXPENSES** | | | | |
| | $ 2,721,322 | $ 2,971,420 | $ 1,915,059 | $ 2,093,236 |
| | 2,971,420 | 1,915,059 | 2,093,236 | 2,093,236 |
| | 104% | 104% | 104% | 104% |
### Capital Expenses and Revenue
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| **Capital Reserve, Construction/Capacity Fees, Reserve Transfer** | | | | |
| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |
| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |
| | -50% | -50% | -50% | -50% |
| **NET CAPITAL EXPENSES** | | | | |
| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |
| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |
| | -50% | -50% | -50% | -50% |
| **Reserve Set-Aside** | | | | |
| Designated Reserve for Capital Outlay | | | | |
| **TOTAL RESERVE SET-ASIDE** | | | | |
| **Debt Service Expenses and Revenue** | | | | |
| Debt Service Charge Revenue | $ 605,000 | $ 604,801 | $ 410,651 | $ 325,658 |
| | 604,801 | 410,651 | 325,658 | 325,658 |
| | -0.2% | -0.2% | -0.2% | -0.2% |
| Debt Service Payments | ($84,248) | ($86,233) | ($22,710) | ($20,885) |
| | 86,233 | 22,710 | 20,885 | 20,885 |
| | -100% | -100% | -100% | -100% |
| **NET DEBT SERVICE** | | | | |
| | ($79,248) | ($81,223) | $ 87,951 | $ 4,773 |
| | 81,223 | 87,951 | 4,773 | 4,773 |
| | -100% | -100% | 100% | 100% |
### TOTAL EXPENSES
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
### ENDING FUND BALANCE
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
### Parks
| | | | | |
|----------------------|-------------|-------------|-------------|-------------|
| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |
| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |
| | -13% | -13% | 100% | 100% |
| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |
| | 1,461,898 | 814,231 | 258,109 | 258,109 |
| | -10% | -10% | -10% | -10% |
---
Revision 1, October 9 2018
## ADMIN CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
<cursor_is_here> | 60,000 |
| Truck #9 Replacement | 20,400 |
| Ferretti Rd. Water Main Storm Damage | 40,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 17,500 |
| Parking lot repairs, seal coat | 39,200 |
| **TOTAL CAPITAL OUTLAY** | **469,208** |
## SEWER CAPITAL OUTLAY
| Project | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Downtown Groveland/BOF Rehab Planning | 155,000 |
| Sludge Drying Bed Concrete Slab, Res 10-18 | 90,969 |
| Replace STP Reservoir 1 Valves | 20,000 |
| Replacement of Storm Damaged Sewer | 549,120 |
| Wastewater Pump Replacements | 24,000 |
| Building Upgrades/Repairs | 32,000 |
| Repair/Replace Rd. Culvert & Restore Perc Ponds | 200,000 |
| Truck #9 Replacement | 9,600 |
| WWTP Flume Storm Damage Repair 2017 Floods | 409,470 |
| WWTP Flume Storm Damage Repair 2018 Floods | 343,863 |
| Ferretti Rd. Sewer Main Storm Damage | 40,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 11,875 |
| Parking lot repairs, seal coat | 26,600 |
| **TOTAL CAPITAL OUTLAY** | **1,912,497** |
## FIRE CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Driveway Repairs | 30,000 |
| SCBA Fill Station | 45,000 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 313 |
| Parking lot repairs, seal coat | 700 |
| **TOTAL CAPITAL OUTLAY** | **76,013** |
## PARK CAPITAL OUTLAY
| Projects | 18/19 Approved |
|-------------------------------------------------------------------------|----------------|
| Park Restoration Project | 200,000 |
| Culvert Extension | 6,630 |
| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 1,563 |
| Parking lot repairs, seal coat | 3,500 |
| **TOTAL CAPITAL OUTLAY** | **211,693** |
</text>
|
[
{
"content": "<url>\nhttps://www.gcsd.org/files/afedde954/2018-2019+Annual+Budget+Complete%2C+Final+Amended+10-9-18.pdf\n</url>\n<text>\nAGENDA SUBMITTAL\n\nTO: GCSD Board of Directors\n\nFROM: Peter Kampa, General Manager\n\nDATE: October 9, 2018\n\nSUBJECT: Item 5. Old Business\n\nA. Adoption of a Resolution Approving a 2018/2019 Fiscal Year Budget Amendment\n\nSUMMARY\nThe budget format was significantly revamped and improved for the 2018/19 fiscal year; with the Preliminary Budget adopted on June 11, 2018 and the Final Budget adopted on August 13, 2018. Unfortunately, several errors occurred in the drafting of the final budget as a result of adding the March 2018 Storm Restoration expenses and revenue, which should be remedied with a budget amendment.\n\nThe California Government Code authorizes budget amendments as follows:\n\n61111. (a) At any regular meeting or properly noticed special meeting after the adoption of its final budget, the board of directors may adopt a resolution amending the budget and ordering the transfer of funds between categories, other than transfers from the designated reserve for capital outlay and the designated reserve for contingencies.\n\nFollowing are the proposed budget amendments:\n1. Added to Capital Outlay Administrative Office parking lot resurfacing - $70,000. This expense is paid by each of the service funds at the Administrative Cost Allocation Formula: Water-56%, Sewer-38%, Fire-1% and Park-5%. This amount was shown on the budget sheet and discussed with the Board, but the spreadsheet formula was incorrect.\n\n2. Added -$4,300 to office administrative expense for printing, required actuarial reports and office equipment rental to more accurately reflect expected costs. This amount is also split by the Administrative Allocation Formula above.\n\n3. The formula was corrected for the sewer fund grant reimbursement revenue in the amount of +$374,259. Adding this correctly into the current budget reduces the amount of drawdown of the sewer fund balance by the same amount.\n\n4. Sewer and Water Capital Outlay increased by $40,000 each for the Ferretti Road Flood Damage Restoration Project; with $30,000 in CDAA grant funds added to Sewer and Water Revenue respectively.\n\nATTACHMENT:\n- Draft Budget amendment resolution\n- Amended Budget, District-Wide Total summary Sheet\n- Amended Budget, Capital Outlay Sheet\n\nRECOMMENDED ACTION\nNo action recommended at this time.\n\n## Groveland Community Services District\n### Amended 2018/2019 Annual Budget\n\n| | WATER | SEWER | FIRE | PARKS |\n|----------------------|-------------|-------------|-------------|-------------|\n| **Beginning Fund Balance** | | | | |\n| | 17/18 | 18/19 | 18/19 | 17/18 |\n| | % Diff | % Diff | % Diff | % Diff |\n| | 2,670,867 | 1,919,446 | 1,465,960 | 814,331 |\n| **Revenue** | | | | |\n| Service Charges | $ 2,262,332 | $ 2,379,890 | $ 1,404,691 | $ 1,624,455 |\n| | 62,541 | 62,030 | 25,787 | 11,000 |\n| | -1% | -1% | 15% | 53% |\n| Taxes | $ 591 | $ 591 | $ 591 | $ 591 |\n| | 1,750 | 1,750 | 1,750 | 1,750 |\n| Other Revenue | $ 2,981 | $ 224,000 | $ 194,076 | $ 1,380,296 |\n| | 2,335,864 | 2,665,920 | 1,440,080 | 1,020,051 |\n| | 14% | 14% | 11% | 11% |\n| **TOTAL FUND REVENUE** | | | | |\n| | $ 386,000 | $ 386,097 | $ 313,710 | $ 335,109 |\n| | 174,805 | 167,715 | 145,735 | 144,235 |\n| | 48% | 48% | 48% | 48% |\n| | 55,760 | 52,400 | 26,240 | 5,560 |\n| | -12% | -16% | -50% | -16% |\n| | 220,174 | 254,837 | 134,673 | 132,988 |\n| | 16% | 16% | 16% | 16% |\n| | 137,572 | 172,600 | 114,388 | 190,100 |\n| | 25% | 25% | 25% | 65% |\n| | 425,191 | 398,050 | 249,544 | 241,595 |\n| | -6% | -6% | -3% | -3% |\n| | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |\n| | 29% | 29% | 29% | 29% |\n| | 657,080 | 758,080 | 452,310 | 500,882 |\n| | 104% | 104% | 104% | 104% |\n| **Operating Expenses** | | | | |\n| Salaries | $ 2,064,522 | $ 2,193,338 | $ 1,462,760 | $ 1,574,349 |\n| | 2,193,338 | 1,462,760 | 1,574,349 | 1,416,359 |\n| | 104% | 104% | 104% | 104% |\n| Benefits | $ 715,322 | $ 478,092 | $ 228,880 | $ 228,880 |\n| | 478,092 | 228,880 | 228,880 | 228,880 |\n| | 104% | 104% | 104% | 104% |\n| General Manager Services | | | | |\n| Retiree Medical | $ 63,700 | $ 55,760 | $ 52,400 | $ 26,240 |\n| | 55,760 | 52,400 | 26,240 | 5,560 |\n| | -12% | -16% | -50% | -16% |\n| Admin Operating Expense | | | | |\n| Equip., Auto, Maint., & Repairs | $ 220,174 | $ 254,837 | $ 134,673 | $ 132,988 |\n| | 254,837 | 134,673 | 132,988 | 132,988 |\n| | 16% | 16% | 16% | 16% |\n| Outside Services | $ 137,572 | $ 172,600 | $ 114,388 | $ 190,100 |\n| | 172,600 | 114,388 | 190,100 | 190,100 |\n| | 25% | 25% | 25% | 65% |\n| CAL FIRE (Schedule A + Amador Contracts) | $ 425,191 | $ 398,050 | $ 249,544 | $ 241,595 |\n| | 398,050 | 249,544 | 241,595 | 241,595 |\n| | -6% | -6% | -3% | -3% |\n| Other (incl. OPEB, Leases, Cost of Water) | $ 1,407,442 | $ 1,485,659 | $ 1,010,450 | $ 1,070,487 |\n| | 1,485,659 | 1,010,450 | 1,070,487 | 1,070,487 |\n| | 29% | 29% | 29% | 29% |\n| **TOTAL FUND EXPENSES** | | | | |\n| Administrative Cost Allocation | $ 657,080 | $ 758,080 | $ 452,310 | $ 500,882 |\n| | 758,080 | 452,310 | 500,882 | 500,882 |\n| | 104% | 104% | 104% | 104% |\n| **TOTAL OPERATING EXPENSES** | | | | |\n| | $ 2,721,322 | $ 2,971,420 | $ 1,915,059 | $ 2,093,236 |\n| | 2,971,420 | 1,915,059 | 2,093,236 | 2,093,236 |\n| | 104% | 104% | 104% | 104% |\n\n### Capital Expenses and Revenue\n\n| | | | | |\n|----------------------|-------------|-------------|-------------|-------------|\n| **Capital Reserve, Construction/Capacity Fees, Reserve Transfer** | | | | |\n| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |\n| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |\n| | -50% | -50% | -50% | -50% |\n| **NET CAPITAL EXPENSES** | | | | |\n| | $ 943,500 | $ 469,208 | $ 417,000 | $ 1,912,997 |\n| | 469,208 | 417,000 | 1,912,997 | 1,912,997 |\n| | -50% | -50% | -50% | -50% |\n| **Reserve Set-Aside** | | | | |\n| Designated Reserve for Capital Outlay | | | | |\n| **TOTAL RESERVE SET-ASIDE** | | | | |\n| **Debt Service Expenses and Revenue** | | | | |\n| Debt Service Charge Revenue | $ 605,000 | $ 604,801 | $ 410,651 | $ 325,658 |\n| | 604,801 | 410,651 | 325,658 | 325,658 |\n| | -0.2% | -0.2% | -0.2% | -0.2% |\n| Debt Service Payments | ($84,248) | ($86,233) | ($22,710) | ($20,885) |\n| | 86,233 | 22,710 | 20,885 | 20,885 |\n| | -100% | -100% | -100% | -100% |\n| **NET DEBT SERVICE** | | | | |\n| | ($79,248) | ($81,223) | $ 87,951 | $ 4,773 |\n| | 81,223 | 87,951 | 4,773 | 4,773 |\n| | -100% | -100% | 100% | 100% |\n\n### TOTAL EXPENSES\n\n| | | | | |\n|----------------------|-------------|-------------|-------------|-------------|\n| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |\n| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |\n| | -13% | -13% | 100% | 100% |\n| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |\n| | 1,461,898 | 814,231 | 258,109 | 258,109 |\n| | -10% | -10% | -10% | -10% |\n\n### ENDING FUND BALANCE\n\n| | | | | |\n|----------------------|-------------|-------------|-------------|-------------|\n| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |\n| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |\n| | -13% | -13% | 100% | 100% |\n| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |\n| | 1,461,898 | 814,231 | 258,109 | 258,109 |\n| | -10% | -10% | -10% | -10% |\n\n### Parks\n\n| | | | | |\n|----------------------|-------------|-------------|-------------|-------------|\n| | $ 3,087,265 | $ 2,743,668 | $ 1,791,809 | $ 3,578,873 |\n| | 2,743,668 | 1,791,809 | 3,578,873 | 3,578,873 |\n| | -13% | -13% | 100% | 100% |\n| | $ 1,319,446 | $ 1,461,898 | $ 814,231 | $ 258,109 |\n| | 1,461,898 | 814,231 | 258,109 | 258,109 |\n| | -10% | -10% | -10% | -10% |\n\n---\n\nRevision 1, October 9 2018\n\n## ADMIN CAPITAL OUTLAY\n\n| Projects | 18/19 Approved |\n|-------------------------------------------------------------------------|----------------|\n<cursor_is_here> | 60,000 |\n| Truck #9 Replacement | 20,400 |\n| Ferretti Rd. Water Main Storm Damage | 40,000 |\n| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 17,500 |\n| Parking lot repairs, seal coat | 39,200 |\n| **TOTAL CAPITAL OUTLAY** | **469,208** |\n\n## SEWER CAPITAL OUTLAY\n\n| Project | 18/19 Approved |\n|-------------------------------------------------------------------------|----------------|\n| Downtown Groveland/BOF Rehab Planning | 155,000 |\n| Sludge Drying Bed Concrete Slab, Res 10-18 | 90,969 |\n| Replace STP Reservoir 1 Valves | 20,000 |\n| Replacement of Storm Damaged Sewer | 549,120 |\n| Wastewater Pump Replacements | 24,000 |\n| Building Upgrades/Repairs | 32,000 |\n| Repair/Replace Rd. Culvert & Restore Perc Ponds | 200,000 |\n| Truck #9 Replacement | 9,600 |\n| WWTP Flume Storm Damage Repair 2017 Floods | 409,470 |\n| WWTP Flume Storm Damage Repair 2018 Floods | 343,863 |\n| Ferretti Rd. Sewer Main Storm Damage | 40,000 |\n| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 11,875 |\n| Parking lot repairs, seal coat | 26,600 |\n| **TOTAL CAPITAL OUTLAY** | **1,912,497** |\n\n## FIRE CAPITAL OUTLAY\n\n| Projects | 18/19 Approved |\n|-------------------------------------------------------------------------|----------------|\n| Driveway Repairs | 30,000 |\n| SCBA Fill Station | 45,000 |\n| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 313 |\n| Parking lot repairs, seal coat | 700 |\n| **TOTAL CAPITAL OUTLAY** | **76,013** |\n\n## PARK CAPITAL OUTLAY\n\n| Projects | 18/19 Approved |\n|-------------------------------------------------------------------------|----------------|\n| Park Restoration Project | 200,000 |\n| Culvert Extension | 6,630 |\n| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 1,563 |\n| Parking lot repairs, seal coat | 3,500 |\n| **TOTAL CAPITAL OUTLAY** | **211,693** |\n</text>\n",
"role": "user"
},
{
"content": "| Office driveway, parking lots restoration, remove dirt behind buildings (March Flood) | 31,250 |\n| Parking lot repairs, seal coat | 70,000 |\n| **TOTAL CAPITAL OUTLAY** | **101,250** |\n\n## WATER CAPITAL OUTLAY\n\n| Projects | 18/19 Approved |\n|-------------------------------------------------------------------------|----------------|\n| Downtown Groveland/BOF Rehab Planning | 189,108 |\n| AWS Tank 2 Booster System | 5,000 |\n| Water Pump Replacements | 30,000 |\n| Building Upgrades/Repairs | 68,000 |\n| General Water Distribution Improv.",
"role": "assistant"
}
] |
How to define a profitable and sustainable growth policy in a changing market? A case study: a small publishing company
Enzo Bivona
Master Phil. in System Dynamics University of Bergen – Norway CUSA System Dynamics Group P.zza A. Gentili, 12 – 90143 Palermo (Italy) Tel. +39.0916254313 – Fax. +39.0916254532 http://www.unipa.it/~bianchi – E-mail: [email protected]
: business system, small business, sustainable growth model, system dynamics
Keywords
Abstract
A tireless architect founded Grafill, a small book publishing company, at the end of the 80s. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the last two years, both the number of books published and software released, and their relative prices have been sharply increased. Such business strategy contributed to strongly increase company sales revenues, but it didn't generate a proportional growth in company bank balance. Such period has been also characterised by investments in E-commerce and related customer services, which shows a growing contribution in terms of company sales. On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce the number of product to be launched and E-commerce activities. Such growth policy, according to owner's vision, will enhance virtuous circles that will allow the firm to increase direct sales and related margin, so that to finance further business development. A system dynamics modelling approach has been adopted to better understand business areas interconnections, to assess sustainable strategies and to share learning among the entrepreneur and his direct collaborators.
The firm as a dynamic system: implication for business management policies
The continuous changes in technological innovation and its fast development have strongly contributed to increase small businesses' complexity and difficulties in coping with new market dynamics. The relevance of such aspects is obvious in all firms, but it assumes a critical role in small firms. Such companies are very often characterised by limited financial and management resources and, as a consequence, a reactive rather than proactive business growth strategy may easily lead to business failure. A case study has been analysed – by the light of the sustainable growth model combined with the system dynamics perspective – to provide insights and
contributions in helping both small and medium enterprises (SMEs) and academic researchers in better understanding and designing SMEs' sustainable growth strategies.
A prerequisite to define a profitable and sustainable growth policy in a changing market is to understand the interrelationships among company sub-systems and between the firm and its relevant environment. For this reason, it has been adopted a business framework analysis to depict the firm as an interrelationship of variables that continuously interact with the environment. In fact, by adopting a system perspective, a firm can be seen as a dynamic interrelationship of different elements or variables aimed to pursue company goals. In particular, a company can be represented through a combination of three main elements: 1) a structure in terms of resources (e.g., capital, personnel, organisation) that represents the backbone of the company; 2) management activities, that can be distinguished in operational and strategic. Operational activities are usually short term oriented and focused on efficient utilisation of available company resources (e.g., equipment, human resource). Strategic management activities are long term-oriented decisions, aimed to define company targets and related policies and organisational structure. Indeed, in SMEs such distinction becomes very hard because they are often characterised by unstructured management organisation (e.g., not well-defined personnel roles) and what can be defined as 'operational' in the short term could become 'strategic' in the meantime (Bianchi and Bivona, 2000). For instance, operational management activities through an efficient utilisation of company resources based on costs reduction, a standard customer's services (i.e., based on low lead time) can also generate strategic outcomes that may allow the firm to easily catch up business goals. And, finally, 3) management results represent the third aspect of the firm. Management activities are often measured by using indicators to take into account financial (e.g., return on investment, return on equity, debts/equity ratio), competitive (e.g., market shares, number of customers) and social (e.g., personnel, shareholders and financial institution satisfaction) results and to capture business growth. In particular, business growth can be analysed according two dimensions: a 'quantitative growth' characterised by an increasing in company turnover, human resources, etc., and a 'qualitative growth' in terms of human resources skills, innovation, business flexibility in adapting to environmental changes. Such distinction is helpful to identify apparent (i.e., only quantitative) and short term from real and sustainable medium/long term business growth.
Figure 1 – The Business System
STRUCTURE
RESULTS
THE
ENVIRON-
MENT
STRATEGIC
MANAGEMENT
STRATEGIC
MANAGEMENT
OPERATIONAL
MANAGEMENT
OPERATIONAL
MANAGEMENT
THE FIRM
(Source: Coda, 1989)
As we can see from the above figure, efficient operational management activities and effective strategic management activities could modify the business structure of the firm, on the basis of the environment's changes, leading to firm growth. Such modified business structure could foster virtuous circles that may allow the firm to reach/maintain both a sustainable competitive advantage and financial business equilibrium. On the contrary, inconsistent management activities could generate eroding processes of company resources leading to business crisis. In fact, if business growth is generated by chance and is not well supported by coherent strategic and operational management activities, a potential business failure may eventually result.
The above framework is an important first step to define the main forces that have to be taken into consideration to sketch a growth policy for a firm. However, to focus on the relevant aspects that could influence business growth, it is necessary to follow a selective approach. Often, one of the main problems for management is the following: given several external forces, how can the firm monitor all environmental conditions? In defining an effective environmental framework of analysis, Grant (1995) suggests to distinguish vital from merely important forces. In particular, he suggests that a firm should focus on its network of business relationships that is formed by competitors, suppliers, and customers. He also states that this is not to say that general environmental factors such as economic, social or political trends are unimportant, but they may be critical determinants of the threats and opportunities a company could cope with in the near future. Indeed, in a changing and unpredictable business environment company strategies can not neglect
to take into account macro-environmental forces such as technological, social, national/international developments that in today's economy are strongly affecting firm dynamics (i.e., "the new economy"). Understanding business internal interconnections and the relationships between the firm and the environment in which it operates will help us in supporting how to define a business growth strategy and to seek for relevant forces that could play a crucial role in such analysis. In defining a business growth policy the strategic and accounting literature suggest to take into account the sustainable growth model. In particular, this paper aims to combine such an approach with the system dynamics perspective and apply it to a case study.
Company sustainability
According to the business management literature, a firm in pursuing business goals has to take into account either internal (e.g., owners, employees) and external (e.g., banks) business key-actors expectations and it has to maintain an economic and financial equilibrium. In particular, a firm to reach a sustainable pattern should be able to dynamically take into account all previous remarks. For example, business success based on aggressive commercial policies that generates in the shortmedium term financial shortages could cause banks' complains and, as a consequence, a reduction in available bank credit leading to a business liquidity crisis and subsequently a company failure. From the above statements it is possible to observe that a company to sustain or reach a given market position has to be able to:
a) promptly adapt its business structure to new market conditions (Durability);
b) self-finance its business activities in pursuing business goals (Autonomy), and
c) achieve a financial equilibrium (Profitability).
The structure reported in figure 2 allows one to capture the basic factors that can lead to virtuous business cycle. Nevertheless, to define a sustainable growth policy all previous aspects have to be combined with a business growth rate suitable with the competitive arena dynamics. Such business growth has also to be in consonance with a balanced financial structure according to the equity owners' strategies and external key-actors' expectations (e.g., banks and financial institutions). In other words, a sustainable growth strategy has to allow the firm to achieve a satisfactory business growth, profitability and liquidity ratio taking also into account environmental dynamics and owners' requests.
Traditionally, the relationships between growth, profitability and assets changes have been analysed through the sustainable growth model (Zakon, 1966). Such a model is one of the cornerstones in the financial literature, to which both researchers and practitioners have been referring over the last decades. This model suggests that growth could be internally sustainable, if the net assets growth rate is not higher than the retained earnings growth rate. A first version of the sustainable growth model, that is the sustainable 'internal' growth model, is only based on the current internal flow of funds (Current Income + Depreciation). Such statement is due to the following assumptions: (1) capital investments are considered as a scarce resource, both in terms of equity investments and debts, and (2) the management desire to maintain the actual financial structure. In other words, market difficulties to find out financial sources, on a side, and the financial structure desired by the management, on the other, force the firm to finance business growth through current internal flow of funds.
According to such model, a company can grow – without external capital investments and changes in the financial structure – according to its ability to generate internal flow of funds. In particular, if company internal sustainable growth rate is expressed as 'Delta equity percentage' and the current internal flow of funds as Retained earnings percentage divided by equity, company internal sustainable growth rate (g) can be seen as follows:
If we observe that 'Retained earnings' is equal to 'Net income – Dividends', through some mathematical operations, the previous formula can be expressed as follows:
1 g = company internal sustainable growth rate (% changes in initial equity); Retained earnings/Equity = current internal flow of funds %
2 Some of the most common used measures to evaluate business profitability are: the 'Return of Investment' ratio (ROI), which shows the ability of the operational activities to generate income from a given level of investment, and the
In other words, if a company foresees to reach a ROE = 20% and to distribute the 30% of the Net income (d = 0,3), it can self-finance an assets growth equal to 14% (20%* 0,7).
In reality such model embodies some limits related to the ability of the firm to find out new financial sources and owners' willingness to accept changes in the business financial structure. Such limitations can easily be overcome by reviewing the previous formula.
As we can observe from the above formula [3a], the business sustainable growth rate is characterised by three components:
1. Retained earnings/Equity(t) = changes in assets % due to changes in current internal flow of funds;
2. ∆ New Equity Investments(t)/Equity(t) = changes in assets % due to new equity investments;
3. (Debts(t+1) – Equity(t+1))/A(t) = changes in assets % due to changes in the debts/equity ratio.
A raise in all these three factors contributes to increase the business sustainable growth rate. In fact, an increase in retained earnings, equity investments and in the amount of debts, by generating financial resources, encourages company growth. In particular, it is worth remarking that high dividend if, on a side, satisfies business-owners' requirements and expectations, on the other, drains financial resources that could fuel further business growth. As a consequence a company that wants both to maintain a specific growth rate and to reward equity investments according to businessowners' expectations has to increase business operating profitability and/or its debts to equity ratio. Nevertheless, an increase in debts could provide new financial resources and, hence, generate further growth if the cost of borrowing is lower than the return on net assets. Such statement is directly related to the correct use of financial leverage. In fact, in such a case an increase in net profitability generates new financial resources leading to further business growth. An example will help the reader to better understand the above formula [3a].
'Return on Equity' ratio (ROE), which is the relation between the net income generated by all business activities and the amount of the equity invested.
d = Dividends paid % (Dividends Paid/Net Income).
ROE = Net Income/Equity
3 g * = sustainable growth rate
Equity(t+1) = Equity at the end of the budget period
A(t) = Ending total assets from the previous period Equity(t) = Equity at the beginning of the budget period
∆
A(t)= Changes in Assets.
At the beginning of the budget period, a company appears as follows: Assets (A(t)) = 1000, Equity(t) = 500 and Debts(t) = 500. For the budget period, the company foresees:
- ROE = 20% (Net Income/Assets(t));
- d = 0,4;
- New Equity Investments (t) = 100;
- Debts/Equity ratio target (Debts(t+1) /Equity(t+1)) = 1,5.
On the basis of such figures, at the end of the budget period Equity could reach 660 (initial equity, 500, plus net income retained, 60, plus new equity investments, 100) and the amount of the debts could be equal to 990 (Debts(t+1) /Equity(t+1) = 1,5 and, hence, Debts = 660*1,5=990).
Hence,
The above formula shows that the:
- company can internally finance business growth equal to 12% (100*(1-0.4)/500);
- new equity investments contribute to increase business growth rate for 20%, and
- changes in debts provide an increase of the 33% of the company sustainable growth rate.
In conclusion, such figure shows that the assets at the end of the budget period could grow up to 1650 (+ 65%) in compliance with the business financial structure desired by the management.
The above formula [3a] provides a simplified schema to figure out the relationships between the variables embodied in the business system. Understanding such links allows the management to improve business decisions aimed to achieve the desired business growth rate under a pre-defined profitability and debts to equity conditions. Such discussion can be reviewed on the basis of the diagram portrayed in figure 3. The causal and effects diagram shows how the three main business variables/decisions (e.g., retained earnings, new equity investments and the amount of debts) could foster or slow down company growth. In particular, an increase in retained earnings could generates internal flow of funds, enhances further business growth and gives rise to operating (ROI) and net (ROE) investment returns. Such business growth, by increasing ROE, will decrease the debts/equity
ratio and, as a consequence, the interest cost. Then, a reduction in interest cost will produce a further increase in ROE. Such interrelationships will generate, in the short time period, a virtuous circle that can easily feed business growth. But as equity will increase ROE will fall down. Afterwards, low returns could arouse owner's complains leading to a reduction in retained earnings. Consequently, the entrepreneur has to find out new ways to generate further growth. Furthermore, in case the debts/equity ratio is reaching high value, banks and/or suppliers could start to reduce company available credits, so that it will be necessary to restore the level of debts by increasing equity investments. But, if on a side such policy could re-establish the debts/equity ratio to a suitable level, on the other it will fall down 'again' net business returns. Such side effect represents a strong limit to business growth. In fact, low margin will produce equity owner's complains leading to an increase in dividends, a reduction in financial funds and as result business growth will slow down.
Figure 3 also embodied a new variable: 'Personal Assets'. This variable has been added because it captures a peculiar aspect in SMEs' context. In such firms, family asset is often the main means to fulfil business growth. In fact, when financial institutions and/or business suppliers are not willing to increase firm credits and, hence, to finance further company growth, a firm can only try to win their reluctance by bringing new equity investments. In the following section the sustainable growth model has been applied a case study.
A small publishing company
At the end of the 80s, a tireless architect founded Grafill, a small book publishing company. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the first 6 th years Grafill faced a growing trend in the number of review subscribers and clients that never seemed to end up. Both sales revenues and bank accounts grew up, and a new employer was hired. But, such positive trend stopped at the end of the 7 th years. As consequence, the owner starts to ask himself the following questions: how can be explained such a raise and fall in number of subscribers? What could cause such a decreasing pattern? How can a sustainable growth policy be designed and achieved? Does company growth requires further equity investments?
The owner-entrepreneur believed that an increase in the number of products launched will strongly contribute to increase Grafill's customers, sales revenues and bank balance. As a consequence, during the last two years, Grafill operational activities have been mainly devoted to slightly increase the number of books and software launched and to regularly publish its monthly magazine.
In addition, such period has been also characterised by a resources investment in E-commerce and related customer services, which shows a growing contribution, even if marginal, in terms of company sales.
The business strategy implemented by the owner – as expected – contributed to increase company sales revenues, but it didn't generate a proportional growth in company bank balance (see also appendix 1).
As we can observe in figure 5 Grafill's sale revenues grow up, while bank balance shows a decreasing pattern. Even though such strategy requires an increase in financial debts, it allows the company to reach an average operating profitability (ROI) equal to 26% and an average net profitability equal to 17%.
On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce this strategy (that is mainly based on an increase in Grafill's portfolio products, see figure 4) by launching 3 products monthly. Furthermore, dues to market demand changes and Internet development, the entrepreneur is also oriented to invest on customer's E-commerce related services. For this reason, he prognosticates to increase E-commerce investments and to hire a new employer. Such decision aims to establish a direct link with the final customer, to shrink the distribution channel and, hence, increase company sales margin. The owner-entrepreneur believes that an increase in customers' related services tied to the "New Economy" (i.e., on line commerce) will not only increase company customers and sales, but will also improve company image. Such growth policy, according to owner's vision, will
enhance virtuous circles (i.e., based on word of mouth) that will allow the firm to increase direct sales and related margin, so that to finance further business development.
This strategy has been 'simulated' through a spreadsheet-based financial model (A summary of Grafill Income and financial statement has been reported in table 1).
Table 1 – Grafill's results budget (2000 – 2001)
Figures 7 and 8 reported above show that entrepreneur's growth strategy allows the firm to increase business operating and net profitability. In particular, such a profitability growth is mainly due to a sharply increase in direct sales (E-commerce) that lets Grafill to pursue an increase in sales revenues margin. Another effect of such policy is related to business liquidity. As we can observe from figure 6 company bank balance at end of the first year budget (31-12-2000) shows a decreasing pattern (-195.735), even if it starts to increase during the second year budget (-133.541). It is worth remarking that, at the beginning of the 2000, Grafill's bank balance was equal to – 78.263. In particular, figure 7 portrays Grafill's profitability and debts/equity ratio dynamics. During 2000 the debts to equity ratio shows a strong increase, but during the next year it goes slowly down. On the basis of such results, the owner entrepreneur is asking if this is a sustainable growth strategy. To answer such a question it has been applied the sustainable growth model. According to the Grafill's budget results (2000-2001), it is possible to detect the following information:
- average ROE = 35%; d = 0.3; New Equity Investments (t) = 0, and the desired debts to equity ratio (Debts(t+1) /Equity(t+1)) =1,5.
On the basis of such information the sustainable business growth rate would be:
In other words, such estimation tells us that the total assets during the budget period can grow up from 425.797 to 715.339 (+68%) without changing the financial equilibrium defined by the ownerentrepreneur. In conclusion, according to the business sustainable growth model and owner's requirements (e.g., dividends, new equity investments debts/equity ratio) the suggested Grafill's
growth strategy which requires an increase in capital invested equal to 68% [716.023-425.797)/ 425.797], can be defined as "sustainable".
During last 30 years, the sustainable growth model has been mainly appreciated both for its simplicity and its useful suggestions during the budgeting process. In particular, it seems to strongly support managers to evaluate ex-ante the sustainability of business growth policies, according to a given financial structure and owner's requirement. Such model also looks useful to investigate expost analysis. In fact, entrepreneurs could evaluate periodically (i.e., quarterly) business reports by detecting possible variances, analysing their causes and implementing new decisions to achieve the desired business results.
However, although it is simple and relatively ready-to-use, it appears more useful for an ex-post analysis, rather than to support entrepreneurs in setting their growth policies for the future. Among its limits, it is possible to observe that it does not make explicit causal determinants of profitability and business liquidity; it does not take into consideration the 'time' variable (i.e. delays between causes and effects) and the dynamic feedback relationships between growth, profitability and liquidity. As a matter of fact, an analysis aimed to design a sustainable business growth policy can not discard to analyse the 'dynamic' interrelationships between business growth and company health. In order to overcame such weakness it has been built a system dynamics model.
The system dynamics methodology has been applied to take into account the dynamic interrelationship inside the firm and between the firm and the environment in which it operates. In particular, the simulation model 'dynamically' depicts the interrelationships between profitability, liquidity and business growth and the relationships between company perceived solidity and external key actors' expectations/consensus. For instance, available bank credit will increase as company turnover and equity will grow up, and vice-versa. In fact, the system dynamics methodology allows one not only to make explicit and dynamic the implicit, linear and static feedback relationships suggested by the owner-entrepreneur (i.e., see figure 4), but also to explore the existing relation between business results and external consensus (i.e., banks and suppliers requirements). The feedback relationships suggested by owner have been made explicit and embodied in the system dynamics simulation model (see figure 8).
In particular, figure 8 captures the positive relationships between the following variables: 'number of company products launched' and company growth. In fact, an increase in company's products launched could generate a growth in company sales, and by generating new financial resources could feed further business growth. At the same time, a raise in return on assets could boost personal assets that through an increase in business solidity perceived by external actors generates a growth in available bank credit. As a consequence, an increase in financial resources could feed further rise in the number of products launched. On the basis of such relationships, the growth strategy suggested by the owner-entrepreneur has been simulated through a system dynamics simulation model. It is worth remarking that the simulation period has been divided in 192 weeks (4 years) and, while the first two years are referred to 1998-1999 the next two years are referred to the budget period (2000-2001).
As we can see from figure 9, company customers increase as the number of products launched growth up. Such a growth also generates an increase in customers' orders and company sales revenues. In particular, due to entrepreneur's decision to invest in E-commerce activities (see figure 10), for instance, web site improvement, security payment, etc., it is possible to observe a strong increase in direct sales revenues.
System Dynamics simulation model
The reader will already noted that the above figures portray Grafill's variables dynamic until week 157. Such factor is mainly due to an unexpected phenomenon that by draining financial resources has generated a financial shortage leading to a business crisis.
The owner-entrepreneur's growth strategy based on an increase in products launched and Ecommerce investments allows the company to boost sales revenues and to achieve the expected level of profitability foreseen in the budget plan. But, as the amount of books and software released increase, the inventory grows up as well as the accounts receivable. Such an increase generates a higher level of financial resources needed to feed business growth. In fact, as Grafill's net working
capital 4 increases bank balance goes down until it reaches the available bank credit (that is the amount of financial resources provided by financial institutions) leading to a business failure. In other words, even though the business growth strategy suggested is profitable (net income shows positive values and an increasing behaviour), the flow of financial resources generated by such strategy does not allow Grafill to reach and maintain a sustainable growth pattern. Such phenomenon can be observed in figure 11 (Grafill simulated results have been also reported in table 2).
Why does the system dynamics simulation model portray different results from those generated by the spreadsheet model based on the sustainable growth model?
First of all, besides the sustainable growth model limitations stated in the previous pages it is worth remarking that such model being a 'synthetic' indicator does not capture the main business variables dynamics. In particular, it does not make explicit the dynamic of the financial resources needed during the budget period (Brunetti, 1983). Thus, even if the foreseen profitability and equity changes suggested by a growth strategy, which has been identified as 'sustainable', could be matched 'in reality', it may happen that during the budget period a company could face with liquidity shortages. Such phenomenon, by reducing company bank balance could generate a vicious circle (negative bank balance ⇒ higher interest costs ⇒ higher negative bank balance) that could
4 Net working capital = Account receivables + Inventory – Account Payables.
lead to business failure. Moreover, the existing delays between decisions and effects also contribute to generate behaviours that could look different form those foreseen in the budget plan. Introducing a feedback and dynamic perspective during the drawing up of a company budget allows participants to evaluate the sustainability of a business growth strategy not only by taking into account business variables values at beginning and at end of the budget plan, but also, and in particular, their dynamics during such period. This analysis also provides to entrepreneur and his collaborators an explicit framework to be discussed and modified according to their own vision and external key actors' requirements. Furthermore, the system dynamics simulation model trough a user-friendly interface and a spreadsheet data-interchange 5 allows users to test ex-ante in a 'safe' environment their decisions and related 'implicit' expectations. Understanding causal relationships underlying business results it is possible to feed a double loop learning (Davidsen 1996; Sterman, 1994) which could support decision makers in detecting inconsistencies in their mindsets and, hence, improving the decision making process. Therefore, to design a sustainable growth strategy decision maker needed to take into account the dynamic interrelationships between business growth and its drivers in compliance with a balanced business financial structure, a satisfactory business profitability and liquidity, which may allow the firm to gain both internal and external key actors' consensus (Winch, 1993).
In conclusion, this paper aims to highlight some of the limits of the sustainable growth model and to suggest a way to overcome such partial analysis. It has been demonstrated that a feedback approach could useful support small business entrepreneurs in assessing their business growth strategies, in compliance with a desired profitability level, a desired balance financial structure and external key actors' requirements.
5 The system dynamics model allows users to make their decisions and check business results both in the System Dynamics package and in a spreadsheet model.
Table 2 – Grafill simulated results 2000 – 2001
Appendix 1 – Grafill Balance sheet 98 – 99 6
6 Due to privacy reasons all figures have been modified.
REFERENCE
Airoldi G., Brunetti G., Coda V. (1989). Introduction to Business Management (Original title: Lezioni di Economia Aziendale), Il Mulino, Bologna, Italy
Brunetti G. (1983). Managing financial resources (Original title: Il governo delle risorse finanziarie: il modello dello sviluppo sostenibile), in Banche e Banchieri, n. 10, pp. 800.
Bianchi C. and Bivona E.(2000) Commercial & Financial Policies in Family Firms:
The Small
, in: Special Issue on "Interactive Learning
Business Growth Management Flight Simulator
Environments", edited by Proff. Paal Davidsen e Mike Spector, Simulation & Gaming, Sage Publications
Coda, V. (1989). Business Strategic Positioning (Original title: L'Orientamento Strategico dell'Impresa), UTET, Turin, Italy, 7-11.
Davidsen, P. I. (1996). Educational features of the system dynamics approach to modelling and simulation. Journal of Structured Learning, 12(4), 269-290.
Forrester J., (1994). Policies, Decisions, and Information Sources for Modeling, in Morecroft J. & Sterman J. (1994). Modeling for Learning Organizations, Productivity Press, Portland, Oregon, 5184.
Grant R. M. (1995). Contemporary Strategy Analysis: Concepts, techniques, Applications, 2 nd ed., Blackwell, Cambridge Massachusetts.
Sterman, J. D. (1994). Learning in and about complex systems. System Dynamics Review, 10(2-3), 291-330.
Winch G. (1993). Consensus Building in the Planning Process: Benefits From a "Hard" Modeling Approach, in System Dynamics Review, vol. 9, n. 3, 287-300.
Zakon A. (1966). Growth and Financial Strategies , Boston Consulting Group, Boston, Mass.
|
<urn:uuid:9e34dc4f-d6a1-40a1-9fe2-32c85a0371de>
|
CC-MAIN-2023-40
|
https://proceedings.systemdynamics.org/2000/PDFs/bivona34.pdf
|
2023-09-28T03:58:16+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-40/subset=warc/part-00076-7aa0a1e5-33a6-434b-89a2-950f294b40c1.c000.gz.parquet
| 514,235,856
| 6,681
|
eng_Latn
|
eng_Latn
| 0.961112
|
eng_Latn
| 0.996119
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2730,
5489,
7493,
9296,
12097,
14569,
16541,
18179,
19598,
21302,
21692,
23472,
26019,
27438,
28217,
29813,
31985,
32034,
32138,
33744
] |
How to define a profitable and sustainable growth policy in a changing market? A case study: a small publishing company
Enzo Bivona
Master Phil. in System Dynamics University of Bergen – Norway CUSA System Dynamics Group P.zza A. Gentili, 12 – 90143 Palermo (Italy) Tel. +39.0916254313 – Fax. +39.0916254532 http://www.unipa.it/~bianchi – E-mail: [email protected]
: business system, small business, sustainable growth model, system dynamics
Keywords
Abstract
A tireless architect founded Grafill, a small book publishing company, at the end of the 80s. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the last two years, both the number of books published and software released, and their relative prices have been sharply increased. Such business strategy contributed to strongly increase company sales revenues, but it didn't generate a proportional growth in company bank balance. Such period has been also characterised by investments in E-commerce and related customer services, which shows a growing contribution in terms of company sales. On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce the number of product to be launched and E-commerce activities. Such growth policy, according to owner's vision, will enhance virtuous circles that will allow the firm to increase direct sales and related margin, so that to finance further business development. A system dynamics modelling approach has been adopted to better understand business areas interconnections, to assess sustainable strategies and to share learning among the entrepreneur and his direct collaborators.
The firm as a dynamic system: implication for business management policies
The continuous changes in technological innovation and its fast development have strongly contributed to increase small businesses' complexity and difficulties in coping with new market dynamics. The relevance of such aspects is obvious in all firms, but it assumes a critical role in small firms. Such companies are very often characterised by limited financial and management resources and, as a consequence, a reactive rather than proactive business growth strategy may easily lead to business failure. A case study has been analysed – by the light of the sustainable growth model combined with the system dynamics perspective – to provide insights and
contributions in helping both small and medium enterprises (SMEs) and academic researchers in better understanding and designing SMEs' sustainable growth strategies.
A prerequisite to define a profitable and sustainable growth policy in a changing market is to understand the interrelationships among company sub-systems and between the firm and its relevant environment. For this reason, it has been adopted a business framework analysis to depict the firm as an interrelationship of variables that continuously interact with the environment. In fact, by adopting a system perspective, a firm can be seen as a dynamic interrelationship of different elements or variables aimed to pursue company goals. In particular, a company can be represented through a combination of three main elements: 1) a structure in terms of resources (e.g., capital, personnel, organisation) that represents the backbone of the company; 2) management activities, that can be distinguished in operational and strategic. Operational activities are usually short term oriented and focused on efficient utilisation of available company resources (e.g., equipment, human resource). Strategic management activities are long term-oriented decisions, aimed to define company targets and related policies and organisational structure. Indeed, in SMEs such distinction becomes very hard because they are often characterised by unstructured management organisation (e.g., not well-defined personnel roles) and what can be defined as 'operational' in the short term could become 'strategic' in the meantime (Bianchi and Bivona, 2000). For instance, operational management activities through an efficient utilisation of company resources based on costs reduction, a standard customer's services (i.e., based on low lead time) can also generate strategic outcomes that may allow the firm to easily catch up business goals. And, finally, 3) management results represent the third aspect of the firm. Management activities are often measured by using indicators to take into account financial (e.g., return on investment, return on equity, debts/equity ratio), competitive (e.g., market shares, number of customers) and social (e.g., personnel, shareholders and financial institution satisfaction) results and to capture business growth. In particular, business growth can be analysed according two dimensions: a 'quantitative growth' characterised by an increasing in company turnover, human resources, etc., and a 'qualitative growth' in terms of human resources skills, innovation, business flexibility in adapting to environmental changes. Such distinction is helpful to identify apparent (i.e., only quantitative) and short term from real and sustainable medium/long term business growth.
Figure 1 – The Business System
STRUCTURE
RESULTS
THE
ENVIRON-
MENT
STRATEGIC
MANAGEMENT
STRATEGIC
MANAGEMENT
OPERATIONAL
MANAGEMENT
OPERATIONAL
MANAGEMENT
THE FIRM
(Source: Coda, 1989)
As we can see from the above figure, efficient operational management activities and effective strategic management activities could modify the business structure of the firm, on the basis of the environment's changes, leading to firm growth. Such modified business structure could foster virtuous circles that may allow the firm to reach/maintain both a sustainable competitive advantage and financial business equilibrium. On the contrary, inconsistent management activities could generate eroding processes of company resources leading to business crisis. In fact, if business growth is generated by chance and is not well supported by coherent strategic and operational management activities, a potential business failure may eventually result.
The above framework is an important first step to define the main forces that have to be taken into consideration to sketch a growth policy for a firm. However, to focus on the relevant aspects that could influence business growth, it is necessary to follow a selective approach. Often, one of the main problems for management is the following: given several external forces, how can the firm monitor all environmental conditions? In defining an effective environmental framework of analysis, Grant (1995) suggests to distinguish vital from merely important forces. In particular, he suggests that a firm should focus on its network of business relationships that is formed by competitors, suppliers, and customers. He also states that this is not to say that general environmental factors such as economic, social or political trends are unimportant, but they may be critical determinants of the threats and opportunities a company could cope with in the near future. Indeed, in a changing and unpredictable business environment company strategies can not neglect
to take into account macro-environmental forces such as technological, social, national/international developments that in today's economy are strongly affecting firm dynamics (i.e., "the new economy"). Understanding business internal interconnections and the relationships between the firm and the environment in which it operates will help us in supporting how to define a business growth strategy and to seek for relevant forces that could play a crucial role in such analysis. In defining a business growth policy the strategic and accounting literature suggest to take into account the sustainable growth model. In particular, this paper aims to combine such an approach with the system dynamics perspective and apply it to a case study.
Company sustainability
According to the business management literature, a firm in pursuing business goals has to take into account either internal (e.g., owners, employees) and external (e.g., banks) business key-actors expectations and it has to maintain an economic and financial equilibrium. In particular, a firm to reach a sustainable pattern should be able to dynamically take into account all previous remarks. For example, business success based on aggressive commercial policies that generates in the shortmedium term financial shortages could cause banks' complains and, as a consequence, a reduction in available bank credit leading to a business liquidity crisis and subsequently a company failure. From the above statements it is possible to observe that a company to sustain or reach a given market position has to be able to:
a) promptly adapt its business structure to new market conditions (Durability);
b) self-finance its business activities in pursuing business goals (Autonomy), and
c) achieve a financial equilibrium (Profitability).
The structure reported in figure 2 allows one to capture the basic factors that can lead to virtuous business cycle. Nevertheless, to define a sustainable growth policy all previous aspects have to be combined with a business growth rate suitable with the competitive arena dynamics. Such business growth has also to be in consonance with a balanced financial structure according to the equity owners' strategies and external key-actors' expectations (e.g., banks and financial institutions). In other words, a sustainable growth strategy has to allow the firm to achieve a satisfactory business growth, profitability and liquidity ratio taking also into account environmental dynamics and owners' requests.
Traditionally, the relationships between growth, profitability and assets changes have been analysed through the sustainable growth model (Zakon, 1966). Such a model is one of the cornerstones in the financial literature, to which both researchers and practitioners have been referring over the last decades. This model suggests that growth could be internally sustainable, if the net assets growth rate is not higher than the retained earnings growth rate. A first version of the sustainable growth model, that is the sustainable 'internal' growth model, is only based on the current internal flow of funds (Current Income + Depreciation). Such statement is due to the following assumptions: (1) capital investments are considered as a scarce resource, both in terms of equity investments and debts, and (2) the management desire to maintain the actual financial structure. In other words, market difficulties to find out financial sources, on a side, and the financial structure desired by the management, on the other, force the firm to finance business growth through current internal flow of funds.
According to such model, a company can grow – without external capital investments and changes in the financial structure – according to its ability to generate internal flow of funds. In particular, if company internal sustainable growth rate is expressed as 'Delta equity percentage' and the current internal flow of funds as Retained earnings percentage divided by equity, company internal sustainable growth rate (g) can be seen as follows:
If we observe that 'Retained earnings' is equal to 'Net income – Dividends', through some mathematical operations, the previous formula can be expressed as follows:
1 g = company internal sustainable growth rate (% changes in initial equity); Retained earnings/Equity = current internal flow of funds
|
%
2 Some of the most common used measures to evaluate business profitability are: the 'Return of Investment' ratio (ROI), which shows the ability of the operational activities to generate income from a given level of investment, and the
In other words, if a company foresees to reach a ROE = 20% and to distribute the 30% of the Net income (d = 0,3), it can self-finance an assets growth equal to 14% (20%* 0,7).
|
In reality such model embodies some limits related to the ability of the firm to find out new financial sources and owners' willingness to accept changes in the business financial structure. Such limitations can easily be overcome by reviewing the previous formula.
As we can observe from the above formula [3a], the business sustainable growth rate is characterised by three components:
1. Retained earnings/Equity(t) = changes in assets % due to changes in current internal flow of funds;
2. ∆ New Equity Investments(t)/Equity(t) = changes in assets % due to new equity investments;
3. (Debts(t+1) – Equity(t+1))/A(t) = changes in assets % due to changes in the debts/equity ratio.
A raise in all these three factors contributes to increase the business sustainable growth rate. In fact, an increase in retained earnings, equity investments and in the amount of debts, by generating financial resources, encourages company growth. In particular, it is worth remarking that high dividend if, on a side, satisfies business-owners' requirements and expectations, on the other, drains financial resources that could fuel further business growth. As a consequence a company that wants both to maintain a specific growth rate and to reward equity investments according to businessowners' expectations has to increase business operating profitability and/or its debts to equity ratio. Nevertheless, an increase in debts could provide new financial resources and, hence, generate further growth if the cost of borrowing is lower than the return on net assets. Such statement is directly related to the correct use of financial leverage. In fact, in such a case an increase in net profitability generates new financial resources leading to further business growth. An example will help the reader to better understand the above formula [3a].
'Return on Equity' ratio (ROE), which is the relation between the net income generated by all business activities and the amount of the equity invested.
d = Dividends paid % (Dividends Paid/Net Income).
ROE = Net Income/Equity
3 g * = sustainable growth rate
Equity(t+1) = Equity at the end of the budget period
A(t) = Ending total assets from the previous period Equity(t) = Equity at the beginning of the budget period
∆
A(t)= Changes in Assets.
At the beginning of the budget period, a company appears as follows: Assets (A(t)) = 1000, Equity(t) = 500 and Debts(t) = 500. For the budget period, the company foresees:
- ROE = 20% (Net Income/Assets(t));
- d = 0,4;
- New Equity Investments (t) = 100;
- Debts/Equity ratio target (Debts(t+1) /Equity(t+1)) = 1,5.
On the basis of such figures, at the end of the budget period Equity could reach 660 (initial equity, 500, plus net income retained, 60, plus new equity investments, 100) and the amount of the debts could be equal to 990 (Debts(t+1) /Equity(t+1) = 1,5 and, hence, Debts = 660*1,5=990).
Hence,
The above formula shows that the:
- company can internally finance business growth equal to 12% (100*(1-0.4)/500);
- new equity investments contribute to increase business growth rate for 20%, and
- changes in debts provide an increase of the 33% of the company sustainable growth rate.
In conclusion, such figure shows that the assets at the end of the budget period could grow up to 1650 (+ 65%) in compliance with the business financial structure desired by the management.
The above formula [3a] provides a simplified schema to figure out the relationships between the variables embodied in the business system. Understanding such links allows the management to improve business decisions aimed to achieve the desired business growth rate under a pre-defined profitability and debts to equity conditions. Such discussion can be reviewed on the basis of the diagram portrayed in figure 3. The causal and effects diagram shows how the three main business variables/decisions (e.g., retained earnings, new equity investments and the amount of debts) could foster or slow down company growth. In particular, an increase in retained earnings could generates internal flow of funds, enhances further business growth and gives rise to operating (ROI) and net (ROE) investment returns. Such business growth, by increasing ROE, will decrease the debts/equity
ratio and, as a consequence, the interest cost. Then, a reduction in interest cost will produce a further increase in ROE. Such interrelationships will generate, in the short time period, a virtuous circle that can easily feed business growth. But as equity will increase ROE will fall down. Afterwards, low returns could arouse owner's complains leading to a reduction in retained earnings. Consequently, the entrepreneur has to find out new ways to generate further growth. Furthermore, in case the debts/equity ratio is reaching high value, banks and/or suppliers could start to reduce company available credits, so that it will be necessary to restore the level of debts by increasing equity investments. But, if on a side such policy could re-establish the debts/equity ratio to a suitable level, on the other it will fall down 'again' net business returns. Such side effect represents a strong limit to business growth. In fact, low margin will produce equity owner's complains leading to an increase in dividends, a reduction in financial funds and as result business growth will slow down.
Figure 3 also embodied a new variable: 'Personal Assets'. This variable has been added because it captures a peculiar aspect in SMEs' context. In such firms, family asset is often the main means to fulfil business growth. In fact, when financial institutions and/or business suppliers are not willing to increase firm credits and, hence, to finance further company growth, a firm can only try to win their reluctance by bringing new equity investments. In the following section the sustainable growth model has been applied a case study.
A small publishing company
At the end of the 80s, a tireless architect founded Grafill, a small book publishing company. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the first 6 th years Grafill faced a growing trend in the number of review subscribers and clients that never seemed to end up. Both sales revenues and bank accounts grew up, and a new employer was hired. But, such positive trend stopped at the end of the 7 th years. As consequence, the owner starts to ask himself the following questions: how can be explained such a raise and fall in number of subscribers? What could cause such a decreasing pattern? How can a sustainable growth policy be designed and achieved? Does company growth requires further equity investments?
The owner-entrepreneur believed that an increase in the number of products launched will strongly contribute to increase Grafill's customers, sales revenues and bank balance. As a consequence, during the last two years, Grafill operational activities have been mainly devoted to slightly increase the number of books and software launched and to regularly publish its monthly magazine.
In addition, such period has been also characterised by a resources investment in E-commerce and related customer services, which shows a growing contribution, even if marginal, in terms of company sales.
The business strategy implemented by the owner – as expected – contributed to increase company sales revenues, but it didn't generate a proportional growth in company bank balance (see also appendix 1).
As we can observe in figure 5 Grafill's sale revenues grow up, while bank balance shows a decreasing pattern. Even though such strategy requires an increase in financial debts, it allows the company to reach an average operating profitability (ROI) equal to 26% and an average net profitability equal to 17%.
On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce this strategy (that is mainly based on an increase in Grafill's portfolio products, see figure 4) by launching 3 products monthly. Furthermore, dues to market demand changes and Internet development, the entrepreneur is also oriented to invest on customer's E-commerce related services. For this reason, he prognosticates to increase E-commerce investments and to hire a new employer. Such decision aims to establish a direct link with the final customer, to shrink the distribution channel and, hence, increase company sales margin. The owner-entrepreneur believes that an increase in customers' related services tied to the "New Economy" (i.e., on line commerce) will not only increase company customers and sales, but will also improve company image. Such growth policy, according to owner's vision, will
enhance virtuous circles (i.e., based on word of mouth) that will allow the firm to increase direct sales and related margin, so that to finance further business development.
This strategy has been 'simulated' through a spreadsheet-based financial model (A summary of Grafill Income and financial statement has been reported in table 1).
Table 1 – Grafill's results budget (2000 – 2001)
Figures 7 and 8 reported above show that entrepreneur's growth strategy allows the firm to increase business operating and net profitability. In particular, such a profitability growth is mainly due to a sharply increase in direct sales (E-commerce) that lets Grafill to pursue an increase in sales revenues margin. Another effect of such policy is related to business liquidity. As we can observe from figure 6 company bank balance at end of the first year budget (31-12-2000) shows a decreasing pattern (-195.735), even if it starts to increase during the second year budget (-133.541). It is worth remarking that, at the beginning of the 2000, Grafill's bank balance was equal to – 78.263. In particular, figure 7 portrays Grafill's profitability and debts/equity ratio dynamics. During 2000 the debts to equity ratio shows a strong increase, but during the next year it goes slowly down. On the basis of such results, the owner entrepreneur is asking if this is a sustainable growth strategy. To answer such a question it has been applied the sustainable growth model. According to the Grafill's budget results (2000-2001), it is possible to detect the following information:
- average ROE = 35%; d = 0.3; New Equity Investments (t) = 0, and the desired debts to equity ratio (Debts(t+1) /Equity(t+1)) =1,5.
On the basis of such information the sustainable business growth rate would be:
In other words, such estimation tells us that the total assets during the budget period can grow up from 425.797 to 715.339 (+68%) without changing the financial equilibrium defined by the ownerentrepreneur. In conclusion, according to the business sustainable growth model and owner's requirements (e.g., dividends, new equity investments debts/equity ratio) the suggested Grafill's
growth strategy which requires an increase in capital invested equal to 68% [716.023-425.797)/ 425.797], can be defined as "sustainable".
During last 30 years, the sustainable growth model has been mainly appreciated both for its simplicity and its useful suggestions during the budgeting process. In particular, it seems to strongly support managers to evaluate ex-ante the sustainability of business growth policies, according to a given financial structure and owner's requirement. Such model also looks useful to investigate expost analysis. In fact, entrepreneurs could evaluate periodically (i.e., quarterly) business reports by detecting possible variances, analysing their causes and implementing new decisions to achieve the desired business results.
However, although it is simple and relatively ready-to-use, it appears more useful for an ex-post analysis, rather than to support entrepreneurs in setting their growth policies for the future. Among its limits, it is possible to observe that it does not make explicit causal determinants of profitability and business liquidity; it does not take into consideration the 'time' variable (i.e. delays between causes and effects) and the dynamic feedback relationships between growth, profitability and liquidity. As a matter of fact, an analysis aimed to design a sustainable business growth policy can not discard to analyse the 'dynamic' interrelationships between business growth and company health. In order to overcame such weakness it has been built a system dynamics model.
The system dynamics methodology has been applied to take into account the dynamic interrelationship inside the firm and between the firm and the environment in which it operates. In particular, the simulation model 'dynamically' depicts the interrelationships between profitability, liquidity and business growth and the relationships between company perceived solidity and external key actors' expectations/consensus. For instance, available bank credit will increase as company turnover and equity will grow up, and vice-versa. In fact, the system dynamics methodology allows one not only to make explicit and dynamic the implicit, linear and static feedback relationships suggested by the owner-entrepreneur (i.e., see figure 4), but also to explore the existing relation between business results and external consensus (i.e., banks and suppliers requirements). The feedback relationships suggested by owner have been made explicit and embodied in the system dynamics simulation model (see figure 8).
In particular, figure 8 captures the positive relationships between the following variables: 'number of company products launched' and company growth. In fact, an increase in company's products launched could generate a growth in company sales, and by generating new financial resources could feed further business growth. At the same time, a raise in return on assets could boost personal assets that through an increase in business solidity perceived by external actors generates a growth in available bank credit. As a consequence, an increase in financial resources could feed further rise in the number of products launched. On the basis of such relationships, the growth strategy suggested by the owner-entrepreneur has been simulated through a system dynamics simulation model. It is worth remarking that the simulation period has been divided in 192 weeks (4 years) and, while the first two years are referred to 1998-1999 the next two years are referred to the budget period (2000-2001).
As we can see from figure 9, company customers increase as the number of products launched growth up. Such a growth also generates an increase in customers' orders and company sales revenues. In particular, due to entrepreneur's decision to invest in E-commerce activities (see figure 10), for instance, web site improvement, security payment, etc., it is possible to observe a strong increase in direct sales revenues.
System Dynamics simulation model
The reader will already noted that the above figures portray Grafill's variables dynamic until week 157. Such factor is mainly due to an unexpected phenomenon that by draining financial resources has generated a financial shortage leading to a business crisis.
The owner-entrepreneur's growth strategy based on an increase in products launched and Ecommerce investments allows the company to boost sales revenues and to achieve the expected level of profitability foreseen in the budget plan. But, as the amount of books and software released increase, the inventory grows up as well as the accounts receivable. Such an increase generates a higher level of financial resources needed to feed business growth. In fact, as Grafill's net working
capital 4 increases bank balance goes down until it reaches the available bank credit (that is the amount of financial resources provided by financial institutions) leading to a business failure. In other words, even though the business growth strategy suggested is profitable (net income shows positive values and an increasing behaviour), the flow of financial resources generated by such strategy does not allow Grafill to reach and maintain a sustainable growth pattern. Such phenomenon can be observed in figure 11 (Grafill simulated results have been also reported in table 2).
Why does the system dynamics simulation model portray different results from those generated by the spreadsheet model based on the sustainable growth model?
First of all, besides the sustainable growth model limitations stated in the previous pages it is worth remarking that such model being a 'synthetic' indicator does not capture the main business variables dynamics. In particular, it does not make explicit the dynamic of the financial resources needed during the budget period (Brunetti, 1983). Thus, even if the foreseen profitability and equity changes suggested by a growth strategy, which has been identified as 'sustainable', could be matched 'in reality', it may happen that during the budget period a company could face with liquidity shortages. Such phenomenon, by reducing company bank balance could generate a vicious circle (negative bank balance ⇒ higher interest costs ⇒ higher negative bank balance) that could
4 Net working capital = Account receivables + Inventory – Account Payables.
lead to business failure. Moreover, the existing delays between decisions and effects also contribute to generate behaviours that could look different form those foreseen in the budget plan. Introducing a feedback and dynamic perspective during the drawing up of a company budget allows participants to evaluate the sustainability of a business growth strategy not only by taking into account business variables values at beginning and at end of the budget plan, but also, and in particular, their dynamics during such period. This analysis also provides to entrepreneur and his collaborators an explicit framework to be discussed and modified according to their own vision and external key actors' requirements. Furthermore, the system dynamics simulation model trough a user-friendly interface and a spreadsheet data-interchange 5 allows users to test ex-ante in a 'safe' environment their decisions and related 'implicit' expectations. Understanding causal relationships underlying business results it is possible to feed a double loop learning (Davidsen 1996; Sterman, 1994) which could support decision makers in detecting inconsistencies in their mindsets and, hence, improving the decision making process. Therefore, to design a sustainable growth strategy decision maker needed to take into account the dynamic interrelationships between business growth and its drivers in compliance with a balanced business financial structure, a satisfactory business profitability and liquidity, which may allow the firm to gain both internal and external key actors' consensus (Winch, 1993).
In conclusion, this paper aims to highlight some of the limits of the sustainable growth model and to suggest a way to overcome such partial analysis. It has been demonstrated that a feedback approach could useful support small business entrepreneurs in assessing their business growth strategies, in compliance with a desired profitability level, a desired balance financial structure and external key actors' requirements.
5 The system dynamics model allows users to make their decisions and check business results both in the System Dynamics package and in a spreadsheet model.
Table 2 – Grafill simulated results 2000 – 2001
Appendix 1 – Grafill Balance sheet 98 – 99 6
6 Due to privacy reasons all figures have been modified.
REFERENCE
Airoldi G., Brunetti G., Coda V. (1989). Introduction to Business Management (Original title: Lezioni di Economia Aziendale), Il Mulino, Bologna, Italy
Brunetti G. (1983). Managing financial resources (Original title: Il governo delle risorse finanziarie: il modello dello sviluppo sostenibile), in Banche e Banchieri, n. 10, pp. 800.
Bianchi C. and Bivona E.(2000) Commercial & Financial Policies in Family Firms:
The Small
, in: Special Issue on "Interactive Learning
Business Growth Management Flight Simulator
Environments", edited by Proff. Paal Davidsen e Mike Spector, Simulation & Gaming, Sage Publications
Coda, V. (1989). Business Strategic Positioning (Original title: L'Orientamento Strategico dell'Impresa), UTET, Turin, Italy, 7-11.
Davidsen, P. I. (1996). Educational features of the system dynamics approach to modelling and simulation. Journal of Structured Learning, 12(4), 269-290.
Forrester J., (1994). Policies, Decisions, and Information Sources for Modeling, in Morecroft J. & Sterman J. (1994). Modeling for Learning Organizations, Productivity Press, Portland, Oregon, 5184.
Grant R. M. (1995). Contemporary Strategy Analysis: Concepts, techniques, Applications, 2 nd ed., Blackwell, Cambridge Massachusetts.
Sterman, J. D. (1994). Learning in and about complex systems. System Dynamics Review, 10(2-3), 291-330.
Winch G. (1993). Consensus Building in the Planning Process: Benefits From a "Hard" Modeling Approach, in System Dynamics Review, vol. 9, n. 3, 287-300.
Zakon A. (1966). Growth and Financial Strategies , Boston Consulting Group, Boston, Mass.
| 11,869
|
inside_word
|
%
|
remove_one_sentence
|
<url>
https://proceedings.systemdynamics.org/2000/PDFs/bivona34.pdf
</url>
<text>
How to define a profitable and sustainable growth policy in a changing market? A case study: a small publishing company
Enzo Bivona
Master Phil. in System Dynamics University of Bergen – Norway CUSA System Dynamics Group P.zza A. Gentili, 12 – 90143 Palermo (Italy) Tel. +39.0916254313 – Fax. +39.0916254532 http://www.unipa.it/~bianchi – E-mail: [email protected]
: business system, small business, sustainable growth model, system dynamics
Keywords
Abstract
A tireless architect founded Grafill, a small book publishing company, at the end of the 80s. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the last two years, both the number of books published and software released, and their relative prices have been sharply increased. Such business strategy contributed to strongly increase company sales revenues, but it didn't generate a proportional growth in company bank balance. Such period has been also characterised by investments in E-commerce and related customer services, which shows a growing contribution in terms of company sales. On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce the number of product to be launched and E-commerce activities. Such growth policy, according to owner's vision, will enhance virtuous circles that will allow the firm to increase direct sales and related margin, so that to finance further business development. A system dynamics modelling approach has been adopted to better understand business areas interconnections, to assess sustainable strategies and to share learning among the entrepreneur and his direct collaborators.
The firm as a dynamic system: implication for business management policies
The continuous changes in technological innovation and its fast development have strongly contributed to increase small businesses' complexity and difficulties in coping with new market dynamics. The relevance of such aspects is obvious in all firms, but it assumes a critical role in small firms. Such companies are very often characterised by limited financial and management resources and, as a consequence, a reactive rather than proactive business growth strategy may easily lead to business failure. A case study has been analysed – by the light of the sustainable growth model combined with the system dynamics perspective – to provide insights and
contributions in helping both small and medium enterprises (SMEs) and academic researchers in better understanding and designing SMEs' sustainable growth strategies.
A prerequisite to define a profitable and sustainable growth policy in a changing market is to understand the interrelationships among company sub-systems and between the firm and its relevant environment. For this reason, it has been adopted a business framework analysis to depict the firm as an interrelationship of variables that continuously interact with the environment. In fact, by adopting a system perspective, a firm can be seen as a dynamic interrelationship of different elements or variables aimed to pursue company goals. In particular, a company can be represented through a combination of three main elements: 1) a structure in terms of resources (e.g., capital, personnel, organisation) that represents the backbone of the company; 2) management activities, that can be distinguished in operational and strategic. Operational activities are usually short term oriented and focused on efficient utilisation of available company resources (e.g., equipment, human resource). Strategic management activities are long term-oriented decisions, aimed to define company targets and related policies and organisational structure. Indeed, in SMEs such distinction becomes very hard because they are often characterised by unstructured management organisation (e.g., not well-defined personnel roles) and what can be defined as 'operational' in the short term could become 'strategic' in the meantime (Bianchi and Bivona, 2000). For instance, operational management activities through an efficient utilisation of company resources based on costs reduction, a standard customer's services (i.e., based on low lead time) can also generate strategic outcomes that may allow the firm to easily catch up business goals. And, finally, 3) management results represent the third aspect of the firm. Management activities are often measured by using indicators to take into account financial (e.g., return on investment, return on equity, debts/equity ratio), competitive (e.g., market shares, number of customers) and social (e.g., personnel, shareholders and financial institution satisfaction) results and to capture business growth. In particular, business growth can be analysed according two dimensions: a 'quantitative growth' characterised by an increasing in company turnover, human resources, etc., and a 'qualitative growth' in terms of human resources skills, innovation, business flexibility in adapting to environmental changes. Such distinction is helpful to identify apparent (i.e., only quantitative) and short term from real and sustainable medium/long term business growth.
Figure 1 – The Business System
STRUCTURE
RESULTS
THE
ENVIRON-
MENT
STRATEGIC
MANAGEMENT
STRATEGIC
MANAGEMENT
OPERATIONAL
MANAGEMENT
OPERATIONAL
MANAGEMENT
THE FIRM
(Source: Coda, 1989)
As we can see from the above figure, efficient operational management activities and effective strategic management activities could modify the business structure of the firm, on the basis of the environment's changes, leading to firm growth. Such modified business structure could foster virtuous circles that may allow the firm to reach/maintain both a sustainable competitive advantage and financial business equilibrium. On the contrary, inconsistent management activities could generate eroding processes of company resources leading to business crisis. In fact, if business growth is generated by chance and is not well supported by coherent strategic and operational management activities, a potential business failure may eventually result.
The above framework is an important first step to define the main forces that have to be taken into consideration to sketch a growth policy for a firm. However, to focus on the relevant aspects that could influence business growth, it is necessary to follow a selective approach. Often, one of the main problems for management is the following: given several external forces, how can the firm monitor all environmental conditions? In defining an effective environmental framework of analysis, Grant (1995) suggests to distinguish vital from merely important forces. In particular, he suggests that a firm should focus on its network of business relationships that is formed by competitors, suppliers, and customers. He also states that this is not to say that general environmental factors such as economic, social or political trends are unimportant, but they may be critical determinants of the threats and opportunities a company could cope with in the near future. Indeed, in a changing and unpredictable business environment company strategies can not neglect
to take into account macro-environmental forces such as technological, social, national/international developments that in today's economy are strongly affecting firm dynamics (i.e., "the new economy"). Understanding business internal interconnections and the relationships between the firm and the environment in which it operates will help us in supporting how to define a business growth strategy and to seek for relevant forces that could play a crucial role in such analysis. In defining a business growth policy the strategic and accounting literature suggest to take into account the sustainable growth model. In particular, this paper aims to combine such an approach with the system dynamics perspective and apply it to a case study.
Company sustainability
According to the business management literature, a firm in pursuing business goals has to take into account either internal (e.g., owners, employees) and external (e.g., banks) business key-actors expectations and it has to maintain an economic and financial equilibrium. In particular, a firm to reach a sustainable pattern should be able to dynamically take into account all previous remarks. For example, business success based on aggressive commercial policies that generates in the shortmedium term financial shortages could cause banks' complains and, as a consequence, a reduction in available bank credit leading to a business liquidity crisis and subsequently a company failure. From the above statements it is possible to observe that a company to sustain or reach a given market position has to be able to:
a) promptly adapt its business structure to new market conditions (Durability);
b) self-finance its business activities in pursuing business goals (Autonomy), and
c) achieve a financial equilibrium (Profitability).
The structure reported in figure 2 allows one to capture the basic factors that can lead to virtuous business cycle. Nevertheless, to define a sustainable growth policy all previous aspects have to be combined with a business growth rate suitable with the competitive arena dynamics. Such business growth has also to be in consonance with a balanced financial structure according to the equity owners' strategies and external key-actors' expectations (e.g., banks and financial institutions). In other words, a sustainable growth strategy has to allow the firm to achieve a satisfactory business growth, profitability and liquidity ratio taking also into account environmental dynamics and owners' requests.
Traditionally, the relationships between growth, profitability and assets changes have been analysed through the sustainable growth model (Zakon, 1966). Such a model is one of the cornerstones in the financial literature, to which both researchers and practitioners have been referring over the last decades. This model suggests that growth could be internally sustainable, if the net assets growth rate is not higher than the retained earnings growth rate. A first version of the sustainable growth model, that is the sustainable 'internal' growth model, is only based on the current internal flow of funds (Current Income + Depreciation). Such statement is due to the following assumptions: (1) capital investments are considered as a scarce resource, both in terms of equity investments and debts, and (2) the management desire to maintain the actual financial structure. In other words, market difficulties to find out financial sources, on a side, and the financial structure desired by the management, on the other, force the firm to finance business growth through current internal flow of funds.
According to such model, a company can grow – without external capital investments and changes in the financial structure – according to its ability to generate internal flow of funds. In particular, if company internal sustainable growth rate is expressed as 'Delta equity percentage' and the current internal flow of funds as Retained earnings percentage divided by equity, company internal sustainable growth rate (g) can be seen as follows:
If we observe that 'Retained earnings' is equal to 'Net income – Dividends', through some mathematical operations, the previous formula can be expressed as follows:
1 g = company internal sustainable growth rate (% changes in initial equity); Retained earnings/Equity = current internal flow of funds <cursor_is_here>
In reality such model embodies some limits related to the ability of the firm to find out new financial sources and owners' willingness to accept changes in the business financial structure. Such limitations can easily be overcome by reviewing the previous formula.
As we can observe from the above formula [3a], the business sustainable growth rate is characterised by three components:
1. Retained earnings/Equity(t) = changes in assets % due to changes in current internal flow of funds;
2. ∆ New Equity Investments(t)/Equity(t) = changes in assets % due to new equity investments;
3. (Debts(t+1) – Equity(t+1))/A(t) = changes in assets % due to changes in the debts/equity ratio.
A raise in all these three factors contributes to increase the business sustainable growth rate. In fact, an increase in retained earnings, equity investments and in the amount of debts, by generating financial resources, encourages company growth. In particular, it is worth remarking that high dividend if, on a side, satisfies business-owners' requirements and expectations, on the other, drains financial resources that could fuel further business growth. As a consequence a company that wants both to maintain a specific growth rate and to reward equity investments according to businessowners' expectations has to increase business operating profitability and/or its debts to equity ratio. Nevertheless, an increase in debts could provide new financial resources and, hence, generate further growth if the cost of borrowing is lower than the return on net assets. Such statement is directly related to the correct use of financial leverage. In fact, in such a case an increase in net profitability generates new financial resources leading to further business growth. An example will help the reader to better understand the above formula [3a].
'Return on Equity' ratio (ROE), which is the relation between the net income generated by all business activities and the amount of the equity invested.
d = Dividends paid % (Dividends Paid/Net Income).
ROE = Net Income/Equity
3 g * = sustainable growth rate
Equity(t+1) = Equity at the end of the budget period
A(t) = Ending total assets from the previous period Equity(t) = Equity at the beginning of the budget period
∆
A(t)= Changes in Assets.
At the beginning of the budget period, a company appears as follows: Assets (A(t)) = 1000, Equity(t) = 500 and Debts(t) = 500. For the budget period, the company foresees:
- ROE = 20% (Net Income/Assets(t));
- d = 0,4;
- New Equity Investments (t) = 100;
- Debts/Equity ratio target (Debts(t+1) /Equity(t+1)) = 1,5.
On the basis of such figures, at the end of the budget period Equity could reach 660 (initial equity, 500, plus net income retained, 60, plus new equity investments, 100) and the amount of the debts could be equal to 990 (Debts(t+1) /Equity(t+1) = 1,5 and, hence, Debts = 660*1,5=990).
Hence,
The above formula shows that the:
- company can internally finance business growth equal to 12% (100*(1-0.4)/500);
- new equity investments contribute to increase business growth rate for 20%, and
- changes in debts provide an increase of the 33% of the company sustainable growth rate.
In conclusion, such figure shows that the assets at the end of the budget period could grow up to 1650 (+ 65%) in compliance with the business financial structure desired by the management.
The above formula [3a] provides a simplified schema to figure out the relationships between the variables embodied in the business system. Understanding such links allows the management to improve business decisions aimed to achieve the desired business growth rate under a pre-defined profitability and debts to equity conditions. Such discussion can be reviewed on the basis of the diagram portrayed in figure 3. The causal and effects diagram shows how the three main business variables/decisions (e.g., retained earnings, new equity investments and the amount of debts) could foster or slow down company growth. In particular, an increase in retained earnings could generates internal flow of funds, enhances further business growth and gives rise to operating (ROI) and net (ROE) investment returns. Such business growth, by increasing ROE, will decrease the debts/equity
ratio and, as a consequence, the interest cost. Then, a reduction in interest cost will produce a further increase in ROE. Such interrelationships will generate, in the short time period, a virtuous circle that can easily feed business growth. But as equity will increase ROE will fall down. Afterwards, low returns could arouse owner's complains leading to a reduction in retained earnings. Consequently, the entrepreneur has to find out new ways to generate further growth. Furthermore, in case the debts/equity ratio is reaching high value, banks and/or suppliers could start to reduce company available credits, so that it will be necessary to restore the level of debts by increasing equity investments. But, if on a side such policy could re-establish the debts/equity ratio to a suitable level, on the other it will fall down 'again' net business returns. Such side effect represents a strong limit to business growth. In fact, low margin will produce equity owner's complains leading to an increase in dividends, a reduction in financial funds and as result business growth will slow down.
Figure 3 also embodied a new variable: 'Personal Assets'. This variable has been added because it captures a peculiar aspect in SMEs' context. In such firms, family asset is often the main means to fulfil business growth. In fact, when financial institutions and/or business suppliers are not willing to increase firm credits and, hence, to finance further company growth, a firm can only try to win their reluctance by bringing new equity investments. In the following section the sustainable growth model has been applied a case study.
A small publishing company
At the end of the 80s, a tireless architect founded Grafill, a small book publishing company. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the first 6 th years Grafill faced a growing trend in the number of review subscribers and clients that never seemed to end up. Both sales revenues and bank accounts grew up, and a new employer was hired. But, such positive trend stopped at the end of the 7 th years. As consequence, the owner starts to ask himself the following questions: how can be explained such a raise and fall in number of subscribers? What could cause such a decreasing pattern? How can a sustainable growth policy be designed and achieved? Does company growth requires further equity investments?
The owner-entrepreneur believed that an increase in the number of products launched will strongly contribute to increase Grafill's customers, sales revenues and bank balance. As a consequence, during the last two years, Grafill operational activities have been mainly devoted to slightly increase the number of books and software launched and to regularly publish its monthly magazine.
In addition, such period has been also characterised by a resources investment in E-commerce and related customer services, which shows a growing contribution, even if marginal, in terms of company sales.
The business strategy implemented by the owner – as expected – contributed to increase company sales revenues, but it didn't generate a proportional growth in company bank balance (see also appendix 1).
As we can observe in figure 5 Grafill's sale revenues grow up, while bank balance shows a decreasing pattern. Even though such strategy requires an increase in financial debts, it allows the company to reach an average operating profitability (ROI) equal to 26% and an average net profitability equal to 17%.
On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce this strategy (that is mainly based on an increase in Grafill's portfolio products, see figure 4) by launching 3 products monthly. Furthermore, dues to market demand changes and Internet development, the entrepreneur is also oriented to invest on customer's E-commerce related services. For this reason, he prognosticates to increase E-commerce investments and to hire a new employer. Such decision aims to establish a direct link with the final customer, to shrink the distribution channel and, hence, increase company sales margin. The owner-entrepreneur believes that an increase in customers' related services tied to the "New Economy" (i.e., on line commerce) will not only increase company customers and sales, but will also improve company image. Such growth policy, according to owner's vision, will
enhance virtuous circles (i.e., based on word of mouth) that will allow the firm to increase direct sales and related margin, so that to finance further business development.
This strategy has been 'simulated' through a spreadsheet-based financial model (A summary of Grafill Income and financial statement has been reported in table 1).
Table 1 – Grafill's results budget (2000 – 2001)
Figures 7 and 8 reported above show that entrepreneur's growth strategy allows the firm to increase business operating and net profitability. In particular, such a profitability growth is mainly due to a sharply increase in direct sales (E-commerce) that lets Grafill to pursue an increase in sales revenues margin. Another effect of such policy is related to business liquidity. As we can observe from figure 6 company bank balance at end of the first year budget (31-12-2000) shows a decreasing pattern (-195.735), even if it starts to increase during the second year budget (-133.541). It is worth remarking that, at the beginning of the 2000, Grafill's bank balance was equal to – 78.263. In particular, figure 7 portrays Grafill's profitability and debts/equity ratio dynamics. During 2000 the debts to equity ratio shows a strong increase, but during the next year it goes slowly down. On the basis of such results, the owner entrepreneur is asking if this is a sustainable growth strategy. To answer such a question it has been applied the sustainable growth model. According to the Grafill's budget results (2000-2001), it is possible to detect the following information:
- average ROE = 35%; d = 0.3; New Equity Investments (t) = 0, and the desired debts to equity ratio (Debts(t+1) /Equity(t+1)) =1,5.
On the basis of such information the sustainable business growth rate would be:
In other words, such estimation tells us that the total assets during the budget period can grow up from 425.797 to 715.339 (+68%) without changing the financial equilibrium defined by the ownerentrepreneur. In conclusion, according to the business sustainable growth model and owner's requirements (e.g., dividends, new equity investments debts/equity ratio) the suggested Grafill's
growth strategy which requires an increase in capital invested equal to 68% [716.023-425.797)/ 425.797], can be defined as "sustainable".
During last 30 years, the sustainable growth model has been mainly appreciated both for its simplicity and its useful suggestions during the budgeting process. In particular, it seems to strongly support managers to evaluate ex-ante the sustainability of business growth policies, according to a given financial structure and owner's requirement. Such model also looks useful to investigate expost analysis. In fact, entrepreneurs could evaluate periodically (i.e., quarterly) business reports by detecting possible variances, analysing their causes and implementing new decisions to achieve the desired business results.
However, although it is simple and relatively ready-to-use, it appears more useful for an ex-post analysis, rather than to support entrepreneurs in setting their growth policies for the future. Among its limits, it is possible to observe that it does not make explicit causal determinants of profitability and business liquidity; it does not take into consideration the 'time' variable (i.e. delays between causes and effects) and the dynamic feedback relationships between growth, profitability and liquidity. As a matter of fact, an analysis aimed to design a sustainable business growth policy can not discard to analyse the 'dynamic' interrelationships between business growth and company health. In order to overcame such weakness it has been built a system dynamics model.
The system dynamics methodology has been applied to take into account the dynamic interrelationship inside the firm and between the firm and the environment in which it operates. In particular, the simulation model 'dynamically' depicts the interrelationships between profitability, liquidity and business growth and the relationships between company perceived solidity and external key actors' expectations/consensus. For instance, available bank credit will increase as company turnover and equity will grow up, and vice-versa. In fact, the system dynamics methodology allows one not only to make explicit and dynamic the implicit, linear and static feedback relationships suggested by the owner-entrepreneur (i.e., see figure 4), but also to explore the existing relation between business results and external consensus (i.e., banks and suppliers requirements). The feedback relationships suggested by owner have been made explicit and embodied in the system dynamics simulation model (see figure 8).
In particular, figure 8 captures the positive relationships between the following variables: 'number of company products launched' and company growth. In fact, an increase in company's products launched could generate a growth in company sales, and by generating new financial resources could feed further business growth. At the same time, a raise in return on assets could boost personal assets that through an increase in business solidity perceived by external actors generates a growth in available bank credit. As a consequence, an increase in financial resources could feed further rise in the number of products launched. On the basis of such relationships, the growth strategy suggested by the owner-entrepreneur has been simulated through a system dynamics simulation model. It is worth remarking that the simulation period has been divided in 192 weeks (4 years) and, while the first two years are referred to 1998-1999 the next two years are referred to the budget period (2000-2001).
As we can see from figure 9, company customers increase as the number of products launched growth up. Such a growth also generates an increase in customers' orders and company sales revenues. In particular, due to entrepreneur's decision to invest in E-commerce activities (see figure 10), for instance, web site improvement, security payment, etc., it is possible to observe a strong increase in direct sales revenues.
System Dynamics simulation model
The reader will already noted that the above figures portray Grafill's variables dynamic until week 157. Such factor is mainly due to an unexpected phenomenon that by draining financial resources has generated a financial shortage leading to a business crisis.
The owner-entrepreneur's growth strategy based on an increase in products launched and Ecommerce investments allows the company to boost sales revenues and to achieve the expected level of profitability foreseen in the budget plan. But, as the amount of books and software released increase, the inventory grows up as well as the accounts receivable. Such an increase generates a higher level of financial resources needed to feed business growth. In fact, as Grafill's net working
capital 4 increases bank balance goes down until it reaches the available bank credit (that is the amount of financial resources provided by financial institutions) leading to a business failure. In other words, even though the business growth strategy suggested is profitable (net income shows positive values and an increasing behaviour), the flow of financial resources generated by such strategy does not allow Grafill to reach and maintain a sustainable growth pattern. Such phenomenon can be observed in figure 11 (Grafill simulated results have been also reported in table 2).
Why does the system dynamics simulation model portray different results from those generated by the spreadsheet model based on the sustainable growth model?
First of all, besides the sustainable growth model limitations stated in the previous pages it is worth remarking that such model being a 'synthetic' indicator does not capture the main business variables dynamics. In particular, it does not make explicit the dynamic of the financial resources needed during the budget period (Brunetti, 1983). Thus, even if the foreseen profitability and equity changes suggested by a growth strategy, which has been identified as 'sustainable', could be matched 'in reality', it may happen that during the budget period a company could face with liquidity shortages. Such phenomenon, by reducing company bank balance could generate a vicious circle (negative bank balance ⇒ higher interest costs ⇒ higher negative bank balance) that could
4 Net working capital = Account receivables + Inventory – Account Payables.
lead to business failure. Moreover, the existing delays between decisions and effects also contribute to generate behaviours that could look different form those foreseen in the budget plan. Introducing a feedback and dynamic perspective during the drawing up of a company budget allows participants to evaluate the sustainability of a business growth strategy not only by taking into account business variables values at beginning and at end of the budget plan, but also, and in particular, their dynamics during such period. This analysis also provides to entrepreneur and his collaborators an explicit framework to be discussed and modified according to their own vision and external key actors' requirements. Furthermore, the system dynamics simulation model trough a user-friendly interface and a spreadsheet data-interchange 5 allows users to test ex-ante in a 'safe' environment their decisions and related 'implicit' expectations. Understanding causal relationships underlying business results it is possible to feed a double loop learning (Davidsen 1996; Sterman, 1994) which could support decision makers in detecting inconsistencies in their mindsets and, hence, improving the decision making process. Therefore, to design a sustainable growth strategy decision maker needed to take into account the dynamic interrelationships between business growth and its drivers in compliance with a balanced business financial structure, a satisfactory business profitability and liquidity, which may allow the firm to gain both internal and external key actors' consensus (Winch, 1993).
In conclusion, this paper aims to highlight some of the limits of the sustainable growth model and to suggest a way to overcome such partial analysis. It has been demonstrated that a feedback approach could useful support small business entrepreneurs in assessing their business growth strategies, in compliance with a desired profitability level, a desired balance financial structure and external key actors' requirements.
5 The system dynamics model allows users to make their decisions and check business results both in the System Dynamics package and in a spreadsheet model.
Table 2 – Grafill simulated results 2000 – 2001
Appendix 1 – Grafill Balance sheet 98 – 99 6
6 Due to privacy reasons all figures have been modified.
REFERENCE
Airoldi G., Brunetti G., Coda V. (1989). Introduction to Business Management (Original title: Lezioni di Economia Aziendale), Il Mulino, Bologna, Italy
Brunetti G. (1983). Managing financial resources (Original title: Il governo delle risorse finanziarie: il modello dello sviluppo sostenibile), in Banche e Banchieri, n. 10, pp. 800.
Bianchi C. and Bivona E.(2000) Commercial & Financial Policies in Family Firms:
The Small
, in: Special Issue on "Interactive Learning
Business Growth Management Flight Simulator
Environments", edited by Proff. Paal Davidsen e Mike Spector, Simulation & Gaming, Sage Publications
Coda, V. (1989). Business Strategic Positioning (Original title: L'Orientamento Strategico dell'Impresa), UTET, Turin, Italy, 7-11.
Davidsen, P. I. (1996). Educational features of the system dynamics approach to modelling and simulation. Journal of Structured Learning, 12(4), 269-290.
Forrester J., (1994). Policies, Decisions, and Information Sources for Modeling, in Morecroft J. & Sterman J. (1994). Modeling for Learning Organizations, Productivity Press, Portland, Oregon, 5184.
Grant R. M. (1995). Contemporary Strategy Analysis: Concepts, techniques, Applications, 2 nd ed., Blackwell, Cambridge Massachusetts.
Sterman, J. D. (1994). Learning in and about complex systems. System Dynamics Review, 10(2-3), 291-330.
Winch G. (1993). Consensus Building in the Planning Process: Benefits From a "Hard" Modeling Approach, in System Dynamics Review, vol. 9, n. 3, 287-300.
Zakon A. (1966). Growth and Financial Strategies , Boston Consulting Group, Boston, Mass.
</text>
|
[
{
"content": "<url>\nhttps://proceedings.systemdynamics.org/2000/PDFs/bivona34.pdf\n</url>\n<text>\nHow to define a profitable and sustainable growth policy in a changing market? A case study: a small publishing company\n\nEnzo Bivona\n\nMaster Phil. in System Dynamics University of Bergen – Norway CUSA System Dynamics Group P.zza A. Gentili, 12 – 90143 Palermo (Italy) Tel. +39.0916254313 – Fax. +39.0916254532 http://www.unipa.it/~bianchi – E-mail: [email protected]\n\n: business system, small business, sustainable growth model, system dynamics\n\nKeywords\n\nAbstract\n\nA tireless architect founded Grafill, a small book publishing company, at the end of the 80s. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the last two years, both the number of books published and software released, and their relative prices have been sharply increased. Such business strategy contributed to strongly increase company sales revenues, but it didn't generate a proportional growth in company bank balance. Such period has been also characterised by investments in E-commerce and related customer services, which shows a growing contribution in terms of company sales. On the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce the number of product to be launched and E-commerce activities. Such growth policy, according to owner's vision, will enhance virtuous circles that will allow the firm to increase direct sales and related margin, so that to finance further business development. A system dynamics modelling approach has been adopted to better understand business areas interconnections, to assess sustainable strategies and to share learning among the entrepreneur and his direct collaborators.\n\nThe firm as a dynamic system: implication for business management policies\n\nThe continuous changes in technological innovation and its fast development have strongly contributed to increase small businesses' complexity and difficulties in coping with new market dynamics. The relevance of such aspects is obvious in all firms, but it assumes a critical role in small firms. Such companies are very often characterised by limited financial and management resources and, as a consequence, a reactive rather than proactive business growth strategy may easily lead to business failure. A case study has been analysed – by the light of the sustainable growth model combined with the system dynamics perspective – to provide insights and\n\ncontributions in helping both small and medium enterprises (SMEs) and academic researchers in better understanding and designing SMEs' sustainable growth strategies.\n\nA prerequisite to define a profitable and sustainable growth policy in a changing market is to understand the interrelationships among company sub-systems and between the firm and its relevant environment. For this reason, it has been adopted a business framework analysis to depict the firm as an interrelationship of variables that continuously interact with the environment. In fact, by adopting a system perspective, a firm can be seen as a dynamic interrelationship of different elements or variables aimed to pursue company goals. In particular, a company can be represented through a combination of three main elements: 1) a structure in terms of resources (e.g., capital, personnel, organisation) that represents the backbone of the company; 2) management activities, that can be distinguished in operational and strategic. Operational activities are usually short term oriented and focused on efficient utilisation of available company resources (e.g., equipment, human resource). Strategic management activities are long term-oriented decisions, aimed to define company targets and related policies and organisational structure. Indeed, in SMEs such distinction becomes very hard because they are often characterised by unstructured management organisation (e.g., not well-defined personnel roles) and what can be defined as 'operational' in the short term could become 'strategic' in the meantime (Bianchi and Bivona, 2000). For instance, operational management activities through an efficient utilisation of company resources based on costs reduction, a standard customer's services (i.e., based on low lead time) can also generate strategic outcomes that may allow the firm to easily catch up business goals. And, finally, 3) management results represent the third aspect of the firm. Management activities are often measured by using indicators to take into account financial (e.g., return on investment, return on equity, debts/equity ratio), competitive (e.g., market shares, number of customers) and social (e.g., personnel, shareholders and financial institution satisfaction) results and to capture business growth. In particular, business growth can be analysed according two dimensions: a 'quantitative growth' characterised by an increasing in company turnover, human resources, etc., and a 'qualitative growth' in terms of human resources skills, innovation, business flexibility in adapting to environmental changes. Such distinction is helpful to identify apparent (i.e., only quantitative) and short term from real and sustainable medium/long term business growth.\n\nFigure 1 – The Business System\n\nSTRUCTURE\nRESULTS\nTHE\nENVIRON-\nMENT\nSTRATEGIC\nMANAGEMENT\nSTRATEGIC\nMANAGEMENT\nOPERATIONAL\nMANAGEMENT\nOPERATIONAL\nMANAGEMENT\nTHE FIRM\n\n(Source: Coda, 1989)\n\nAs we can see from the above figure, efficient operational management activities and effective strategic management activities could modify the business structure of the firm, on the basis of the environment's changes, leading to firm growth. Such modified business structure could foster virtuous circles that may allow the firm to reach/maintain both a sustainable competitive advantage and financial business equilibrium. On the contrary, inconsistent management activities could generate eroding processes of company resources leading to business crisis. In fact, if business growth is generated by chance and is not well supported by coherent strategic and operational management activities, a potential business failure may eventually result.\n\nThe above framework is an important first step to define the main forces that have to be taken into consideration to sketch a growth policy for a firm. However, to focus on the relevant aspects that could influence business growth, it is necessary to follow a selective approach. Often, one of the main problems for management is the following: given several external forces, how can the firm monitor all environmental conditions? In defining an effective environmental framework of analysis, Grant (1995) suggests to distinguish vital from merely important forces. In particular, he suggests that a firm should focus on its network of business relationships that is formed by competitors, suppliers, and customers. He also states that this is not to say that general environmental factors such as economic, social or political trends are unimportant, but they may be critical determinants of the threats and opportunities a company could cope with in the near future. Indeed, in a changing and unpredictable business environment company strategies can not neglect\n\nto take into account macro-environmental forces such as technological, social, national/international developments that in today's economy are strongly affecting firm dynamics (i.e., \"the new economy\"). Understanding business internal interconnections and the relationships between the firm and the environment in which it operates will help us in supporting how to define a business growth strategy and to seek for relevant forces that could play a crucial role in such analysis. In defining a business growth policy the strategic and accounting literature suggest to take into account the sustainable growth model. In particular, this paper aims to combine such an approach with the system dynamics perspective and apply it to a case study.\n\nCompany sustainability\n\nAccording to the business management literature, a firm in pursuing business goals has to take into account either internal (e.g., owners, employees) and external (e.g., banks) business key-actors expectations and it has to maintain an economic and financial equilibrium. In particular, a firm to reach a sustainable pattern should be able to dynamically take into account all previous remarks. For example, business success based on aggressive commercial policies that generates in the shortmedium term financial shortages could cause banks' complains and, as a consequence, a reduction in available bank credit leading to a business liquidity crisis and subsequently a company failure. From the above statements it is possible to observe that a company to sustain or reach a given market position has to be able to:\n\na) promptly adapt its business structure to new market conditions (Durability);\nb) self-finance its business activities in pursuing business goals (Autonomy), and\nc) achieve a financial equilibrium (Profitability).\n\nThe structure reported in figure 2 allows one to capture the basic factors that can lead to virtuous business cycle. Nevertheless, to define a sustainable growth policy all previous aspects have to be combined with a business growth rate suitable with the competitive arena dynamics. Such business growth has also to be in consonance with a balanced financial structure according to the equity owners' strategies and external key-actors' expectations (e.g., banks and financial institutions). In other words, a sustainable growth strategy has to allow the firm to achieve a satisfactory business growth, profitability and liquidity ratio taking also into account environmental dynamics and owners' requests.\n\nTraditionally, the relationships between growth, profitability and assets changes have been analysed through the sustainable growth model (Zakon, 1966). Such a model is one of the cornerstones in the financial literature, to which both researchers and practitioners have been referring over the last decades. This model suggests that growth could be internally sustainable, if the net assets growth rate is not higher than the retained earnings growth rate. A first version of the sustainable growth model, that is the sustainable 'internal' growth model, is only based on the current internal flow of funds (Current Income + Depreciation). Such statement is due to the following assumptions: (1) capital investments are considered as a scarce resource, both in terms of equity investments and debts, and (2) the management desire to maintain the actual financial structure. In other words, market difficulties to find out financial sources, on a side, and the financial structure desired by the management, on the other, force the firm to finance business growth through current internal flow of funds.\n\nAccording to such model, a company can grow – without external capital investments and changes in the financial structure – according to its ability to generate internal flow of funds. In particular, if company internal sustainable growth rate is expressed as 'Delta equity percentage' and the current internal flow of funds as Retained earnings percentage divided by equity, company internal sustainable growth rate (g) can be seen as follows:\n\nIf we observe that 'Retained earnings' is equal to 'Net income – Dividends', through some mathematical operations, the previous formula can be expressed as follows:\n\n1 g = company internal sustainable growth rate (% changes in initial equity); Retained earnings/Equity = current internal flow of funds <cursor_is_here>\n\nIn reality such model embodies some limits related to the ability of the firm to find out new financial sources and owners' willingness to accept changes in the business financial structure. Such limitations can easily be overcome by reviewing the previous formula.\n\nAs we can observe from the above formula [3a], the business sustainable growth rate is characterised by three components:\n\n1. Retained earnings/Equity(t) = changes in assets % due to changes in current internal flow of funds;\n2. ∆ New Equity Investments(t)/Equity(t) = changes in assets % due to new equity investments;\n3. (Debts(t+1) – Equity(t+1))/A(t) = changes in assets % due to changes in the debts/equity ratio.\n\nA raise in all these three factors contributes to increase the business sustainable growth rate. In fact, an increase in retained earnings, equity investments and in the amount of debts, by generating financial resources, encourages company growth. In particular, it is worth remarking that high dividend if, on a side, satisfies business-owners' requirements and expectations, on the other, drains financial resources that could fuel further business growth. As a consequence a company that wants both to maintain a specific growth rate and to reward equity investments according to businessowners' expectations has to increase business operating profitability and/or its debts to equity ratio. Nevertheless, an increase in debts could provide new financial resources and, hence, generate further growth if the cost of borrowing is lower than the return on net assets. Such statement is directly related to the correct use of financial leverage. In fact, in such a case an increase in net profitability generates new financial resources leading to further business growth. An example will help the reader to better understand the above formula [3a].\n\n'Return on Equity' ratio (ROE), which is the relation between the net income generated by all business activities and the amount of the equity invested.\n\nd = Dividends paid % (Dividends Paid/Net Income).\n\nROE = Net Income/Equity\n\n3 g * = sustainable growth rate\n\nEquity(t+1) = Equity at the end of the budget period\n\nA(t) = Ending total assets from the previous period Equity(t) = Equity at the beginning of the budget period\n\n∆\n\nA(t)= Changes in Assets.\n\nAt the beginning of the budget period, a company appears as follows: Assets (A(t)) = 1000, Equity(t) = 500 and Debts(t) = 500. For the budget period, the company foresees:\n\n- ROE = 20% (Net Income/Assets(t));\n- d = 0,4;\n- New Equity Investments (t) = 100;\n- Debts/Equity ratio target (Debts(t+1) /Equity(t+1)) = 1,5.\n\nOn the basis of such figures, at the end of the budget period Equity could reach 660 (initial equity, 500, plus net income retained, 60, plus new equity investments, 100) and the amount of the debts could be equal to 990 (Debts(t+1) /Equity(t+1) = 1,5 and, hence, Debts = 660*1,5=990).\n\nHence,\n\nThe above formula shows that the:\n\n- company can internally finance business growth equal to 12% (100*(1-0.4)/500);\n- new equity investments contribute to increase business growth rate for 20%, and\n- changes in debts provide an increase of the 33% of the company sustainable growth rate.\n\nIn conclusion, such figure shows that the assets at the end of the budget period could grow up to 1650 (+ 65%) in compliance with the business financial structure desired by the management.\n\nThe above formula [3a] provides a simplified schema to figure out the relationships between the variables embodied in the business system. Understanding such links allows the management to improve business decisions aimed to achieve the desired business growth rate under a pre-defined profitability and debts to equity conditions. Such discussion can be reviewed on the basis of the diagram portrayed in figure 3. The causal and effects diagram shows how the three main business variables/decisions (e.g., retained earnings, new equity investments and the amount of debts) could foster or slow down company growth. In particular, an increase in retained earnings could generates internal flow of funds, enhances further business growth and gives rise to operating (ROI) and net (ROE) investment returns. Such business growth, by increasing ROE, will decrease the debts/equity\n\nratio and, as a consequence, the interest cost. Then, a reduction in interest cost will produce a further increase in ROE. Such interrelationships will generate, in the short time period, a virtuous circle that can easily feed business growth. But as equity will increase ROE will fall down. Afterwards, low returns could arouse owner's complains leading to a reduction in retained earnings. Consequently, the entrepreneur has to find out new ways to generate further growth. Furthermore, in case the debts/equity ratio is reaching high value, banks and/or suppliers could start to reduce company available credits, so that it will be necessary to restore the level of debts by increasing equity investments. But, if on a side such policy could re-establish the debts/equity ratio to a suitable level, on the other it will fall down 'again' net business returns. Such side effect represents a strong limit to business growth. In fact, low margin will produce equity owner's complains leading to an increase in dividends, a reduction in financial funds and as result business growth will slow down.\n\nFigure 3 also embodied a new variable: 'Personal Assets'. This variable has been added because it captures a peculiar aspect in SMEs' context. In such firms, family asset is often the main means to fulfil business growth. In fact, when financial institutions and/or business suppliers are not willing to increase firm credits and, hence, to finance further company growth, a firm can only try to win their reluctance by bringing new equity investments. In the following section the sustainable growth model has been applied a case study.\n\nA small publishing company\n\nAt the end of the 80s, a tireless architect founded Grafill, a small book publishing company. He believed that in the real estate and construction sectors there is a lack of practical, reliable and punctual sources of information. To cover such a gap, he launched a monthly review and, started to publish a series of specific books and software to better support engineers, architects, and public utilities in their tasks. During the first 6 th years Grafill faced a growing trend in the number of review subscribers and clients that never seemed to end up. Both sales revenues and bank accounts grew up, and a new employer was hired. But, such positive trend stopped at the end of the 7 th years. As consequence, the owner starts to ask himself the following questions: how can be explained such a raise and fall in number of subscribers? What could cause such a decreasing pattern? How can a sustainable growth policy be designed and achieved? Does company growth requires further equity investments?\n\nThe owner-entrepreneur believed that an increase in the number of products launched will strongly contribute to increase Grafill's customers, sales revenues and bank balance. As a consequence, during the last two years, Grafill operational activities have been mainly devoted to slightly increase the number of books and software launched and to regularly publish its monthly magazine.\n\nIn addition, such period has been also characterised by a resources investment in E-commerce and related customer services, which shows a growing contribution, even if marginal, in terms of company sales.\n\nThe business strategy implemented by the owner – as expected – contributed to increase company sales revenues, but it didn't generate a proportional growth in company bank balance (see also appendix 1).\n\nAs we can observe in figure 5 Grafill's sale revenues grow up, while bank balance shows a decreasing pattern. Even though such strategy requires an increase in financial debts, it allows the company to reach an average operating profitability (ROI) equal to 26% and an average net profitability equal to 17%.\n\nOn the basis of such results, the entrepreneur believes that this is the right way to pursue Grafill's growth. In particular, for the next two years, he foresees to reinforce this strategy (that is mainly based on an increase in Grafill's portfolio products, see figure 4) by launching 3 products monthly. Furthermore, dues to market demand changes and Internet development, the entrepreneur is also oriented to invest on customer's E-commerce related services. For this reason, he prognosticates to increase E-commerce investments and to hire a new employer. Such decision aims to establish a direct link with the final customer, to shrink the distribution channel and, hence, increase company sales margin. The owner-entrepreneur believes that an increase in customers' related services tied to the \"New Economy\" (i.e., on line commerce) will not only increase company customers and sales, but will also improve company image. Such growth policy, according to owner's vision, will\n\nenhance virtuous circles (i.e., based on word of mouth) that will allow the firm to increase direct sales and related margin, so that to finance further business development.\n\nThis strategy has been 'simulated' through a spreadsheet-based financial model (A summary of Grafill Income and financial statement has been reported in table 1).\n\nTable 1 – Grafill's results budget (2000 – 2001)\n\nFigures 7 and 8 reported above show that entrepreneur's growth strategy allows the firm to increase business operating and net profitability. In particular, such a profitability growth is mainly due to a sharply increase in direct sales (E-commerce) that lets Grafill to pursue an increase in sales revenues margin. Another effect of such policy is related to business liquidity. As we can observe from figure 6 company bank balance at end of the first year budget (31-12-2000) shows a decreasing pattern (-195.735), even if it starts to increase during the second year budget (-133.541). It is worth remarking that, at the beginning of the 2000, Grafill's bank balance was equal to – 78.263. In particular, figure 7 portrays Grafill's profitability and debts/equity ratio dynamics. During 2000 the debts to equity ratio shows a strong increase, but during the next year it goes slowly down. On the basis of such results, the owner entrepreneur is asking if this is a sustainable growth strategy. To answer such a question it has been applied the sustainable growth model. According to the Grafill's budget results (2000-2001), it is possible to detect the following information:\n\n- average ROE = 35%; d = 0.3; New Equity Investments (t) = 0, and the desired debts to equity ratio (Debts(t+1) /Equity(t+1)) =1,5.\n\nOn the basis of such information the sustainable business growth rate would be:\n\nIn other words, such estimation tells us that the total assets during the budget period can grow up from 425.797 to 715.339 (+68%) without changing the financial equilibrium defined by the ownerentrepreneur. In conclusion, according to the business sustainable growth model and owner's requirements (e.g., dividends, new equity investments debts/equity ratio) the suggested Grafill's\n\ngrowth strategy which requires an increase in capital invested equal to 68% [716.023-425.797)/ 425.797], can be defined as \"sustainable\".\n\nDuring last 30 years, the sustainable growth model has been mainly appreciated both for its simplicity and its useful suggestions during the budgeting process. In particular, it seems to strongly support managers to evaluate ex-ante the sustainability of business growth policies, according to a given financial structure and owner's requirement. Such model also looks useful to investigate expost analysis. In fact, entrepreneurs could evaluate periodically (i.e., quarterly) business reports by detecting possible variances, analysing their causes and implementing new decisions to achieve the desired business results.\n\nHowever, although it is simple and relatively ready-to-use, it appears more useful for an ex-post analysis, rather than to support entrepreneurs in setting their growth policies for the future. Among its limits, it is possible to observe that it does not make explicit causal determinants of profitability and business liquidity; it does not take into consideration the 'time' variable (i.e. delays between causes and effects) and the dynamic feedback relationships between growth, profitability and liquidity. As a matter of fact, an analysis aimed to design a sustainable business growth policy can not discard to analyse the 'dynamic' interrelationships between business growth and company health. In order to overcame such weakness it has been built a system dynamics model.\n\nThe system dynamics methodology has been applied to take into account the dynamic interrelationship inside the firm and between the firm and the environment in which it operates. In particular, the simulation model 'dynamically' depicts the interrelationships between profitability, liquidity and business growth and the relationships between company perceived solidity and external key actors' expectations/consensus. For instance, available bank credit will increase as company turnover and equity will grow up, and vice-versa. In fact, the system dynamics methodology allows one not only to make explicit and dynamic the implicit, linear and static feedback relationships suggested by the owner-entrepreneur (i.e., see figure 4), but also to explore the existing relation between business results and external consensus (i.e., banks and suppliers requirements). The feedback relationships suggested by owner have been made explicit and embodied in the system dynamics simulation model (see figure 8).\n\nIn particular, figure 8 captures the positive relationships between the following variables: 'number of company products launched' and company growth. In fact, an increase in company's products launched could generate a growth in company sales, and by generating new financial resources could feed further business growth. At the same time, a raise in return on assets could boost personal assets that through an increase in business solidity perceived by external actors generates a growth in available bank credit. As a consequence, an increase in financial resources could feed further rise in the number of products launched. On the basis of such relationships, the growth strategy suggested by the owner-entrepreneur has been simulated through a system dynamics simulation model. It is worth remarking that the simulation period has been divided in 192 weeks (4 years) and, while the first two years are referred to 1998-1999 the next two years are referred to the budget period (2000-2001).\n\nAs we can see from figure 9, company customers increase as the number of products launched growth up. Such a growth also generates an increase in customers' orders and company sales revenues. In particular, due to entrepreneur's decision to invest in E-commerce activities (see figure 10), for instance, web site improvement, security payment, etc., it is possible to observe a strong increase in direct sales revenues.\n\nSystem Dynamics simulation model\n\nThe reader will already noted that the above figures portray Grafill's variables dynamic until week 157. Such factor is mainly due to an unexpected phenomenon that by draining financial resources has generated a financial shortage leading to a business crisis.\n\nThe owner-entrepreneur's growth strategy based on an increase in products launched and Ecommerce investments allows the company to boost sales revenues and to achieve the expected level of profitability foreseen in the budget plan. But, as the amount of books and software released increase, the inventory grows up as well as the accounts receivable. Such an increase generates a higher level of financial resources needed to feed business growth. In fact, as Grafill's net working\n\ncapital 4 increases bank balance goes down until it reaches the available bank credit (that is the amount of financial resources provided by financial institutions) leading to a business failure. In other words, even though the business growth strategy suggested is profitable (net income shows positive values and an increasing behaviour), the flow of financial resources generated by such strategy does not allow Grafill to reach and maintain a sustainable growth pattern. Such phenomenon can be observed in figure 11 (Grafill simulated results have been also reported in table 2).\n\nWhy does the system dynamics simulation model portray different results from those generated by the spreadsheet model based on the sustainable growth model?\n\nFirst of all, besides the sustainable growth model limitations stated in the previous pages it is worth remarking that such model being a 'synthetic' indicator does not capture the main business variables dynamics. In particular, it does not make explicit the dynamic of the financial resources needed during the budget period (Brunetti, 1983). Thus, even if the foreseen profitability and equity changes suggested by a growth strategy, which has been identified as 'sustainable', could be matched 'in reality', it may happen that during the budget period a company could face with liquidity shortages. Such phenomenon, by reducing company bank balance could generate a vicious circle (negative bank balance ⇒ higher interest costs ⇒ higher negative bank balance) that could\n\n4 Net working capital = Account receivables + Inventory – Account Payables.\n\nlead to business failure. Moreover, the existing delays between decisions and effects also contribute to generate behaviours that could look different form those foreseen in the budget plan. Introducing a feedback and dynamic perspective during the drawing up of a company budget allows participants to evaluate the sustainability of a business growth strategy not only by taking into account business variables values at beginning and at end of the budget plan, but also, and in particular, their dynamics during such period. This analysis also provides to entrepreneur and his collaborators an explicit framework to be discussed and modified according to their own vision and external key actors' requirements. Furthermore, the system dynamics simulation model trough a user-friendly interface and a spreadsheet data-interchange 5 allows users to test ex-ante in a 'safe' environment their decisions and related 'implicit' expectations. Understanding causal relationships underlying business results it is possible to feed a double loop learning (Davidsen 1996; Sterman, 1994) which could support decision makers in detecting inconsistencies in their mindsets and, hence, improving the decision making process. Therefore, to design a sustainable growth strategy decision maker needed to take into account the dynamic interrelationships between business growth and its drivers in compliance with a balanced business financial structure, a satisfactory business profitability and liquidity, which may allow the firm to gain both internal and external key actors' consensus (Winch, 1993).\n\nIn conclusion, this paper aims to highlight some of the limits of the sustainable growth model and to suggest a way to overcome such partial analysis. It has been demonstrated that a feedback approach could useful support small business entrepreneurs in assessing their business growth strategies, in compliance with a desired profitability level, a desired balance financial structure and external key actors' requirements.\n\n5 The system dynamics model allows users to make their decisions and check business results both in the System Dynamics package and in a spreadsheet model.\n\nTable 2 – Grafill simulated results 2000 – 2001\n\nAppendix 1 – Grafill Balance sheet 98 – 99 6\n\n6 Due to privacy reasons all figures have been modified.\n\nREFERENCE\n\nAiroldi G., Brunetti G., Coda V. (1989). Introduction to Business Management (Original title: Lezioni di Economia Aziendale), Il Mulino, Bologna, Italy\n\nBrunetti G. (1983). Managing financial resources (Original title: Il governo delle risorse finanziarie: il modello dello sviluppo sostenibile), in Banche e Banchieri, n. 10, pp. 800.\n\nBianchi C. and Bivona E.(2000) Commercial & Financial Policies in Family Firms:\n\nThe Small\n\n, in: Special Issue on \"Interactive Learning\n\nBusiness Growth Management Flight Simulator\n\nEnvironments\", edited by Proff. Paal Davidsen e Mike Spector, Simulation & Gaming, Sage Publications\n\nCoda, V. (1989). Business Strategic Positioning (Original title: L'Orientamento Strategico dell'Impresa), UTET, Turin, Italy, 7-11.\n\nDavidsen, P. I. (1996). Educational features of the system dynamics approach to modelling and simulation. Journal of Structured Learning, 12(4), 269-290.\n\nForrester J., (1994). Policies, Decisions, and Information Sources for Modeling, in Morecroft J. & Sterman J. (1994). Modeling for Learning Organizations, Productivity Press, Portland, Oregon, 5184.\n\nGrant R. M. (1995). Contemporary Strategy Analysis: Concepts, techniques, Applications, 2 nd ed., Blackwell, Cambridge Massachusetts.\n\nSterman, J. D. (1994). Learning in and about complex systems. System Dynamics Review, 10(2-3), 291-330.\n\nWinch G. (1993). Consensus Building in the Planning Process: Benefits From a \"Hard\" Modeling Approach, in System Dynamics Review, vol. 9, n. 3, 287-300.\n\nZakon A. (1966). Growth and Financial Strategies , Boston Consulting Group, Boston, Mass.\n</text>\n",
"role": "user"
},
{
"content": "%\n\n2 Some of the most common used measures to evaluate business profitability are: the 'Return of Investment' ratio (ROI), which shows the ability of the operational activities to generate income from a given level of investment, and the\n\nIn other words, if a company foresees to reach a ROE = 20% and to distribute the 30% of the Net income (d = 0,3), it can self-finance an assets growth equal to 14% (20%* 0,7).",
"role": "assistant"
}
] |
What to do if a child or adult is displaying symptoms, or is a confirmed case, of coronavirus (COVID-19) in an early years setting
February 2021
Contents
Main changes to previous guidance
We have updated this guidance as follows:
* charging parents and carers if they are unable to take up their child's place
* notify your childminder agency of confirmed cases
* added a hyperlink to NHS advice on vaccines and fevers
Who is this guidance for?
This guidance is for local authorities and all early years providers in England. This includes early years provision in:
* maintained schools
* non-maintained schools
* independent schools
* all providers on the Ofsted early years register
* all providers registered with an early years childminder agency
It explains the actions you need to take if:
* a child in your care has symptoms of coronavirus
* your setting has a confirmed case
Settings should make sure they follow the actions for early years and childcare providers during the coronavirus (COVID-19) outbreak. This guidance includes the system of controls which sets out the protective measures all settings should be following.
Child displaying symptoms of coronavirus (COVID-19)
1. Contact their parents or carers
A child must be sent home to isolate if they become unwell with any one or more of:
* a new, continuous cough
* a high temperature
* a loss of, or change in, their normal sense of taste or smell (anosmia)
The child should start isolating and get a test. The child and their household, should follow the stay at home guidance for households with possible or confirmed coronavirus (COVID-19).
You should call the parents or carers to collect the child and take them home. Any siblings and other household members attending the early years setting will also need to be sent home at the same time.
You should advise the parent or carer that all household members will need to isolate, including siblings in other settings and those in a support bubble or childcare bubble. Refer them to the guidance for households with possible or confirmed coronavirus (COVID-19) infection.
Side effects of children receiving a routine vaccination or teething
Vaccines may cause mild fever in children. This is a common and expected reaction, and isolation is not required unless coronavirus (COVID-19) is suspected. Further information is available in what to expect after vaccinations and vaccination tips for parents.
Whilst teething can cause some known side effects such as flushed cheeks and sore gums, NHS guidelines state that fever is not a symptom of teething.
Parents and carers should monitor side effects from a vaccination or teething, and if they are concerned about their child's health, they should seek advice from their GP or NHS 111.
If coronavirus (COVID-19) is suspected, the child should start isolating and get tested. Settings should follow the advice in the system of controls.
2. Isolate the child showing symptoms
While the child is awaiting collection, move them to an isolated room with appropriate adult supervision. If it is safe to do so, open a window for ventilation. If it is not possible to isolate them, move them to an area which is at least 2 metres away from other people.
Since it is unlikely that staff caring for a young child while they are awaiting collection will be able to maintain a 2 metre distance, they should wear suitable personal protective equipment (PPE). See the guidance on safe working in education, childcare and children's social care settings for more information on the use of PPE.
If the child needs to go to the bathroom while waiting to be collected, they should use a separate bathroom if possible. The bathroom should be cleaned and disinfected using standard cleaning products before being used by anyone else.
As is usual practice, in an emergency call 999 if someone is seriously ill or injured or their life is at risk. Anyone with coronavirus (COVID-19) symptoms should not visit the GP, pharmacy, urgent care centre or a hospital, unless advised to.
3. Ask the parents or carers to arrange a test for the child
When parents or carers pick up the child, advise them to get the child tested to see if they have coronavirus (COVID-19). They should notify you of the results.
4. Clean and disinfect all surfaces they have been in contact with
Once the child has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.
Staff and other children who have had contact with the child who has symptoms must wash their hands thoroughly for 20 seconds.
Staff displaying symptoms of coronavirus (COVID-19)
If a staff member develops symptoms of coronavirus (COVID-19) whilst at work, you must send them home to self-isolate and advise them to get a test as soon as possible. They should begin isolating and follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection. The isolation period includes the day the symptoms started (or the day the test was taken if they do not have symptoms), and the next 10 full days. If any of the individual's household members also attend the setting they will also need to be sent home at the same time.
Once the staff member has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.
If a staff member develops symptoms of coronavirus (COVID-19) while at home, they should not attend work and should notify their setting immediately. You should advise them to arrange to have a test to check if they have coronavirus (COVID-19) and let you know the results. Education and childcare workers are prioritised for testing.
Child or staff members who test positive for coronavirus (COVID-19)
When to contact your local health protection team
Contact your local health protection team if:
* the number of cases exceeds 2 within 14 days
* you are thinking you might need to close because of the number of people affected
* you have taken the action outlined but are still seeing more cases
* a child or staff member in your setting has been admitted to hospital
* you are getting significant interest from local media
Your local health protection team will advise you on the next steps.
1. Contact the child or staff member who has tested positive
You need to find out if they attended your setting during the infectious period. The infectious period is 2 days before their symptoms started (or their test date if they did not show any symptoms) to at least 10 days after.
Confirm that they must not attend your setting for at least 10 full days from the day after the start of their symptoms or test date if they did not have any symptoms (whether this was a Lateral Flow Device (LFD) or Polymerase Chain Reaction (PCR) test).
If they did not attend your setting during the infectious period, you do not need to take any further action.
2. Identify close contacts of the child or staff member who has tested positive
If they attended your setting during the infectious period, you need to identify potential contacts during this period following the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person
'A contact' is a person who has been close to someone who has tested positive for COVID-19 whether this was a LFD or PCR test. You can be a contact anytime from 2 days before the person who tested positive developed their symptoms, and up to 10 days after, as this is when they can pass the infection on to others.
A contact can be:
* anyone who lives in the same household as someone with COVID-19 symptoms or who has tested positive for COVID-19
* anyone in a support or childcare bubble can have close contact with others in their bubble as if they were members of their own household
* anyone who has had any of the following types of contact with someone who has tested positive for COVID-19 with a LFD or PCR test:
o face-to-face contact including being coughed on or having a face-to-face conversation within one metre
o skin-to-skin physical contact for any length of time
o been within 2 metres of someone for more than 15 minutes (either as a one-off contact, or added up together over one day)
o been within one metre for one minute or longer without face-to-face contact
o travelled in the same vehicle or a plane
If you need further guidance and support, contact the PHE advice service on 0800 046 8687 and select option 1. You will be put through to a team of advisors who will inform you what action is needed based on the latest public health advice and will work through a risk assessment to identify close contacts.
Childminders
This advice applies where a childminder usually looks after children in their own home and a member of the childminder's household has tested positive for coronavirus (COVID-19).
A childminder cannot care for children in their home because all household members must self-isolate.
The childminder's household must self-isolate. Their isolation period includes the day that the first person in their household started displaying symptoms (or the day their test was taken if they did not have symptoms, whether this was a LFD or PCR test) and the next 10 full days. They should follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection.
All children who attended the childminder's home during the child's infectious period would be considered contacts on the basis that social distancing is assumed not possible.
Where the childminder has tested positive for coronavirus (COVID-19), it is assumed that social distancing between the childminder and the children is not possible. All children who attended the setting during the childminder's infectious period would be considered close contacts and asked to isolate and follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person.
Early years settings
All children who had shared a group/room with the confirmed case during their infectious period would be considered contacts on the basis that social distancing is assumed not possible.
Identify potential contacts during the infectious period by:
* using attendance records to see who shared a group/room with the child or staff member who has tested positive
* asking the staff member who has tested positive which children or other staff members they have had contact with whilst in the setting
* asking other staff members if they have been in contact with the child or staff member who has tested positive
3. Inform close contacts they need to self-isolate
Contact parents and carers of children and any staff who have been identified as close contacts of a positive case. Let parents and carers know that their child:
* must self-isolate for 10 days from the date of the last contact with the child or staff member who has tested positive - the isolation period includes the date of last contact and the next 10 full days
* needs to follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person
* does not need to get tested unless they have or develop symptoms themselves
4. Report all confirmed, positive cases of coronavirus (COVID19)
You must notify Ofsted, or the childminder agency with which you are registered, of any confirmed cases in the setting (either child or staff member). You should also tell Ofsted if you have to close your setting as a result.
Report as soon as you can, and in any case within 14 days. Please read the guidance on reporting incidents to ensure all of the information required is included.
5. Share information with parents and carers
Contact other parents, carers and staff to let them know there has been a confirmed case of coronavirus (COVID-19) in your setting and the actions you are taking. You should advise them:
* close contacts have been identified and asked to self-isolate
* the setting remains open to all other children (normal opening hours apply)
You must not share the names of people with coronavirus (COVID-19) unless essential to protect others.
Charging parents and carers if they are unable to take up their child's place
Providers should continue to be fair and balanced in dealings with parents or carers; and must continue to avoid unfair charging practices. Providers should refer to:
* the open letter to the early years sector published by the Competitions and Markets Authority (CMA) on 28 July 2020
* the CMA's detailed advice to the early years sector about coronavirus (COVID-19) restrictions and consumer law advice
* the CMA's broader advice on cancellations and refunds for consumer contracts affected by coronavirus (COVID-19) health restrictions
Providers should be cautious about charging parents who wish to withdraw their child from an early years setting during the lockdown. There are legitimate reasons why it may be appropriate for a whole household to remain at home, and where law or guidance requires a member of the family to stay at home. Other reasons would need to be considered on a case-by-case basis with reference to the restrictions placed on people by the new coronavirus regulations. A contract term which requires payment even where no service is being provided by the nursery or cannot be legally accessed by the consumer is likely to be unfair, as are terms which require extensive notice periods.
Each case needs to take account of individual contracts considered from the perspective of both parties and the application of the law and guidance to both providers as businesses and parents as consumers. The general principle is that providers should not charge parents or carers for services that cannot be provided. If there is a barrier to accessing childcare, based on government guidance or the law, the provider should not charge the parents or carers for this period. For example, from 28 September people in England are required by law to self-isolate if they test positive for coronavirus or are contacted by NHS Test and Trace. Accordingly, if a child is self-isolating having been contacted by NHS Test and Trace, you should not charge the parent or carer for this period.
Preparing to welcome back children and staff members who have been self-isolating
Children and staff members who have been self-isolating after testing positive for coronavirus (COVID-19)
The child or staff member who tested positive for coronavirus (COVID-19) can return to their normal routine and stop self-isolating after they have finished their isolation period and their symptoms have gone or if they continue to have only a residual cough or anosmia. This is because a cough or anosmia can last for several weeks once the infection has gone. If they still have a high temperature after 10 days or are otherwise unwell, they are advised to stay at home and seek medical advice.
The isolation period includes the day the symptoms started (or the day your test was taken if they did not have symptoms), and the next 10 full days. This means that if, for example, the symptoms started at any time on the 15th of the month (or if they did not have symptoms but their first positive coronavirus (COVID-19) test was taken on the 15th), the isolation period ends at 23:59 hrs on the 25th.
You should not request evidence of negative test results or other medical evidence before admitting children or welcoming them back after a period of self-isolation.
In most cases, settings and parents and carers will agree that a child with symptoms should not attend the setting, given the potential risk to others. If a parent or carer insists on a child attending the setting, the setting can take the decision to refuse the child if, in their reasonable judgement, it is necessary to protect their children and staff from possible infection with coronavirus (COVID-19). Any such decision would need to be carefully considered in the light of all the circumstances and current public health advice.
Children and staff members who have been self-isolating after being identified as a close contact of a positive case of coronavirus (COVID19)
If the child or staff member remains well and does not show signs of coronavirus (COVID-19) symptoms, they can return to their normal routine at the end of the isolation period.
© Crown copyright 2021
|
<urn:uuid:380f07da-bb77-4edc-bb3f-2008498a5a01>
|
CC-MAIN-2021-17
|
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/958657/What_to_do_if_a_child_or_adult_is_displaying_symptoms_or_is_a_confirmed_case_of_coronavirus_COVI.pdf
|
2021-04-15T05:43:32+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-17/subset=warc/part-00055-74237c22-0523-49c6-9e5a-6b4aa471a042.c000.gz.parquet
| 231,474,351
| 3,329
|
eng_Latn
|
eng_Latn
| 0.999052
|
eng_Latn
| 0.999049
|
[
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
145,
155,
1146,
2930,
4677,
5842,
7390,
9518,
11393,
12330,
14414,
16534,
16558
] |
What to do if a child or adult is displaying symptoms, or is a confirmed case, of coronavirus (COVID-19) in an early years setting
February 2021
Contents
Main changes to previous guidance
We have updated this guidance as follows:
* charging parents and carers if they are unable to take up their child's place
* notify your childminder agency of confirmed cases
* added a hyperlink to NHS advice on vaccines and fevers
Who is this guidance for?
This guidance is for local authorities and all early years providers in England. This includes early years provision in:
* maintained schools
* non-maintained schools
* independent schools
* all providers on the Ofsted early years register
* all providers registered with an early years childminder agency
It explains the actions you need to take if:
* a child in your care has symptoms of coronavirus
* your setting has a confirmed case
Settings should make sure they follow the actions for early years and childcare providers during the coronavirus (COVID-19) outbreak. This guidance includes the system of controls which sets out the protective measures all settings should be following.
Child displaying symptoms of coronavirus (COVID-19)
1. Contact their parents or carers
A child must be sent home to isolate if they become unwell with any one or more of:
* a new, continuous cough
* a high temperature
* a loss of, or change in, their normal sense of taste or smell (anosmia)
The child should start isolating and get a test. The child and their household, should follow the stay at home guidance for households with possible or confirmed coronavirus (COVID-19).
You should call the parents or carers to collect the child and take them home. Any siblings and other household members attending the early years setting will also need to be sent home at the same time.
You should advise the parent or carer that all household members will need to isolate, including siblings in other settings and those in a support bubble or childcare bubble. Refer them to the guidance for households with possible or confirmed coronavirus (COVID-19) infection.
Side effects of children receiving a routine vaccination or teething
Vaccines may cause mild fever in children. This is a common and expected reaction, and isolation is not required unless coronavirus (COVID-19) is suspected. Further information is available in what to expect after vaccinations and vaccination tips for parents.
Whilst teething can cause some known side effects such as flushed cheeks and sore gums, NHS guidelines state that fever is not a symptom of teething.
Parents and carers should monitor side effects from a vaccination or teething, and if they are concerned about their child's health, they should seek advice from their GP or NHS 111.
If coronavirus (COVID-19) is suspected, the child should start isolating and get tested. Settings should follow the advice in the system of controls.
2. Isolate the child showing symptoms
While the child is awaiting collection, move them to an isolated room with appropriate adult supervision. If it is safe to do so, open a window for ventilation. If it is not possible to isolate them, move them to an area which is at least 2 metres away from other people.
Since it is unlikely that staff caring for a young child while they are awaiting collection will be able to maintain a 2 metre distance, they should wear suitable personal protective equipment (PPE). See the guidance on safe working in education, childcare and children's social care settings for more information on the use of PPE.
If the child needs to go to the bathroom while waiting to be collected, they should use a separate bathroom if possible. The bathroom should be cleaned and disinfected using standard cleaning products before being used by anyone else.
As is usual practice, in an emergency call 999 if someone is seriously ill or injured or their life is at risk. Anyone with coronavirus (COVID-19) symptoms should not visit the GP, pharmacy, urgent care centre or a hospital, unless advised to.
3. Ask the parents or carers to arrange a test for the child
When parents or carers pick up the child, advise them to get the child tested to see if they have coronavirus (COVID-19). They should notify you of the results.
4. Clean and disinfect all surfaces they have been in contact with
Once the child has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.
Staff and other children who have had contact with the child who has symptoms must wash their hands thoroughly for 20 seconds.
Staff displaying symptoms of coronavirus (COVID-19)
If a staff member develops symptoms of coronavirus (COVID-19) whilst at work, you must send them home to self-isolate and advise them to get a test as soon as possible. They should begin isolating and follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection. The isolation period includes the day the symptoms started (or the day the test was taken if they do not have symptoms), and the next 10 full days. If any of the individual's household members also attend the setting they will also need to be sent home at the same time.
Once the staff member has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.
If a staff member develops symptoms of coronavirus (COVID-19) while at home, they should not attend work and should notify their setting immediately. You should advise them to arrange to have a test to check if they have coronavirus (COVID-19) and let you know the results. Education and childcare workers are prioritised for testing.
Child or staff members who test positive for coronavirus (COVID-19)
When to contact your local health protection team
Contact your local health protection team if:
* the number of cases exceeds 2 within 14 days
* you are thinking you might need to close because of the number of people affected
* you have taken the action outlined but are still seeing more cases
* a child or staff member in your setting has been admitted to hospital
* you are getting significant interest from local media
Your local health protection team will advise you on the next steps.
1. Contact the child or staff member who has tested positive
You need to find out if they attended your setting during the infectious period. The infectious period is 2 days before their symptoms started (or their test date if they did not show any symptoms) to at least 10 days after.
Confirm that they must not attend your setting for at least 10 full days from the day after the start of their symptoms or test date if they did not have any symptoms (whether this was a Lateral Flow Device (LFD) or Polymerase Chain Reaction (PCR) test).
If they did not attend your setting during the infectious period, you do not need to take any further action.
2. Identify close contacts of the child or staff member who has tested positive
If they attended your setting during the infectious period, you need to identify potential contacts during this period following the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person
'A contact' is a person who has been close to someone who has tested positive for COVID-19 whether this was a LFD or PCR test. You can be a contact anytime from 2 days before the person who tested positive developed their symptoms, and up to 10 days after, as this is when they can pass the infection on to others.
A contact can be:
* anyone who lives in the same household as someone with COVID-19 symptoms or who has tested positive for COVID-19
* anyone in a support or childcare bubble can have close contact with others in their bubble as if they were members of their own household
* anyone who has had any of the following types of contact with someone who has tested positive for COVID-19 with a LFD or PCR test:
o face-to-face contact including being coughed on or having a face-to-face conversation within one metre
o skin-to-skin physical contact for any length of time
o been within 2 metres of someone for more than 15 minutes (either as a one-off contact, or added up together over one day)
o been within one metre for one minute or longer without face-to-face contact
o travelled in the same vehicle or a plane
If you need further guidance and support, contact the PHE advice service on 0800 046 8687 and select option 1. You will be put through to a team of advisors who will inform you what action is needed based on the latest public health advice and will work through a risk assessment to identify close contacts.
Childminders
This advice applies where a childminder usually looks after children in their own home and a member of the childminder's household has tested positive for coronavirus (COVID-19).
A childminder cannot care for children in their home because all household members must self-isolate.
The childminder's household must self-isolate. Their isolation period includes the day that the first person in their household started displaying symptoms (or the day their test was taken if they did not have symptoms, whether this was a LFD or PCR test) and the next 10 full days. They should follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection.
All children who attended the childminder's home during the child's infectious period would be considered contacts on the basis that social distancing is assumed not possible.
Where the childminder has tested positive for coronavirus (COVID-19), it is assumed that social distancing between the childminder and the children is not possible. All children who attended the setting during the childminder's infectious period would be considered close contacts and asked to isolate and follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person.
Early years settings
All children who had shared a group/room with the confirmed case during their infectious period would be considered contacts on the basis that social distancing is assumed not possible.
Identify potential contacts during the infectious period by:
* using attendance records to see who shared a group/room with the child or staff member who has tested positive
* asking the staff member who has tested positive which children or other staff members they have had contact with whilst in the setting
* asking other staff members if they have been in contact with the child or staff member who has tested positive
3. Inform close contacts they need to self-isolate
Contact parents and carers of children and any staff who ha
|
ve been identified as close contacts of a positive case.
|
Let parents and carers know that their child:
* must self-isolate for 10 days from the date of the last contact with the child or staff member who has tested positive - the isolation period includes the date of last contact and the next 10 full days
* needs to follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person
* does not need to get tested unless they have or develop symptoms themselves
4. Report all confirmed, positive cases of coronavirus (COVID19)
You must notify Ofsted, or the childminder agency with which you are registered, of any confirmed cases in the setting (either child or staff member). You should also tell Ofsted if you have to close your setting as a result.
Report as soon as you can, and in any case within 14 days. Please read the guidance on reporting incidents to ensure all of the information required is included.
5. Share information with parents and carers
Contact other parents, carers and staff to let them know there has been a confirmed case of coronavirus (COVID-19) in your setting and the actions you are taking. You should advise them:
* close contacts have been identified and asked to self-isolate
* the setting remains open to all other children (normal opening hours apply)
You must not share the names of people with coronavirus (COVID-19) unless essential to protect others.
Charging parents and carers if they are unable to take up their child's place
Providers should continue to be fair and balanced in dealings with parents or carers; and must continue to avoid unfair charging practices. Providers should refer to:
* the open letter to the early years sector published by the Competitions and Markets Authority (CMA) on 28 July 2020
* the CMA's detailed advice to the early years sector about coronavirus (COVID-19) restrictions and consumer law advice
* the CMA's broader advice on cancellations and refunds for consumer contracts affected by coronavirus (COVID-19) health restrictions
Providers should be cautious about charging parents who wish to withdraw their child from an early years setting during the lockdown. There are legitimate reasons why it may be appropriate for a whole household to remain at home, and where law or guidance requires a member of the family to stay at home. Other reasons would need to be considered on a case-by-case basis with reference to the restrictions placed on people by the new coronavirus regulations. A contract term which requires payment even where no service is being provided by the nursery or cannot be legally accessed by the consumer is likely to be unfair, as are terms which require extensive notice periods.
Each case needs to take account of individual contracts considered from the perspective of both parties and the application of the law and guidance to both providers as businesses and parents as consumers. The general principle is that providers should not charge parents or carers for services that cannot be provided. If there is a barrier to accessing childcare, based on government guidance or the law, the provider should not charge the parents or carers for this period. For example, from 28 September people in England are required by law to self-isolate if they test positive for coronavirus or are contacted by NHS Test and Trace. Accordingly, if a child is self-isolating having been contacted by NHS Test and Trace, you should not charge the parent or carer for this period.
Preparing to welcome back children and staff members who have been self-isolating
Children and staff members who have been self-isolating after testing positive for coronavirus (COVID-19)
The child or staff member who tested positive for coronavirus (COVID-19) can return to their normal routine and stop self-isolating after they have finished their isolation period and their symptoms have gone or if they continue to have only a residual cough or anosmia. This is because a cough or anosmia can last for several weeks once the infection has gone. If they still have a high temperature after 10 days or are otherwise unwell, they are advised to stay at home and seek medical advice.
The isolation period includes the day the symptoms started (or the day your test was taken if they did not have symptoms), and the next 10 full days. This means that if, for example, the symptoms started at any time on the 15th of the month (or if they did not have symptoms but their first positive coronavirus (COVID-19) test was taken on the 15th), the isolation period ends at 23:59 hrs on the 25th.
You should not request evidence of negative test results or other medical evidence before admitting children or welcoming them back after a period of self-isolation.
In most cases, settings and parents and carers will agree that a child with symptoms should not attend the setting, given the potential risk to others. If a parent or carer insists on a child attending the setting, the setting can take the decision to refuse the child if, in their reasonable judgement, it is necessary to protect their children and staff from possible infection with coronavirus (COVID-19). Any such decision would need to be carefully considered in the light of all the circumstances and current public health advice.
Children and staff members who have been self-isolating after being identified as a close contact of a positive case of coronavirus (COVID19)
If the child or staff member remains well and does not show signs of coronavirus (COVID-19) symptoms, they can return to their normal routine at the end of the isolation period.
© Crown copyright 2021
| 10,874
|
inside_word
|
have
|
remove_one_sentence
|
<url>
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/958657/What_to_do_if_a_child_or_adult_is_displaying_symptoms_or_is_a_confirmed_case_of_coronavirus_COVI.pdf
</url>
<text>
What to do if a child or adult is displaying symptoms, or is a confirmed case, of coronavirus (COVID-19) in an early years setting
February 2021
Contents
Main changes to previous guidance
We have updated this guidance as follows:
* charging parents and carers if they are unable to take up their child's place
* notify your childminder agency of confirmed cases
* added a hyperlink to NHS advice on vaccines and fevers
Who is this guidance for?
This guidance is for local authorities and all early years providers in England. This includes early years provision in:
* maintained schools
* non-maintained schools
* independent schools
* all providers on the Ofsted early years register
* all providers registered with an early years childminder agency
It explains the actions you need to take if:
* a child in your care has symptoms of coronavirus
* your setting has a confirmed case
Settings should make sure they follow the actions for early years and childcare providers during the coronavirus (COVID-19) outbreak. This guidance includes the system of controls which sets out the protective measures all settings should be following.
Child displaying symptoms of coronavirus (COVID-19)
1. Contact their parents or carers
A child must be sent home to isolate if they become unwell with any one or more of:
* a new, continuous cough
* a high temperature
* a loss of, or change in, their normal sense of taste or smell (anosmia)
The child should start isolating and get a test. The child and their household, should follow the stay at home guidance for households with possible or confirmed coronavirus (COVID-19).
You should call the parents or carers to collect the child and take them home. Any siblings and other household members attending the early years setting will also need to be sent home at the same time.
You should advise the parent or carer that all household members will need to isolate, including siblings in other settings and those in a support bubble or childcare bubble. Refer them to the guidance for households with possible or confirmed coronavirus (COVID-19) infection.
Side effects of children receiving a routine vaccination or teething
Vaccines may cause mild fever in children. This is a common and expected reaction, and isolation is not required unless coronavirus (COVID-19) is suspected. Further information is available in what to expect after vaccinations and vaccination tips for parents.
Whilst teething can cause some known side effects such as flushed cheeks and sore gums, NHS guidelines state that fever is not a symptom of teething.
Parents and carers should monitor side effects from a vaccination or teething, and if they are concerned about their child's health, they should seek advice from their GP or NHS 111.
If coronavirus (COVID-19) is suspected, the child should start isolating and get tested. Settings should follow the advice in the system of controls.
2. Isolate the child showing symptoms
While the child is awaiting collection, move them to an isolated room with appropriate adult supervision. If it is safe to do so, open a window for ventilation. If it is not possible to isolate them, move them to an area which is at least 2 metres away from other people.
Since it is unlikely that staff caring for a young child while they are awaiting collection will be able to maintain a 2 metre distance, they should wear suitable personal protective equipment (PPE). See the guidance on safe working in education, childcare and children's social care settings for more information on the use of PPE.
If the child needs to go to the bathroom while waiting to be collected, they should use a separate bathroom if possible. The bathroom should be cleaned and disinfected using standard cleaning products before being used by anyone else.
As is usual practice, in an emergency call 999 if someone is seriously ill or injured or their life is at risk. Anyone with coronavirus (COVID-19) symptoms should not visit the GP, pharmacy, urgent care centre or a hospital, unless advised to.
3. Ask the parents or carers to arrange a test for the child
When parents or carers pick up the child, advise them to get the child tested to see if they have coronavirus (COVID-19). They should notify you of the results.
4. Clean and disinfect all surfaces they have been in contact with
Once the child has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.
Staff and other children who have had contact with the child who has symptoms must wash their hands thoroughly for 20 seconds.
Staff displaying symptoms of coronavirus (COVID-19)
If a staff member develops symptoms of coronavirus (COVID-19) whilst at work, you must send them home to self-isolate and advise them to get a test as soon as possible. They should begin isolating and follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection. The isolation period includes the day the symptoms started (or the day the test was taken if they do not have symptoms), and the next 10 full days. If any of the individual's household members also attend the setting they will also need to be sent home at the same time.
Once the staff member has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.
If a staff member develops symptoms of coronavirus (COVID-19) while at home, they should not attend work and should notify their setting immediately. You should advise them to arrange to have a test to check if they have coronavirus (COVID-19) and let you know the results. Education and childcare workers are prioritised for testing.
Child or staff members who test positive for coronavirus (COVID-19)
When to contact your local health protection team
Contact your local health protection team if:
* the number of cases exceeds 2 within 14 days
* you are thinking you might need to close because of the number of people affected
* you have taken the action outlined but are still seeing more cases
* a child or staff member in your setting has been admitted to hospital
* you are getting significant interest from local media
Your local health protection team will advise you on the next steps.
1. Contact the child or staff member who has tested positive
You need to find out if they attended your setting during the infectious period. The infectious period is 2 days before their symptoms started (or their test date if they did not show any symptoms) to at least 10 days after.
Confirm that they must not attend your setting for at least 10 full days from the day after the start of their symptoms or test date if they did not have any symptoms (whether this was a Lateral Flow Device (LFD) or Polymerase Chain Reaction (PCR) test).
If they did not attend your setting during the infectious period, you do not need to take any further action.
2. Identify close contacts of the child or staff member who has tested positive
If they attended your setting during the infectious period, you need to identify potential contacts during this period following the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person
'A contact' is a person who has been close to someone who has tested positive for COVID-19 whether this was a LFD or PCR test. You can be a contact anytime from 2 days before the person who tested positive developed their symptoms, and up to 10 days after, as this is when they can pass the infection on to others.
A contact can be:
* anyone who lives in the same household as someone with COVID-19 symptoms or who has tested positive for COVID-19
* anyone in a support or childcare bubble can have close contact with others in their bubble as if they were members of their own household
* anyone who has had any of the following types of contact with someone who has tested positive for COVID-19 with a LFD or PCR test:
o face-to-face contact including being coughed on or having a face-to-face conversation within one metre
o skin-to-skin physical contact for any length of time
o been within 2 metres of someone for more than 15 minutes (either as a one-off contact, or added up together over one day)
o been within one metre for one minute or longer without face-to-face contact
o travelled in the same vehicle or a plane
If you need further guidance and support, contact the PHE advice service on 0800 046 8687 and select option 1. You will be put through to a team of advisors who will inform you what action is needed based on the latest public health advice and will work through a risk assessment to identify close contacts.
Childminders
This advice applies where a childminder usually looks after children in their own home and a member of the childminder's household has tested positive for coronavirus (COVID-19).
A childminder cannot care for children in their home because all household members must self-isolate.
The childminder's household must self-isolate. Their isolation period includes the day that the first person in their household started displaying symptoms (or the day their test was taken if they did not have symptoms, whether this was a LFD or PCR test) and the next 10 full days. They should follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection.
All children who attended the childminder's home during the child's infectious period would be considered contacts on the basis that social distancing is assumed not possible.
Where the childminder has tested positive for coronavirus (COVID-19), it is assumed that social distancing between the childminder and the children is not possible. All children who attended the setting during the childminder's infectious period would be considered close contacts and asked to isolate and follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person.
Early years settings
All children who had shared a group/room with the confirmed case during their infectious period would be considered contacts on the basis that social distancing is assumed not possible.
Identify potential contacts during the infectious period by:
* using attendance records to see who shared a group/room with the child or staff member who has tested positive
* asking the staff member who has tested positive which children or other staff members they have had contact with whilst in the setting
* asking other staff members if they have been in contact with the child or staff member who has tested positive
3. Inform close contacts they need to self-isolate
Contact parents and carers of children and any staff who ha<cursor_is_here> Let parents and carers know that their child:
* must self-isolate for 10 days from the date of the last contact with the child or staff member who has tested positive - the isolation period includes the date of last contact and the next 10 full days
* needs to follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person
* does not need to get tested unless they have or develop symptoms themselves
4. Report all confirmed, positive cases of coronavirus (COVID19)
You must notify Ofsted, or the childminder agency with which you are registered, of any confirmed cases in the setting (either child or staff member). You should also tell Ofsted if you have to close your setting as a result.
Report as soon as you can, and in any case within 14 days. Please read the guidance on reporting incidents to ensure all of the information required is included.
5. Share information with parents and carers
Contact other parents, carers and staff to let them know there has been a confirmed case of coronavirus (COVID-19) in your setting and the actions you are taking. You should advise them:
* close contacts have been identified and asked to self-isolate
* the setting remains open to all other children (normal opening hours apply)
You must not share the names of people with coronavirus (COVID-19) unless essential to protect others.
Charging parents and carers if they are unable to take up their child's place
Providers should continue to be fair and balanced in dealings with parents or carers; and must continue to avoid unfair charging practices. Providers should refer to:
* the open letter to the early years sector published by the Competitions and Markets Authority (CMA) on 28 July 2020
* the CMA's detailed advice to the early years sector about coronavirus (COVID-19) restrictions and consumer law advice
* the CMA's broader advice on cancellations and refunds for consumer contracts affected by coronavirus (COVID-19) health restrictions
Providers should be cautious about charging parents who wish to withdraw their child from an early years setting during the lockdown. There are legitimate reasons why it may be appropriate for a whole household to remain at home, and where law or guidance requires a member of the family to stay at home. Other reasons would need to be considered on a case-by-case basis with reference to the restrictions placed on people by the new coronavirus regulations. A contract term which requires payment even where no service is being provided by the nursery or cannot be legally accessed by the consumer is likely to be unfair, as are terms which require extensive notice periods.
Each case needs to take account of individual contracts considered from the perspective of both parties and the application of the law and guidance to both providers as businesses and parents as consumers. The general principle is that providers should not charge parents or carers for services that cannot be provided. If there is a barrier to accessing childcare, based on government guidance or the law, the provider should not charge the parents or carers for this period. For example, from 28 September people in England are required by law to self-isolate if they test positive for coronavirus or are contacted by NHS Test and Trace. Accordingly, if a child is self-isolating having been contacted by NHS Test and Trace, you should not charge the parent or carer for this period.
Preparing to welcome back children and staff members who have been self-isolating
Children and staff members who have been self-isolating after testing positive for coronavirus (COVID-19)
The child or staff member who tested positive for coronavirus (COVID-19) can return to their normal routine and stop self-isolating after they have finished their isolation period and their symptoms have gone or if they continue to have only a residual cough or anosmia. This is because a cough or anosmia can last for several weeks once the infection has gone. If they still have a high temperature after 10 days or are otherwise unwell, they are advised to stay at home and seek medical advice.
The isolation period includes the day the symptoms started (or the day your test was taken if they did not have symptoms), and the next 10 full days. This means that if, for example, the symptoms started at any time on the 15th of the month (or if they did not have symptoms but their first positive coronavirus (COVID-19) test was taken on the 15th), the isolation period ends at 23:59 hrs on the 25th.
You should not request evidence of negative test results or other medical evidence before admitting children or welcoming them back after a period of self-isolation.
In most cases, settings and parents and carers will agree that a child with symptoms should not attend the setting, given the potential risk to others. If a parent or carer insists on a child attending the setting, the setting can take the decision to refuse the child if, in their reasonable judgement, it is necessary to protect their children and staff from possible infection with coronavirus (COVID-19). Any such decision would need to be carefully considered in the light of all the circumstances and current public health advice.
Children and staff members who have been self-isolating after being identified as a close contact of a positive case of coronavirus (COVID19)
If the child or staff member remains well and does not show signs of coronavirus (COVID-19) symptoms, they can return to their normal routine at the end of the isolation period.
© Crown copyright 2021
</text>
|
[
{
"content": "<url>\nhttps://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/958657/What_to_do_if_a_child_or_adult_is_displaying_symptoms_or_is_a_confirmed_case_of_coronavirus_COVI.pdf\n</url>\n<text>\nWhat to do if a child or adult is displaying symptoms, or is a confirmed case, of coronavirus (COVID-19) in an early years setting\n\nFebruary 2021\n\nContents\n\nMain changes to previous guidance\n\nWe have updated this guidance as follows:\n\n* charging parents and carers if they are unable to take up their child's place\n* notify your childminder agency of confirmed cases\n* added a hyperlink to NHS advice on vaccines and fevers\n\nWho is this guidance for?\n\nThis guidance is for local authorities and all early years providers in England. This includes early years provision in:\n\n* maintained schools\n* non-maintained schools\n* independent schools\n* all providers on the Ofsted early years register\n* all providers registered with an early years childminder agency\n\nIt explains the actions you need to take if:\n\n* a child in your care has symptoms of coronavirus\n* your setting has a confirmed case\n\nSettings should make sure they follow the actions for early years and childcare providers during the coronavirus (COVID-19) outbreak. This guidance includes the system of controls which sets out the protective measures all settings should be following.\n\nChild displaying symptoms of coronavirus (COVID-19)\n\n1. Contact their parents or carers\n\nA child must be sent home to isolate if they become unwell with any one or more of:\n\n* a new, continuous cough\n* a high temperature\n* a loss of, or change in, their normal sense of taste or smell (anosmia)\n\nThe child should start isolating and get a test. The child and their household, should follow the stay at home guidance for households with possible or confirmed coronavirus (COVID-19).\n\nYou should call the parents or carers to collect the child and take them home. Any siblings and other household members attending the early years setting will also need to be sent home at the same time.\n\nYou should advise the parent or carer that all household members will need to isolate, including siblings in other settings and those in a support bubble or childcare bubble. Refer them to the guidance for households with possible or confirmed coronavirus (COVID-19) infection.\n\nSide effects of children receiving a routine vaccination or teething\n\nVaccines may cause mild fever in children. This is a common and expected reaction, and isolation is not required unless coronavirus (COVID-19) is suspected. Further information is available in what to expect after vaccinations and vaccination tips for parents.\n\nWhilst teething can cause some known side effects such as flushed cheeks and sore gums, NHS guidelines state that fever is not a symptom of teething.\n\nParents and carers should monitor side effects from a vaccination or teething, and if they are concerned about their child's health, they should seek advice from their GP or NHS 111.\n\nIf coronavirus (COVID-19) is suspected, the child should start isolating and get tested. Settings should follow the advice in the system of controls.\n\n2. Isolate the child showing symptoms\n\nWhile the child is awaiting collection, move them to an isolated room with appropriate adult supervision. If it is safe to do so, open a window for ventilation. If it is not possible to isolate them, move them to an area which is at least 2 metres away from other people.\n\nSince it is unlikely that staff caring for a young child while they are awaiting collection will be able to maintain a 2 metre distance, they should wear suitable personal protective equipment (PPE). See the guidance on safe working in education, childcare and children's social care settings for more information on the use of PPE.\n\nIf the child needs to go to the bathroom while waiting to be collected, they should use a separate bathroom if possible. The bathroom should be cleaned and disinfected using standard cleaning products before being used by anyone else.\n\nAs is usual practice, in an emergency call 999 if someone is seriously ill or injured or their life is at risk. Anyone with coronavirus (COVID-19) symptoms should not visit the GP, pharmacy, urgent care centre or a hospital, unless advised to.\n\n3. Ask the parents or carers to arrange a test for the child\n\nWhen parents or carers pick up the child, advise them to get the child tested to see if they have coronavirus (COVID-19). They should notify you of the results.\n\n4. Clean and disinfect all surfaces they have been in contact with\n\nOnce the child has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.\n\nStaff and other children who have had contact with the child who has symptoms must wash their hands thoroughly for 20 seconds.\n\nStaff displaying symptoms of coronavirus (COVID-19)\n\nIf a staff member develops symptoms of coronavirus (COVID-19) whilst at work, you must send them home to self-isolate and advise them to get a test as soon as possible. They should begin isolating and follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection. The isolation period includes the day the symptoms started (or the day the test was taken if they do not have symptoms), and the next 10 full days. If any of the individual's household members also attend the setting they will also need to be sent home at the same time.\n\nOnce the staff member has left the premises, thoroughly disinfect and clean all surfaces and contact points they came into contact with using standard cleaning products. This includes the bathroom if used.\n\nIf a staff member develops symptoms of coronavirus (COVID-19) while at home, they should not attend work and should notify their setting immediately. You should advise them to arrange to have a test to check if they have coronavirus (COVID-19) and let you know the results. Education and childcare workers are prioritised for testing.\n\nChild or staff members who test positive for coronavirus (COVID-19)\n\nWhen to contact your local health protection team\n\nContact your local health protection team if:\n\n* the number of cases exceeds 2 within 14 days\n* you are thinking you might need to close because of the number of people affected\n* you have taken the action outlined but are still seeing more cases\n* a child or staff member in your setting has been admitted to hospital\n* you are getting significant interest from local media\n\nYour local health protection team will advise you on the next steps.\n\n1. Contact the child or staff member who has tested positive\n\nYou need to find out if they attended your setting during the infectious period. The infectious period is 2 days before their symptoms started (or their test date if they did not show any symptoms) to at least 10 days after.\n\nConfirm that they must not attend your setting for at least 10 full days from the day after the start of their symptoms or test date if they did not have any symptoms (whether this was a Lateral Flow Device (LFD) or Polymerase Chain Reaction (PCR) test).\n\nIf they did not attend your setting during the infectious period, you do not need to take any further action.\n\n2. Identify close contacts of the child or staff member who has tested positive\n\nIf they attended your setting during the infectious period, you need to identify potential contacts during this period following the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person\n\n'A contact' is a person who has been close to someone who has tested positive for COVID-19 whether this was a LFD or PCR test. You can be a contact anytime from 2 days before the person who tested positive developed their symptoms, and up to 10 days after, as this is when they can pass the infection on to others.\n\nA contact can be:\n\n* anyone who lives in the same household as someone with COVID-19 symptoms or who has tested positive for COVID-19\n* anyone in a support or childcare bubble can have close contact with others in their bubble as if they were members of their own household\n* anyone who has had any of the following types of contact with someone who has tested positive for COVID-19 with a LFD or PCR test:\no face-to-face contact including being coughed on or having a face-to-face conversation within one metre\no skin-to-skin physical contact for any length of time\no been within 2 metres of someone for more than 15 minutes (either as a one-off contact, or added up together over one day)\no been within one metre for one minute or longer without face-to-face contact\no travelled in the same vehicle or a plane\n\nIf you need further guidance and support, contact the PHE advice service on 0800 046 8687 and select option 1. You will be put through to a team of advisors who will inform you what action is needed based on the latest public health advice and will work through a risk assessment to identify close contacts.\n\nChildminders\n\nThis advice applies where a childminder usually looks after children in their own home and a member of the childminder's household has tested positive for coronavirus (COVID-19).\n\nA childminder cannot care for children in their home because all household members must self-isolate.\n\nThe childminder's household must self-isolate. Their isolation period includes the day that the first person in their household started displaying symptoms (or the day their test was taken if they did not have symptoms, whether this was a LFD or PCR test) and the next 10 full days. They should follow the guidance for households with possible or confirmed coronavirus (COVID-19) infection.\n\nAll children who attended the childminder's home during the child's infectious period would be considered contacts on the basis that social distancing is assumed not possible.\n\nWhere the childminder has tested positive for coronavirus (COVID-19), it is assumed that social distancing between the childminder and the children is not possible. All children who attended the setting during the childminder's infectious period would be considered close contacts and asked to isolate and follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person.\n\nEarly years settings\n\nAll children who had shared a group/room with the confirmed case during their infectious period would be considered contacts on the basis that social distancing is assumed not possible.\n\nIdentify potential contacts during the infectious period by:\n\n* using attendance records to see who shared a group/room with the child or staff member who has tested positive\n* asking the staff member who has tested positive which children or other staff members they have had contact with whilst in the setting\n* asking other staff members if they have been in contact with the child or staff member who has tested positive\n\n3. Inform close contacts they need to self-isolate\n\nContact parents and carers of children and any staff who ha<cursor_is_here> Let parents and carers know that their child:\n\n* must self-isolate for 10 days from the date of the last contact with the child or staff member who has tested positive - the isolation period includes the date of last contact and the next 10 full days\n* needs to follow the guidance for contacts of people with confirmed coronavirus (COVID-19) infection who do not live with the person\n* does not need to get tested unless they have or develop symptoms themselves\n\n4. Report all confirmed, positive cases of coronavirus (COVID19)\n\nYou must notify Ofsted, or the childminder agency with which you are registered, of any confirmed cases in the setting (either child or staff member). You should also tell Ofsted if you have to close your setting as a result.\n\nReport as soon as you can, and in any case within 14 days. Please read the guidance on reporting incidents to ensure all of the information required is included.\n\n5. Share information with parents and carers\n\nContact other parents, carers and staff to let them know there has been a confirmed case of coronavirus (COVID-19) in your setting and the actions you are taking. You should advise them:\n\n* close contacts have been identified and asked to self-isolate\n* the setting remains open to all other children (normal opening hours apply)\n\nYou must not share the names of people with coronavirus (COVID-19) unless essential to protect others.\n\nCharging parents and carers if they are unable to take up their child's place\n\nProviders should continue to be fair and balanced in dealings with parents or carers; and must continue to avoid unfair charging practices. Providers should refer to:\n\n* the open letter to the early years sector published by the Competitions and Markets Authority (CMA) on 28 July 2020\n* the CMA's detailed advice to the early years sector about coronavirus (COVID-19) restrictions and consumer law advice\n* the CMA's broader advice on cancellations and refunds for consumer contracts affected by coronavirus (COVID-19) health restrictions\n\nProviders should be cautious about charging parents who wish to withdraw their child from an early years setting during the lockdown. There are legitimate reasons why it may be appropriate for a whole household to remain at home, and where law or guidance requires a member of the family to stay at home. Other reasons would need to be considered on a case-by-case basis with reference to the restrictions placed on people by the new coronavirus regulations. A contract term which requires payment even where no service is being provided by the nursery or cannot be legally accessed by the consumer is likely to be unfair, as are terms which require extensive notice periods.\n\nEach case needs to take account of individual contracts considered from the perspective of both parties and the application of the law and guidance to both providers as businesses and parents as consumers. The general principle is that providers should not charge parents or carers for services that cannot be provided. If there is a barrier to accessing childcare, based on government guidance or the law, the provider should not charge the parents or carers for this period. For example, from 28 September people in England are required by law to self-isolate if they test positive for coronavirus or are contacted by NHS Test and Trace. Accordingly, if a child is self-isolating having been contacted by NHS Test and Trace, you should not charge the parent or carer for this period.\n\nPreparing to welcome back children and staff members who have been self-isolating\n\nChildren and staff members who have been self-isolating after testing positive for coronavirus (COVID-19)\n\nThe child or staff member who tested positive for coronavirus (COVID-19) can return to their normal routine and stop self-isolating after they have finished their isolation period and their symptoms have gone or if they continue to have only a residual cough or anosmia. This is because a cough or anosmia can last for several weeks once the infection has gone. If they still have a high temperature after 10 days or are otherwise unwell, they are advised to stay at home and seek medical advice.\n\nThe isolation period includes the day the symptoms started (or the day your test was taken if they did not have symptoms), and the next 10 full days. This means that if, for example, the symptoms started at any time on the 15th of the month (or if they did not have symptoms but their first positive coronavirus (COVID-19) test was taken on the 15th), the isolation period ends at 23:59 hrs on the 25th.\n\nYou should not request evidence of negative test results or other medical evidence before admitting children or welcoming them back after a period of self-isolation.\n\nIn most cases, settings and parents and carers will agree that a child with symptoms should not attend the setting, given the potential risk to others. If a parent or carer insists on a child attending the setting, the setting can take the decision to refuse the child if, in their reasonable judgement, it is necessary to protect their children and staff from possible infection with coronavirus (COVID-19). Any such decision would need to be carefully considered in the light of all the circumstances and current public health advice.\n\nChildren and staff members who have been self-isolating after being identified as a close contact of a positive case of coronavirus (COVID19)\n\nIf the child or staff member remains well and does not show signs of coronavirus (COVID-19) symptoms, they can return to their normal routine at the end of the isolation period.\n\n© Crown copyright 2021\n</text>\n",
"role": "user"
},
{
"content": "ve been identified as close contacts of a positive case.",
"role": "assistant"
}
] |
AN IMPACT-ORIENTED MANAGEMENT OF KNOWLEDGE (IOMK)
FOR PROJECT DESIGN AND MONITORING
Contacts: Audrey Nepveu (IFAD) and Patrick d'Aquino (CIRAD)
1. Overview
How to effectively create local changes that trigger lasting changes and at larger scale through a timelimited intervention? Projects and programmes' outputs are confronted with many social and institutional hurdles which hamper their scaling up and out, within the country and beyond. These hurdles are often merely considered as externalities. Meanwhile, an approach to manage knowledge, right from project design or during implementation, can help overcome these social and institutional obstacles and achieve lasting scaling up and out despite the modest means of a time-limited intervention.
Creating lasting changes first implies taking into account the progress to be achieved in the comprehensive Society knowledge process. Achieving a lasting impact means achieving a sufficient change within the
Impact-oriented management of knowledge: achieving a sufficient change within the knowledge of the different people who are involved in the given impact sought to achieve a lasting impact.
knowledge of the different people involved in the given impact sought. This means that the design or monitoring phase does not only deal with the local target groups, but also includes the necessary links with
Society knowledge process: the progress in knowledge of each element of the society involved in the chain of knowledge assimilation, which ends up in a lasting improvement of the society's knowledge.
methodological answer is to develop a other stakeholders, including higher level ones, which are needed to trigger an impact process and to make this impact last. The challenge is thus to achieve changes not only in the local target groups, but also in these other people and key institutions, thereby impacting the knowledge process of the whole context. A
the whole social and institutional context and, to remain manageable and achievable, strategically focuses on creating a practical and realistic first lasting change. This contextualized framework clarifies what practical knowledge progresses are needed contextualized framework of knowledge management
that considers
Contextualized knowledge: the practical knowledge about and from the context which is required to make the different stakeholders of the impact chain progress so far as to provoke a lasting improvement of the society's knowledge.
from this diversity of stakeholders in order to trigger various essential micro changes which will result in a lasting impact.
Once the strategic focus related to the management of knowledge is clearly identified, the second priority is to turn the practical progresses in knowledge required into the contextualized personal and institutional
Inclusive conversion step: turn the practical knowledge progresses required into the contextualized personal and institutional changes of practices they imply.
stakeholders and partners abilities, which are best placed to capture the social and institutional specificities of the local context. This is the inclusive step of the management of knowledge process. The methodological challenge in this inclusive step is to identify every contextualized new behaviors, organizations, practices and actions required in the context to trigger a first, modest lasting change. A relevant way to implement this step is by simulating the process of the proposed change.
changes of practices they imply. In other words, convert practical improvements of knowledge into contextualized changes of practices. This conversion requires local
A simulation workshop enables stakeholders to simulate ("play") their behaviors, organizations, practices and actions, including their scaling up and out, and then to also "play" the modifications needed in the knowledge of the actor they are playing in order to integrate the proposed lasting change. The best way to
implement this inclusive step is to implement several workshops, some with local target groups and some with the higher level stakeholders required to achieve a lasting scaling up and out.
In two time-bound steps, the process to manage knowledge of the various stakeholders involved first defines the different practical progresses in knowledge required to affect the different stakeholders of the
Supporting the Management of Knowledge to achieve lasting impacts of project helps define every practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change, and then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.
chain of local progresses which ends up a lasting change; then supports the development of a shared agreement among the stakeholders on the practical actions, organizations and proposals to achieve these various local changes. This impact-oriented management of knowledge process can be implemented at design stage of a project or along its implementation, as support to an impact-oriented strategy.
2. Methodological guidelines
Whether at design or implementation phase, setting a contextualized framework to manage knowledge in order to bring a lasting change involves two stages.
2.1 Designing a contextualized knowledge process
(a) First, designing a contextualized Knowledge Management strategy
The whole method is underpinned by a thoroughly pragmatic questioning process: in the context of the planned intervention, in order to achieve the first but workable progress in empowerment in the context concerned, what hurdles need to be overcome and how? Which key people and institutions will need to be changed first and how, to achieve this initial progress? These questions may seem obvious, but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups, in participatory workshops - remains difficult. Indeed, among the many stakeholders involved, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these needs to be considered as priority goals rather than as externalities?
A specific "spiral questioning", which progressively turns the initial too general considerations on these questions into refined, contextualized and operational priorities to manage knowledge (Figure 1), helps to define a sufficiently precise operational knowledge management strategy. In particular, progressively highlighting the key pragmatic constraints often implies accepting factors that were originally identified as simple preconditions or external pitfalls as new central targets. The crux of this eliciting process is the Knowledge Management loop, which ends up in defining the exact nature of the "progress in knowledge" required to launch the first
lasting change. In figure 1, tThe prequesites and pitfalls
Figure 1. A spiral questioning to define the contextualized KM strategy
Knowledge Management loop. As long as the answers to step 3 remain "no" these preconditions remain unfulfilled and the process goes back to step 1. This is the way the "keep modest but operational" principle is applied. Several loops may be necessary until there are no more changes to the step 1 objectives through step 3 questionning. Once the Step 1 answers have been defined, one can go directly to Step 4.
identified in step 3 are necessary preconditions in the
During the implementation of this central "Knowledge Management loop", a color-coded specification is used to help participants focus on the very operational and contextualized progresses in knowledge required to bring change about (Figure 2).
Figure 2. A color frame to refine contextualized KM objectives
to manage society's knowledge in the mid- and longterms, which outputs respond to modest short-term objectives but are also embedded within a more ambitious long-term frame (lasting scaling up and out).
In fact, during the definition of the knowledge processes of a given project, one may easily be not practical or contextualized enough… What is at stake is to understand what is exactly needed for each key stakeholder (practical synthesis of different theoretical learning concepts): does s/he merely need to be present? To receive particular information? To develop a specific knowhow? To changing a specific attitude? To have his/her power position modified? This fourth eliciting loop results in a workable short, contextualized strategy
Managing four different types of knowledge: scientific information, know-how, attitudes and leadership capacities.
The minimum conditions and operational processes required to trigger a momentum able to achieve the first priority lasting impact are identified.
(b) Second, identifying methods and tools to support Knowledge Management process within the Project implementation
Once all the targeted practical progresses are clearly and concretely tailored with stakeholders, it becomes easier to select methods and tools suited to achieve each progress in knowledge (see the last loop in Figure 1). With the help of facilitators skilled on implementation methods, this loop helps to select each specific methodological support and the corresponding action that is indispensable to deal with each distinct knowledge progress identified in the previous steps.
Figure 3 presents an example of the diversity of methodological means
selected using this form of knowledge management strategy: participatory appraisal or planning, training, learning by doing exercises, personal exchange, social networking, institutional lobbying, etc. Some unusual
actions can also be identified, e.g. acts that confer a higher status to certain stakeholders in the process could jeopardize achieving the most important impacts.
2.2 Converting the contextualized knowledge process in a chain of local changes, in an inclusive manner
The contextualized conversion is implemented through participatory simulation workshops. It has been increasingly recognised that, when dealing with complex issues, simulation and participation can be mutually reinforcing. A simulation game is very similar to a role playing game. Simulation games are based on the "learning-by-doing" hypothesis that assessing complexity is more efficient when people act (simulate) and then progress on their own with the opportunity to analyze the outcomes of their actions (e.g. Reed et al., 2010). Where a full-fledged learning-by-doing process would be too heavy, the learningby-doing exercise is replaced by "learning-through-simulation".
The simulation game which supports the inclusive conversion of a knowledge process in a chain of local changes is designed with the combination of the outputs from the contextualized knowledge process (2.1 above) and the issue tackled by the project.
According to the issue tackled by the project, a simulation board is developed, which translates in material items on the board the key elements of the issue: products, incomes, natural resources, infrastructure… the material items may be very common, like matches, even for complex issue (burned matches in a match box have been already used to represent avian flu chickens in an ASEAN simulation game on the control of avian flu epidemics). Outputs and outcomes of the project must also be represented by some of the material items of the board (tokens, cards, marbles…).
Participants of the simulation game are identified thanks to the previous knowledge management framework (see figure 2 above). They draw on their knowledge of the context to play the roles of the various stakeholders involved in the simulated chain of local changes (also identified thanks to the previous knowledge management framework). Participants simulate ("play") the actions of these stakeholders within the current situation of the issue: taping resources, implementing different farming activities, producing incomes and investing, feeding their family, negotiating access rights, agreeing for a new infrastructure… Roles are identified not only for local users and target groups but also for the other stakeholders involved in the chain of changes resulting in a lasting scaling up and out: neighbouring communities, higher levels stakeholders…
Participants "play" the game and enrich it with their own points of view, in particular on the institutional and social contexts. Thanks to simple material items, they are able to assess medium and long-term impacts of their actions while they are using the board game.
Participants are then asked to identify the different changes required to improve the results of the "game" (i.e. indicator(s) of the issue, monitored thanks to simple material items like tokens or matches), and to test their proposals by simulating them (playing again).
After a few cycles of debating/proposing/simulating, participants have tailored precise, concrete and shared assessments on how the context could achieve a lasting change. Since by construction of the game, the group of participants brings together the different key stakeholders required to obtain this change (see below the workshop settings), the output of this inclusive assessment will be more easily transformed in outcomes, and then impacts.
Simulation workshops have to bring together the different key stakeholders required to obtain the targeted change, which often means two different types of stakeholders: the local target groups and the other "surrounding" stakeholders required for a scaling up and out. It is often more convenient to separate these two groups and organize two different simulation workshops: the first one only with local target groups, and the second one with representatives of the local target groups and with the other "surrounding" stakeholders. Simulation workshops need time: the best way to achieve results is to implement a three-day workshop (d'Aquino et al. ref).
Thus in two time-limited steps, this Impact-Oriented Management of Knowledge (IOMK) support defines all the practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change. The IOMK then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.
3. Training method: what does it takes?
The training method itself is based on knowledge management principles: combining knowledges, learningby-doing, and incremental progress. The whole process, comprising (i) the design of the strategy for Contextualized Management of Knowledge, (ii) the inclusive conversion of this knowledge process into a practical chain of local changes, and (iii) the mobilization of the whole group of key stakeholders for an impact-oriented approach (target groups, projects staff, portfolio resources people, CPM, other key stakeholders at higher scales), is based on three workshops (for a total of 9 days):
- two parallel three-day participatory simulation workshops (one in the field and one in the office); and
- a two-day KM strategy design;
- a one-day completion meeting.
3.1 Training process: learning-by-doing in selected projects, to improve their impact-oriented strategy
The training method is designed to reach three target groups within the same training support: (i) project staff of selected cases; (ii) other interested projects from the region; (iii) the relevant CPMs and CPOs of the regional division.
In practical terms, it is proposed to choose specific field issues (projects issues, policy dialogue…) as case studies and mobilize facilitation skills to implement the Impact-Oriented Management of Knowledge support through four workshops (see details below). Project staff of the selected case studies will cofacilitate the process with the trainer (cf. learning-by-doing), and the others trainees (interested projects, CPMs and CPOs from the regional division) will attend the process.
The learning-by-doing facilitation process includes four steps and an optional fifth one:
(a) A one-day workshop facilitated by the trainer - Finalizing the selected field issue, and its related strategic participants (CPM, projects staff, portfolio resources people, and other key stakeholders) which will be brought together during the following workshops.
A deep knowledge of the context is required to fill in the Knowledge Management framework and progressively refine, loop after loop, a better contextualized strategic position. To implement this eliciting process, it is worth sharing knowledge of the context and views between diverse key partners. Consequently, deciding what is meant by key local partner is a first requirement. According to the strategic and contextualized stance developed, these key people identified are a local strategic alliance, which rallies stakeholders around common goals right from the beginning of the process.
(b) A two-day workshop co-facilitated by the trainer and project staff of the selected case study - Designing the KM contextualized strategy for the selected field issues with the strategic participants.
The whole workshop is underpinned by a thoroughly pragmatic questioning process supported by a spiral questioning framework (see above methodological guidelines on 2.1): in the context of the selected issue, in order to achieve the first but workable and lasting progress in the context concerned, what hurdles need to be overcome, and how? Which key people and institutions will need to be changed first, and how, to achieve this initial progress? These questions may seem obvious but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups - remains difficult. Indeed, among the many stakeholders, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these need to be considered as priority goals rather than as externalities?
(c) Two three-day workshops co-facilitated by the trainer and project staff of the selected case study Implementing the two KM inclusive workshops on the issue selected from the field, one with local target groups, and one with the strategic participants.
These workshops let participants design on their own the devising process and supports the development of a lasting impact. A simulation game has been designed by the trainer from the outputs of the first two workshops. The support provides a very opened role playing game that enable participants to shape their ideas about the chain of changes which can result in a lasting impact, and then to test them by "playing" them:
* Participants identify the key stakeholders required to achieve a lasting impact, and these key stakeholders become roles in the simulation game.
* Participants then identify the "winning objective" of each of these stakeholders (what motivates the given stakeholder?), and the "activities" they practice (from farming activities to administrative management or power behaviors), and these elements become the playing rules for these roles.
* Then the facilitator suggests an organization of the board game basic elements in order to enable the players to follow key impact indicators (according to the issue, it may be progresses in productivity, incomes, food self-sufficiency, resources stocks or quality, intensity of conflicts…).
* Participants are then able to simulate (spontaneously play, based on their own perception) the behaviours of the stakeholders from whom a change is required to achieve a lasting impact.
* From this first use of the simulation platform, participants debate the best changes required for each stakeholder to achieve the lasting impact sought. They then test their ideas by playing it. After a few cycles, some precise and very diverse actions (from participatory assessments to lobbying) are tailored by participants.
* As the participants are at the origin of the above outputs, their commitment to support the actions devised together is very high. They launch themselves into a strategic planning to implement these actions and support project staff for some of them (lobbying or disseminating knowledge for example).
(d) A one-day workshop facilitated by the trainer - Completion training session with project staff to finalize the impact-oriented action plan developed during the previous workshops.
Optional additional step: Monitoring sessions of the impact-oriented action plan can be organized yearly.
3.2 Opening the learning opportunity to others not in the field, through monitoring sessions of the project cases implementation
The training method may include a parallel, less intensive training for IFAD staff interested in a better understanding of the Impact-Oriented Management of Knowledge organized around monitoring sessions of the implementation of these case studies.
In practical terms, two monitoring sessions of the case study implementation can be organized, in Rome for example: one before and one at the end of the process. These sessions would allow additional people to familiarize and assimilate the approach.
4. Opportunities for IFAD portfolio: project cases for in Southern Asia
4.1 Cambodia: Rural livelihoods improvement project in Kratie, Preah Vihear and Ratanakiri
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively involve these stakeholders in the design and implementation of an up scaling strategy to government offices, especially the Ministry of Agriculture, Forestry and Fisheries?
* How to effectively involve commune councils, local extension workers and village elders in the design and implementation of an out scaling strategy of the project results to other villages?
4.2 Cambodia: Tonle Sap poverty reduction and smallholder development project
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively set lasting arrangements to pilot rural communication technology for information on access to technology and markets?
* How to effectively involve key people from provincial, districts, commune and village levels in a collective support to the project target groups, through a more effective governance?
4.3 Lao PDR: Sustainable natural resource management and productivity enhancement project
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively embed projects outcomes within government's overall objectives, for a lasting scaling up and out, especially with regards to Lao Northern lands?
* How to effectively involve national, provincial, district and village levels in a shared action to achieve this lasting impact? The IOMK support proposes tools and methods for a multi-level participatory design of this up scaling (e.g. d'Aquino and Bah 2013).
* How to effectively stimulate a shared strategy between poor farmers, farmers' organizations, producers' associations and private sectors so that poor farmers remain involved in these processes in the long term?
The IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared responsibility of natural resources, land and water management scales (participatory local land uses x provincial plans x government planning objectives):
* The playing board for the local simulation session can be the participatory land uses mapping, while the board for the 'office' (central) simulation session will be the provincial management plan. As the board game can bring together within the same game session several board maps (d'Aquino abd Bah 2012), the local simulation session can take into account the needed coordination with neighbouring communities' planning while the central session can gather several board maps representing different provinces… and raise discussions about how to coordinate these.
* Whoever they are – farmers in the local session or government officers in the central session –, each participant plays two roles: the local user (by playing the role into the game) and the government officer (because of the way the roles in the game have been designed: see details of step b above). This particular setting leads participants of both sessions to develop a shared understanding and proposal to implement a 'multi-level' chain of changes towards a lasting impact.
4.4 Lao PDR: Rural livelihoods improvement program in Attapeu and Sayabouri
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively achieve a lasting acknowledgement of the strengthened village institutions by locals as well as by the State?
* How to effectively achieve a lasting scaling out of the new farming technologies introduced?
* How to effectively achieve a lasting acknowledgement and support by the State of the newly introduced measures to manage natural resources? How to effectively embed in the long term the local land uses tools into national land uses policies?
The IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared understanding and a common proposal to implement a 'multi-level' chain of changes towards a lasting impact.
4.5 Viet Nam: Project for adaptation to climate change in the Mekong delta in Ben Tre and Tra Vinh provinces
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively design a scaling out method so that local stakeholders (from villagers to government officers) themselves disseminate the achievements of the project on rural poor' adaptive capacities to better contend with climate change? The IOMK support provides tools and methods that involve key stakeholders of this scaling up into the strategic design of the process of scaling up and out (e.g. d'Aquino and Bah 2012).
|
<urn:uuid:e32dab56-5642-424a-8a1c-7dc5a075b27b>
|
CC-MAIN-2018-05
|
http://agents.cirad.fr/pjjimg/[email protected]/Management_of_Knowledge_for_Impact.pdf
|
2018-01-18T21:56:02Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887621.26/warc/CC-MAIN-20180118210638-20180118230638-00740.warc.gz
| 11,019,429
| 4,847
|
eng_Latn
|
eng_Latn
| 0.996824
|
eng_Latn
| 0.997191
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3971,
7647,
9851,
14138,
18309,
22166,
25844,
26527
] |
AN IMPACT-ORIENTED MANAGEMENT OF KNOWLEDGE (IOMK)
FOR PROJECT DESIGN AND MONITORING
Contacts: Audrey Nepveu (IFAD) and Patrick d'Aquino (CIRAD)
1. Overview
How to effectively create local changes that trigger lasting changes and at larger scale through a timelimited intervention? Projects and programmes' outputs are confronted with many social and institutional hurdles which hamper their scaling up and out, within the country and beyond. These hurdles are often merely considered as externalities. Meanwhile, an approach to manage knowledge, right from project design or during implementation, can help overcome these social and institutional obstacles and achieve lasting scaling up and out despite the modest means of a time-limited intervention.
Creating lasting changes first implies taking into account the progress to be achieved in the comprehensive Society knowledge process. Achieving a lasting impact means achieving a sufficient change within the
Impact-oriented management of knowledge: achieving a sufficient change within the knowledge of the different people who are involved in the given impact sought to achieve a lasting impact.
knowledge of the different people involved in the given impact sought. This means that the design or monitoring phase does not only deal with the local target groups, but also includes the necessary links with
Society knowledge process: the progress in knowledge of each element of the society involved in the chain of knowledge assimilation, which ends up in a lasting improvement of the society's knowledge.
methodological answer is to develop a other stakeholders, including higher level ones, which are needed to trigger an impact process and to make this impact last. The challenge is thus to achieve changes not only in the local target groups, but also in these other people and key institutions, thereby impacting the knowledge process of the whole context. A
the whole social and institutional context and, to remain manageable and achievable, strategically focuses on creating a practical and realistic first lasting change. This contextualized framework clarifies what practical knowledge progresses are needed contextualized framework of knowledge management
that considers
Contextualized knowledge: the practical knowledge about and from the context which is required to make the different stakeholders of the impact chain progress so far as to provoke a lasting improvement of the society's knowledge.
from this diversity of stakeholders in order to trigger various essential micro changes which will result in a lasting impact.
Once the strategic focus related to the management of knowledge is clearly identified, the second priority is to turn the practical progresses in knowledge required into the contextualized personal and institutional
Inclusive conversion step: turn the practical knowledge progresses required into the contextualized personal and institutional changes of practices they imply.
stakeholders and partners abilities, which are best placed to capture the social and institutional specificities of the local context. This is the inclusive step of the management of knowledge process. The methodological challenge in this inclusive step is to identify every contextualized new behaviors, organizations, practices and actions required in the context to trigger a first, modest lasting change. A relevant way to implement this step is by simulating the process of the proposed change.
changes of practices they imply. In other words, convert practical improvements of knowledge into contextualized changes of practices. This conversion requires local
A simulation workshop enables stakeholders to simulate ("play") their behaviors, organizations, practices and actions, including their scaling up and out, and then to also "play" the modifications needed in the knowledge of the actor they are playing in order to integrate the proposed lasting change. The best way to
implement this inclusive step is to implement several workshops, some with local target groups and some with the higher level stakeholders required to achieve a lasting scaling up and out.
In two time-bound steps, the process to manage knowledge of the various stakeholders involved first defines the different practical progresses in knowledge required to affect the different stakeholders of the
Supporting the Management of Knowledge to achieve lasting impacts of project helps define every practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change, and then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.
chain of local progresses which ends up a lasting change; then supports the development of a shared agreement among the stakeholders on the practical actions, organizations and proposals to achieve these various local changes. This impact-oriented management of knowledge process can be implemented at design stage of a project or along its implementation, as support to an impact-oriented strategy.
2. Methodological guidelines
Whether at design or implementation phase, setting a contextualized framework to manage knowledge in order to bring a lasting change involves two stages.
2.1 Designing a contextualized knowledge process
(a) First, designing a contextualized Knowledge Management strategy
The whole method is underpinned by a thoroughly pragmatic questioning process: in the context of the planned intervention, in order to achieve the first but workable progress in empowerment in the context concerned, what hurdles need to be overcome and how? Which key people and institutions will need to be changed first and how, to achieve this initial progress? These questions may seem obvious, but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups, in participatory workshops - remains difficult. Indeed, among the many stakeholders involved, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these needs to be considered as priority goals rather than as externalities?
A specific "spiral questioning", which progressively turns the initial too general considerations on these questions into refined, contextualized and operational priorities to manage knowledge (Figure 1), helps to define a sufficiently precise operational knowledge management strategy. In particular, progressively highlighting the key pragmatic constraints often implies accepting factors that were originally identified as simple preconditions or external pitfalls as new central targets. The crux of this eliciting process is the Knowledge Management loop, which ends up in defining the exact nature of the "progress in knowledge" required to launch the first
lasting change. In figure 1, tThe prequesites and pitfalls
Figure 1. A spiral questioning to define the contextualized KM strategy
Knowledge Management loop. As long as the answers to step 3 remain "no" these preconditions remain unfulfilled and the process goes back to step 1. This is the way the "keep modest but operational" principle is applied. Several loops may be necessary until there are no more changes to the step 1 objectives through step 3 questionning. Once the Step 1 answers have been defined, one can go directly to Step 4.
identified in step 3 are necessary preconditions in the
During the implementation of this central "Knowledge Management loop", a color-coded specification is used to help participants focus on the very operational and contextualized progresses in knowledge required to bring change about (Figure 2).
Figure 2. A color frame to refine contextualized KM objectives
to manage society's knowledge in the mid- and longterms, which outputs respond to modest short-term objectives but are also embedded within a more ambitious long-term frame (lasting scaling up and out).
In fact, during the definition of the knowledge processes of a given project, one may easily be not practical or contextualized enough… What is at stake is to understand what is exactly needed for each key stakeholder (practical synthesis of different theoretical learning concepts): does s/he merely need to be present? To receive particular information? To develop a specific knowhow? To changing a specific attitude? To have his/her power position modified? This fourth eliciting loop results in a workable short, contextualized strategy
Managing four different types of knowledge: scientific information, know-how, attitudes and leadership capacities.
The minimum conditions and operational processes required to trigger a momentum able to achieve the first priority lasting impact are identified.
(b) Second, identifying methods and tools to support Knowledge Management process within the Project implementation
Once all the targeted practical progresses are clearly and concretely tailored with stakeholders, it becomes easier to select methods and tools suited to achieve each progress in knowledge (see the last loop in Figure 1). With the help of facilitators skilled on implementation methods, this loop helps to select each specific methodological support and the corresponding action that is indispensable to deal with each distinct knowledge progress identified in the previous steps.
Figure 3 presents an example of the diversity of methodological means
selected using this form of knowledge management strategy: participatory appraisal or planning, training, learning by doing exercises, personal exchange, social networking, institutional lobbying, etc. Some unusual
actions can also be identified, e.g. acts that confer a higher status to certain stakeholders in the process could jeopardize achieving the most important impacts.
2.2 Converting the contextualized knowledge process in a chain of local changes, in an inclusive manner
The contextualized conversion is implemented through participatory simulation workshops. It has been increasingly recognised that, when dealing with complex issues, simulation and participation can be mutually reinforcing. A simulation game is very similar to a role playing game. Simulation games are based on the "learning-by-doing" hypothesis that assessing complexity is more efficient when people act (simulate) and then progress on their own with the opportunity to analyze the outcomes of their actions (e.g. Reed et al., 2010). Where a full-fledged learning-by-doing process would be too heavy, the learningby-doing exercise is replaced by "learning-through-simulation".
The simulation game which supports the inclusive conversion of a knowledge process in a chain of local changes is designed with the combination of the outputs from the contextualized knowledge process (2.1 above) and the issue tackled by the project.
According to the issue tackled by the project, a simulation board is developed, which translates in material items on the board the key elements of the issue: products, incomes, natural resources, infrastructure… the material items may be very common, like matches, even for complex issue (burned matches in a match box have been already used to represent avian flu chickens in an ASEAN simulation game on the control of avian flu epidemics). Outputs and outcomes of the project must also be represented by some of the material items of the board (tokens, cards, marbles…).
Participants of the simulation game are identified thanks to the previous knowledge management framework (see figure 2 above). They draw on their knowledge of the context to play the roles of the various stakeholders involved in the simulated chain of local changes (also identified thanks to the previous knowledge management framework). Participants simulate ("play") the actions of these stakeholders within the current situation of the issue: taping resources, implementing different farming activities, producing incomes and investing, feeding their family, negotiating access rights, agreeing for a new infrastructure… Roles are identified not only for local users and target groups but also for the other stakeholders involved in the chain of changes resulting in a lasting scaling up and out: neighbouring communities, higher levels stakeholders…
Participants "play" the game and enrich it with their own points of view, in particular on the institutional and social contexts. Thanks to simple material items, they are able to assess medium and long-term impacts of their actions while they are using the board game.
Participants are then asked to identify the different changes required to improve the results of the "game" (i.e. indicator(s) of the issue, monitored thanks to simple material items like tokens or matches), and to test their proposals by simulating them (playing again).
After a few cycles of debating/proposing/simulating, participants have tailored precise, concrete and shared assessments on how the context could achieve a lasting change. Since by construction of the game, the group of participants brings together the different key stakeholders required to obtain this change (see below the workshop settings), the output of this inclusive assessment will be more easily transformed in outcomes, and then impacts.
Simulation workshops have to bring together the different key stakeholders required to obtain the targeted change, which often means two different types of stakeholders: the local target groups and the other "surrounding" stakeholders required for a scaling up and out. It is often more convenient to separate these two groups and organize two different simulation workshops: the first one only with local target groups, and the second one with representatives of the local target groups and with the other "surrounding" stakeholders. Simulation workshops need time: the best way to achieve results is to implement a three-day workshop (d'Aquino et al. ref).
Thus in two time-limited steps, this Impact-Oriented Management of Knowledge (IOMK) support defines all the practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change. The IOMK then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.
3. Training method: what does it takes?
The training method itself is based on knowledge management principles: combining knowledges, learningby-doing, and incremental progress. The whole process, comprising (i) the design of the strategy for Contextualized Management of Knowledge, (ii) the inclusive conversion of this knowledge process into a practical chain of local changes, and (iii) the mobilization of the whole group of key stakeholders for an impact-oriented approach (target groups, projects staff, portfolio resources people, CPM, other key stakeholders at higher scales), is based on three workshops (for a total of 9 days):
- two parallel three-day participatory simulation workshops (one in the field and one in the office); and
- a two-day KM strategy design;
- a one-day completion meeting.
3.1 Training process: learning-by-doing in selected projects, to improve their impact-oriented strategy
The training method is designed to reach three target groups within the same training support: (i) project staff of selected cases; (ii) other interested projects from the region; (iii) the relevant CPMs and CPOs of the regional division.
In practical terms, it is proposed to choose specific field issues (projects issues, policy dialogue…) as case studies and mobilize facilitation skills to implement the Impact-Oriented Management of Knowledge support through four workshops (see details below). Project staff of the selected case studies will cofacilitate the process with the trainer (cf. learning-by-doing), and the others trainees (interested projects, CPMs and CPOs from the regional division) will attend the process.
The learning-by-doing facilitation process includes four steps and an optional fifth one:
(a) A one-day workshop facilitated by the trainer - Finalizing the selected field issue, and its related strategic participants (CPM, projects staff, portfolio resources people, and other key stakeholders) which will be brought together during the following workshops.
A deep knowledge of the context is required to fill in the Knowledge Management framework and progressively refine, loop after loop, a better contextualized strategic position. To implement this eliciting process, it is worth sharing knowledge of the context and views between diverse key partners. Consequently, deciding what is meant by key local partner is a first requirement. According to the strategic and contextualized stance developed, these key people identified are a loc
|
al strategic alliance, which rallies stakeholders around common goals right from the beginning of the process.
|
(b) A two-day workshop co-facilitated by the trainer and project staff of the selected case study - Designing the KM contextualized strategy for the selected field issues with the strategic participants.
The whole workshop is underpinned by a thoroughly pragmatic questioning process supported by a spiral questioning framework (see above methodological guidelines on 2.1): in the context of the selected issue, in order to achieve the first but workable and lasting progress in the context concerned, what hurdles need to be overcome, and how? Which key people and institutions will need to be changed first, and how, to achieve this initial progress? These questions may seem obvious but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups - remains difficult. Indeed, among the many stakeholders, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these need to be considered as priority goals rather than as externalities?
(c) Two three-day workshops co-facilitated by the trainer and project staff of the selected case study Implementing the two KM inclusive workshops on the issue selected from the field, one with local target groups, and one with the strategic participants.
These workshops let participants design on their own the devising process and supports the development of a lasting impact. A simulation game has been designed by the trainer from the outputs of the first two workshops. The support provides a very opened role playing game that enable participants to shape their ideas about the chain of changes which can result in a lasting impact, and then to test them by "playing" them:
* Participants identify the key stakeholders required to achieve a lasting impact, and these key stakeholders become roles in the simulation game.
* Participants then identify the "winning objective" of each of these stakeholders (what motivates the given stakeholder?), and the "activities" they practice (from farming activities to administrative management or power behaviors), and these elements become the playing rules for these roles.
* Then the facilitator suggests an organization of the board game basic elements in order to enable the players to follow key impact indicators (according to the issue, it may be progresses in productivity, incomes, food self-sufficiency, resources stocks or quality, intensity of conflicts…).
* Participants are then able to simulate (spontaneously play, based on their own perception) the behaviours of the stakeholders from whom a change is required to achieve a lasting impact.
* From this first use of the simulation platform, participants debate the best changes required for each stakeholder to achieve the lasting impact sought. They then test their ideas by playing it. After a few cycles, some precise and very diverse actions (from participatory assessments to lobbying) are tailored by participants.
* As the participants are at the origin of the above outputs, their commitment to support the actions devised together is very high. They launch themselves into a strategic planning to implement these actions and support project staff for some of them (lobbying or disseminating knowledge for example).
(d) A one-day workshop facilitated by the trainer - Completion training session with project staff to finalize the impact-oriented action plan developed during the previous workshops.
Optional additional step: Monitoring sessions of the impact-oriented action plan can be organized yearly.
3.2 Opening the learning opportunity to others not in the field, through monitoring sessions of the project cases implementation
The training method may include a parallel, less intensive training for IFAD staff interested in a better understanding of the Impact-Oriented Management of Knowledge organized around monitoring sessions of the implementation of these case studies.
In practical terms, two monitoring sessions of the case study implementation can be organized, in Rome for example: one before and one at the end of the process. These sessions would allow additional people to familiarize and assimilate the approach.
4. Opportunities for IFAD portfolio: project cases for in Southern Asia
4.1 Cambodia: Rural livelihoods improvement project in Kratie, Preah Vihear and Ratanakiri
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively involve these stakeholders in the design and implementation of an up scaling strategy to government offices, especially the Ministry of Agriculture, Forestry and Fisheries?
* How to effectively involve commune councils, local extension workers and village elders in the design and implementation of an out scaling strategy of the project results to other villages?
4.2 Cambodia: Tonle Sap poverty reduction and smallholder development project
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively set lasting arrangements to pilot rural communication technology for information on access to technology and markets?
* How to effectively involve key people from provincial, districts, commune and village levels in a collective support to the project target groups, through a more effective governance?
4.3 Lao PDR: Sustainable natural resource management and productivity enhancement project
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively embed projects outcomes within government's overall objectives, for a lasting scaling up and out, especially with regards to Lao Northern lands?
* How to effectively involve national, provincial, district and village levels in a shared action to achieve this lasting impact? The IOMK support proposes tools and methods for a multi-level participatory design of this up scaling (e.g. d'Aquino and Bah 2013).
* How to effectively stimulate a shared strategy between poor farmers, farmers' organizations, producers' associations and private sectors so that poor farmers remain involved in these processes in the long term?
The IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared responsibility of natural resources, land and water management scales (participatory local land uses x provincial plans x government planning objectives):
* The playing board for the local simulation session can be the participatory land uses mapping, while the board for the 'office' (central) simulation session will be the provincial management plan. As the board game can bring together within the same game session several board maps (d'Aquino abd Bah 2012), the local simulation session can take into account the needed coordination with neighbouring communities' planning while the central session can gather several board maps representing different provinces… and raise discussions about how to coordinate these.
* Whoever they are – farmers in the local session or government officers in the central session –, each participant plays two roles: the local user (by playing the role into the game) and the government officer (because of the way the roles in the game have been designed: see details of step b above). This particular setting leads participants of both sessions to develop a shared understanding and proposal to implement a 'multi-level' chain of changes towards a lasting impact.
4.4 Lao PDR: Rural livelihoods improvement program in Attapeu and Sayabouri
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively achieve a lasting acknowledgement of the strengthened village institutions by locals as well as by the State?
* How to effectively achieve a lasting scaling out of the new farming technologies introduced?
* How to effectively achieve a lasting acknowledgement and support by the State of the newly introduced measures to manage natural resources? How to effectively embed in the long term the local land uses tools into national land uses policies?
The IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared understanding and a common proposal to implement a 'multi-level' chain of changes towards a lasting impact.
4.5 Viet Nam: Project for adaptation to climate change in the Mekong delta in Ben Tre and Tra Vinh provinces
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively design a scaling out method so that local stakeholders (from villagers to government officers) themselves disseminate the achievements of the project on rural poor' adaptive capacities to better contend with climate change? The IOMK support provides tools and methods that involve key stakeholders of this scaling up into the strategic design of the process of scaling up and out (e.g. d'Aquino and Bah 2012).
| 17,030
|
inside_word
|
local
|
remove_one_sentence
|
<url>
http://agents.cirad.fr/pjjimg/[email protected]/Management_of_Knowledge_for_Impact.pdf
</url>
<text>
AN IMPACT-ORIENTED MANAGEMENT OF KNOWLEDGE (IOMK)
FOR PROJECT DESIGN AND MONITORING
Contacts: Audrey Nepveu (IFAD) and Patrick d'Aquino (CIRAD)
1. Overview
How to effectively create local changes that trigger lasting changes and at larger scale through a timelimited intervention? Projects and programmes' outputs are confronted with many social and institutional hurdles which hamper their scaling up and out, within the country and beyond. These hurdles are often merely considered as externalities. Meanwhile, an approach to manage knowledge, right from project design or during implementation, can help overcome these social and institutional obstacles and achieve lasting scaling up and out despite the modest means of a time-limited intervention.
Creating lasting changes first implies taking into account the progress to be achieved in the comprehensive Society knowledge process. Achieving a lasting impact means achieving a sufficient change within the
Impact-oriented management of knowledge: achieving a sufficient change within the knowledge of the different people who are involved in the given impact sought to achieve a lasting impact.
knowledge of the different people involved in the given impact sought. This means that the design or monitoring phase does not only deal with the local target groups, but also includes the necessary links with
Society knowledge process: the progress in knowledge of each element of the society involved in the chain of knowledge assimilation, which ends up in a lasting improvement of the society's knowledge.
methodological answer is to develop a other stakeholders, including higher level ones, which are needed to trigger an impact process and to make this impact last. The challenge is thus to achieve changes not only in the local target groups, but also in these other people and key institutions, thereby impacting the knowledge process of the whole context. A
the whole social and institutional context and, to remain manageable and achievable, strategically focuses on creating a practical and realistic first lasting change. This contextualized framework clarifies what practical knowledge progresses are needed contextualized framework of knowledge management
that considers
Contextualized knowledge: the practical knowledge about and from the context which is required to make the different stakeholders of the impact chain progress so far as to provoke a lasting improvement of the society's knowledge.
from this diversity of stakeholders in order to trigger various essential micro changes which will result in a lasting impact.
Once the strategic focus related to the management of knowledge is clearly identified, the second priority is to turn the practical progresses in knowledge required into the contextualized personal and institutional
Inclusive conversion step: turn the practical knowledge progresses required into the contextualized personal and institutional changes of practices they imply.
stakeholders and partners abilities, which are best placed to capture the social and institutional specificities of the local context. This is the inclusive step of the management of knowledge process. The methodological challenge in this inclusive step is to identify every contextualized new behaviors, organizations, practices and actions required in the context to trigger a first, modest lasting change. A relevant way to implement this step is by simulating the process of the proposed change.
changes of practices they imply. In other words, convert practical improvements of knowledge into contextualized changes of practices. This conversion requires local
A simulation workshop enables stakeholders to simulate ("play") their behaviors, organizations, practices and actions, including their scaling up and out, and then to also "play" the modifications needed in the knowledge of the actor they are playing in order to integrate the proposed lasting change. The best way to
implement this inclusive step is to implement several workshops, some with local target groups and some with the higher level stakeholders required to achieve a lasting scaling up and out.
In two time-bound steps, the process to manage knowledge of the various stakeholders involved first defines the different practical progresses in knowledge required to affect the different stakeholders of the
Supporting the Management of Knowledge to achieve lasting impacts of project helps define every practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change, and then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.
chain of local progresses which ends up a lasting change; then supports the development of a shared agreement among the stakeholders on the practical actions, organizations and proposals to achieve these various local changes. This impact-oriented management of knowledge process can be implemented at design stage of a project or along its implementation, as support to an impact-oriented strategy.
2. Methodological guidelines
Whether at design or implementation phase, setting a contextualized framework to manage knowledge in order to bring a lasting change involves two stages.
2.1 Designing a contextualized knowledge process
(a) First, designing a contextualized Knowledge Management strategy
The whole method is underpinned by a thoroughly pragmatic questioning process: in the context of the planned intervention, in order to achieve the first but workable progress in empowerment in the context concerned, what hurdles need to be overcome and how? Which key people and institutions will need to be changed first and how, to achieve this initial progress? These questions may seem obvious, but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups, in participatory workshops - remains difficult. Indeed, among the many stakeholders involved, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these needs to be considered as priority goals rather than as externalities?
A specific "spiral questioning", which progressively turns the initial too general considerations on these questions into refined, contextualized and operational priorities to manage knowledge (Figure 1), helps to define a sufficiently precise operational knowledge management strategy. In particular, progressively highlighting the key pragmatic constraints often implies accepting factors that were originally identified as simple preconditions or external pitfalls as new central targets. The crux of this eliciting process is the Knowledge Management loop, which ends up in defining the exact nature of the "progress in knowledge" required to launch the first
lasting change. In figure 1, tThe prequesites and pitfalls
Figure 1. A spiral questioning to define the contextualized KM strategy
Knowledge Management loop. As long as the answers to step 3 remain "no" these preconditions remain unfulfilled and the process goes back to step 1. This is the way the "keep modest but operational" principle is applied. Several loops may be necessary until there are no more changes to the step 1 objectives through step 3 questionning. Once the Step 1 answers have been defined, one can go directly to Step 4.
identified in step 3 are necessary preconditions in the
During the implementation of this central "Knowledge Management loop", a color-coded specification is used to help participants focus on the very operational and contextualized progresses in knowledge required to bring change about (Figure 2).
Figure 2. A color frame to refine contextualized KM objectives
to manage society's knowledge in the mid- and longterms, which outputs respond to modest short-term objectives but are also embedded within a more ambitious long-term frame (lasting scaling up and out).
In fact, during the definition of the knowledge processes of a given project, one may easily be not practical or contextualized enough… What is at stake is to understand what is exactly needed for each key stakeholder (practical synthesis of different theoretical learning concepts): does s/he merely need to be present? To receive particular information? To develop a specific knowhow? To changing a specific attitude? To have his/her power position modified? This fourth eliciting loop results in a workable short, contextualized strategy
Managing four different types of knowledge: scientific information, know-how, attitudes and leadership capacities.
The minimum conditions and operational processes required to trigger a momentum able to achieve the first priority lasting impact are identified.
(b) Second, identifying methods and tools to support Knowledge Management process within the Project implementation
Once all the targeted practical progresses are clearly and concretely tailored with stakeholders, it becomes easier to select methods and tools suited to achieve each progress in knowledge (see the last loop in Figure 1). With the help of facilitators skilled on implementation methods, this loop helps to select each specific methodological support and the corresponding action that is indispensable to deal with each distinct knowledge progress identified in the previous steps.
Figure 3 presents an example of the diversity of methodological means
selected using this form of knowledge management strategy: participatory appraisal or planning, training, learning by doing exercises, personal exchange, social networking, institutional lobbying, etc. Some unusual
actions can also be identified, e.g. acts that confer a higher status to certain stakeholders in the process could jeopardize achieving the most important impacts.
2.2 Converting the contextualized knowledge process in a chain of local changes, in an inclusive manner
The contextualized conversion is implemented through participatory simulation workshops. It has been increasingly recognised that, when dealing with complex issues, simulation and participation can be mutually reinforcing. A simulation game is very similar to a role playing game. Simulation games are based on the "learning-by-doing" hypothesis that assessing complexity is more efficient when people act (simulate) and then progress on their own with the opportunity to analyze the outcomes of their actions (e.g. Reed et al., 2010). Where a full-fledged learning-by-doing process would be too heavy, the learningby-doing exercise is replaced by "learning-through-simulation".
The simulation game which supports the inclusive conversion of a knowledge process in a chain of local changes is designed with the combination of the outputs from the contextualized knowledge process (2.1 above) and the issue tackled by the project.
According to the issue tackled by the project, a simulation board is developed, which translates in material items on the board the key elements of the issue: products, incomes, natural resources, infrastructure… the material items may be very common, like matches, even for complex issue (burned matches in a match box have been already used to represent avian flu chickens in an ASEAN simulation game on the control of avian flu epidemics). Outputs and outcomes of the project must also be represented by some of the material items of the board (tokens, cards, marbles…).
Participants of the simulation game are identified thanks to the previous knowledge management framework (see figure 2 above). They draw on their knowledge of the context to play the roles of the various stakeholders involved in the simulated chain of local changes (also identified thanks to the previous knowledge management framework). Participants simulate ("play") the actions of these stakeholders within the current situation of the issue: taping resources, implementing different farming activities, producing incomes and investing, feeding their family, negotiating access rights, agreeing for a new infrastructure… Roles are identified not only for local users and target groups but also for the other stakeholders involved in the chain of changes resulting in a lasting scaling up and out: neighbouring communities, higher levels stakeholders…
Participants "play" the game and enrich it with their own points of view, in particular on the institutional and social contexts. Thanks to simple material items, they are able to assess medium and long-term impacts of their actions while they are using the board game.
Participants are then asked to identify the different changes required to improve the results of the "game" (i.e. indicator(s) of the issue, monitored thanks to simple material items like tokens or matches), and to test their proposals by simulating them (playing again).
After a few cycles of debating/proposing/simulating, participants have tailored precise, concrete and shared assessments on how the context could achieve a lasting change. Since by construction of the game, the group of participants brings together the different key stakeholders required to obtain this change (see below the workshop settings), the output of this inclusive assessment will be more easily transformed in outcomes, and then impacts.
Simulation workshops have to bring together the different key stakeholders required to obtain the targeted change, which often means two different types of stakeholders: the local target groups and the other "surrounding" stakeholders required for a scaling up and out. It is often more convenient to separate these two groups and organize two different simulation workshops: the first one only with local target groups, and the second one with representatives of the local target groups and with the other "surrounding" stakeholders. Simulation workshops need time: the best way to achieve results is to implement a three-day workshop (d'Aquino et al. ref).
Thus in two time-limited steps, this Impact-Oriented Management of Knowledge (IOMK) support defines all the practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change. The IOMK then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.
3. Training method: what does it takes?
The training method itself is based on knowledge management principles: combining knowledges, learningby-doing, and incremental progress. The whole process, comprising (i) the design of the strategy for Contextualized Management of Knowledge, (ii) the inclusive conversion of this knowledge process into a practical chain of local changes, and (iii) the mobilization of the whole group of key stakeholders for an impact-oriented approach (target groups, projects staff, portfolio resources people, CPM, other key stakeholders at higher scales), is based on three workshops (for a total of 9 days):
- two parallel three-day participatory simulation workshops (one in the field and one in the office); and
- a two-day KM strategy design;
- a one-day completion meeting.
3.1 Training process: learning-by-doing in selected projects, to improve their impact-oriented strategy
The training method is designed to reach three target groups within the same training support: (i) project staff of selected cases; (ii) other interested projects from the region; (iii) the relevant CPMs and CPOs of the regional division.
In practical terms, it is proposed to choose specific field issues (projects issues, policy dialogue…) as case studies and mobilize facilitation skills to implement the Impact-Oriented Management of Knowledge support through four workshops (see details below). Project staff of the selected case studies will cofacilitate the process with the trainer (cf. learning-by-doing), and the others trainees (interested projects, CPMs and CPOs from the regional division) will attend the process.
The learning-by-doing facilitation process includes four steps and an optional fifth one:
(a) A one-day workshop facilitated by the trainer - Finalizing the selected field issue, and its related strategic participants (CPM, projects staff, portfolio resources people, and other key stakeholders) which will be brought together during the following workshops.
A deep knowledge of the context is required to fill in the Knowledge Management framework and progressively refine, loop after loop, a better contextualized strategic position. To implement this eliciting process, it is worth sharing knowledge of the context and views between diverse key partners. Consequently, deciding what is meant by key local partner is a first requirement. According to the strategic and contextualized stance developed, these key people identified are a loc<cursor_is_here>
(b) A two-day workshop co-facilitated by the trainer and project staff of the selected case study - Designing the KM contextualized strategy for the selected field issues with the strategic participants.
The whole workshop is underpinned by a thoroughly pragmatic questioning process supported by a spiral questioning framework (see above methodological guidelines on 2.1): in the context of the selected issue, in order to achieve the first but workable and lasting progress in the context concerned, what hurdles need to be overcome, and how? Which key people and institutions will need to be changed first, and how, to achieve this initial progress? These questions may seem obvious but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups - remains difficult. Indeed, among the many stakeholders, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these need to be considered as priority goals rather than as externalities?
(c) Two three-day workshops co-facilitated by the trainer and project staff of the selected case study Implementing the two KM inclusive workshops on the issue selected from the field, one with local target groups, and one with the strategic participants.
These workshops let participants design on their own the devising process and supports the development of a lasting impact. A simulation game has been designed by the trainer from the outputs of the first two workshops. The support provides a very opened role playing game that enable participants to shape their ideas about the chain of changes which can result in a lasting impact, and then to test them by "playing" them:
* Participants identify the key stakeholders required to achieve a lasting impact, and these key stakeholders become roles in the simulation game.
* Participants then identify the "winning objective" of each of these stakeholders (what motivates the given stakeholder?), and the "activities" they practice (from farming activities to administrative management or power behaviors), and these elements become the playing rules for these roles.
* Then the facilitator suggests an organization of the board game basic elements in order to enable the players to follow key impact indicators (according to the issue, it may be progresses in productivity, incomes, food self-sufficiency, resources stocks or quality, intensity of conflicts…).
* Participants are then able to simulate (spontaneously play, based on their own perception) the behaviours of the stakeholders from whom a change is required to achieve a lasting impact.
* From this first use of the simulation platform, participants debate the best changes required for each stakeholder to achieve the lasting impact sought. They then test their ideas by playing it. After a few cycles, some precise and very diverse actions (from participatory assessments to lobbying) are tailored by participants.
* As the participants are at the origin of the above outputs, their commitment to support the actions devised together is very high. They launch themselves into a strategic planning to implement these actions and support project staff for some of them (lobbying or disseminating knowledge for example).
(d) A one-day workshop facilitated by the trainer - Completion training session with project staff to finalize the impact-oriented action plan developed during the previous workshops.
Optional additional step: Monitoring sessions of the impact-oriented action plan can be organized yearly.
3.2 Opening the learning opportunity to others not in the field, through monitoring sessions of the project cases implementation
The training method may include a parallel, less intensive training for IFAD staff interested in a better understanding of the Impact-Oriented Management of Knowledge organized around monitoring sessions of the implementation of these case studies.
In practical terms, two monitoring sessions of the case study implementation can be organized, in Rome for example: one before and one at the end of the process. These sessions would allow additional people to familiarize and assimilate the approach.
4. Opportunities for IFAD portfolio: project cases for in Southern Asia
4.1 Cambodia: Rural livelihoods improvement project in Kratie, Preah Vihear and Ratanakiri
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively involve these stakeholders in the design and implementation of an up scaling strategy to government offices, especially the Ministry of Agriculture, Forestry and Fisheries?
* How to effectively involve commune councils, local extension workers and village elders in the design and implementation of an out scaling strategy of the project results to other villages?
4.2 Cambodia: Tonle Sap poverty reduction and smallholder development project
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively set lasting arrangements to pilot rural communication technology for information on access to technology and markets?
* How to effectively involve key people from provincial, districts, commune and village levels in a collective support to the project target groups, through a more effective governance?
4.3 Lao PDR: Sustainable natural resource management and productivity enhancement project
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively embed projects outcomes within government's overall objectives, for a lasting scaling up and out, especially with regards to Lao Northern lands?
* How to effectively involve national, provincial, district and village levels in a shared action to achieve this lasting impact? The IOMK support proposes tools and methods for a multi-level participatory design of this up scaling (e.g. d'Aquino and Bah 2013).
* How to effectively stimulate a shared strategy between poor farmers, farmers' organizations, producers' associations and private sectors so that poor farmers remain involved in these processes in the long term?
The IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared responsibility of natural resources, land and water management scales (participatory local land uses x provincial plans x government planning objectives):
* The playing board for the local simulation session can be the participatory land uses mapping, while the board for the 'office' (central) simulation session will be the provincial management plan. As the board game can bring together within the same game session several board maps (d'Aquino abd Bah 2012), the local simulation session can take into account the needed coordination with neighbouring communities' planning while the central session can gather several board maps representing different provinces… and raise discussions about how to coordinate these.
* Whoever they are – farmers in the local session or government officers in the central session –, each participant plays two roles: the local user (by playing the role into the game) and the government officer (because of the way the roles in the game have been designed: see details of step b above). This particular setting leads participants of both sessions to develop a shared understanding and proposal to implement a 'multi-level' chain of changes towards a lasting impact.
4.4 Lao PDR: Rural livelihoods improvement program in Attapeu and Sayabouri
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively achieve a lasting acknowledgement of the strengthened village institutions by locals as well as by the State?
* How to effectively achieve a lasting scaling out of the new farming technologies introduced?
* How to effectively achieve a lasting acknowledgement and support by the State of the newly introduced measures to manage natural resources? How to effectively embed in the long term the local land uses tools into national land uses policies?
The IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared understanding and a common proposal to implement a 'multi-level' chain of changes towards a lasting impact.
4.5 Viet Nam: Project for adaptation to climate change in the Mekong delta in Ben Tre and Tra Vinh provinces
The Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:
* How to effectively design a scaling out method so that local stakeholders (from villagers to government officers) themselves disseminate the achievements of the project on rural poor' adaptive capacities to better contend with climate change? The IOMK support provides tools and methods that involve key stakeholders of this scaling up into the strategic design of the process of scaling up and out (e.g. d'Aquino and Bah 2012).
</text>
|
[
{
"content": "<url>\nhttp://agents.cirad.fr/pjjimg/[email protected]/Management_of_Knowledge_for_Impact.pdf\n</url>\n<text>\nAN IMPACT-ORIENTED MANAGEMENT OF KNOWLEDGE (IOMK)\n\nFOR PROJECT DESIGN AND MONITORING\n\nContacts: Audrey Nepveu (IFAD) and Patrick d'Aquino (CIRAD)\n\n1. Overview\n\nHow to effectively create local changes that trigger lasting changes and at larger scale through a timelimited intervention? Projects and programmes' outputs are confronted with many social and institutional hurdles which hamper their scaling up and out, within the country and beyond. These hurdles are often merely considered as externalities. Meanwhile, an approach to manage knowledge, right from project design or during implementation, can help overcome these social and institutional obstacles and achieve lasting scaling up and out despite the modest means of a time-limited intervention.\n\nCreating lasting changes first implies taking into account the progress to be achieved in the comprehensive Society knowledge process. Achieving a lasting impact means achieving a sufficient change within the\n\nImpact-oriented management of knowledge: achieving a sufficient change within the knowledge of the different people who are involved in the given impact sought to achieve a lasting impact.\n\nknowledge of the different people involved in the given impact sought. This means that the design or monitoring phase does not only deal with the local target groups, but also includes the necessary links with\n\nSociety knowledge process: the progress in knowledge of each element of the society involved in the chain of knowledge assimilation, which ends up in a lasting improvement of the society's knowledge.\n\nmethodological answer is to develop a other stakeholders, including higher level ones, which are needed to trigger an impact process and to make this impact last. The challenge is thus to achieve changes not only in the local target groups, but also in these other people and key institutions, thereby impacting the knowledge process of the whole context. A\n\nthe whole social and institutional context and, to remain manageable and achievable, strategically focuses on creating a practical and realistic first lasting change. This contextualized framework clarifies what practical knowledge progresses are needed contextualized framework of knowledge management\n\nthat considers\n\nContextualized knowledge: the practical knowledge about and from the context which is required to make the different stakeholders of the impact chain progress so far as to provoke a lasting improvement of the society's knowledge.\n\nfrom this diversity of stakeholders in order to trigger various essential micro changes which will result in a lasting impact.\n\nOnce the strategic focus related to the management of knowledge is clearly identified, the second priority is to turn the practical progresses in knowledge required into the contextualized personal and institutional\n\nInclusive conversion step: turn the practical knowledge progresses required into the contextualized personal and institutional changes of practices they imply.\n\nstakeholders and partners abilities, which are best placed to capture the social and institutional specificities of the local context. This is the inclusive step of the management of knowledge process. The methodological challenge in this inclusive step is to identify every contextualized new behaviors, organizations, practices and actions required in the context to trigger a first, modest lasting change. A relevant way to implement this step is by simulating the process of the proposed change.\n\nchanges of practices they imply. In other words, convert practical improvements of knowledge into contextualized changes of practices. This conversion requires local\n\nA simulation workshop enables stakeholders to simulate (\"play\") their behaviors, organizations, practices and actions, including their scaling up and out, and then to also \"play\" the modifications needed in the knowledge of the actor they are playing in order to integrate the proposed lasting change. The best way to\n\nimplement this inclusive step is to implement several workshops, some with local target groups and some with the higher level stakeholders required to achieve a lasting scaling up and out.\n\nIn two time-bound steps, the process to manage knowledge of the various stakeholders involved first defines the different practical progresses in knowledge required to affect the different stakeholders of the\n\nSupporting the Management of Knowledge to achieve lasting impacts of project helps define every practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change, and then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.\n\nchain of local progresses which ends up a lasting change; then supports the development of a shared agreement among the stakeholders on the practical actions, organizations and proposals to achieve these various local changes. This impact-oriented management of knowledge process can be implemented at design stage of a project or along its implementation, as support to an impact-oriented strategy.\n\n2. Methodological guidelines\n\nWhether at design or implementation phase, setting a contextualized framework to manage knowledge in order to bring a lasting change involves two stages.\n\n2.1 Designing a contextualized knowledge process\n\n(a) First, designing a contextualized Knowledge Management strategy\n\nThe whole method is underpinned by a thoroughly pragmatic questioning process: in the context of the planned intervention, in order to achieve the first but workable progress in empowerment in the context concerned, what hurdles need to be overcome and how? Which key people and institutions will need to be changed first and how, to achieve this initial progress? These questions may seem obvious, but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups, in participatory workshops - remains difficult. Indeed, among the many stakeholders involved, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these needs to be considered as priority goals rather than as externalities?\n\nA specific \"spiral questioning\", which progressively turns the initial too general considerations on these questions into refined, contextualized and operational priorities to manage knowledge (Figure 1), helps to define a sufficiently precise operational knowledge management strategy. In particular, progressively highlighting the key pragmatic constraints often implies accepting factors that were originally identified as simple preconditions or external pitfalls as new central targets. The crux of this eliciting process is the Knowledge Management loop, which ends up in defining the exact nature of the \"progress in knowledge\" required to launch the first\n\nlasting change. In figure 1, tThe prequesites and pitfalls\n\nFigure 1. A spiral questioning to define the contextualized KM strategy\n\nKnowledge Management loop. As long as the answers to step 3 remain \"no\" these preconditions remain unfulfilled and the process goes back to step 1. This is the way the \"keep modest but operational\" principle is applied. Several loops may be necessary until there are no more changes to the step 1 objectives through step 3 questionning. Once the Step 1 answers have been defined, one can go directly to Step 4.\n\nidentified in step 3 are necessary preconditions in the\n\nDuring the implementation of this central \"Knowledge Management loop\", a color-coded specification is used to help participants focus on the very operational and contextualized progresses in knowledge required to bring change about (Figure 2).\n\nFigure 2. A color frame to refine contextualized KM objectives\n\nto manage society's knowledge in the mid- and longterms, which outputs respond to modest short-term objectives but are also embedded within a more ambitious long-term frame (lasting scaling up and out).\n\nIn fact, during the definition of the knowledge processes of a given project, one may easily be not practical or contextualized enough… What is at stake is to understand what is exactly needed for each key stakeholder (practical synthesis of different theoretical learning concepts): does s/he merely need to be present? To receive particular information? To develop a specific knowhow? To changing a specific attitude? To have his/her power position modified? This fourth eliciting loop results in a workable short, contextualized strategy\n\nManaging four different types of knowledge: scientific information, know-how, attitudes and leadership capacities.\n\nThe minimum conditions and operational processes required to trigger a momentum able to achieve the first priority lasting impact are identified.\n\n(b) Second, identifying methods and tools to support Knowledge Management process within the Project implementation\n\nOnce all the targeted practical progresses are clearly and concretely tailored with stakeholders, it becomes easier to select methods and tools suited to achieve each progress in knowledge (see the last loop in Figure 1). With the help of facilitators skilled on implementation methods, this loop helps to select each specific methodological support and the corresponding action that is indispensable to deal with each distinct knowledge progress identified in the previous steps.\n\nFigure 3 presents an example of the diversity of methodological means\n\nselected using this form of knowledge management strategy: participatory appraisal or planning, training, learning by doing exercises, personal exchange, social networking, institutional lobbying, etc. Some unusual\n\nactions can also be identified, e.g. acts that confer a higher status to certain stakeholders in the process could jeopardize achieving the most important impacts.\n\n2.2 Converting the contextualized knowledge process in a chain of local changes, in an inclusive manner\n\nThe contextualized conversion is implemented through participatory simulation workshops. It has been increasingly recognised that, when dealing with complex issues, simulation and participation can be mutually reinforcing. A simulation game is very similar to a role playing game. Simulation games are based on the \"learning-by-doing\" hypothesis that assessing complexity is more efficient when people act (simulate) and then progress on their own with the opportunity to analyze the outcomes of their actions (e.g. Reed et al., 2010). Where a full-fledged learning-by-doing process would be too heavy, the learningby-doing exercise is replaced by \"learning-through-simulation\".\n\nThe simulation game which supports the inclusive conversion of a knowledge process in a chain of local changes is designed with the combination of the outputs from the contextualized knowledge process (2.1 above) and the issue tackled by the project.\n\nAccording to the issue tackled by the project, a simulation board is developed, which translates in material items on the board the key elements of the issue: products, incomes, natural resources, infrastructure… the material items may be very common, like matches, even for complex issue (burned matches in a match box have been already used to represent avian flu chickens in an ASEAN simulation game on the control of avian flu epidemics). Outputs and outcomes of the project must also be represented by some of the material items of the board (tokens, cards, marbles…).\n\nParticipants of the simulation game are identified thanks to the previous knowledge management framework (see figure 2 above). They draw on their knowledge of the context to play the roles of the various stakeholders involved in the simulated chain of local changes (also identified thanks to the previous knowledge management framework). Participants simulate (\"play\") the actions of these stakeholders within the current situation of the issue: taping resources, implementing different farming activities, producing incomes and investing, feeding their family, negotiating access rights, agreeing for a new infrastructure… Roles are identified not only for local users and target groups but also for the other stakeholders involved in the chain of changes resulting in a lasting scaling up and out: neighbouring communities, higher levels stakeholders…\n\nParticipants \"play\" the game and enrich it with their own points of view, in particular on the institutional and social contexts. Thanks to simple material items, they are able to assess medium and long-term impacts of their actions while they are using the board game.\n\nParticipants are then asked to identify the different changes required to improve the results of the \"game\" (i.e. indicator(s) of the issue, monitored thanks to simple material items like tokens or matches), and to test their proposals by simulating them (playing again).\n\nAfter a few cycles of debating/proposing/simulating, participants have tailored precise, concrete and shared assessments on how the context could achieve a lasting change. Since by construction of the game, the group of participants brings together the different key stakeholders required to obtain this change (see below the workshop settings), the output of this inclusive assessment will be more easily transformed in outcomes, and then impacts.\n\nSimulation workshops have to bring together the different key stakeholders required to obtain the targeted change, which often means two different types of stakeholders: the local target groups and the other \"surrounding\" stakeholders required for a scaling up and out. It is often more convenient to separate these two groups and organize two different simulation workshops: the first one only with local target groups, and the second one with representatives of the local target groups and with the other \"surrounding\" stakeholders. Simulation workshops need time: the best way to achieve results is to implement a three-day workshop (d'Aquino et al. ref).\n\nThus in two time-limited steps, this Impact-Oriented Management of Knowledge (IOMK) support defines all the practical progresses in knowledge required to affect key stakeholders in the local chain of changes which results in a lasting change. The IOMK then achieves a common agreement among stakeholders on the practical actions, organizations and proposals to achieve these different local changes.\n\n3. Training method: what does it takes?\n\nThe training method itself is based on knowledge management principles: combining knowledges, learningby-doing, and incremental progress. The whole process, comprising (i) the design of the strategy for Contextualized Management of Knowledge, (ii) the inclusive conversion of this knowledge process into a practical chain of local changes, and (iii) the mobilization of the whole group of key stakeholders for an impact-oriented approach (target groups, projects staff, portfolio resources people, CPM, other key stakeholders at higher scales), is based on three workshops (for a total of 9 days):\n\n- two parallel three-day participatory simulation workshops (one in the field and one in the office); and\n- a two-day KM strategy design;\n- a one-day completion meeting.\n\n3.1 Training process: learning-by-doing in selected projects, to improve their impact-oriented strategy\n\nThe training method is designed to reach three target groups within the same training support: (i) project staff of selected cases; (ii) other interested projects from the region; (iii) the relevant CPMs and CPOs of the regional division.\n\nIn practical terms, it is proposed to choose specific field issues (projects issues, policy dialogue…) as case studies and mobilize facilitation skills to implement the Impact-Oriented Management of Knowledge support through four workshops (see details below). Project staff of the selected case studies will cofacilitate the process with the trainer (cf. learning-by-doing), and the others trainees (interested projects, CPMs and CPOs from the regional division) will attend the process.\n\nThe learning-by-doing facilitation process includes four steps and an optional fifth one:\n\n(a) A one-day workshop facilitated by the trainer - Finalizing the selected field issue, and its related strategic participants (CPM, projects staff, portfolio resources people, and other key stakeholders) which will be brought together during the following workshops.\n\nA deep knowledge of the context is required to fill in the Knowledge Management framework and progressively refine, loop after loop, a better contextualized strategic position. To implement this eliciting process, it is worth sharing knowledge of the context and views between diverse key partners. Consequently, deciding what is meant by key local partner is a first requirement. According to the strategic and contextualized stance developed, these key people identified are a loc<cursor_is_here>\n\n(b) A two-day workshop co-facilitated by the trainer and project staff of the selected case study - Designing the KM contextualized strategy for the selected field issues with the strategic participants.\n\nThe whole workshop is underpinned by a thoroughly pragmatic questioning process supported by a spiral questioning framework (see above methodological guidelines on 2.1): in the context of the selected issue, in order to achieve the first but workable and lasting progress in the context concerned, what hurdles need to be overcome, and how? Which key people and institutions will need to be changed first, and how, to achieve this initial progress? These questions may seem obvious but experience shows that going beyond simple solutions - like involving everybody, especially disadvantaged groups - remains difficult. Indeed, among the many stakeholders, who are the first ones that need changing to make the context amenable to a lasting change? What are the preconditions or external factors which may limit or even prevent the local and global targeted impacts? As a consequence, do these need to be considered as priority goals rather than as externalities?\n\n(c) Two three-day workshops co-facilitated by the trainer and project staff of the selected case study Implementing the two KM inclusive workshops on the issue selected from the field, one with local target groups, and one with the strategic participants.\n\nThese workshops let participants design on their own the devising process and supports the development of a lasting impact. A simulation game has been designed by the trainer from the outputs of the first two workshops. The support provides a very opened role playing game that enable participants to shape their ideas about the chain of changes which can result in a lasting impact, and then to test them by \"playing\" them:\n\n* Participants identify the key stakeholders required to achieve a lasting impact, and these key stakeholders become roles in the simulation game.\n* Participants then identify the \"winning objective\" of each of these stakeholders (what motivates the given stakeholder?), and the \"activities\" they practice (from farming activities to administrative management or power behaviors), and these elements become the playing rules for these roles.\n* Then the facilitator suggests an organization of the board game basic elements in order to enable the players to follow key impact indicators (according to the issue, it may be progresses in productivity, incomes, food self-sufficiency, resources stocks or quality, intensity of conflicts…).\n* Participants are then able to simulate (spontaneously play, based on their own perception) the behaviours of the stakeholders from whom a change is required to achieve a lasting impact.\n* From this first use of the simulation platform, participants debate the best changes required for each stakeholder to achieve the lasting impact sought. They then test their ideas by playing it. After a few cycles, some precise and very diverse actions (from participatory assessments to lobbying) are tailored by participants.\n* As the participants are at the origin of the above outputs, their commitment to support the actions devised together is very high. They launch themselves into a strategic planning to implement these actions and support project staff for some of them (lobbying or disseminating knowledge for example).\n(d) A one-day workshop facilitated by the trainer - Completion training session with project staff to finalize the impact-oriented action plan developed during the previous workshops.\n\nOptional additional step: Monitoring sessions of the impact-oriented action plan can be organized yearly.\n\n3.2 Opening the learning opportunity to others not in the field, through monitoring sessions of the project cases implementation\n\nThe training method may include a parallel, less intensive training for IFAD staff interested in a better understanding of the Impact-Oriented Management of Knowledge organized around monitoring sessions of the implementation of these case studies.\n\nIn practical terms, two monitoring sessions of the case study implementation can be organized, in Rome for example: one before and one at the end of the process. These sessions would allow additional people to familiarize and assimilate the approach.\n\n4. Opportunities for IFAD portfolio: project cases for in Southern Asia\n\n4.1 Cambodia: Rural livelihoods improvement project in Kratie, Preah Vihear and Ratanakiri\n\nThe Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:\n\n* How to effectively involve these stakeholders in the design and implementation of an up scaling strategy to government offices, especially the Ministry of Agriculture, Forestry and Fisheries?\n* How to effectively involve commune councils, local extension workers and village elders in the design and implementation of an out scaling strategy of the project results to other villages?\n\n4.2 Cambodia: Tonle Sap poverty reduction and smallholder development project\n\nThe Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:\n\n* How to effectively set lasting arrangements to pilot rural communication technology for information on access to technology and markets?\n* How to effectively involve key people from provincial, districts, commune and village levels in a collective support to the project target groups, through a more effective governance?\n\n4.3 Lao PDR: Sustainable natural resource management and productivity enhancement project\n\nThe Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:\n\n* How to effectively embed projects outcomes within government's overall objectives, for a lasting scaling up and out, especially with regards to Lao Northern lands?\n* How to effectively involve national, provincial, district and village levels in a shared action to achieve this lasting impact? The IOMK support proposes tools and methods for a multi-level participatory design of this up scaling (e.g. d'Aquino and Bah 2013).\n* How to effectively stimulate a shared strategy between poor farmers, farmers' organizations, producers' associations and private sectors so that poor farmers remain involved in these processes in the long term?\n\nThe IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared responsibility of natural resources, land and water management scales (participatory local land uses x provincial plans x government planning objectives):\n\n* The playing board for the local simulation session can be the participatory land uses mapping, while the board for the 'office' (central) simulation session will be the provincial management plan. As the board game can bring together within the same game session several board maps (d'Aquino abd Bah 2012), the local simulation session can take into account the needed coordination with neighbouring communities' planning while the central session can gather several board maps representing different provinces… and raise discussions about how to coordinate these.\n* Whoever they are – farmers in the local session or government officers in the central session –, each participant plays two roles: the local user (by playing the role into the game) and the government officer (because of the way the roles in the game have been designed: see details of step b above). This particular setting leads participants of both sessions to develop a shared understanding and proposal to implement a 'multi-level' chain of changes towards a lasting impact.\n\n4.4 Lao PDR: Rural livelihoods improvement program in Attapeu and Sayabouri\n\nThe Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:\n\n* How to effectively achieve a lasting acknowledgement of the strengthened village institutions by locals as well as by the State?\n* How to effectively achieve a lasting scaling out of the new farming technologies introduced?\n* How to effectively achieve a lasting acknowledgement and support by the State of the newly introduced measures to manage natural resources? How to effectively embed in the long term the local land uses tools into national land uses policies?\n\nThe IOMK process is particularly devised for launching a multi-level commitment (from villages to government) towards a shared understanding and a common proposal to implement a 'multi-level' chain of changes towards a lasting impact.\n\n4.5 Viet Nam: Project for adaptation to climate change in the Mekong delta in Ben Tre and Tra Vinh provinces\n\nThe Impact-Oriented Management of Knowledge (IOMK) support will help project staff to design and implement a contextualized strategy about:\n\n* How to effectively design a scaling out method so that local stakeholders (from villagers to government officers) themselves disseminate the achievements of the project on rural poor' adaptive capacities to better contend with climate change? The IOMK support provides tools and methods that involve key stakeholders of this scaling up into the strategic design of the process of scaling up and out (e.g. d'Aquino and Bah 2012).\n</text>\n",
"role": "user"
},
{
"content": "al strategic alliance, which rallies stakeholders around common goals right from the beginning of the process.",
"role": "assistant"
}
] |
3D Engine Design for Virtual Globes
Patrick Cozzi and Kevin Ring
Editorial, Sales, and Customer Service Office
A K Peters, Ltd. 5 Commonwealth Road, Suite 2C Natick, MA 01760 www.akpeters.com
Copyright © 2011 by A K Peters, Ltd.
All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner.
Library of Congress Cataloging-in-Publication Data
To be determined
3
Renderer Design
Some graphics applications start offlife with OpenGL or Direct3D calls sprinkled throughout. For small projects, this is manageable, but as projects grow in size, developers start asking, How can we cleanly manage OpenGL state?; How can we make sure everyone is using OpenGL best practices?; or even, How do we go about supporting both OpenGL and Direct3D?
The first step to answering these questions is abstraction—more specifically, abstracting the underlying rendering API such as OpenGL or Direct3D using interfaces that make most of the application's code APIagnostic. We call such interfaces and their implementation a renderer. This chapter describes the design behind the renderer in OpenGlobe. First, we pragmatically consider the motivation for a renderer, then we look at the major components of our renderer: state management, shaders, vertex data, textures, and framebuffers. Finally, we look at a simple example that renders a triangle using our renderer.
If you have experience using a renderer, you may just want to skim this chapter and move on to the meat of virtual globe rendering. Examples in later chapters build on our renderer, so some familiarity with it is required.
This chapter is not a tutorial on OpenGL or Direct3D, so you need some background in one API. Nor is this a description of how to wrap every OpenGL call in an object-oriented wrapper. We are doing much more than wrapping functions; we are raising the level of abstraction.
Our renderer contains quite a bit of code. To keep the discussion focused, we only include the most important and relevant code snippets in these pages. Refer to the code in the OpenGlobe.Renderer project for the full implementation. In this chapter, we are focused on the organization of the public interfaces and the design trade-offs that went into them; we are not concerned with minute implementation details.
Throughout this chapter, when we refer to GL, we mean OpenGL 3.3 core profile specifically. Likewise, when we refer to D3D, we mean Direct3D
11 specifically. Also, we define client code as code that calls the renderer, for example, application code that uses the renderer to issue draw commands.
Finally, software design is often subjective, and there is rarely a single best solution. We want you to view our design as something that has worked well for us in virtual globes, but as only one of a myriad approaches to renderer design.
3.1 The Need for a Renderer
Given that APIs such as OpenGL and Direct3D are already an abstraction, it is natural to ask, why build a renderer layer in our engine at all? Aren't these APIs sufficiently high level enough to use directly throughout our engine?
Many small projects do scatter API calls throughout their code, but as projects get larger, it is important that they properly abstract the underlying API for many reasons:
* Ease of development. Using a renderer is almost always easier and more concise than calling the underlying API directly. For example, in GL, the process of compiling and linking a shader and retrieving its uniforms can be simplified to a single constructor call on a shader program abstraction.
Since most engines are written in object-oriented languages, a renderer allows us to present the procedural GL API using objectoriented constructs. For example, constructors invoke glCreate* or glGen*, and destructors invoke glDelete*, allowing the C# garbage collector to handle resource lifetime management, freeing client code from having to explicitly delete renderer resources. 1
Besides conciseness and object orientation, a renderer can simplify development by minimizing or completely eliminating error-prone global states, such as the depth and stencil tests. A renderer can group these states into a coarse-grained render state, which is provided per draw call, eliminating the need for global state.
When using Direct3D 9, a renderer can also hide the details of handling a "lost device," where the GPU resources are lost due to a user changing the window to or from full screen, a laptop's cover opening/closing, etc. The renderer implementation can shadow a copy of
1 In C++, similar lifetime management can be achieved with smart pointers. Our renderer abstractions implement IDisposable, which gives client code the option to explicitly free an object's resources in a deterministic manner instead of relying on the garbage collector.
GPU resources in system memory, so it can restore them in response to a lost device, without any interaction from client code.
* Portability. A renderer greatly reduces, but does not eliminate, the burden of supporting multiple APIs. For example, an engine may want to use Direct3D on Windows, OpenGL on Linux, OpenGL ES on mobile devices, 2 and LibGCM on PlayStation 3. To support different APIs on different platforms, a different renderer implementation can be swapped in, while the majority of the engine code remains unchanged. Some renderer implementations, such as a GL renderer and GL ES renderer or a GL 3.x renderer and GL 4.x renderer, may even share a good bit of code.
A renderer also makes it easier to migrate to new versions of an API or new GL extensions. For example, when all GL calls are isolated, it is generally straightforward to replace global-state selectors with direct-state access (EXT direct state access [91]). Likewise, the renderer can decide if an extension is available or not and take appropriate action. Supporting some new features or extension requires exposing new or different public interfaces; for example, consider how one would migrate from GL uniforms to uniform buffers.
* Flexibility. A renderer allows a great deal of flexibility since a renderer's implementation can be changed largely independent of client code. For example, if it is more efficient to use GL display lists 3 than vertex buffer objects (VBOs) on certain hardware, that optimization can be made in a single location. Likewise, if a bug is found that was caused by a misunderstanding of a GL call or by a driver bug, the fix can be made in one location, usually without impacting client code.
A renderer helps new code plug into an engine. Without a renderer, a call to a virtual method may leave GL in an unknown state. The implementor of such a method may not even work for the same company that developed the engine and may not be aware of the GL conventions used. This problem can be avoided by passing a renderer to the method, which is used for all rendering activities. A renderer enables the flexibility of engine "plug-ins" that are as seamless as core engine code.
* Robustness. A renderer can improve an engine's robustness by providing statistics and debugging aids. In particular, it is easy to count
2 With ARB ES2 compatibility, OpenGL 3.x is now a superset of OpenGL ES 2.0 [19]. This simplifies porting and sharing code between desktop OpenGL and OpenGL ES.
3 Display lists were deprecated in OpenGL 3, although they are still available through the compatibility profile.
the number of draw calls and triangles drawn per frame when GL commands are isolated in a renderer. It can also be worthwhile to have an option to log underlying GL calls for later debugging. Likewise, a renderer can easily save the contents of the framebuffer and textures, or show the GL state at any point in time. When run in debug mode, each GL call in the renderer can be followed by a call to glGetError to get immediate feedback on errors. 4
Many of these debugging aids are also available through third-party tools, such as BuGLe, 5 GLIntercept, 6 and gDEBugger. 7 These tools track GL calls to provide debugging and performance information, similar to what can be done in a renderer.
* Performance. At first glance, it may seem that a renderer layer can hurt performance. It does add a lot of virtual methods calls. However, considering the amount of work the driver is likely to do, virtual call overhead is almost never a concern. If it were, virtual calls aren't even required to implement a renderer unless the engine supports changing rendering APIs at runtime, an unlikely requirement. Therefore, a renderer can be implemented with plain or inline methods if desired.
A renderer can actually help performance by allowing optimizations to be made in a single location. Client code doesn't need to be aware of GL best practices; only the renderer implementation does. The renderer can shadow GL state to eliminate redundant state changes and avoid expensive calls to glGet*. Depending on the level of abstraction chosen for the renderer, it can also optimize vertex and index buffers for the GPU's caches and select optimal vertex formats with proper alignment for the target hardware. Renderer abstractions can also make it easier to sort by state, a commonly used optimization.
For engines written in a managed language like Java or C#, such as OpenGlobe, a renderer can improve performance by minimizing the managed-to-native-code round trip overhead. Instead of calling into native GL code for every fine-grained call, such as changing a uniform or a single state, a single coarse-grained call can pass a large amount of state to a native C++ component that does several GL calls.
* Additional functionality. A renderer layer is the ideal place to add functionality that isn't in the underlying API. For example, Sec-
4 If ARB debug output is supported, calls to glGetError can be replaced with a callback function [93].
6 http://glintercept.nutty.org/
5 http://sourceforge.net/projects/bugle/
7 http://www.gremedy.com/
tion 3.4.1 introduces additional built-in GLSL constants that are not part of the GLSL language, and Section 3.4.5 introduces GLSL uniforms that are not built into GLSL but are still set automatically at draw time by the renderer. A renderer doesn't just wrap the underlying API; it raises the level of abstraction and provides additional functionality.
Even with all the benefits of a renderer, there is an important pitfall to watch for:
* A false sense of portability. Although a renderer eases supporting multiple APIs, it does not completely eliminate the pain. David Eberly explains his experience with Wild Magic: "After years of maintaining an abstract rendering API that hides DirectX, OpenGL, and software rendering, the conclusion is that each underlying API suffers to some extent from the abstraction" [45]. No renderer is a "one size fits all" solution. We freely admit that the renderer described in this chapter is biased to OpenGL as we've not implemented it with Direct3D yet.
One prominent concern is that having both GL and D3D implementations of the renderer requires us to maintain two versions of all shaders: a GLSL version for the GL renderer and an HLSL version for the D3D renderer. Given that shader languages are so similar, it is possible to use a tool to convert between languages, even at runtime. For example, HLSL2GLSL, 8 a tool from AMD, converts D3D9 HLSL shaders to GLSL. A modified version of this tool, HLSL2GLSLFork, 9 maintained by Aras Pranckeviˇcius, is used in Unity 3.0. The Google ANGLE 10 project translates in the opposite direction, from GLSL to D3D9 HLSL.
To avoid conversions, shaders can be written in NVIDIA's Cg, which supports both GL and D3D. A downside is that the Cg runtime is not available for mobile platforms at the time of this writing.
Ideally, using a renderer would avoid the need for multiple code paths in client code. Unfortunately, this is not always possible. In particular, if different generations of hardware are supported with different renderers, client code may also need multiple code paths. For example, consider rendering to a cube map. If a renderer is implemented using GL 3, geometry shaders will be available, so the cube map can be rendered in a single pass. If the renderer is implemented with
8 http://sourceforge.net/projects/hlsl2glsl/
10 http://code.google.com/p/angleproject/
9 http://code.google.com/p/hlsl2glslfork/
Patrick Says
an older GL version, each cube-map face needs to be rendered in a separate pass.
A renderer is such an important piece of an engine that most game engines include a renderer of some sort, as do applications like Google Earth. It is fair to ask, if a renderer is so important, why does everyone roll their own? Why isn't there one renderer that is in widespread use? Because different engines prefer different renderer designs. Some engines want low-level, nearly one-to-one mappings between renderer calls and GL calls, while other engines want very high-level abstractions, such as effects. A renderer's performance and features tend to be tuned for the application it is designed for.
'
When writing an engine, consider using a renderer from the start. In my experience, taking an existing engine with GL calls scattered throughout and refactoring it to use a renderer is a difficult and error-prone endeavor. When we started on Insight3D, one of my first tasks was to replace many of the GL calls in the existing codebase we were leveraging with calls to a new renderer. Even with all the debug code I included to validate GL state, I injected my fair share of bugs.
Although developing software by starting with solid foundations and building on top is much easier than retrofitting a large codebase later, do not fall into the trap of doing architecture for architecture's sake. A renderer's design should be driven by actual use cases.
&
3.2 Bird's-Eye View
A renderer is used to create and manipulate GPU resources and issue rendering commands. Figure 3.1 shows our renderer's major components. A small amount of render state configures the fixed-function components of the pipeline for rendering. Given that we are using a fully shader-based design, there isn't much render state, just things like depth and stencil testing. The render state doesn't include legacy fixed-function states that can be implemented in shaders like per-vertex lighting and texture environments.
Shader programs describe the vertex, geometry, and fragment shaders used to execute draw calls. Our renderer also includes types for communicating with shaders using vertex attributes and uniforms.
A vertex array is a lightweight container object that describes vertex attributes used for drawing. It receives data for these attributes through
$ %
|
<urn:uuid:67b176a4-6b9f-43a3-976c-ccf3c4cf8d9e>
|
CC-MAIN-2018-30
|
http://virtualglobebook.com/3DEngineDesignForVirtualGlobesSection31.pdf
|
2018-07-16T14:29:22Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589350.19/warc/CC-MAIN-20180716135037-20180716155037-00014.warc.gz
| 403,620,226
| 3,207
|
eng_Latn
|
eng_Latn
| 0.958058
|
eng_Latn
| 0.997694
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
65,
590,
2632,
5011,
7610,
10154,
12566,
14910
] |
3D Engine Design for Virtual Globes
Patrick Cozzi and Kevin Ring
Editorial, Sales, and Customer Service Office
A K Peters, Ltd. 5 Commonwealth Road, Suite 2C Natick, MA 01760 www.akpeters.com
Copyright © 2011 by A K Peters, Ltd.
All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner.
Library of Congress Cataloging-in-Publication Data
To be determined
3
Renderer Design
Some graphics applications start offlife with OpenGL or Direct3D calls sprinkled throughout. For small projects, this is manageable, but as projects grow in size, developers start asking, How can we cleanly manage OpenGL state?; How can we make sure everyone is using OpenGL best practices?; or even, How do we go about supporting both OpenGL and Direct3D?
The first step to answering these questions is abstraction—more specifically, abstracting the underlying rendering API such as OpenGL or Direct3D using interfaces that make most of the application's code APIagnostic. We call such interfaces and their implementation a renderer. This chapter describes the design behind the renderer in OpenGlobe. First, we pragmatically consider the motivation for a renderer, then we look at the major components of our renderer: state management, shaders, vertex data, textures, and framebuffers. Finally, we look at a simple example that renders a triangle using our renderer.
If you have experience using a renderer, you may just want to skim this chapter and move on to the meat of virtual globe rendering. Examples in later chapters build on our renderer, so some familiarity with it is required.
This chapter is not a tutorial on OpenGL or Direct3D, so you need some background in one API. Nor is this a description of how to wrap every OpenGL call in an object-oriented wrapper. We are doing much more than wrapping functions; we are raising the level of abstraction.
Our renderer contains quite a bit of code. To keep the discussion focused, we only include the most important and relevant code snippets in these pages. Refer to the code in the OpenGlobe.Renderer project for the full implementation. In this chapter, we are focused on the organization of the public interfaces and the design trade-offs that went into them; we are not concerned with minute implementation details.
Throughout this chapter, when we refer to GL, we mean OpenGL 3.3 core profile specifically. Likewise, when we refer to D3D, we mean Direct3D
11 specifically. Also, we define client code as code that calls the renderer, for example, application code that uses the renderer to issue draw commands.
Finally, software design is often subjective, and there is rarely a single best solution. We want you to view our design as something that has worked well for us in virtual globes, but as only one of a myriad approaches to renderer design.
3.1 The Need for a Renderer
Given that APIs such as OpenGL and Direct3D are already an abstraction, it is natural to ask, why build a renderer layer in our engine at all? Aren't these APIs sufficiently high level enough to use directly throughout our engine?
Many small projects do scatter API calls throughout their code, but as projects get larger, it is important that they properly abstract the underlying API for many reasons:
* Ease of development. Using a renderer is almost always easier and more concise than calling the underlying API directly. For example, in GL, the process of compiling and linking a shader and retrieving its uniforms can be simplified to a single constructor call on a shader program abstraction.
Since most engines are written in object-oriented languages, a renderer allows us to present the procedural GL API using objectoriented constructs. For example, constructors invoke glCreate* or glGen*, and destructors invoke glDelete*, allowing the C# garbage collector to handle resource lifetime management, freeing client co
|
de from having to explicitly delete renderer resources.
| 4,086
|
inside_word
|
code
|
remove_all
|
<url>
http://virtualglobebook.com/3DEngineDesignForVirtualGlobesSection31.pdf
</url>
<text>
3D Engine Design for Virtual Globes
Patrick Cozzi and Kevin Ring
Editorial, Sales, and Customer Service Office
A K Peters, Ltd. 5 Commonwealth Road, Suite 2C Natick, MA 01760 www.akpeters.com
Copyright © 2011 by A K Peters, Ltd.
All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner.
Library of Congress Cataloging-in-Publication Data
To be determined
3
Renderer Design
Some graphics applications start offlife with OpenGL or Direct3D calls sprinkled throughout. For small projects, this is manageable, but as projects grow in size, developers start asking, How can we cleanly manage OpenGL state?; How can we make sure everyone is using OpenGL best practices?; or even, How do we go about supporting both OpenGL and Direct3D?
The first step to answering these questions is abstraction—more specifically, abstracting the underlying rendering API such as OpenGL or Direct3D using interfaces that make most of the application's code APIagnostic. We call such interfaces and their implementation a renderer. This chapter describes the design behind the renderer in OpenGlobe. First, we pragmatically consider the motivation for a renderer, then we look at the major components of our renderer: state management, shaders, vertex data, textures, and framebuffers. Finally, we look at a simple example that renders a triangle using our renderer.
If you have experience using a renderer, you may just want to skim this chapter and move on to the meat of virtual globe rendering. Examples in later chapters build on our renderer, so some familiarity with it is required.
This chapter is not a tutorial on OpenGL or Direct3D, so you need some background in one API. Nor is this a description of how to wrap every OpenGL call in an object-oriented wrapper. We are doing much more than wrapping functions; we are raising the level of abstraction.
Our renderer contains quite a bit of code. To keep the discussion focused, we only include the most important and relevant code snippets in these pages. Refer to the code in the OpenGlobe.Renderer project for the full implementation. In this chapter, we are focused on the organization of the public interfaces and the design trade-offs that went into them; we are not concerned with minute implementation details.
Throughout this chapter, when we refer to GL, we mean OpenGL 3.3 core profile specifically. Likewise, when we refer to D3D, we mean Direct3D
11 specifically. Also, we define client code as code that calls the renderer, for example, application code that uses the renderer to issue draw commands.
Finally, software design is often subjective, and there is rarely a single best solution. We want you to view our design as something that has worked well for us in virtual globes, but as only one of a myriad approaches to renderer design.
3.1 The Need for a Renderer
Given that APIs such as OpenGL and Direct3D are already an abstraction, it is natural to ask, why build a renderer layer in our engine at all? Aren't these APIs sufficiently high level enough to use directly throughout our engine?
Many small projects do scatter API calls throughout their code, but as projects get larger, it is important that they properly abstract the underlying API for many reasons:
* Ease of development. Using a renderer is almost always easier and more concise than calling the underlying API directly. For example, in GL, the process of compiling and linking a shader and retrieving its uniforms can be simplified to a single constructor call on a shader program abstraction.
Since most engines are written in object-oriented languages, a renderer allows us to present the procedural GL API using objectoriented constructs. For example, constructors invoke glCreate* or glGen*, and destructors invoke glDelete*, allowing the C# garbage collector to handle resource lifetime management, freeing client co<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://virtualglobebook.com/3DEngineDesignForVirtualGlobesSection31.pdf\n</url>\n<text>\n3D Engine Design for Virtual Globes\n\nPatrick Cozzi and Kevin Ring\n\nEditorial, Sales, and Customer Service Office\n\nA K Peters, Ltd. 5 Commonwealth Road, Suite 2C Natick, MA 01760 www.akpeters.com\n\nCopyright © 2011 by A K Peters, Ltd.\n\nAll rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner.\n\nLibrary of Congress Cataloging-in-Publication Data\n\nTo be determined\n\n3\n\nRenderer Design\n\nSome graphics applications start offlife with OpenGL or Direct3D calls sprinkled throughout. For small projects, this is manageable, but as projects grow in size, developers start asking, How can we cleanly manage OpenGL state?; How can we make sure everyone is using OpenGL best practices?; or even, How do we go about supporting both OpenGL and Direct3D?\n\nThe first step to answering these questions is abstraction—more specifically, abstracting the underlying rendering API such as OpenGL or Direct3D using interfaces that make most of the application's code APIagnostic. We call such interfaces and their implementation a renderer. This chapter describes the design behind the renderer in OpenGlobe. First, we pragmatically consider the motivation for a renderer, then we look at the major components of our renderer: state management, shaders, vertex data, textures, and framebuffers. Finally, we look at a simple example that renders a triangle using our renderer.\n\nIf you have experience using a renderer, you may just want to skim this chapter and move on to the meat of virtual globe rendering. Examples in later chapters build on our renderer, so some familiarity with it is required.\n\nThis chapter is not a tutorial on OpenGL or Direct3D, so you need some background in one API. Nor is this a description of how to wrap every OpenGL call in an object-oriented wrapper. We are doing much more than wrapping functions; we are raising the level of abstraction.\n\nOur renderer contains quite a bit of code. To keep the discussion focused, we only include the most important and relevant code snippets in these pages. Refer to the code in the OpenGlobe.Renderer project for the full implementation. In this chapter, we are focused on the organization of the public interfaces and the design trade-offs that went into them; we are not concerned with minute implementation details.\n\nThroughout this chapter, when we refer to GL, we mean OpenGL 3.3 core profile specifically. Likewise, when we refer to D3D, we mean Direct3D\n\n11 specifically. Also, we define client code as code that calls the renderer, for example, application code that uses the renderer to issue draw commands.\n\nFinally, software design is often subjective, and there is rarely a single best solution. We want you to view our design as something that has worked well for us in virtual globes, but as only one of a myriad approaches to renderer design.\n\n3.1 The Need for a Renderer\n\nGiven that APIs such as OpenGL and Direct3D are already an abstraction, it is natural to ask, why build a renderer layer in our engine at all? Aren't these APIs sufficiently high level enough to use directly throughout our engine?\n\nMany small projects do scatter API calls throughout their code, but as projects get larger, it is important that they properly abstract the underlying API for many reasons:\n\n* Ease of development. Using a renderer is almost always easier and more concise than calling the underlying API directly. For example, in GL, the process of compiling and linking a shader and retrieving its uniforms can be simplified to a single constructor call on a shader program abstraction.\n\nSince most engines are written in object-oriented languages, a renderer allows us to present the procedural GL API using objectoriented constructs. For example, constructors invoke glCreate* or glGen*, and destructors invoke glDelete*, allowing the C# garbage collector to handle resource lifetime management, freeing client co<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "de from having to explicitly delete renderer resources.",
"role": "assistant"
}
] |
|
Greater Wilshire Neighborhood Council Land Use Committee
MINUTES
March 24, 2015
Approved, as corrected, by the Committee 4/28/15
1. WELCOMING REMARKS
A. Call to order (James Wolf)
A duly noticed meeting of the Land Use Committee ("LUC") of the Greater Wilshire Neighborhood Council ("GWNC") was held on Tuesday, March 24, 2015, at Wilshire United Methodist Church, Assembly Room, 4350 Wilshire Blvd. Secretary Barbara Savage called the meeting to order at 6:39 p.m.
B. Roll call (Barbara Savage)
Ms. Savage called the roll. Ten of the 16 Committee Members were present at the Roll Call: Ann Eggleston, Mike Genewick, Karen Gilman, John Gresham, Dick Herman, Joseph Hoffman, Patty Lombard, Caroline Moser, Barbara Savage and Greg Wittmann. Patricia Carroll, John Kaliski and Jeff McManus arrived later. Three Committee Members were absent: Alan Bernstein, Julie Stromberg and James Wolf. Dorian Shapiro resigned. The GWNC Land Use Committee quorum (the minimum number of Committee Members needing to be present to take binding votes on Agendized Items) is nine, so the Committee could take such votes. Also attending: 22 Stakeholders and guests.
2. GENERAL PUBLIC COMMENT ON NON-AGENDA ITEMS
There were no public comments at this time.
3. ADMINISTRATIVE ITEMS (Discussion and Action)
A. Review and adoption of February 24, 2015 Minutes
MOTION (by Mr. Genewick, seconded by Ms. Lombard): The Greater Wilshire Neighborhood Council Land Use Committee approves the Minutes of its February 24, 2015 Meeting as written.
MOTION PASSED by a hand vote; Ms. Moser abstained.
B. Review of Early Notification Report for possible future agenda items
Copies were distributed of and Ms. Savage reviewed the "03/24/15 Early Planning Report Summaries for GWNC Area." The projects at 5273 Olympic, 5353 Third St. and 800 S. Lorraine Blvd. were flagged for further attention.
Committee Members Patricia Carroll, John Kaliski and Jeff McManus arrived at this time, making 13 Committee Members present (the Committee quorum is nine).
Greater Wilshire Neighborhood Council Land Use Committee Minutes 3-24-15 Page 1 of 7
Committee Member Patty Lombard recused herself and left the room at this time, making 12 Committee Members present (the Committee quorum is nine).
4. OLD BUSINESS (Discussion and Possible Action)
A. Discussion and possible action on an application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd. (Andrew Jorgensen) At the applicant's last appearance, at the February LUC meeting, discussion centered on applicants' recent meetings with the Windsor Village Association. Committee Members recommended that the applicants create a set of voluntary conditions for the permit that would directly address neighbors' concerns regarding traffic, parking and latenight noise from special events.
Copies were distributed of a letter from Philip Miller, General Manager, The Ebell of Los Angeles; "Special Filming Conditions: The Wilshire Ebell & United Methodist Church Parking Lot"; and "Conditional Use: Attachment 1." Mr. Miller described the Application, saying "the previous Permit was allowed to expire . . . the only change is we're asking to allow the Ebell to serve alcohol in the clubhouse . . . six days a week, to 1:00 a.m." (one hour later than the previous permit allowed). He described the Ebell's community service, collaborations with community groups and philanthropy. He described the need to host catered events for the revenue stream. The Ebell "met with representatives of the neighborhood . . . including the Windsor Village Board of Directors . . . we maintain regular communication." The Ebell is working with the L.A. Dept. of Transportation "to mitigate" traffic concerns and described event traffic control efforts. Most events conclude at the latest at 10 – 11:00 p.m. The Ebell "would notify the Windsor Village Association one week in advance" when events would end at 1:00 a.m., and there would be no more than six such events per year. A maximum of 1,000 people could attend "a cocktail-type party . . . for a sit-down dinner, 250 . . . member events never exceed more than 200 people . . . those are maybe three times a year." Mr. Kaliski was concerned about Windsor Village Association communication with the community.
MOTION (by Mr. Genewick, seconded by Ms. Carroll): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the amended application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd.
DISCUSSION: Patty Hill, Past President of The Ebell, noted the Ebell's community value and reminded that the Ebell "is not open to the public . . . if we lose that building we have to give everything away to charity . . . it is a private foundation" and "utilities are $13,000 a month." Ms. Carroll noted and Ms. Hill confirmed that other "Ebell clubs" have had to "liquidate." Jane Martin, the Ebell's Finance Chair; Joyce Davidson; Dennee Frey; and Janna Harris supported the application. Kay Balue said it takes $120,000 a month for the Ebell to stay open. Olive Kearney supported the application but was concerned about "overflow parking."
MOTION to CALL FOR THE QUESTION (by Mr. Gresham); there were no objections.
MOTION PASSED unanimously by a hand vote.
Committee Member Patty Lombard returned to the room at this time, making 13 Committee Members present (the Committee quorum is nine).
B. Discussion and possible action on an application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. (Jared Sopko) Applicants first presented at 11/14 meeting and agreed at that time to drop the variance request in favor of a Density Bonus application. Neighbors from Country Club Heights have expressed concerns with density, height, neighborhood compatibility and other issues. Official Density Bonus application has not been received.
Copies were distributed of renderings, photos, site plans, elevations and letters to the Committee from Arlin Low, President, Country Club Heights Neighborhood Association. No project representative was present. Ms. Fuller noted that there were two requests to take action. Mr. Kaliski was concerned about the lack of response from the developers.
MOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board oppose the application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. as presented to date due to the developer's lack of communication and transparency and their lack of response to the Committee's requests.
MOTION PASSED unanimously by a hand vote.
C. Discussion and possible action on an application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose (Art Rodriguez/Alex Campbell) Applicant is requesting continued sale of a full line of alcoholic beverages for on-site consumption, with an earlier opening hour, a variance to continue to allow the required parking to be provided off site within 750 feet, secured via lease agreement in lieu of a covenant, and limited live entertainment. At the February LUC meeting, Committee Members requested that applicants return with a survey of other restaurants and liquor permits in the area, to make sure the applicants' newly requested hours are not outside the norm for the neighborhood.
Copies were distributed of the CUP/CUB Application. Mr. Campbell presented and said the average nearby closing hours are "about 10 to 11" [p.m.] and "opening 9 to 10" [a.m.]. and that the Xiomara owner has agreed to new hours of 10 a.m. to 12 a.m., based on this survey. He added that they haven't had any violations, and explained the usefulness of being open another hour later.
MOTION (by Mr. Genewick, seconded by Mr. Herman): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose.
MOTION PASSED unanimously by a hand vote.
5. NEW BUSINESS (Discussion and Possible Action)
A. Initial presentation, discussion and possible action on a CUB to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose (Art Rodriguez/Alex Campbell)
Copies were distributed of the CUP Application. Mr. Campbell presented. The project, between Orange and Mansfield, has Type 20 and Type 42 licenses; they want to upgrade the Type 20 to a Type 21 with the same hours of operation and "a full line of wine and spirits." He said Type 21 licenses are worth "$75-$85,000," good for two years and "don't allow you to drink on-site." Type 42 is for wine-tasting. He noted that "all liquor licenses run with the land." It probably would be a five-year CUP revocable upon a violation(s).
MOTION (by Ms. Eggleston, seconded by Ms. Moser): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the CUB application to change the Type 20 to a Type 21 license and renew the Type 42 license as described on the application to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose.
MOTION PASSED unanimously by a hand vote.
Additional emergency agenda item: Ms. Fuller explained that the project at 348-350 N. Orange is "a duplex seeking to convert to a condominium"; the Hearing is April 8 th, (but we didn't hear about it in time to add it to the published agenda this month). Susan Smith said there would be "no effect on the building . . . an existing building" built in 1927 between Melrose and Beverly and east of LaBrea. It has two oversized garages and one additional rear space. Ms. Moser was concerned about "taking rental units off the market." There was discussion that condos cost less money to buy than single-family homes but help force renters out. Mr. Kaliski would support the project if it meets Advisory Agency parking regulations. Ms. Savage noted that it is in one of the neighborhoods that wants and is being considered for an Interim Control Ordinance.
MOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the conversion of a duplex at 348-350 N. Orange to a condominium.
MOTION PASSED by a hand vote with 10 in favor; Ms. Moser and Ms. Savage opposed; Ms. Carroll abstained.
B. Initial presentation, discussion and possible action on a CUB application for beer and wine sales at the Burger Lounge restaurant at 217 N. Larchmont (Sheryl Brady)
Copies were distributed of the CUB Application. Cheryl Brady presented. The Burger Lounge is currently open and proposing to have a Type 41 license with operating hours of 10:00 a.m. – 10:00 p.m. It has approximately 1,574 square feet with around 60 seats including 24 on the patio. They estimate that "2% of the sales will be alcohol." Consumption would only be allowed inside. Ms. Lombard noted that that the property owners are recently tried to rent to a marijuana dispensary, and expressed concern about granting a liquor permit that would run with the property The Hearing is April 15 th .
MOTION (by Mr. McManus, seconded by Mr. Genewick): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the CUB application for beer and wine sales at the Burger Lounge restaurant at 217 N. Larchmont.
MOTION PASSED by a hand vote with nine in favor; four opposed (Carroll, Gilman, Gresham and Lombard).
Ms. Brady agreed to attend the Larchmont Boulevard Association meeting.
Committee Member Greg Wittmann recused himself and left the room at this time, making 12 Committee Members present (the Committee quorum is nine).
C. Initial presentation, discussion and possible action on a draft motion regarding CUB application for a full line of liquor sales at an existing restaurant space on the 7th floor at 4680 W. Wilshire Blvd. (Farmers' Insurance building) (see handout for motion text)
Copies were distributed of documents relating to the withdrawal of the CUB Application. Ms. Lombard noted "the existing restaurant is an employee cafeteria." There was extensive discussion of whether the application complies with the Park Mile Specific Plan, and whether liquor permits would or should be permitted in "accessory" uses for properties in this district. Mr. Kaliski said he feels it would be "prejudicial" to make a blanket statement about such uses in advance of specific future applications.
MOTION (by Ms. Lombard, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board oppose the CUB application for a full line of liquor sales and such service at an existing restaurant space within the Park Mile on the 7th floor at 4680 W. Wilshire Blvd..
MOTION FAILED by a hand vote with six in favor; six opposed; Ms. Savage abstained.
Committee Member Greg Wittmann returned to the room at this time, making 13 Committee Members present (the Committee quorum is nine).
D. Initial presentation, discussion and possible action on an application to construct a 9-unit apartment building at 963 S. Wilton (Anabel Salazar)
Representative David Eum presented and passed around renderings. The project is in an R-3 zone and would be 37 feet and three stories high. He said they are working with the Wilshire Park HPOZ Board, which recently voted to support the project, which he described as an art deco – modern style mix. He said "the neighbors are all in support." No Motion was made or vote taken.
E. Initial presentation, discussion and possible action on an application to construct a 3-story, 4-unit Small Lot Subdivision project at 5016 Rosewood Ave. (Sam Trude/Kurt Gibbs)
Ms. Fuller relayed that the developer asked for this Item to be Tabled.
F. Initial discussion and possible action on an application for a teardown and rebuild of a single family residence at 217 N. Windsor, in the Windsor Square HPOZ…and a neighborhood petition opposing the application.
Ms. Fuller relayed that neighbors were concerned, and sent a letter to and met with the Windsor Square HPOZ, but feel more confident now, after the HPOZ board meeting, that that group will effectively handle the case. It was agreed to Table this Item. No Motion was made or vote taken.
6. COMMITTEE MEMBER REPORTS (including discussion and possible action items, if listed)
A. Transportation Committee Liaison Report (Stromberg) Update on transportation issues GWNC is monitoring, as well as next TC meeting info.
Ms. Stromberg was not present; no report or Motion was made or vote taken.
7. COMMITTEE MEMBER COMMENTS/ANNOUNCEMENTS
A. Status update on anti-mansionization ICO (Savage)
Ms. Savage reported that the City Council will vote on this tomorrow. There was extensive discussion of the issue. Mr. Kaliski noted that the City allows Demolition Permits to be applied for and issued separately from Building Permits.
B. Possible agenda items for upcoming meetings
- Update on the development of a parking lot into 22 townhouse units over subterranean parking at 612 S. Norton and 4055 Wilshire Blvd. (Jared Sopko)
- Update on construction of a new 5-story, 44-unit condominium building at 850 S. Crenshaw (Camille Zeitouny)
- Initial presentation and possible action on plans to build 6,000 square feet of retail space at 101 N. La Brea (Matthew Wister)
- Application to demolish existing structures and build 169 apartments at 904-932 N. La Brea Ave. (Michael Gonzales).
- Construction of a 4-story, 22-unit apartment complex with Density Bonus at 5022-5026 Rosewood Ave. (Frank Afari)
- Application for the installation of a wireless telecommunications facility atop an apartment building at 407 S. Gramercy (Mark Berline)
- Application to construct an apartment building with density bonus at 801-813 Hudson (Michael Cohanzad)
- Application for the demolition of nine single family residences and construction of a new 5-story, 988-unit apartment building over garage levels at 501 N. Wilton (John Reed)
- Application for a Change of Use to convert the old Scottish Rite Temple to a private, non-profit museum at 4357 W. Wilshire Blvd. (Michael Gruber)
- Discussion of City policy on hiring outside counsel for Land Use and CEQA cases
Ms. Savage noted the above.
C. Next meeting: Tuesday, April 28, 2015
Ms. Savage noted the above.
8. REQUESTS/MOTIONS FOR FUTURE AGENDA ITEMS
No requests were made.
9. ADJOURNMENT
Ms. Savage declared and the Committee agreed to ADJOURN the Meeting at 9:02 p.m.
Respectfully submitted, David Levin Minutes Writer
The first paragraph of some Items, Motions/Resolutions and other wording may have been directly copied from the Agenda. Edited by GWNC.
|
<urn:uuid:a744f5cb-0f0d-4a69-86e7-4d67c10adcaa>
|
CC-MAIN-2019-26
|
https://greaterwilshire.org/wp-content/uploads/bsk-pdf-manager/minutes032415final_33.pdf
|
2019-06-20T11:12:56Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00304.warc.gz
| 461,269,033
| 3,864
|
eng_Latn
|
eng_Latn
| 0.987788
|
eng_Latn
| 0.995661
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2127,
5412,
8497,
11647,
14576,
16808,
16997
] |
Greater Wilshire Neighborhood Council Land Use Committee
MINUTES
March 24, 2015
Approved, as corrected, by the Committee 4/28/15
1. WELCOMING REMARKS
A. Call to order (James Wolf)
A duly noticed meeting of the Land Use Committee ("LUC") of the Greater Wilshire Neighborhood Council ("GWNC") was held on Tuesday, March 24, 2015, at Wilshire United Methodist Church, Assembly Room, 4350 Wilshire Blvd. Secretary Barbara Savage called the meeting to order at 6:39 p.m.
B. Roll call (Barbara Savage)
Ms. Savage called the roll. Ten of the 16 Committee Members were present at the Roll Call: Ann Eggleston, Mike Genewick, Karen Gilman, John Gresham, Dick Herman, Joseph Hoffman, Patty Lombard, Caroline Moser, Barbara Savage and Greg Wittmann. Patricia Carroll, John Kaliski and Jeff McManus arrived later. Three Committee Members were absent: Alan Bernstein, Julie Stromberg and James Wolf. Dorian Shapiro resigned. The GWNC Land Use Committee quorum (the minimum number of Committee Members needing to be present to take binding votes on Agendized Items) is nine, so the Committee could take such votes. Also attending: 22 Stakeholders and guests.
2. GENERAL PUBLIC COMMENT ON NON-AGENDA ITEMS
There were no public comments at this time.
3. ADMINISTRATIVE ITEMS (Discussion and Action)
A. Review and adoption of February 24, 2015 Minutes
MOTION (by Mr. Genewick, seconded by Ms. Lombard): The Greater Wilshire Neighborhood Council Land Use Committee approves the Minutes of its February 24, 2015 Meeting as written.
MOTION PASSED by a hand vote; Ms. Moser abstained.
B. Review of Early Notification Report for possible future agenda items
Copies were distributed of and Ms. Savage reviewed the "03/24/15 Early Planning Report Summaries for GWNC Area." The projects at 5273 Olympic, 5353 Third St. and 800 S. Lorraine Blvd. were flagged for further attention.
Committee Members Patricia Carroll, John Kaliski and Jeff McManus arrived at this time, making 13 Committee Members present (the Committee quorum is nine).
Greater Wilshire Neighborhood Council Land Use Committee Minutes 3-24-15 Page 1 of 7
Committee Member Patty Lombard recused herself and left the room at this time, making 12 Committee Members present (the Committee quorum is nine).
4. OLD BUSINESS (Discussion and Possible Action)
A. Discussion and possible action on an application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd. (Andrew Jorgensen) At the applicant's last appearance, at the February LUC meeting, discussion centered on applicants' recent meetings with the Windsor Village Association. Committee Members recommended that the applicants create a set of voluntary conditions for the permit that would directly address neighbors' concerns regarding traffic, parking and latenight noise from special events.
Copies were distributed of a letter from Philip Miller, General Manager, The Ebell of Los Angeles; "Special Filming Conditions: The Wilshire Ebell & United Methodist Church Parking Lot"; and "Conditional Use: Attachment 1." Mr. Miller described the Application, saying "the previous Permit was allowed to expire . . . the only change is we're asking to allow the Ebell to serve alcohol in the clubhouse . . . six days a week, to 1:00 a.m." (one hour later than the previous permit allowed). He described the Ebell's community service, collaborations with community groups and philanthropy. He described the need to host catered events for the revenue stream. The Ebell "met with representatives of the neighborhood . . . including the Windsor Village Board of Directors . . . we maintain regular communication." The Ebell is working with the L.A. Dept. of Transportation "to mitigate" traffic concerns and described event traffic control efforts. Most events conclude at the latest at 10 – 11:00 p.m. The Ebell "would notify the Windsor Village Association one week in advance" when events would end at 1:00 a.m., and there would be no more than six such events per year. A maximum of 1,000 people could attend "a cocktail-type party . . . for a sit-down dinner, 250 . . . member events never exceed more than 200 people . . . those are maybe three times a year." Mr. Kaliski was concerned about Windsor Village Association communication with the community.
MOTION (by Mr. Genewick, seconded by Ms. Carroll): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the amended application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd.
DISCUSSION: Patty Hill, Past President of The Ebell, noted the Ebell's community value and reminded that the Ebell "is not open to the public . . . if we lose that building we have to give everything away to charity . . . it is a private foundation" and "utilities are $13,000 a month." Ms. Carroll noted and Ms. Hill confirmed that other "Ebell clubs" have had to "liquidate." Jane Martin, the Ebell's Finance Chair; Joyce Davidson; Dennee Frey; and Janna Harris supported the application. Kay Balue said it takes $120,000 a month for the Ebell to stay open. Olive Kearney supported the application but was concerned about "overflow parking."
MOTION to CALL FOR THE QUESTION (by Mr. Gresham); there were no objections.
MOTION PASSED unanimously by a hand vote.
Committee Member Patty Lombard returned to the room at this time, making 13 Committee Members present (the Committee quorum is nine).
B. Discussion and possible action on an application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. (Jared Sopko) Applicants first presented at 11/14 meeting and agreed at that time to drop the variance request in favor of a Density Bonus application. Neighbors from Country Club Heights have expressed concerns with density, height, neighborhood compatibility and other issues. Official Density Bonus application has not been received.
Copies were distributed of renderings, photos, site plans, elevations and letters to the Committee from Arlin Low, President, Country Club Heights Neighborhood Association. No project representative was present. Ms. Fuller noted that there were two requests to take action. Mr. Kaliski was concerned about the lack of response from the developers.
MOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board oppose the application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. as presented to date due to the developer's lack of communication and transparency and their lack of response to the Committee's requests.
MOTION PASSED unanimously by a hand vote.
C. Discussion and possible action on an application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose (Art Rodriguez/Alex Campbell) Applicant is requesting continued sale of a full line of alcoholic beverages for on-site consumption, with an earlier opening hour, a variance to continue to allow the required parking to be provided off site within 750 feet, secured via lease agreement in lieu of a covenant, and limited live entertainment. At the February LUC meeting, Committee Members requested that applicants return with a survey of other restaurants and liquor permits in the area, to make sure the applicants' newly requested hours are not outside the norm for the neighborhood.
Copies were distributed of the CUP/CUB Application. Mr. Campbell presented and said the average nearby closing hours are "about 10 to 11" [p.m.] and "opening 9 to 10" [a.m.]. and that the Xiomara owner has agreed to new hours of 10 a.m. to 12 a.m., based on this survey. He added that they haven't had any violations, and explained the usefulness of being open another hour later.
MOTION (by Mr. Genewick, seconded by Mr. Herman): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose.
MOTION PASSED unanimously by a hand vote.
5. NEW BUSINESS (Discussion and Possible Action)
A. Initial presentation, discussion and possible action on a CUB to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose (Art Rodriguez/Alex Campbell)
Copies were distributed of the CUP Application. Mr. Campbell presented. The project, between Orange and Mansfield, has Type 20 and Type 42 licenses; they want to upgrade the Type 20 to a Type 21 with the same hours of operation and "a full line of wine and spirits." He said Type 21 licenses are worth "$75-$85,000," good for two years and "don't allow you to drink on-site." Type 42 is for wine-tasting. He noted that "all liquor licenses run with the land." It probably would be a five-year CUP revocable upon a violation(s).
MOTION (by Ms. Eggleston, seconded by Ms. Moser): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the CUB application to change the Type 20 to a Type 21 license and renew the Type 42 license as described on the application to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose.
MOTION PASSED unanimously by a hand vote.
Additional emergency agenda item: Ms. Fuller explained that the project at 348-350 N. Orange is "a duplex seeking to convert to a condominium"; the Hearing is April 8 th, (but we didn't hear about it in time to add it to the published agenda this month). Susan Smith said there would be "no effect on the building . . . an existing building" built in 1927 between Melrose and Beverly and east of LaBrea. It has two oversized garages and one additional rear space. Ms. Moser was concerned about "taking rental units off the market." There was discussion that condos cost less money to buy than single-family homes but help force renters out. Mr. Kaliski would support the project if it meets Advisory Agency parking regulations. Ms. Savage noted that it is in one of the neighborhoods that wants and is being considered for an Interim Control Ordinance.
MOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the conversion of a duplex at 348-350 N. Orange to a condominium.
MOTION PASSED by a hand vote with 10 in favor; Ms. Moser and Ms. Savage opposed; Ms. Carroll abstained.
B. Initial presentation, discussion and possible action on a CUB application for beer and wine sales at the Burger Lounge restaurant at 217 N. Larchmont (Sheryl Brady)
Copies were distributed of the CUB Application. Cheryl Brady presented. The Burger Lounge is currently open and proposing to have a Type 41 license with operating hours of 10:00 a.m. – 10:00 p.m. It has approximately 1,574 square feet with around 60 seats including 24 on the patio. They estimate that "2% of the sales will be alcohol." Consumption would only be allowed inside. Ms. Lombard noted that that the property owners are recently tried to rent to a marijuana dispensary, and expressed concern about granting a liquor permit that would run with the property The Hearing is April 15 th .
|
MOTION (by Mr.
| 11,399
|
end_of_word
|
.
|
remove_all
|
<url>
https://greaterwilshire.org/wp-content/uploads/bsk-pdf-manager/minutes032415final_33.pdf
</url>
<text>
Greater Wilshire Neighborhood Council Land Use Committee
MINUTES
March 24, 2015
Approved, as corrected, by the Committee 4/28/15
1. WELCOMING REMARKS
A. Call to order (James Wolf)
A duly noticed meeting of the Land Use Committee ("LUC") of the Greater Wilshire Neighborhood Council ("GWNC") was held on Tuesday, March 24, 2015, at Wilshire United Methodist Church, Assembly Room, 4350 Wilshire Blvd. Secretary Barbara Savage called the meeting to order at 6:39 p.m.
B. Roll call (Barbara Savage)
Ms. Savage called the roll. Ten of the 16 Committee Members were present at the Roll Call: Ann Eggleston, Mike Genewick, Karen Gilman, John Gresham, Dick Herman, Joseph Hoffman, Patty Lombard, Caroline Moser, Barbara Savage and Greg Wittmann. Patricia Carroll, John Kaliski and Jeff McManus arrived later. Three Committee Members were absent: Alan Bernstein, Julie Stromberg and James Wolf. Dorian Shapiro resigned. The GWNC Land Use Committee quorum (the minimum number of Committee Members needing to be present to take binding votes on Agendized Items) is nine, so the Committee could take such votes. Also attending: 22 Stakeholders and guests.
2. GENERAL PUBLIC COMMENT ON NON-AGENDA ITEMS
There were no public comments at this time.
3. ADMINISTRATIVE ITEMS (Discussion and Action)
A. Review and adoption of February 24, 2015 Minutes
MOTION (by Mr. Genewick, seconded by Ms. Lombard): The Greater Wilshire Neighborhood Council Land Use Committee approves the Minutes of its February 24, 2015 Meeting as written.
MOTION PASSED by a hand vote; Ms. Moser abstained.
B. Review of Early Notification Report for possible future agenda items
Copies were distributed of and Ms. Savage reviewed the "03/24/15 Early Planning Report Summaries for GWNC Area." The projects at 5273 Olympic, 5353 Third St. and 800 S. Lorraine Blvd. were flagged for further attention.
Committee Members Patricia Carroll, John Kaliski and Jeff McManus arrived at this time, making 13 Committee Members present (the Committee quorum is nine).
Greater Wilshire Neighborhood Council Land Use Committee Minutes 3-24-15 Page 1 of 7
Committee Member Patty Lombard recused herself and left the room at this time, making 12 Committee Members present (the Committee quorum is nine).
4. OLD BUSINESS (Discussion and Possible Action)
A. Discussion and possible action on an application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd. (Andrew Jorgensen) At the applicant's last appearance, at the February LUC meeting, discussion centered on applicants' recent meetings with the Windsor Village Association. Committee Members recommended that the applicants create a set of voluntary conditions for the permit that would directly address neighbors' concerns regarding traffic, parking and latenight noise from special events.
Copies were distributed of a letter from Philip Miller, General Manager, The Ebell of Los Angeles; "Special Filming Conditions: The Wilshire Ebell & United Methodist Church Parking Lot"; and "Conditional Use: Attachment 1." Mr. Miller described the Application, saying "the previous Permit was allowed to expire . . . the only change is we're asking to allow the Ebell to serve alcohol in the clubhouse . . . six days a week, to 1:00 a.m." (one hour later than the previous permit allowed). He described the Ebell's community service, collaborations with community groups and philanthropy. He described the need to host catered events for the revenue stream. The Ebell "met with representatives of the neighborhood . . . including the Windsor Village Board of Directors . . . we maintain regular communication." The Ebell is working with the L.A. Dept. of Transportation "to mitigate" traffic concerns and described event traffic control efforts. Most events conclude at the latest at 10 – 11:00 p.m. The Ebell "would notify the Windsor Village Association one week in advance" when events would end at 1:00 a.m., and there would be no more than six such events per year. A maximum of 1,000 people could attend "a cocktail-type party . . . for a sit-down dinner, 250 . . . member events never exceed more than 200 people . . . those are maybe three times a year." Mr. Kaliski was concerned about Windsor Village Association communication with the community.
MOTION (by Mr. Genewick, seconded by Ms. Carroll): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the amended application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd.
DISCUSSION: Patty Hill, Past President of The Ebell, noted the Ebell's community value and reminded that the Ebell "is not open to the public . . . if we lose that building we have to give everything away to charity . . . it is a private foundation" and "utilities are $13,000 a month." Ms. Carroll noted and Ms. Hill confirmed that other "Ebell clubs" have had to "liquidate." Jane Martin, the Ebell's Finance Chair; Joyce Davidson; Dennee Frey; and Janna Harris supported the application. Kay Balue said it takes $120,000 a month for the Ebell to stay open. Olive Kearney supported the application but was concerned about "overflow parking."
MOTION to CALL FOR THE QUESTION (by Mr. Gresham); there were no objections.
MOTION PASSED unanimously by a hand vote.
Committee Member Patty Lombard returned to the room at this time, making 13 Committee Members present (the Committee quorum is nine).
B. Discussion and possible action on an application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. (Jared Sopko) Applicants first presented at 11/14 meeting and agreed at that time to drop the variance request in favor of a Density Bonus application. Neighbors from Country Club Heights have expressed concerns with density, height, neighborhood compatibility and other issues. Official Density Bonus application has not been received.
Copies were distributed of renderings, photos, site plans, elevations and letters to the Committee from Arlin Low, President, Country Club Heights Neighborhood Association. No project representative was present. Ms. Fuller noted that there were two requests to take action. Mr. Kaliski was concerned about the lack of response from the developers.
MOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board oppose the application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. as presented to date due to the developer's lack of communication and transparency and their lack of response to the Committee's requests.
MOTION PASSED unanimously by a hand vote.
C. Discussion and possible action on an application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose (Art Rodriguez/Alex Campbell) Applicant is requesting continued sale of a full line of alcoholic beverages for on-site consumption, with an earlier opening hour, a variance to continue to allow the required parking to be provided off site within 750 feet, secured via lease agreement in lieu of a covenant, and limited live entertainment. At the February LUC meeting, Committee Members requested that applicants return with a survey of other restaurants and liquor permits in the area, to make sure the applicants' newly requested hours are not outside the norm for the neighborhood.
Copies were distributed of the CUP/CUB Application. Mr. Campbell presented and said the average nearby closing hours are "about 10 to 11" [p.m.] and "opening 9 to 10" [a.m.]. and that the Xiomara owner has agreed to new hours of 10 a.m. to 12 a.m., based on this survey. He added that they haven't had any violations, and explained the usefulness of being open another hour later.
MOTION (by Mr. Genewick, seconded by Mr. Herman): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose.
MOTION PASSED unanimously by a hand vote.
5. NEW BUSINESS (Discussion and Possible Action)
A. Initial presentation, discussion and possible action on a CUB to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose (Art Rodriguez/Alex Campbell)
Copies were distributed of the CUP Application. Mr. Campbell presented. The project, between Orange and Mansfield, has Type 20 and Type 42 licenses; they want to upgrade the Type 20 to a Type 21 with the same hours of operation and "a full line of wine and spirits." He said Type 21 licenses are worth "$75-$85,000," good for two years and "don't allow you to drink on-site." Type 42 is for wine-tasting. He noted that "all liquor licenses run with the land." It probably would be a five-year CUP revocable upon a violation(s).
MOTION (by Ms. Eggleston, seconded by Ms. Moser): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the CUB application to change the Type 20 to a Type 21 license and renew the Type 42 license as described on the application to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose.
MOTION PASSED unanimously by a hand vote.
Additional emergency agenda item: Ms. Fuller explained that the project at 348-350 N. Orange is "a duplex seeking to convert to a condominium"; the Hearing is April 8 th, (but we didn't hear about it in time to add it to the published agenda this month). Susan Smith said there would be "no effect on the building . . . an existing building" built in 1927 between Melrose and Beverly and east of LaBrea. It has two oversized garages and one additional rear space. Ms. Moser was concerned about "taking rental units off the market." There was discussion that condos cost less money to buy than single-family homes but help force renters out. Mr. Kaliski would support the project if it meets Advisory Agency parking regulations. Ms. Savage noted that it is in one of the neighborhoods that wants and is being considered for an Interim Control Ordinance.
MOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the conversion of a duplex at 348-350 N. Orange to a condominium.
MOTION PASSED by a hand vote with 10 in favor; Ms. Moser and Ms. Savage opposed; Ms. Carroll abstained.
B. Initial presentation, discussion and possible action on a CUB application for beer and wine sales at the Burger Lounge restaurant at 217 N. Larchmont (Sheryl Brady)
Copies were distributed of the CUB Application. Cheryl Brady presented. The Burger Lounge is currently open and proposing to have a Type 41 license with operating hours of 10:00 a.m. – 10:00 p.m. It has approximately 1,574 square feet with around 60 seats including 24 on the patio. They estimate that "2% of the sales will be alcohol." Consumption would only be allowed inside. Ms. Lombard noted that that the property owners are recently tried to rent to a marijuana dispensary, and expressed concern about granting a liquor permit that would run with the property The Hearing is April 15 th .
<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://greaterwilshire.org/wp-content/uploads/bsk-pdf-manager/minutes032415final_33.pdf\n</url>\n<text>\nGreater Wilshire Neighborhood Council Land Use Committee\n\nMINUTES\n\nMarch 24, 2015\n\nApproved, as corrected, by the Committee 4/28/15\n\n1. WELCOMING REMARKS\n\nA. Call to order (James Wolf)\n\nA duly noticed meeting of the Land Use Committee (\"LUC\") of the Greater Wilshire Neighborhood Council (\"GWNC\") was held on Tuesday, March 24, 2015, at Wilshire United Methodist Church, Assembly Room, 4350 Wilshire Blvd. Secretary Barbara Savage called the meeting to order at 6:39 p.m.\n\nB. Roll call (Barbara Savage)\n\nMs. Savage called the roll. Ten of the 16 Committee Members were present at the Roll Call: Ann Eggleston, Mike Genewick, Karen Gilman, John Gresham, Dick Herman, Joseph Hoffman, Patty Lombard, Caroline Moser, Barbara Savage and Greg Wittmann. Patricia Carroll, John Kaliski and Jeff McManus arrived later. Three Committee Members were absent: Alan Bernstein, Julie Stromberg and James Wolf. Dorian Shapiro resigned. The GWNC Land Use Committee quorum (the minimum number of Committee Members needing to be present to take binding votes on Agendized Items) is nine, so the Committee could take such votes. Also attending: 22 Stakeholders and guests.\n\n2. GENERAL PUBLIC COMMENT ON NON-AGENDA ITEMS\n\nThere were no public comments at this time.\n\n3. ADMINISTRATIVE ITEMS (Discussion and Action)\n\nA. Review and adoption of February 24, 2015 Minutes\n\nMOTION (by Mr. Genewick, seconded by Ms. Lombard): The Greater Wilshire Neighborhood Council Land Use Committee approves the Minutes of its February 24, 2015 Meeting as written.\n\nMOTION PASSED by a hand vote; Ms. Moser abstained.\n\nB. Review of Early Notification Report for possible future agenda items\n\nCopies were distributed of and Ms. Savage reviewed the \"03/24/15 Early Planning Report Summaries for GWNC Area.\" The projects at 5273 Olympic, 5353 Third St. and 800 S. Lorraine Blvd. were flagged for further attention.\n\nCommittee Members Patricia Carroll, John Kaliski and Jeff McManus arrived at this time, making 13 Committee Members present (the Committee quorum is nine).\n\nGreater Wilshire Neighborhood Council Land Use Committee Minutes 3-24-15 Page 1 of 7\n\nCommittee Member Patty Lombard recused herself and left the room at this time, making 12 Committee Members present (the Committee quorum is nine).\n\n4. OLD BUSINESS (Discussion and Possible Action)\n\nA. Discussion and possible action on an application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd. (Andrew Jorgensen) At the applicant's last appearance, at the February LUC meeting, discussion centered on applicants' recent meetings with the Windsor Village Association. Committee Members recommended that the applicants create a set of voluntary conditions for the permit that would directly address neighbors' concerns regarding traffic, parking and latenight noise from special events.\n\nCopies were distributed of a letter from Philip Miller, General Manager, The Ebell of Los Angeles; \"Special Filming Conditions: The Wilshire Ebell & United Methodist Church Parking Lot\"; and \"Conditional Use: Attachment 1.\" Mr. Miller described the Application, saying \"the previous Permit was allowed to expire . . . the only change is we're asking to allow the Ebell to serve alcohol in the clubhouse . . . six days a week, to 1:00 a.m.\" (one hour later than the previous permit allowed). He described the Ebell's community service, collaborations with community groups and philanthropy. He described the need to host catered events for the revenue stream. The Ebell \"met with representatives of the neighborhood . . . including the Windsor Village Board of Directors . . . we maintain regular communication.\" The Ebell is working with the L.A. Dept. of Transportation \"to mitigate\" traffic concerns and described event traffic control efforts. Most events conclude at the latest at 10 – 11:00 p.m. The Ebell \"would notify the Windsor Village Association one week in advance\" when events would end at 1:00 a.m., and there would be no more than six such events per year. A maximum of 1,000 people could attend \"a cocktail-type party . . . for a sit-down dinner, 250 . . . member events never exceed more than 200 people . . . those are maybe three times a year.\" Mr. Kaliski was concerned about Windsor Village Association communication with the community.\n\nMOTION (by Mr. Genewick, seconded by Ms. Carroll): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the amended application for a CUB for full-line liquor service (with later closing time) at the Ebell of Los Angeles, 743 S. Lucerne Blvd.\n\nDISCUSSION: Patty Hill, Past President of The Ebell, noted the Ebell's community value and reminded that the Ebell \"is not open to the public . . . if we lose that building we have to give everything away to charity . . . it is a private foundation\" and \"utilities are $13,000 a month.\" Ms. Carroll noted and Ms. Hill confirmed that other \"Ebell clubs\" have had to \"liquidate.\" Jane Martin, the Ebell's Finance Chair; Joyce Davidson; Dennee Frey; and Janna Harris supported the application. Kay Balue said it takes $120,000 a month for the Ebell to stay open. Olive Kearney supported the application but was concerned about \"overflow parking.\"\n\nMOTION to CALL FOR THE QUESTION (by Mr. Gresham); there were no objections.\n\nMOTION PASSED unanimously by a hand vote.\n\nCommittee Member Patty Lombard returned to the room at this time, making 13 Committee Members present (the Committee quorum is nine).\n\nB. Discussion and possible action on an application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. (Jared Sopko) Applicants first presented at 11/14 meeting and agreed at that time to drop the variance request in favor of a Density Bonus application. Neighbors from Country Club Heights have expressed concerns with density, height, neighborhood compatibility and other issues. Official Density Bonus application has not been received.\n\nCopies were distributed of renderings, photos, site plans, elevations and letters to the Committee from Arlin Low, President, Country Club Heights Neighborhood Association. No project representative was present. Ms. Fuller noted that there were two requests to take action. Mr. Kaliski was concerned about the lack of response from the developers.\n\nMOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board oppose the application for a variance to allow added density in the construction of a 162-unit apartment complex at 700 S. Manhattan Pl. as presented to date due to the developer's lack of communication and transparency and their lack of response to the Committee's requests.\n\nMOTION PASSED unanimously by a hand vote.\n\nC. Discussion and possible action on an application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose (Art Rodriguez/Alex Campbell) Applicant is requesting continued sale of a full line of alcoholic beverages for on-site consumption, with an earlier opening hour, a variance to continue to allow the required parking to be provided off site within 750 feet, secured via lease agreement in lieu of a covenant, and limited live entertainment. At the February LUC meeting, Committee Members requested that applicants return with a survey of other restaurants and liquor permits in the area, to make sure the applicants' newly requested hours are not outside the norm for the neighborhood.\n\nCopies were distributed of the CUP/CUB Application. Mr. Campbell presented and said the average nearby closing hours are \"about 10 to 11\" [p.m.] and \"opening 9 to 10\" [a.m.]. and that the Xiomara owner has agreed to new hours of 10 a.m. to 12 a.m., based on this survey. He added that they haven't had any violations, and explained the usefulness of being open another hour later.\n\nMOTION (by Mr. Genewick, seconded by Mr. Herman): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the application for a CUB renewal and parking variance for the Xiomara restaurant at 6101 Melrose.\n\nMOTION PASSED unanimously by a hand vote.\n\n5. NEW BUSINESS (Discussion and Possible Action)\n\nA. Initial presentation, discussion and possible action on a CUB to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose (Art Rodriguez/Alex Campbell)\n\nCopies were distributed of the CUP Application. Mr. Campbell presented. The project, between Orange and Mansfield, has Type 20 and Type 42 licenses; they want to upgrade the Type 20 to a Type 21 with the same hours of operation and \"a full line of wine and spirits.\" He said Type 21 licenses are worth \"$75-$85,000,\" good for two years and \"don't allow you to drink on-site.\" Type 42 is for wine-tasting. He noted that \"all liquor licenses run with the land.\" It probably would be a five-year CUP revocable upon a violation(s).\n\nMOTION (by Ms. Eggleston, seconded by Ms. Moser): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the CUB application to change the Type 20 to a Type 21 license and renew the Type 42 license as described on the application to upgrade from beer and wine to a full line of liquor sales at a market at 6801 W. Melrose.\n\nMOTION PASSED unanimously by a hand vote.\n\nAdditional emergency agenda item: Ms. Fuller explained that the project at 348-350 N. Orange is \"a duplex seeking to convert to a condominium\"; the Hearing is April 8 th, (but we didn't hear about it in time to add it to the published agenda this month). Susan Smith said there would be \"no effect on the building . . . an existing building\" built in 1927 between Melrose and Beverly and east of LaBrea. It has two oversized garages and one additional rear space. Ms. Moser was concerned about \"taking rental units off the market.\" There was discussion that condos cost less money to buy than single-family homes but help force renters out. Mr. Kaliski would support the project if it meets Advisory Agency parking regulations. Ms. Savage noted that it is in one of the neighborhoods that wants and is being considered for an Interim Control Ordinance.\n\nMOTION (by Mr. Kaliski, seconded by Mr. Gresham): The Greater Wilshire Neighborhood Council Land Use Committee recommends that the GWNC Board support the conversion of a duplex at 348-350 N. Orange to a condominium.\n\nMOTION PASSED by a hand vote with 10 in favor; Ms. Moser and Ms. Savage opposed; Ms. Carroll abstained.\n\nB. Initial presentation, discussion and possible action on a CUB application for beer and wine sales at the Burger Lounge restaurant at 217 N. Larchmont (Sheryl Brady)\n\nCopies were distributed of the CUB Application. Cheryl Brady presented. The Burger Lounge is currently open and proposing to have a Type 41 license with operating hours of 10:00 a.m. – 10:00 p.m. It has approximately 1,574 square feet with around 60 seats including 24 on the patio. They estimate that \"2% of the sales will be alcohol.\" Consumption would only be allowed inside. Ms. Lombard noted that that the property owners are recently tried to rent to a marijuana dispensary, and expressed concern about granting a liquor permit that would run with the property The Hearing is April 15 th .\n<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "\nMOTION (by Mr.",
"role": "assistant"
}
] |
|
WESTERN AUSTRALIAN STANDARDBRED BREEDERS ASSOCIATION Inc.
P.O. Box 1270, Booragoon WA 6954
[email protected] www.wasba.com.au
Vol. – 200 January 2015
WASBA 2015 AGM on 14 FEBRUARY
The 2015 Annual General Meeting will be held THIS COMING SATURDAY 14 FEBRUARY at Gloucester Park on Interdominion Heat Night, commencing at 4.30pm.
Light refreshments will be provided from 4pm, prior to the meeting, so come along to the AGM and stay for an exciting night of racing which will include the WA Heat of the Interdominion.
If you are yet to pay your membership, you can do so at the AGM.
GLOUCESTER STANDARDBREDS YEARLING SALE -22 February 2015
The 2015 Gloucester Standardbreds Western Australian Yearling Sale catalogue is available online at www.gloucesterstandardbreds.com.au . The Sale, on Sunday 22rd February 2014, is less than a fortnight away.! It will be held at the usual venue, the Belmont Park Sales Complex, so make sure you get there.
There are 129 quality lots. If you want a catalogue but don't have one, contact Gloucester Standardbreds Manager Dot Parker on 0416 280 392 or email [email protected] .
There are heaps of quality sires, and some of the lots are full and half brothers and sisters to Group winners and $100,000 plus earners. The new Double Westbred Bonus payable for progeny of WA based stallions winning 2yo and 3yo races makes the progeny of locally-based sires like Allamerican Ingot, Cams Fool and Rich And Spoilt well worth looking at. See the later article on Rich Yankee to see what a good deal this is!.
You can buy a yearling and take advantage of the recent changes to the Westbred Bonus conditions, which include improved first win bonuses as well as full Westbred Bonus payments on Westbred 2 and 3yo, and R class 2 and 3yo races.
There is a parade of Kody Charles' KTC Bloodstock Yearlings on WEDNESDAY 11 FEBRUARY commencing at 5PM at Kody's property, 324 River Road Serpentine. Your opportunity to get an early look at these yearlings. For more details contact Kody on 0413 669 474.
And, don't miss the Parade of Yearlings at 10am on Sale Day, with the assistance of WASBA and the Standardbred Pleasure & Performance Horse Association of WA (SPPHAWA). This year there will be a $250 prize for the vendor of one colt and one filly, randomly drawn from the yearlings that participate in the Parade of Yearlings.
WESTBRED, FILLIES AND MARES OPPORTUNITIES COMING UP
In February, the $50,000 Daintys Daughter Classic for 3yo fillies will be run this Friday 13 February, along with a Westbred Only Standing start race for M0 and better ! The $50,000 Empress Stakes is on 27 February 2015.
The separate $19,999 Western Crown Classics for 2yo colts and fillies will be run on 20 March.
In April, the $30,000 Golden Girls Mile will be run at Pinjarra on 6 April. The Johnson Heats for M2 mares will be run in April, with the $25,000 final on 24 April along with the $100,000 Sales Classics for 2yos. Also in April, the $19,999 Country Oaks, restricted to Westbred 3yo fillies, is scheduled for Bunbury on Anzac Day 25 April, 2 weeks before the WA Oaks. The Westbred Bonus will be paid to fillies placed 1 st to 4 th . And thanks to Pinjarra the $14,999 WASBA King-Lethbridge Memorial Westbred Mares Pace will be run at Pinjarra on 20 April.
MEMORABLE MOMENTS IN JANUARY
[x] An exciting finish to the Busselton Sweetheart Series, with 6yo Righteous Hanover mare Love Of The Chase going into the final race in equal third position but taking the series with a win in the final Heat. Congratulations to breeder-owner Karen Young who received $500 from WASBA for being the breeder of Love Of The Chase, who also gets 500 Epona credits held in trust by WASBA. Congratulations also to the Busselton Club for running this great series.
[x] David Hercules (by Artesian) exceptional in winning the $249,000 2015 Perth Interdominion Fremantle Cup and taking his stake earnings past the $1,000,000 mark;
[x] Good wins by the exciting Heez On Fire (Courage Under Fire) and currently our best mare Sensational Gabby (local sire Yankee Sensation);
BREEDER OF THE MONTH – December
Congratulations to our Breeder of the Month, Harry Capararo who bred 3yo gelding Affluent Bell (Rich And Spoilt out of Shoneer Lobell by Jeremy Lobell). Affluent Bell just missed an earlier award after winning 4 consecutive races including an open race two weeks into his 3yo season. Affluent Bell has finished no further back than 4 th in his last 12 runs - a great effort from this 3yo. He is also picking up double Westbred Bonus money for his wins, something his connections must be very happy about.
Shoneer Lobell, the dam of Affluent Bell, has produced 5 winners from her first five foals including full siblings to Affluent Bell in Sheer Dreams 1:58.6, 19 wins and $153,994, Wilkins Lucinda 1:54.8, 8 wins and $89,554 and Sweet Charlee 1:58.6, 11 wins and $85,676.
Congratulations to Harry and Affluent Bell.
WA BASED SIRES – December
In December the progeny of 11 WA based sires produced 29 individual winners of 34 races. Northern Luck produced 9 winners of 11 races, Allamerican Ingot produced 7 winners of 7 races, and Rich And Spoilt and Parsons Den each producing 3 winners of 3 races.
Congratulations to the breeders and connections of the 3 WA sired pacers that won 3 races at GP Metro Stakes meetings. The three winners, all on 19 December, were:-
Tuxedo Tour (Northern Luck) breeder Ross Torre's Royalstar Pty Ltd, ran last quarters of 27.8 and 27.3 to win the $35,000 Christmas Gift Final. Great run;
Batavia Jack (Righteous Hanover) breeder Ted O'Connor, with a clever drive won a Westbred Pathway after flying over the last half in 27.9 and 27.7; and
Menalaus of Sparta (Northern Luck) breeder Michael Cunnold, won at Narrogin, then started at 50/1 in the $19,000 M1-M3 Pace over 2130m and duly won in 1:57.7.
WESTBRED WINNERS – December
Westbreds won 111 (48.3%) of the 230 races run in the month of December (including 1 deadheat), much better than the previous months and the same period last year, and closer to our target of 50% of races. We are continuing to work together with Handicapper Warren Wishart to achieve the best result for our local industry. You can also assist by asking your local club to run more Westbred races. There were 18 Westbred races run in December.
The sires (of Westbreds) that did best of the sires based outside of WA were Village Jasper (7 winners of 7 races), Bettors Delight (6 winners of 6 races), Elsu (5 winners of 7 races including Bob Humphries Memorial Winner Kiralin), and Blissfull Hall (4 winners of 6 races).
At Gloucester Park Metro stakes meetings 7 individual Westbreds won 8 (20%) of the races, a drop from October (34%) and November 2014 (25%) and December 2013 (25%). However, the races won were significant races, and definitely a big plus for Westbreds. Congratulations to the breeders and connections of the 7 Westbreds that won races at the Gloucester Park Metro Stakes meetings. Three of the winners are mentioned in the WA bases Sires section and two in the Fillies and Mares section. The other two Westbred winners were:
Heez On Fire (Courage Under Fire) breeder Total Strategy Pty Ltd, after winning the $25,000 The Kersely Final in November, won Heat 1 of the Christmas Gift in 1:56.7, last quarter 27.6;
David Hercules (Artesian) breeder Steve Johnson, won the $23,000 Fred Doy Memorial FFA in 1:54.8 before getting his just rewards with a dominant win in the $60,000 Village Kid Sprint by over 10m.
HOW DID THE FILLIES AND MARES GO (December)
There were 25 fillies/mares races in December 2014, which is equivalent to 10.9% of the total races for the month. Fillies and mares won an additional 35 open races (15.2%), meaning that fillies and mares won 26.1% of the 230 races for the month (remembering that 50% of the foals born are fillies). There were three races in December restricted to 3yo fillies, with the remaining 22 being open to Fillies and Mares.
This is the highest number of fillies/mares races since June 2014 (27), and is 3 more than December 2013. Owners of racing fillies and mares need these opportunities to ensure they can sustain a worthwhile racing career, so we will continue to endeavor and work with RWWA's Handicapper Warren Wishart to have these opportunities for the girls.
The Westbred fillies and mares won 34 (16 F/M races and 18 open) races, compared to 29 in the previous month and 32 in December 2013. During the month, 4 of the fillies/mares races were restricted to Westbreds.
At Gloucester Park Friday night meetings 7 Mares won 8 metro stakes races, including the super record setting NZ filly Libertybelle Midfrew who won the $175,000 Golden Nugget Championship, NZ mare Bettor Dreams won the $25,000 The Coulson Final, and NZ mare Bettor Pack A Pistol won a qualifying Heat of The Coulson and a $17,500 M0-M1 race.
Two of the Friday night winners were Westbred. Congratulations to the connections of all the mares who won at Gloucester Park during December 2014. The Westbred winners at Gloucester Park metro meetings in December were:
Kiralin (Elsu), owner/ breeders Willy Dagostino, Ken Bevan and Bruce Jones, a great win in the $14,999 Bob Humphries Memorial Westbred Mares race at Bunbury, followed by an easy win at GP;
Harriet Elizabeth (Modern Art), breeder Steve Johnson, a good win in Heat 3 of The Coulson.
THE WOW FACTOR IN THE REVAMPED WESTBRED BONUS SCHEME
The only race run at Gloucester Park on 4 February (due to storms and lightning causing the remaining races to be abandoned) was won by Western Australian bred 2yo colt Rich Yankee (by WA based sire Yankee Sensation). It was Rich Yankee's first start and he delighted connections with his debut win.
In winning, his owner/breeder connections received a total of $14,287 in stakemoney and Westbred Bonus payments for winning a $7,000 2yo race.
The first place prizemoney of $4,550 was boosted by a double Westbred Bonus of $5,100, as Rich Yankee is a son of a WA Based stallion. An Owners 1st Win Bonus of $2,000, a Breeders 1st Win Bonus of $2,000 and the 12.5% Breeders Bonus of $637.50 were also paid.
The connections of Rich Yankee will continue to receive the Double Westbred Bonus for every win as a 2yo and a 3yo in races with a stake less than $20,000 - unlike some other harness breeding incentive schemes which reward only the first win. This is why racing a Westbred is particularly worthwhile.
Note: The 2015 Western Australian Yearling Sale has some 35 lots eligible for the Double Westbred Bonus with 127 of the 129 lots on offer being Westbred Bonus eligible.
If you have any questions about the Westbred Bonus Scheme, contact Alan Parker at RWWA on 9445 5207.
WASBA SPONSORS
Your sponsors help us to help you by providing valuable funds throughout the year for stakemoney and breeding bonuses. Contact them to discuss their services or ask your stockist to order their products. In addition to the valuable support provided by the Stud Farms Alabar Bloodstock, Allwood Stud Farm, Empire
Stallions, Hollywood Park, Pepper Tree Farm, Yirribee Pacing Stud and Woodlands Stud in the form of discounts and stallion services, our other sponsors are listed below. For website information and contact details, go to the Breeding News Page of the WASBA website www.wasba.com.au :
YOUR TAB – HAVE YOUR SAY
Not a surprise, but as quoted from page 3 of The West,
" The chairman of Victoria's peak thoroughbred racing body is the latest interstate industry figure to warn WA against privatising the TAB…Robert Roulston, chairman of Racing Victoria, said the code in that state wished it could buy back the wagering licence from corporate operator Tabcorp, the company created when Victorian Premier Jeff Kennett privatised the Victorian TAB in 1994….Mr Kennett had recently admitted he wished he had not sold the TAB…. The privatisation meant that profits leaked out of the racing industry and into the pockets of the shareholders…Those shareholders may have quite different objectives to those of the industry and its needs.."
We should have an update for you very soon, following a meeting between the Premier and the WA Racing Representative Group. We are all aware that the Premier and the Treasurer are keen to sell to reduce government debt. In the meantime, make your thoughts on this important topic known to family and friends, so that they can pass the word on – the TAB did not contribute to the government debt and the racing industry should not be penalised for the situation that the government finds itself in.
To keep you informed about what is at stake, the Gunston Report has been loaded to the WASBA website www.wasba.com.au on the Links page. If you would like us to mail you a copy of the Executive Summary, please let us know.
YOUR COMMITTEE
WASBA is looking for a permanent Secretary. A very small honorarium is paid for the position. If you have good administrative and computer skills and are enthusiastic to take on the role, contact WASBA President Jeanine Diederich for more details.
From time to time there are vacancies on the WASBA Committee. If you consider you have a genuine interest in promoting breeding and harness racing in WA, and you have relevant experience and the time to contribute to a Committee position involving meetings and undertaking various projects, please forward a brief profile by email or post to the WASBA Secretary for consideration in the event of a vacancy. All appointments to the Committee are in accordance with the WASBA Constitution.
| President | Jeanine Diederich | M: 0407 383 256 | Committee | Pat Borg |
|---|---|---|---|---|
| Vice President | Howard King | M: 0418 207 079 | Committee | Ian Davie |
| Treasurer | Howard King | M: 0418 207 079 | Committee | Joe Schaper |
| Secretary | | M: 0447 053 040 [email protected] | Committee | Michael Holtham |
| | | | Committee | Graham Compson |
Don't forget to check out the website from time to time for news, breeding information, links to various items of interest and contact information. If you didn't already know, the WASBA website is:
www.wasba.com.au
Our NEXT COMMITTEE MEETING will be Wednesday 25 th February 2015. If you would like to raise any issues for discussion or comment regarding any aspect of breeding, please contact us by:
- Sending an email to [email protected] .
- Contact any Committee member.
- Write to WASBA at PO Box 1270 Booragoon WA 6954.
|
<urn:uuid:e86bf4d1-ac6d-4ddc-bafb-65b7bcebaece>
|
CC-MAIN-2023-50
|
https://www.new.wasba.com.au/wp-content/uploads/Annual%20PDFs%20&%20Images/2015/Newsletter/Newsletter_2015_January.pdf
|
2023-12-07T10:29:25+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-50/subset=warc/part-00022-e565b809-b335-4c1d-90fd-54a9a2b7113d.c000.gz.parquet
| 1,013,244,165
| 3,662
|
eng_Latn
|
eng_Latn
| 0.996371
|
eng_Latn
| 0.996942
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3309,
7158,
11078,
14489
] |
WESTERN AUSTRALIAN STANDARDBRED BREEDERS ASSOCIATION Inc.
P.O. Box 1270, Booragoon WA 6954
[email protected] www.wasba.com.au
Vol. – 200 January 2015
WASBA 2015 AGM on 14 FEBRUARY
The 2015 Annual General Meeting will be held THIS COMING SATURDAY 14 FEBRUARY at Gloucester Park on Interdominion Heat Night, commencing at 4.30pm.
Light refreshments will be provided from 4pm, prior to the meeting, so come along to the AGM and stay for an exciting night of racing which will include the WA Heat of the Interdominion.
If you are yet to pay your membership, you can do so at the AGM.
GLOUCESTER STANDARDBREDS YEARLING SALE -22 February 2015
The 2015 Gloucester Standardbreds Western Australian Yearling Sale catalogue is available online at www.gloucesterstandardbreds.com.au . The Sale, on Sunday 22rd February 2014, is less than a fortnight away.! It will be held at the usual venue, the Belmont Park Sales Complex, so make sure you get there.
There are 129 quality lots. If you want a catalogue but don't have one, contact Gloucester Standardbreds Manager Dot Parker on 0416 280 392 or email [email protected] .
There are heaps of quality sires, and some of the lots are full and half brothers and sisters to Group winners and $100,000 plus earners. The new Double Westbred Bonus payable for progeny of WA based stallions winning 2yo and 3yo races makes the progeny of locally-based sires like Allamerican Ingot, Cams Fool and Rich And Spoilt well worth looking at. See the later article on Rich Yankee to see what a good deal this is!.
You can buy a yearling and take advantage of the recent changes to the Westbred Bonus conditions, which include improved first win bonuses as well as full Westbred Bonus payments on Westbred 2 and 3yo, and R class 2 and 3yo races.
There is a parade of Kody Charles' KTC Bloodstock Yearlings on WEDNESDAY 11 FEBRUARY commencing at 5PM at Kody's property, 324 River Road Serpentine. Your opportunity to get an early look at these yearlings. For more details contact Kody on 0413 669 474.
And, don't miss the Parade of Yearlings at 10am on Sale Day, with the assistance of WASBA and the Standardbred Pleasure & Performance Horse Association of WA (SPPHAWA). This year there will be a $250 prize for the vendor of one colt and one filly, randomly drawn from the yearlings that participate in the Parade of Yearlings.
WESTBRED, FILLIES AND MARES OPPORTUNITIES COMING UP
In February, the $50,000 Daintys Daughter Classic for 3yo fillies will be run this Friday 13 February, along with a Westbred Only Standing start race for M0 and better ! The $50,000 Empress Stakes is on 27 February 2015.
The separate $19,999 Western Crown Classics for 2yo colts and fillies will be run on 20 March.
In April, the $30,000 Golden Girls Mile will be run at Pinjarra on 6 April. The Johnson Heats for M2 mares will be run in April, with the $25,000 final on 24 April along with the $100,000 Sales Classics for 2yos. Also in April, the $19,999 Country Oaks, restricted to Westbred 3yo fillies, is scheduled for Bunbury on Anzac Day 25 April, 2 weeks before the WA Oaks. The Westbred Bonus will be paid to fillies placed 1 st to 4 th . And thanks to Pinjarra the $14,999 WASBA King-Lethbridge Memorial Westbred Mares Pace will be run at Pinjarra on 20 April.
MEMORABLE MOMENTS IN JANUARY
[x] An exciting finish to the Busselton Sweetheart Series, with 6yo Righteous Hanover mare Love Of The Chase going into the final race in equal third position but taking the series with a win in the final Heat. Congratulations to breeder-owner Karen Young who received $500 from WASBA for being the breeder of Love Of The Chase, who also gets 500 Epona credits held in trust by WASBA. Congratulations also to the Busselton Club for running this great series.
[x] David Hercules (by Artesian) exceptional in winning the $249,000 2015 Perth Interdominion Fremantle Cup and taking his stake earnings past the $1,000,000 mark;
[x] Good wins by the exciting Heez On Fire (Courage Under Fire) and currently our best mare Sensational Gabby (local sire Yankee Sensation);
BREEDER OF THE MONTH – December
Congratulations to our Breeder of the Month, Harry Capararo who bred 3yo gelding Affluent Bell (Rich And Spoilt out of Shoneer Lobell by Jeremy Lobell). Affluent Bell just missed an earlier award after winning 4 consecutive races including an open race two weeks into his 3yo season. Affluent Bell has finished no further back than 4 th in his last 12 runs - a great effort from this 3yo. He is also picking up double Westbred Bonus money for his wins, something his connections must be very happy about.
Shoneer Lobell, the dam of Affluent Bell, has produced 5 winners from her first five foals including full siblings to Affluent Bell in Sheer Dreams 1:58.6, 19 wins and $153,994, Wilkins Lucinda 1:54.8, 8 wins and $89,554 and Sweet Charlee 1:58.6, 11 wins and $85,676.
Congratulations to Harry and Affluent Bell.
WA BASED SIRES – December
In December the progeny of 11 WA based sires produced 29 individual winners of 34 races. Northern Luck produced 9 winners of 11 races, Allamerican Ingot produced 7 winners of 7 races, and Rich And Spoilt and Parsons Den each producing 3 winners of 3 races.
Congratulations to the breeders and connections of the 3 WA sired pacers that won 3 races at GP Metro Stakes meetings. The three winners, all on 19 December, were:-
Tuxedo Tour (Northern Luck) breeder Ross Torre's Royalstar Pty Ltd, ran last quarters of 27.8 and 27.3 to win the $35,000 Christmas Gift Final. Great run;
Batavia Jack (Righteous Hanover) breeder Ted O'Connor, with a clever drive won a Westbred Pathway after flying over the last half in 27.9 and 27.7; and
Menalaus of Sparta (Northern Luck) breeder Michael Cunnold, won at Narrogin, then started at 50/1 in the $19,000 M1-M3 Pace over 2130m and duly won in 1:57.7.
WESTBRED WINNERS – December
Westbreds won 111 (48.3%) of the 230 races run in the month of December (including 1 deadheat), much better than the previous months and the same period last year, and closer to our target of 50% of races. We are continuing to work together with Handicapper Warren Wishart to achieve the best result for our local industry. You can also assist by asking your local club to run more Westbred races. There were 18 Westbred races run in December.
The sires (of Westbreds) that did best of the sires based outside of WA were Village Jasper (7 winners of 7 races), Bettors Delight (6 winners of 6 races), Elsu (5 winners of 7 races including Bob Humphries Memorial Winner Kiralin), and Blissfull Hall (4 winners of 6 races).
At Gloucester Park Metro stakes meetings 7 individual Westbreds won 8 (20%) of the races, a drop from October (34%) and November 2014 (25%) and December 2013 (25%). However, the races won were significant races, and definitely a big plus for Westbreds. Congratulations to the breeders and connections of the 7 Westbreds that won races at the Gloucester Park Metro Stakes meetings. Three of the winners are mentioned in the WA bases Sires section and two in the Fillies and Mares section. The other two Westbred winners were:
Heez On Fire (Courage Under Fire) breeder Total Strategy Pty Ltd, after winning the $25,000 The Kersely Final in November, won Heat 1 of the Christmas Gift in 1:56.7, last quarter 27.6;
David Hercules (Artesian) breeder Steve Johnson, won the $23,000 Fred Doy Memorial FFA in 1:54.8 before getting his just rewards with a dominant win in the $60,000 Village Kid Sprint by over 10m.
HOW DID THE FILLIES AND MARES GO (December)
There were 25 fillies/mares races in December 2014, which is equivalent to 10.9% of the total races for the month. Fillies and mares won an additional 35 open races (15.2%), meaning that fillies and mares won 26.1% of the 230 races for the month (remembering that 50% of the foals born are fillies). There were three races in December restricted to 3yo fillies, with the remaining 22 being open to Fillies and Mares.
This is the highest number of fillies/mares races since June 2014 (27), and is 3 more than December 2013. Owners of racing fillies and mares need these opportunities to ensure they can sustain a worthwhile racing career, so we will continue to endeavor and work with RWWA's Handicapper Warren Wishart to have these opportunities for the girls.
The Westbred fillies and mares won 34 (16 F/M races and 18 open) races, compared to 29 in the previous month and 32 in December 2013. During the month, 4 of the fillies/mares races were restricted to Westbreds.
At Gloucester Park Friday night meetings 7 Mares won 8 metro stakes races, including the super record setting NZ filly Libertybelle Midfrew who won the $175,000 Golden Nugget Championship, NZ mare Bettor Dreams won the $25,000 The Coulson Final, and NZ mare Bettor Pack A Pistol won a qualifying Heat of The Coulson and a $17,500 M0-M1 race.
Two of the Friday night winners were Westbred. Congratulations to the connections of all the mares who won at Gloucester Park during December 2014. The Westbred winners at Gloucester Park metro meetings in December were:
Kiralin (Elsu), owner/ breeders Willy Dagostino, Ken Bevan and Bruce Jones, a great win in the $14,999 Bob Humphries Memorial Westbred Mares race at Bunbury, followed by an easy win at GP;
Harriet Elizabeth (Modern Art), breeder Steve Johnson, a good win in Heat 3 of The Coulson.
THE WOW FACTOR IN THE REVAMPED WESTBRED BONUS SCHEME
The only race run at Gloucester Park on 4 February (due to storms and lightning causing the remaining races to be abandoned) was won by Western Australian bred 2yo colt Rich Yankee (by WA based sire Yankee Sensation). It was Rich Yankee's first start and he delighted connections with his debut win.
In winning, his owner/breeder connections received a total of $14,287 in stakemoney and Westbred Bonus payments for winning a $7,000 2yo race.
The first place prizemoney of $4,550 was boosted by a double Westbred Bonus of $5,100, as Rich Yankee is a son of a WA Based stallion. An Owners 1st Win Bonus of $2,000, a Breeders 1st Win Bonus of $2,000 and the 12.5% Breeders Bonus of $637.50 were also paid.
The connections of Rich Yankee will continue to receive the Double Westbred Bonus for every win as a 2yo and a 3yo in races with a stake less than $20,000 - unlike some other harness breeding incentive schemes which reward only the first win. This is why racing a Westbred is particularly worthwhile.
Note: The 2015 Western Australian Yearling Sale has some 35 lots eligible for the Double Westbred Bonus with 127 of the 129 lots on offer being Westbred Bonus eligible.
If you have any questions about the Westbred Bonus Scheme, contact Alan Parker at RWWA on 9445 5207.
WASBA SPONSORS
Your sponsors help us to help you by providing valuable funds throughout the year for stakemoney and breeding bonuses. Contact them to discuss their services or ask your stockist to order their products. In addition to the valuable support provided by the Stud Farms Alabar Bloodstock, Allwood Stud Farm, Empire
Stallions, Hollywood Park, Pepper Tree Farm, Yirribee Pacing Stud and Woodlands Stud in the form of discounts and stallion services, our other sponsors are listed below. For website information and contact details, go to the Breeding News Page of the WASBA website www.wasba.com.au :
YOUR TAB – HAVE YOUR SAY
Not a surprise, but as quoted from page 3 of The West,
" The chairman of Victoria's peak thoroughbred racing body is the latest interstate industry figure to warn WA against privatising the TAB…Robert Roulston, chairman of Racing Victoria, said the code in that state wished it could buy back the wagering licence from corporate operator Tabcorp, the company created when Victorian Premier Jeff Kennett privatised the Victorian TAB in 1994….Mr Kennett had recently admitted he wished he had not sold the TAB…. The privatisation meant that profits leaked out of the racing industry and into the pockets of the shareholders…Those shareholders may have quite different
|
objectives to those of the industry and its needs..
| 12,057
|
beginning_of_word
|
objectives
|
remove_all
|
<url>
https://www.new.wasba.com.au/wp-content/uploads/Annual%20PDFs%20&%20Images/2015/Newsletter/Newsletter_2015_January.pdf
</url>
<text>
WESTERN AUSTRALIAN STANDARDBRED BREEDERS ASSOCIATION Inc.
P.O. Box 1270, Booragoon WA 6954
[email protected] www.wasba.com.au
Vol. – 200 January 2015
WASBA 2015 AGM on 14 FEBRUARY
The 2015 Annual General Meeting will be held THIS COMING SATURDAY 14 FEBRUARY at Gloucester Park on Interdominion Heat Night, commencing at 4.30pm.
Light refreshments will be provided from 4pm, prior to the meeting, so come along to the AGM and stay for an exciting night of racing which will include the WA Heat of the Interdominion.
If you are yet to pay your membership, you can do so at the AGM.
GLOUCESTER STANDARDBREDS YEARLING SALE -22 February 2015
The 2015 Gloucester Standardbreds Western Australian Yearling Sale catalogue is available online at www.gloucesterstandardbreds.com.au . The Sale, on Sunday 22rd February 2014, is less than a fortnight away.! It will be held at the usual venue, the Belmont Park Sales Complex, so make sure you get there.
There are 129 quality lots. If you want a catalogue but don't have one, contact Gloucester Standardbreds Manager Dot Parker on 0416 280 392 or email [email protected] .
There are heaps of quality sires, and some of the lots are full and half brothers and sisters to Group winners and $100,000 plus earners. The new Double Westbred Bonus payable for progeny of WA based stallions winning 2yo and 3yo races makes the progeny of locally-based sires like Allamerican Ingot, Cams Fool and Rich And Spoilt well worth looking at. See the later article on Rich Yankee to see what a good deal this is!.
You can buy a yearling and take advantage of the recent changes to the Westbred Bonus conditions, which include improved first win bonuses as well as full Westbred Bonus payments on Westbred 2 and 3yo, and R class 2 and 3yo races.
There is a parade of Kody Charles' KTC Bloodstock Yearlings on WEDNESDAY 11 FEBRUARY commencing at 5PM at Kody's property, 324 River Road Serpentine. Your opportunity to get an early look at these yearlings. For more details contact Kody on 0413 669 474.
And, don't miss the Parade of Yearlings at 10am on Sale Day, with the assistance of WASBA and the Standardbred Pleasure & Performance Horse Association of WA (SPPHAWA). This year there will be a $250 prize for the vendor of one colt and one filly, randomly drawn from the yearlings that participate in the Parade of Yearlings.
WESTBRED, FILLIES AND MARES OPPORTUNITIES COMING UP
In February, the $50,000 Daintys Daughter Classic for 3yo fillies will be run this Friday 13 February, along with a Westbred Only Standing start race for M0 and better ! The $50,000 Empress Stakes is on 27 February 2015.
The separate $19,999 Western Crown Classics for 2yo colts and fillies will be run on 20 March.
In April, the $30,000 Golden Girls Mile will be run at Pinjarra on 6 April. The Johnson Heats for M2 mares will be run in April, with the $25,000 final on 24 April along with the $100,000 Sales Classics for 2yos. Also in April, the $19,999 Country Oaks, restricted to Westbred 3yo fillies, is scheduled for Bunbury on Anzac Day 25 April, 2 weeks before the WA Oaks. The Westbred Bonus will be paid to fillies placed 1 st to 4 th . And thanks to Pinjarra the $14,999 WASBA King-Lethbridge Memorial Westbred Mares Pace will be run at Pinjarra on 20 April.
MEMORABLE MOMENTS IN JANUARY
[x] An exciting finish to the Busselton Sweetheart Series, with 6yo Righteous Hanover mare Love Of The Chase going into the final race in equal third position but taking the series with a win in the final Heat. Congratulations to breeder-owner Karen Young who received $500 from WASBA for being the breeder of Love Of The Chase, who also gets 500 Epona credits held in trust by WASBA. Congratulations also to the Busselton Club for running this great series.
[x] David Hercules (by Artesian) exceptional in winning the $249,000 2015 Perth Interdominion Fremantle Cup and taking his stake earnings past the $1,000,000 mark;
[x] Good wins by the exciting Heez On Fire (Courage Under Fire) and currently our best mare Sensational Gabby (local sire Yankee Sensation);
BREEDER OF THE MONTH – December
Congratulations to our Breeder of the Month, Harry Capararo who bred 3yo gelding Affluent Bell (Rich And Spoilt out of Shoneer Lobell by Jeremy Lobell). Affluent Bell just missed an earlier award after winning 4 consecutive races including an open race two weeks into his 3yo season. Affluent Bell has finished no further back than 4 th in his last 12 runs - a great effort from this 3yo. He is also picking up double Westbred Bonus money for his wins, something his connections must be very happy about.
Shoneer Lobell, the dam of Affluent Bell, has produced 5 winners from her first five foals including full siblings to Affluent Bell in Sheer Dreams 1:58.6, 19 wins and $153,994, Wilkins Lucinda 1:54.8, 8 wins and $89,554 and Sweet Charlee 1:58.6, 11 wins and $85,676.
Congratulations to Harry and Affluent Bell.
WA BASED SIRES – December
In December the progeny of 11 WA based sires produced 29 individual winners of 34 races. Northern Luck produced 9 winners of 11 races, Allamerican Ingot produced 7 winners of 7 races, and Rich And Spoilt and Parsons Den each producing 3 winners of 3 races.
Congratulations to the breeders and connections of the 3 WA sired pacers that won 3 races at GP Metro Stakes meetings. The three winners, all on 19 December, were:-
Tuxedo Tour (Northern Luck) breeder Ross Torre's Royalstar Pty Ltd, ran last quarters of 27.8 and 27.3 to win the $35,000 Christmas Gift Final. Great run;
Batavia Jack (Righteous Hanover) breeder Ted O'Connor, with a clever drive won a Westbred Pathway after flying over the last half in 27.9 and 27.7; and
Menalaus of Sparta (Northern Luck) breeder Michael Cunnold, won at Narrogin, then started at 50/1 in the $19,000 M1-M3 Pace over 2130m and duly won in 1:57.7.
WESTBRED WINNERS – December
Westbreds won 111 (48.3%) of the 230 races run in the month of December (including 1 deadheat), much better than the previous months and the same period last year, and closer to our target of 50% of races. We are continuing to work together with Handicapper Warren Wishart to achieve the best result for our local industry. You can also assist by asking your local club to run more Westbred races. There were 18 Westbred races run in December.
The sires (of Westbreds) that did best of the sires based outside of WA were Village Jasper (7 winners of 7 races), Bettors Delight (6 winners of 6 races), Elsu (5 winners of 7 races including Bob Humphries Memorial Winner Kiralin), and Blissfull Hall (4 winners of 6 races).
At Gloucester Park Metro stakes meetings 7 individual Westbreds won 8 (20%) of the races, a drop from October (34%) and November 2014 (25%) and December 2013 (25%). However, the races won were significant races, and definitely a big plus for Westbreds. Congratulations to the breeders and connections of the 7 Westbreds that won races at the Gloucester Park Metro Stakes meetings. Three of the winners are mentioned in the WA bases Sires section and two in the Fillies and Mares section. The other two Westbred winners were:
Heez On Fire (Courage Under Fire) breeder Total Strategy Pty Ltd, after winning the $25,000 The Kersely Final in November, won Heat 1 of the Christmas Gift in 1:56.7, last quarter 27.6;
David Hercules (Artesian) breeder Steve Johnson, won the $23,000 Fred Doy Memorial FFA in 1:54.8 before getting his just rewards with a dominant win in the $60,000 Village Kid Sprint by over 10m.
HOW DID THE FILLIES AND MARES GO (December)
There were 25 fillies/mares races in December 2014, which is equivalent to 10.9% of the total races for the month. Fillies and mares won an additional 35 open races (15.2%), meaning that fillies and mares won 26.1% of the 230 races for the month (remembering that 50% of the foals born are fillies). There were three races in December restricted to 3yo fillies, with the remaining 22 being open to Fillies and Mares.
This is the highest number of fillies/mares races since June 2014 (27), and is 3 more than December 2013. Owners of racing fillies and mares need these opportunities to ensure they can sustain a worthwhile racing career, so we will continue to endeavor and work with RWWA's Handicapper Warren Wishart to have these opportunities for the girls.
The Westbred fillies and mares won 34 (16 F/M races and 18 open) races, compared to 29 in the previous month and 32 in December 2013. During the month, 4 of the fillies/mares races were restricted to Westbreds.
At Gloucester Park Friday night meetings 7 Mares won 8 metro stakes races, including the super record setting NZ filly Libertybelle Midfrew who won the $175,000 Golden Nugget Championship, NZ mare Bettor Dreams won the $25,000 The Coulson Final, and NZ mare Bettor Pack A Pistol won a qualifying Heat of The Coulson and a $17,500 M0-M1 race.
Two of the Friday night winners were Westbred. Congratulations to the connections of all the mares who won at Gloucester Park during December 2014. The Westbred winners at Gloucester Park metro meetings in December were:
Kiralin (Elsu), owner/ breeders Willy Dagostino, Ken Bevan and Bruce Jones, a great win in the $14,999 Bob Humphries Memorial Westbred Mares race at Bunbury, followed by an easy win at GP;
Harriet Elizabeth (Modern Art), breeder Steve Johnson, a good win in Heat 3 of The Coulson.
THE WOW FACTOR IN THE REVAMPED WESTBRED BONUS SCHEME
The only race run at Gloucester Park on 4 February (due to storms and lightning causing the remaining races to be abandoned) was won by Western Australian bred 2yo colt Rich Yankee (by WA based sire Yankee Sensation). It was Rich Yankee's first start and he delighted connections with his debut win.
In winning, his owner/breeder connections received a total of $14,287 in stakemoney and Westbred Bonus payments for winning a $7,000 2yo race.
The first place prizemoney of $4,550 was boosted by a double Westbred Bonus of $5,100, as Rich Yankee is a son of a WA Based stallion. An Owners 1st Win Bonus of $2,000, a Breeders 1st Win Bonus of $2,000 and the 12.5% Breeders Bonus of $637.50 were also paid.
The connections of Rich Yankee will continue to receive the Double Westbred Bonus for every win as a 2yo and a 3yo in races with a stake less than $20,000 - unlike some other harness breeding incentive schemes which reward only the first win. This is why racing a Westbred is particularly worthwhile.
Note: The 2015 Western Australian Yearling Sale has some 35 lots eligible for the Double Westbred Bonus with 127 of the 129 lots on offer being Westbred Bonus eligible.
If you have any questions about the Westbred Bonus Scheme, contact Alan Parker at RWWA on 9445 5207.
WASBA SPONSORS
Your sponsors help us to help you by providing valuable funds throughout the year for stakemoney and breeding bonuses. Contact them to discuss their services or ask your stockist to order their products. In addition to the valuable support provided by the Stud Farms Alabar Bloodstock, Allwood Stud Farm, Empire
Stallions, Hollywood Park, Pepper Tree Farm, Yirribee Pacing Stud and Woodlands Stud in the form of discounts and stallion services, our other sponsors are listed below. For website information and contact details, go to the Breeding News Page of the WASBA website www.wasba.com.au :
YOUR TAB – HAVE YOUR SAY
Not a surprise, but as quoted from page 3 of The West,
" The chairman of Victoria's peak thoroughbred racing body is the latest interstate industry figure to warn WA against privatising the TAB…Robert Roulston, chairman of Racing Victoria, said the code in that state wished it could buy back the wagering licence from corporate operator Tabcorp, the company created when Victorian Premier Jeff Kennett privatised the Victorian TAB in 1994….Mr Kennett had recently admitted he wished he had not sold the TAB…. The privatisation meant that profits leaked out of the racing industry and into the pockets of the shareholders…Those shareholders may have quite different <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.new.wasba.com.au/wp-content/uploads/Annual%20PDFs%20&%20Images/2015/Newsletter/Newsletter_2015_January.pdf\n</url>\n<text>\nWESTERN AUSTRALIAN STANDARDBRED BREEDERS ASSOCIATION Inc.\n\nP.O. Box 1270, Booragoon WA 6954\n\[email protected] www.wasba.com.au\n\nVol. – 200 January 2015\n\nWASBA 2015 AGM on 14 FEBRUARY\n\nThe 2015 Annual General Meeting will be held THIS COMING SATURDAY 14 FEBRUARY at Gloucester Park on Interdominion Heat Night, commencing at 4.30pm.\n\nLight refreshments will be provided from 4pm, prior to the meeting, so come along to the AGM and stay for an exciting night of racing which will include the WA Heat of the Interdominion.\n\nIf you are yet to pay your membership, you can do so at the AGM.\n\nGLOUCESTER STANDARDBREDS YEARLING SALE -22 February 2015\n\nThe 2015 Gloucester Standardbreds Western Australian Yearling Sale catalogue is available online at www.gloucesterstandardbreds.com.au . The Sale, on Sunday 22rd February 2014, is less than a fortnight away.! It will be held at the usual venue, the Belmont Park Sales Complex, so make sure you get there.\n\nThere are 129 quality lots. If you want a catalogue but don't have one, contact Gloucester Standardbreds Manager Dot Parker on 0416 280 392 or email [email protected] .\n\nThere are heaps of quality sires, and some of the lots are full and half brothers and sisters to Group winners and $100,000 plus earners. The new Double Westbred Bonus payable for progeny of WA based stallions winning 2yo and 3yo races makes the progeny of locally-based sires like Allamerican Ingot, Cams Fool and Rich And Spoilt well worth looking at. See the later article on Rich Yankee to see what a good deal this is!.\n\nYou can buy a yearling and take advantage of the recent changes to the Westbred Bonus conditions, which include improved first win bonuses as well as full Westbred Bonus payments on Westbred 2 and 3yo, and R class 2 and 3yo races.\n\nThere is a parade of Kody Charles' KTC Bloodstock Yearlings on WEDNESDAY 11 FEBRUARY commencing at 5PM at Kody's property, 324 River Road Serpentine. Your opportunity to get an early look at these yearlings. For more details contact Kody on 0413 669 474.\n\nAnd, don't miss the Parade of Yearlings at 10am on Sale Day, with the assistance of WASBA and the Standardbred Pleasure & Performance Horse Association of WA (SPPHAWA). This year there will be a $250 prize for the vendor of one colt and one filly, randomly drawn from the yearlings that participate in the Parade of Yearlings.\n\nWESTBRED, FILLIES AND MARES OPPORTUNITIES COMING UP\n\nIn February, the $50,000 Daintys Daughter Classic for 3yo fillies will be run this Friday 13 February, along with a Westbred Only Standing start race for M0 and better ! The $50,000 Empress Stakes is on 27 February 2015.\n\nThe separate $19,999 Western Crown Classics for 2yo colts and fillies will be run on 20 March.\n\nIn April, the $30,000 Golden Girls Mile will be run at Pinjarra on 6 April. The Johnson Heats for M2 mares will be run in April, with the $25,000 final on 24 April along with the $100,000 Sales Classics for 2yos. Also in April, the $19,999 Country Oaks, restricted to Westbred 3yo fillies, is scheduled for Bunbury on Anzac Day 25 April, 2 weeks before the WA Oaks. The Westbred Bonus will be paid to fillies placed 1 st to 4 th . And thanks to Pinjarra the $14,999 WASBA King-Lethbridge Memorial Westbred Mares Pace will be run at Pinjarra on 20 April.\n\nMEMORABLE MOMENTS IN JANUARY\n\n[x] An exciting finish to the Busselton Sweetheart Series, with 6yo Righteous Hanover mare Love Of The Chase going into the final race in equal third position but taking the series with a win in the final Heat. Congratulations to breeder-owner Karen Young who received $500 from WASBA for being the breeder of Love Of The Chase, who also gets 500 Epona credits held in trust by WASBA. Congratulations also to the Busselton Club for running this great series.\n[x] David Hercules (by Artesian) exceptional in winning the $249,000 2015 Perth Interdominion Fremantle Cup and taking his stake earnings past the $1,000,000 mark;\n[x] Good wins by the exciting Heez On Fire (Courage Under Fire) and currently our best mare Sensational Gabby (local sire Yankee Sensation);\n\nBREEDER OF THE MONTH – December\n\nCongratulations to our Breeder of the Month, Harry Capararo who bred 3yo gelding Affluent Bell (Rich And Spoilt out of Shoneer Lobell by Jeremy Lobell). Affluent Bell just missed an earlier award after winning 4 consecutive races including an open race two weeks into his 3yo season. Affluent Bell has finished no further back than 4 th in his last 12 runs - a great effort from this 3yo. He is also picking up double Westbred Bonus money for his wins, something his connections must be very happy about.\n\nShoneer Lobell, the dam of Affluent Bell, has produced 5 winners from her first five foals including full siblings to Affluent Bell in Sheer Dreams 1:58.6, 19 wins and $153,994, Wilkins Lucinda 1:54.8, 8 wins and $89,554 and Sweet Charlee 1:58.6, 11 wins and $85,676.\n\nCongratulations to Harry and Affluent Bell.\n\nWA BASED SIRES – December\n\nIn December the progeny of 11 WA based sires produced 29 individual winners of 34 races. Northern Luck produced 9 winners of 11 races, Allamerican Ingot produced 7 winners of 7 races, and Rich And Spoilt and Parsons Den each producing 3 winners of 3 races.\n\nCongratulations to the breeders and connections of the 3 WA sired pacers that won 3 races at GP Metro Stakes meetings. The three winners, all on 19 December, were:-\n\n Tuxedo Tour (Northern Luck) breeder Ross Torre's Royalstar Pty Ltd, ran last quarters of 27.8 and 27.3 to win the $35,000 Christmas Gift Final. Great run;\n Batavia Jack (Righteous Hanover) breeder Ted O'Connor, with a clever drive won a Westbred Pathway after flying over the last half in 27.9 and 27.7; and\n Menalaus of Sparta (Northern Luck) breeder Michael Cunnold, won at Narrogin, then started at 50/1 in the $19,000 M1-M3 Pace over 2130m and duly won in 1:57.7.\n\nWESTBRED WINNERS – December\n\nWestbreds won 111 (48.3%) of the 230 races run in the month of December (including 1 deadheat), much better than the previous months and the same period last year, and closer to our target of 50% of races. We are continuing to work together with Handicapper Warren Wishart to achieve the best result for our local industry. You can also assist by asking your local club to run more Westbred races. There were 18 Westbred races run in December.\n\nThe sires (of Westbreds) that did best of the sires based outside of WA were Village Jasper (7 winners of 7 races), Bettors Delight (6 winners of 6 races), Elsu (5 winners of 7 races including Bob Humphries Memorial Winner Kiralin), and Blissfull Hall (4 winners of 6 races).\n\nAt Gloucester Park Metro stakes meetings 7 individual Westbreds won 8 (20%) of the races, a drop from October (34%) and November 2014 (25%) and December 2013 (25%). However, the races won were significant races, and definitely a big plus for Westbreds. Congratulations to the breeders and connections of the 7 Westbreds that won races at the Gloucester Park Metro Stakes meetings. Three of the winners are mentioned in the WA bases Sires section and two in the Fillies and Mares section. The other two Westbred winners were:\n\nHeez On Fire (Courage Under Fire) breeder Total Strategy Pty Ltd, after winning the $25,000 The Kersely Final in November, won Heat 1 of the Christmas Gift in 1:56.7, last quarter 27.6;\n David Hercules (Artesian) breeder Steve Johnson, won the $23,000 Fred Doy Memorial FFA in 1:54.8 before getting his just rewards with a dominant win in the $60,000 Village Kid Sprint by over 10m.\n\nHOW DID THE FILLIES AND MARES GO (December)\n\nThere were 25 fillies/mares races in December 2014, which is equivalent to 10.9% of the total races for the month. Fillies and mares won an additional 35 open races (15.2%), meaning that fillies and mares won 26.1% of the 230 races for the month (remembering that 50% of the foals born are fillies). There were three races in December restricted to 3yo fillies, with the remaining 22 being open to Fillies and Mares.\n\nThis is the highest number of fillies/mares races since June 2014 (27), and is 3 more than December 2013. Owners of racing fillies and mares need these opportunities to ensure they can sustain a worthwhile racing career, so we will continue to endeavor and work with RWWA's Handicapper Warren Wishart to have these opportunities for the girls.\n\nThe Westbred fillies and mares won 34 (16 F/M races and 18 open) races, compared to 29 in the previous month and 32 in December 2013. During the month, 4 of the fillies/mares races were restricted to Westbreds.\n\nAt Gloucester Park Friday night meetings 7 Mares won 8 metro stakes races, including the super record setting NZ filly Libertybelle Midfrew who won the $175,000 Golden Nugget Championship, NZ mare Bettor Dreams won the $25,000 The Coulson Final, and NZ mare Bettor Pack A Pistol won a qualifying Heat of The Coulson and a $17,500 M0-M1 race.\n\nTwo of the Friday night winners were Westbred. Congratulations to the connections of all the mares who won at Gloucester Park during December 2014. The Westbred winners at Gloucester Park metro meetings in December were:\n\nKiralin (Elsu), owner/ breeders Willy Dagostino, Ken Bevan and Bruce Jones, a great win in the $14,999 Bob Humphries Memorial Westbred Mares race at Bunbury, followed by an easy win at GP;\nHarriet Elizabeth (Modern Art), breeder Steve Johnson, a good win in Heat 3 of The Coulson.\n\nTHE WOW FACTOR IN THE REVAMPED WESTBRED BONUS SCHEME\n\nThe only race run at Gloucester Park on 4 February (due to storms and lightning causing the remaining races to be abandoned) was won by Western Australian bred 2yo colt Rich Yankee (by WA based sire Yankee Sensation). It was Rich Yankee's first start and he delighted connections with his debut win.\n\nIn winning, his owner/breeder connections received a total of $14,287 in stakemoney and Westbred Bonus payments for winning a $7,000 2yo race.\n\nThe first place prizemoney of $4,550 was boosted by a double Westbred Bonus of $5,100, as Rich Yankee is a son of a WA Based stallion. An Owners 1st Win Bonus of $2,000, a Breeders 1st Win Bonus of $2,000 and the 12.5% Breeders Bonus of $637.50 were also paid.\n\nThe connections of Rich Yankee will continue to receive the Double Westbred Bonus for every win as a 2yo and a 3yo in races with a stake less than $20,000 - unlike some other harness breeding incentive schemes which reward only the first win. This is why racing a Westbred is particularly worthwhile.\n\nNote: The 2015 Western Australian Yearling Sale has some 35 lots eligible for the Double Westbred Bonus with 127 of the 129 lots on offer being Westbred Bonus eligible.\n\nIf you have any questions about the Westbred Bonus Scheme, contact Alan Parker at RWWA on 9445 5207.\n\nWASBA SPONSORS\n\nYour sponsors help us to help you by providing valuable funds throughout the year for stakemoney and breeding bonuses. Contact them to discuss their services or ask your stockist to order their products. In addition to the valuable support provided by the Stud Farms Alabar Bloodstock, Allwood Stud Farm, Empire\n\nStallions, Hollywood Park, Pepper Tree Farm, Yirribee Pacing Stud and Woodlands Stud in the form of discounts and stallion services, our other sponsors are listed below. For website information and contact details, go to the Breeding News Page of the WASBA website www.wasba.com.au :\n\nYOUR TAB – HAVE YOUR SAY\n\nNot a surprise, but as quoted from page 3 of The West,\n\n\" The chairman of Victoria's peak thoroughbred racing body is the latest interstate industry figure to warn WA against privatising the TAB…Robert Roulston, chairman of Racing Victoria, said the code in that state wished it could buy back the wagering licence from corporate operator Tabcorp, the company created when Victorian Premier Jeff Kennett privatised the Victorian TAB in 1994….Mr Kennett had recently admitted he wished he had not sold the TAB…. The privatisation meant that profits leaked out of the racing industry and into the pockets of the shareholders…Those shareholders may have quite different <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "objectives to those of the industry and its needs..",
"role": "assistant"
}
] |
|
ORDER RELATING TO KHALID MAHMOOD
The Bureau of Industry and Security, U.S. Department of Commerce ("BIS") has notified Khalid Mahmood (hereinafter referred to as "Mahmood") of its intention to initiate an administrative proceeding against Mahmood pursuant to Section 766.3 of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2006)) ("Regulations")\(^1\) and Section 13(c) of the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) ("Act"),\(^2\) by issuing a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations. Specifically, the charges are:
---
\(^1\) The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.
\(^2\) Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) ("IEEPA").
Charge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates ("UAE") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
Charges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
On five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
WHEREAS, BIS and Mahmood have entered into a Settlement Agreement pursuant to Section 766.18(a) of the Regulations whereby they agreed to settle this matter in accordance with the terms and conditions set forth therein, and
WHEREAS, I have approved the terms of such Settlement Agreement;
---
3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
IT IS THEREFORE ORDERED:
FIRST, that for a period of ten years from the date of entry of this Order, Khalid Mahmood, 11505 Blue Ridge Drive, Beltsville, MD 20750, and when acting for or on behalf of Mahmood, his representatives or agents ("Denied Person") may not, directly or indirectly, participate in any way in any transaction involving any commodity, software, or technology (hereinafter collectively referred to as "item") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:
A. Applying for, obtaining, or using any license, License Exception, or export control document;
B. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or
C. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.
SECOND, that no person may, directly or indirectly, do any of the following:
A. Export or reexport to or on behalf of the Denied Person any item subject to the Regulations;
B. Take any action that facilitates the acquisition or attempted acquisition by the Denied Person of the ownership, possession, or control of any item subject to the
Regulations that has been or will be exported from the United States, including financing or other support activities related to a transaction whereby the Denied Person acquires or attempts to acquire such ownership, possession or control;
C. Take any action to acquire from or to facilitate the acquisition or attempted acquisition from the Denied Person of any item subject to the Regulations that has been exported from the United States;
D. Obtain from the Denied Person in the United States any item subject to the Regulations with knowledge or reason to know that the item will be, or is intended to be, exported from the United States; or
E. Engage in any transaction to service any item subject to the Regulations that has been or will be exported from the United States and which is owned, possessed or controlled by the Denied Person, or service any item, of whatever origin, that is owned, possessed or controlled by the Denied Person if such service involves the use of any item subject to the Regulations that has been or will be exported from the United States. For purposes of this paragraph, servicing means installation, maintenance, repair, modification or testing.
THIRD, that, after notice and opportunity for comment as provided in Section 766.23 of the Regulations, any person, firm, corporation, or business organization related to Mahmood by affiliation, ownership, control, or position of responsibility in the conduct of trade or related services may also be made subject to the provisions of the Order.
FOURTH, that this Order does not prohibit any export, reexport, or other transaction subject to the Regulations where the only items involved that are subject to the Regulations are the foreign-produced direct product of U.S.-origin technology.
FIFTH, that the proposed charging letter, the Settlement Agreement, and this Order shall be made available to the public.
SIXTH, that this Order shall be served on the Denied Person and on BIS, and shall be published in the Federal Register.
This Order, which constitutes the final agency action in this matter, is effective immediately.
Darryl W. Jackson
Assistant Secretary of Commerce for Export Enforcement
Entered this 2nd day of May 2007.
SETTLEMENT AGREEMENT
This Settlement Agreement ("Agreement") is made by and between Respondent, Khalid Mahmood ("Mahmood"), and the Bureau of Industry and Security, U.S. Department of Commerce ("BIS") (collectively referred to as "Parties"), pursuant to Section 766.18(a) of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2007)) ("Regulations"),¹ issued pursuant to the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) ("Act").²
WHEREAS, BIS has notified Mahmood of its intention to initiate an administrative proceeding against Mahmood, pursuant to the Act and the Regulations;
---
¹ The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2007 Regulations govern the procedural aspects of the case.
² Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) ("IEEPA").
WHEREAS, BIS has issued a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations, specifically:
Charge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99"\(^3\)) and the Iranian Transactions Regulations\(^4\), from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates ("UAE") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
Charges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
On five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations (EAR 99) and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian
---
\(^3\)EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
\(^4\)The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
WHEREAS, Mahmood has reviewed the proposed charging letter and is aware of the allegations made against him and the administrative sanctions which could be imposed against him if the allegations are found to be true;
WHEREAS, Mahmood fully understands the terms of this Agreement and the Order ("Order") that the Assistant Secretary of Commerce for Export Enforcement will issue if he approves this Agreement as the final resolution of this matter;
WHEREAS, Mahmood enters into this Agreement voluntarily and with full knowledge of his rights;
WHEREAS, Mahmood states that no promises or representations have been made to him other than the agreements and considerations herein expressed;
WHEREAS, Mahmood neither admits nor denies the allegations contained in the proposed charging letter;
WHEREAS, Mahmood wishes to settle and dispose of all matters alleged in the proposed charging letter by entering into this Agreement; and
WHEREAS, Mahmood agrees to be bound by the Order, if entered;
NOW THEREFORE, the Parties hereby agree as follows:
1. BIS has jurisdiction over Mahmood, under the Regulations, in connection with the matters alleged in the proposed charging letter.
2. The following sanction shall be imposed against Mahmood in complete settlement of the alleged violations of the Regulations relating to the transactions detailed in the proposed charging letter:
a. For a period of ten years from the date of entry of the Order, Mahmood, and, when acting for or on behalf of Mahmood, his representatives or agents ("Denied Person") may not participate, directly or indirectly, in any way in any transaction involving any commodity, software or technology (hereinafter collectively referred to as "item") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:
i. Applying for, obtaining, or using any license, License Exception, or export control document;
ii. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or
iii. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.
3. Subject to the approval of this Agreement pursuant to paragraph 8 hereof, Mahmood hereby waives all rights to further procedural steps in this matter (except with respect to any alleged violations of this Agreement or the Order, if entered), including, without limitation, any right to: (a) an administrative hearing regarding the allegations in any charging letter; (b) request a refund of any civil penalty paid pursuant to this Agreement and the Order, if entered; and (c) seek judicial review or otherwise contest the validity of this Agreement or the Order, if entered.
4. Upon entry of the Order, BIS will not initiate any further administrative proceeding against Mahmood in connection with any violation of the Act or the Regulations arising out of the transactions identified in the proposed charging letter.
5. BIS will make the proposed charging letter, this Agreement, and the Order, if entered, available to the public.
6. This Agreement is for settlement purposes only. Therefore, if this Agreement is not accepted and the Order is not issued by the Assistant Secretary of Commerce for Export Enforcement pursuant to Section 766.18(a) of the Regulations, no Party may use this Agreement in any administrative or judicial proceeding and the Parties shall not be bound by the terms contained in this Agreement in any subsequent administrative or judicial proceeding.
7. No agreement, understanding, representation or interpretation not contained in this Agreement may be used to vary or otherwise affect the terms of this Agreement or the Order, if entered, nor shall this Agreement serve to bind, constrain, or otherwise limit any action by any other agency or department of the United States Government with respect to the facts and circumstances addressed herein.
8. This Agreement shall become binding on the Parties only if the Assistant Secretary of Commerce for Export Enforcement approves it by entering the Order, which will have the same force and effect as a decision and order issued after a full administrative hearing on the record.
9. Each signatory affirms that he has authority to enter into this Settlement Agreement and to bind his respective party to the terms and conditions set forth herein.
BUREAU OF INDUSTRY AND SECURITY,
U.S. DEPARTMENT OF COMMERCE
Michael D. Turner
Director
Office of Export Enforcement
Date: 4/13/07
KHALID MAHMOOD
Khalid Mahmood
Date: 03/24/07
The Bureau of Industry and Security, U.S. Department of Commerce ("BIS"), has reason to believe that you, Khalid Mahmood, of Sharp Line Trading in Dubai, United Arab Emirates ("UAE"), in your individual capacity ("Mahmood"), have committed six violations of the Export Administration Regulations (the "Regulations"), which are issued under the authority of the Export Administration Act of 1979, as amended (the "Act"). Specifically, BIS charges that Mahmood committed the following violations:
**Charge 1**
**15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations**
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization.
---
1 The Regulations are currently codified in the Code of Federal Regulations at 15 C.F.R. Parts 730-774 (2006). The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.
2 50 U.S.C. app. §§ 2401-2420 (2000). Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), as extended by the Notice of August 2, 2005, (70 Fed. Reg. 45273 (August 5, 2005)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701 - 1706 (2000)).
3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
conspiracy, Mahmood facilitated the export of parts from the United States through the UAE to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
**Charges 2-6**
15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
As set forth in Schedule A, which is enclosed herewith and incorporated herein by reference, on five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
***************
Accordingly, Mahmood is hereby notified that an administrative proceeding is instituted against him pursuant to Section 13(c) of the Act and Part 766 of the Regulations for the purpose of obtaining an order imposing administrative sanctions, including any or all of the following:
The maximum civil penalty allowed by law of up to $11,000 per violation;⁵
Denial of export privileges; and/or
Exclusion from practice before BIS.
If Mahmood fails to answer the charges contained in this letter within 30 days after being served with notice of issuance of this letter, that failure will be treated as a default. (Regulations, Sections 766.6 and 766.7). If Mahmood defaults, the Administrative Law Judge may find the charges alleged in this letter are true without hearing or further notice to Mahmood. The Under Secretary of Commerce for Industry and Security may then impose up to the maximum penalty
---
⁵See 15 C.F.R. §6.4(a)(4) (2006).
on each of the charges in this letter.
Mahmood is further notified that he is entitled to an agency hearing on the record if Mahmood files a written demand for one with his answer. (Regulations, Section 766.6). Mahmood is also entitled to be represented by counsel or other authorized representative who has power of attorney to represent him. (Regulations, Sections 766.3(a) and 766.4).
The Regulations provide for settlement without a hearing. (Regulations, Section 766.18). Should Mahmood have a proposal to settle this case, Mahmood or his representative should transmit it to the attorney representing BIS named below.
The U.S. Coast Guard is providing administrative law judge services in connection with the matters set forth in this letter. Accordingly, Mahmood’s answer must be filed in accordance with the instructions in Section 766.5(a) of the Regulations with:
U.S. Coast Guard ALJ Docketing Center
40 S. Gay Street
Baltimore, Maryland 21202-4022
In addition, a copy of Mahmood’s answer must be served on BIS at the following address:
Chief Counsel for Industry and Security
Attention: Parvin R. Huda, Esq.
Room H-3839
United States Department of Commerce
14th Street and Constitution Avenue, N.W.
Washington, D.C. 20230
Parvin R. Huda is the attorney representing BIS in this case; any communications that Mahmood may wish to have concerning this matter should occur through her. Ms. Huda may be contacted by telephone at (202) 482-5301.
Sincerely,
Michael D. Turner
Director
Khalid Mahmood
Proposed Charging Letter
Page 4 of 4
Office of Export Enforcement
Enclosure
|
<urn:uuid:cce90d27-9dca-4eb8-addb-77d22d754be5>
|
CC-MAIN-2019-35
|
https://efoia.bis.doc.gov/index.php/documents/export-violations/357-e1065/file
|
2019-08-23T07:32:11Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318011.89/warc/CC-MAIN-20190823062005-20190823084005-00003.warc.gz
| 438,974,657
| 5,019
|
eng_Latn
|
eng_Latn
| 0.877301
|
eng_Latn
| 0.955618
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
1397,
4010,
5630,
7165,
7861,
9238,
11234,
12778,
14110,
15704,
16736,
18798,
21438,
22938,
23032
] |
ORDER RELATING TO KHALID MAHMOOD
The Bureau of Industry and Security, U.S. Department of Commerce ("BIS") has notified Khalid Mahmood (hereinafter referred to as "Mahmood") of its intention to initiate an administrative proceeding against Mahmood pursuant to Section 766.3 of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2006)) ("Regulations")\(^1\) and Section 13(c) of the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) ("Act"),\(^2\) by issuing a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations. Specifically, the charges are:
---
\(^1\) The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.
\(^2\) Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) ("IEEPA").
Charge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates ("UAE") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
Charges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
On five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
WHEREAS, BIS and Mahmood have entered into a Settlement Agreement pursuant to Section 766.18(a) of the Regulations whereby they agreed to settle this matter in accordance with the terms and conditions set forth therein, and
WHEREAS, I have approved the terms of such Settlement Agreement;
---
3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
IT IS THEREFORE ORDERED:
FIRST, that for a period of ten years from the date of entry of this Order, Khalid Mahmood, 11505 Blue Ridge Drive, Beltsville, MD 20750, and when acting for or on behalf of Mahmood, his representatives or agents ("Denied Person") may not, directly or indirectly, participate in any way in any transaction involving any commodity, software, or technology (hereinafter collectively referred to as "item") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:
A. Applying for, obtaining, or using any license, License Exception, or export control document;
B. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or
C. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.
SECOND, that no person may, directly or indirectly, do any of the following:
A. Export or reexport to or on behalf of the Denied Person any item subject to the Regulations;
B. Take any action that facilitates the acquisition or attempted acquisition by the Denied Person of the ownership, possession, or control of any item subject to the
Regulations that has been or will be exported from the United States, including financing or other support activities related to a transaction whereby the Denied Person acquires or attempts to acquire such ownership, possession or control;
C. Take any action to acquire from or to facilitate the acquisition or attempted acquisition from the Denied Person of any item subject to the Regulations that has been exported from the United States;
D. Obtain from the Denied Person in the United States any item subject to the Regulations with knowledge or reason to know that the item will be, or is intended to be, exported from the United States; or
E. Engage in any transaction to service any item subject to the Regulations that has been or will be exported from the United States and which is owned, possessed or controlled by the Denied Person, or service any item, of whatever origin, that is owned, possessed or controlled by the Denied Person if such service involves the use of any item subject to the Regulations that has been or will be exported from the United States. For purposes of this paragraph, servicing means installation, maintenance, repair, modification or testing.
THIRD, that, after notice and opportunity for comment as provided in Section 766.23 of the Regulations, any person, firm, corporation, or business organization related to Mahmood by affiliation, ownership, control, or position of responsibility in the conduct of trade or related services may also be made subject to the provisions of the Order.
FOURTH, that this Order does not prohibit any export, reexport, or other transaction subject to the Regulations where the only items involved that are subject to the Regulations are the foreign-produced direct product of U.S.-origin technology.
FIFTH, that the proposed charging letter, the Settlement Agreement, and this Order shall be made available to the public.
SIXTH, that this Order shall be served on the Denied Person and on BIS, and shall be published in the Federal Register.
This Order, which constitutes the final agency action in this matter, is effective immediately.
Darryl W. Jackson
Assistant Secretary of Commerce for Export Enforcement
Entered this 2nd day of May 2007.
SETTLEMENT AGREEMENT
This Settlement Agreement ("Agreement") is made by and between Respondent, Khalid Mahmood ("Mahmood"), and the Bureau of Industry and Security, U.S. Department of Commerce ("BIS") (collectively referred to as "Parties"), pursuant to Section 766.18(a) of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2007)) ("Regulations"),¹ issued pursuant to the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) ("Act").²
WHEREAS, BIS has notified Mahmood of its intention to initiate an administrative proceeding against Mahmood, pursuant to the Act and the Regulations;
---
¹ The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2007 Regulations govern the procedural aspects of the case.
² Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) ("IEEPA").
WHEREAS, BIS has issued a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations, specifically:
Charge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99"\(^3\)) and the Iranian Transactions Regulations\(^4\), from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates ("UAE") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
Charges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
On five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations (EAR 99) and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian
---
\(^3\)EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
\(^4\)The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
WHEREAS, Mahmood has reviewed the proposed charging letter and is aware of the allegations made against him and the administrative sanctions which could be imposed against him if the allegations are found to be true;
WHEREAS, Mahmood fully understands the terms of this Agreement and the Order ("Order") that the Assistant Secretary of Commerce for Export Enforcement will issue if he approves this Agreement as the final resolution of this matter;
WHEREAS, Mahmood enters into this Agreement voluntarily and with full knowledge of his rights;
WHEREAS, Mahmood states that no promises or representations have been made to him other than the agreements and considerations herein expressed;
WHEREAS, Mahmood neither admits nor denies the allegations contained in the proposed charging letter;
WHEREAS, Mahmood wishes to settle and dispose of all matters alleged in the proposed charging letter by entering into this Agreement; and
WHEREAS, Mahmood agrees to be bound by the Order, if entered;
NOW THEREFORE, the Parties hereby agree as follows:
1. BIS has jurisdiction over Mahmood, under the Regulations, in connection with the matters alleged in the proposed charging letter.
2. The following sanction shall be imposed against Mahmood in complete settlement of the alleged violations of the Regulations relating to the transactions detailed in the proposed charging letter:
a. For a period of ten years f
|
rom the date of entry of the Order, Mahmood, and, when acting for or on behalf of Mahmood, his representatives or agents ("Denied Person") may not participate, directly or indirectly, in any way in any transaction involving any commodity, software or technology (hereinafter collectively referred to as "item") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:
i.
|
Applying for, obtaining, or using any license, License Exception, or export control document;
ii. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or
iii. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.
3. Subject to the approval of this Agreement pursuant to paragraph 8 hereof, Mahmood hereby waives all rights to further procedural steps in this matter (except with respect to any alleged violations of this Agreement or the Order, if entered), including, without limitation, any right to: (a) an administrative hearing regarding the allegations in any charging letter; (b) request a refund of any civil penalty paid pursuant to this Agreement and the Order, if entered; and (c) seek judicial review or otherwise contest the validity of this Agreement or the Order, if entered.
4. Upon entry of the Order, BIS will not initiate any further administrative proceeding against Mahmood in connection with any violation of the Act or the Regulations arising out of the transactions identified in the proposed charging letter.
5. BIS will make the proposed charging letter, this Agreement, and the Order, if entered, available to the public.
6. This Agreement is for settlement purposes only. Therefore, if this Agreement is not accepted and the Order is not issued by the Assistant Secretary of Commerce for Export Enforcement pursuant to Section 766.18(a) of the Regulations, no Party may use this Agreement in any administrative or judicial proceeding and the Parties shall not be bound by the terms contained in this Agreement in any subsequent administrative or judicial proceeding.
7. No agreement, understanding, representation or interpretation not contained in this Agreement may be used to vary or otherwise affect the terms of this Agreement or the Order, if entered, nor shall this Agreement serve to bind, constrain, or otherwise limit any action by any other agency or department of the United States Government with respect to the facts and circumstances addressed herein.
8. This Agreement shall become binding on the Parties only if the Assistant Secretary of Commerce for Export Enforcement approves it by entering the Order, which will have the same force and effect as a decision and order issued after a full administrative hearing on the record.
9. Each signatory affirms that he has authority to enter into this Settlement Agreement and to bind his respective party to the terms and conditions set forth herein.
BUREAU OF INDUSTRY AND SECURITY,
U.S. DEPARTMENT OF COMMERCE
Michael D. Turner
Director
Office of Export Enforcement
Date: 4/13/07
KHALID MAHMOOD
Khalid Mahmood
Date: 03/24/07
The Bureau of Industry and Security, U.S. Department of Commerce ("BIS"), has reason to believe that you, Khalid Mahmood, of Sharp Line Trading in Dubai, United Arab Emirates ("UAE"), in your individual capacity ("Mahmood"), have committed six violations of the Export Administration Regulations (the "Regulations"), which are issued under the authority of the Export Administration Act of 1979, as amended (the "Act"). Specifically, BIS charges that Mahmood committed the following violations:
**Charge 1**
**15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations**
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization.
---
1 The Regulations are currently codified in the Code of Federal Regulations at 15 C.F.R. Parts 730-774 (2006). The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.
2 50 U.S.C. app. §§ 2401-2420 (2000). Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), as extended by the Notice of August 2, 2005, (70 Fed. Reg. 45273 (August 5, 2005)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701 - 1706 (2000)).
3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
conspiracy, Mahmood facilitated the export of parts from the United States through the UAE to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
**Charges 2-6**
15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
As set forth in Schedule A, which is enclosed herewith and incorporated herein by reference, on five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
***************
Accordingly, Mahmood is hereby notified that an administrative proceeding is instituted against him pursuant to Section 13(c) of the Act and Part 766 of the Regulations for the purpose of obtaining an order imposing administrative sanctions, including any or all of the following:
The maximum civil penalty allowed by law of up to $11,000 per violation;⁵
Denial of export privileges; and/or
Exclusion from practice before BIS.
If Mahmood fails to answer the charges contained in this letter within 30 days after being served with notice of issuance of this letter, that failure will be treated as a default. (Regulations, Sections 766.6 and 766.7). If Mahmood defaults, the Administrative Law Judge may find the charges alleged in this letter are true without hearing or further notice to Mahmood. The Under Secretary of Commerce for Industry and Security may then impose up to the maximum penalty
---
⁵See 15 C.F.R. §6.4(a)(4) (2006).
on each of the charges in this letter.
Mahmood is further notified that he is entitled to an agency hearing on the record if Mahmood files a written demand for one with his answer. (Regulations, Section 766.6). Mahmood is also entitled to be represented by counsel or other authorized representative who has power of attorney to represent him. (Regulations, Sections 766.3(a) and 766.4).
The Regulations provide for settlement without a hearing. (Regulations, Section 766.18). Should Mahmood have a proposal to settle this case, Mahmood or his representative should transmit it to the attorney representing BIS named below.
The U.S. Coast Guard is providing administrative law judge services in connection with the matters set forth in this letter. Accordingly, Mahmood’s answer must be filed in accordance with the instructions in Section 766.5(a) of the Regulations with:
U.S. Coast Guard ALJ Docketing Center
40 S. Gay Street
Baltimore, Maryland 21202-4022
In addition, a copy of Mahmood’s answer must be served on BIS at the following address:
Chief Counsel for Industry and Security
Attention: Parvin R. Huda, Esq.
Room H-3839
United States Department of Commerce
14th Street and Constitution Avenue, N.W.
Washington, D.C. 20230
Parvin R. Huda is the attorney representing BIS in this case; any communications that Mahmood may wish to have concerning this matter should occur through her. Ms. Huda may be contacted by telephone at (202) 482-5301.
Sincerely,
Michael D. Turner
Director
Khalid Mahmood
Proposed Charging Letter
Page 4 of 4
Office of Export Enforcement
Enclosure
| 13,146
|
inside_word
|
from
|
remove_one_sentence
|
<url>
https://efoia.bis.doc.gov/index.php/documents/export-violations/357-e1065/file
</url>
<text>
ORDER RELATING TO KHALID MAHMOOD
The Bureau of Industry and Security, U.S. Department of Commerce ("BIS") has notified Khalid Mahmood (hereinafter referred to as "Mahmood") of its intention to initiate an administrative proceeding against Mahmood pursuant to Section 766.3 of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2006)) ("Regulations")\(^1\) and Section 13(c) of the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) ("Act"),\(^2\) by issuing a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations. Specifically, the charges are:
---
\(^1\) The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.
\(^2\) Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) ("IEEPA").
Charge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates ("UAE") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
Charges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
On five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
WHEREAS, BIS and Mahmood have entered into a Settlement Agreement pursuant to Section 766.18(a) of the Regulations whereby they agreed to settle this matter in accordance with the terms and conditions set forth therein, and
WHEREAS, I have approved the terms of such Settlement Agreement;
---
3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
IT IS THEREFORE ORDERED:
FIRST, that for a period of ten years from the date of entry of this Order, Khalid Mahmood, 11505 Blue Ridge Drive, Beltsville, MD 20750, and when acting for or on behalf of Mahmood, his representatives or agents ("Denied Person") may not, directly or indirectly, participate in any way in any transaction involving any commodity, software, or technology (hereinafter collectively referred to as "item") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:
A. Applying for, obtaining, or using any license, License Exception, or export control document;
B. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or
C. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.
SECOND, that no person may, directly or indirectly, do any of the following:
A. Export or reexport to or on behalf of the Denied Person any item subject to the Regulations;
B. Take any action that facilitates the acquisition or attempted acquisition by the Denied Person of the ownership, possession, or control of any item subject to the
Regulations that has been or will be exported from the United States, including financing or other support activities related to a transaction whereby the Denied Person acquires or attempts to acquire such ownership, possession or control;
C. Take any action to acquire from or to facilitate the acquisition or attempted acquisition from the Denied Person of any item subject to the Regulations that has been exported from the United States;
D. Obtain from the Denied Person in the United States any item subject to the Regulations with knowledge or reason to know that the item will be, or is intended to be, exported from the United States; or
E. Engage in any transaction to service any item subject to the Regulations that has been or will be exported from the United States and which is owned, possessed or controlled by the Denied Person, or service any item, of whatever origin, that is owned, possessed or controlled by the Denied Person if such service involves the use of any item subject to the Regulations that has been or will be exported from the United States. For purposes of this paragraph, servicing means installation, maintenance, repair, modification or testing.
THIRD, that, after notice and opportunity for comment as provided in Section 766.23 of the Regulations, any person, firm, corporation, or business organization related to Mahmood by affiliation, ownership, control, or position of responsibility in the conduct of trade or related services may also be made subject to the provisions of the Order.
FOURTH, that this Order does not prohibit any export, reexport, or other transaction subject to the Regulations where the only items involved that are subject to the Regulations are the foreign-produced direct product of U.S.-origin technology.
FIFTH, that the proposed charging letter, the Settlement Agreement, and this Order shall be made available to the public.
SIXTH, that this Order shall be served on the Denied Person and on BIS, and shall be published in the Federal Register.
This Order, which constitutes the final agency action in this matter, is effective immediately.
Darryl W. Jackson
Assistant Secretary of Commerce for Export Enforcement
Entered this 2nd day of May 2007.
SETTLEMENT AGREEMENT
This Settlement Agreement ("Agreement") is made by and between Respondent, Khalid Mahmood ("Mahmood"), and the Bureau of Industry and Security, U.S. Department of Commerce ("BIS") (collectively referred to as "Parties"), pursuant to Section 766.18(a) of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2007)) ("Regulations"),¹ issued pursuant to the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) ("Act").²
WHEREAS, BIS has notified Mahmood of its intention to initiate an administrative proceeding against Mahmood, pursuant to the Act and the Regulations;
---
¹ The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2007 Regulations govern the procedural aspects of the case.
² Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) ("IEEPA").
WHEREAS, BIS has issued a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations, specifically:
Charge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99"\(^3\)) and the Iranian Transactions Regulations\(^4\), from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates ("UAE") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
Charges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
On five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations (EAR 99) and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian
---
\(^3\)EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
\(^4\)The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
WHEREAS, Mahmood has reviewed the proposed charging letter and is aware of the allegations made against him and the administrative sanctions which could be imposed against him if the allegations are found to be true;
WHEREAS, Mahmood fully understands the terms of this Agreement and the Order ("Order") that the Assistant Secretary of Commerce for Export Enforcement will issue if he approves this Agreement as the final resolution of this matter;
WHEREAS, Mahmood enters into this Agreement voluntarily and with full knowledge of his rights;
WHEREAS, Mahmood states that no promises or representations have been made to him other than the agreements and considerations herein expressed;
WHEREAS, Mahmood neither admits nor denies the allegations contained in the proposed charging letter;
WHEREAS, Mahmood wishes to settle and dispose of all matters alleged in the proposed charging letter by entering into this Agreement; and
WHEREAS, Mahmood agrees to be bound by the Order, if entered;
NOW THEREFORE, the Parties hereby agree as follows:
1. BIS has jurisdiction over Mahmood, under the Regulations, in connection with the matters alleged in the proposed charging letter.
2. The following sanction shall be imposed against Mahmood in complete settlement of the alleged violations of the Regulations relating to the transactions detailed in the proposed charging letter:
a. For a period of ten years f<cursor_is_here> Applying for, obtaining, or using any license, License Exception, or export control document;
ii. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or
iii. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.
3. Subject to the approval of this Agreement pursuant to paragraph 8 hereof, Mahmood hereby waives all rights to further procedural steps in this matter (except with respect to any alleged violations of this Agreement or the Order, if entered), including, without limitation, any right to: (a) an administrative hearing regarding the allegations in any charging letter; (b) request a refund of any civil penalty paid pursuant to this Agreement and the Order, if entered; and (c) seek judicial review or otherwise contest the validity of this Agreement or the Order, if entered.
4. Upon entry of the Order, BIS will not initiate any further administrative proceeding against Mahmood in connection with any violation of the Act or the Regulations arising out of the transactions identified in the proposed charging letter.
5. BIS will make the proposed charging letter, this Agreement, and the Order, if entered, available to the public.
6. This Agreement is for settlement purposes only. Therefore, if this Agreement is not accepted and the Order is not issued by the Assistant Secretary of Commerce for Export Enforcement pursuant to Section 766.18(a) of the Regulations, no Party may use this Agreement in any administrative or judicial proceeding and the Parties shall not be bound by the terms contained in this Agreement in any subsequent administrative or judicial proceeding.
7. No agreement, understanding, representation or interpretation not contained in this Agreement may be used to vary or otherwise affect the terms of this Agreement or the Order, if entered, nor shall this Agreement serve to bind, constrain, or otherwise limit any action by any other agency or department of the United States Government with respect to the facts and circumstances addressed herein.
8. This Agreement shall become binding on the Parties only if the Assistant Secretary of Commerce for Export Enforcement approves it by entering the Order, which will have the same force and effect as a decision and order issued after a full administrative hearing on the record.
9. Each signatory affirms that he has authority to enter into this Settlement Agreement and to bind his respective party to the terms and conditions set forth herein.
BUREAU OF INDUSTRY AND SECURITY,
U.S. DEPARTMENT OF COMMERCE
Michael D. Turner
Director
Office of Export Enforcement
Date: 4/13/07
KHALID MAHMOOD
Khalid Mahmood
Date: 03/24/07
The Bureau of Industry and Security, U.S. Department of Commerce ("BIS"), has reason to believe that you, Khalid Mahmood, of Sharp Line Trading in Dubai, United Arab Emirates ("UAE"), in your individual capacity ("Mahmood"), have committed six violations of the Export Administration Regulations (the "Regulations"), which are issued under the authority of the Export Administration Act of 1979, as amended (the "Act"). Specifically, BIS charges that Mahmood committed the following violations:
**Charge 1**
**15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations**
Beginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts ("parts"), items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization.
---
1 The Regulations are currently codified in the Code of Federal Regulations at 15 C.F.R. Parts 730-774 (2006). The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.
2 50 U.S.C. app. §§ 2401-2420 (2000). Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), as extended by the Notice of August 2, 2005, (70 Fed. Reg. 45273 (August 5, 2005)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701 - 1706 (2000)).
3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.
4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).
conspiracy, Mahmood facilitated the export of parts from the United States through the UAE to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.
**Charges 2-6**
15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations
As set forth in Schedule A, which is enclosed herewith and incorporated herein by reference, on five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations ("EAR 99") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury ("OFAC") for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.
***************
Accordingly, Mahmood is hereby notified that an administrative proceeding is instituted against him pursuant to Section 13(c) of the Act and Part 766 of the Regulations for the purpose of obtaining an order imposing administrative sanctions, including any or all of the following:
The maximum civil penalty allowed by law of up to $11,000 per violation;⁵
Denial of export privileges; and/or
Exclusion from practice before BIS.
If Mahmood fails to answer the charges contained in this letter within 30 days after being served with notice of issuance of this letter, that failure will be treated as a default. (Regulations, Sections 766.6 and 766.7). If Mahmood defaults, the Administrative Law Judge may find the charges alleged in this letter are true without hearing or further notice to Mahmood. The Under Secretary of Commerce for Industry and Security may then impose up to the maximum penalty
---
⁵See 15 C.F.R. §6.4(a)(4) (2006).
on each of the charges in this letter.
Mahmood is further notified that he is entitled to an agency hearing on the record if Mahmood files a written demand for one with his answer. (Regulations, Section 766.6). Mahmood is also entitled to be represented by counsel or other authorized representative who has power of attorney to represent him. (Regulations, Sections 766.3(a) and 766.4).
The Regulations provide for settlement without a hearing. (Regulations, Section 766.18). Should Mahmood have a proposal to settle this case, Mahmood or his representative should transmit it to the attorney representing BIS named below.
The U.S. Coast Guard is providing administrative law judge services in connection with the matters set forth in this letter. Accordingly, Mahmood’s answer must be filed in accordance with the instructions in Section 766.5(a) of the Regulations with:
U.S. Coast Guard ALJ Docketing Center
40 S. Gay Street
Baltimore, Maryland 21202-4022
In addition, a copy of Mahmood’s answer must be served on BIS at the following address:
Chief Counsel for Industry and Security
Attention: Parvin R. Huda, Esq.
Room H-3839
United States Department of Commerce
14th Street and Constitution Avenue, N.W.
Washington, D.C. 20230
Parvin R. Huda is the attorney representing BIS in this case; any communications that Mahmood may wish to have concerning this matter should occur through her. Ms. Huda may be contacted by telephone at (202) 482-5301.
Sincerely,
Michael D. Turner
Director
Khalid Mahmood
Proposed Charging Letter
Page 4 of 4
Office of Export Enforcement
Enclosure
</text>
|
[
{
"content": "<url>\nhttps://efoia.bis.doc.gov/index.php/documents/export-violations/357-e1065/file\n</url>\n<text>\nORDER RELATING TO KHALID MAHMOOD\n\nThe Bureau of Industry and Security, U.S. Department of Commerce (\"BIS\") has notified Khalid Mahmood (hereinafter referred to as \"Mahmood\") of its intention to initiate an administrative proceeding against Mahmood pursuant to Section 766.3 of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2006)) (\"Regulations\")\\(^1\\) and Section 13(c) of the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) (\"Act\"),\\(^2\\) by issuing a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations. Specifically, the charges are:\n\n---\n\n\\(^1\\) The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.\n\n\\(^2\\) Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) (\"IEEPA\").\n\nCharge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations\n\nBeginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts (\"parts\"), items subject to the Regulations (\"EAR 99\") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates (\"UAE\") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury (\"OFAC\") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.\n\nCharges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations\n\nOn five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations (\"EAR 99\") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.\n\nWHEREAS, BIS and Mahmood have entered into a Settlement Agreement pursuant to Section 766.18(a) of the Regulations whereby they agreed to settle this matter in accordance with the terms and conditions set forth therein, and\n\nWHEREAS, I have approved the terms of such Settlement Agreement;\n\n---\n\n3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.\n\n4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).\n\nIT IS THEREFORE ORDERED:\n\nFIRST, that for a period of ten years from the date of entry of this Order, Khalid Mahmood, 11505 Blue Ridge Drive, Beltsville, MD 20750, and when acting for or on behalf of Mahmood, his representatives or agents (\"Denied Person\") may not, directly or indirectly, participate in any way in any transaction involving any commodity, software, or technology (hereinafter collectively referred to as \"item\") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:\n\nA. Applying for, obtaining, or using any license, License Exception, or export control document;\n\nB. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or\n\nC. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.\n\nSECOND, that no person may, directly or indirectly, do any of the following:\n\nA. Export or reexport to or on behalf of the Denied Person any item subject to the Regulations;\n\nB. Take any action that facilitates the acquisition or attempted acquisition by the Denied Person of the ownership, possession, or control of any item subject to the\n\nRegulations that has been or will be exported from the United States, including financing or other support activities related to a transaction whereby the Denied Person acquires or attempts to acquire such ownership, possession or control;\n\nC. Take any action to acquire from or to facilitate the acquisition or attempted acquisition from the Denied Person of any item subject to the Regulations that has been exported from the United States;\n\nD. Obtain from the Denied Person in the United States any item subject to the Regulations with knowledge or reason to know that the item will be, or is intended to be, exported from the United States; or\n\nE. Engage in any transaction to service any item subject to the Regulations that has been or will be exported from the United States and which is owned, possessed or controlled by the Denied Person, or service any item, of whatever origin, that is owned, possessed or controlled by the Denied Person if such service involves the use of any item subject to the Regulations that has been or will be exported from the United States. For purposes of this paragraph, servicing means installation, maintenance, repair, modification or testing.\n\nTHIRD, that, after notice and opportunity for comment as provided in Section 766.23 of the Regulations, any person, firm, corporation, or business organization related to Mahmood by affiliation, ownership, control, or position of responsibility in the conduct of trade or related services may also be made subject to the provisions of the Order.\n\nFOURTH, that this Order does not prohibit any export, reexport, or other transaction subject to the Regulations where the only items involved that are subject to the Regulations are the foreign-produced direct product of U.S.-origin technology.\n\nFIFTH, that the proposed charging letter, the Settlement Agreement, and this Order shall be made available to the public.\n\nSIXTH, that this Order shall be served on the Denied Person and on BIS, and shall be published in the Federal Register.\n\nThis Order, which constitutes the final agency action in this matter, is effective immediately.\n\nDarryl W. Jackson\nAssistant Secretary of Commerce for Export Enforcement\n\nEntered this 2nd day of May 2007.\n\nSETTLEMENT AGREEMENT\n\nThis Settlement Agreement (\"Agreement\") is made by and between Respondent, Khalid Mahmood (\"Mahmood\"), and the Bureau of Industry and Security, U.S. Department of Commerce (\"BIS\") (collectively referred to as \"Parties\"), pursuant to Section 766.18(a) of the Export Administration Regulations (currently codified at 15 C.F.R. Parts 730-774 (2007)) (\"Regulations\"),¹ issued pursuant to the Export Administration Act of 1979, as amended (50 U.S.C. app. §§ 2401-2420 (2000)) (\"Act\").²\n\nWHEREAS, BIS has notified Mahmood of its intention to initiate an administrative proceeding against Mahmood, pursuant to the Act and the Regulations;\n\n---\n\n¹ The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2007 Regulations govern the procedural aspects of the case.\n\n² Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), which has been extended by successive Presidential Notices, the most recent being that of August 2, 2006 (71 Fed. Reg. 44,551 (Aug. 7, 2006)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701-1706 (2000)) (\"IEEPA\").\n\nWHEREAS, BIS has issued a proposed charging letter to Mahmood that alleged that Mahmood committed six violations of the Regulations, specifically:\n\nCharge 1 15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations\n\nBeginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts (\"parts\"), items subject to the Regulations (\"EAR 99\"\\(^3\\)) and the Iranian Transactions Regulations\\(^4\\), from the United States to Iran without the required U.S. Government authorization. In furtherance of the conspiracy, Mahmood facilitated the export of parts from the United States through the United Arab Emirates (\"UAE\") to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury (\"OFAC\") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.\n\nCharges 2-6 15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations\n\nOn five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations (EAR 99) and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian\n\n---\n\n\\(^3\\)EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.\n\n\\(^4\\)The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).\n\nTransactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from OFAC for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.\n\nWHEREAS, Mahmood has reviewed the proposed charging letter and is aware of the allegations made against him and the administrative sanctions which could be imposed against him if the allegations are found to be true;\n\nWHEREAS, Mahmood fully understands the terms of this Agreement and the Order (\"Order\") that the Assistant Secretary of Commerce for Export Enforcement will issue if he approves this Agreement as the final resolution of this matter;\n\nWHEREAS, Mahmood enters into this Agreement voluntarily and with full knowledge of his rights;\n\nWHEREAS, Mahmood states that no promises or representations have been made to him other than the agreements and considerations herein expressed;\n\nWHEREAS, Mahmood neither admits nor denies the allegations contained in the proposed charging letter;\n\nWHEREAS, Mahmood wishes to settle and dispose of all matters alleged in the proposed charging letter by entering into this Agreement; and\n\nWHEREAS, Mahmood agrees to be bound by the Order, if entered;\n\nNOW THEREFORE, the Parties hereby agree as follows:\n\n1. BIS has jurisdiction over Mahmood, under the Regulations, in connection with the matters alleged in the proposed charging letter.\n\n2. The following sanction shall be imposed against Mahmood in complete settlement of the alleged violations of the Regulations relating to the transactions detailed in the proposed charging letter:\n\n a. For a period of ten years f<cursor_is_here> Applying for, obtaining, or using any license, License Exception, or export control document;\n\n ii. Carrying on negotiations concerning, or ordering, buying, receiving, using, selling, delivering, storing, disposing of, forwarding, transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations; or\n\niii. Benefitting in any way from any transaction involving any item exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations.\n\n3. Subject to the approval of this Agreement pursuant to paragraph 8 hereof, Mahmood hereby waives all rights to further procedural steps in this matter (except with respect to any alleged violations of this Agreement or the Order, if entered), including, without limitation, any right to: (a) an administrative hearing regarding the allegations in any charging letter; (b) request a refund of any civil penalty paid pursuant to this Agreement and the Order, if entered; and (c) seek judicial review or otherwise contest the validity of this Agreement or the Order, if entered.\n\n4. Upon entry of the Order, BIS will not initiate any further administrative proceeding against Mahmood in connection with any violation of the Act or the Regulations arising out of the transactions identified in the proposed charging letter.\n\n5. BIS will make the proposed charging letter, this Agreement, and the Order, if entered, available to the public.\n\n6. This Agreement is for settlement purposes only. Therefore, if this Agreement is not accepted and the Order is not issued by the Assistant Secretary of Commerce for Export Enforcement pursuant to Section 766.18(a) of the Regulations, no Party may use this Agreement in any administrative or judicial proceeding and the Parties shall not be bound by the terms contained in this Agreement in any subsequent administrative or judicial proceeding.\n\n7. No agreement, understanding, representation or interpretation not contained in this Agreement may be used to vary or otherwise affect the terms of this Agreement or the Order, if entered, nor shall this Agreement serve to bind, constrain, or otherwise limit any action by any other agency or department of the United States Government with respect to the facts and circumstances addressed herein.\n\n8. This Agreement shall become binding on the Parties only if the Assistant Secretary of Commerce for Export Enforcement approves it by entering the Order, which will have the same force and effect as a decision and order issued after a full administrative hearing on the record.\n\n9. Each signatory affirms that he has authority to enter into this Settlement Agreement and to bind his respective party to the terms and conditions set forth herein.\n\nBUREAU OF INDUSTRY AND SECURITY,\nU.S. DEPARTMENT OF COMMERCE\n\nMichael D. Turner\nDirector\nOffice of Export Enforcement\n\nDate: 4/13/07\n\nKHALID MAHMOOD\n\nKhalid Mahmood\n\nDate: 03/24/07\n\nThe Bureau of Industry and Security, U.S. Department of Commerce (\"BIS\"), has reason to believe that you, Khalid Mahmood, of Sharp Line Trading in Dubai, United Arab Emirates (\"UAE\"), in your individual capacity (\"Mahmood\"), have committed six violations of the Export Administration Regulations (the \"Regulations\"), which are issued under the authority of the Export Administration Act of 1979, as amended (the \"Act\"). Specifically, BIS charges that Mahmood committed the following violations:\n\n**Charge 1**\n\n**15 C.F.R. § 764.2(d) - Conspiracy to Violate the Regulations**\n\nBeginning in or about February 2003 and continuing through in or about December 2004, Mahmood acted in concert with others, known and unknown, to do or bring about an act that violates the Regulations. The purpose of the conspiracy was to export lift truck parts (\"parts\"), items subject to the Regulations (\"EAR 99\") and the Iranian Transactions Regulations, from the United States to Iran without the required U.S. Government authorization.\n\n---\n\n1 The Regulations are currently codified in the Code of Federal Regulations at 15 C.F.R. Parts 730-774 (2006). The violations charged occurred between 2003 and 2004. The Regulations governing the violations at issue are found in the 2003-2004 versions of the Code of Federal Regulations (15 C.F.R. Parts 730-774 (2003-2004)). The 2006 Regulations govern the procedural aspects of the case.\n\n2 50 U.S.C. app. §§ 2401-2420 (2000). Since August 21, 2001, the Act has been in lapse and the President, through Executive Order 13222 of August 17, 2001 (3 C.F.R., 2001 Comp. 783 (2002)), as extended by the Notice of August 2, 2005, (70 Fed. Reg. 45273 (August 5, 2005)), has continued the Regulations in effect under the International Emergency Economic Powers Act (50 U.S.C. §§ 1701 - 1706 (2000)).\n\n3 EAR 99 is a designation for items subject to the Regulations that are not listed on the Commerce Control List.\n\n4 The Iranian Transactions Regulations are currently codified in the Code of Federal Regulations at 31 C.F.R. Part 560 (2006).\n\nconspiracy, Mahmood facilitated the export of parts from the United States through the UAE to Iran. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury (\"OFAC\") before the parts could be exported to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. In so doing, Mahmood committed one violation of Section 764.2(d) of the Regulations.\n\n**Charges 2-6**\n\n15 C.F.R. § 764.2(b) - Causing the Export of Lift Truck Parts to Iran Without the Required Authorizations\n\nAs set forth in Schedule A, which is enclosed herewith and incorporated herein by reference, on five occasions between on or about March 28, 2003 and on or about December 18, 2003, Mahmood caused the doing of an act prohibited by the Regulations. Specifically, Mahmood coordinated the shipping of parts, items subject to the Regulations (\"EAR 99\") and the Iranian Transactions Regulations, from the United States to Iran through the UAE without the required U.S. Government authorizations. Pursuant to Section 560.204 of the Iranian Transactions Regulations, an export to a third country intended for transshipment to Iran is a transaction subject to the Iranian Transaction Regulations. Pursuant to Section 746.7 of the Regulations, authorization was required from the Office of Foreign Assets Control, U.S. Department of Treasury (\"OFAC\") for the shipment of the parts from the United States to Iran. Failure to obtain authorization from OFAC is a violation of the Regulations. By causing these exports in this manner, Mahmood committed five violations of Section 764.2(b) of the Regulations.\n\n***************\n\nAccordingly, Mahmood is hereby notified that an administrative proceeding is instituted against him pursuant to Section 13(c) of the Act and Part 766 of the Regulations for the purpose of obtaining an order imposing administrative sanctions, including any or all of the following:\n\nThe maximum civil penalty allowed by law of up to $11,000 per violation;⁵\n\nDenial of export privileges; and/or\n\nExclusion from practice before BIS.\n\nIf Mahmood fails to answer the charges contained in this letter within 30 days after being served with notice of issuance of this letter, that failure will be treated as a default. (Regulations, Sections 766.6 and 766.7). If Mahmood defaults, the Administrative Law Judge may find the charges alleged in this letter are true without hearing or further notice to Mahmood. The Under Secretary of Commerce for Industry and Security may then impose up to the maximum penalty\n\n---\n\n⁵See 15 C.F.R. §6.4(a)(4) (2006).\n\non each of the charges in this letter.\n\nMahmood is further notified that he is entitled to an agency hearing on the record if Mahmood files a written demand for one with his answer. (Regulations, Section 766.6). Mahmood is also entitled to be represented by counsel or other authorized representative who has power of attorney to represent him. (Regulations, Sections 766.3(a) and 766.4).\n\nThe Regulations provide for settlement without a hearing. (Regulations, Section 766.18). Should Mahmood have a proposal to settle this case, Mahmood or his representative should transmit it to the attorney representing BIS named below.\n\nThe U.S. Coast Guard is providing administrative law judge services in connection with the matters set forth in this letter. Accordingly, Mahmood’s answer must be filed in accordance with the instructions in Section 766.5(a) of the Regulations with:\n\nU.S. Coast Guard ALJ Docketing Center\n40 S. Gay Street\nBaltimore, Maryland 21202-4022\n\nIn addition, a copy of Mahmood’s answer must be served on BIS at the following address:\n\nChief Counsel for Industry and Security\nAttention: Parvin R. Huda, Esq.\nRoom H-3839\nUnited States Department of Commerce\n14th Street and Constitution Avenue, N.W.\nWashington, D.C. 20230\n\nParvin R. Huda is the attorney representing BIS in this case; any communications that Mahmood may wish to have concerning this matter should occur through her. Ms. Huda may be contacted by telephone at (202) 482-5301.\n\nSincerely,\n\nMichael D. Turner\nDirector\n\nKhalid Mahmood\nProposed Charging Letter\nPage 4 of 4\n\nOffice of Export Enforcement\n\nEnclosure\n</text>\n",
"role": "user"
},
{
"content": "rom the date of entry of the Order, Mahmood, and, when acting for or on behalf of Mahmood, his representatives or agents (\"Denied Person\") may not participate, directly or indirectly, in any way in any transaction involving any commodity, software or technology (hereinafter collectively referred to as \"item\") exported or to be exported from the United States that is subject to the Regulations, or in any other activity subject to the Regulations, including, but not limited to:\n\n i.",
"role": "assistant"
}
] |
MINUTES OF THE MEETING OF THE BOARD OF DIRECTORS OF CILEx REGULATION LIMITED HELD ON 3 DECEMBER 2015 AT BOX END PARK, KEMPSTON, BEDFORD, MK43 8RQ
Present:
Sam Younger (Chair), Patrick Bligh-Cheesman, Andrew Donovan, Luisa Fulci, David Gilbertson, Harvey Sandercock
In attendance:
Baljeet Basra, Chief Operating Officer, CILEx Regulation Shazrin Begum, Governance and Consultations Officer, CILEx Regulation Karl Cerski, Finance Director, CILEx (Item 10) Jill Durham, Head of Policy and Governance, CILEx Reglation David Edwards, President, CILEx Laura Gadsby, Management Accountant, CILEx Regulation (Items 5-15) Mandeep Nagra, Client Protection Manager, CILEx Regulation (Item 7), David Pope, Entity Authorisation and Supervision Manager, CILEx Regulation (Item 7) Joanne Stringer, Practitioner Authorisation and Supervision Manager, CILEx Regulation (Item 6) Helen Whiteman, Chief Executive Officer, CILEx Regulation
1 APOLOGIES FOR ABSENCE
There were apologies for absence from Ian Chivers.
2 DECLARATIONS OF INTEREST
There were no declarations of interest.
3 MINUTES
The minutes of the CILEx Regulation Board meeting held on 1 October 2015 were approved as a true record.
4 STRATEGY MEETING
The Chair summarised the outcomes from the previous day's Strategy meeting. It was agreed that the office would focus on the following core strands:
growth of the organisation, practice rights, entity regulation and progressing with the ABS application;
review of process, structure, governance and IT;
identification of unique selling points and the future of the regulatory landscape. Review of the legislative options paper and formulation of an organisational response.
The above three elements would appear as a standing item in future Board agendas.
The CEO was asked to produce proposals over the coming months for income generation. The CEO confirmed that work-based learning (WBL) and qualifying employment (QE) were subject to a governance review.
5 BUSINESS DEVELOPMENT
Practice Rights and Entity regulation
CILEx had produced a report on promotion of practice rights which would be reviewed by the Practice Regulation Working Group (PRWG). Practice rights roadshows had generated interest. The PRWG would view the record of enquiries and follow up action to ensure that enquiries convert to applications.
Profile Raising and leading on sector developments
The office had engaged in a number of initiatives aimed at raising the profile of CILEx Regulation and shaping the direction of key sector developments. The activities promoted the recognition of CILEx Regulation and therefore improved its position in the market.
Marketing activity
The office had continued its marketing activity through e-shots, direct mailings to members and increased use of LinkedIn and Twitter. The office would develop a schedule of e-shot content for early 2016. The office had also started improving templates for e-shots and direct mailings.
The Board considered a marketing report which identified the response rate to marketing activity.
6 PRACTITIONER AUTHORISATION AND SUPERVISION
Developments
The Board noted performance against KPIs, the successes, opportunities and risks of Practitioner authorisation work. This included updates on practice rights, qualifying employment, work based learning, advocacy and CPD noncompliance.
Work Based Learning (WBL) Review
Workshops had been held with staff that assessing WBL applications and external advisors. The workshops explored areas where the outcomes could be redrafted, merged, deleted or new methods of assessment introduced.
The Board were provided with the proposals to:
Require outcomes that currently have to be met three times to be met twice;
merge some outcomes, where there is duplication in how applicants meet the outcomes;
introduce new methods for meeting some outcomes – employers' statement or assessors' view.
The Board noted administrative changes being made.
The changes to the outcomes will require approval by the LSB before they can be implemented. Prior to an application to the LSB, a consultation is needed with key stakeholders.
The Board were provided with a project plan which had been developed for the next stages of the work; this would involve seeking views of the LETR WG as the WBL outcomes form part of the Fellows Day One Outcomes.
The Board agreed for the office to act in accordance with the project plan to progress the changes to the WBL outcomes and agree the proposal for revisions to the WBL scheme. The Board requested for the WBL proposals to be consulted at green paper level, where CILEx Regulation encouraged discussion from stakeholders.
7 ENTITY AUTHORISATION AND SUPERVISION
Developments
The Board noted the Entity Authorisation and Supervision team's performance against KPI, and a report on successes, opportunities and risks on entity work.
Alternative Business Structures
The licensing application was on track for submission in early 2016. The office had produced profit and loss forecasts for the initial three years for licensing for the November PRWG meeting and commissioned market research for consideration at the next PRWG meeting.
The office was awaiting a response from another organisation to see whether it would jointly engage with the First Tier Tribunal to reduce costs.
Legal Counsel had been instructed to review and update rules. The office would issue a consultation on the licensing and associated rules that needed to change to incorporate licensing.
The PRWG had decided to adopt the low forecast in the budget for take up of ABS entities in 2017. The Board agreed this recommendation. The Board agreed that the office develop mitigating action for the deficit generated by the low forecast to be considered by PRWG.
An additional Board meeting may be needed to approve the licensing application. The Board agreed that approval be delegated to a smaller number of Board members.
Entity Regulation
The application made to the Disclosure and Barring Service (DBS) to enable the organisation to carry out a standard DBS check had been approved. The Board agreed the recommendation from the PRWG for a fee of £42 to be charged for a standard check.
Professional Indemnity Insurance (PII)
A meeting had been held with the LSB on run-off in October 2015. The LSB had expressed interest in the research carried out by CILEx Regulation. The Office had submitted a report on run-off to the LSB in December 2015. The Board were provided with an action plan which had been reviewed by the PRWG.
Anti-money laundering
CILEx had become an Anti-Money Laundering (AML) supervisor in January 2015. The Board were made aware of recent reports, changes to legislation and future consultations on the role of supervisors.
8 CAPACITY AND CAPABILITY
Resources review
CILEx Regulation had appointed a Head of Policy & Governance and Personal Assistant to the CEO, Chair and Senior Management Team.
The CILEx Finance and Remuneration Standing Committee (FRSC) had requested further information from CILEx Regulation on its budgetary requirements for 2016. The Board approved the CILEx Regulation report to the FRSC and was advised that the FRSC was satisfied with the additional information provided and would recommend CILEx Regulation's budget for approval by Council at its November meeting.
The Board were provided with details of how remaining areas would be resourced. This included the Education and Policy Manager role where work would be allocated on a project consultancy basis. CILEx Regulation had identified the need for a part-time marketing and communications role.
A review of the mid-tier management structure would be undertaken to ensure skills, knowledge and expertise were best utilised, developed and retained in line with budgets. CILEx Regulation had introduced a number of new procedures to improve and extend financial capabilities, which included improved budget setting, reporting and monitoring mechanisms, to help identify the true cost of regulation.
Regulatory Standards Self-Assessment
The regulatory standards self-assessment had been completed and submitted to the LSB in October 2015. The LSB had confirmed it would be in touch in January 2016 to arrange a meeting to discuss its analysis of the selfassessment.
An independent audit of the self-assessment had been carried out. The Board agreed to receive the report at a later date.
Protocols and Service Level Agreements (SLA) with CILEx Compensation Fund
A draft of protocols and service level agreements (SLAs) between the CILEx Compensation Fund, CILEx Regulation and CILEx had been developed. It was shared with the Compensation Fund Board and the office was awaiting their initial feedback.
David Gilbertson had provided comments on behalf of the Board which would be incorporated into the next draft.
Business Plan 2015
The Business Plan for 2015 had been updated to record work since the last Board meeting. The text, in the updated progress section had been developed to provide more detail, as requested by the Board.
The Board noted progress of action against the business plan.
9 BOARD PERFORMANCE REVIEW
The Board agreed the timetable for 2015 self-assessment which would be online. The Board agreed a list of individuals who would be invited to take part in the survey.
Terms of reference for a wider governance review focusing on Board performance arrangements were agreed. The review would be led by David Gilbertson and supported by the Head of Policy and Governance. The purpose was to capture the views of Board members, review best practice in comparable organisations and to make recommendations on Portfolio structure and arrangements, individual Board member appraisal and the Board's annual self-evaluation.
10 FINANCIAL REPORT AND BUDGET
CILEx Regulation Budget 2016
At the October 2015 Board meeting a revised 2016 budget had been presented for Board approval. This budget went to FRSC in October where it was reviewed in conjunction with the other CILEx Group company 2016 budgets.
FRSC requested that CILEx Regulation prepare a revised budget and supporting narrative. The second draft of the revised budget identified additional cost savings made since the first draft. Additional costs savings included staff costs, entity regulation and practice rights. Work was being carried out to identify further cost savings that the office may be able to achieve.
The Board approved the second draft of the revised budget for 2016 for inclusion within the 2016 CILEx Group budget.
Three and Five year Entity Regulation Forecasts
The finance team had produced three year forecasts for entity regulation. The forecasts had been compiled for the Board to review and consider action to reduce the net cost to the business, or improve income streams to help offset the cost of entity regulation.
The PRWG decided at its November meeting to recommend to the Board that the low scenarios should be incorporated in CILEx Regulation forecasts as a whole. This recommendation was made on the basis that it reflected low numbers of entity regulation.
The Board approved PRWG recommendations that the low scenario should be adopted within the CILEx group forecasts. The Board agreed to keep the viability of entity regulation under review.
Work Based Learning Fees (WBL)
CILEx Regulation charged a £150 fee for WBL applications to achieve Fellow status. This fee had remained at £150 for a number of years. The Finance team had carried out detailed analysis to calculate assessment costs.
The Board had considered a number of scenarios and voted by a majority to increase the WBL fee to £350 per portfolio from 1 April 2016.
The Board closely debated the fee increase because of the impact it would have on CILEx members. However the fee had not changed for a number of years and was based on the previous Fellowship process.
Qualifying Employment
QE fees had remained at £35 for a number of years.
The Board considered a number of scenarios and approved increments below, over the next five years.
```
Year 1 - £70 (100% increase) Year 2 - £105 (50% increase) Year 3 - £125 (20% increase) Year 4 - £140 (11% increase) Year 5 - £150 (7% increase)
```
2015 Financial Report
The Board reviewed the management accounts to the end of September and the profit and loss forecast to the end of 2015. Management accounts provided actual and budget figures to the end of September 2015.
Total income was below budget to September as there were lower revised figures on practice rights and entity regulation. Total income for the full year was under budget and direct expenditure was close to budget.
11 EDUCATION AND STANDARDS
Update on Quality Assurance Scheme for Criminal Advocacy (QASA) implementation
The Joint Advocacy Group (JAG) had issued a consultation on the changes to the QASA due to close on 24 December 2015 after which an application would be made to the LSB for approval of the changes. The changes were those needed following the decision of the Supreme Court.
QASA would impact on CILEx Regulation litigation rules, advocacy rules and associate prosecutor scheme rules.
The Board agreed that the office update the advocacy rules and submit them to LSB for approval as a part of the submission to be made by JAG for approval of QASA.
Youth Court Advocacy review
The review commissioned by the BSB and CILEx Regulation into the quality of advocacy in the Youth Courts had concluded. A draft report had been circulated in the summer for comment by the BSB and CILEx Regulation and provided to the Board's September meeting.
The key findings of the final report showed that the infrastructure and proceedings of the Youth Courts needed investment and that advocates did not receive enough training in or have enough knowledge of Youth Court procedures and the needs of young people involved in cases in the Youth Court.
The Board agreed:
that the training of CILEx advocates and litigators be reviewed in the light of the research report;
recommendations be drafted addressing the issues identified by the review;
and recommendations be submitted for consideration by the LETR Working Group.
Ethics in Advocacy
CILEx advocates and Fellows specialising in civil litigation had been invited to take part in research being carried out by the Advocacy Training Council and funded by the Legal Education Foundation to examine advocates' treatment of ethical issues.
A limited number of CILEx advocates met the criteria for the research so the final report would not provide valuable feedback on the effectiveness of the current CILEx approach to ethics training. The Board noted that the project was scheduled to complete by the end of 2015.
Vulnerable witness project
CILEx and CILEx Regulation had participated in the Advocates Gateway (TAG) project to develop toolkits for working with vulnerable witnesses.
Former Board member Thelma Brown had represented CILEx Regulation at TAG. The Board agreed that the office attend future meetings of TAG.
Trailblazer Apprenticeships
Three law standards had been developed for the Trailblazer scheme: paralegal, Chartered Legal Executive and solicitor. The standards had been approved in August 2014 and assessment plans approved in September 2015.
The end point assessment application was being developed by CILEx and would be submitted to the Skills Funding Agency for consideration at the end of November.
Further development work was required around the assessment plans for the paralegal and the Chartered Legal Executive Trailblazers to finalise the details around end point assessment.
12 ENFORCEMENT
Developments
The Board noted performance against KPIs, successes and opportunities and risks in Enforcement work.
The Rehabilitation of Offenders Act 1974 and Data Protection Act 1998
Members of the investigation team had attended a training seminar presented by NACRO, a charity providing pathways for social inclusion and reducing crime. As a result staff had been alerted to S56 of the Data Protection Act 1998 introduced on 10 March 2015 to protect individuals with criminal convictions and cautions so they can benefit fully from the Rehabilitation of Offenders Act 1974.
As a result of the training seminar CILEx Regulation had taken the following action:
- asked the Clerk to the PCP to advise panel members that they cannot compel a member or applicant to disclose a conviction or caution to a referee before they will accept the content of a reference;
- provided advice to the Clerk to the PCP that any disclosure of sensitive personal data will be provided either by way of the basic Disclosure Scotland report or the standard DBS report;
- removed all reference to requests for subject access reports, memorandum of convictions and notifying referees of convictions and cautions from the website and standard letters;
- advised the Practice Advice Team at CILEx of the change in order to manage customer calls.
- informed the Entity Authorisation and Supervision Team which was applying for authority to become a registered organisation with the Disclosure Barring Service, of the additional disclosures required. There was a minimum requirement of 100 disclosure reports and this will improve our chances of meeting this minimum requirement.
CPD non-compliance update
The Practitioner Authorisation and Supervision Team had referred members of the regulated community with outstanding CPD for 2012/2013 and 2013/2014 to the Investigation Team for misconduct action. The Board were provided with a summary of the current figures and action plan.
ABS licensing application
The office had begun a review of the Investigation, Disciplinary and Appeals Rules (IDAR) as a result of the ABS licensing application. The new IDAR would incorporate additional powers within the Entity Authorisation and Supervision Team. The IDAR Handbook would need to be updated to incorporate these changes when they came into effect.
13 CONSUMER AND STAKEHOLDER ENGAGEMENT
Consumer Action plan
The Board noted progress against the Consumer Engagement Action Plan 2015. Work was in hand to develop the Consumer Engagement Action Plan 2016. It would be finalised following the strategy meeting for presentation to the Board's January meeting.
Pro bono
In June 2015 the Lord Chancellor had given a keynote speech suggesting that improvement in access to justice might be addressed by increased pro bono provision. This was viewed as a suggestion that the government may impose obligations on lawyers to carry out pro bono work.
Andrew Donovan had represented CILEx Regulation at a regulators' panel event launching 2015 National Pro Bono Week. Andrew had highlighted that CILEx Regulation already had a principles based, outcomes focused Code of Conduct which did not limit pro bono activity over and above the restrictions in the Legal Services Act 2007.
The Board noted that CILEx Regulation required no further deregulation to facilitate pro bono.
Unbundling legal services
The Legal Services Consumer Panel (the Panel) had carried out research into unbundled legal services. The Board noted the Panel's policy brief.
In September the Consumer Panel had convened a workshop to bring together regulators, researchers, representatives and advice-giving bodies. This had been an opportunity to provide an information exchange and to share learning around different aspects of unbundled legal services. They considered a report of the outcomes of the workshop.
CILEx Regulation would hold a workshop with consumer organisations to explore issues on unbundling. The Panel would also provide a tailored training package based on individual organisations.
Consumer research joint work
The Board noted the minutes of the Regulators' Forum. Consideration was given to the outcomes of the meeting held in August 2015 at which it was agreed that there should be a joint approach towards research and consumer engagement on client care letters.
It was agreed that a sub-group would begin scoping out the project. The office would contact the Bar Standards Board to arrange a meeting to take the work forward.
14 INFORMATION ITEMS
The Board noted the following:
a summary of open and closed consultations;
minutes of the CILEx and CILEx Regulation Futures Group Meeting held on 24 September 2015;
minutes of the Practice Regulation Working Group meeting held on 17 September 2015;
minutes of the Admissions and Licensing Committee meetings held on 3 June 2015, 22 July 2015 and 2 September 2015;
minutes of the Strategic Risk Committee meeting held on 22 September 2015.
15 AOB
The Board agreed to streamline the CILEx Regulation Annual Report for 2015. The office would commence work on the Annual Report.
The Board noted that a business case was being developed for CILEx and CILEx Regulation to pursue escrow provisions.
16 DATE OF NEXT MEETING
28 January 2016 at 9:30am.
SAM YOUNGER CHAIRMAN
|
<urn:uuid:4db1f86d-8e76-4fca-80db-f362925505b3>
|
CC-MAIN-2024-22
|
https://cilexregulation.org.uk/wp-content/uploads/2019/01/CILEx-Regulation-Board-minutes-December-2015-2.pdf
|
2024-05-23T03:48:22+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-22/subset=warc/part-00194-4dd72944-e9c0-41a1-9026-dfd2d0615bf2.c000.gz.parquet
| 145,413,370
| 4,233
|
eng_Latn
|
eng_Latn
| 0.967496
|
eng_Latn
| 0.996021
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1355,
3357,
5198,
7366,
9356,
11583,
13361,
15327,
17356,
19568,
21025
] |
MINUTES OF THE MEETING OF THE BOARD OF DIRECTORS OF CILEx REGULATION LIMITED HELD ON 3 DECEMBER 2015 AT BOX END PARK, KEMPSTON, BEDFORD, MK43 8RQ
Present:
Sam Younger (Chair), Patrick Bligh-Cheesman, Andrew Donovan, Luisa Fulci, David Gilbertson, Harvey Sandercock
In attendance:
Baljeet Basra, Chief Operating Officer, CILEx Regulation Shazrin Begum, Governance and Consultations Officer, CILEx Regulation Karl Cerski, Finance Director, CILEx (Item 10) Jill Durham, Head of Policy and Governance, CILEx Reglation David Edwards, President, CILEx Laura Gadsby, Management Accountant, CILEx Regulation (Items 5-15) Mandeep Nagra, Client Protection Manager, CILEx Regulation (Item 7), David Pope, Entity Authorisation and Supervision Manager, CILEx Regulation (Item 7) Joanne Stringer, Practitioner Authorisation and Supervision Manager, CILEx Regulation (Item 6) Helen Whiteman, Chief Executive Officer, CILEx Regulation
1 APOLOGIES FOR ABSENCE
There were apologies for absence from Ian Chivers.
2 DECLARATIONS OF INTEREST
There were no declarations of interest.
3 MINUTES
The minutes of the CILEx Regulation Board meeting held on 1 October 2015 were approved as a true record.
4 STRATEGY MEETING
The Chair summarised the outcomes from the previous day's Strategy meeting. It was agreed that the office would focus on the following core strands:
growth of the organisation, practice rights, entity regulation and progressing with the ABS application;
review of process, structure, governance and IT;
identification of unique selling points and the future of the regulatory landscape. Review of the legislative options paper and formulation of an organisational response.
The above three elements would appear as a standing item in future Board agendas.
The CEO was asked to produce proposals over the coming months for income generation. The CEO confirmed that work-based learning (WBL) and qualifying employment (QE) were subject to a governance review.
5 BUSINESS DEVELOPMENT
Practice Rights and Entity regulation
CILEx had produced a report on promotion of practice rights which would be reviewed by the Practice Regulation Working Group (PRWG). Practice rights roadshows had generated interest. The PRWG would view the record of enquiries and follow up action to ensure that enquiries convert to applications.
Profile Raising and leading on sector developments
The office had engaged in a number of initiatives aimed at raising the profile of CILEx Regulation and shaping the direction of key sector developments. The activities promoted the recognition of CILEx Regulation and therefore improved its position in the market.
Marketing activity
The office had continued its marketing activity through e-shots, direct mailings to members and increased use of LinkedIn and Twitter. The office would develop a schedule of e-shot content for early 2016. The office had also started improving templates for e-shots and direct mailings.
The Board considered a marketing report which identified the response rate to marketing activity.
6 PRACTITIONER AUTHORISATION AND SUPERVISION
Developments
The Board noted performance against KPIs, the successes, opportunities and risks of Practitioner authorisation work. This included updates on practice rights, qualifying employment, work based learning, advocacy and CPD noncompliance.
Work Based Learning (WBL) Review
Workshops had been held with staff that assessing WBL applications and external advisors. The workshops explored areas where the outcomes could be redrafted, merged, deleted or new methods of assessment introduced.
The Board were provided with the proposals to:
Require outcomes that currently have to be met three times to be met twice;
merge some outcomes, where there is duplication in how applicants meet the outcomes;
introduce new methods for meeting some outcomes – employers' statement or assessors' view.
The Board noted administrative changes being made.
The changes to the outcomes will require approval by the LSB before they can be implemented. Prior to an application to the LSB, a consultation is needed with key stakeholders.
The Board were provided with a project plan which had been developed for the next stages of the work; this would involve seeking views of the LETR WG as the WBL outcomes form part of the Fellows Day One Outcomes.
The Board agreed for the office to act in accordance with the project plan to progress the changes to the WBL outcomes and agree the proposal for revisions to the WBL scheme. The Board requested for the WBL proposals to be consulted at green paper level, where CILEx Regulation encouraged discussion from stakeholders.
7 ENTITY AUTHORISATION AND SUPERVISION
Developments
The Board noted the Entity Authorisation and Supervision team's performance against KPI, and a report on successes, opportunities and risks on entity work.
Alternative Business Structures
The licensing application was on track for submission in early 2016. The office had produced profit and loss forecasts for the initial three years for licensing for the November PRWG meeting and commissioned market research for consideration at the next PRWG meeting.
The office was awaiting a response from another organisation to see whether it would jointly engage with the First Tier Tribunal to reduce costs.
Legal Counsel had been instructed to review and update rules. The office would issue a consultation on the licensing and associated rules that needed to change to incorporate licensing.
The PRWG had decided to adopt the low forecast in the budget for take up of ABS entities in 2017. The Board agreed this recommendation. The Board agreed that the office develop mitigating action for the deficit generated by the low forecast to be considered by PRWG.
An additional Board meeting may be needed to approve the licensing application. The Board agreed that approval be delegated to a smaller number of Board members.
Entity Regulation
The application made to the Disclosure and Barring Service (DBS) to enable the organisation to carry out a standard DBS check had been approved. The Board agreed the recommendation from the PRWG for a fee of £42 to be charged for a standard check.
Professional Indemnity Insurance (PII)
A meeting had been held with the LSB on run-off in October 2015. The LSB had expressed interest in the research carried out by CILEx Regulation. The Office had submitted a report on run-off to the LSB in December 2015. The Board were provided with an action plan which had been reviewed by the PRWG.
Anti-money laundering
CILEx had become an Anti-Money Laundering (AML) supervisor in January 2015. The Board were made aware of recent reports, changes to legislation and future consultations on the role of supervisors.
8 CAPACITY AND CAPABILITY
Resources review
CILEx Regulation had appointed a Head of Policy & Governance and Personal Assistant to the CEO, Chair and Senior Management Team.
The CILEx Finance and Remuneration Standing Committee (FRSC) had requested further information from CILEx Regulation on its budgetary requirements for 2016. The Board approved the CILEx Regulation report to the FRSC and was advised that the FRSC was satisfied with the additional information provided and would recommend CILEx Regulation's budget for approval by Council at its November meeting.
The Board were provided with details of how remaining areas would be resourced. This included the Education and Policy Manager role where work would be allocated on a project consultancy basis. CILEx Regulation had identified the need for a part-time marketing and communications role.
A review of the mid-tier management structure would be undertaken to ensure skills, knowledge and expertise were best utilised, developed and retained in line with budgets. CILEx Regulation had introduced a number of new procedures to improve and extend financial capabilities, which included improved budget setting, reporting and monitoring mechanisms, to help identify the true cost of regulation.
Regulatory Standards Self-Assessment
The regulatory standards self-assessment had been completed and submitted to the LSB in October 2015. The LSB had confirmed it would be in touch in January 2016 to arrange a meeting to discuss its analysis of the selfassessment.
An independent audit of the self-assessment had been carried out. The Board agreed to receive the report at a later date.
Protocols and Service Level Agreements (SLA) with CILEx Compensation Fund
A draft of protocols and service level agreements (SLAs) between the CILEx Compensation Fund, CILEx Regulation and CILEx had been developed. It was shared with the Compensation Fund Board and the office was awaiting their initial feedback.
David Gilbertson had provided comments on behalf of the Board which would be incorporated into the next draft.
Business Plan 2015
The Business Plan for 2015 had been updated to record work since the last Board meeting. The text, in the updated progress section had been developed to provide more detail, as requested by the Board.
The Board noted progress of action against the business plan.
9 BOARD PERFORMANCE REVIEW
The Board agreed the timetable for 2015 self-assessment which would be online. The Board agreed a list of individuals who would be invited to take part in the survey.
Terms of reference for a wider governance review focusing on Board performance arrangements were agreed. The review would be led by David Gilbertson and supported by the Head of Policy and Governance. The purpose was to capture the views of Board members, review best practice in comparable organisations and to make recommendations on Portfolio structure and arrangements, individual Board member appraisal and the Board's annual self-evaluation.
10 FINANCIAL REPORT AND BUDGET
CILEx Regulation Budget 2016
At the October 2015 Board meeting a revised 2016 budget had been presented for Board approval. This budget went to FRSC in October where it was reviewed in conjunction with the other CILEx Group company 2016 budgets.
FRSC requested that CILEx Regulation prepare a revised budget and supporting narrative. The second draft of the revised budget identified additional cost savings made since the first draft. Additional costs savings included staff costs, entity regulation and practice rights. Work was being carried out to identify further cost savings that the office may be able to achieve.
The Board approved the second draft of the revised budget for 2016 for inclusion within the 2016 CILEx Group budget.
Three and Five year Entity Regulation Forecasts
The finance team had produced three year forecasts for entity regulation. The forecasts had been compiled for the Board to review and consider action to reduce the net cost to the business, or improve income streams to help offset the cost of entity regulation.
The PRWG decided at its November meeting to recommend to the Board that the low scenarios should be incorporated in CILEx Regulation forecasts as a whole. This recommendation was made on the basis that it reflected low numbers of entity regulation.
The Board approved PRWG recommendations that the low scenario should be adopted within the CILEx group forecasts. The Board agreed to keep the viability of entity regulation under review.
Work Based Learning Fees (WBL)
CILEx Regulation charged a £150 fee for WBL applications to achieve Fellow status. This fee had remained at £150 for a number of years. The Finance team had carried out detailed analysis to calculate assessment costs.
The Board had considered a number of scenarios and voted by a majority to increase the WBL fee to £350 per portfolio from 1 April 2016.
The Board closely debated the fee increase because of the impact it would have on CILEx members. However the fee had not changed for a number of years and was based on the previous Fellowship process.
Qualifying Employment
QE fees had remained at £35 for a number of years.
The Board considered a number of scenarios and approved increments below, over the next five years.
```
Year 1 - £70 (100% increase) Year 2 - £105 (50% increase) Year 3 - £125 (20% increase) Year 4 - £140 (11% increase) Year 5 - £150 (7% increase)
```
2015 Financial Report
The Board reviewed the management accounts to the end of September and the profit and loss forecast to the end of 2015. Management accounts provided actual and budget figures to the end of September 2015.
Total income was below budget to September as there were lower revised figures on practice rights and entity regulation. Total income for the full year was under budget and direct expenditure was close to budget.
11 EDUCATION AND STANDARDS
Update on Quality Assurance Scheme for Criminal Advocacy (QASA) implementation
The Joint Advocacy Group (JAG) had issued a consultation on the changes to the QASA due to close on 24 December 2015 after which an application would be made to the LSB for approval of the changes. The changes were those needed following the decision of the Supreme Court.
QASA would impact on CILEx Regulation litigation rules, advocacy rules and associate prosecutor scheme rules.
The Board agreed that the office update the advocacy rules and submit them to LSB for approval as a part of the submission to be made by JAG for approval of QASA.
Youth Court Advocacy review
The review commissioned by the BSB and CILEx Regulation into the quality of advocacy in the Youth Courts had concluded. A draft report had been circulated in the summer for comment by the BSB and CILEx Regulation and provided to the Board's September meeting.
The key findings of the final report showed that the infrastructure and proceedings of the Youth Courts needed investment and that advocates did not receive enough training in or have enough knowledge of Youth Court procedures and the needs of young people involved in cases in the Youth Court.
The Board agreed:
that the training of CILEx advocates and litigators be reviewed in the light of the research report;
recommendations be drafted addressing the issues identified by the review;
and recommendations be submitted for consideration by the LETR Working Group.
Ethics in Advocacy
CILEx advocates and Fellows specialising in civil litigation had been invited to take part in research being carried out by the Advocacy Training Council and funded by the Legal Education Foundation to examine advocates' treatment of ethical issues.
A limited number of CILEx advocates met the criteria for the research so the final report would not provide valuable feedback on the effectiveness of the current CILEx approach to ethics training. The Board noted that the project was scheduled to complete by the end of 2015.
Vulnerable witness project
CILEx and CILEx Regulation had participated in the Advocates Gateway (TAG) project to develop toolkits for working with vulnerable witnesses.
Former Board member Thelma Brown had represented CILEx Regulation at TAG. The Board agreed that the office attend future meetings of TAG.
Trailblazer Apprenticeships
Three law standards had been developed for the Trailblazer scheme: paralegal, Chartered Legal Executive and solicitor. The standards had been approved in August 2014 and assessment plans approved in September 2015.
The end point assessment application was being developed by CILEx and would be submitted to the Skills Funding Agency for consideration at the end of November.
Further development work was required around the assessment plans for the paralegal and the Chartered Legal Executive Trailblazers to finalise the details around end point assessment.
12 ENFORCEMENT
Developments
The Board noted performance against KPIs, successes and opportunities and risks in Enforcement work.
The Rehabilitation of Offenders Act 1974 and Data Protection Act 1998
Members of the investigation team had attended a training seminar presented by NACRO, a charity providing pathways for social inclusion and reducing crime. As a result staff had been alerted to S56 of the Data Protection Act 1998 introduced on 10 March 2015 to protect individuals with criminal convictions and cautions so they can benefit fully from the Rehabilitation of Offenders Act 1974.
As a result of the training seminar CILEx Regulation had taken the following action:
- asked the Clerk to the PCP to advise panel members that they cannot compel a member or applicant to disclose a conviction or caution to a referee before they will accept the content of a reference;
- provided advice to the Clerk to the PCP that any disclosure of sensitive personal data will be provided either by way of the basic Disclosure Scotland report or the standard DBS report;
- removed all reference to requests for subject access reports, memorandum of convictions and notifying referees of convictions and cautions from the website and standard letters;
- advised the Practice Advice Team at CILEx of the change in order to manage customer calls.
- informed the Entity Authorisation and Supervision Team which was applying for authority to become a registered organisation with the Disclosure Barring Service, of the additional disclosures required. There was a minimum requirement of 100 disclosure reports and this will improve our chances of meeting this minimum requirement.
CPD non-compliance update
The Practitioner Authorisation and Supervision Team had referred members of the regulated community with outstanding CPD for 2012/2013 and 2013/2014 to the Investigation Team for misconduct action. The Board were provided with a summary of the current figures and action plan.
ABS licensing application
The office had begun a review of the Investigation, Disciplinary and Appeals Rules (IDAR) as a result of the ABS licensing application. The new IDAR would incorporate additional powers within the Entity Authorisation and Supervision Team. The IDAR Handbook would need to be updated to incorporate these changes when they came into effect.
13 CONSUMER AND STAKEHOLDER ENGAGEMENT
Consumer Action plan
The Board noted progress against the Consumer Engagement Action Plan 2015. Work was in hand to develop the Consumer Engagement Action Plan 2016. It would be finalised following the strategy meeting for presentation to the Board's January meeting.
Pro bono
In June 2015 the Lord Chancellor had given a keynote speech suggesting that improvement in access to justice might be addressed by increased pro bono provision. This was viewed as a suggestion that the
|
government may impose obligations on lawyers to carry out pro bono work.
|
Andrew Donovan had represented CILEx Regulation at a regulators' panel event launching 2015 National Pro Bono Week. Andrew had highlighted that CILEx Regulation already had a principles based, outcomes focused Code of Conduct which did not limit pro bono activity over and above the restrictions in the Legal Services Act 2007.
The Board noted that CILEx Regulation required no further deregulation to facilitate pro bono.
Unbundling legal services
The Legal Services Consumer Panel (the Panel) had carried out research into unbundled legal services. The Board noted the Panel's policy brief.
In September the Consumer Panel had convened a workshop to bring together regulators, researchers, representatives and advice-giving bodies. This had been an opportunity to provide an information exchange and to share learning around different aspects of unbundled legal services. They considered a report of the outcomes of the workshop.
CILEx Regulation would hold a workshop with consumer organisations to explore issues on unbundling. The Panel would also provide a tailored training package based on individual organisations.
Consumer research joint work
The Board noted the minutes of the Regulators' Forum. Consideration was given to the outcomes of the meeting held in August 2015 at which it was agreed that there should be a joint approach towards research and consumer engagement on client care letters.
It was agreed that a sub-group would begin scoping out the project. The office would contact the Bar Standards Board to arrange a meeting to take the work forward.
14 INFORMATION ITEMS
The Board noted the following:
a summary of open and closed consultations;
minutes of the CILEx and CILEx Regulation Futures Group Meeting held on 24 September 2015;
minutes of the Practice Regulation Working Group meeting held on 17 September 2015;
minutes of the Admissions and Licensing Committee meetings held on 3 June 2015, 22 July 2015 and 2 September 2015;
minutes of the Strategic Risk Committee meeting held on 22 September 2015.
15 AOB
The Board agreed to streamline the CILEx Regulation Annual Report for 2015. The office would commence work on the Annual Report.
The Board noted that a business case was being developed for CILEx and CILEx Regulation to pursue escrow provisions.
16 DATE OF NEXT MEETING
28 January 2016 at 9:30am.
SAM YOUNGER CHAIRMAN
| 18,557
|
end_of_word
|
the
|
remove_one_sentence
|
<url>
https://cilexregulation.org.uk/wp-content/uploads/2019/01/CILEx-Regulation-Board-minutes-December-2015-2.pdf
</url>
<text>
MINUTES OF THE MEETING OF THE BOARD OF DIRECTORS OF CILEx REGULATION LIMITED HELD ON 3 DECEMBER 2015 AT BOX END PARK, KEMPSTON, BEDFORD, MK43 8RQ
Present:
Sam Younger (Chair), Patrick Bligh-Cheesman, Andrew Donovan, Luisa Fulci, David Gilbertson, Harvey Sandercock
In attendance:
Baljeet Basra, Chief Operating Officer, CILEx Regulation Shazrin Begum, Governance and Consultations Officer, CILEx Regulation Karl Cerski, Finance Director, CILEx (Item 10) Jill Durham, Head of Policy and Governance, CILEx Reglation David Edwards, President, CILEx Laura Gadsby, Management Accountant, CILEx Regulation (Items 5-15) Mandeep Nagra, Client Protection Manager, CILEx Regulation (Item 7), David Pope, Entity Authorisation and Supervision Manager, CILEx Regulation (Item 7) Joanne Stringer, Practitioner Authorisation and Supervision Manager, CILEx Regulation (Item 6) Helen Whiteman, Chief Executive Officer, CILEx Regulation
1 APOLOGIES FOR ABSENCE
There were apologies for absence from Ian Chivers.
2 DECLARATIONS OF INTEREST
There were no declarations of interest.
3 MINUTES
The minutes of the CILEx Regulation Board meeting held on 1 October 2015 were approved as a true record.
4 STRATEGY MEETING
The Chair summarised the outcomes from the previous day's Strategy meeting. It was agreed that the office would focus on the following core strands:
growth of the organisation, practice rights, entity regulation and progressing with the ABS application;
review of process, structure, governance and IT;
identification of unique selling points and the future of the regulatory landscape. Review of the legislative options paper and formulation of an organisational response.
The above three elements would appear as a standing item in future Board agendas.
The CEO was asked to produce proposals over the coming months for income generation. The CEO confirmed that work-based learning (WBL) and qualifying employment (QE) were subject to a governance review.
5 BUSINESS DEVELOPMENT
Practice Rights and Entity regulation
CILEx had produced a report on promotion of practice rights which would be reviewed by the Practice Regulation Working Group (PRWG). Practice rights roadshows had generated interest. The PRWG would view the record of enquiries and follow up action to ensure that enquiries convert to applications.
Profile Raising and leading on sector developments
The office had engaged in a number of initiatives aimed at raising the profile of CILEx Regulation and shaping the direction of key sector developments. The activities promoted the recognition of CILEx Regulation and therefore improved its position in the market.
Marketing activity
The office had continued its marketing activity through e-shots, direct mailings to members and increased use of LinkedIn and Twitter. The office would develop a schedule of e-shot content for early 2016. The office had also started improving templates for e-shots and direct mailings.
The Board considered a marketing report which identified the response rate to marketing activity.
6 PRACTITIONER AUTHORISATION AND SUPERVISION
Developments
The Board noted performance against KPIs, the successes, opportunities and risks of Practitioner authorisation work. This included updates on practice rights, qualifying employment, work based learning, advocacy and CPD noncompliance.
Work Based Learning (WBL) Review
Workshops had been held with staff that assessing WBL applications and external advisors. The workshops explored areas where the outcomes could be redrafted, merged, deleted or new methods of assessment introduced.
The Board were provided with the proposals to:
Require outcomes that currently have to be met three times to be met twice;
merge some outcomes, where there is duplication in how applicants meet the outcomes;
introduce new methods for meeting some outcomes – employers' statement or assessors' view.
The Board noted administrative changes being made.
The changes to the outcomes will require approval by the LSB before they can be implemented. Prior to an application to the LSB, a consultation is needed with key stakeholders.
The Board were provided with a project plan which had been developed for the next stages of the work; this would involve seeking views of the LETR WG as the WBL outcomes form part of the Fellows Day One Outcomes.
The Board agreed for the office to act in accordance with the project plan to progress the changes to the WBL outcomes and agree the proposal for revisions to the WBL scheme. The Board requested for the WBL proposals to be consulted at green paper level, where CILEx Regulation encouraged discussion from stakeholders.
7 ENTITY AUTHORISATION AND SUPERVISION
Developments
The Board noted the Entity Authorisation and Supervision team's performance against KPI, and a report on successes, opportunities and risks on entity work.
Alternative Business Structures
The licensing application was on track for submission in early 2016. The office had produced profit and loss forecasts for the initial three years for licensing for the November PRWG meeting and commissioned market research for consideration at the next PRWG meeting.
The office was awaiting a response from another organisation to see whether it would jointly engage with the First Tier Tribunal to reduce costs.
Legal Counsel had been instructed to review and update rules. The office would issue a consultation on the licensing and associated rules that needed to change to incorporate licensing.
The PRWG had decided to adopt the low forecast in the budget for take up of ABS entities in 2017. The Board agreed this recommendation. The Board agreed that the office develop mitigating action for the deficit generated by the low forecast to be considered by PRWG.
An additional Board meeting may be needed to approve the licensing application. The Board agreed that approval be delegated to a smaller number of Board members.
Entity Regulation
The application made to the Disclosure and Barring Service (DBS) to enable the organisation to carry out a standard DBS check had been approved. The Board agreed the recommendation from the PRWG for a fee of £42 to be charged for a standard check.
Professional Indemnity Insurance (PII)
A meeting had been held with the LSB on run-off in October 2015. The LSB had expressed interest in the research carried out by CILEx Regulation. The Office had submitted a report on run-off to the LSB in December 2015. The Board were provided with an action plan which had been reviewed by the PRWG.
Anti-money laundering
CILEx had become an Anti-Money Laundering (AML) supervisor in January 2015. The Board were made aware of recent reports, changes to legislation and future consultations on the role of supervisors.
8 CAPACITY AND CAPABILITY
Resources review
CILEx Regulation had appointed a Head of Policy & Governance and Personal Assistant to the CEO, Chair and Senior Management Team.
The CILEx Finance and Remuneration Standing Committee (FRSC) had requested further information from CILEx Regulation on its budgetary requirements for 2016. The Board approved the CILEx Regulation report to the FRSC and was advised that the FRSC was satisfied with the additional information provided and would recommend CILEx Regulation's budget for approval by Council at its November meeting.
The Board were provided with details of how remaining areas would be resourced. This included the Education and Policy Manager role where work would be allocated on a project consultancy basis. CILEx Regulation had identified the need for a part-time marketing and communications role.
A review of the mid-tier management structure would be undertaken to ensure skills, knowledge and expertise were best utilised, developed and retained in line with budgets. CILEx Regulation had introduced a number of new procedures to improve and extend financial capabilities, which included improved budget setting, reporting and monitoring mechanisms, to help identify the true cost of regulation.
Regulatory Standards Self-Assessment
The regulatory standards self-assessment had been completed and submitted to the LSB in October 2015. The LSB had confirmed it would be in touch in January 2016 to arrange a meeting to discuss its analysis of the selfassessment.
An independent audit of the self-assessment had been carried out. The Board agreed to receive the report at a later date.
Protocols and Service Level Agreements (SLA) with CILEx Compensation Fund
A draft of protocols and service level agreements (SLAs) between the CILEx Compensation Fund, CILEx Regulation and CILEx had been developed. It was shared with the Compensation Fund Board and the office was awaiting their initial feedback.
David Gilbertson had provided comments on behalf of the Board which would be incorporated into the next draft.
Business Plan 2015
The Business Plan for 2015 had been updated to record work since the last Board meeting. The text, in the updated progress section had been developed to provide more detail, as requested by the Board.
The Board noted progress of action against the business plan.
9 BOARD PERFORMANCE REVIEW
The Board agreed the timetable for 2015 self-assessment which would be online. The Board agreed a list of individuals who would be invited to take part in the survey.
Terms of reference for a wider governance review focusing on Board performance arrangements were agreed. The review would be led by David Gilbertson and supported by the Head of Policy and Governance. The purpose was to capture the views of Board members, review best practice in comparable organisations and to make recommendations on Portfolio structure and arrangements, individual Board member appraisal and the Board's annual self-evaluation.
10 FINANCIAL REPORT AND BUDGET
CILEx Regulation Budget 2016
At the October 2015 Board meeting a revised 2016 budget had been presented for Board approval. This budget went to FRSC in October where it was reviewed in conjunction with the other CILEx Group company 2016 budgets.
FRSC requested that CILEx Regulation prepare a revised budget and supporting narrative. The second draft of the revised budget identified additional cost savings made since the first draft. Additional costs savings included staff costs, entity regulation and practice rights. Work was being carried out to identify further cost savings that the office may be able to achieve.
The Board approved the second draft of the revised budget for 2016 for inclusion within the 2016 CILEx Group budget.
Three and Five year Entity Regulation Forecasts
The finance team had produced three year forecasts for entity regulation. The forecasts had been compiled for the Board to review and consider action to reduce the net cost to the business, or improve income streams to help offset the cost of entity regulation.
The PRWG decided at its November meeting to recommend to the Board that the low scenarios should be incorporated in CILEx Regulation forecasts as a whole. This recommendation was made on the basis that it reflected low numbers of entity regulation.
The Board approved PRWG recommendations that the low scenario should be adopted within the CILEx group forecasts. The Board agreed to keep the viability of entity regulation under review.
Work Based Learning Fees (WBL)
CILEx Regulation charged a £150 fee for WBL applications to achieve Fellow status. This fee had remained at £150 for a number of years. The Finance team had carried out detailed analysis to calculate assessment costs.
The Board had considered a number of scenarios and voted by a majority to increase the WBL fee to £350 per portfolio from 1 April 2016.
The Board closely debated the fee increase because of the impact it would have on CILEx members. However the fee had not changed for a number of years and was based on the previous Fellowship process.
Qualifying Employment
QE fees had remained at £35 for a number of years.
The Board considered a number of scenarios and approved increments below, over the next five years.
```
Year 1 - £70 (100% increase) Year 2 - £105 (50% increase) Year 3 - £125 (20% increase) Year 4 - £140 (11% increase) Year 5 - £150 (7% increase)
```
2015 Financial Report
The Board reviewed the management accounts to the end of September and the profit and loss forecast to the end of 2015. Management accounts provided actual and budget figures to the end of September 2015.
Total income was below budget to September as there were lower revised figures on practice rights and entity regulation. Total income for the full year was under budget and direct expenditure was close to budget.
11 EDUCATION AND STANDARDS
Update on Quality Assurance Scheme for Criminal Advocacy (QASA) implementation
The Joint Advocacy Group (JAG) had issued a consultation on the changes to the QASA due to close on 24 December 2015 after which an application would be made to the LSB for approval of the changes. The changes were those needed following the decision of the Supreme Court.
QASA would impact on CILEx Regulation litigation rules, advocacy rules and associate prosecutor scheme rules.
The Board agreed that the office update the advocacy rules and submit them to LSB for approval as a part of the submission to be made by JAG for approval of QASA.
Youth Court Advocacy review
The review commissioned by the BSB and CILEx Regulation into the quality of advocacy in the Youth Courts had concluded. A draft report had been circulated in the summer for comment by the BSB and CILEx Regulation and provided to the Board's September meeting.
The key findings of the final report showed that the infrastructure and proceedings of the Youth Courts needed investment and that advocates did not receive enough training in or have enough knowledge of Youth Court procedures and the needs of young people involved in cases in the Youth Court.
The Board agreed:
that the training of CILEx advocates and litigators be reviewed in the light of the research report;
recommendations be drafted addressing the issues identified by the review;
and recommendations be submitted for consideration by the LETR Working Group.
Ethics in Advocacy
CILEx advocates and Fellows specialising in civil litigation had been invited to take part in research being carried out by the Advocacy Training Council and funded by the Legal Education Foundation to examine advocates' treatment of ethical issues.
A limited number of CILEx advocates met the criteria for the research so the final report would not provide valuable feedback on the effectiveness of the current CILEx approach to ethics training. The Board noted that the project was scheduled to complete by the end of 2015.
Vulnerable witness project
CILEx and CILEx Regulation had participated in the Advocates Gateway (TAG) project to develop toolkits for working with vulnerable witnesses.
Former Board member Thelma Brown had represented CILEx Regulation at TAG. The Board agreed that the office attend future meetings of TAG.
Trailblazer Apprenticeships
Three law standards had been developed for the Trailblazer scheme: paralegal, Chartered Legal Executive and solicitor. The standards had been approved in August 2014 and assessment plans approved in September 2015.
The end point assessment application was being developed by CILEx and would be submitted to the Skills Funding Agency for consideration at the end of November.
Further development work was required around the assessment plans for the paralegal and the Chartered Legal Executive Trailblazers to finalise the details around end point assessment.
12 ENFORCEMENT
Developments
The Board noted performance against KPIs, successes and opportunities and risks in Enforcement work.
The Rehabilitation of Offenders Act 1974 and Data Protection Act 1998
Members of the investigation team had attended a training seminar presented by NACRO, a charity providing pathways for social inclusion and reducing crime. As a result staff had been alerted to S56 of the Data Protection Act 1998 introduced on 10 March 2015 to protect individuals with criminal convictions and cautions so they can benefit fully from the Rehabilitation of Offenders Act 1974.
As a result of the training seminar CILEx Regulation had taken the following action:
- asked the Clerk to the PCP to advise panel members that they cannot compel a member or applicant to disclose a conviction or caution to a referee before they will accept the content of a reference;
- provided advice to the Clerk to the PCP that any disclosure of sensitive personal data will be provided either by way of the basic Disclosure Scotland report or the standard DBS report;
- removed all reference to requests for subject access reports, memorandum of convictions and notifying referees of convictions and cautions from the website and standard letters;
- advised the Practice Advice Team at CILEx of the change in order to manage customer calls.
- informed the Entity Authorisation and Supervision Team which was applying for authority to become a registered organisation with the Disclosure Barring Service, of the additional disclosures required. There was a minimum requirement of 100 disclosure reports and this will improve our chances of meeting this minimum requirement.
CPD non-compliance update
The Practitioner Authorisation and Supervision Team had referred members of the regulated community with outstanding CPD for 2012/2013 and 2013/2014 to the Investigation Team for misconduct action. The Board were provided with a summary of the current figures and action plan.
ABS licensing application
The office had begun a review of the Investigation, Disciplinary and Appeals Rules (IDAR) as a result of the ABS licensing application. The new IDAR would incorporate additional powers within the Entity Authorisation and Supervision Team. The IDAR Handbook would need to be updated to incorporate these changes when they came into effect.
13 CONSUMER AND STAKEHOLDER ENGAGEMENT
Consumer Action plan
The Board noted progress against the Consumer Engagement Action Plan 2015. Work was in hand to develop the Consumer Engagement Action Plan 2016. It would be finalised following the strategy meeting for presentation to the Board's January meeting.
Pro bono
In June 2015 the Lord Chancellor had given a keynote speech suggesting that improvement in access to justice might be addressed by increased pro bono provision. This was viewed as a suggestion that the<cursor_is_here>
Andrew Donovan had represented CILEx Regulation at a regulators' panel event launching 2015 National Pro Bono Week. Andrew had highlighted that CILEx Regulation already had a principles based, outcomes focused Code of Conduct which did not limit pro bono activity over and above the restrictions in the Legal Services Act 2007.
The Board noted that CILEx Regulation required no further deregulation to facilitate pro bono.
Unbundling legal services
The Legal Services Consumer Panel (the Panel) had carried out research into unbundled legal services. The Board noted the Panel's policy brief.
In September the Consumer Panel had convened a workshop to bring together regulators, researchers, representatives and advice-giving bodies. This had been an opportunity to provide an information exchange and to share learning around different aspects of unbundled legal services. They considered a report of the outcomes of the workshop.
CILEx Regulation would hold a workshop with consumer organisations to explore issues on unbundling. The Panel would also provide a tailored training package based on individual organisations.
Consumer research joint work
The Board noted the minutes of the Regulators' Forum. Consideration was given to the outcomes of the meeting held in August 2015 at which it was agreed that there should be a joint approach towards research and consumer engagement on client care letters.
It was agreed that a sub-group would begin scoping out the project. The office would contact the Bar Standards Board to arrange a meeting to take the work forward.
14 INFORMATION ITEMS
The Board noted the following:
a summary of open and closed consultations;
minutes of the CILEx and CILEx Regulation Futures Group Meeting held on 24 September 2015;
minutes of the Practice Regulation Working Group meeting held on 17 September 2015;
minutes of the Admissions and Licensing Committee meetings held on 3 June 2015, 22 July 2015 and 2 September 2015;
minutes of the Strategic Risk Committee meeting held on 22 September 2015.
15 AOB
The Board agreed to streamline the CILEx Regulation Annual Report for 2015. The office would commence work on the Annual Report.
The Board noted that a business case was being developed for CILEx and CILEx Regulation to pursue escrow provisions.
16 DATE OF NEXT MEETING
28 January 2016 at 9:30am.
SAM YOUNGER CHAIRMAN
</text>
|
[
{
"content": "<url>\nhttps://cilexregulation.org.uk/wp-content/uploads/2019/01/CILEx-Regulation-Board-minutes-December-2015-2.pdf\n</url>\n<text>\nMINUTES OF THE MEETING OF THE BOARD OF DIRECTORS OF CILEx REGULATION LIMITED HELD ON 3 DECEMBER 2015 AT BOX END PARK, KEMPSTON, BEDFORD, MK43 8RQ\n\nPresent:\n\nSam Younger (Chair), Patrick Bligh-Cheesman, Andrew Donovan, Luisa Fulci, David Gilbertson, Harvey Sandercock\n\nIn attendance:\n\nBaljeet Basra, Chief Operating Officer, CILEx Regulation Shazrin Begum, Governance and Consultations Officer, CILEx Regulation Karl Cerski, Finance Director, CILEx (Item 10) Jill Durham, Head of Policy and Governance, CILEx Reglation David Edwards, President, CILEx Laura Gadsby, Management Accountant, CILEx Regulation (Items 5-15) Mandeep Nagra, Client Protection Manager, CILEx Regulation (Item 7), David Pope, Entity Authorisation and Supervision Manager, CILEx Regulation (Item 7) Joanne Stringer, Practitioner Authorisation and Supervision Manager, CILEx Regulation (Item 6) Helen Whiteman, Chief Executive Officer, CILEx Regulation\n\n1 APOLOGIES FOR ABSENCE\n\nThere were apologies for absence from Ian Chivers.\n\n2 DECLARATIONS OF INTEREST\n\nThere were no declarations of interest.\n\n3 MINUTES\n\nThe minutes of the CILEx Regulation Board meeting held on 1 October 2015 were approved as a true record.\n\n4 STRATEGY MEETING\n\nThe Chair summarised the outcomes from the previous day's Strategy meeting. It was agreed that the office would focus on the following core strands:\n\ngrowth of the organisation, practice rights, entity regulation and progressing with the ABS application;\n review of process, structure, governance and IT;\n identification of unique selling points and the future of the regulatory landscape. Review of the legislative options paper and formulation of an organisational response.\n\nThe above three elements would appear as a standing item in future Board agendas.\n\nThe CEO was asked to produce proposals over the coming months for income generation. The CEO confirmed that work-based learning (WBL) and qualifying employment (QE) were subject to a governance review.\n\n5 BUSINESS DEVELOPMENT\n\nPractice Rights and Entity regulation\n\nCILEx had produced a report on promotion of practice rights which would be reviewed by the Practice Regulation Working Group (PRWG). Practice rights roadshows had generated interest. The PRWG would view the record of enquiries and follow up action to ensure that enquiries convert to applications.\n\nProfile Raising and leading on sector developments\n\nThe office had engaged in a number of initiatives aimed at raising the profile of CILEx Regulation and shaping the direction of key sector developments. The activities promoted the recognition of CILEx Regulation and therefore improved its position in the market.\n\nMarketing activity\n\nThe office had continued its marketing activity through e-shots, direct mailings to members and increased use of LinkedIn and Twitter. The office would develop a schedule of e-shot content for early 2016. The office had also started improving templates for e-shots and direct mailings.\n\nThe Board considered a marketing report which identified the response rate to marketing activity.\n\n6 PRACTITIONER AUTHORISATION AND SUPERVISION\n\nDevelopments\n\nThe Board noted performance against KPIs, the successes, opportunities and risks of Practitioner authorisation work. This included updates on practice rights, qualifying employment, work based learning, advocacy and CPD noncompliance.\n\nWork Based Learning (WBL) Review\n\nWorkshops had been held with staff that assessing WBL applications and external advisors. The workshops explored areas where the outcomes could be redrafted, merged, deleted or new methods of assessment introduced.\n\nThe Board were provided with the proposals to:\n\n Require outcomes that currently have to be met three times to be met twice;\n merge some outcomes, where there is duplication in how applicants meet the outcomes;\n introduce new methods for meeting some outcomes – employers' statement or assessors' view.\n\nThe Board noted administrative changes being made.\n\nThe changes to the outcomes will require approval by the LSB before they can be implemented. Prior to an application to the LSB, a consultation is needed with key stakeholders.\n\nThe Board were provided with a project plan which had been developed for the next stages of the work; this would involve seeking views of the LETR WG as the WBL outcomes form part of the Fellows Day One Outcomes.\n\nThe Board agreed for the office to act in accordance with the project plan to progress the changes to the WBL outcomes and agree the proposal for revisions to the WBL scheme. The Board requested for the WBL proposals to be consulted at green paper level, where CILEx Regulation encouraged discussion from stakeholders.\n\n7 ENTITY AUTHORISATION AND SUPERVISION\n\nDevelopments\n\nThe Board noted the Entity Authorisation and Supervision team's performance against KPI, and a report on successes, opportunities and risks on entity work.\n\nAlternative Business Structures\n\nThe licensing application was on track for submission in early 2016. The office had produced profit and loss forecasts for the initial three years for licensing for the November PRWG meeting and commissioned market research for consideration at the next PRWG meeting.\n\nThe office was awaiting a response from another organisation to see whether it would jointly engage with the First Tier Tribunal to reduce costs.\n\nLegal Counsel had been instructed to review and update rules. The office would issue a consultation on the licensing and associated rules that needed to change to incorporate licensing.\n\nThe PRWG had decided to adopt the low forecast in the budget for take up of ABS entities in 2017. The Board agreed this recommendation. The Board agreed that the office develop mitigating action for the deficit generated by the low forecast to be considered by PRWG.\n\nAn additional Board meeting may be needed to approve the licensing application. The Board agreed that approval be delegated to a smaller number of Board members.\n\nEntity Regulation\n\nThe application made to the Disclosure and Barring Service (DBS) to enable the organisation to carry out a standard DBS check had been approved. The Board agreed the recommendation from the PRWG for a fee of £42 to be charged for a standard check.\n\nProfessional Indemnity Insurance (PII)\n\nA meeting had been held with the LSB on run-off in October 2015. The LSB had expressed interest in the research carried out by CILEx Regulation. The Office had submitted a report on run-off to the LSB in December 2015. The Board were provided with an action plan which had been reviewed by the PRWG.\n\nAnti-money laundering\n\nCILEx had become an Anti-Money Laundering (AML) supervisor in January 2015. The Board were made aware of recent reports, changes to legislation and future consultations on the role of supervisors.\n\n8 CAPACITY AND CAPABILITY\n\nResources review\n\nCILEx Regulation had appointed a Head of Policy & Governance and Personal Assistant to the CEO, Chair and Senior Management Team.\n\nThe CILEx Finance and Remuneration Standing Committee (FRSC) had requested further information from CILEx Regulation on its budgetary requirements for 2016. The Board approved the CILEx Regulation report to the FRSC and was advised that the FRSC was satisfied with the additional information provided and would recommend CILEx Regulation's budget for approval by Council at its November meeting.\n\nThe Board were provided with details of how remaining areas would be resourced. This included the Education and Policy Manager role where work would be allocated on a project consultancy basis. CILEx Regulation had identified the need for a part-time marketing and communications role.\n\nA review of the mid-tier management structure would be undertaken to ensure skills, knowledge and expertise were best utilised, developed and retained in line with budgets. CILEx Regulation had introduced a number of new procedures to improve and extend financial capabilities, which included improved budget setting, reporting and monitoring mechanisms, to help identify the true cost of regulation.\n\nRegulatory Standards Self-Assessment\n\nThe regulatory standards self-assessment had been completed and submitted to the LSB in October 2015. The LSB had confirmed it would be in touch in January 2016 to arrange a meeting to discuss its analysis of the selfassessment.\n\nAn independent audit of the self-assessment had been carried out. The Board agreed to receive the report at a later date.\n\nProtocols and Service Level Agreements (SLA) with CILEx Compensation Fund\n\nA draft of protocols and service level agreements (SLAs) between the CILEx Compensation Fund, CILEx Regulation and CILEx had been developed. It was shared with the Compensation Fund Board and the office was awaiting their initial feedback.\n\nDavid Gilbertson had provided comments on behalf of the Board which would be incorporated into the next draft.\n\nBusiness Plan 2015\n\nThe Business Plan for 2015 had been updated to record work since the last Board meeting. The text, in the updated progress section had been developed to provide more detail, as requested by the Board.\n\nThe Board noted progress of action against the business plan.\n\n9 BOARD PERFORMANCE REVIEW\n\nThe Board agreed the timetable for 2015 self-assessment which would be online. The Board agreed a list of individuals who would be invited to take part in the survey.\n\nTerms of reference for a wider governance review focusing on Board performance arrangements were agreed. The review would be led by David Gilbertson and supported by the Head of Policy and Governance. The purpose was to capture the views of Board members, review best practice in comparable organisations and to make recommendations on Portfolio structure and arrangements, individual Board member appraisal and the Board's annual self-evaluation.\n\n10 FINANCIAL REPORT AND BUDGET\n\nCILEx Regulation Budget 2016\n\nAt the October 2015 Board meeting a revised 2016 budget had been presented for Board approval. This budget went to FRSC in October where it was reviewed in conjunction with the other CILEx Group company 2016 budgets.\n\nFRSC requested that CILEx Regulation prepare a revised budget and supporting narrative. The second draft of the revised budget identified additional cost savings made since the first draft. Additional costs savings included staff costs, entity regulation and practice rights. Work was being carried out to identify further cost savings that the office may be able to achieve.\n\nThe Board approved the second draft of the revised budget for 2016 for inclusion within the 2016 CILEx Group budget.\n\nThree and Five year Entity Regulation Forecasts\n\nThe finance team had produced three year forecasts for entity regulation. The forecasts had been compiled for the Board to review and consider action to reduce the net cost to the business, or improve income streams to help offset the cost of entity regulation.\n\nThe PRWG decided at its November meeting to recommend to the Board that the low scenarios should be incorporated in CILEx Regulation forecasts as a whole. This recommendation was made on the basis that it reflected low numbers of entity regulation.\n\nThe Board approved PRWG recommendations that the low scenario should be adopted within the CILEx group forecasts. The Board agreed to keep the viability of entity regulation under review.\n\nWork Based Learning Fees (WBL)\n\nCILEx Regulation charged a £150 fee for WBL applications to achieve Fellow status. This fee had remained at £150 for a number of years. The Finance team had carried out detailed analysis to calculate assessment costs.\n\nThe Board had considered a number of scenarios and voted by a majority to increase the WBL fee to £350 per portfolio from 1 April 2016.\n\nThe Board closely debated the fee increase because of the impact it would have on CILEx members. However the fee had not changed for a number of years and was based on the previous Fellowship process.\n\nQualifying Employment\n\nQE fees had remained at £35 for a number of years.\n\nThe Board considered a number of scenarios and approved increments below, over the next five years.\n\n```\nYear 1 - £70 (100% increase) Year 2 - £105 (50% increase) Year 3 - £125 (20% increase) Year 4 - £140 (11% increase) Year 5 - £150 (7% increase)\n```\n\n2015 Financial Report\n\nThe Board reviewed the management accounts to the end of September and the profit and loss forecast to the end of 2015. Management accounts provided actual and budget figures to the end of September 2015.\n\nTotal income was below budget to September as there were lower revised figures on practice rights and entity regulation. Total income for the full year was under budget and direct expenditure was close to budget.\n\n11 EDUCATION AND STANDARDS\n\nUpdate on Quality Assurance Scheme for Criminal Advocacy (QASA) implementation\n\nThe Joint Advocacy Group (JAG) had issued a consultation on the changes to the QASA due to close on 24 December 2015 after which an application would be made to the LSB for approval of the changes. The changes were those needed following the decision of the Supreme Court.\n\nQASA would impact on CILEx Regulation litigation rules, advocacy rules and associate prosecutor scheme rules.\n\nThe Board agreed that the office update the advocacy rules and submit them to LSB for approval as a part of the submission to be made by JAG for approval of QASA.\n\nYouth Court Advocacy review\n\nThe review commissioned by the BSB and CILEx Regulation into the quality of advocacy in the Youth Courts had concluded. A draft report had been circulated in the summer for comment by the BSB and CILEx Regulation and provided to the Board's September meeting.\n\nThe key findings of the final report showed that the infrastructure and proceedings of the Youth Courts needed investment and that advocates did not receive enough training in or have enough knowledge of Youth Court procedures and the needs of young people involved in cases in the Youth Court.\n\nThe Board agreed:\n\n that the training of CILEx advocates and litigators be reviewed in the light of the research report;\n recommendations be drafted addressing the issues identified by the review;\n and recommendations be submitted for consideration by the LETR Working Group.\n\nEthics in Advocacy\n\nCILEx advocates and Fellows specialising in civil litigation had been invited to take part in research being carried out by the Advocacy Training Council and funded by the Legal Education Foundation to examine advocates' treatment of ethical issues.\n\nA limited number of CILEx advocates met the criteria for the research so the final report would not provide valuable feedback on the effectiveness of the current CILEx approach to ethics training. The Board noted that the project was scheduled to complete by the end of 2015.\n\nVulnerable witness project\n\nCILEx and CILEx Regulation had participated in the Advocates Gateway (TAG) project to develop toolkits for working with vulnerable witnesses.\n\nFormer Board member Thelma Brown had represented CILEx Regulation at TAG. The Board agreed that the office attend future meetings of TAG.\n\nTrailblazer Apprenticeships\n\nThree law standards had been developed for the Trailblazer scheme: paralegal, Chartered Legal Executive and solicitor. The standards had been approved in August 2014 and assessment plans approved in September 2015.\n\nThe end point assessment application was being developed by CILEx and would be submitted to the Skills Funding Agency for consideration at the end of November.\n\nFurther development work was required around the assessment plans for the paralegal and the Chartered Legal Executive Trailblazers to finalise the details around end point assessment.\n\n12 ENFORCEMENT\n\nDevelopments\n\nThe Board noted performance against KPIs, successes and opportunities and risks in Enforcement work.\n\nThe Rehabilitation of Offenders Act 1974 and Data Protection Act 1998\n\nMembers of the investigation team had attended a training seminar presented by NACRO, a charity providing pathways for social inclusion and reducing crime. As a result staff had been alerted to S56 of the Data Protection Act 1998 introduced on 10 March 2015 to protect individuals with criminal convictions and cautions so they can benefit fully from the Rehabilitation of Offenders Act 1974.\n\nAs a result of the training seminar CILEx Regulation had taken the following action:\n\n- asked the Clerk to the PCP to advise panel members that they cannot compel a member or applicant to disclose a conviction or caution to a referee before they will accept the content of a reference;\n- provided advice to the Clerk to the PCP that any disclosure of sensitive personal data will be provided either by way of the basic Disclosure Scotland report or the standard DBS report;\n- removed all reference to requests for subject access reports, memorandum of convictions and notifying referees of convictions and cautions from the website and standard letters;\n- advised the Practice Advice Team at CILEx of the change in order to manage customer calls.\n- informed the Entity Authorisation and Supervision Team which was applying for authority to become a registered organisation with the Disclosure Barring Service, of the additional disclosures required. There was a minimum requirement of 100 disclosure reports and this will improve our chances of meeting this minimum requirement.\n\nCPD non-compliance update\n\nThe Practitioner Authorisation and Supervision Team had referred members of the regulated community with outstanding CPD for 2012/2013 and 2013/2014 to the Investigation Team for misconduct action. The Board were provided with a summary of the current figures and action plan.\n\nABS licensing application\n\nThe office had begun a review of the Investigation, Disciplinary and Appeals Rules (IDAR) as a result of the ABS licensing application. The new IDAR would incorporate additional powers within the Entity Authorisation and Supervision Team. The IDAR Handbook would need to be updated to incorporate these changes when they came into effect.\n\n13 CONSUMER AND STAKEHOLDER ENGAGEMENT\n\nConsumer Action plan\n\nThe Board noted progress against the Consumer Engagement Action Plan 2015. Work was in hand to develop the Consumer Engagement Action Plan 2016. It would be finalised following the strategy meeting for presentation to the Board's January meeting.\n\nPro bono\n\nIn June 2015 the Lord Chancellor had given a keynote speech suggesting that improvement in access to justice might be addressed by increased pro bono provision. This was viewed as a suggestion that the<cursor_is_here>\n\nAndrew Donovan had represented CILEx Regulation at a regulators' panel event launching 2015 National Pro Bono Week. Andrew had highlighted that CILEx Regulation already had a principles based, outcomes focused Code of Conduct which did not limit pro bono activity over and above the restrictions in the Legal Services Act 2007.\n\nThe Board noted that CILEx Regulation required no further deregulation to facilitate pro bono.\n\nUnbundling legal services\n\nThe Legal Services Consumer Panel (the Panel) had carried out research into unbundled legal services. The Board noted the Panel's policy brief.\n\nIn September the Consumer Panel had convened a workshop to bring together regulators, researchers, representatives and advice-giving bodies. This had been an opportunity to provide an information exchange and to share learning around different aspects of unbundled legal services. They considered a report of the outcomes of the workshop.\n\nCILEx Regulation would hold a workshop with consumer organisations to explore issues on unbundling. The Panel would also provide a tailored training package based on individual organisations.\n\nConsumer research joint work\n\nThe Board noted the minutes of the Regulators' Forum. Consideration was given to the outcomes of the meeting held in August 2015 at which it was agreed that there should be a joint approach towards research and consumer engagement on client care letters.\n\nIt was agreed that a sub-group would begin scoping out the project. The office would contact the Bar Standards Board to arrange a meeting to take the work forward.\n\n14 INFORMATION ITEMS\n\nThe Board noted the following:\n\n a summary of open and closed consultations;\n minutes of the CILEx and CILEx Regulation Futures Group Meeting held on 24 September 2015;\n minutes of the Practice Regulation Working Group meeting held on 17 September 2015;\n minutes of the Admissions and Licensing Committee meetings held on 3 June 2015, 22 July 2015 and 2 September 2015;\n minutes of the Strategic Risk Committee meeting held on 22 September 2015.\n\n15 AOB\n\nThe Board agreed to streamline the CILEx Regulation Annual Report for 2015. The office would commence work on the Annual Report.\n\nThe Board noted that a business case was being developed for CILEx and CILEx Regulation to pursue escrow provisions.\n\n16 DATE OF NEXT MEETING\n\n28 January 2016 at 9:30am.\n\nSAM YOUNGER CHAIRMAN\n</text>\n",
"role": "user"
},
{
"content": " government may impose obligations on lawyers to carry out pro bono work.",
"role": "assistant"
}
] |
ARLIS/New York News
The Newsletter of the Art Libraries Society of North America/New York Metro Chapter
Vol. 26, No. 3-4
ISSN 0894-3133
Fall 2005
Election Results
Editors' Note
Chapter Secretary Tony White reports the results of the recent election for new chapter officers for 2006:
Vice Chair/Chair-Elect: Zimra Panitz
Treasurer: Meg Black
Member-at-Large for Membership: Eric Wolf
53% of the ballots were returned by the stated post mark deadline. (105 of the 198 ballots sent out.)
Hearty congratulations to our new officers, and to the other candidates who ran, Holly Hatheway and Charlotte Priddle.
Holiday Party
The annual ARLIS/NY holiday party will be held on Wednesday, December 7, 6–8pm. Our venue this year is sure to delight. The Accompanied Library at the National Arts Club is an intimate private library and writers' club located on beautiful Gramercy Park.
15 Gramercy Park South, Studio 6C
212-979-5313 http://www.accompaniedlibrary.com
Subway: 6, N, R to 23 St.
Bus: M1, 2, 3, 6, 7, 101, 102, 103 to 20 St.
From lobby, proceed to rear of building. Take elevator to 6th floor. Please use the lobby coat room. Please arrive by 6.30pm.
Light refreshments and drinks will be served.
The Accompanied Library would welcome the gift of an unusual book: literature or nonfiction, preferably hardcover.
RSVP to [email protected].
By James Mitchell and Alexandra de Luise
Some of you may have noticed that the Fall issue was not sent out at its regular time. Due to unfortunate production difficulties we were delayed with that issue, and have had to combine it with coverage of more recent events in this issue.
Our 2005 Chapter Chair, Ken Soehner, has done such an outstanding job of organizing interesting and informative programs this year, we have barely been able to keep up. Included in this issue are reports on many of the events from the summer and fall. We regret that we were not able to also report on the RLG presentation at the Metropolitan in October, and the tour Tony White organized at Yale last month, featuring his exhibition "Production not Reproduction: the History of Offset Printed Artists' Books."
We are looking forward to another eventful year in 2006. Our thanks again to Ken for his tremendous work as Chair, with hopes that he will continue to assist as unofficial Entertainment Coordinator next year.
Inside this issue:
Reports on recent events, including:
Artists' Books Conference at Wellesley College
Pratt students summer in Florence
Chapter visits to the Knoedler Gallery, ICP, the Brooklyn Museum, and more.
And Member News!
2004 ARLIS/NY Executive Board
Chair Ken Soehner
Vice-Chair Jenny Tobias
Past-ChairJudy Connorton
Secretary Tony White
Treasurer Caitlin Kilgallen
Members at Large
MembershipErin Elliott
AdvertisingFaith Pleasanton
Newsletter Editors
Alexandra de Luise
James Mitchell
Website ManagerSuzannah Massen
ARLIS/NA Northeast Regional
Representative
Carol Graney
ARLIS/New York News
Volume 26, Number 3-4, Fall/Winter 2005 ISSN 0894-3133
Contributors
Karyn Hinkle, Viktoria Paranyuk, Amy Schwarz, Jenny Tobias, Tony White.
The ARLIS/NY Newsletter is published quarterly by the Art Libraries Society of New York, a regional chapter of the Art Libraries Society of North America, 329 March Road, Suite 232, Box 11, Kanata, Ontario K2K 2E1, Canada.
Copyright © 2005 by the Art Libraries Society of New York and individual authors.
This publication is distributed free of charge to members of ARLIS/NY. Membership dues are $20.00 for the calendar year.
Send renewals, changes of address, and contributions to Erin Elliott, Membership Coordinator, ARLIS/NY, Bard Graduate Center, 38 West 86 St, New York, NY 10024.
Announcements, articles, and artwork are welcome. Send to Alexandra de Luise, Queen's College, Flushing, NY 11367, [email protected]; or to James Mitchell, [email protected].
Advertising Manager: Faith Pleasanton,
212-650-2857, [email protected].
Copy deadline for vol. 27, no. 1 (Spring 2006): March 3, 2006.
The New Museum of Contemporary Art
On September 7th ARLIS members were treated to a reception and special viewing of "Point of View: A Contemporary Anthology of the Moving Image," a DVD box set featuring new art works by 11 contemporary international artists. Our thanks to Ceci Moss, Point of View Sales Director at the New Museum, and to Lauren Cornell, Executive Director of Rhizome.org, who spoke on the concurrent exhibition, "Rhizome Artbase 101." And to all of the staff of the museum who helped welcome us to Chelsea.
For information on DVD sales, contact Ms. Moss at [email protected].
Still from Francis Alys' El Gringo (2003), part of "Point of View."
Image courtesy of the New Museum of Contemporary Art.
Photos by James Mitchell
Mark di Suvero at Knoedler's, July 14
By James Mitchell
On July 14 a large but indeterminate crowd of ARLIS librarians and their friends braved the heat and humidity to visit the venerable Knoedler Gallery on East 70 th Street for a special viewing of their exhibition "Mark di Suvero: Indoors." It was well worth the effort. The artist himself was present, and spoke to the guests after a short tour of the gallery's library.
Edye Weissler, librarian, and Ann Freedman, President of Knoedler & Company, hosted the event. Edye graciously led some members through the upstairs library — a curious and utterly charming warren of rooms that somehow did not seem to have been designed originally to house a library. After Edye's description of the history of the gallery, and the library's current operations and collections, Mr. di Suvero joined us to talk about his work and his love of libraries. He cheerfully took questions from the crowd, and mentioned that his daughter has recently expressed an interest in becoming a librarian. Surely an appropriate internship could be found for her.
The artworks displayed on the main floor were quite wonderful. This author was not already very familiar with di Suvero's work, but was fascinated by the smaller, intricate sculptures. Thick twisted sheets of metal seemed to have been torn by hand into intricate shapes, with carefully balanced spinning pieces. We greatly enjoyed the rare opportunity to "touch the art." There was one mishap when one of the works fell off its axis, but no one seemed to mind terribly. So the party continued.
Sparkling and white wine were provided, as well as complimentary copies of the exhibition catalogue. We were also pleased to welcome Roberto Ferrari, recently arrived from Florida, as a new ARLIS/NY chapter member.
Photos on page 2.
Artists' Books as Catalyst
By Tony White
Artists' Books Conference
Wellesley College, Wellesley, Massachusetts. June 15–18, 2005
From June 15–18, 2005, Wellesley College hosted the Artists' Books Conference (ABC), bringing together librarians, artists, curators, private collectors, professors and book dealers. Over 200 people attended this four-day event that covered topics such as collecting artists' books, the business of artists producing these books and related pedagogical aspects of this genre.
This is at least the third independently organized conference on artists' books to be held in the past two years. Wells College in Aurora, New York, organized a symposium titled "Matter & Spirit: The Genesis & Evolution of the Book," held from April 29–May 2, 2004. More recently, the Southern California Chapter of the Art Libraries Society of North America organized a conference held in Los Angeles, from May 21–24, 2005: "Artists Books: Creating, Collecting, Cataloging, Conserving, Collaborating." At ABC, less emphasis was placed on critical analysis of topics; rather, most presentations retained an informal, conversational style that aided in sharing ideas and comments. Major issues were raised about the current genre of artists' books, the lack of critical writings about it and the profound challenge of expanding the artists' book community.
The opening keynote speaker, Betty Bright, founded the Minnesota Center for the Book Arts (MCBA) in 1985. Her book No Longer Innocent: the Book Arts in America, 1960 to 1980 will be published by Granary Press in September 2005. Bright's presentation, "To Have and To Hold: Why We Need Book Art," focused on historical aspects of private and institutional collecting in this country and the role of librarians and curators. She discussed the formation of early institutional library collections, notably those at the School of the Art Institute of Chicago, Atlanta College, the Museum of Modern Art and Virginia Commonwealth University. Bright divided the history of artists' books into four categories: fine press, deluxe editions, sculptural books and multiples. Increased awareness of archival materials in the production of artists' books was a noted topic of discussion.
The panel "Collecting in Private and Public Institutions" was moderated by Sandra Kroupa of the University of Washington, Seattle. The panelists represented both private and public institutional libraries, including Claremont College, Rhode Island School of Design, University of Wisconsin-Milwaukee and Boston Public Library. The significance and unique role of artists' books as pedagogical tools that are essential for students and faculty engaged in all areas of art, design, writing and architecture was noted. The panel "Private Collecting" was moderated by Sidney Berger, a faculty member at Simmons College in Boston and a private collector of artists' books. The two panelists, Robert Ruben of New York City and Duke Collier of Cambridge, MA, entertained the audience with PowerPoint presentations that described their personal motivations as collectors, and their relationships with artists, dealers and curators. Other elements discussed included managing budgets and how or if they make their collections available to others for exhibition.
Participants on the "The Business of Artists' Books" panel included Julie Chen, an independent book artist, Emily Larned, a representative from the art collective Booklyn Artists Alliance and Cynthia Imperatore, an independent bookseller. The moderator, Suzy Taraba of Wesleyan University, asked questions regarding how prices and edition sizes are set, what marketing strategies are used and what professional relationships are preferred and why (for example: artist/dealer, artist/librarian, dealer/librarian). The panel "Education in the Book Arts" included Steve Miller from University of Alabama as moderator and panelists Ken Botnick, Kitty Maryatt and Terry Chouniard who all teach and work at educational institutions. It was noted that most students lack a thorough background in typography, lettering and calligraphy.
The last day of the conference included a closing keynote presentation by Mark Dimunation, Chief of the Rare Book and Special Collection Division of the Library of Congress, titled "What Will Next Prove a Rose: The Thorny Side of Building the Nation's Collection of Book Arts," a discussion about the challenges of collecting, preserving and providing access to artists' books.
The conference committee took the opportunity to give special recognition to Claire Van Vliet, a pioneer book artist who made her first artist book in 1955 under the Janus Press imprint. As a conference keepsake, an accordion book that listed all Van Vliet books was presented and commissioned by Ruth Rogers, Special Collections Librarian of Wellesley College, and made by Jan Owen.
This essay first appeared, in a slightly different form, in Afterimage magazine. It is reproduced here by permission.
ARLIS/NY Visits ICP
By Amy Schwarz
The International Center of Photography (ICP) treated ARLIS/NY members, on August 22 nd , to a private viewing and presentation of the exhibition, "The Open Book: Photography in Book Form, 1870 – Present." Around 50 people attended—pretty impressive considering many members were away on summer vacation. ARLIS/NY President Ken Soehner introduced the hosts of the event, Deirdre Donohue, librarian, and Christopher Phillips, senior curator, at ICP.
Mr. Phillips began by pointing out the reverse chronology in the arrangement of photography books to complement the lower floor exhibition, "Young America. The Daguerreotypes of Southworth & Hawes." A traveling exhibition, "The Open Book" presented photography in book form by international artists, selected by an international jury, under the curator, Ute Eskildsen of the Folkwang Museum in Essen, Germany. Due to space, ICP showed 130 of the original 175 works exhibited. The catalog and text were prepared by Andrew Roth, and published by a major contributor to and co-presenter of the exhibition, the Hasselblad Center in Götenborg, Sweden. (The catalog sells for $49.95 at ICP's outstanding bookstore on photography.)
Mr. Phillips explained the selection of photo-books based on originality and content, reproduction quality and graphic layout, jacket design and binding. The books opened to the pages reproduced in the catalog, with a few exceptions chosen by the curator. He described the installation process at ICP: placing each book in a cradle to support the binding, putting together plexiglass display cases, and manipulating lighting to the best advantage. Wall labels were economically made with plain sheets of paper loosely attached to the walls, suggesting pages from a book.
Several artists' works were individually displayed in cases, such as: Ed Ruscha's running pictorial narrative, Every Building on the Sunset Strip; Nobuyoshi Araki's rare editions of self-published photocopied books; Hans-Peter Feldman's self-designed and published photo-books of ordinary, familiar scenes in life; and my favorite, El Lissitzky, the Russian constructivist painter whose book Industry of Socialism, with beautifully embossed covers, satisfied Stalin's propaganda requirements of the 1930s. Many renowned and less familiar photographer/artist's works were exhibited. With time to chat and consume the generous reception spread, the evening at ICP closed with plans to return.
Curator Christopher Phillips discussing some of the photo-books in a display case with ARLIS/NY members.
ARLIS/NY Fall 2005 Business Meeting
Reported by James Mitchell
The chapter met for its annual business meeting in the South Court of the NYPL Humanities and Social Sciences Library on October 24, 2005.
We were warmly welcomed by Clayton Kirking, Chief of Art Information Resources at the library, followed by introductory remarks by Chapter Chair Ken Soehner.
Erin Elliot reported on membership:
200 total members this year, up by 9 from 2004, and from only 133 in 2003.
This now includes 24 students, up from 12 last year; thanks especially to the recruitment efforts of Ken Soehner and Tony White, who are each teaching a section of the Art Librarianship class at the Pratt Institute. There are also a few student members from the library studies programs at Queens College and Rutgers.
Three new members in attendance introduced themselves, including Francine Snyder, Manager of the Library and Archive at the Guggenheim Museum.
Past-Chair Judy Connorton presented the Treasurer's report, subbing for Caitlin Kilgallen, who is on maternity leave. Current balance is $11,688.67.
Vice Chair Jenny Tobias announced the candidates for open chapter offices.
Vice Chair/Chair-Elect: Zimra Panitz [unopposed]
Treasurer: Meg Black and Holly Hatheway
Member-at-Large for Membership: Charlotte Priddle and Eric Wolf
The floor was opened for additional nominations, and none were received. If no more are received by Jenny by [soon], ballots will be mailed as such to all chapter members.
Jenny also mentioned that the board is considering proposing a bylaws revision to allow electronic voting. If so, it will be announced at next year's business meeting.
Ken Soehner returned to the podium to announce the few remaining chapter events for the year:
RLG representatives will make presentations at the Metropolitan Museum tomorrow morning on their arts-related databases and projects.
Tony White is organizing a trip to Yale to see his exhibition of offset-printed artists books, on Nov. 19.
The holiday party will be held Dec. 7 at the Accompanied Library in the National Arts Club building.
From the floor, AnnaMaria Poma-Swank also offered to host ARLIS members at an event at The Italian Academy for Advanced Studies in America, at Columbia University's Casa Italiana, where she is the librarian.
Jenny Tobias concluded the program with a short presentation on images of librarians in contemporary TV ads. Though most were from Europe, the use of traditional stereotypes made their messages more than clear. Librarians continue to be popularly portrayed as musty, old, slow, and desirous of silence. Young people hopped up on sugary treats continue to shake things up.
Followed by wine and cheese, and sandwiches, graciously hosted, and bartended, by Clayton Kirking, with a little help from Sharon Chickanzeff. Our thanks to them.
Pratt SILS in Florence
By Viktoria Paranyuk
For three weeks, May 28 to June 18, 2005, I attended the summer institute entitled "Florentine Art and Culture: Resources and Documentation" in Florence, Italy, offered by the School of Information and Library Science of Pratt Institute. The program was conceived and developed by AnnaMaria Poma-Swank, Adjunct Associate Professor at Pratt-SILS and Librarian at the Italian Academy for Advanced Studies in America, with the participation of Tula Giannini, Acting Dean of Pratt-SILS. It was developed in collaboration with Antonio Paolucci, Soprintendente per I Beni Artistici e Storici di Firenze, Pistoia e Prato, Claudio di Benedetto, Director of the Uffizi Library, and Antonia Ida Fontana, Director of the Biblioteca Nazionale Centrale di Firenze.
Fifteen participants, who came from different parts of the country, represented working academic, public, and special librarians as well as library and art history students. The intensive schedule consisted of lectures, seminars, and tours of libraries, archives, and museums in the morning and afternoon. Each day offered discovery and intellectual stimulation. The students had the privilege of hearing lectures from eminent professionals in the field of librarianship and museum research; among them were Claudio di Benedetto, Director of the Uffizi Library, Sabina Magrini from Biblioteca Medicea Laurenziana, and Beatrice Paolozzo Strozzi, Director of Museo del Bargello.
All students received access to the major research libraries, including Biblioteca Nazionale Centrale, the Library of Bernard Berenson's Villa I Tatti, and the Uffizi Library. The participants were also issued passes for the duration of the course that allowed free admission to any of the state museums of the Firenze Musei network. Thanks to AnnaMaria's close associations with her distinguished colleagues in Florence, the group gained entrance to places that ordinary tour groups do not see. Two such examples were the walk, guided by architect Antonio Godoli, through the Corridoio Vasariano with its magnificent collection of selfportraits and the comprehensive tour of the private rooms of the Medici in the Palazzo Vecchio led by a young art historian. During the weekends the students worked on their own projects, which consisted of researching artworks or topics in the history of art of Florence.
In addition to the regular program, this year the course sponsored several very special events. Among them were the visit to the Museo degli Argenti at the Pitti Palace to see the exhibition "Maria dei Medici, Florentine Princess on the Throne of France" accompanied by a talk given by Director Dr. Ornella Casazza, the lecture by Director Paolo Galluzzi at the Museo di Storia della Scienza, the viewing of the exhibition "Michelangelo and Vittoria Colonna" at Casa Buonarroti under AnnaMaria's expert guidance, and the excursion to and tour of Casa Editrice Giunti, the oldest publishing house in Italy.
The group stayed at Hotel Bonifacio located in a quiet area of the city near San Marco. The garden of the hotel was often a gathering place in the evening for sharing the impressions of the day, discussing projects or simply relaxing.
Two weeks into the course, Pratt Institute sponsored a party which was held at the Bonifacio garden and to which the lecturers and presenters were cordially invited. The evening offered a wonderful opportunity to socialize with the Italian colleagues in an informal atmosphere. The party generated many fond memories.
The summer institute in Florence was a unique, enriching experience that left the participants inspired and energized. One of the students wrote to AnnaMaria, "I had one of the best times of my life and I wanted to thank you for making the whole experience unforgettable. We all enjoyed the class thoroughly. I can't thank you and Tula enough for giving us the opportunity to experience so much art and beauty and to meet so many interesting people." I believe many of us share this sentiment.
Member News
Andrew Gessner has been appointed as Chief Librarian in the Image Library (formerly known as the Photo & Slide Library) at the Metropolitan Museum of Art. Among other library and visual resources positions he has held in New York, Andy was most recently the Director of the Adam & Sophie Gimbel Design Library at Parsons School of Design.
Sharon Chickanzeff has taken a newly created position at NYU's Fales Library, where she will be working to enhance the fine arts holdings of their Downtown Collection. Sharon had served as Head of the Institute of Fine Arts Library at NYU since 1989.
Jonathan Lill has accepted a position as Services Coordinator at the IFA Library. Jonathan was recently a Kress Fellow in Art Librarianship at Yale University's Arts Library.
Yvette Cortes, Reference Librarian at the Parsons School of Design's Adam & Sophie Gimbel Library, gave birth on June 16 to a daughter, Elena Sofia, weighing 6 lbs. 7 ounces.
ARLIS/NY Meets at the Brooklyn Museum
By Karyn Hinkle, Library Associate, Brooklyn Museum Libraries and Archives
ARLIS/NY members attended a multi-faceted program at the Brooklyn Museum on Thursday, October 6. The afternoon started with a talk by Deirdre Lawrence, Principal Librarian at the Brooklyn Museum, held in the recently refinished reading room at the Library. With Laura Peimer, new Archivist at the Brooklyn Museum, Deirdre explained the new digital resources the Library has now made available through its website, and invited questions from the group. Satisfying our collective curiosity about how things work in other art libraries, we had a good discussion of other museums' digitization projects, and of efforts to integrate digital images from museum object cataloguing systems like TMS with the library OPACs. (So far, we agreed, this has not been easy, but is certainly something we'd like to see happen if differences in the systems' metadata requirements can be reconciled.)
The discussion was followed by a tour of the stacks of the Library, which many had not seen since before its renovation in 2003. Then we moved upstairs to tour a new exhibition at the Museum entitled "Egypt Through Other Eyes: the Popularization of Egypt." Curated by Deirdre Lawrence and Mary Gow, Assistant Librarian at the Brooklyn Museum, the exhibit is drawn primarily from the holdings of the Wilbour Library of Egyptology. Deirdre and Mary, who led the tour, brought along several books from the Library collections to further illustrate the exhibit's themes to the ARLIS/NY group, among them new editions of Belzoni's Travels published by the British Museum, and The Description of Egypt published by Taschen.
Back in the Library reading room, a small ARLIS/NY reception followed the Egypt Through Other Eyes tour, and finally, to finish off the evening, the group was invited to join the Brooklyn Museum's opening reception for its show "Manufactured Landscapes: the Photographs of Edward Burtynsky," which will be on view through January 15, 2006.
|
<urn:uuid:6ac47ef8-3a11-41eb-9153-5836fb325e1f>
|
CC-MAIN-2023-23
|
https://www.arlisny.org/resources/Documents/v26no3_2005.pdf
|
2023-06-08T18:25:04+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-23/subset=warc/part-00268-ffa3bf93-6ba1-4a27-adea-b0baae3b4389.c000.gz.parquet
| 702,349,041
| 5,219
|
eng_Latn
|
eng_Latn
| 0.986127
|
eng_Latn
| 0.996743
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2612,
4826,
6650,
11659,
14242,
17093,
21138,
24154
] |
ARLIS/New York News
The Newsletter of the Art Libraries Society of North America/New York Metro Chapter
Vol. 26, No. 3-4
ISSN 0894-3133
Fall 2005
Election Results
Editors' Note
Chapter Secretary Tony White reports the results of the recent election for new chapter officers for 2006:
Vice Chair/Chair-Elect: Zimra Panitz
Treasurer: Meg Black
Member-at-Large for Membership: Eric Wolf
53% of the ballots were returned by the stated post mark deadline. (105 of the 198 ballots sent out.)
Hearty congratulations to our new officers, and to the other candidates who ran, Holly Hatheway and Charlotte Priddle.
Holiday Party
The annual ARLIS/NY holiday party will be held on Wednesday, December 7, 6–8pm. Our venue this year is sure to delight. The Accompanied Library at the National Arts Club is an intimate private library and writers' club located on beautiful Gramercy Park.
15 Gramercy Park South, Studio 6C
212-979-5313 http://www.accompaniedlibrary.com
Subway: 6, N, R to 23 St.
Bus: M1, 2, 3, 6, 7, 101, 102, 103 to 20 St.
From lobby, proceed to rear of building. Take elevator to 6th floor. Please use the lobby coat room. Please arrive by 6.30pm.
Light refreshments and drinks will be served.
The Accompanied Library would welcome the gift of an unusual book: literature or nonfiction, preferably hardcover.
RSVP to [email protected].
By James Mitchell and Alexandra de Luise
Some of you may have noticed that the Fall issue was not sent out at its regular time. Due to unfortunate production difficulties we were delayed with that issue, and have had to combine it with coverage of more recent events in this issue.
Our 2005 Chapter Chair, Ken Soehner, has done such an outstanding job of organizing interesting and informative programs this year, we have barely been able to keep up. Included in this issue are reports on many of the events from the summer and fall. We regret that we were not able to also report on the RLG presentation at the Metropolitan in October, and the tour Tony White organized at Yale last month, featuring his exhibition "Production not Reproduction: the History of Offset Printed Artists' Books."
We are looking forward to another eventful year in 2006. Our thanks again to Ken for his tremendous work as Chair, with hopes that he will continue to assist as unofficial Entertainment Coordinator next year.
Inside this issue:
Reports on recent events, including:
Artists' Books Conference at Wellesley College
Pratt students summer in Florence
Chapter visits to the Knoedler Gallery, ICP, the Brooklyn Museum, and more.
And Member News!
2004 ARLIS/NY Executive Board
Chair Ken Soehner
Vice-Chair Jenny Tobias
Past-ChairJudy Connorton
Secretary Tony White
Treasurer Caitlin Kilgallen
Members at Large
MembershipErin Elliott
AdvertisingFaith Pleasanton
Newsletter Editors
Alexandra de Luise
James Mitchell
Website ManagerSuzannah Massen
ARLIS/NA Northeast Regional
Representative
Carol Graney
ARLIS/New York News
Volume 26, Number 3-4, Fall/Winter 2005 ISSN 0894-3133
Contributors
Karyn Hinkle, Viktoria Paranyuk, Amy Schwarz, Jenny Tobias, Tony White.
The ARLIS/NY Newsletter is published quarterly by the Art Libraries Society of New York, a regional chapter of the Art Libraries Society of North America, 329 March Road, Suite 232, Box 11, Kanata, Ontario K2K 2E1, Canada.
Copyright © 2005 by the Art Libraries Society of New York and individual authors.
This publication is distributed free of charge to members of ARLIS/NY. Membership dues are $20.00 for the calendar year.
Send renewals, changes of address, and contributions to Erin Elliott, Membership Coordinator, ARLIS/NY, Bard Graduate Center, 38 West 86 St, New York, NY 10024.
Announcements, articles, and artwork are welcome. Send to Alexandra de Luise, Queen's College, Flushing, NY 11367, [email protected]; or to James Mitchell, [email protected].
Advertising Manager: Faith Pleasanton,
212-650-2857, [email protected].
Copy deadline for vol. 27, no. 1 (Spring 2006): March 3, 2006.
The New Museum of Contemporary Art
On September 7th ARLIS members were treated to a reception and special viewing of "Point of View: A Contemporary Anthology of the Moving Image," a DVD box set featuring new art works by 11 contemporary international artists. Our thanks to Ceci Moss, Point of View Sales Director at the New Museum, and to Lauren Cornell, Executive Director of Rhizome.org, who spoke on the concurrent exhibition, "Rhizome Artbase 101." And to all of the staff of the museum who helped welcome us to Chelsea.
For information on DVD sales, contact Ms. Moss at [email protected].
Still from Francis Alys' El Gringo (2003), part of "Point of View."
Image courtesy of the New Museum of Contemporary Art.
Photos by James Mitchell
Mark di Suvero at Knoedler's, July 14
By James Mitchell
On July 14 a large but indeterminate crowd of ARLIS librarians and their friends braved the heat and humidity to visit the venerable Knoedler Gallery on East 70 th Street for a special viewing of their exhibition "Mark di Suvero: Indoors." It was well worth the effort. The artist himself was present, and spoke to the guests after a short tour of the gallery's library.
Edye Weissler, librarian, and Ann Freedman, President of Knoedler & Company, hosted the event. Edye graciously led some members through the upstairs library — a curious and utterly charming warren of rooms that somehow did not seem to have been designed originally to house a library. After Edye's description of the history of the gallery, and the library's current operations and collections, Mr. di Suvero joined us to talk about his work and his love of libraries. He cheerfully took questions from the crowd, and mentioned that his daughter has recently expressed an interest in becoming a librarian. Surely an appropriate internship could be found for her.
The artworks displayed on the main floor were quite wonderful. This author was not already very familiar with di Suvero's work, but was fascinated by the smaller, intricate sculptures. Thick twisted sheets of metal seemed to have been torn by hand into intricate shapes, with carefully balanced spinning pieces. We greatly enjoyed the rare opportunity to "touch the art." There was one mishap when one of the works fell off its axis, but no one seemed to mind terribly. So the party continued.
Sparkling and white wine were provided, as well as complimentary copies of the exhibition catalogue. We were also pleased to welcome Roberto Ferrari, recently arrived from Florida, as a new ARLIS/NY chapter member.
Photos on page 2.
Artists' Books as Catalyst
By Tony White
Artists' Books Conference
Wellesley College, Wellesley, Massachusetts. June 15–18, 2005
From June 15–18, 2005, Wellesley College hosted the Artists' Books Conference (ABC), bringing together librarians, artists, curators, private collectors, professors and book dealers. Over 200 people attended this four-day event that covered topics such as collecting artists' books, the business of artists producing these books and related pedagogical aspects of this genre.
This is at least the third independently organized conference on artists' books to be held in the past two years. Wells College in Aurora, New York, organized a symposium titled "Matter & Spirit: The Genesis & Evolution of the Book," held from April 29–May 2, 2004. More recently, the Southern California Chapter of the Art Libraries Society of North America organized a conference held in Los Angeles, from May 21–24, 2005: "Artists Books: Creating, Collecting, Cataloging, Conserving, Collaborating." At ABC, less emphasis was placed on critical analysis of topics; rather, most presentations retained an informal, conversational style that aided in sharing ideas and comments. Major issues were raised about the current genre of artists' books, the lack of critical writings about it and the profound challenge of expanding the artists' book community.
The opening keynote speaker, Betty Bright, founded the Minnesota Center for the Book Arts (MCBA) in 1985. Her book No Longer Innocent: the Book Arts in America, 1960 to 1980 will be published by Granary Press in September 2005. Bright's presentation, "To Have and To Hold: Why We Need Book Art," focused on historical aspects of private and institutional collecting in this country and the role of librarians and curators. She discussed the formation of early institutional library collections, notably those at the School of the Art Institute of Chicago, Atlanta College, the Museum of Modern Art and Virginia Commonwealth University. Bright divided the history of artists' books into four categories: fine press, deluxe editions, sculptural books and multiples. Increased awareness of archival materials in the production of artists' books was a noted topic of discussion.
The panel "Collecting in Private and Public Institutions" was moderated by Sandra Kroupa of the University of Washington, Seattle. The panelists represented both private and public institutional libraries, including Claremont College, Rhode Island School of Design, University of Wisconsin-Milwaukee and Boston Public Library. The significance and unique role of artists' books as pedagogical tools that are essential for students and faculty engaged in all areas of art, design, writing and architecture was noted. The panel "Private Collecting" was moderated by Sidney Berger, a faculty member at Simmons College in Boston and a private collector of artists' books. The two panelists, Robert Ruben of New York City and Duke Collier of Cambridge, MA, entertained the audience with PowerPoint presentations that described their personal motivations as collectors, and their relationships with artists, dealers and curators. Other elements discussed included managing budgets and how or if they make their collections available to others for exhibition.
Participants on the "The Business of Artists' Books" panel included Julie Chen, an independent book artist, Emily Larned, a representative from the art collective Booklyn Artists Alliance and Cynthia Imperatore, an independent bookseller. The moderator, Suzy Taraba of Wesleyan University, asked questions regarding how prices and edition sizes are set, what marketing strategies are used and what professional relationships are preferred and why (for example: artist/dealer, artist/librarian, dealer/librarian). The panel "Education in the Book Arts" included Steve Miller from University of Alabama as moderator and panelists Ken Botnick, Kitty Maryatt and Terry Chouniard who all teach and work at educational institutions. It was noted that most students lack a thorough background in typography, lettering and calligraphy.
The last day of the conference included a closing keynote presentation by Mark Dimunation, Chief of the Rare Book and Special Collection Division of the Library of Congress, titled "What Will Next Prove a Rose: The Thorny Side of Building the Nation's Collection of Book Arts," a discussion about the challenges of collecting, preserving and providing access to artists' books.
The conference committee took the opportunity to give special recognition to Claire Van Vliet, a pioneer book artist who made her first artist book in 1955 under the Janus Press imprint. As a conference keepsake, an accordion book that listed all Van Vliet books was presented and commissioned by Ruth Rogers, Special Collections Librarian of Wellesley College, and made by Jan Owen.
This essay first appeared, in a slightly different form, in Afterimage magazine. It is reproduced here by permission.
ARLIS/NY Visits ICP
By Amy Schwarz
The International Center of Photography (ICP) treated ARLIS/NY members, on August 22 nd , to a private viewing and presentation of the exhibition, "The Open Book: Photography in Book Form, 1870 – Present." Around 50 people attended—pretty impressive considering many members were away on summer vacation. ARLIS/NY President Ken Soehner introduced the hosts of the event, Deirdre Donohue, librarian, and Christopher Phillips, senior curator, at ICP.
Mr. Phillips began by pointing out the reverse chronology in the arrangement of photography books to complement the lower floor exhibition, "Young America. The Daguerreotypes of Southworth & Hawes." A traveling exhibition, "The Open Book" presented photography in book form by international artists, selected by an international jury, under the curator, Ute Eskildsen of the Folkwang Museum in Essen, Germany. Due to space, ICP showed 130 of the original 175 works exhibited. The catalog and text were prepared by Andrew Roth, and published by a major contributor to and co-presenter of the exhibition, the Hasselblad Center in Götenborg, Sweden. (The catalog sells for $49.95 at ICP's outstanding bookstore on photography.)
Mr. Phillips explained the selection of photo-books based on originality and content, reproduction quality and graphic layout, jacket design and binding. The books opened to the pages reproduced in the catalog, with a few exceptions chosen by the curator. He described the installation process at ICP: placing each book in a cradle to support the binding, putting together plexiglass display cases, and manipulating lighting to the best advantage. Wall labels were economically made with plain sheets of paper loosely attached to the walls, suggesting pages from a book.
Several artists' works were individually displayed in cases, such as: Ed Ruscha's running pictorial narrative, Every Building on the Sunset Strip; Nobuyoshi Araki's rare editions of self-published photocopied books; Hans-Peter Feldman's self-designed and published photo-books of ordinary, familiar scenes in life; and my favorite, El Lissitzky, the Russian constructivist painter whose book Industry of Socialism, with beautifully embossed covers, satisfied Stalin's propaganda requirements of the 1930s. Many renowned and less familiar photographer/artist's works were exhibited. With time to chat and consume the generous reception spread, the evening at ICP closed with plans to return.
Curator Christopher Phillips discussing some of the photo-books in a display case with ARLIS/NY members.
ARLIS/NY Fall 2005 Business Meeting
Reported by James Mitchell
The chapter met for its annual business meeting in the South Court of the NYPL Humanities and Social Sciences Library on October 24, 2005.
We were warmly welcomed by Clayton Kirking, Chief of Art Information Resources at the library, followed by introductory remarks by Chapter Chair Ken Soehner.
Erin Elliot reported on membership:
200 total members this year, up by 9 from 2004, and from only 133 in 2003.
This now includes 24 students, up from 12 last year; thanks especially to the recruitment efforts of Ken Soehner and Tony White, who are each teaching a section of the Art Librarianship class at the Pratt Institute. There are also a few student members from the library studies programs at Queens College and Rutgers.
Three new members in attendance introduced themselves, including Francine Snyder, Manager of the Library and Archive at the Guggenheim Museum.
Past-Chair Judy Connorton presented the Treasurer's report, subbing for Caitlin Kilgallen, who is on maternity leave. Current balance is $11,688.67.
Vice Chair Jenny Tobias announced the candidates for open chapter offices.
Vice Chair/Chair-Elect: Zimra Panitz [unopposed]
Treasurer: Meg Black and Holly Hatheway
Member-at-Large for Membership: Charlotte Priddle and Eric Wolf
The floor was opened for additional nominations, and none were received. If no more are received by Jenny by [soon], ballots will be mailed as such to all chapter members.
Jenny also mentioned that the board is considering proposing a bylaws revision to allow electronic voting. If so, it will be announced at next year's business meeting.
Ken Soehner returned to the podium to announce the few remaining chapter events for the year:
RLG representatives will make presentations at the Metropolitan Museum tomorrow morning on their arts-related databases and projects.
Tony White is organizing a trip to Yale to see his exhibition of offset-printed artists books, on Nov. 19.
The holiday party will be held Dec. 7 at the Accompanied Library in the National Arts Club building.
From the floor, AnnaMaria Poma-Swank also offered to host ARLIS members at an event at The Italian Academy for Advanced Studies in America, at Columbia University's Casa Italiana, where she is the librarian.
Jenny Tobias concluded the program with a short presentation on images of librarians in contemporary TV ads. Though most were from Europe, the use of traditional stereotypes made their messages more than clear. Librarians continue to be popularly portrayed as musty, old, slow, and desirous of silence. Young people hopped up on sugary treats continue to shake things up.
Followed by wine and cheese, and sandwiches, graciously hosted, and bartended, by Clayton Kirking, with a little help from Sharon Chickanzeff. Our thanks to them.
Pratt SILS in Florence
By Viktoria Paranyuk
For three weeks, May 28 to June 18, 2005, I attended the summer institute entitled "Florentine Art and Culture: Resources and Documentation" in Florence, Italy, offered by the School of Information and Library Science of Pratt Institute. The program was conceived and developed by AnnaMaria Poma-Swank, Adjunct Associate Professor at Pratt-SILS and Librarian at the Italian Academy for Advanced Studies in America, with the participation of Tula Giannini, Acting Dean of Pratt-SILS. It was developed in collaboration with Antonio Paolucci, Soprintendente per I Beni Artistici e Storici di Firenze, Pistoia e Prato, Claudio di Benedetto, Director of the Uffizi Library, and Antonia Ida Fontana, Director of the Biblioteca Nazionale Centrale di Firenze.
Fifteen participants, who came from different parts of the country, represented working academic, public, and special librarians as well as library and art history students. The intensive schedule consisted of lectures, seminars, and tours of libraries, archives, and museums in the morning and afternoon. Each day offered discovery and intellectual stimulation. The students had the privilege of hearing lectures from eminent professionals in the field of librarianship and museum research; among them were Claudio di Benedetto, Director of the Uffizi Library, Sabina Magrini from Biblioteca Medicea Laurenziana, and Beatrice Paolozzo Strozzi, Director of Museo del Bargello.
All students received access to the major research libraries, including Biblioteca Nazionale Centrale, the Library of Bernard Berenson's Villa I Tatti, and the Uffizi Library. The participants were also issued passes for the duration of the course that allowed free admission to any of the state museums of the Firenze Musei network. Thanks to AnnaMaria's close associations with her distinguished colleagues in Florence, the group gained entrance to places that ordinary tour groups do not see. Two such examples were the walk, guided by architect Antonio Godoli, through the Corridoio Vasariano with its magnificent collection of selfportraits and the comprehensive tour of the private rooms of the Medici in the Palazzo Vecchio led by a young art historian. During the weekends the students worked on their own projects, which consisted of researching artworks or topics in the history of art of Florence.
In addition to the regular program, this year the course sponsored several very special events. Among them were the visit to the Museo degli Argenti at the Pitti Palace to see the exhibition "Maria dei Medici, Florentine Princess on the Throne of France" accompanied by a talk given by Director Dr. Ornella Casazza, the lecture by Director Paolo Galluzzi at the Museo di Storia della Scienza, the viewing of the exhibition "Michelangelo and Vittoria Colonna" at Casa Buonarroti under AnnaMaria's expert guidance, and the excursion to and tour of Casa Editrice Giunti, the
|
oldest publishing house in Italy.
| 20,058
|
end_of_word
|
the
|
remove_all
|
<url>
https://www.arlisny.org/resources/Documents/v26no3_2005.pdf
</url>
<text>
ARLIS/New York News
The Newsletter of the Art Libraries Society of North America/New York Metro Chapter
Vol. 26, No. 3-4
ISSN 0894-3133
Fall 2005
Election Results
Editors' Note
Chapter Secretary Tony White reports the results of the recent election for new chapter officers for 2006:
Vice Chair/Chair-Elect: Zimra Panitz
Treasurer: Meg Black
Member-at-Large for Membership: Eric Wolf
53% of the ballots were returned by the stated post mark deadline. (105 of the 198 ballots sent out.)
Hearty congratulations to our new officers, and to the other candidates who ran, Holly Hatheway and Charlotte Priddle.
Holiday Party
The annual ARLIS/NY holiday party will be held on Wednesday, December 7, 6–8pm. Our venue this year is sure to delight. The Accompanied Library at the National Arts Club is an intimate private library and writers' club located on beautiful Gramercy Park.
15 Gramercy Park South, Studio 6C
212-979-5313 http://www.accompaniedlibrary.com
Subway: 6, N, R to 23 St.
Bus: M1, 2, 3, 6, 7, 101, 102, 103 to 20 St.
From lobby, proceed to rear of building. Take elevator to 6th floor. Please use the lobby coat room. Please arrive by 6.30pm.
Light refreshments and drinks will be served.
The Accompanied Library would welcome the gift of an unusual book: literature or nonfiction, preferably hardcover.
RSVP to [email protected].
By James Mitchell and Alexandra de Luise
Some of you may have noticed that the Fall issue was not sent out at its regular time. Due to unfortunate production difficulties we were delayed with that issue, and have had to combine it with coverage of more recent events in this issue.
Our 2005 Chapter Chair, Ken Soehner, has done such an outstanding job of organizing interesting and informative programs this year, we have barely been able to keep up. Included in this issue are reports on many of the events from the summer and fall. We regret that we were not able to also report on the RLG presentation at the Metropolitan in October, and the tour Tony White organized at Yale last month, featuring his exhibition "Production not Reproduction: the History of Offset Printed Artists' Books."
We are looking forward to another eventful year in 2006. Our thanks again to Ken for his tremendous work as Chair, with hopes that he will continue to assist as unofficial Entertainment Coordinator next year.
Inside this issue:
Reports on recent events, including:
Artists' Books Conference at Wellesley College
Pratt students summer in Florence
Chapter visits to the Knoedler Gallery, ICP, the Brooklyn Museum, and more.
And Member News!
2004 ARLIS/NY Executive Board
Chair Ken Soehner
Vice-Chair Jenny Tobias
Past-ChairJudy Connorton
Secretary Tony White
Treasurer Caitlin Kilgallen
Members at Large
MembershipErin Elliott
AdvertisingFaith Pleasanton
Newsletter Editors
Alexandra de Luise
James Mitchell
Website ManagerSuzannah Massen
ARLIS/NA Northeast Regional
Representative
Carol Graney
ARLIS/New York News
Volume 26, Number 3-4, Fall/Winter 2005 ISSN 0894-3133
Contributors
Karyn Hinkle, Viktoria Paranyuk, Amy Schwarz, Jenny Tobias, Tony White.
The ARLIS/NY Newsletter is published quarterly by the Art Libraries Society of New York, a regional chapter of the Art Libraries Society of North America, 329 March Road, Suite 232, Box 11, Kanata, Ontario K2K 2E1, Canada.
Copyright © 2005 by the Art Libraries Society of New York and individual authors.
This publication is distributed free of charge to members of ARLIS/NY. Membership dues are $20.00 for the calendar year.
Send renewals, changes of address, and contributions to Erin Elliott, Membership Coordinator, ARLIS/NY, Bard Graduate Center, 38 West 86 St, New York, NY 10024.
Announcements, articles, and artwork are welcome. Send to Alexandra de Luise, Queen's College, Flushing, NY 11367, [email protected]; or to James Mitchell, [email protected].
Advertising Manager: Faith Pleasanton,
212-650-2857, [email protected].
Copy deadline for vol. 27, no. 1 (Spring 2006): March 3, 2006.
The New Museum of Contemporary Art
On September 7th ARLIS members were treated to a reception and special viewing of "Point of View: A Contemporary Anthology of the Moving Image," a DVD box set featuring new art works by 11 contemporary international artists. Our thanks to Ceci Moss, Point of View Sales Director at the New Museum, and to Lauren Cornell, Executive Director of Rhizome.org, who spoke on the concurrent exhibition, "Rhizome Artbase 101." And to all of the staff of the museum who helped welcome us to Chelsea.
For information on DVD sales, contact Ms. Moss at [email protected].
Still from Francis Alys' El Gringo (2003), part of "Point of View."
Image courtesy of the New Museum of Contemporary Art.
Photos by James Mitchell
Mark di Suvero at Knoedler's, July 14
By James Mitchell
On July 14 a large but indeterminate crowd of ARLIS librarians and their friends braved the heat and humidity to visit the venerable Knoedler Gallery on East 70 th Street for a special viewing of their exhibition "Mark di Suvero: Indoors." It was well worth the effort. The artist himself was present, and spoke to the guests after a short tour of the gallery's library.
Edye Weissler, librarian, and Ann Freedman, President of Knoedler & Company, hosted the event. Edye graciously led some members through the upstairs library — a curious and utterly charming warren of rooms that somehow did not seem to have been designed originally to house a library. After Edye's description of the history of the gallery, and the library's current operations and collections, Mr. di Suvero joined us to talk about his work and his love of libraries. He cheerfully took questions from the crowd, and mentioned that his daughter has recently expressed an interest in becoming a librarian. Surely an appropriate internship could be found for her.
The artworks displayed on the main floor were quite wonderful. This author was not already very familiar with di Suvero's work, but was fascinated by the smaller, intricate sculptures. Thick twisted sheets of metal seemed to have been torn by hand into intricate shapes, with carefully balanced spinning pieces. We greatly enjoyed the rare opportunity to "touch the art." There was one mishap when one of the works fell off its axis, but no one seemed to mind terribly. So the party continued.
Sparkling and white wine were provided, as well as complimentary copies of the exhibition catalogue. We were also pleased to welcome Roberto Ferrari, recently arrived from Florida, as a new ARLIS/NY chapter member.
Photos on page 2.
Artists' Books as Catalyst
By Tony White
Artists' Books Conference
Wellesley College, Wellesley, Massachusetts. June 15–18, 2005
From June 15–18, 2005, Wellesley College hosted the Artists' Books Conference (ABC), bringing together librarians, artists, curators, private collectors, professors and book dealers. Over 200 people attended this four-day event that covered topics such as collecting artists' books, the business of artists producing these books and related pedagogical aspects of this genre.
This is at least the third independently organized conference on artists' books to be held in the past two years. Wells College in Aurora, New York, organized a symposium titled "Matter & Spirit: The Genesis & Evolution of the Book," held from April 29–May 2, 2004. More recently, the Southern California Chapter of the Art Libraries Society of North America organized a conference held in Los Angeles, from May 21–24, 2005: "Artists Books: Creating, Collecting, Cataloging, Conserving, Collaborating." At ABC, less emphasis was placed on critical analysis of topics; rather, most presentations retained an informal, conversational style that aided in sharing ideas and comments. Major issues were raised about the current genre of artists' books, the lack of critical writings about it and the profound challenge of expanding the artists' book community.
The opening keynote speaker, Betty Bright, founded the Minnesota Center for the Book Arts (MCBA) in 1985. Her book No Longer Innocent: the Book Arts in America, 1960 to 1980 will be published by Granary Press in September 2005. Bright's presentation, "To Have and To Hold: Why We Need Book Art," focused on historical aspects of private and institutional collecting in this country and the role of librarians and curators. She discussed the formation of early institutional library collections, notably those at the School of the Art Institute of Chicago, Atlanta College, the Museum of Modern Art and Virginia Commonwealth University. Bright divided the history of artists' books into four categories: fine press, deluxe editions, sculptural books and multiples. Increased awareness of archival materials in the production of artists' books was a noted topic of discussion.
The panel "Collecting in Private and Public Institutions" was moderated by Sandra Kroupa of the University of Washington, Seattle. The panelists represented both private and public institutional libraries, including Claremont College, Rhode Island School of Design, University of Wisconsin-Milwaukee and Boston Public Library. The significance and unique role of artists' books as pedagogical tools that are essential for students and faculty engaged in all areas of art, design, writing and architecture was noted. The panel "Private Collecting" was moderated by Sidney Berger, a faculty member at Simmons College in Boston and a private collector of artists' books. The two panelists, Robert Ruben of New York City and Duke Collier of Cambridge, MA, entertained the audience with PowerPoint presentations that described their personal motivations as collectors, and their relationships with artists, dealers and curators. Other elements discussed included managing budgets and how or if they make their collections available to others for exhibition.
Participants on the "The Business of Artists' Books" panel included Julie Chen, an independent book artist, Emily Larned, a representative from the art collective Booklyn Artists Alliance and Cynthia Imperatore, an independent bookseller. The moderator, Suzy Taraba of Wesleyan University, asked questions regarding how prices and edition sizes are set, what marketing strategies are used and what professional relationships are preferred and why (for example: artist/dealer, artist/librarian, dealer/librarian). The panel "Education in the Book Arts" included Steve Miller from University of Alabama as moderator and panelists Ken Botnick, Kitty Maryatt and Terry Chouniard who all teach and work at educational institutions. It was noted that most students lack a thorough background in typography, lettering and calligraphy.
The last day of the conference included a closing keynote presentation by Mark Dimunation, Chief of the Rare Book and Special Collection Division of the Library of Congress, titled "What Will Next Prove a Rose: The Thorny Side of Building the Nation's Collection of Book Arts," a discussion about the challenges of collecting, preserving and providing access to artists' books.
The conference committee took the opportunity to give special recognition to Claire Van Vliet, a pioneer book artist who made her first artist book in 1955 under the Janus Press imprint. As a conference keepsake, an accordion book that listed all Van Vliet books was presented and commissioned by Ruth Rogers, Special Collections Librarian of Wellesley College, and made by Jan Owen.
This essay first appeared, in a slightly different form, in Afterimage magazine. It is reproduced here by permission.
ARLIS/NY Visits ICP
By Amy Schwarz
The International Center of Photography (ICP) treated ARLIS/NY members, on August 22 nd , to a private viewing and presentation of the exhibition, "The Open Book: Photography in Book Form, 1870 – Present." Around 50 people attended—pretty impressive considering many members were away on summer vacation. ARLIS/NY President Ken Soehner introduced the hosts of the event, Deirdre Donohue, librarian, and Christopher Phillips, senior curator, at ICP.
Mr. Phillips began by pointing out the reverse chronology in the arrangement of photography books to complement the lower floor exhibition, "Young America. The Daguerreotypes of Southworth & Hawes." A traveling exhibition, "The Open Book" presented photography in book form by international artists, selected by an international jury, under the curator, Ute Eskildsen of the Folkwang Museum in Essen, Germany. Due to space, ICP showed 130 of the original 175 works exhibited. The catalog and text were prepared by Andrew Roth, and published by a major contributor to and co-presenter of the exhibition, the Hasselblad Center in Götenborg, Sweden. (The catalog sells for $49.95 at ICP's outstanding bookstore on photography.)
Mr. Phillips explained the selection of photo-books based on originality and content, reproduction quality and graphic layout, jacket design and binding. The books opened to the pages reproduced in the catalog, with a few exceptions chosen by the curator. He described the installation process at ICP: placing each book in a cradle to support the binding, putting together plexiglass display cases, and manipulating lighting to the best advantage. Wall labels were economically made with plain sheets of paper loosely attached to the walls, suggesting pages from a book.
Several artists' works were individually displayed in cases, such as: Ed Ruscha's running pictorial narrative, Every Building on the Sunset Strip; Nobuyoshi Araki's rare editions of self-published photocopied books; Hans-Peter Feldman's self-designed and published photo-books of ordinary, familiar scenes in life; and my favorite, El Lissitzky, the Russian constructivist painter whose book Industry of Socialism, with beautifully embossed covers, satisfied Stalin's propaganda requirements of the 1930s. Many renowned and less familiar photographer/artist's works were exhibited. With time to chat and consume the generous reception spread, the evening at ICP closed with plans to return.
Curator Christopher Phillips discussing some of the photo-books in a display case with ARLIS/NY members.
ARLIS/NY Fall 2005 Business Meeting
Reported by James Mitchell
The chapter met for its annual business meeting in the South Court of the NYPL Humanities and Social Sciences Library on October 24, 2005.
We were warmly welcomed by Clayton Kirking, Chief of Art Information Resources at the library, followed by introductory remarks by Chapter Chair Ken Soehner.
Erin Elliot reported on membership:
200 total members this year, up by 9 from 2004, and from only 133 in 2003.
This now includes 24 students, up from 12 last year; thanks especially to the recruitment efforts of Ken Soehner and Tony White, who are each teaching a section of the Art Librarianship class at the Pratt Institute. There are also a few student members from the library studies programs at Queens College and Rutgers.
Three new members in attendance introduced themselves, including Francine Snyder, Manager of the Library and Archive at the Guggenheim Museum.
Past-Chair Judy Connorton presented the Treasurer's report, subbing for Caitlin Kilgallen, who is on maternity leave. Current balance is $11,688.67.
Vice Chair Jenny Tobias announced the candidates for open chapter offices.
Vice Chair/Chair-Elect: Zimra Panitz [unopposed]
Treasurer: Meg Black and Holly Hatheway
Member-at-Large for Membership: Charlotte Priddle and Eric Wolf
The floor was opened for additional nominations, and none were received. If no more are received by Jenny by [soon], ballots will be mailed as such to all chapter members.
Jenny also mentioned that the board is considering proposing a bylaws revision to allow electronic voting. If so, it will be announced at next year's business meeting.
Ken Soehner returned to the podium to announce the few remaining chapter events for the year:
RLG representatives will make presentations at the Metropolitan Museum tomorrow morning on their arts-related databases and projects.
Tony White is organizing a trip to Yale to see his exhibition of offset-printed artists books, on Nov. 19.
The holiday party will be held Dec. 7 at the Accompanied Library in the National Arts Club building.
From the floor, AnnaMaria Poma-Swank also offered to host ARLIS members at an event at The Italian Academy for Advanced Studies in America, at Columbia University's Casa Italiana, where she is the librarian.
Jenny Tobias concluded the program with a short presentation on images of librarians in contemporary TV ads. Though most were from Europe, the use of traditional stereotypes made their messages more than clear. Librarians continue to be popularly portrayed as musty, old, slow, and desirous of silence. Young people hopped up on sugary treats continue to shake things up.
Followed by wine and cheese, and sandwiches, graciously hosted, and bartended, by Clayton Kirking, with a little help from Sharon Chickanzeff. Our thanks to them.
Pratt SILS in Florence
By Viktoria Paranyuk
For three weeks, May 28 to June 18, 2005, I attended the summer institute entitled "Florentine Art and Culture: Resources and Documentation" in Florence, Italy, offered by the School of Information and Library Science of Pratt Institute. The program was conceived and developed by AnnaMaria Poma-Swank, Adjunct Associate Professor at Pratt-SILS and Librarian at the Italian Academy for Advanced Studies in America, with the participation of Tula Giannini, Acting Dean of Pratt-SILS. It was developed in collaboration with Antonio Paolucci, Soprintendente per I Beni Artistici e Storici di Firenze, Pistoia e Prato, Claudio di Benedetto, Director of the Uffizi Library, and Antonia Ida Fontana, Director of the Biblioteca Nazionale Centrale di Firenze.
Fifteen participants, who came from different parts of the country, represented working academic, public, and special librarians as well as library and art history students. The intensive schedule consisted of lectures, seminars, and tours of libraries, archives, and museums in the morning and afternoon. Each day offered discovery and intellectual stimulation. The students had the privilege of hearing lectures from eminent professionals in the field of librarianship and museum research; among them were Claudio di Benedetto, Director of the Uffizi Library, Sabina Magrini from Biblioteca Medicea Laurenziana, and Beatrice Paolozzo Strozzi, Director of Museo del Bargello.
All students received access to the major research libraries, including Biblioteca Nazionale Centrale, the Library of Bernard Berenson's Villa I Tatti, and the Uffizi Library. The participants were also issued passes for the duration of the course that allowed free admission to any of the state museums of the Firenze Musei network. Thanks to AnnaMaria's close associations with her distinguished colleagues in Florence, the group gained entrance to places that ordinary tour groups do not see. Two such examples were the walk, guided by architect Antonio Godoli, through the Corridoio Vasariano with its magnificent collection of selfportraits and the comprehensive tour of the private rooms of the Medici in the Palazzo Vecchio led by a young art historian. During the weekends the students worked on their own projects, which consisted of researching artworks or topics in the history of art of Florence.
In addition to the regular program, this year the course sponsored several very special events. Among them were the visit to the Museo degli Argenti at the Pitti Palace to see the exhibition "Maria dei Medici, Florentine Princess on the Throne of France" accompanied by a talk given by Director Dr. Ornella Casazza, the lecture by Director Paolo Galluzzi at the Museo di Storia della Scienza, the viewing of the exhibition "Michelangelo and Vittoria Colonna" at Casa Buonarroti under AnnaMaria's expert guidance, and the excursion to and tour of Casa Editrice Giunti, the<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.arlisny.org/resources/Documents/v26no3_2005.pdf\n</url>\n<text>\nARLIS/New York News\n\nThe Newsletter of the Art Libraries Society of North America/New York Metro Chapter\n\nVol. 26, No. 3-4\n\nISSN 0894-3133\n\nFall 2005\n\nElection Results\n\nEditors' Note\n\nChapter Secretary Tony White reports the results of the recent election for new chapter officers for 2006:\n\nVice Chair/Chair-Elect: Zimra Panitz\n\nTreasurer: Meg Black\n\nMember-at-Large for Membership: Eric Wolf\n\n53% of the ballots were returned by the stated post mark deadline. (105 of the 198 ballots sent out.)\n\nHearty congratulations to our new officers, and to the other candidates who ran, Holly Hatheway and Charlotte Priddle.\n\nHoliday Party\n\nThe annual ARLIS/NY holiday party will be held on Wednesday, December 7, 6–8pm. Our venue this year is sure to delight. The Accompanied Library at the National Arts Club is an intimate private library and writers' club located on beautiful Gramercy Park.\n\n15 Gramercy Park South, Studio 6C\n\n212-979-5313 http://www.accompaniedlibrary.com\n\nSubway: 6, N, R to 23 St.\n\nBus: M1, 2, 3, 6, 7, 101, 102, 103 to 20 St.\n\nFrom lobby, proceed to rear of building. Take elevator to 6th floor. Please use the lobby coat room. Please arrive by 6.30pm.\n\nLight refreshments and drinks will be served.\n\nThe Accompanied Library would welcome the gift of an unusual book: literature or nonfiction, preferably hardcover.\n\nRSVP to [email protected].\n\nBy James Mitchell and Alexandra de Luise\n\nSome of you may have noticed that the Fall issue was not sent out at its regular time. Due to unfortunate production difficulties we were delayed with that issue, and have had to combine it with coverage of more recent events in this issue.\n\nOur 2005 Chapter Chair, Ken Soehner, has done such an outstanding job of organizing interesting and informative programs this year, we have barely been able to keep up. Included in this issue are reports on many of the events from the summer and fall. We regret that we were not able to also report on the RLG presentation at the Metropolitan in October, and the tour Tony White organized at Yale last month, featuring his exhibition \"Production not Reproduction: the History of Offset Printed Artists' Books.\"\n\nWe are looking forward to another eventful year in 2006. Our thanks again to Ken for his tremendous work as Chair, with hopes that he will continue to assist as unofficial Entertainment Coordinator next year.\n\nInside this issue:\n\nReports on recent events, including:\n\nArtists' Books Conference at Wellesley College\n\nPratt students summer in Florence\n\nChapter visits to the Knoedler Gallery, ICP, the Brooklyn Museum, and more.\n\nAnd Member News!\n\n2004 ARLIS/NY Executive Board\n\nChair Ken Soehner\n\nVice-Chair Jenny Tobias\n\nPast-ChairJudy Connorton\n\nSecretary Tony White\n\nTreasurer Caitlin Kilgallen\n\nMembers at Large\n\nMembershipErin Elliott\n\nAdvertisingFaith Pleasanton\n\nNewsletter Editors\n\nAlexandra de Luise\n\nJames Mitchell\n\nWebsite ManagerSuzannah Massen\n\nARLIS/NA Northeast Regional\n\nRepresentative\n\nCarol Graney\n\nARLIS/New York News\n\nVolume 26, Number 3-4, Fall/Winter 2005 ISSN 0894-3133\n\nContributors\n\nKaryn Hinkle, Viktoria Paranyuk, Amy Schwarz, Jenny Tobias, Tony White.\n\nThe ARLIS/NY Newsletter is published quarterly by the Art Libraries Society of New York, a regional chapter of the Art Libraries Society of North America, 329 March Road, Suite 232, Box 11, Kanata, Ontario K2K 2E1, Canada.\n\nCopyright © 2005 by the Art Libraries Society of New York and individual authors.\n\nThis publication is distributed free of charge to members of ARLIS/NY. Membership dues are $20.00 for the calendar year.\n\nSend renewals, changes of address, and contributions to Erin Elliott, Membership Coordinator, ARLIS/NY, Bard Graduate Center, 38 West 86 St, New York, NY 10024.\n\nAnnouncements, articles, and artwork are welcome. Send to Alexandra de Luise, Queen's College, Flushing, NY 11367, [email protected]; or to James Mitchell, [email protected].\n\nAdvertising Manager: Faith Pleasanton,\n\n212-650-2857, [email protected].\n\nCopy deadline for vol. 27, no. 1 (Spring 2006): March 3, 2006.\n\nThe New Museum of Contemporary Art\n\nOn September 7th ARLIS members were treated to a reception and special viewing of \"Point of View: A Contemporary Anthology of the Moving Image,\" a DVD box set featuring new art works by 11 contemporary international artists. Our thanks to Ceci Moss, Point of View Sales Director at the New Museum, and to Lauren Cornell, Executive Director of Rhizome.org, who spoke on the concurrent exhibition, \"Rhizome Artbase 101.\" And to all of the staff of the museum who helped welcome us to Chelsea.\n\nFor information on DVD sales, contact Ms. Moss at [email protected].\n\nStill from Francis Alys' El Gringo (2003), part of \"Point of View.\"\n\nImage courtesy of the New Museum of Contemporary Art.\n\nPhotos by James Mitchell\n\nMark di Suvero at Knoedler's, July 14\n\nBy James Mitchell\n\nOn July 14 a large but indeterminate crowd of ARLIS librarians and their friends braved the heat and humidity to visit the venerable Knoedler Gallery on East 70 th Street for a special viewing of their exhibition \"Mark di Suvero: Indoors.\" It was well worth the effort. The artist himself was present, and spoke to the guests after a short tour of the gallery's library.\n\nEdye Weissler, librarian, and Ann Freedman, President of Knoedler & Company, hosted the event. Edye graciously led some members through the upstairs library — a curious and utterly charming warren of rooms that somehow did not seem to have been designed originally to house a library. After Edye's description of the history of the gallery, and the library's current operations and collections, Mr. di Suvero joined us to talk about his work and his love of libraries. He cheerfully took questions from the crowd, and mentioned that his daughter has recently expressed an interest in becoming a librarian. Surely an appropriate internship could be found for her.\n\nThe artworks displayed on the main floor were quite wonderful. This author was not already very familiar with di Suvero's work, but was fascinated by the smaller, intricate sculptures. Thick twisted sheets of metal seemed to have been torn by hand into intricate shapes, with carefully balanced spinning pieces. We greatly enjoyed the rare opportunity to \"touch the art.\" There was one mishap when one of the works fell off its axis, but no one seemed to mind terribly. So the party continued.\n\nSparkling and white wine were provided, as well as complimentary copies of the exhibition catalogue. We were also pleased to welcome Roberto Ferrari, recently arrived from Florida, as a new ARLIS/NY chapter member.\n\nPhotos on page 2.\n\nArtists' Books as Catalyst\n\nBy Tony White\n\nArtists' Books Conference\n\nWellesley College, Wellesley, Massachusetts. June 15–18, 2005\n\nFrom June 15–18, 2005, Wellesley College hosted the Artists' Books Conference (ABC), bringing together librarians, artists, curators, private collectors, professors and book dealers. Over 200 people attended this four-day event that covered topics such as collecting artists' books, the business of artists producing these books and related pedagogical aspects of this genre.\n\nThis is at least the third independently organized conference on artists' books to be held in the past two years. Wells College in Aurora, New York, organized a symposium titled \"Matter & Spirit: The Genesis & Evolution of the Book,\" held from April 29–May 2, 2004. More recently, the Southern California Chapter of the Art Libraries Society of North America organized a conference held in Los Angeles, from May 21–24, 2005: \"Artists Books: Creating, Collecting, Cataloging, Conserving, Collaborating.\" At ABC, less emphasis was placed on critical analysis of topics; rather, most presentations retained an informal, conversational style that aided in sharing ideas and comments. Major issues were raised about the current genre of artists' books, the lack of critical writings about it and the profound challenge of expanding the artists' book community.\n\nThe opening keynote speaker, Betty Bright, founded the Minnesota Center for the Book Arts (MCBA) in 1985. Her book No Longer Innocent: the Book Arts in America, 1960 to 1980 will be published by Granary Press in September 2005. Bright's presentation, \"To Have and To Hold: Why We Need Book Art,\" focused on historical aspects of private and institutional collecting in this country and the role of librarians and curators. She discussed the formation of early institutional library collections, notably those at the School of the Art Institute of Chicago, Atlanta College, the Museum of Modern Art and Virginia Commonwealth University. Bright divided the history of artists' books into four categories: fine press, deluxe editions, sculptural books and multiples. Increased awareness of archival materials in the production of artists' books was a noted topic of discussion.\n\nThe panel \"Collecting in Private and Public Institutions\" was moderated by Sandra Kroupa of the University of Washington, Seattle. The panelists represented both private and public institutional libraries, including Claremont College, Rhode Island School of Design, University of Wisconsin-Milwaukee and Boston Public Library. The significance and unique role of artists' books as pedagogical tools that are essential for students and faculty engaged in all areas of art, design, writing and architecture was noted. The panel \"Private Collecting\" was moderated by Sidney Berger, a faculty member at Simmons College in Boston and a private collector of artists' books. The two panelists, Robert Ruben of New York City and Duke Collier of Cambridge, MA, entertained the audience with PowerPoint presentations that described their personal motivations as collectors, and their relationships with artists, dealers and curators. Other elements discussed included managing budgets and how or if they make their collections available to others for exhibition.\n\nParticipants on the \"The Business of Artists' Books\" panel included Julie Chen, an independent book artist, Emily Larned, a representative from the art collective Booklyn Artists Alliance and Cynthia Imperatore, an independent bookseller. The moderator, Suzy Taraba of Wesleyan University, asked questions regarding how prices and edition sizes are set, what marketing strategies are used and what professional relationships are preferred and why (for example: artist/dealer, artist/librarian, dealer/librarian). The panel \"Education in the Book Arts\" included Steve Miller from University of Alabama as moderator and panelists Ken Botnick, Kitty Maryatt and Terry Chouniard who all teach and work at educational institutions. It was noted that most students lack a thorough background in typography, lettering and calligraphy.\n\nThe last day of the conference included a closing keynote presentation by Mark Dimunation, Chief of the Rare Book and Special Collection Division of the Library of Congress, titled \"What Will Next Prove a Rose: The Thorny Side of Building the Nation's Collection of Book Arts,\" a discussion about the challenges of collecting, preserving and providing access to artists' books.\n\nThe conference committee took the opportunity to give special recognition to Claire Van Vliet, a pioneer book artist who made her first artist book in 1955 under the Janus Press imprint. As a conference keepsake, an accordion book that listed all Van Vliet books was presented and commissioned by Ruth Rogers, Special Collections Librarian of Wellesley College, and made by Jan Owen.\n\nThis essay first appeared, in a slightly different form, in Afterimage magazine. It is reproduced here by permission.\n\nARLIS/NY Visits ICP\n\nBy Amy Schwarz\n\nThe International Center of Photography (ICP) treated ARLIS/NY members, on August 22 nd , to a private viewing and presentation of the exhibition, \"The Open Book: Photography in Book Form, 1870 – Present.\" Around 50 people attended—pretty impressive considering many members were away on summer vacation. ARLIS/NY President Ken Soehner introduced the hosts of the event, Deirdre Donohue, librarian, and Christopher Phillips, senior curator, at ICP.\n\nMr. Phillips began by pointing out the reverse chronology in the arrangement of photography books to complement the lower floor exhibition, \"Young America. The Daguerreotypes of Southworth & Hawes.\" A traveling exhibition, \"The Open Book\" presented photography in book form by international artists, selected by an international jury, under the curator, Ute Eskildsen of the Folkwang Museum in Essen, Germany. Due to space, ICP showed 130 of the original 175 works exhibited. The catalog and text were prepared by Andrew Roth, and published by a major contributor to and co-presenter of the exhibition, the Hasselblad Center in Götenborg, Sweden. (The catalog sells for $49.95 at ICP's outstanding bookstore on photography.)\n\nMr. Phillips explained the selection of photo-books based on originality and content, reproduction quality and graphic layout, jacket design and binding. The books opened to the pages reproduced in the catalog, with a few exceptions chosen by the curator. He described the installation process at ICP: placing each book in a cradle to support the binding, putting together plexiglass display cases, and manipulating lighting to the best advantage. Wall labels were economically made with plain sheets of paper loosely attached to the walls, suggesting pages from a book.\n\nSeveral artists' works were individually displayed in cases, such as: Ed Ruscha's running pictorial narrative, Every Building on the Sunset Strip; Nobuyoshi Araki's rare editions of self-published photocopied books; Hans-Peter Feldman's self-designed and published photo-books of ordinary, familiar scenes in life; and my favorite, El Lissitzky, the Russian constructivist painter whose book Industry of Socialism, with beautifully embossed covers, satisfied Stalin's propaganda requirements of the 1930s. Many renowned and less familiar photographer/artist's works were exhibited. With time to chat and consume the generous reception spread, the evening at ICP closed with plans to return.\n\nCurator Christopher Phillips discussing some of the photo-books in a display case with ARLIS/NY members.\n\nARLIS/NY Fall 2005 Business Meeting\n\nReported by James Mitchell\n\nThe chapter met for its annual business meeting in the South Court of the NYPL Humanities and Social Sciences Library on October 24, 2005.\n\nWe were warmly welcomed by Clayton Kirking, Chief of Art Information Resources at the library, followed by introductory remarks by Chapter Chair Ken Soehner.\n\nErin Elliot reported on membership:\n\n200 total members this year, up by 9 from 2004, and from only 133 in 2003.\n\nThis now includes 24 students, up from 12 last year; thanks especially to the recruitment efforts of Ken Soehner and Tony White, who are each teaching a section of the Art Librarianship class at the Pratt Institute. There are also a few student members from the library studies programs at Queens College and Rutgers.\n\nThree new members in attendance introduced themselves, including Francine Snyder, Manager of the Library and Archive at the Guggenheim Museum.\n\nPast-Chair Judy Connorton presented the Treasurer's report, subbing for Caitlin Kilgallen, who is on maternity leave. Current balance is $11,688.67.\n\nVice Chair Jenny Tobias announced the candidates for open chapter offices.\n\nVice Chair/Chair-Elect: Zimra Panitz [unopposed]\n\nTreasurer: Meg Black and Holly Hatheway\n\nMember-at-Large for Membership: Charlotte Priddle and Eric Wolf\n\nThe floor was opened for additional nominations, and none were received. If no more are received by Jenny by [soon], ballots will be mailed as such to all chapter members.\n\nJenny also mentioned that the board is considering proposing a bylaws revision to allow electronic voting. If so, it will be announced at next year's business meeting.\n\nKen Soehner returned to the podium to announce the few remaining chapter events for the year:\n\nRLG representatives will make presentations at the Metropolitan Museum tomorrow morning on their arts-related databases and projects.\n\nTony White is organizing a trip to Yale to see his exhibition of offset-printed artists books, on Nov. 19.\n\nThe holiday party will be held Dec. 7 at the Accompanied Library in the National Arts Club building.\n\nFrom the floor, AnnaMaria Poma-Swank also offered to host ARLIS members at an event at The Italian Academy for Advanced Studies in America, at Columbia University's Casa Italiana, where she is the librarian.\n\nJenny Tobias concluded the program with a short presentation on images of librarians in contemporary TV ads. Though most were from Europe, the use of traditional stereotypes made their messages more than clear. Librarians continue to be popularly portrayed as musty, old, slow, and desirous of silence. Young people hopped up on sugary treats continue to shake things up.\n\nFollowed by wine and cheese, and sandwiches, graciously hosted, and bartended, by Clayton Kirking, with a little help from Sharon Chickanzeff. Our thanks to them.\n\nPratt SILS in Florence\n\nBy Viktoria Paranyuk\n\nFor three weeks, May 28 to June 18, 2005, I attended the summer institute entitled \"Florentine Art and Culture: Resources and Documentation\" in Florence, Italy, offered by the School of Information and Library Science of Pratt Institute. The program was conceived and developed by AnnaMaria Poma-Swank, Adjunct Associate Professor at Pratt-SILS and Librarian at the Italian Academy for Advanced Studies in America, with the participation of Tula Giannini, Acting Dean of Pratt-SILS. It was developed in collaboration with Antonio Paolucci, Soprintendente per I Beni Artistici e Storici di Firenze, Pistoia e Prato, Claudio di Benedetto, Director of the Uffizi Library, and Antonia Ida Fontana, Director of the Biblioteca Nazionale Centrale di Firenze.\n\nFifteen participants, who came from different parts of the country, represented working academic, public, and special librarians as well as library and art history students. The intensive schedule consisted of lectures, seminars, and tours of libraries, archives, and museums in the morning and afternoon. Each day offered discovery and intellectual stimulation. The students had the privilege of hearing lectures from eminent professionals in the field of librarianship and museum research; among them were Claudio di Benedetto, Director of the Uffizi Library, Sabina Magrini from Biblioteca Medicea Laurenziana, and Beatrice Paolozzo Strozzi, Director of Museo del Bargello.\n\nAll students received access to the major research libraries, including Biblioteca Nazionale Centrale, the Library of Bernard Berenson's Villa I Tatti, and the Uffizi Library. The participants were also issued passes for the duration of the course that allowed free admission to any of the state museums of the Firenze Musei network. Thanks to AnnaMaria's close associations with her distinguished colleagues in Florence, the group gained entrance to places that ordinary tour groups do not see. Two such examples were the walk, guided by architect Antonio Godoli, through the Corridoio Vasariano with its magnificent collection of selfportraits and the comprehensive tour of the private rooms of the Medici in the Palazzo Vecchio led by a young art historian. During the weekends the students worked on their own projects, which consisted of researching artworks or topics in the history of art of Florence.\n\nIn addition to the regular program, this year the course sponsored several very special events. Among them were the visit to the Museo degli Argenti at the Pitti Palace to see the exhibition \"Maria dei Medici, Florentine Princess on the Throne of France\" accompanied by a talk given by Director Dr. Ornella Casazza, the lecture by Director Paolo Galluzzi at the Museo di Storia della Scienza, the viewing of the exhibition \"Michelangelo and Vittoria Colonna\" at Casa Buonarroti under AnnaMaria's expert guidance, and the excursion to and tour of Casa Editrice Giunti, the<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": " oldest publishing house in Italy.",
"role": "assistant"
}
] |
|
Jon Gordon Ken Blanchard The Carpenter A Story About The Greatest Success Strategies Of All Ebook Jon Gordon Ken Blanchard
Right here, we have countless book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard and collections to check out. We additionally manage to pay for variant types and furthermore type of the books to browse. The satisfactory book, fiction, history, novel, scientific research, as well as various supplementary sorts of books are readily clear here.
As this the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard, it ends occurring instinctive one of the favored book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard collections that we have. This is why you remain in the best website to see the incredible ebook to have.
The Carpenter: A Story About the Greatest Success Strategies of All
A True Story of a Carpenter - Inspirational ¦ Motivation ¦ Personality DevelopmentOnly Yesterday: The Carpenters' Story The Carpenter and The Painter Story in English ¦ Stories for Teenagers ¦ English Fairy Tales
The Carpenter TEL 9 Carpenters: The Karen Carpenter Story The Carpenters - Close to You (Biography) -Documentary *Goodbye to love* The KAREN CARPENTER Story Sabrina Carpenter - Tomorrow Starts Today (Andi Mack Theme Song) (Official Video)
¦ Carpenter and Painter
Jon Gordon Ken Blanchard Story in Tamil ¦ Tamil Fairy Tales Sad And Tragic Details About Karen Carpenter KAREN CARPENTER STORY ((FULL)) 1989 What happened to KAREN CARPENTER The Remarkable Story of Joseph the Carpenter Walrus and the Carpenter ¦ Carpenter and Painter
¦ Hindi Fairy Tales The Youngest Living Medal of Honor Recipient: Kyle Carpenter's Story Short Stories - The Carpenter Legacy of a Carpenter: Mila Haun ECP 38 The Conversion Story Of Bill Carpenter The Carpenter A Story About
The Carpenter. Bestselling author Jon Gordon returns with his most inspiring book yet, filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart. The stress of building a growing business with his wife Sarah caused him to collapse while on a morning jog.
The Carpenter: A Story About the Greatest Success ... This highly acclaimed production continues to captivate audiences across the UK with its spectacular celebration of the classic songbook that made The Carpenters a legend in the world of popular music, selling over 100 million albums and singles. Featuring all of the Carpenters hit songs includin
The Carpenters Story
Everyone wants to be successful as craftsman but they don't want to do the work. The basic and the perseverance to completing every work day by day. The carpenter the success story is all about attitude and expecting the goods, find the goods and the goods will find you. The book gives perspective of success from a carpenter points of view.
The Carpenter: A Story About the Greatest Success ... The Carpenter An elderly carpenter was ready to retire. He Page 2/12
Jon Gordon Ken Blanchard told his employer/contractor of his plans to leave the house building business and live a more leisurely life with his wife enjoying his extended family. He would miss the paycheck, but he needed to retire.
The Carpenter - A Gift of Inspiration
The Carpenter: A Story About the Greatest Success Strategies of All ¦ Wiley Bestselling author Jon Gordon returns with his most inspiring book yet̶filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart.
The Carpenter: A Story About the Greatest Success ... When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.
The Carpenter: A Story About the Greatest Success ... The carpenter said yes, but in time it was easy to see that his heart was not in his work. He resorted to shoddy workmanship and used inferior materials. It was an unfortunate way to end his career. When the carpenter finished his work and the builder came to inspect the house, the contractor handed the front-door key to the carpenter.
The Carpenter's House
September 23, 2011 in Inspirational Stories. An elderly carpenter was due to retire. He told his employer of his plans to leave the business and start a life of leisure with his wife and extended family. He would miss the money, but the time was right and he was ready to hang up his hammer. His boss Page 3/12
Jon Gordon Ken Blanchard was disappointed as the carpenter had been a loyal and diligent worker for many years, so he was sad to see him go.
The Retiring Carpenter ‒ A Story About the Life We Build ... The Carpenter: A Story About the Greatest Success Strategies of All The Shark and the Goldfish: Positive Ways to Thrive During Waves of Change The Seed: Finding Purpose and Happiness in Life and Work
The Carpenter: A Story About the Greatest Success ... Directed by Joseph Sargent, Richard Carpenter. With Cynthia Gibb, Mitchell Anderson, Peter Michael Goetz, Michael McGuire. Story of the meteoric rise and sudden fall of Karen Carpenter, who became a famous singer before battling anorexia and bulimia.
The Karen Carpenter Story (TV Movie 1989) - IMDb All characters in the story are voiced by J. Pat O'Malley. After the Carpenter discovers a family of oysters underwater, the Walrus tries to persuade them to come "walk" with them. The Mother Oyster, on the other hand, knows that the current month is March, one of the 8 months with the letter "R" in which oysters are eaten.
The Walrus and the Carpenter - Wikipedia When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.
Jon Gordon :: The Carpenter Like. "The secret to life and the greatest success strategy of Page 4/12
Jon Gordon Ken Blanchard all is to love all of it and fear none of it.". ― Jon Gordon, The Carpenter: A Story About the Greatest Success Strategies of All. 2 likes. Like. "courage is the difference between dreaming of the life you want and living the life of your dreams,".
The Carpenter Quotes by Jon Gordon - Goodreads And Jon Gordon reveals them in his book The Carpenter: A Story About the Greatest Success Strategies of All. Gordon is a bestselling author, and he writes stories that inspire us, drawing from his experience of helping Fortune 500 companies, school districts, hospitals, sports teams, and nonprofits.
10 Big Ideas from The Carpenter - Sources of Insight The Carpenters Story guitarist Ian Latimer's first real band was 'Highschool', back in the late 1970s. They wrote a lot of songs but went their separate ways before they could capture them. Anyway, forty years pass and through Facebook and remote recording, they've finally done it! 'Change' is the first track to be released by the guys.
The Carpenters Story - Home ¦ Facebook Once there was a carpenter who was really good at his job. He used to work very hard and build beautiful house. With time he grown old and felt that his body was not that strong as it used to be. Also he earned enough money to live a peaceful and leisure life with his family for rest of his life.
Retiring Carpenter Story..! Surprises in Life, Best Moral ... "A home-made furniture store. It had a sign saying that it was owned by a Master Carpenter, so I decided to see if he could fix the table. He's got some nice stuff, you could get a decent piece of furniture for your apartment, instead of the Page 5/12
Jon Gordon Ken Blanchard crap you have leftover from college." Don started to grin.
Bestselling author Jon Gordon returns with his most inspiring book yet̶filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart. The stress of building a growing business, with his wife Sarah, caused him to collapse while on a morning jog. When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure. Along the way he learns that there's no such thing as an overnight success but there are timeless principles to help you stand out, excel, and make an impact on people and the world. Drawing upon his work with countless leaders, sales people, professional and college sports teams, non-profit organizations and schools, Jon Gordon shares an entertaining and enlightening story that will inspire you to build a better life, career, and team with the greatest success strategies of all. If you are ready to create your masterpiece, read The Carpenter and begin the building process today.
Bestselling author Jon Gordon returns with his most inspiring book yet̶filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart. The stress of building a growing business, with his wife Sarah, caused him to collapse while on a morning jog. When Michael finds out the man who saved his life is a Carpenter Page 6/12
Jon Gordon Ken Blanchard he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure. Along the way he learns that there's no such thing as an overnight success but there are timeless principles to help you stand out, excel, and make an impact on people and the world. Drawing upon his work with countless leaders, sales people, professional and college sports teams, non-profit organizations and schools, Jon Gordon shares an entertaining and enlightening story that will inspire you to build a better life, career, and team with the greatest success strategies of all. If you are ready to create your masterpiece, read The Carpenter and begin the building process today.
"Alison Gopnik, a ... developmental psychologist, [examines] the paradoxes of parenthood from a scientific perspective"--
Before Jesus was a teacher and a healer‒before his life changed the world‒he was a carpenter. Woodworking was his occupation for most of his time on earth, and the years he spent in Joseph's shop clearly shaped his message and ministry. Now, by gaining an understanding of first-century carpentry, you can revolutionize your faith through the discovery of surprising insights into Christ's life. The ministry of Jesus was spiritual carpentry. He rebuilt broken people and constructed a new world. His workmanship still amazes all who put themselves in his hands, and his principles for constructing a solid life are as relevant today as they were two thousand years ago. In Lessons from the Carpenter, you can sit as an apprentice at the feet of this amazing master carpenter. And learn firsthand how he builds and rebuilds beautiful lives meant to last forever. Page 7/12
Get Free The Carpenter A Story About The Greatest Success Strategies Of All Ebook Jon Gordon Ken Blanchard
Karen Carpenter was the instantly recognisable lead singer of the Carpenters. The top-selling American musical act of the 1970s, they delivered the love songs that defined a generation. Karen's velvety voice on a string of 16 consecutive Top 20 hits from 1970 to 1976 ‒ including Close to You, We've Only Just Begun, Rainy Days and Mondays, Superstar, and Hurting Each Other ‒ propelled the duo to worldwide stardom and record sales of over 100 million. Karen's musical career was short ‒ only 13 years. During that time, the Carpenters released 10 studio albums, toured more than 200 days a year, taped five television specials, and won three Grammys and an American Music Award. But that's only part of Karen's story. As the world received news of her death at 32 years of age in 1983, she became the proverbial poster child for anorexia nervosa. Little Girl Blue is an intimate profile of Karen Carpenter, a girl from a modest Connecticut upbringing who became a Superstar. Based on exclusive interviews with nearly 100 friends and associates, including record producers, studio musicians, songwriters, television directors, photographers, radio personalities, classmates, childhood friends, neighbours, personal assistants, romantic interests, hairdressers, and housekeepers.'...thorough and affectionate biography of a singer who's been constantly undervalued by the music industry.' MOJO 'Schmidt cannot be faulted... carefully factual, sensitively pitched book.' The Word 'The first truly convincing account of her nightmarish story.' The Guardian
Family, friendship, and the spirit of giving are at the heart of this inspiring picture book. Opening in Depression-era New York, The Carpenter's Gift tells the story of eight-year-old Henry and his out-of-work father selling Christmas trees in Page 8/12
Jon Gordon Ken Blanchard Manhattan. They give one of their leftover trees to construction workers building Rockefeller Center. That tree becomes the first Rockefeller Center Christmas Tree, the finest Henry has seen when adorned with homemade decorations. Henry wishes on the tree for a nice, warm house to replace his family's drafty, one-room shack. Through the kindness of new friends and old neighbors, Henry's wish is granted, and he plants a pinecone to commemorate the event. As an old man, Henry repays the gift by donating to Rockefeller Center the enormous tree that has grown from that pinecone. After bringing joy to thousands as a beautiful Christmas tree, its wood will be used to build a home for a family in need. Written by children's nonfiction author David Rubel, in collaboration with Habitat for Humanity, The Carpenter's Gift features charming, full-color illustrations by Jim LaMarche.
Imagine 2 scenarios In the first one you have just finished reading The Carpenter. It was a great book and you remember that it mentioned a lot of smart things. But you can't remember much of it now as you close the book. In the second scenario you have just finished the same book. The difference now is that you have a deep understanding for what you have read, structured notes about key take aways and a plan for how to implement this new learning to improve your life. Most people will find themselves in scenario one after finishing Jon Gordon's The Carpenter. This is because there is a big difference between reading a book and really reading a book. We believe that reading is an investment. You spend time with a book because you hope that it will make you happier, healthier, wealthier or smarter. But simply just reading a great book is not enough. You have to understand how the information applies to your life and develop a plan for how to implement it. There is a method Page 9/12
Jon Gordon Ken Blanchard for doing this and it is the reason why a book can change one person's life and for someone else not even be worth the paper it is printed on. People who make real change thanks to a book they have read follow pretty much the same formula, even if they know it or not. You will be guided on how to extract the information from the book that is most valuable to you, how to implement it in your life and how take notes that makes you smarter. + notebook is a notebook that makes you think and that makes sure you get results. Do you want to finish The Carpenter and feel that you have a deep understanding for what you have read, structured notes about key take aways and a plan for how to implement this new learning to improve your life? Then + notebook is the perfect companion to have with you as you read The Carpenter.
From Rodney King and "driving while black" to claims of targeting of undocumented Latino immigrants, relationships surrounding race, ethnicity, and the police have faced great challenge. Race, Ethnicity, and Policing includes both classic pieces and original essays that provide the reader with a comprehensive, even-handed sense of the theoretical underpinnings, methodological challenges, and existing research necessary to understand the problems associated with racial and ethnic profiling and police bias. This pathbreaking volume affords a holistic approach to the topic, guiding readers through the complexity of these issues, making clear the ecological and political contexts that surround them, and laying the groundwork for future discussions. The seminal and forward-thinking twenty-two essays clearly illustrate that equitable treatment of citizens across racial and ethnic groups by police is one of the most critical components of a successful democracy, and that it is only when agents of social control are viewed as efficient, Page 10/12
Jon Gordon Ken Blanchard effective, and legitimate that citizens will comply with the laws that govern their society. The book includes an introduction by Robin S. Engel and contributions from leading scholars including Jeffrey A. Fagan, James J. Fyfe, Bernard E. Harcourt, Delores Jones-Brown, Ramiro Martínez, Jr., Karen F. Parker, Alex R. Piquero, Tom R. Tyler, Jerome H. Skolnick, Ronald Weitzer, and many others.
Joseph, a master craftsman and carpenter, stokes the ire of his family when he weds his pregnant (and seemingly unfaithful) betrothed, Mary. Pious, devout, and guided by the dictates of Heaven, Joseph has no issue with taking Mary ‒ who still claims to be a virgin ‒ as his wife and committing himself to the protection of her child, whom he senses is extraordinary. However, there are others who are also aware of how special the child is, and not all have its best interests at heart. Among these is the despot Herod, whose oppressive rule and wanton cruelty are legendary. Deeply troubled by a prophecy concerning a King to Come, the tyrant is committed to finding ‒ and eliminating ‒ this threat to his reign. (And, having already murdered members of his own family in order to maintain power, Herod has no qualms about killing a baby.) In addition, there are forces beyond the ken of men that also recognize the singular nature of Mary's child, and which are determined to keep the salvation that the babe represents out of mankind's reach. All of these factions and more converge on Mary and Joseph as they trek from Nazareth to Bethlehem in hopes of starting a new life. On a journey fraught with peril, Joseph fights to protect Mary and her unborn child from danger on all sides, including the elements, bandits, and Herod's legions ‒ as well as an utterly evil and otherworldly demonic force determined to stamp out mankind's only hope of redemption. Armed with little more than his wits, his faith, and his Page 11/12
Copyright : victorpost.com
Get Free The Carpenter A Story About The Greatest Success Strategies Of All Ebook
Jon Gordon Ken Blanchard carpenter's hammer, Joseph must face impossible odds to ensure the safety and survival of not only his family, but mankind's future…
"A young boy abandons his beloved electronics when an oldfashioned yellow-jointed tape measure causes his imagination to run wild in [this] wordless expression of the simple joys found in exploration and creative play"--Amazon.com.
Copyright code : 8c9c3a84af8234f5e80f4d3e34a94890
|
<urn:uuid:99cb1fe0-1a61-42db-9480-d3682b58df46>
|
CC-MAIN-2021-39
|
http://victorpost.com/cgi-bin/content/view.php?data=the_carpenter_a_story_about_the_greatest_success_strategies_of_all_ebook_jon_gordon_ken_blanchard&filetype=pdf&id=8c9c3a84af8234f5e80f4d3e34a94890
|
2021-09-23T02:16:07+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00215-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 71,494,654
| 4,157
|
eng_Latn
|
eng_Latn
| 0.995737
|
eng_Latn
| 0.998442
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1434,
3126,
4811,
6367,
8037,
9788,
11659,
13579,
15487,
17394,
19342,
19896
] |
Jon Gordon Ken Blanchard The Carpenter A Story About The Greatest Success Strategies Of All Ebook Jon Gordon Ken Blanchard
Right here, we have countless book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard and collections to check out. We additionally manage to pay for variant types and furthermore type of the books to browse. The satisfactory book, fiction, history, novel, scientific research, as well as various supplementary sorts of books are readily clear here.
As this the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard, it ends occurring instinctive one of the favored book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard collections that we have. This is why you remain in the best website to see the incredible ebook to have.
The Carpenter: A Story About the Greatest Success Strategies of All
A True Story of a Carpenter - Inspirational ¦ Motivation ¦ Personality DevelopmentOnly Yesterday: The Carpenters' Story The Carpenter and The Painter Story in English ¦ Stories for Teenagers ¦ English Fairy Tales
The Carpenter TEL 9 Carpenters: The Karen Carpenter Story The Carpenters - Close to You (Biography) -Documentary *Goodbye to love* The KAREN CARPENTER Story Sabrina Carpenter - Tomorrow Starts Today (Andi Mack Theme Song) (Official Video)
¦ Carpenter and Painter
Jon Gordon Ken Blanchard Story in Tamil ¦ Tamil Fairy Tales Sad And Tragic Details About Karen Carpenter KAREN CARPENTER STORY ((FULL)) 1989 What happened to KAREN CARPENTER The Remarkable Story of Joseph the Carpenter Walrus and the Carpenter ¦ Carpenter and Painter
¦ Hindi Fairy Tales The Youngest Living Medal of Honor Recipient: Kyle Carpenter's Story Short Stories - The Carpenter Legacy of a Carpenter: Mila Haun ECP 38 The Conversion Story Of Bill Carpenter The Carpenter A Story About
The Carpenter. Bestselling author Jon Gordon returns with his most inspiring book yet, filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart. The stress of building a growing business with his wife Sarah caused him to collapse while on a morning jog.
The Carpenter: A Story About the Greatest Success ... This highly acclaimed production continues to captivate audiences across the UK with its spectacular celebration of the classic songbook that made The Carpenters a legend in the world of popular music, selling over 100 million albums and singles. Featuring all of the Carpenters hit songs includin
The Carpenters Story
Everyone wants to be successful as craftsman but they don't want to do the work. The basic and the perseverance to completing every work day by day. The carpenter the success story is all about attitude and expecting the goods, find the goods and the goods will find you. The book gives perspective of success from a carpenter points of view.
The Carpenter: A Story About the Greatest Success ... The Carpenter An elderly carpenter was ready to retire. He Page 2/12
Jon Gordon Ken Blanchard told his employer/contractor of his plans to leave the house building business and live a more leisurely life with his wife enjoying his extended family. He would miss the paycheck, but he needed to retire.
The Carpenter - A Gift of Inspiration
The Carpenter: A Story About the Greatest Success Strategies of All ¦ Wiley Bestselling author Jon Gordon returns with his most inspiring book yet̶filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart.
The Carpenter: A Story About the Greatest Success ... When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.
The Carpenter: A Story About the Greatest Success ... The carpenter said yes, but in time it was easy to see that his heart was not in his work. He resorted to shoddy workmanship and used inferior materials. It was an unfortunate way to end his career. When the carpenter finished his work and the builder came to inspect the house, the contractor handed the front-door key to the carpenter.
The Carpenter's House
September 23, 2011 in Inspirational Stories. An elderly carpenter was due to retire. He told his employer of his plans to leave the business and start a life of leisure with his wife and extended family. He would miss the money, but the time was right and he was ready to hang up his hammer. His boss Page 3/12
Jon Gordon Ken Blanchard was disappointed as the carpenter had been a loyal and diligent worker for many years, so he was sad to see him go.
The Retiring Carpenter ‒ A Story About the Life We Build ... The Carpenter: A Story About the Greatest Success Strategies of All The Shark and the Goldfish: Positive Ways to Thrive During Waves of Change The Seed: Finding Purpose and Happiness in Life and Work
The Carpenter: A Story About the Greatest Success ... Directed by Joseph Sargent, Richard Carpenter. With Cynthia Gibb, Mitchell Anderson, Peter Michael Goetz, Michael McGuire. Story of the meteoric rise and sudden fall of Karen Carpenter, who became a famous singer before battling anorexia and bulimia.
The Karen Carpenter Story (TV Movie 1989) - IMDb All characters in the story are voiced by J. Pat O'Malley. After the Carpenter discovers a family of oysters underwater, the Walrus tries to persuade them to come "walk" with them. The Mother Oyster, on the other hand, knows that the current month is March, one of the 8 months with the letter "R" in which oysters are eaten.
The Walrus and the Carpenter - Wikipedia When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.
Jon Gordon :: Th
|
e Carpenter Like.
| 6,283
|
inside_word
|
The
|
remove_all
|
<url>
http://victorpost.com/cgi-bin/content/view.php?data=the_carpenter_a_story_about_the_greatest_success_strategies_of_all_ebook_jon_gordon_ken_blanchard&filetype=pdf&id=8c9c3a84af8234f5e80f4d3e34a94890
</url>
<text>
Jon Gordon Ken Blanchard The Carpenter A Story About The Greatest Success Strategies Of All Ebook Jon Gordon Ken Blanchard
Right here, we have countless book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard and collections to check out. We additionally manage to pay for variant types and furthermore type of the books to browse. The satisfactory book, fiction, history, novel, scientific research, as well as various supplementary sorts of books are readily clear here.
As this the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard, it ends occurring instinctive one of the favored book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard collections that we have. This is why you remain in the best website to see the incredible ebook to have.
The Carpenter: A Story About the Greatest Success Strategies of All
A True Story of a Carpenter - Inspirational ¦ Motivation ¦ Personality DevelopmentOnly Yesterday: The Carpenters' Story The Carpenter and The Painter Story in English ¦ Stories for Teenagers ¦ English Fairy Tales
The Carpenter TEL 9 Carpenters: The Karen Carpenter Story The Carpenters - Close to You (Biography) -Documentary *Goodbye to love* The KAREN CARPENTER Story Sabrina Carpenter - Tomorrow Starts Today (Andi Mack Theme Song) (Official Video)
¦ Carpenter and Painter
Jon Gordon Ken Blanchard Story in Tamil ¦ Tamil Fairy Tales Sad And Tragic Details About Karen Carpenter KAREN CARPENTER STORY ((FULL)) 1989 What happened to KAREN CARPENTER The Remarkable Story of Joseph the Carpenter Walrus and the Carpenter ¦ Carpenter and Painter
¦ Hindi Fairy Tales The Youngest Living Medal of Honor Recipient: Kyle Carpenter's Story Short Stories - The Carpenter Legacy of a Carpenter: Mila Haun ECP 38 The Conversion Story Of Bill Carpenter The Carpenter A Story About
The Carpenter. Bestselling author Jon Gordon returns with his most inspiring book yet, filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart. The stress of building a growing business with his wife Sarah caused him to collapse while on a morning jog.
The Carpenter: A Story About the Greatest Success ... This highly acclaimed production continues to captivate audiences across the UK with its spectacular celebration of the classic songbook that made The Carpenters a legend in the world of popular music, selling over 100 million albums and singles. Featuring all of the Carpenters hit songs includin
The Carpenters Story
Everyone wants to be successful as craftsman but they don't want to do the work. The basic and the perseverance to completing every work day by day. The carpenter the success story is all about attitude and expecting the goods, find the goods and the goods will find you. The book gives perspective of success from a carpenter points of view.
The Carpenter: A Story About the Greatest Success ... The Carpenter An elderly carpenter was ready to retire. He Page 2/12
Jon Gordon Ken Blanchard told his employer/contractor of his plans to leave the house building business and live a more leisurely life with his wife enjoying his extended family. He would miss the paycheck, but he needed to retire.
The Carpenter - A Gift of Inspiration
The Carpenter: A Story About the Greatest Success Strategies of All ¦ Wiley Bestselling author Jon Gordon returns with his most inspiring book yet̶filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart.
The Carpenter: A Story About the Greatest Success ... When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.
The Carpenter: A Story About the Greatest Success ... The carpenter said yes, but in time it was easy to see that his heart was not in his work. He resorted to shoddy workmanship and used inferior materials. It was an unfortunate way to end his career. When the carpenter finished his work and the builder came to inspect the house, the contractor handed the front-door key to the carpenter.
The Carpenter's House
September 23, 2011 in Inspirational Stories. An elderly carpenter was due to retire. He told his employer of his plans to leave the business and start a life of leisure with his wife and extended family. He would miss the money, but the time was right and he was ready to hang up his hammer. His boss Page 3/12
Jon Gordon Ken Blanchard was disappointed as the carpenter had been a loyal and diligent worker for many years, so he was sad to see him go.
The Retiring Carpenter ‒ A Story About the Life We Build ... The Carpenter: A Story About the Greatest Success Strategies of All The Shark and the Goldfish: Positive Ways to Thrive During Waves of Change The Seed: Finding Purpose and Happiness in Life and Work
The Carpenter: A Story About the Greatest Success ... Directed by Joseph Sargent, Richard Carpenter. With Cynthia Gibb, Mitchell Anderson, Peter Michael Goetz, Michael McGuire. Story of the meteoric rise and sudden fall of Karen Carpenter, who became a famous singer before battling anorexia and bulimia.
The Karen Carpenter Story (TV Movie 1989) - IMDb All characters in the story are voiced by J. Pat O'Malley. After the Carpenter discovers a family of oysters underwater, the Walrus tries to persuade them to come "walk" with them. The Mother Oyster, on the other hand, knows that the current month is March, one of the 8 months with the letter "R" in which oysters are eaten.
The Walrus and the Carpenter - Wikipedia When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.
Jon Gordon :: Th<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://victorpost.com/cgi-bin/content/view.php?data=the_carpenter_a_story_about_the_greatest_success_strategies_of_all_ebook_jon_gordon_ken_blanchard&filetype=pdf&id=8c9c3a84af8234f5e80f4d3e34a94890\n</url>\n<text>\nJon Gordon Ken Blanchard The Carpenter A Story About The Greatest Success Strategies Of All Ebook Jon Gordon Ken Blanchard\n\nRight here, we have countless book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard and collections to check out. We additionally manage to pay for variant types and furthermore type of the books to browse. The satisfactory book, fiction, history, novel, scientific research, as well as various supplementary sorts of books are readily clear here.\n\nAs this the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard, it ends occurring instinctive one of the favored book the carpenter a story about the greatest success strategies of all ebook jon gordon ken blanchard collections that we have. This is why you remain in the best website to see the incredible ebook to have.\n\nThe Carpenter: A Story About the Greatest Success Strategies of All\n\nA True Story of a Carpenter - Inspirational ¦ Motivation ¦ Personality DevelopmentOnly Yesterday: The Carpenters' Story The Carpenter and The Painter Story in English ¦ Stories for Teenagers ¦ English Fairy Tales\n\nThe Carpenter TEL 9 Carpenters: The Karen Carpenter Story The Carpenters - Close to You (Biography) -Documentary *Goodbye to love* The KAREN CARPENTER Story Sabrina Carpenter - Tomorrow Starts Today (Andi Mack Theme Song) (Official Video)\n\n¦ Carpenter and Painter\n\nJon Gordon Ken Blanchard Story in Tamil ¦ Tamil Fairy Tales Sad And Tragic Details About Karen Carpenter KAREN CARPENTER STORY ((FULL)) 1989 What happened to KAREN CARPENTER The Remarkable Story of Joseph the Carpenter Walrus and the Carpenter ¦ Carpenter and Painter\n\n¦ Hindi Fairy Tales The Youngest Living Medal of Honor Recipient: Kyle Carpenter's Story Short Stories - The Carpenter Legacy of a Carpenter: Mila Haun ECP 38 The Conversion Story Of Bill Carpenter The Carpenter A Story About\n\nThe Carpenter. Bestselling author Jon Gordon returns with his most inspiring book yet, filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart. The stress of building a growing business with his wife Sarah caused him to collapse while on a morning jog.\n\nThe Carpenter: A Story About the Greatest Success ... This highly acclaimed production continues to captivate audiences across the UK with its spectacular celebration of the classic songbook that made The Carpenters a legend in the world of popular music, selling over 100 million albums and singles. Featuring all of the Carpenters hit songs includin\n\nThe Carpenters Story\n\nEveryone wants to be successful as craftsman but they don't want to do the work. The basic and the perseverance to completing every work day by day. The carpenter the success story is all about attitude and expecting the goods, find the goods and the goods will find you. The book gives perspective of success from a carpenter points of view.\n\nThe Carpenter: A Story About the Greatest Success ... The Carpenter An elderly carpenter was ready to retire. He Page 2/12\n\nJon Gordon Ken Blanchard told his employer/contractor of his plans to leave the house building business and live a more leisurely life with his wife enjoying his extended family. He would miss the paycheck, but he needed to retire.\n\nThe Carpenter - A Gift of Inspiration\n\nThe Carpenter: A Story About the Greatest Success Strategies of All ¦ Wiley Bestselling author Jon Gordon returns with his most inspiring book yet̶filled with powerful lessons and the greatest success strategies of all. Michael wakes up in the hospital with a bandage on his head and fear in his heart.\n\nThe Carpenter: A Story About the Greatest Success ... When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.\n\nThe Carpenter: A Story About the Greatest Success ... The carpenter said yes, but in time it was easy to see that his heart was not in his work. He resorted to shoddy workmanship and used inferior materials. It was an unfortunate way to end his career. When the carpenter finished his work and the builder came to inspect the house, the contractor handed the front-door key to the carpenter.\n\nThe Carpenter's House\n\nSeptember 23, 2011 in Inspirational Stories. An elderly carpenter was due to retire. He told his employer of his plans to leave the business and start a life of leisure with his wife and extended family. He would miss the money, but the time was right and he was ready to hang up his hammer. His boss Page 3/12\n\nJon Gordon Ken Blanchard was disappointed as the carpenter had been a loyal and diligent worker for many years, so he was sad to see him go.\n\nThe Retiring Carpenter ‒ A Story About the Life We Build ... The Carpenter: A Story About the Greatest Success Strategies of All The Shark and the Goldfish: Positive Ways to Thrive During Waves of Change The Seed: Finding Purpose and Happiness in Life and Work\n\nThe Carpenter: A Story About the Greatest Success ... Directed by Joseph Sargent, Richard Carpenter. With Cynthia Gibb, Mitchell Anderson, Peter Michael Goetz, Michael McGuire. Story of the meteoric rise and sudden fall of Karen Carpenter, who became a famous singer before battling anorexia and bulimia.\n\nThe Karen Carpenter Story (TV Movie 1989) - IMDb All characters in the story are voiced by J. Pat O'Malley. After the Carpenter discovers a family of oysters underwater, the Walrus tries to persuade them to come \"walk\" with them. The Mother Oyster, on the other hand, knows that the current month is March, one of the 8 months with the letter \"R\" in which oysters are eaten.\n\nThe Walrus and the Carpenter - Wikipedia When Michael finds out the man who saved his life is a Carpenter he visits him and quickly learns that he is more than just a Carpenter; he is also a builder of lives, careers, people, and teams. As the Carpenter shares his wisdom, Michael attempts to save his business in the face of adversity, rejection, fear, and failure.\n\nJon Gordon :: Th<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "e Carpenter Like.",
"role": "assistant"
}
] |
|
Hello Oklahoma State Granger and all other Grangers across our Great Nation. It has been very hot and dry this summer. And it seems that the time has just flown by, the schools have already taken back up and State Session is just around the corner.
I would like to congratulate our 2023/2024 Oklahoma State Grange scholarship recipients for this year. They are Christopher Thomsen and Halie Thomsen of Thompson Grange #352 & Charli Moore of South Coffeyville Grange # 351 and Hayden Babb of Bluejacket Grange # 353. All of our recipients are all very deserving and capable young adults and I know will do well in all they do and will represent our State Grange with pride and honor.
The Great Plains Regional Conference hosted in June 2023 by the Texas State Grange in Kerrville, TX was a great success. Texas State Grange and the National youth team and National Directors had some very interesting workshops. Our own Emily Joy Shufeldt of Thompson Grange #352 won the Regional speech contest, and will be representing us at the National Convention in November in Niagara Fall N.Y. And Landon Knight won the Junior Grange baseball contest. We also visited the Museum of Western Arts which was very grand and informative, our patrons also got to participate in several craft projects while we were at the Museum. I would like to thank the Texas State Grange for hosting and making everyone feel right at home.
The 108th Annual Oklahoma State Grange Session will be held on October 20th, 21st & 22nd, 2023 at the Claremore Conference Center / Holiday Inn Express located at 1400 Country Club Road, Claremore OK. 74017. Most of us will be arriving on the evening of October 19th at the hotel and the Oklahoma State Grange Executive Board will have a board meeting at 6:00 pm and the Grange Mutual Insurance Board will have their meeting a 7:00 pm with the State Officers having drill practice afterwards. Registration forms need to be sent to me by September 15th, 2023. Registration Fees will be $20 per Youth and Adults and $10 per Juniors ages 5-14, please fill out one registration form per person so we can get a good count on everybody. I will make all the hotel reservations so make sure you indicate what type of room you prefer, Also, all Juniors will stay in their parents’ room unless pre-arranged, so if you need an extra room for your children, please let me know.
This is an election year again, so everyone needs to be thinking about that and about who would be the best candidates to lead our great organization in the future.
The Theme for the celebration Banquet on Friday night Oct. 20th, 2023, will be Black Tie Masquerade would love to see everyone dressed up.
All 2023/2024 Scholarship recipients, if you cannot attend the whole State Session, you will at least need to be at the Celebration Banquet on Friday night Oct. 20th, 2023, to accept and give your Scholarship acceptance speech.
All Subordinate Granges need to get your Community Service Project Books ready and sent to Oklahoma State Grange Activities and Community Service Director, Lisa Evans by September 23rd, 2023. You can send them to her at P.O. Box 504 Ketchum OK 74349. If you need to get in contact with Lisa, you can reach her at 918-570-9269 or email [email protected]
Also, all Subordinate Granges need to have their Resolutions for the State Session Sent to State Secretary Jennie Harrington by October 1st, 2023, so she can put them in the Delegate folders. If you miss the deadline, you can bring them to the State Session and turn them in on September 20th, 2023.
If anyone needs any help from Oklahoma State Grange Secretary Jeannie Harrington, you can reach her at email: [email protected] or mail to 4253 NS 406 Rd. Wann, OK 74083 or phone number main 918-559-9507.
Also, if anyone would like to post anything on our state website, please fill free to contact Yvonne Meritt at 405-262-3354 or email her at [email protected].
If anyone needs anything from me, please feel free to contact me anytime.
Fraternally Submitted
Master Billy D. Shufeldt
6399 NS 413 RD South Coffeyville OK 74072,
Phone 918-842-0242, email: [email protected]
MEMBERSHIP MATTERS
Carl Shufeldt
Jerry Taylor
Membership Directors
Hello Fellow Grangers
Hope everyone is doing well. This year seems to have flown by even faster than normal. It’s hard to believe State Session is upon us. We had a slight gain in membership for the second quarter. We had six subordinate granges gain membership. We had three with losses and ten remained the same. Overall we had a gain of three members. We hope to see everyone at State Session. Come out to support your Grange and have fellowship.
SECRETARIES TAKE NOTES
Jeannie Harrington
State Secretary
I hope this newsletter finds everyone well and in good health. Summer went by fast and Oklahoma Grange State Session is just a little over a month away. It doesn’t seem like it has been a year since we last met for State Session.
This year the Oklahoma State Session will be at the Holiday Inn Express in Claremore, OK, October 20-22, 2023. With that in mind, I am needing each Subordinate Grange to send in your RESOLUTIONS and GRANGE OFFICER AND DIRECTOR REPORTS by OCTOBER 1st. I also need each Grange to send a list of your OFFICERS.
If you have had any deaths of Grange members, I would like for you to send me those names to be read and honored during the Memorial Service at State Session. Also, I will be needing the names of the DELEGATES from each Grange.
And don’t forget the third quarter dues will need to be paid BEFORE State Session.
OKLAHOMA STATE GRANGE
CONVENTION
108th ANNUAL SESSION
OCTOBER 20-23, 2023
Registration Form (Per Room)
Holiday Inn Express
1400 Country Club Rd
Claremore, OK 74017
(918)283-4877
Grange Name and #
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Address ________________________________________________________________
Rooms- (This is a non-smoking hotel)
Cost of rooms are $79.00 per night not including tax.
Please √ type of room needed.
Double□ King □ Handicap □
Please √ each day room is needed.
Thursday □ Friday□ Saturday□
Meals: Continental Breakfast is included with stay.
Friday lunch is on your own.
Friday Evening Banquet: (THEME: Black Tie Masquerade)
Adults # _______ Children # _______
Saturday Luncheon: Complements of Grange Mutual Insurance.
Adults # _______ Children # _______
Saturday Dinner is on your own.
Please list food allergies _________________________________________________
REGISTRATION FEE:
$20.00 ADULT _______
$10.00 CHILD _______(ages 5-13; Juniors room with Parents)
Total included with form: $ __________
Please send money and registration form to:
Billy Shufeldt
6399 NS 413 Rd.
South Coffeyville, Ok 74072
State Master will make all room reservations. _______ (No later than September 15th, 2023)
Oklahoma State Grange takes care of only one room per Subordinate Grange.
Comments: ____________________________________________________________
Scheneista Procter
State Junior Director
Hello Juniors,
We hope everyone is having a great school year so far. We can’t believe it’s already time for state session. State session this year will be held in Claremore again. We are planning to do some fun activities along with some team building crafts. We are asking that you wear some old clothes that won’t matter if you get paint on them or food coloring. We will not be doing any contests this year, so we hope that everyone will do the Grange activities contests and the Lecturer contests. They always have good contests and they always have a category for the juniors, so we hope everyone will participate. We have a lot planned, so we hope that everyone will try and attend the state session. Stay safe and healthy and we can’t wait to see you in October.
Fraternally submitted,
Scheneista Procter
State Junior Director
Debbie Borgstrom
Audrey Bowers
Kim Knight
Committee members
GRANGE SWEETHEARTS CELEBRATE THEIR 50TH WEDDING ANNIVERSARY
Kay Meritt and Yvonne Haymaker were married on August 31, 1973 in Dover, Oklahoma. They currently reside in Union City. They had 2 sons. Their oldest son Kris lives in Union City and he has 2 children. Grandson Ryan Meritt is a Senior and Granddaughter Jessi is a Freshman, at Wellston High School. Their son Nickolas passed away when he was 7 years old. The Meritts are members of Prairie Grange #334. Kay serves on State Executive Committee and Yvonne is Past State Master of the Oklahoma State Grange and both work together as Co-Editors of the Sooner State Granger. They celebrated their anniversary in August with very close family and friends.
Oklahoma Grange Youth participating in contest at the Great Plains Conference
CHAPLAIN CORNER
Shelia Conrady, State Chaplain
Fellow Grangers it’s almost time to meet again, and I hope I get to fellowship with you at the state Grange session in a few weeks. The year and seasons have flown by, this time last year my family farm had finished a dismal harvest and we were in the grips of one of the worst droughts in a hundred years. This year I am feeling blessed, God’s faithfulness brought us through those trials. What a difference a year makes. A wet summer has filled those dry ponds. Hay is stacked everywhere, when last year saw me selling off half my livestock because we knew we couldn’t feed and water them through winter. Last year I worried about having enough seed wheat this year we cut wheat and corn and still have milo to cut. Whether for our life situation or farming seasons and harvest change when we are patient and trust the Lord. This is what the Bible tells us about harvest. GALATIANS 6:9 And let us not grow weary of doing good for in due season we will reap, if we do not give up. JAMES 5:7-12 Be patient, therefore, brothers, until the coming of the Lord. See how the farmer waits for the precious fruit of the earth, be patient about it. You need not be a farmer to have a “harvest” in your life. We all do. Teachers plant seeds of knowledge. Coaches and parents plant a love for the game. Doctors and nurses plant seeds of health. One of the most important seeds we plant as Christians is seeds of faith and relationships with Christ. We do this by sharing our faith and also by living our faith. We do this by acts of kindness and service that hopefully someone wonders what makes us different and hopefully wants to know more about our faith in Christ. Both the Bible and Grange ritual use metaphors of farm life and harvest to convey the need for service to others. I hope you have headed my emphasis on a Grange year of Giving and have reached out to your fellow Grangers and your community.
Bailey Miranda
Youth and Young Couple Director
Hello Youth and Young Adults,
Hey all! I hope everyone had a great summer and the start to your school year has been good for everyone in school!
The Great Plains Regional Leadership Conference was June 9th-11th, and we had such a great time from playing Grange Baseball and to going to the Museum of Western Art. We had a good group of Youth from Oklahoma that were able to attend and participate in some of the contest that were going on! Landon Knight place 1st in Grange Baseball and Emily Shufeldt placed 1st in the speech contest and will be representing Oklahoma at National this year in Niagara Falls, New York November 15th-19th.
The Oklahoma State Grange Session is October 20th-22nd in Claremore, OK and registration for state session is due no later than September 15th. For scholarship recipients don’t forget to send in your school enrollment and your class schedules you can email them to Billy Shufeldt at [email protected], also scholarship recipients are required to be at the Friday Night Banquet, and we will be serving food at Friday Night Banquet as well. We will be serving lunch on Saturday, and we will be presenting our drill and the 5th Degree on Saturday night. I hope everyone can stay and participate with us.
I hope everyone had an amazing summer and I can’t wait to see you all in October!
Please join our Facebook page: Oklahoma State Grange Youth
If you have any questions, please feel free to get ahold of me.
Bailey Miranda
Oklahoma State Youth Director
Email: [email protected]
Phone: (918)467-0337
Address: 1413 South East Ave
Pauls Valley, Ok 73075
Grange Mutual Insurance Association of Oklahoma
In accordance with the provisions of the By-laws of the Association, you are hereby notified that the Regular Annual Meeting of the membership will be held at:
Holiday Inn Express
1400 Country Club Rd, Claremore, OK 74017
Saturday, October 21, 2023, 12:00 Noon; meal will be provided; Please RSVP (800-871-2479)
The following members have been nominated for 3 year term on the Board of Directors: Two will be selected.
2023 Annual Meeting Election
Dee Procter
Mark Evans
Kay Meritt
Agenda:
12-1:00 pm Lunch
1:00 pm Call to order
Declaration of quorum
Welcome
Registration closes
Report of Secretary
Report of Treasurer
Adjournment
LECTURER’S DEPARTMENT
Donna Keeton, State Lecturer
I can’t believe summer is over and school is back in session. I hope everyone is finishing up with the Lecturer’s Contests. All categories will have the following age groups: 5 to 9, 10 to 14, 15 and older. All entries must be brought to the Oklahoma State Session to be held in Claremore, OK. The categories will be as follows:
Photography: Submit a 4 x 6 photo, put name, Grange, and age group on back (no backing necessary) All photography categories are up to the participants interpretation.
Community Service in Motion
- Sights of Spring
- It’s a Good Day to Be a Granger
Writing: Submit a 500 word maximum handwritten or typed story on the below topic. Submit the essay with name, Grange, and age group written on the back. No names on the front page.
My Grange Superhero
Drawing: Submit a drawing on a 8x 10 paper with name, Grange, and age group printed on the back. Can use any utensils in creating i.e. Crayons, markers, or pencils, etc.
Painting: Submit a painting using Watercolors. Must be on a canvas no larger than 11 x 13. Print name, Grange, and age group on the back.
Color a Picture: Color the picture that was published in the Sooner State Granger March 2023 or can be found on www.oklahomastategrange.net in the Lecturers section. There will be an added age group of 1 to 4 for this particular contest. Print name, Grange, and age group on the back.
I look forward to seeing everyone at the State Session.
GRANGE ACTIVITIES
Lisa Evans, State Director
I hope everyone is having a great summer. The State Session will be here before we know it. I have included the contest so there will be plenty of time to create your entries. The community books will be due September 23rd 2023. The forms can be found on the Oklahoma State Grange Website Please mail the books to Lisa Evans PO Box 504 Ketchum, Oklahoma 74349.
Junior: Decorate a pumpkin, make a Christmas decoration, paper towel craft.
Youth: Decorate a Pumpkin, Create jewelry out of any material, Create a Christmas ornament.
Women: Make a Christmas ornament, create a Christmas centerpiece out of any material, and create something out of a recycled item.
Men: Create a sign for the home out any material, make an outdoor Christmas decoration, make a picture frame out any material.
Pre-Junior Grange members having fun at the Great Plains Conference
Dates to Remember
Sept 15 Registration forms due to the State President
Sept 23 Community Service Projects Due, Mail to Lisa Evans
Oct. 20-23 Oklahoma State Grange State Session
Holiday Inn Express Claremore, OK
Nov. 15-19 National Grange Convention
Dec. 1 Articles of newsletter are due.
|
ead5c24c-b9ef-47e0-9685-b4e4f894e9b6
|
CC-MAIN-2024-38
|
https://img1.wsimg.com/blobby/go/4cae4089-b619-4e8e-9e11-aaec47c1dd0f/downloads/Sooner%20State%20Granger%20September2023.pdf?ver=1725332474637
|
2024-09-14T07:12:58+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-38/subset=warc/part-00280-781f89b0-54ef-4e32-b51d-e5860e733e3a.c000.gz.parquet
| 272,611,032
| 3,744
|
eng_Latn
|
eng_Latn
| 0.973766
|
eng_Latn
| 0.997761
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
2913,
5615,
7350,
9081,
12692,
13377,
15775,
16088
] |
Hello Oklahoma State Granger and all other Grangers across our Great Nation. It has been very hot and dry this summer. And it seems that the time has just flown by, the schools have already taken back up and State Session is just around the corner.
I would like to congratulate our 2023/2024 Oklahoma State Grange scholarship recipients for this year. They are Christopher Thomsen and Halie Thomsen of Thompson Grange #352 & Charli Moore of South Coffeyville Grange # 351 and Hayden Babb of Bluejacket Grange # 353. All of our recipients are all very deserving and capable young adults and I know will do well in all they do and will represent our State Grange with pride and honor.
The Great Plains Regional Conference hosted in June 2023 by the Texas State Grange in Kerrville, TX was a great success. Texas State Grange and the National youth team and National Directors had some very interesting workshops. Our own Emily Joy Shufeldt of Thompson Grange #352 won the Regional speech contest, and will be representing us at the National Convention in November in Niagara Fall N.Y. And Landon Knight won the Junior Grange baseball contest. We also visited the Museum of Western Arts which was very grand and informative, our patrons also got to participate in several craft projects while we were at the Museum. I would like to thank the Texas State Grange for hosting and making everyone feel right at home.
The 108th Annual Oklahoma State Grange Session will be held on October 20th, 21st & 22nd, 2023 at the Claremore Conference Center / Holiday Inn Express located at 1400 Country Club Road, Claremore OK. 74017. Most of us will be arriving on the evening of October 19th at the hotel and the Oklahoma State Grange Executive Board will have a board meeting at 6:00 pm and the Grange Mutual Insurance Board will have their meeting a 7:00 pm with the State Officers having drill practice afterwards. Registration forms need to be sent to me by September 15th, 2023. Registration Fees will be $20 per Youth and Adults and $10 per Juniors ages 5-14, please fill out one registration form per person so we can get a good count on everybody. I will make all the hotel reservations so make sure you indicate what type of room you prefer, Also, all Juniors will stay in their parents’ room unless pre-arranged, so if you need an extra room for your children, please let me know.
This is an election year again, so everyone needs to be thinking about that and about who would be the best candidates to lead our great organization in the future.
The Theme for the celebration Banquet on Friday night Oct. 20th, 2023, will be Black Tie Masquerade would love to see everyone dressed up.
All 2023/2024 Scholarship recipients, if you cannot attend the whole State Session, you will at least need to be at the Celebration Banquet on Friday night Oct. 20th, 2023, to accept and give your Scholarship acceptance speech.
All Subordinate Granges need to get your Community Service Project Books ready and sent to Oklahoma State Grange Activities and Community Service Director, Lisa Evans by September 23rd, 2023. You can send them to her at P.O. Box 504 Ketchum OK 74349. If you need to get in contact with Lisa, you can reach her at 918-570-9269 or email [email protected]
Also, all Subordinate Granges need to have their Resolutions for the State Session Sent to State Secretary Jennie Harrington by October 1st, 2023, so she can put them in the Delegate folders. If you miss the deadline, you can bring them to the State Session and turn them in on September 20th, 2023.
If anyone needs any help from Oklahoma State Grange Secretary Jeannie Harrington, you can reach her at email: [email protected] or mail to 4253 NS 406 Rd. Wann, OK 74083 or phone number main 918-559-9507.
Also, if anyone would like to post anything on our state website, please fill free to contact Yvonne Meritt at 405-262-3354 or email her at [email protected].
If anyone needs anything from me, please feel free to contact me anytime.
Fraternally Submitted
Master Billy D. Shufeldt
6399 NS 413 RD South Coffeyville OK 74072,
Phone 918-842-0242, email: [email protected]
MEMBERSHIP MATTERS
Carl Shufeldt
Jerry Taylor
Membership Directors
Hello Fellow Grangers
Hope everyone is doing well. This year seems to have flown by even faster than normal. It’s hard to believe State Session is upon us.
|
We had a slight gain in membership for the second quarter.
|
We had six subordinate granges gain membership. We had three with losses and ten remained the same. Overall we had a gain of three members. We hope to see everyone at State Session. Come out to support your Grange and have fellowship.
SECRETARIES TAKE NOTES
Jeannie Harrington
State Secretary
I hope this newsletter finds everyone well and in good health. Summer went by fast and Oklahoma Grange State Session is just a little over a month away. It doesn’t seem like it has been a year since we last met for State Session.
This year the Oklahoma State Session will be at the Holiday Inn Express in Claremore, OK, October 20-22, 2023. With that in mind, I am needing each Subordinate Grange to send in your RESOLUTIONS and GRANGE OFFICER AND DIRECTOR REPORTS by OCTOBER 1st. I also need each Grange to send a list of your OFFICERS.
If you have had any deaths of Grange members, I would like for you to send me those names to be read and honored during the Memorial Service at State Session. Also, I will be needing the names of the DELEGATES from each Grange.
And don’t forget the third quarter dues will need to be paid BEFORE State Session.
OKLAHOMA STATE GRANGE
CONVENTION
108th ANNUAL SESSION
OCTOBER 20-23, 2023
Registration Form (Per Room)
Holiday Inn Express
1400 Country Club Rd
Claremore, OK 74017
(918)283-4877
Grange Name and #
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Address ________________________________________________________________
Rooms- (This is a non-smoking hotel)
Cost of rooms are $79.00 per night not including tax.
Please √ type of room needed.
Double□ King □ Handicap □
Please √ each day room is needed.
Thursday □ Friday□ Saturday□
Meals: Continental Breakfast is included with stay.
Friday lunch is on your own.
Friday Evening Banquet: (THEME: Black Tie Masquerade)
Adults # _______ Children # _______
Saturday Luncheon: Complements of Grange Mutual Insurance.
Adults # _______ Children # _______
Saturday Dinner is on your own.
Please list food allergies _________________________________________________
REGISTRATION FEE:
$20.00 ADULT _______
$10.00 CHILD _______(ages 5-13; Juniors room with Parents)
Total included with form: $ __________
Please send money and registration form to:
Billy Shufeldt
6399 NS 413 Rd.
South Coffeyville, Ok 74072
State Master will make all room reservations. _______ (No later than September 15th, 2023)
Oklahoma State Grange takes care of only one room per Subordinate Grange.
Comments: ____________________________________________________________
Scheneista Procter
State Junior Director
Hello Juniors,
We hope everyone is having a great school year so far. We can’t believe it’s already time for state session. State session this year will be held in Claremore again. We are planning to do some fun activities along with some team building crafts. We are asking that you wear some old clothes that won’t matter if you get paint on them or food coloring. We will not be doing any contests this year, so we hope that everyone will do the Grange activities contests and the Lecturer contests. They always have good contests and they always have a category for the juniors, so we hope everyone will participate. We have a lot planned, so we hope that everyone will try and attend the state session. Stay safe and healthy and we can’t wait to see you in October.
Fraternally submitted,
Scheneista Procter
State Junior Director
Debbie Borgstrom
Audrey Bowers
Kim Knight
Committee members
GRANGE SWEETHEARTS CELEBRATE THEIR 50TH WEDDING ANNIVERSARY
Kay Meritt and Yvonne Haymaker were married on August 31, 1973 in Dover, Oklahoma. They currently reside in Union City. They had 2 sons. Their oldest son Kris lives in Union City and he has 2 children. Grandson Ryan Meritt is a Senior and Granddaughter Jessi is a Freshman, at Wellston High School. Their son Nickolas passed away when he was 7 years old. The Meritts are members of Prairie Grange #334. Kay serves on State Executive Committee and Yvonne is Past State Master of the Oklahoma State Grange and both work together as Co-Editors of the Sooner State Granger. They celebrated their anniversary in August with very close family and friends.
Oklahoma Grange Youth participating in contest at the Great Plains Conference
CHAPLAIN CORNER
Shelia Conrady, State Chaplain
Fellow Grangers it’s almost time to meet again, and I hope I get to fellowship with you at the state Grange session in a few weeks. The year and seasons have flown by, this time last year my family farm had finished a dismal harvest and we were in the grips of one of the worst droughts in a hundred years. This year I am feeling blessed, God’s faithfulness brought us through those trials. What a difference a year makes. A wet summer has filled those dry ponds. Hay is stacked everywhere, when last year saw me selling off half my livestock because we knew we couldn’t feed and water them through winter. Last year I worried about having enough seed wheat this year we cut wheat and corn and still have milo to cut. Whether for our life situation or farming seasons and harvest change when we are patient and trust the Lord. This is what the Bible tells us about harvest. GALATIANS 6:9 And let us not grow weary of doing good for in due season we will reap, if we do not give up. JAMES 5:7-12 Be patient, therefore, brothers, until the coming of the Lord. See how the farmer waits for the precious fruit of the earth, be patient about it. You need not be a farmer to have a “harvest” in your life. We all do. Teachers plant seeds of knowledge. Coaches and parents plant a love for the game. Doctors and nurses plant seeds of health. One of the most important seeds we plant as Christians is seeds of faith and relationships with Christ. We do this by sharing our faith and also by living our faith. We do this by acts of kindness and service that hopefully someone wonders what makes us different and hopefully wants to know more about our faith in Christ. Both the Bible and Grange ritual use metaphors of farm life and harvest to convey the need for service to others. I hope you have headed my emphasis on a Grange year of Giving and have reached out to your fellow Grangers and your community.
Bailey Miranda
Youth and Young Couple Director
Hello Youth and Young Adults,
Hey all! I hope everyone had a great summer and the start to your school year has been good for everyone in school!
The Great Plains Regional Leadership Conference was June 9th-11th, and we had such a great time from playing Grange Baseball and to going to the Museum of Western Art. We had a good group of Youth from Oklahoma that were able to attend and participate in some of the contest that were going on! Landon Knight place 1st in Grange Baseball and Emily Shufeldt placed 1st in the speech contest and will be representing Oklahoma at National this year in Niagara Falls, New York November 15th-19th.
The Oklahoma State Grange Session is October 20th-22nd in Claremore, OK and registration for state session is due no later than September 15th. For scholarship recipients don’t forget to send in your school enrollment and your class schedules you can email them to Billy Shufeldt at [email protected], also scholarship recipients are required to be at the Friday Night Banquet, and we will be serving food at Friday Night Banquet as well. We will be serving lunch on Saturday, and we will be presenting our drill and the 5th Degree on Saturday night. I hope everyone can stay and participate with us.
I hope everyone had an amazing summer and I can’t wait to see you all in October!
Please join our Facebook page: Oklahoma State Grange Youth
If you have any questions, please feel free to get ahold of me.
Bailey Miranda
Oklahoma State Youth Director
Email: [email protected]
Phone: (918)467-0337
Address: 1413 South East Ave
Pauls Valley, Ok 73075
Grange Mutual Insurance Association of Oklahoma
In accordance with the provisions of the By-laws of the Association, you are hereby notified that the Regular Annual Meeting of the membership will be held at:
Holiday Inn Express
1400 Country Club Rd, Claremore, OK 74017
Saturday, October 21, 2023, 12:00 Noon; meal will be provided; Please RSVP (800-871-2479)
The following members have been nominated for 3 year term on the Board of Directors: Two will be selected.
2023 Annual Meeting Election
Dee Procter
Mark Evans
Kay Meritt
Agenda:
12-1:00 pm Lunch
1:00 pm Call to order
Declaration of quorum
Welcome
Registration closes
Report of Secretary
Report of Treasurer
Adjournment
LECTURER’S DEPARTMENT
Donna Keeton, State Lecturer
I can’t believe summer is over and school is back in session. I hope everyone is finishing up with the Lecturer’s Contests. All categories will have the following age groups: 5 to 9, 10 to 14, 15 and older. All entries must be brought to the Oklahoma State Session to be held in Claremore, OK. The categories will be as follows:
Photography: Submit a 4 x 6 photo, put name, Grange, and age group on back (no backing necessary) All photography categories are up to the participants interpretation.
Community Service in Motion
- Sights of Spring
- It’s a Good Day to Be a Granger
Writing: Submit a 500 word maximum handwritten or typed story on the below topic. Submit the essay with name, Grange, and age group written on the back. No names on the front page.
My Grange Superhero
Drawing: Submit a drawing on a 8x 10 paper with name, Grange, and age group printed on the back. Can use any utensils in creating i.e. Crayons, markers, or pencils, etc.
Painting: Submit a painting using Watercolors. Must be on a canvas no larger than 11 x 13. Print name, Grange, and age group on the back.
Color a Picture: Color the picture that was published in the Sooner State Granger March 2023 or can be found on www.oklahomastategrange.net in the Lecturers section. There will be an added age group of 1 to 4 for this particular contest. Print name, Grange, and age group on the back.
I look forward to seeing everyone at the State Session.
GRANGE ACTIVITIES
Lisa Evans, State Director
I hope everyone is having a great summer. The State Session will be here before we know it. I have included the contest so there will be plenty of time to create your entries. The community books will be due September 23rd 2023. The forms can be found on the Oklahoma State Grange Website Please mail the books to Lisa Evans PO Box 504 Ketchum, Oklahoma 74349.
Junior: Decorate a pumpkin, make a Christmas decoration, paper towel craft.
Youth: Decorate a Pumpkin, Create jewelry out of any material, Create a Christmas ornament.
Women: Make a Christmas ornament, create a Christmas centerpiece out of any material, and create something out of a recycled item.
Men: Create a sign for the home out any material, make an outdoor Christmas decoration, make a picture frame out any material.
Pre-Junior Grange members having fun at the Great Plains Conference
Dates to Remember
Sept 15 Registration forms due to the State President
Sept 23 Community Service Projects Due, Mail to Lisa Evans
Oct. 20-23 Oklahoma State Grange State Session
Holiday Inn Express Claremore, OK
Nov. 15-19 National Grange Convention
Dec. 1 Articles of newsletter are due.
| 4,398
|
inside_word
|
We
|
remove_one_sentence
|
<url>
https://img1.wsimg.com/blobby/go/4cae4089-b619-4e8e-9e11-aaec47c1dd0f/downloads/Sooner%20State%20Granger%20September2023.pdf?ver=1725332474637
</url>
<text>
Hello Oklahoma State Granger and all other Grangers across our Great Nation. It has been very hot and dry this summer. And it seems that the time has just flown by, the schools have already taken back up and State Session is just around the corner.
I would like to congratulate our 2023/2024 Oklahoma State Grange scholarship recipients for this year. They are Christopher Thomsen and Halie Thomsen of Thompson Grange #352 & Charli Moore of South Coffeyville Grange # 351 and Hayden Babb of Bluejacket Grange # 353. All of our recipients are all very deserving and capable young adults and I know will do well in all they do and will represent our State Grange with pride and honor.
The Great Plains Regional Conference hosted in June 2023 by the Texas State Grange in Kerrville, TX was a great success. Texas State Grange and the National youth team and National Directors had some very interesting workshops. Our own Emily Joy Shufeldt of Thompson Grange #352 won the Regional speech contest, and will be representing us at the National Convention in November in Niagara Fall N.Y. And Landon Knight won the Junior Grange baseball contest. We also visited the Museum of Western Arts which was very grand and informative, our patrons also got to participate in several craft projects while we were at the Museum. I would like to thank the Texas State Grange for hosting and making everyone feel right at home.
The 108th Annual Oklahoma State Grange Session will be held on October 20th, 21st & 22nd, 2023 at the Claremore Conference Center / Holiday Inn Express located at 1400 Country Club Road, Claremore OK. 74017. Most of us will be arriving on the evening of October 19th at the hotel and the Oklahoma State Grange Executive Board will have a board meeting at 6:00 pm and the Grange Mutual Insurance Board will have their meeting a 7:00 pm with the State Officers having drill practice afterwards. Registration forms need to be sent to me by September 15th, 2023. Registration Fees will be $20 per Youth and Adults and $10 per Juniors ages 5-14, please fill out one registration form per person so we can get a good count on everybody. I will make all the hotel reservations so make sure you indicate what type of room you prefer, Also, all Juniors will stay in their parents’ room unless pre-arranged, so if you need an extra room for your children, please let me know.
This is an election year again, so everyone needs to be thinking about that and about who would be the best candidates to lead our great organization in the future.
The Theme for the celebration Banquet on Friday night Oct. 20th, 2023, will be Black Tie Masquerade would love to see everyone dressed up.
All 2023/2024 Scholarship recipients, if you cannot attend the whole State Session, you will at least need to be at the Celebration Banquet on Friday night Oct. 20th, 2023, to accept and give your Scholarship acceptance speech.
All Subordinate Granges need to get your Community Service Project Books ready and sent to Oklahoma State Grange Activities and Community Service Director, Lisa Evans by September 23rd, 2023. You can send them to her at P.O. Box 504 Ketchum OK 74349. If you need to get in contact with Lisa, you can reach her at 918-570-9269 or email [email protected]
Also, all Subordinate Granges need to have their Resolutions for the State Session Sent to State Secretary Jennie Harrington by October 1st, 2023, so she can put them in the Delegate folders. If you miss the deadline, you can bring them to the State Session and turn them in on September 20th, 2023.
If anyone needs any help from Oklahoma State Grange Secretary Jeannie Harrington, you can reach her at email: [email protected] or mail to 4253 NS 406 Rd. Wann, OK 74083 or phone number main 918-559-9507.
Also, if anyone would like to post anything on our state website, please fill free to contact Yvonne Meritt at 405-262-3354 or email her at [email protected].
If anyone needs anything from me, please feel free to contact me anytime.
Fraternally Submitted
Master Billy D. Shufeldt
6399 NS 413 RD South Coffeyville OK 74072,
Phone 918-842-0242, email: [email protected]
MEMBERSHIP MATTERS
Carl Shufeldt
Jerry Taylor
Membership Directors
Hello Fellow Grangers
Hope everyone is doing well. This year seems to have flown by even faster than normal. It’s hard to believe State Session is upon us. <cursor_is_here> We had six subordinate granges gain membership. We had three with losses and ten remained the same. Overall we had a gain of three members. We hope to see everyone at State Session. Come out to support your Grange and have fellowship.
SECRETARIES TAKE NOTES
Jeannie Harrington
State Secretary
I hope this newsletter finds everyone well and in good health. Summer went by fast and Oklahoma Grange State Session is just a little over a month away. It doesn’t seem like it has been a year since we last met for State Session.
This year the Oklahoma State Session will be at the Holiday Inn Express in Claremore, OK, October 20-22, 2023. With that in mind, I am needing each Subordinate Grange to send in your RESOLUTIONS and GRANGE OFFICER AND DIRECTOR REPORTS by OCTOBER 1st. I also need each Grange to send a list of your OFFICERS.
If you have had any deaths of Grange members, I would like for you to send me those names to be read and honored during the Memorial Service at State Session. Also, I will be needing the names of the DELEGATES from each Grange.
And don’t forget the third quarter dues will need to be paid BEFORE State Session.
OKLAHOMA STATE GRANGE
CONVENTION
108th ANNUAL SESSION
OCTOBER 20-23, 2023
Registration Form (Per Room)
Holiday Inn Express
1400 Country Club Rd
Claremore, OK 74017
(918)283-4877
Grange Name and #
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Name __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□
Address ________________________________________________________________
Rooms- (This is a non-smoking hotel)
Cost of rooms are $79.00 per night not including tax.
Please √ type of room needed.
Double□ King □ Handicap □
Please √ each day room is needed.
Thursday □ Friday□ Saturday□
Meals: Continental Breakfast is included with stay.
Friday lunch is on your own.
Friday Evening Banquet: (THEME: Black Tie Masquerade)
Adults # _______ Children # _______
Saturday Luncheon: Complements of Grange Mutual Insurance.
Adults # _______ Children # _______
Saturday Dinner is on your own.
Please list food allergies _________________________________________________
REGISTRATION FEE:
$20.00 ADULT _______
$10.00 CHILD _______(ages 5-13; Juniors room with Parents)
Total included with form: $ __________
Please send money and registration form to:
Billy Shufeldt
6399 NS 413 Rd.
South Coffeyville, Ok 74072
State Master will make all room reservations. _______ (No later than September 15th, 2023)
Oklahoma State Grange takes care of only one room per Subordinate Grange.
Comments: ____________________________________________________________
Scheneista Procter
State Junior Director
Hello Juniors,
We hope everyone is having a great school year so far. We can’t believe it’s already time for state session. State session this year will be held in Claremore again. We are planning to do some fun activities along with some team building crafts. We are asking that you wear some old clothes that won’t matter if you get paint on them or food coloring. We will not be doing any contests this year, so we hope that everyone will do the Grange activities contests and the Lecturer contests. They always have good contests and they always have a category for the juniors, so we hope everyone will participate. We have a lot planned, so we hope that everyone will try and attend the state session. Stay safe and healthy and we can’t wait to see you in October.
Fraternally submitted,
Scheneista Procter
State Junior Director
Debbie Borgstrom
Audrey Bowers
Kim Knight
Committee members
GRANGE SWEETHEARTS CELEBRATE THEIR 50TH WEDDING ANNIVERSARY
Kay Meritt and Yvonne Haymaker were married on August 31, 1973 in Dover, Oklahoma. They currently reside in Union City. They had 2 sons. Their oldest son Kris lives in Union City and he has 2 children. Grandson Ryan Meritt is a Senior and Granddaughter Jessi is a Freshman, at Wellston High School. Their son Nickolas passed away when he was 7 years old. The Meritts are members of Prairie Grange #334. Kay serves on State Executive Committee and Yvonne is Past State Master of the Oklahoma State Grange and both work together as Co-Editors of the Sooner State Granger. They celebrated their anniversary in August with very close family and friends.
Oklahoma Grange Youth participating in contest at the Great Plains Conference
CHAPLAIN CORNER
Shelia Conrady, State Chaplain
Fellow Grangers it’s almost time to meet again, and I hope I get to fellowship with you at the state Grange session in a few weeks. The year and seasons have flown by, this time last year my family farm had finished a dismal harvest and we were in the grips of one of the worst droughts in a hundred years. This year I am feeling blessed, God’s faithfulness brought us through those trials. What a difference a year makes. A wet summer has filled those dry ponds. Hay is stacked everywhere, when last year saw me selling off half my livestock because we knew we couldn’t feed and water them through winter. Last year I worried about having enough seed wheat this year we cut wheat and corn and still have milo to cut. Whether for our life situation or farming seasons and harvest change when we are patient and trust the Lord. This is what the Bible tells us about harvest. GALATIANS 6:9 And let us not grow weary of doing good for in due season we will reap, if we do not give up. JAMES 5:7-12 Be patient, therefore, brothers, until the coming of the Lord. See how the farmer waits for the precious fruit of the earth, be patient about it. You need not be a farmer to have a “harvest” in your life. We all do. Teachers plant seeds of knowledge. Coaches and parents plant a love for the game. Doctors and nurses plant seeds of health. One of the most important seeds we plant as Christians is seeds of faith and relationships with Christ. We do this by sharing our faith and also by living our faith. We do this by acts of kindness and service that hopefully someone wonders what makes us different and hopefully wants to know more about our faith in Christ. Both the Bible and Grange ritual use metaphors of farm life and harvest to convey the need for service to others. I hope you have headed my emphasis on a Grange year of Giving and have reached out to your fellow Grangers and your community.
Bailey Miranda
Youth and Young Couple Director
Hello Youth and Young Adults,
Hey all! I hope everyone had a great summer and the start to your school year has been good for everyone in school!
The Great Plains Regional Leadership Conference was June 9th-11th, and we had such a great time from playing Grange Baseball and to going to the Museum of Western Art. We had a good group of Youth from Oklahoma that were able to attend and participate in some of the contest that were going on! Landon Knight place 1st in Grange Baseball and Emily Shufeldt placed 1st in the speech contest and will be representing Oklahoma at National this year in Niagara Falls, New York November 15th-19th.
The Oklahoma State Grange Session is October 20th-22nd in Claremore, OK and registration for state session is due no later than September 15th. For scholarship recipients don’t forget to send in your school enrollment and your class schedules you can email them to Billy Shufeldt at [email protected], also scholarship recipients are required to be at the Friday Night Banquet, and we will be serving food at Friday Night Banquet as well. We will be serving lunch on Saturday, and we will be presenting our drill and the 5th Degree on Saturday night. I hope everyone can stay and participate with us.
I hope everyone had an amazing summer and I can’t wait to see you all in October!
Please join our Facebook page: Oklahoma State Grange Youth
If you have any questions, please feel free to get ahold of me.
Bailey Miranda
Oklahoma State Youth Director
Email: [email protected]
Phone: (918)467-0337
Address: 1413 South East Ave
Pauls Valley, Ok 73075
Grange Mutual Insurance Association of Oklahoma
In accordance with the provisions of the By-laws of the Association, you are hereby notified that the Regular Annual Meeting of the membership will be held at:
Holiday Inn Express
1400 Country Club Rd, Claremore, OK 74017
Saturday, October 21, 2023, 12:00 Noon; meal will be provided; Please RSVP (800-871-2479)
The following members have been nominated for 3 year term on the Board of Directors: Two will be selected.
2023 Annual Meeting Election
Dee Procter
Mark Evans
Kay Meritt
Agenda:
12-1:00 pm Lunch
1:00 pm Call to order
Declaration of quorum
Welcome
Registration closes
Report of Secretary
Report of Treasurer
Adjournment
LECTURER’S DEPARTMENT
Donna Keeton, State Lecturer
I can’t believe summer is over and school is back in session. I hope everyone is finishing up with the Lecturer’s Contests. All categories will have the following age groups: 5 to 9, 10 to 14, 15 and older. All entries must be brought to the Oklahoma State Session to be held in Claremore, OK. The categories will be as follows:
Photography: Submit a 4 x 6 photo, put name, Grange, and age group on back (no backing necessary) All photography categories are up to the participants interpretation.
Community Service in Motion
- Sights of Spring
- It’s a Good Day to Be a Granger
Writing: Submit a 500 word maximum handwritten or typed story on the below topic. Submit the essay with name, Grange, and age group written on the back. No names on the front page.
My Grange Superhero
Drawing: Submit a drawing on a 8x 10 paper with name, Grange, and age group printed on the back. Can use any utensils in creating i.e. Crayons, markers, or pencils, etc.
Painting: Submit a painting using Watercolors. Must be on a canvas no larger than 11 x 13. Print name, Grange, and age group on the back.
Color a Picture: Color the picture that was published in the Sooner State Granger March 2023 or can be found on www.oklahomastategrange.net in the Lecturers section. There will be an added age group of 1 to 4 for this particular contest. Print name, Grange, and age group on the back.
I look forward to seeing everyone at the State Session.
GRANGE ACTIVITIES
Lisa Evans, State Director
I hope everyone is having a great summer. The State Session will be here before we know it. I have included the contest so there will be plenty of time to create your entries. The community books will be due September 23rd 2023. The forms can be found on the Oklahoma State Grange Website Please mail the books to Lisa Evans PO Box 504 Ketchum, Oklahoma 74349.
Junior: Decorate a pumpkin, make a Christmas decoration, paper towel craft.
Youth: Decorate a Pumpkin, Create jewelry out of any material, Create a Christmas ornament.
Women: Make a Christmas ornament, create a Christmas centerpiece out of any material, and create something out of a recycled item.
Men: Create a sign for the home out any material, make an outdoor Christmas decoration, make a picture frame out any material.
Pre-Junior Grange members having fun at the Great Plains Conference
Dates to Remember
Sept 15 Registration forms due to the State President
Sept 23 Community Service Projects Due, Mail to Lisa Evans
Oct. 20-23 Oklahoma State Grange State Session
Holiday Inn Express Claremore, OK
Nov. 15-19 National Grange Convention
Dec. 1 Articles of newsletter are due.
</text>
|
[
{
"content": "<url>\nhttps://img1.wsimg.com/blobby/go/4cae4089-b619-4e8e-9e11-aaec47c1dd0f/downloads/Sooner%20State%20Granger%20September2023.pdf?ver=1725332474637\n</url>\n<text>\nHello Oklahoma State Granger and all other Grangers across our Great Nation. It has been very hot and dry this summer. And it seems that the time has just flown by, the schools have already taken back up and State Session is just around the corner.\n\nI would like to congratulate our 2023/2024 Oklahoma State Grange scholarship recipients for this year. They are Christopher Thomsen and Halie Thomsen of Thompson Grange #352 & Charli Moore of South Coffeyville Grange # 351 and Hayden Babb of Bluejacket Grange # 353. All of our recipients are all very deserving and capable young adults and I know will do well in all they do and will represent our State Grange with pride and honor.\n\nThe Great Plains Regional Conference hosted in June 2023 by the Texas State Grange in Kerrville, TX was a great success. Texas State Grange and the National youth team and National Directors had some very interesting workshops. Our own Emily Joy Shufeldt of Thompson Grange #352 won the Regional speech contest, and will be representing us at the National Convention in November in Niagara Fall N.Y. And Landon Knight won the Junior Grange baseball contest. We also visited the Museum of Western Arts which was very grand and informative, our patrons also got to participate in several craft projects while we were at the Museum. I would like to thank the Texas State Grange for hosting and making everyone feel right at home.\n\nThe 108th Annual Oklahoma State Grange Session will be held on October 20th, 21st & 22nd, 2023 at the Claremore Conference Center / Holiday Inn Express located at 1400 Country Club Road, Claremore OK. 74017. Most of us will be arriving on the evening of October 19th at the hotel and the Oklahoma State Grange Executive Board will have a board meeting at 6:00 pm and the Grange Mutual Insurance Board will have their meeting a 7:00 pm with the State Officers having drill practice afterwards. Registration forms need to be sent to me by September 15th, 2023. Registration Fees will be $20 per Youth and Adults and $10 per Juniors ages 5-14, please fill out one registration form per person so we can get a good count on everybody. I will make all the hotel reservations so make sure you indicate what type of room you prefer, Also, all Juniors will stay in their parents’ room unless pre-arranged, so if you need an extra room for your children, please let me know.\n\nThis is an election year again, so everyone needs to be thinking about that and about who would be the best candidates to lead our great organization in the future.\n\nThe Theme for the celebration Banquet on Friday night Oct. 20th, 2023, will be Black Tie Masquerade would love to see everyone dressed up.\n\nAll 2023/2024 Scholarship recipients, if you cannot attend the whole State Session, you will at least need to be at the Celebration Banquet on Friday night Oct. 20th, 2023, to accept and give your Scholarship acceptance speech.\n\nAll Subordinate Granges need to get your Community Service Project Books ready and sent to Oklahoma State Grange Activities and Community Service Director, Lisa Evans by September 23rd, 2023. You can send them to her at P.O. Box 504 Ketchum OK 74349. If you need to get in contact with Lisa, you can reach her at 918-570-9269 or email [email protected]\n\nAlso, all Subordinate Granges need to have their Resolutions for the State Session Sent to State Secretary Jennie Harrington by October 1st, 2023, so she can put them in the Delegate folders. If you miss the deadline, you can bring them to the State Session and turn them in on September 20th, 2023.\n\nIf anyone needs any help from Oklahoma State Grange Secretary Jeannie Harrington, you can reach her at email: [email protected] or mail to 4253 NS 406 Rd. Wann, OK 74083 or phone number main 918-559-9507.\n\nAlso, if anyone would like to post anything on our state website, please fill free to contact Yvonne Meritt at 405-262-3354 or email her at [email protected].\n\nIf anyone needs anything from me, please feel free to contact me anytime.\n\nFraternally Submitted\nMaster Billy D. Shufeldt\n6399 NS 413 RD South Coffeyville OK 74072,\nPhone 918-842-0242, email: [email protected]\n\nMEMBERSHIP MATTERS\nCarl Shufeldt\nJerry Taylor\nMembership Directors\n\nHello Fellow Grangers\n\nHope everyone is doing well. This year seems to have flown by even faster than normal. It’s hard to believe State Session is upon us. <cursor_is_here> We had six subordinate granges gain membership. We had three with losses and ten remained the same. Overall we had a gain of three members. We hope to see everyone at State Session. Come out to support your Grange and have fellowship.\n\nSECRETARIES TAKE NOTES\nJeannie Harrington\nState Secretary\n\nI hope this newsletter finds everyone well and in good health. Summer went by fast and Oklahoma Grange State Session is just a little over a month away. It doesn’t seem like it has been a year since we last met for State Session.\n\nThis year the Oklahoma State Session will be at the Holiday Inn Express in Claremore, OK, October 20-22, 2023. With that in mind, I am needing each Subordinate Grange to send in your RESOLUTIONS and GRANGE OFFICER AND DIRECTOR REPORTS by OCTOBER 1st. I also need each Grange to send a list of your OFFICERS.\n\nIf you have had any deaths of Grange members, I would like for you to send me those names to be read and honored during the Memorial Service at State Session. Also, I will be needing the names of the DELEGATES from each Grange.\n\nAnd don’t forget the third quarter dues will need to be paid BEFORE State Session.\n\nOKLAHOMA STATE GRANGE\nCONVENTION\n108th ANNUAL SESSION\nOCTOBER 20-23, 2023\n\nRegistration Form (Per Room)\n\nHoliday Inn Express\n1400 Country Club Rd\nClaremore, OK 74017\n(918)283-4877\n\nGrange Name and #\n\nName __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□\nName __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□\nName __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□\nName __________________________ State Officer□ Youth□ Junior□ Delegate□ Director□ Member□ Guest□\n\nAddress ________________________________________________________________\n\nRooms- (This is a non-smoking hotel)\nCost of rooms are $79.00 per night not including tax.\n\nPlease √ type of room needed.\nDouble□ King □ Handicap □\n\nPlease √ each day room is needed.\nThursday □ Friday□ Saturday□\n\nMeals: Continental Breakfast is included with stay.\nFriday lunch is on your own.\nFriday Evening Banquet: (THEME: Black Tie Masquerade)\nAdults # _______ Children # _______\n\nSaturday Luncheon: Complements of Grange Mutual Insurance.\nAdults # _______ Children # _______\n\nSaturday Dinner is on your own.\n\nPlease list food allergies _________________________________________________\n\nREGISTRATION FEE:\n$20.00 ADULT _______\n$10.00 CHILD _______(ages 5-13; Juniors room with Parents)\nTotal included with form: $ __________\n\nPlease send money and registration form to:\nBilly Shufeldt\n6399 NS 413 Rd.\nSouth Coffeyville, Ok 74072\n\nState Master will make all room reservations. _______ (No later than September 15th, 2023)\nOklahoma State Grange takes care of only one room per Subordinate Grange.\n\nComments: ____________________________________________________________\n\nScheneista Procter\nState Junior Director\n\nHello Juniors,\n\nWe hope everyone is having a great school year so far. We can’t believe it’s already time for state session. State session this year will be held in Claremore again. We are planning to do some fun activities along with some team building crafts. We are asking that you wear some old clothes that won’t matter if you get paint on them or food coloring. We will not be doing any contests this year, so we hope that everyone will do the Grange activities contests and the Lecturer contests. They always have good contests and they always have a category for the juniors, so we hope everyone will participate. We have a lot planned, so we hope that everyone will try and attend the state session. Stay safe and healthy and we can’t wait to see you in October.\n\nFraternally submitted,\nScheneista Procter\nState Junior Director\nDebbie Borgstrom\nAudrey Bowers\nKim Knight\nCommittee members\n\nGRANGE SWEETHEARTS CELEBRATE THEIR 50TH WEDDING ANNIVERSARY\n\nKay Meritt and Yvonne Haymaker were married on August 31, 1973 in Dover, Oklahoma. They currently reside in Union City. They had 2 sons. Their oldest son Kris lives in Union City and he has 2 children. Grandson Ryan Meritt is a Senior and Granddaughter Jessi is a Freshman, at Wellston High School. Their son Nickolas passed away when he was 7 years old. The Meritts are members of Prairie Grange #334. Kay serves on State Executive Committee and Yvonne is Past State Master of the Oklahoma State Grange and both work together as Co-Editors of the Sooner State Granger. They celebrated their anniversary in August with very close family and friends.\n\nOklahoma Grange Youth participating in contest at the Great Plains Conference\n\nCHAPLAIN CORNER\nShelia Conrady, State Chaplain\n\nFellow Grangers it’s almost time to meet again, and I hope I get to fellowship with you at the state Grange session in a few weeks. The year and seasons have flown by, this time last year my family farm had finished a dismal harvest and we were in the grips of one of the worst droughts in a hundred years. This year I am feeling blessed, God’s faithfulness brought us through those trials. What a difference a year makes. A wet summer has filled those dry ponds. Hay is stacked everywhere, when last year saw me selling off half my livestock because we knew we couldn’t feed and water them through winter. Last year I worried about having enough seed wheat this year we cut wheat and corn and still have milo to cut. Whether for our life situation or farming seasons and harvest change when we are patient and trust the Lord. This is what the Bible tells us about harvest. GALATIANS 6:9 And let us not grow weary of doing good for in due season we will reap, if we do not give up. JAMES 5:7-12 Be patient, therefore, brothers, until the coming of the Lord. See how the farmer waits for the precious fruit of the earth, be patient about it. You need not be a farmer to have a “harvest” in your life. We all do. Teachers plant seeds of knowledge. Coaches and parents plant a love for the game. Doctors and nurses plant seeds of health. One of the most important seeds we plant as Christians is seeds of faith and relationships with Christ. We do this by sharing our faith and also by living our faith. We do this by acts of kindness and service that hopefully someone wonders what makes us different and hopefully wants to know more about our faith in Christ. Both the Bible and Grange ritual use metaphors of farm life and harvest to convey the need for service to others. I hope you have headed my emphasis on a Grange year of Giving and have reached out to your fellow Grangers and your community.\n\nBailey Miranda\nYouth and Young Couple Director\n\nHello Youth and Young Adults,\n\nHey all! I hope everyone had a great summer and the start to your school year has been good for everyone in school!\n\nThe Great Plains Regional Leadership Conference was June 9th-11th, and we had such a great time from playing Grange Baseball and to going to the Museum of Western Art. We had a good group of Youth from Oklahoma that were able to attend and participate in some of the contest that were going on! Landon Knight place 1st in Grange Baseball and Emily Shufeldt placed 1st in the speech contest and will be representing Oklahoma at National this year in Niagara Falls, New York November 15th-19th.\n\nThe Oklahoma State Grange Session is October 20th-22nd in Claremore, OK and registration for state session is due no later than September 15th. For scholarship recipients don’t forget to send in your school enrollment and your class schedules you can email them to Billy Shufeldt at [email protected], also scholarship recipients are required to be at the Friday Night Banquet, and we will be serving food at Friday Night Banquet as well. We will be serving lunch on Saturday, and we will be presenting our drill and the 5th Degree on Saturday night. I hope everyone can stay and participate with us.\n\nI hope everyone had an amazing summer and I can’t wait to see you all in October!\n\nPlease join our Facebook page: Oklahoma State Grange Youth\n\nIf you have any questions, please feel free to get ahold of me.\n\nBailey Miranda\nOklahoma State Youth Director\nEmail: [email protected]\nPhone: (918)467-0337\nAddress: 1413 South East Ave\nPauls Valley, Ok 73075\n\nGrange Mutual Insurance Association of Oklahoma\n\nIn accordance with the provisions of the By-laws of the Association, you are hereby notified that the Regular Annual Meeting of the membership will be held at:\n\nHoliday Inn Express\n1400 Country Club Rd, Claremore, OK 74017\nSaturday, October 21, 2023, 12:00 Noon; meal will be provided; Please RSVP (800-871-2479)\n\nThe following members have been nominated for 3 year term on the Board of Directors: Two will be selected.\n\n2023 Annual Meeting Election\nDee Procter\nMark Evans\nKay Meritt\n\nAgenda:\n12-1:00 pm Lunch\n1:00 pm Call to order\nDeclaration of quorum\nWelcome\nRegistration closes\nReport of Secretary\nReport of Treasurer\nAdjournment\n\nLECTURER’S DEPARTMENT\n\nDonna Keeton, State Lecturer\n\nI can’t believe summer is over and school is back in session. I hope everyone is finishing up with the Lecturer’s Contests. All categories will have the following age groups: 5 to 9, 10 to 14, 15 and older. All entries must be brought to the Oklahoma State Session to be held in Claremore, OK. The categories will be as follows:\n\nPhotography: Submit a 4 x 6 photo, put name, Grange, and age group on back (no backing necessary) All photography categories are up to the participants interpretation.\n\nCommunity Service in Motion\n- Sights of Spring\n- It’s a Good Day to Be a Granger\n\nWriting: Submit a 500 word maximum handwritten or typed story on the below topic. Submit the essay with name, Grange, and age group written on the back. No names on the front page.\n\nMy Grange Superhero\n\nDrawing: Submit a drawing on a 8x 10 paper with name, Grange, and age group printed on the back. Can use any utensils in creating i.e. Crayons, markers, or pencils, etc.\n\nPainting: Submit a painting using Watercolors. Must be on a canvas no larger than 11 x 13. Print name, Grange, and age group on the back.\n\nColor a Picture: Color the picture that was published in the Sooner State Granger March 2023 or can be found on www.oklahomastategrange.net in the Lecturers section. There will be an added age group of 1 to 4 for this particular contest. Print name, Grange, and age group on the back.\n\nI look forward to seeing everyone at the State Session.\n\nGRANGE ACTIVITIES\n\nLisa Evans, State Director\n\nI hope everyone is having a great summer. The State Session will be here before we know it. I have included the contest so there will be plenty of time to create your entries. The community books will be due September 23rd 2023. The forms can be found on the Oklahoma State Grange Website Please mail the books to Lisa Evans PO Box 504 Ketchum, Oklahoma 74349.\n\nJunior: Decorate a pumpkin, make a Christmas decoration, paper towel craft.\n\nYouth: Decorate a Pumpkin, Create jewelry out of any material, Create a Christmas ornament.\n\nWomen: Make a Christmas ornament, create a Christmas centerpiece out of any material, and create something out of a recycled item.\n\nMen: Create a sign for the home out any material, make an outdoor Christmas decoration, make a picture frame out any material.\n\nPre-Junior Grange members having fun at the Great Plains Conference\n\nDates to Remember\n\nSept 15 Registration forms due to the State President\nSept 23 Community Service Projects Due, Mail to Lisa Evans\nOct. 20-23 Oklahoma State Grange State Session\n Holiday Inn Express Claremore, OK\nNov. 15-19 National Grange Convention\nDec. 1 Articles of newsletter are due.\n</text>\n",
"role": "user"
},
{
"content": "We had a slight gain in membership for the second quarter.",
"role": "assistant"
}
] |
Accelerating Science and Innovation
Science bridging Cultures and Nations
R.-D. Heuer, DPG
DESY, Science4Peace, 11 Nov 2021
The role of Science:
– innovate, discover, publish, share
... but bridging cultures and nations?
The role of Science:
– innovate, discover, publish, share
necessary ingredient: trust between people
… compete and collaborate
Potsdam Manifesto 2005 (H-P Dürr et al, VDW)
Following the spirit of the 1955 Russell – Einstein Manifesto
“We need to learn to think in a new way”
“New Action
……
To ensure global supply worthy of human beings and communities, com-petition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.
……”
The role of Science:
– innovate, discover, publish, share
Diplomacy through Science
Science is a universal language allowing to compete and to cooperate peacefully
Cooperation:
International scientific research provides successful modes for peaceful cooperation.
Such research projects show what mankind is able to achieve when working together coherently towards a common goal.
Cooperation needs to comprise developing, emerging and developed countries. We need to exploit all possible synergies. We need to bring the best brains from all regions together for the benefit and sustainability of society.
Accelerating Science and Innovation
CERN
a Marvel of International Collaboration
Conceived late 1940s – two aims:
- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members
- Foster cooperation between peoples recently in conflict
founded 1954, going beyond national borders today scientist from all over the world are coming to CERN
CERN
a European Intergovernmental Organization, globally used
→ an infrastructure belonging to all its member states
→ an example of what Europe and its partners can achieve when they are working together
Key Message
From the very beginning:
Peaceful cooperation at the forefront of science independent of cultural and national differencies
1954 European Reconstruction
1st Session of CERN Council
1980 The East Meets the West
Visit of delegation from Beijing
Today The LHC brings together > 8000 scientists and some 100 nationalities
Examples of bridges between peoples built by CERN:
- 1st intergovernmental organisation that Germany joined after WW II (on probation!)
- 1st post WW II meetings between German and Israeli physicists at CERN
- Collaboration between CERN & Russia at the height of Cold War kept doors open & established trust, and was model for later USA-Russian collaboration
- In the late 1970s, when China was closed, scientific contacts between Europe and China were pioneered in work at DESY (in Hamburg) and later at CERN - Nobel Laureate Sam Ting from MIT got backing of Deng Xiaoping
- In 1985, when USSR-USA arms negotiations in Geneva were stalled, the US delegation asked the DG to arrange a dinner at CERN for Russian and American scientific advisors - which facilitated a subsequent breakthrough
- CERN had an open door policy for East European countries. Following the end of the Cold war, this allowed them quickly to join CERN (and to develop their own European identity)
Poland, Czechoslovakia, Hungary joined within 3 years
founded 1954, going beyond national borders since 2010 going beyond regional borders
Since 2010 CERN membership is going global
New members:
Israel, Romania, Serbia
Associate members:
Cyprus, Estonia, Slovenia
Croatia, India, Latvia, Lithuania, Pakistan, Turkey, Ukraine
The Mission of CERN
- **Push back** the frontiers of knowledge
- E.g. the secrets of the Big Bang … what was the matter like within the first moments of the Universe’s existence?
- **Develop** new technologies for accelerators and detectors
- Information technology - the Web and the GRID
- Medicine - diagnosis and therapy
- **Train** scientists and engineers of tomorrow
- **Unite** people from different countries and cultures
**Key:** excellent research, trust between people
starting 1954 ....
Mid 50s: the first accelerator (the Synchrocyclotron) arrives . . .
2010: a New Era in Fundamental Science
LHC with 4 large Experiments
LHC ring: 27 km circumference
Large Hadron Collider (LHC) Project
To design, construct and run such a project many thousands of technicians, engineers and physicists from all over the world, from many different disciplines,
develop new technologies,
develop new engineering concepts,
work together over decades
Prime example of global cooperation
at CERN
Accelerating Science and Innovation
CMS ~3000 members from ~40 countries
Large International Collaborations
- a place where people learn to collaborate
- large international collaborations are a great training ground for academia and private sector for today’s challenging global projects and markets, and to learn to appreciate other cultures
- decision making, planning at general level
- information sharing: role of computing in internationalization and communication
- experience can be used by individuals and in other fields
\[ \rightarrow \text{management through ‘common goals’} \]
\[ \rightarrow \text{management by ‘convincing partners’} \]
Age Distribution of Scientists - and where they go afterwards
Today: >3000 PhD students in LHC experiments
They do not all stay: where do they go?
What type of organisation do you work in?
- Industry: 45%
- University: 29%
- Research Institute: 7%
- Govt./International Org.: 4%
- Other: 15%
Which domain do you work in?
- Computing: 35%
- Consulting: 8%
- Physics: 19%
- Engineering: 20%
- Finance: 4%
- Communications: 2%
- Others: 1%
Summer Students 2019
Number of students is based on three programmes: Member State, Non-Member State and Openlab summer student programme.
MEMBER STATES 150
Austria 3
Belgium 4
Bulgaria 2
Czech Republic 4
Denmark 6
Finland 3
France 13
Germany 23
Greece 5
Hungary 2
Israel 3
Italy 14
Netherlands 7
Norway 3
Poland 8
Portugal 3
Romania 3
Serbia 2
Slovakia 2
Spain 11
Sweden 7
Switzerland 5
United Kingdom 17
ASSOCIATE MEMBERS IN THE PRE-STAGE TO MEMBERSHIP 6
Cyprus 4
Slovenia 2
ASSOCIATE MEMBERS 24
India 13
Lithuania 2
Pakistan 4
Turkey 3
Ukraine 2
OBSERVERS 34
Japan 4
Russia 10
USA 20
OTHERS
| Country | Number |
|------------------|--------|
| Bolivia | 1 |
| Bosnia & Herzegovina | 1 |
| Albania | 1 |
| Algeria | 4 |
| Argentina | 1 |
| Armenia | 1 |
| Australia | 1 |
| Azerbaijan | 2 |
| Bahrain | 2 |
| Bangladesh | 2 |
| Belarus | 1 |
| Belgium | 4 |
| Bulgaria | 2 |
| Canada | 6 |
| Chile | 1 |
| China | 10 |
| Colombia | 1 |
| Costa Rica | 4 |
| Croatia | 4 |
| Cuba | 2 |
| Cyprus | 4 |
| Czech Republic | 4 |
| Denmark | 6 |
| Estonia | 2 |
| Finland | 3 |
| France | 13 |
| Georgia | 1 |
| Ghana | 1 |
| Germany | 23 |
| Greece | 5 |
| Greenland | 1 |
| Guatemala | 1 |
| Hungary | 2 |
| Iceland | 1 |
| India | 13 |
| Indonesia | 1 |
| Iran | 2 |
| Iraq | 1 |
| Israel | 3 |
| Italy | 14 |
| Japan | 4 |
| Jordan | 1 |
| Kazakhstan | 3 |
| Korea | 2 |
| Kosovo | 1 |
| Kuwait | 1 |
| Latvia | 1 |
| Lebanon | 3 |
| Libya | 1 |
| Lithuania | 2 |
| Luxembourg | 1 |
| Malaysia | 3 |
| Mauritius | 1 |
| Moldova | 1 |
| Montenegro | 4 |
| Morocco | 1 |
| Nepal | 1 |
| North Macedonia | 1 |
| Oman | 1 |
| Palestine | 2 |
| Peru | 1 |
| Philippines | 1 |
| Poland | 8 |
| Portugal | 3 |
| Qatar | 1 |
| Romania | 3 |
| Russia | 10 |
| Rwanda | 1 |
| Saudi Arabia | 1 |
| Serbia | 2 |
| Singapore | 2 |
| Slovakia | 2 |
| Slovenia | 2 |
| South Africa | 1 |
| Spain | 11 |
| Sri Lanka | 4 |
| Sweden | 7 |
| Switzerland | 5 |
| Syria | 1 |
| Taiwan | 1 |
| Thailand | 4 |
| Tunisia | 2 |
| Turkey | 3 |
| Turkmenistan | 1 |
| Ukraine | 2 |
| United Kingdom | 17 |
| USA | 20 |
| Uzbekistan | 1 |
| Venezuela | 1 |
| Viet Nam | 1 |
| Yemen | 1 |
| Zimbabwe | 1 |
122
There are also other aspects:
One of the detector parts used over a million World War II brass shell casements from the Russian Navy in making some of its components.
“New Action
To ensure global supply worthy of human beings and communities, competition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.
Dialogue and exchange must and can be installed in all layers of life, particularly in the institutional and spatial overlaps between cultures, and must constantly dynamically adapt. In this way, tension and conflicts can be dynamically absorbed, balanced, and diverted into moving discourse.
CERN is a small but beautiful example of this spirit.”
But CERN is not alone,
there are several ‘off-springs’……
One of ESO’s original aims was to allow the Member States to work together to build and operate advanced astronomical facilities that were beyond the capabilities of any individual country.
Convention signed 1962 by 5 founding members, today there are 16 members.
Charles Fehrenbach, the director of the Haute Provence Observatory, who was involved with ESO for many of the early years, stated 1981 in ESO’s journal, *The Messenger*:
“There is no doubt in my mind that it was the installation in Geneva which saved our organization.”
Location of ESO’s Telescope Project (TP) Division and Sky Atlas Laboratory (SA) at CERN in the 1970s.
The strong links with CERN certainly helped to set ESO on its way.
The European Molecular Biology Laboratory was the idea of prominent scientists, with the goal to create a CERN-like supranational research centre to redress the balance in the strongly US-dominated field of molecular biology.
Founded 1974
Today located at six sites, 27 members
Similar to CERN:
In 2003, realising the increasingly global nature of big scientific challenges and the need for international cooperation in research, EMBL introduced the Associate Membership Scheme, making it possible for non-European countries to access all EMBL programmes and services.
The latest “off-spring”
CERN
Conceived late 1940s – two aims:
- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members
- Foster cooperation between peoples recently in conflict
SESAME
Conceived late 1990s – two aims:
- Enable construction of a facility for a broad range of scientific research beyond the means of individual members
- Foster cooperation between peoples
How to achieve the broad range of scientific research......
- Synchrotron-light sources allow research in many areas, e.g. biology, physics, chemistry, archaeology, medicine, material science, environmental science, arts, …… they are ideal facilities for building scientific capacity.
- International collaboration is the obvious way for countries with relatively small scientific communities and/or limited science budgets to build a synchrotron-light source.
- Synchrotron-light sources are user facilities: scientists will typically go there two or three times a year for a few days to carry out experiments, in collaboration with scientists from other institutions/countries.
SESAME is located in Allan, NW of Amman, the capital of Jordan.
SESAME is a cooperative venture by scientists and governments of the region set up on the model of CERN (European Organization for Nuclear Research) although it has very different scientific aims.
It was developed under the auspices of UNESCO (United Nations Educational, Scientific and Cultural Organization) following the formal approval given for this by the Organization's Executive Board (164th session, May 2002).
SESAME (Synchrotron-light for Experimental Science and Applications in the Middle East)
Aims:
1) promote scientific and technical excellence in the Middle East and beyond (and in particular to enable and achieve the return of scientists and engineers from the region)
2) build scientific and cultural bridges between different societies in the Middle East and beyond
There are some 60 light sources in the world - SESAME is the first in the Middle East
SESAME is composed of Members and Observers
Cyprus
Egypt
Iran
Israel
Jordan
Palestine
Pakistan
Turkey
SESAME is composed of Members and Observers
Cyprus
Egypt
Iran
Israel
Jordan
Palestine
Pakistan
Turkey
SESAME is composed of Members and Observers
Brazil, Canada, CERN, China, the European Union, France, Germany, Greece, Italy, Iran, Japan, Kuwait, Portugal, Russian Federation, Spain, Sweden, Switzerland, the United Kingdom, and the United States of America.
International Cooperation as example of Peaceful Cooperation
SESAME received much support from non-members. Examples are...
Rossendorf Beamline (D)
Material Science Beamline (CH)
The boat at Hamburg harbor on its way to Aqaba, Jordan with BESSY I on board; June 7, 2002
XAFS/XRF Monochromator (UK)
The 4 RF Cavities (I)
SESAME layout
Storage Ring
electrons
Microtron
Booster
photons
experimental Stations (beamlines)
Three Beamlines in Operation
Number of proposals received for the IR (2018-2021), XAFS-XRF (2018-2021) and MS (2020-2021) beamlines:
| Country | Proposals |
|------------------|-----------|
| Belgium | 1 |
| Colombia | 1 |
| Cyprus | 18 |
| Egypt | 75 |
| France | 1 |
| Germany | 2 |
| Iran | 56 |
| Israel | 8 |
| Italy | 4 |
| Jordan | 38 |
| Kenya | 3 |
| Malaysia | 1 |
| Malta | 1 |
| Mexico | 1 |
| Pakistan | 47 |
| Palestine | 12 |
| Qatar | 3 |
| South Africa | 1 |
| Sweden | 1 |
| Turkey | 45 |
| United Arab Emirates | 2 |
| United Kingdom | 1 |
| TOTAL | 326 |
Oversubscribed by factor 2
Three Beamlines under Construction
BEATS – BEAmline for Tomography at SESAME (2022)
HESEB – Helmholtz-SESAME Beamline (2022)
TXPES – Turkish X-ray PhotoEmission Spectroscopy Beamline (2023)
Examples for Potential research topics at the different beamlines
- Identification of disease in food crops
- Identification and degradation products from paintings and painted objects
- Aging of microplastics in the environment
- Change in protein structures associated with diseases
- Characterization of lithium-ion and sodium-ion batteries
- Studies of metal contaminants in the environment
- Food security and impacts of various micronutrients on crop development
- Non-destructive analysis of paints of historical art
- Examination of archaeological metals
- Non-destructive studies of archaeological materials
- Agricultural soil management for climate change mitigation
- CO$_2$ capture and storage
- Hydrogen embrittlement in pipelines
SESAME is actively promoting research in the region and beyond
SESAME-PGSB Workshop
⇒ Online-Workshop on 16\textsuperscript{th} November 2021 — 10\textsuperscript{th} to 13\textsuperscript{th} (EET) resp. 9\textsuperscript{th} to 12\textsuperscript{th} (CET)
Program
1) Welcome (5’) – H.E. Mahmoud Abu Mois, Minister of Higher Education and Scientific Research, Palestine
2) Goal of the Workshop (5’) – Frank Lehner (DESY)
3) The Palestinian-German Science Bridge PGSB (20’) – Ghaleb Natour / Caitlin Morgan (PGSB/FZJ)
4) Introduction to SESAME (10’) – Andrea Lausi (Scientific Director at SESAME)
5) Highlights from a Science Project at SESAME / case study from Palestine (15’) – Rezq Basheer-Salimia (NUVTE) / Kirsi Lorentz (Cyl) / Messaoud Harfouche (SESAME)
6) The SESAME Beamlines (5x 10’)
♦ Opportunities at IR – Gihan Kamel (SESAME)
♦ Opportunities at XAFS/XRF – Messaoud Harfouche (SESAME)
♦ Opportunities at MS – Mahmoud Abdellatif (SESAME)
♦ Opportunities at BEATS – Gianluca Iori (SESAME)
♦ Opportunities at HESEB – Mustafa Genisel / Wolfgang Eberhardt (SESAME/DESY)
7) Virtual Coffee Break (5’)
8) Overview of the user community in Palestine and activities (15’) – Rezq Basheer-Salimia (Chairman & General Coordinator Palestine National Committee of SESAME, President of Nablus University for Vocational and Technical Education )
9) Discussions on how to improve access to SESAME and promote cooperation projects for Palestine users (everyone is warmly invited to take part in this discussion)
Please register following this link.
2019: thanks to EU support, SESAME became the World's FIRST large accelerator complex to be fully powered by renewable energy, and signed the UN’s Climate Neutral Now pledge.
SESAME story is a special situation in history where a single facility received so much support from sister organizations and observer countries over an extended period.
High level cooperation ensures scientific output, high visibility and productivity.
Since its inception SESAME receives much support from many different sources
Now SESAME tries to help other projects
African Light Source (AfLS) Foundation
November 15, 2020 SESAME was the first light source to sign an MoU with AfLS. The MoU was announced at the AfLS2020 Virtual Event.
SESAME IR beamline principal scientist, Gihan Kamel, is a member of the AfLS Board of Trustees, a member of the AfLS Steering Executive Committee, and the deputy chair of the AfLS Strategy Committee. In addition, she is a co-convener of the Light Sources Group of the African Strategy for Fundamental and Applied Physics (ASFAP).
SESAME Scientific Director, Andrea Lausi, is a member of the Steering Committee of the LAAAMP project, partnering with IUPAP and IUCr to enhance Light Sources and crystallographic sciences in Africa, the Americas, Asia, Middle East and the Pacific.
Together with The Cyprus Institute and the IAEA, and with AfLS representatives from the University of Johannesburg, LAAAMP and ESRF, SESAME is organising a School on Synchrotron Light Sources and their Applications, to be hosted online by ICTP in December 2021.
And another off-spring from CERN and SESAME
SEEIST
South East European International Institute for Sustainable Technologies
10 members from South East Europe
The South East European International Institute for Sustainable Technologies (SEEIIST) proposed in late 2016 by Prof. Herwig Schopper. It received first official political support by the Government of Montenegro in March 2017.
A real international cooperation in the SEE region, gathering scientists, engineers, medical doctors, young people and technicians within the joint research infrastructure with the mission “Science for Peace”.
The Institute will be a regional Centre of Excellence based on the state-of-art sustainable technology which will assure high competitiveness to the rest of Europe.
It will promote the regional collaboration in the fields of science, technology and industry and will represent a knowledge-based economy project, as well as a platform for education and training for young scientists, researchers, technicians, medical doctors, biologists, biomedicine engineers and others.
The preliminary footprint of the SEEIIST facility consists of five beamlines, the upper ones dedicated to patient treatment, and the lower ones to radiobiology, particle therapy research, isotope production, and materials research.
Combining medical treatment and research
Preparatory phase supported by EU
Preliminary lay-out of SEEIIST
Concept worked out with help from CERN, CNAO, GSI, and other labs
Back to CERN
Connecting 1954 and 2010:
François de Rose
one of CERN’s founding fathers
President of the CERN Council from 1957 to 1960
opinion piece about CERN written by François de Rose in 2008.
“CERN is one of the achievements with which I am the most proud to have been associated. I am still very attached to the Organization, not only because of the many friends I’ve made there but also because it is such a noble cause.”
“CERN was created so that Europeans were not forced to go the United States. Today, Americans are coming to Europe to work on CERN’s machines, something which I don’t think Oppenheimer had anticipated. I find that an extraordinary turnaround.”
François de Rose (1910-2014)
His passion for CERN's research endured. During a visit to CERN in 2010, he promised that he would return when the Higgs boson was discovered, a promise he kept in 2013.
(some) lessons learned
Science bridges Cultures and Nations
Acceptance of diversity is vital
Trust between people is a mandatory ingredient
Scientists can/should/must be ambassadors for peaceful cooperation
CERN, SESAME and others have become key examples for Science Diplomacy……
The search will invoke mini black holes, antimatter, quark-gluon plasma, and extra dimensions of space. The partnership so far has spun off colossal technological and computing rewards, but that is not the point. The point is that Europe is working together in a thrilling intellectual exploration that can have no conceivable commercial or political payoff but could, in some still intangible way, enlighten all humankind. In these otherwise murderous and mean-spirited times, that is something to salute.
The role of international science projects:
– innovate, discover, publish, share
... and bring the world together
|
af9bd425-8148-4e0f-99cc-1d10e76291b8
|
CC-MAIN-2023-06
|
https://indico.desy.de/event/32037/contributions/111983/attachments/69717/88476/Science4Peace-DESY.pdf
|
2023-01-29T11:52:53+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-06/subset=warc/part-00022-b5ddf469-bf28-43c4-9c36-5b5ccc3b2bf1.c000.gz.parquet
| 343,754,596
| 5,239
|
eng_Latn
|
eng_Latn
| 0.887169
|
eng_Latn
| 0.984263
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"swe_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"kiu_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
126,
226,
357,
853,
1021,
1465,
1548,
1772,
1876,
2420,
3450,
3725,
4217,
4306,
4407,
4774,
4812,
5401,
5843,
9276,
9445,
10133,
10191,
10729,
10900,
11181,
11474,
11499,
11983,
12606,
13093,
13551,
13655,
14081,
14346,
14450,
15635,
16384,
17956,
18132,
18388,
18507,
19523,
19649,
19684,
20597,
21006,
21144,
21685,
21886,
22172,
22680,
22797
] |
Accelerating Science and Innovation
Science bridging Cultures and Nations
R.-D. Heuer, DPG
DESY, Science4Peace, 11 Nov 2021
The role of Science:
– innovate, discover, publish, share
... but bridging cultures and nations?
The role of Science:
– innovate, discover, publish, share
necessary ingredient: trust between people
… compete and collaborate
Potsdam Manifesto 2005 (H-P Dürr et al, VDW)
Following the spirit of the 1955 Russell – Einstein Manifesto
“We need to learn to think in a new way”
“New Action
……
To ensure global supply worthy of human beings and communities, com-petition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.
……”
The role of Science:
– innovate, discover, publish, share
Diplomacy through Science
Science is a universal language allowing to compete and to cooperate peacefully
Cooperation:
International scientific research provides successful modes for peaceful cooperation.
Such research projects show what mankind is able to achieve when working together coherently towards a common goal.
Cooperation needs to comprise developing, emerging and developed countries. We need to exploit all possible synergies. We need to bring the best brains from all regions together for the benefit and sustainability of society.
Accelerating Science and Innovation
CERN
a Marvel of International Collaboration
Conceived late 1940s – two aims:
- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members
- Foster cooperation between peoples recently in conflict
founded 1954, going beyond national borders today scientist from all over the world are coming to CERN
CERN
a European Intergovernmental Organization, globally used
→ an infrastructure belonging to all its member states
→ an example of what Europe and its partners can achieve when they are working together
Key Message
From the very beginning:
Peaceful cooperation at the forefront of science independent of cultural and national differencies
1954 European Reconstruction
1st Session of CERN Council
1980 The East Meets the West
Visit of delegation from Beijing
Today The LHC brings together > 8000 scientists and some 100 nationalities
Examples of bridges between peoples built by CERN:
- 1st intergovernmental organisation that Germany joined after WW II (on probation!)
- 1st post WW II meetings between German and Israeli physicists at CERN
- Collaboration between CERN & Russia at the height of Cold War kept doors open & established trust, and was model for later USA-Russian collaboration
- In the late 1970s, when China was closed, scientific contacts between Europe and China were pioneered in work at DESY (in Hamburg) and later at CERN - Nobel Laureate Sam Ting from MIT got backing of Deng Xiaoping
- In 1985, when USSR-USA arms negotiations in Geneva were stalled, the US delegation asked the DG to arrange a dinner at CERN for Russian and American scientific advisors - which facilitated a subsequent breakthrough
- CERN had an open door policy for East European countries. Following the end of the Cold war, this allowed them quickly to join CERN (and to develop their own European identity)
Poland, Czechoslovakia, Hungary joined within 3 years
founded 1954, going beyond national borders since 2010 going beyond regional bor
|
ders
Since 2010 CERN membership is going global
New members:
Israel, Romania, Serbia
Associate members:
Cyprus, Estonia, Slovenia
Croatia, India, Latvia, Lithuania, Pakistan, Turkey, Ukraine
The Mission of CERN
- **Push back** the frontiers of knowledge
- E.
|
g. the secrets of the Big Bang … what was the matter like within the first moments of the Universe’s existence?
- **Develop** new technologies for accelerators and detectors
- Information technology - the Web and the GRID
- Medicine - diagnosis and therapy
- **Train** scientists and engineers of tomorrow
- **Unite** people from different countries and cultures
**Key:** excellent research, trust between people
starting 1954 ....
Mid 50s: the first accelerator (the Synchrocyclotron) arrives . . .
2010: a New Era in Fundamental Science
LHC with 4 large Experiments
LHC ring: 27 km circumference
Large Hadron Collider (LHC) Project
To design, construct and run such a project many thousands of technicians, engineers and physicists from all over the world, from many different disciplines,
develop new technologies,
develop new engineering concepts,
work together over decades
Prime example of global cooperation
at CERN
Accelerating Science and Innovation
CMS ~3000 members from ~40 countries
Large International Collaborations
- a place where people learn to collaborate
- large international collaborations are a great training ground for academia and private sector for today’s challenging global projects and markets, and to learn to appreciate other cultures
- decision making, planning at general level
- information sharing: role of computing in internationalization and communication
- experience can be used by individuals and in other fields
\[ \rightarrow \text{management through ‘common goals’} \]
\[ \rightarrow \text{management by ‘convincing partners’} \]
Age Distribution of Scientists - and where they go afterwards
Today: >3000 PhD students in LHC experiments
They do not all stay: where do they go?
What type of organisation do you work in?
- Industry: 45%
- University: 29%
- Research Institute: 7%
- Govt./International Org.: 4%
- Other: 15%
Which domain do you work in?
- Computing: 35%
- Consulting: 8%
- Physics: 19%
- Engineering: 20%
- Finance: 4%
- Communications: 2%
- Others: 1%
Summer Students 2019
Number of students is based on three programmes: Member State, Non-Member State and Openlab summer student programme.
MEMBER STATES 150
Austria 3
Belgium 4
Bulgaria 2
Czech Republic 4
Denmark 6
Finland 3
France 13
Germany 23
Greece 5
Hungary 2
Israel 3
Italy 14
Netherlands 7
Norway 3
Poland 8
Portugal 3
Romania 3
Serbia 2
Slovakia 2
Spain 11
Sweden 7
Switzerland 5
United Kingdom 17
ASSOCIATE MEMBERS IN THE PRE-STAGE TO MEMBERSHIP 6
Cyprus 4
Slovenia 2
ASSOCIATE MEMBERS 24
India 13
Lithuania 2
Pakistan 4
Turkey 3
Ukraine 2
OBSERVERS 34
Japan 4
Russia 10
USA 20
OTHERS
| Country | Number |
|------------------|--------|
| Bolivia | 1 |
| Bosnia & Herzegovina | 1 |
| Albania | 1 |
| Algeria | 4 |
| Argentina | 1 |
| Armenia | 1 |
| Australia | 1 |
| Azerbaijan | 2 |
| Bahrain | 2 |
| Bangladesh | 2 |
| Belarus | 1 |
| Belgium | 4 |
| Bulgaria | 2 |
| Canada | 6 |
| Chile | 1 |
| China | 10 |
| Colombia | 1 |
| Costa Rica | 4 |
| Croatia | 4 |
| Cuba | 2 |
| Cyprus | 4 |
| Czech Republic | 4 |
| Denmark | 6 |
| Estonia | 2 |
| Finland | 3 |
| France | 13 |
| Georgia | 1 |
| Ghana | 1 |
| Germany | 23 |
| Greece | 5 |
| Greenland | 1 |
| Guatemala | 1 |
| Hungary | 2 |
| Iceland | 1 |
| India | 13 |
| Indonesia | 1 |
| Iran | 2 |
| Iraq | 1 |
| Israel | 3 |
| Italy | 14 |
| Japan | 4 |
| Jordan | 1 |
| Kazakhstan | 3 |
| Korea | 2 |
| Kosovo | 1 |
| Kuwait | 1 |
| Latvia | 1 |
| Lebanon | 3 |
| Libya | 1 |
| Lithuania | 2 |
| Luxembourg | 1 |
| Malaysia | 3 |
| Mauritius | 1 |
| Moldova | 1 |
| Montenegro | 4 |
| Morocco | 1 |
| Nepal | 1 |
| North Macedonia | 1 |
| Oman | 1 |
| Palestine | 2 |
| Peru | 1 |
| Philippines | 1 |
| Poland | 8 |
| Portugal | 3 |
| Qatar | 1 |
| Romania | 3 |
| Russia | 10 |
| Rwanda | 1 |
| Saudi Arabia | 1 |
| Serbia | 2 |
| Singapore | 2 |
| Slovakia | 2 |
| Slovenia | 2 |
| South Africa | 1 |
| Spain | 11 |
| Sri Lanka | 4 |
| Sweden | 7 |
| Switzerland | 5 |
| Syria | 1 |
| Taiwan | 1 |
| Thailand | 4 |
| Tunisia | 2 |
| Turkey | 3 |
| Turkmenistan | 1 |
| Ukraine | 2 |
| United Kingdom | 17 |
| USA | 20 |
| Uzbekistan | 1 |
| Venezuela | 1 |
| Viet Nam | 1 |
| Yemen | 1 |
| Zimbabwe | 1 |
122
There are also other aspects:
One of the detector parts used over a million World War II brass shell casements from the Russian Navy in making some of its components.
“New Action
To ensure global supply worthy of human beings and communities, competition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.
Dialogue and exchange must and can be installed in all layers of life, particularly in the institutional and spatial overlaps between cultures, and must constantly dynamically adapt. In this way, tension and conflicts can be dynamically absorbed, balanced, and diverted into moving discourse.
CERN is a small but beautiful example of this spirit.”
But CERN is not alone,
there are several ‘off-springs’……
One of ESO’s original aims was to allow the Member States to work together to build and operate advanced astronomical facilities that were beyond the capabilities of any individual country.
Convention signed 1962 by 5 founding members, today there are 16 members.
Charles Fehrenbach, the director of the Haute Provence Observatory, who was involved with ESO for many of the early years, stated 1981 in ESO’s journal, *The Messenger*:
“There is no doubt in my mind that it was the installation in Geneva which saved our organization.”
Location of ESO’s Telescope Project (TP) Division and Sky Atlas Laboratory (SA) at CERN in the 1970s.
The strong links with CERN certainly helped to set ESO on its way.
The European Molecular Biology Laboratory was the idea of prominent scientists, with the goal to create a CERN-like supranational research centre to redress the balance in the strongly US-dominated field of molecular biology.
Founded 1974
Today located at six sites, 27 members
Similar to CERN:
In 2003, realising the increasingly global nature of big scientific challenges and the need for international cooperation in research, EMBL introduced the Associate Membership Scheme, making it possible for non-European countries to access all EMBL programmes and services.
The latest “off-spring”
CERN
Conceived late 1940s – two aims:
- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members
- Foster cooperation between peoples recently in conflict
SESAME
Conceived late 1990s – two aims:
- Enable construction of a facility for a broad range of scientific research beyond the means of individual members
- Foster cooperation between peoples
How to achieve the broad range of scientific research......
- Synchrotron-light sources allow research in many areas, e.g. biology, physics, chemistry, archaeology, medicine, material science, environmental science, arts, …… they are ideal facilities for building scientific capacity.
- International collaboration is the obvious way for countries with relatively small scientific communities and/or limited science budgets to build a synchrotron-light source.
- Synchrotron-light sources are user facilities: scientists will typically go there two or three times a year for a few days to carry out experiments, in collaboration with scientists from other institutions/countries.
SESAME is located in Allan, NW of Amman, the capital of Jordan.
SESAME is a cooperative venture by scientists and governments of the region set up on the model of CERN (European Organization for Nuclear Research) although it has very different scientific aims.
It was developed under the auspices of UNESCO (United Nations Educational, Scientific and Cultural Organization) following the formal approval given for this by the Organization's Executive Board (164th session, May 2002).
SESAME (Synchrotron-light for Experimental Science and Applications in the Middle East)
Aims:
1) promote scientific and technical excellence in the Middle East and beyond (and in particular to enable and achieve the return of scientists and engineers from the region)
2) build scientific and cultural bridges between different societies in the Middle East and beyond
There are some 60 light sources in the world - SESAME is the first in the Middle East
SESAME is composed of Members and Observers
Cyprus
Egypt
Iran
Israel
Jordan
Palestine
Pakistan
Turkey
SESAME is composed of Members and Observers
Cyprus
Egypt
Iran
Israel
Jordan
Palestine
Pakistan
Turkey
SESAME is composed of Members and Observers
Brazil, Canada, CERN, China, the European Union, France, Germany, Greece, Italy, Iran, Japan, Kuwait, Portugal, Russian Federation, Spain, Sweden, Switzerland, the United Kingdom, and the United States of America.
International Cooperation as example of Peaceful Cooperation
SESAME received much support from non-members. Examples are...
Rossendorf Beamline (D)
Material Science Beamline (CH)
The boat at Hamburg harbor on its way to Aqaba, Jordan with BESSY I on board; June 7, 2002
XAFS/XRF Monochromator (UK)
The 4 RF Cavities (I)
SESAME layout
Storage Ring
electrons
Microtron
Booster
photons
experimental Stations (beamlines)
Three Beamlines in Operation
Number of proposals received for the IR (2018-2021), XAFS-XRF (2018-2021) and MS (2020-2021) beamlines:
| Country | Proposals |
|------------------|-----------|
| Belgium | 1 |
| Colombia | 1 |
| Cyprus | 18 |
| Egypt | 75 |
| France | 1 |
| Germany | 2 |
| Iran | 56 |
| Israel | 8 |
| Italy | 4 |
| Jordan | 38 |
| Kenya | 3 |
| Malaysia | 1 |
| Malta | 1 |
| Mexico | 1 |
| Pakistan | 47 |
| Palestine | 12 |
| Qatar | 3 |
| South Africa | 1 |
| Sweden | 1 |
| Turkey | 45 |
| United Arab Emirates | 2 |
| United Kingdom | 1 |
| TOTAL | 326 |
Oversubscribed by factor 2
Three Beamlines under Construction
BEATS – BEAmline for Tomography at SESAME (2022)
HESEB – Helmholtz-SESAME Beamline (2022)
TXPES – Turkish X-ray PhotoEmission Spectroscopy Beamline (2023)
Examples for Potential research topics at the different beamlines
- Identification of disease in food crops
- Identification and degradation products from paintings and painted objects
- Aging of microplastics in the environment
- Change in protein structures associated with diseases
- Characterization of lithium-ion and sodium-ion batteries
- Studies of metal contaminants in the environment
- Food security and impacts of various micronutrients on crop development
- Non-destructive analysis of paints of historical art
- Examination of archaeological metals
- Non-destructive studies of archaeological materials
- Agricultural soil management for climate change mitigation
- CO$_2$ capture and storage
- Hydrogen embrittlement in pipelines
SESAME is actively promoting research in the region and beyond
SESAME-PGSB Workshop
⇒ Online-Workshop on 16\textsuperscript{th} November 2021 — 10\textsuperscript{th} to 13\textsuperscript{th} (EET) resp. 9\textsuperscript{th} to 12\textsuperscript{th} (CET)
Program
1) Welcome (5’) – H.E. Mahmoud Abu Mois, Minister of Higher Education and Scientific Research, Palestine
2) Goal of the Workshop (5’) – Frank Lehner (DESY)
3) The Palestinian-German Science Bridge PGSB (20’) – Ghaleb Natour / Caitlin Morgan (PGSB/FZJ)
4) Introduction to SESAME (10’) – Andrea Lausi (Scientific Director at SESAME)
5) Highlights from a Science Project at SESAME / case study from Palestine (15’) – Rezq Basheer-Salimia (NUVTE) / Kirsi Lorentz (Cyl) / Messaoud Harfouche (SESAME)
6) The SESAME Beamlines (5x 10’)
♦ Opportunities at IR – Gihan Kamel (SESAME)
♦ Opportunities at XAFS/XRF – Messaoud Harfouche (SESAME)
♦ Opportunities at MS – Mahmoud Abdellatif (SESAME)
♦ Opportunities at BEATS – Gianluca Iori (SESAME)
♦ Opportunities at HESEB – Mustafa Genisel / Wolfgang Eberhardt (SESAME/DESY)
7) Virtual Coffee Break (5’)
8) Overview of the user community in Palestine and activities (15’) – Rezq Basheer-Salimia (Chairman & General Coordinator Palestine National Committee of SESAME, President of Nablus University for Vocational and Technical Education )
9) Discussions on how to improve access to SESAME and promote cooperation projects for Palestine users (everyone is warmly invited to take part in this discussion)
Please register following this link.
2019: thanks to EU support, SESAME became the World's FIRST large accelerator complex to be fully powered by renewable energy, and signed the UN’s Climate Neutral Now pledge.
SESAME story is a special situation in history where a single facility received so much support from sister organizations and observer countries over an extended period.
High level cooperation ensures scientific output, high visibility and productivity.
Since its inception SESAME receives much support from many different sources
Now SESAME tries to help other projects
African Light Source (AfLS) Foundation
November 15, 2020 SESAME was the first light source to sign an MoU with AfLS. The MoU was announced at the AfLS2020 Virtual Event.
SESAME IR beamline principal scientist, Gihan Kamel, is a member of the AfLS Board of Trustees, a member of the AfLS Steering Executive Committee, and the deputy chair of the AfLS Strategy Committee. In addition, she is a co-convener of the Light Sources Group of the African Strategy for Fundamental and Applied Physics (ASFAP).
SESAME Scientific Director, Andrea Lausi, is a member of the Steering Committee of the LAAAMP project, partnering with IUPAP and IUCr to enhance Light Sources and crystallographic sciences in Africa, the Americas, Asia, Middle East and the Pacific.
Together with The Cyprus Institute and the IAEA, and with AfLS representatives from the University of Johannesburg, LAAAMP and ESRF, SESAME is organising a School on Synchrotron Light Sources and their Applications, to be hosted online by ICTP in December 2021.
And another off-spring from CERN and SESAME
SEEIST
South East European International Institute for Sustainable Technologies
10 members from South East Europe
The South East European International Institute for Sustainable Technologies (SEEIIST) proposed in late 2016 by Prof. Herwig Schopper. It received first official political support by the Government of Montenegro in March 2017.
A real international cooperation in the SEE region, gathering scientists, engineers, medical doctors, young people and technicians within the joint research infrastructure with the mission “Science for Peace”.
The Institute will be a regional Centre of Excellence based on the state-of-art sustainable technology which will assure high competitiveness to the rest of Europe.
It will promote the regional collaboration in the fields of science, technology and industry and will represent a knowledge-based economy project, as well as a platform for education and training for young scientists, researchers, technicians, medical doctors, biologists, biomedicine engineers and others.
The preliminary footprint of the SEEIIST facility consists of five beamlines, the upper ones dedicated to patient treatment, and the lower ones to radiobiology, particle therapy research, isotope production, and materials research.
Combining medical treatment and research
Preparatory phase supported by EU
Preliminary lay-out of SEEIIST
Concept worked out with help from CERN, CNAO, GSI, and other labs
Back to CERN
Connecting 1954 and 2010:
François de Rose
one of CERN’s founding fathers
President of the CERN Council from 1957 to 1960
opinion piece about CERN written by François de Rose in 2008.
“CERN is one of the achievements with which I am the most proud to have been associated. I am still very attached to the Organization, not only because of the many friends I’ve made there but also because it is such a noble cause.”
“CERN was created so that Europeans were not forced to go the United States. Today, Americans are coming to Europe to work on CERN’s machines, something which I don’t think Oppenheimer had anticipated. I find that an extraordinary turnaround.”
François de Rose (1910-2014)
His passion for CERN's research endured. During a visit to CERN in 2010, he promised that he would return when the Higgs boson was discovered, a promise he kept in 2013.
(some) lessons learned
Science bridges Cultures and Nations
Acceptance of diversity is vital
Trust between people is a mandatory ingredient
Scientists can/should/must be ambassadors for peaceful cooperation
CERN, SESAME and others have become key examples for Science Diplomacy……
The search will invoke mini black holes, antimatter, quark-gluon plasma, and extra dimensions of space. The partnership so far has spun off colossal technological and computing rewards, but that is not the point. The point is that Europe is working together in a thrilling intellectual exploration that can have no conceivable commercial or political payoff but could, in some still intangible way, enlighten all humankind. In these otherwise murderous and mean-spirited times, that is something to salute.
The role of international science projects:
– innovate, discover, publish, share
... and bring the world together
| 3,532
|
inside_word
|
borders
|
remove_one_sentence
|
<url>
https://indico.desy.de/event/32037/contributions/111983/attachments/69717/88476/Science4Peace-DESY.pdf
</url>
<text>
Accelerating Science and Innovation
Science bridging Cultures and Nations
R.-D. Heuer, DPG
DESY, Science4Peace, 11 Nov 2021
The role of Science:
– innovate, discover, publish, share
... but bridging cultures and nations?
The role of Science:
– innovate, discover, publish, share
necessary ingredient: trust between people
… compete and collaborate
Potsdam Manifesto 2005 (H-P Dürr et al, VDW)
Following the spirit of the 1955 Russell – Einstein Manifesto
“We need to learn to think in a new way”
“New Action
……
To ensure global supply worthy of human beings and communities, com-petition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.
……”
The role of Science:
– innovate, discover, publish, share
Diplomacy through Science
Science is a universal language allowing to compete and to cooperate peacefully
Cooperation:
International scientific research provides successful modes for peaceful cooperation.
Such research projects show what mankind is able to achieve when working together coherently towards a common goal.
Cooperation needs to comprise developing, emerging and developed countries. We need to exploit all possible synergies. We need to bring the best brains from all regions together for the benefit and sustainability of society.
Accelerating Science and Innovation
CERN
a Marvel of International Collaboration
Conceived late 1940s – two aims:
- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members
- Foster cooperation between peoples recently in conflict
founded 1954, going beyond national borders today scientist from all over the world are coming to CERN
CERN
a European Intergovernmental Organization, globally used
→ an infrastructure belonging to all its member states
→ an example of what Europe and its partners can achieve when they are working together
Key Message
From the very beginning:
Peaceful cooperation at the forefront of science independent of cultural and national differencies
1954 European Reconstruction
1st Session of CERN Council
1980 The East Meets the West
Visit of delegation from Beijing
Today The LHC brings together > 8000 scientists and some 100 nationalities
Examples of bridges between peoples built by CERN:
- 1st intergovernmental organisation that Germany joined after WW II (on probation!)
- 1st post WW II meetings between German and Israeli physicists at CERN
- Collaboration between CERN & Russia at the height of Cold War kept doors open & established trust, and was model for later USA-Russian collaboration
- In the late 1970s, when China was closed, scientific contacts between Europe and China were pioneered in work at DESY (in Hamburg) and later at CERN - Nobel Laureate Sam Ting from MIT got backing of Deng Xiaoping
- In 1985, when USSR-USA arms negotiations in Geneva were stalled, the US delegation asked the DG to arrange a dinner at CERN for Russian and American scientific advisors - which facilitated a subsequent breakthrough
- CERN had an open door policy for East European countries. Following the end of the Cold war, this allowed them quickly to join CERN (and to develop their own European identity)
Poland, Czechoslovakia, Hungary joined within 3 years
founded 1954, going beyond national borders since 2010 going beyond regional bor<cursor_is_here>g. the secrets of the Big Bang … what was the matter like within the first moments of the Universe’s existence?
- **Develop** new technologies for accelerators and detectors
- Information technology - the Web and the GRID
- Medicine - diagnosis and therapy
- **Train** scientists and engineers of tomorrow
- **Unite** people from different countries and cultures
**Key:** excellent research, trust between people
starting 1954 ....
Mid 50s: the first accelerator (the Synchrocyclotron) arrives . . .
2010: a New Era in Fundamental Science
LHC with 4 large Experiments
LHC ring: 27 km circumference
Large Hadron Collider (LHC) Project
To design, construct and run such a project many thousands of technicians, engineers and physicists from all over the world, from many different disciplines,
develop new technologies,
develop new engineering concepts,
work together over decades
Prime example of global cooperation
at CERN
Accelerating Science and Innovation
CMS ~3000 members from ~40 countries
Large International Collaborations
- a place where people learn to collaborate
- large international collaborations are a great training ground for academia and private sector for today’s challenging global projects and markets, and to learn to appreciate other cultures
- decision making, planning at general level
- information sharing: role of computing in internationalization and communication
- experience can be used by individuals and in other fields
\[ \rightarrow \text{management through ‘common goals’} \]
\[ \rightarrow \text{management by ‘convincing partners’} \]
Age Distribution of Scientists - and where they go afterwards
Today: >3000 PhD students in LHC experiments
They do not all stay: where do they go?
What type of organisation do you work in?
- Industry: 45%
- University: 29%
- Research Institute: 7%
- Govt./International Org.: 4%
- Other: 15%
Which domain do you work in?
- Computing: 35%
- Consulting: 8%
- Physics: 19%
- Engineering: 20%
- Finance: 4%
- Communications: 2%
- Others: 1%
Summer Students 2019
Number of students is based on three programmes: Member State, Non-Member State and Openlab summer student programme.
MEMBER STATES 150
Austria 3
Belgium 4
Bulgaria 2
Czech Republic 4
Denmark 6
Finland 3
France 13
Germany 23
Greece 5
Hungary 2
Israel 3
Italy 14
Netherlands 7
Norway 3
Poland 8
Portugal 3
Romania 3
Serbia 2
Slovakia 2
Spain 11
Sweden 7
Switzerland 5
United Kingdom 17
ASSOCIATE MEMBERS IN THE PRE-STAGE TO MEMBERSHIP 6
Cyprus 4
Slovenia 2
ASSOCIATE MEMBERS 24
India 13
Lithuania 2
Pakistan 4
Turkey 3
Ukraine 2
OBSERVERS 34
Japan 4
Russia 10
USA 20
OTHERS
| Country | Number |
|------------------|--------|
| Bolivia | 1 |
| Bosnia & Herzegovina | 1 |
| Albania | 1 |
| Algeria | 4 |
| Argentina | 1 |
| Armenia | 1 |
| Australia | 1 |
| Azerbaijan | 2 |
| Bahrain | 2 |
| Bangladesh | 2 |
| Belarus | 1 |
| Belgium | 4 |
| Bulgaria | 2 |
| Canada | 6 |
| Chile | 1 |
| China | 10 |
| Colombia | 1 |
| Costa Rica | 4 |
| Croatia | 4 |
| Cuba | 2 |
| Cyprus | 4 |
| Czech Republic | 4 |
| Denmark | 6 |
| Estonia | 2 |
| Finland | 3 |
| France | 13 |
| Georgia | 1 |
| Ghana | 1 |
| Germany | 23 |
| Greece | 5 |
| Greenland | 1 |
| Guatemala | 1 |
| Hungary | 2 |
| Iceland | 1 |
| India | 13 |
| Indonesia | 1 |
| Iran | 2 |
| Iraq | 1 |
| Israel | 3 |
| Italy | 14 |
| Japan | 4 |
| Jordan | 1 |
| Kazakhstan | 3 |
| Korea | 2 |
| Kosovo | 1 |
| Kuwait | 1 |
| Latvia | 1 |
| Lebanon | 3 |
| Libya | 1 |
| Lithuania | 2 |
| Luxembourg | 1 |
| Malaysia | 3 |
| Mauritius | 1 |
| Moldova | 1 |
| Montenegro | 4 |
| Morocco | 1 |
| Nepal | 1 |
| North Macedonia | 1 |
| Oman | 1 |
| Palestine | 2 |
| Peru | 1 |
| Philippines | 1 |
| Poland | 8 |
| Portugal | 3 |
| Qatar | 1 |
| Romania | 3 |
| Russia | 10 |
| Rwanda | 1 |
| Saudi Arabia | 1 |
| Serbia | 2 |
| Singapore | 2 |
| Slovakia | 2 |
| Slovenia | 2 |
| South Africa | 1 |
| Spain | 11 |
| Sri Lanka | 4 |
| Sweden | 7 |
| Switzerland | 5 |
| Syria | 1 |
| Taiwan | 1 |
| Thailand | 4 |
| Tunisia | 2 |
| Turkey | 3 |
| Turkmenistan | 1 |
| Ukraine | 2 |
| United Kingdom | 17 |
| USA | 20 |
| Uzbekistan | 1 |
| Venezuela | 1 |
| Viet Nam | 1 |
| Yemen | 1 |
| Zimbabwe | 1 |
122
There are also other aspects:
One of the detector parts used over a million World War II brass shell casements from the Russian Navy in making some of its components.
“New Action
To ensure global supply worthy of human beings and communities, competition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.
Dialogue and exchange must and can be installed in all layers of life, particularly in the institutional and spatial overlaps between cultures, and must constantly dynamically adapt. In this way, tension and conflicts can be dynamically absorbed, balanced, and diverted into moving discourse.
CERN is a small but beautiful example of this spirit.”
But CERN is not alone,
there are several ‘off-springs’……
One of ESO’s original aims was to allow the Member States to work together to build and operate advanced astronomical facilities that were beyond the capabilities of any individual country.
Convention signed 1962 by 5 founding members, today there are 16 members.
Charles Fehrenbach, the director of the Haute Provence Observatory, who was involved with ESO for many of the early years, stated 1981 in ESO’s journal, *The Messenger*:
“There is no doubt in my mind that it was the installation in Geneva which saved our organization.”
Location of ESO’s Telescope Project (TP) Division and Sky Atlas Laboratory (SA) at CERN in the 1970s.
The strong links with CERN certainly helped to set ESO on its way.
The European Molecular Biology Laboratory was the idea of prominent scientists, with the goal to create a CERN-like supranational research centre to redress the balance in the strongly US-dominated field of molecular biology.
Founded 1974
Today located at six sites, 27 members
Similar to CERN:
In 2003, realising the increasingly global nature of big scientific challenges and the need for international cooperation in research, EMBL introduced the Associate Membership Scheme, making it possible for non-European countries to access all EMBL programmes and services.
The latest “off-spring”
CERN
Conceived late 1940s – two aims:
- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members
- Foster cooperation between peoples recently in conflict
SESAME
Conceived late 1990s – two aims:
- Enable construction of a facility for a broad range of scientific research beyond the means of individual members
- Foster cooperation between peoples
How to achieve the broad range of scientific research......
- Synchrotron-light sources allow research in many areas, e.g. biology, physics, chemistry, archaeology, medicine, material science, environmental science, arts, …… they are ideal facilities for building scientific capacity.
- International collaboration is the obvious way for countries with relatively small scientific communities and/or limited science budgets to build a synchrotron-light source.
- Synchrotron-light sources are user facilities: scientists will typically go there two or three times a year for a few days to carry out experiments, in collaboration with scientists from other institutions/countries.
SESAME is located in Allan, NW of Amman, the capital of Jordan.
SESAME is a cooperative venture by scientists and governments of the region set up on the model of CERN (European Organization for Nuclear Research) although it has very different scientific aims.
It was developed under the auspices of UNESCO (United Nations Educational, Scientific and Cultural Organization) following the formal approval given for this by the Organization's Executive Board (164th session, May 2002).
SESAME (Synchrotron-light for Experimental Science and Applications in the Middle East)
Aims:
1) promote scientific and technical excellence in the Middle East and beyond (and in particular to enable and achieve the return of scientists and engineers from the region)
2) build scientific and cultural bridges between different societies in the Middle East and beyond
There are some 60 light sources in the world - SESAME is the first in the Middle East
SESAME is composed of Members and Observers
Cyprus
Egypt
Iran
Israel
Jordan
Palestine
Pakistan
Turkey
SESAME is composed of Members and Observers
Cyprus
Egypt
Iran
Israel
Jordan
Palestine
Pakistan
Turkey
SESAME is composed of Members and Observers
Brazil, Canada, CERN, China, the European Union, France, Germany, Greece, Italy, Iran, Japan, Kuwait, Portugal, Russian Federation, Spain, Sweden, Switzerland, the United Kingdom, and the United States of America.
International Cooperation as example of Peaceful Cooperation
SESAME received much support from non-members. Examples are...
Rossendorf Beamline (D)
Material Science Beamline (CH)
The boat at Hamburg harbor on its way to Aqaba, Jordan with BESSY I on board; June 7, 2002
XAFS/XRF Monochromator (UK)
The 4 RF Cavities (I)
SESAME layout
Storage Ring
electrons
Microtron
Booster
photons
experimental Stations (beamlines)
Three Beamlines in Operation
Number of proposals received for the IR (2018-2021), XAFS-XRF (2018-2021) and MS (2020-2021) beamlines:
| Country | Proposals |
|------------------|-----------|
| Belgium | 1 |
| Colombia | 1 |
| Cyprus | 18 |
| Egypt | 75 |
| France | 1 |
| Germany | 2 |
| Iran | 56 |
| Israel | 8 |
| Italy | 4 |
| Jordan | 38 |
| Kenya | 3 |
| Malaysia | 1 |
| Malta | 1 |
| Mexico | 1 |
| Pakistan | 47 |
| Palestine | 12 |
| Qatar | 3 |
| South Africa | 1 |
| Sweden | 1 |
| Turkey | 45 |
| United Arab Emirates | 2 |
| United Kingdom | 1 |
| TOTAL | 326 |
Oversubscribed by factor 2
Three Beamlines under Construction
BEATS – BEAmline for Tomography at SESAME (2022)
HESEB – Helmholtz-SESAME Beamline (2022)
TXPES – Turkish X-ray PhotoEmission Spectroscopy Beamline (2023)
Examples for Potential research topics at the different beamlines
- Identification of disease in food crops
- Identification and degradation products from paintings and painted objects
- Aging of microplastics in the environment
- Change in protein structures associated with diseases
- Characterization of lithium-ion and sodium-ion batteries
- Studies of metal contaminants in the environment
- Food security and impacts of various micronutrients on crop development
- Non-destructive analysis of paints of historical art
- Examination of archaeological metals
- Non-destructive studies of archaeological materials
- Agricultural soil management for climate change mitigation
- CO$_2$ capture and storage
- Hydrogen embrittlement in pipelines
SESAME is actively promoting research in the region and beyond
SESAME-PGSB Workshop
⇒ Online-Workshop on 16\textsuperscript{th} November 2021 — 10\textsuperscript{th} to 13\textsuperscript{th} (EET) resp. 9\textsuperscript{th} to 12\textsuperscript{th} (CET)
Program
1) Welcome (5’) – H.E. Mahmoud Abu Mois, Minister of Higher Education and Scientific Research, Palestine
2) Goal of the Workshop (5’) – Frank Lehner (DESY)
3) The Palestinian-German Science Bridge PGSB (20’) – Ghaleb Natour / Caitlin Morgan (PGSB/FZJ)
4) Introduction to SESAME (10’) – Andrea Lausi (Scientific Director at SESAME)
5) Highlights from a Science Project at SESAME / case study from Palestine (15’) – Rezq Basheer-Salimia (NUVTE) / Kirsi Lorentz (Cyl) / Messaoud Harfouche (SESAME)
6) The SESAME Beamlines (5x 10’)
♦ Opportunities at IR – Gihan Kamel (SESAME)
♦ Opportunities at XAFS/XRF – Messaoud Harfouche (SESAME)
♦ Opportunities at MS – Mahmoud Abdellatif (SESAME)
♦ Opportunities at BEATS – Gianluca Iori (SESAME)
♦ Opportunities at HESEB – Mustafa Genisel / Wolfgang Eberhardt (SESAME/DESY)
7) Virtual Coffee Break (5’)
8) Overview of the user community in Palestine and activities (15’) – Rezq Basheer-Salimia (Chairman & General Coordinator Palestine National Committee of SESAME, President of Nablus University for Vocational and Technical Education )
9) Discussions on how to improve access to SESAME and promote cooperation projects for Palestine users (everyone is warmly invited to take part in this discussion)
Please register following this link.
2019: thanks to EU support, SESAME became the World's FIRST large accelerator complex to be fully powered by renewable energy, and signed the UN’s Climate Neutral Now pledge.
SESAME story is a special situation in history where a single facility received so much support from sister organizations and observer countries over an extended period.
High level cooperation ensures scientific output, high visibility and productivity.
Since its inception SESAME receives much support from many different sources
Now SESAME tries to help other projects
African Light Source (AfLS) Foundation
November 15, 2020 SESAME was the first light source to sign an MoU with AfLS. The MoU was announced at the AfLS2020 Virtual Event.
SESAME IR beamline principal scientist, Gihan Kamel, is a member of the AfLS Board of Trustees, a member of the AfLS Steering Executive Committee, and the deputy chair of the AfLS Strategy Committee. In addition, she is a co-convener of the Light Sources Group of the African Strategy for Fundamental and Applied Physics (ASFAP).
SESAME Scientific Director, Andrea Lausi, is a member of the Steering Committee of the LAAAMP project, partnering with IUPAP and IUCr to enhance Light Sources and crystallographic sciences in Africa, the Americas, Asia, Middle East and the Pacific.
Together with The Cyprus Institute and the IAEA, and with AfLS representatives from the University of Johannesburg, LAAAMP and ESRF, SESAME is organising a School on Synchrotron Light Sources and their Applications, to be hosted online by ICTP in December 2021.
And another off-spring from CERN and SESAME
SEEIST
South East European International Institute for Sustainable Technologies
10 members from South East Europe
The South East European International Institute for Sustainable Technologies (SEEIIST) proposed in late 2016 by Prof. Herwig Schopper. It received first official political support by the Government of Montenegro in March 2017.
A real international cooperation in the SEE region, gathering scientists, engineers, medical doctors, young people and technicians within the joint research infrastructure with the mission “Science for Peace”.
The Institute will be a regional Centre of Excellence based on the state-of-art sustainable technology which will assure high competitiveness to the rest of Europe.
It will promote the regional collaboration in the fields of science, technology and industry and will represent a knowledge-based economy project, as well as a platform for education and training for young scientists, researchers, technicians, medical doctors, biologists, biomedicine engineers and others.
The preliminary footprint of the SEEIIST facility consists of five beamlines, the upper ones dedicated to patient treatment, and the lower ones to radiobiology, particle therapy research, isotope production, and materials research.
Combining medical treatment and research
Preparatory phase supported by EU
Preliminary lay-out of SEEIIST
Concept worked out with help from CERN, CNAO, GSI, and other labs
Back to CERN
Connecting 1954 and 2010:
François de Rose
one of CERN’s founding fathers
President of the CERN Council from 1957 to 1960
opinion piece about CERN written by François de Rose in 2008.
“CERN is one of the achievements with which I am the most proud to have been associated. I am still very attached to the Organization, not only because of the many friends I’ve made there but also because it is such a noble cause.”
“CERN was created so that Europeans were not forced to go the United States. Today, Americans are coming to Europe to work on CERN’s machines, something which I don’t think Oppenheimer had anticipated. I find that an extraordinary turnaround.”
François de Rose (1910-2014)
His passion for CERN's research endured. During a visit to CERN in 2010, he promised that he would return when the Higgs boson was discovered, a promise he kept in 2013.
(some) lessons learned
Science bridges Cultures and Nations
Acceptance of diversity is vital
Trust between people is a mandatory ingredient
Scientists can/should/must be ambassadors for peaceful cooperation
CERN, SESAME and others have become key examples for Science Diplomacy……
The search will invoke mini black holes, antimatter, quark-gluon plasma, and extra dimensions of space. The partnership so far has spun off colossal technological and computing rewards, but that is not the point. The point is that Europe is working together in a thrilling intellectual exploration that can have no conceivable commercial or political payoff but could, in some still intangible way, enlighten all humankind. In these otherwise murderous and mean-spirited times, that is something to salute.
The role of international science projects:
– innovate, discover, publish, share
... and bring the world together
</text>
|
[
{
"content": "<url>\nhttps://indico.desy.de/event/32037/contributions/111983/attachments/69717/88476/Science4Peace-DESY.pdf\n</url>\n<text>\nAccelerating Science and Innovation\n\nScience bridging Cultures and Nations\n\nR.-D. Heuer, DPG\n\nDESY, Science4Peace, 11 Nov 2021\n\nThe role of Science:\n\n– innovate, discover, publish, share\n\n... but bridging cultures and nations?\n\nThe role of Science:\n\n– innovate, discover, publish, share\n\nnecessary ingredient: trust between people\n\n… compete and collaborate\n\nPotsdam Manifesto 2005 (H-P Dürr et al, VDW)\n\nFollowing the spirit of the 1955 Russell – Einstein Manifesto\n\n“We need to learn to think in a new way”\n\n“New Action\n……\nTo ensure global supply worthy of human beings and communities, com-petition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.\n……”\n\nThe role of Science:\n\n– innovate, discover, publish, share\n\nDiplomacy through Science\n\nScience is a universal language allowing to compete and to cooperate peacefully\n\nCooperation:\n\nInternational scientific research provides successful modes for peaceful cooperation.\n\nSuch research projects show what mankind is able to achieve when working together coherently towards a common goal.\n\nCooperation needs to comprise developing, emerging and developed countries. We need to exploit all possible synergies. We need to bring the best brains from all regions together for the benefit and sustainability of society.\n\nAccelerating Science and Innovation\n\nCERN\na Marvel of International Collaboration\n\nConceived late 1940s – two aims:\n\n- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members\n\n- Foster cooperation between peoples recently in conflict\n\nfounded 1954, going beyond national borders today scientist from all over the world are coming to CERN\n\nCERN\n\na European Intergovernmental Organization, globally used\n\n→ an infrastructure belonging to all its member states\n\n→ an example of what Europe and its partners can achieve when they are working together\n\nKey Message\n\nFrom the very beginning:\nPeaceful cooperation at the forefront of science independent of cultural and national differencies\n\n1954 European Reconstruction\n1st Session of CERN Council\n\n1980 The East Meets the West\nVisit of delegation from Beijing\n\nToday The LHC brings together > 8000 scientists and some 100 nationalities\n\nExamples of bridges between peoples built by CERN:\n\n- 1st intergovernmental organisation that Germany joined after WW II (on probation!)\n- 1st post WW II meetings between German and Israeli physicists at CERN\n- Collaboration between CERN & Russia at the height of Cold War kept doors open & established trust, and was model for later USA-Russian collaboration\n\n- In the late 1970s, when China was closed, scientific contacts between Europe and China were pioneered in work at DESY (in Hamburg) and later at CERN - Nobel Laureate Sam Ting from MIT got backing of Deng Xiaoping\n\n- In 1985, when USSR-USA arms negotiations in Geneva were stalled, the US delegation asked the DG to arrange a dinner at CERN for Russian and American scientific advisors - which facilitated a subsequent breakthrough\n\n- CERN had an open door policy for East European countries. Following the end of the Cold war, this allowed them quickly to join CERN (and to develop their own European identity)\n\nPoland, Czechoslovakia, Hungary joined within 3 years\n\nfounded 1954, going beyond national borders since 2010 going beyond regional bor<cursor_is_here>g. the secrets of the Big Bang … what was the matter like within the first moments of the Universe’s existence?\n\n- **Develop** new technologies for accelerators and detectors\n - Information technology - the Web and the GRID\n - Medicine - diagnosis and therapy\n\n- **Train** scientists and engineers of tomorrow\n\n- **Unite** people from different countries and cultures\n\n**Key:** excellent research, trust between people\n\nstarting 1954 ....\n\nMid 50s: the first accelerator (the Synchrocyclotron) arrives . . .\n\n2010: a New Era in Fundamental Science\n\nLHC with 4 large Experiments\n\nLHC ring: 27 km circumference\n\nLarge Hadron Collider (LHC) Project\n\nTo design, construct and run such a project many thousands of technicians, engineers and physicists from all over the world, from many different disciplines,\n\ndevelop new technologies,\ndevelop new engineering concepts,\nwork together over decades\n\nPrime example of global cooperation\n\nat CERN\n\nAccelerating Science and Innovation\n\nCMS ~3000 members from ~40 countries\n\nLarge International Collaborations\n\n- a place where people learn to collaborate\n- large international collaborations are a great training ground for academia and private sector for today’s challenging global projects and markets, and to learn to appreciate other cultures\n - decision making, planning at general level\n - information sharing: role of computing in internationalization and communication\n- experience can be used by individuals and in other fields\n \\[ \\rightarrow \\text{management through ‘common goals’} \\]\n \\[ \\rightarrow \\text{management by ‘convincing partners’} \\]\n\nAge Distribution of Scientists - and where they go afterwards\n\nToday: >3000 PhD students in LHC experiments\n\nThey do not all stay: where do they go?\n\nWhat type of organisation do you work in?\n- Industry: 45%\n- University: 29%\n- Research Institute: 7%\n- Govt./International Org.: 4%\n- Other: 15%\n\nWhich domain do you work in?\n- Computing: 35%\n- Consulting: 8%\n- Physics: 19%\n- Engineering: 20%\n- Finance: 4%\n- Communications: 2%\n- Others: 1%\n\nSummer Students 2019\n\nNumber of students is based on three programmes: Member State, Non-Member State and Openlab summer student programme.\n\nMEMBER STATES 150\n\nAustria 3\nBelgium 4\nBulgaria 2\nCzech Republic 4\nDenmark 6\nFinland 3\nFrance 13\nGermany 23\nGreece 5\nHungary 2\nIsrael 3\nItaly 14\nNetherlands 7\nNorway 3\nPoland 8\nPortugal 3\nRomania 3\nSerbia 2\nSlovakia 2\nSpain 11\nSweden 7\nSwitzerland 5\nUnited Kingdom 17\n\nASSOCIATE MEMBERS IN THE PRE-STAGE TO MEMBERSHIP 6\n\nCyprus 4\nSlovenia 2\n\nASSOCIATE MEMBERS 24\n\nIndia 13\nLithuania 2\nPakistan 4\nTurkey 3\nUkraine 2\n\nOBSERVERS 34\n\nJapan 4\nRussia 10\nUSA 20\n\nOTHERS\n\n| Country | Number |\n|------------------|--------|\n| Bolivia | 1 |\n| Bosnia & Herzegovina | 1 |\n| Albania | 1 |\n| Algeria | 4 |\n| Argentina | 1 |\n| Armenia | 1 |\n| Australia | 1 |\n| Azerbaijan | 2 |\n| Bahrain | 2 |\n| Bangladesh | 2 |\n| Belarus | 1 |\n| Belgium | 4 |\n| Bulgaria | 2 |\n| Canada | 6 |\n| Chile | 1 |\n| China | 10 |\n| Colombia | 1 |\n| Costa Rica | 4 |\n| Croatia | 4 |\n| Cuba | 2 |\n| Cyprus | 4 |\n| Czech Republic | 4 |\n| Denmark | 6 |\n| Estonia | 2 |\n| Finland | 3 |\n| France | 13 |\n| Georgia | 1 |\n| Ghana | 1 |\n| Germany | 23 |\n| Greece | 5 |\n| Greenland | 1 |\n| Guatemala | 1 |\n| Hungary | 2 |\n| Iceland | 1 |\n| India | 13 |\n| Indonesia | 1 |\n| Iran | 2 |\n| Iraq | 1 |\n| Israel | 3 |\n| Italy | 14 |\n| Japan | 4 |\n| Jordan | 1 |\n| Kazakhstan | 3 |\n| Korea | 2 |\n| Kosovo | 1 |\n| Kuwait | 1 |\n| Latvia | 1 |\n| Lebanon | 3 |\n| Libya | 1 |\n| Lithuania | 2 |\n| Luxembourg | 1 |\n| Malaysia | 3 |\n| Mauritius | 1 |\n| Moldova | 1 |\n| Montenegro | 4 |\n| Morocco | 1 |\n| Nepal | 1 |\n| North Macedonia | 1 |\n| Oman | 1 |\n| Palestine | 2 |\n| Peru | 1 |\n| Philippines | 1 |\n| Poland | 8 |\n| Portugal | 3 |\n| Qatar | 1 |\n| Romania | 3 |\n| Russia | 10 |\n| Rwanda | 1 |\n| Saudi Arabia | 1 |\n| Serbia | 2 |\n| Singapore | 2 |\n| Slovakia | 2 |\n| Slovenia | 2 |\n| South Africa | 1 |\n| Spain | 11 |\n| Sri Lanka | 4 |\n| Sweden | 7 |\n| Switzerland | 5 |\n| Syria | 1 |\n| Taiwan | 1 |\n| Thailand | 4 |\n| Tunisia | 2 |\n| Turkey | 3 |\n| Turkmenistan | 1 |\n| Ukraine | 2 |\n| United Kingdom | 17 |\n| USA | 20 |\n| Uzbekistan | 1 |\n| Venezuela | 1 |\n| Viet Nam | 1 |\n| Yemen | 1 |\n| Zimbabwe | 1 |\n\n122\n\nThere are also other aspects:\n\nOne of the detector parts used over a million World War II brass shell casements from the Russian Navy in making some of its components.\n\n“New Action\n\nTo ensure global supply worthy of human beings and communities, competition, i.e., cooperative rivalry, can develop in a fostering and protective way only through innovation and creative productivity, while using the dynamic driving forces of a cooperative-dialogical interaction among the cultures and people of the earth.\n\nDialogue and exchange must and can be installed in all layers of life, particularly in the institutional and spatial overlaps between cultures, and must constantly dynamically adapt. In this way, tension and conflicts can be dynamically absorbed, balanced, and diverted into moving discourse.\n\nCERN is a small but beautiful example of this spirit.”\n\nBut CERN is not alone,\nthere are several ‘off-springs’……\n\nOne of ESO’s original aims was to allow the Member States to work together to build and operate advanced astronomical facilities that were beyond the capabilities of any individual country.\n\nConvention signed 1962 by 5 founding members, today there are 16 members.\n\nCharles Fehrenbach, the director of the Haute Provence Observatory, who was involved with ESO for many of the early years, stated 1981 in ESO’s journal, *The Messenger*:\n\n“There is no doubt in my mind that it was the installation in Geneva which saved our organization.”\n\nLocation of ESO’s Telescope Project (TP) Division and Sky Atlas Laboratory (SA) at CERN in the 1970s.\n\nThe strong links with CERN certainly helped to set ESO on its way.\n\nThe European Molecular Biology Laboratory was the idea of prominent scientists, with the goal to create a CERN-like supranational research centre to redress the balance in the strongly US-dominated field of molecular biology.\n\nFounded 1974\n\nToday located at six sites, 27 members\n\nSimilar to CERN:\n\nIn 2003, realising the increasingly global nature of big scientific challenges and the need for international cooperation in research, EMBL introduced the Associate Membership Scheme, making it possible for non-European countries to access all EMBL programmes and services.\n\nThe latest “off-spring”\n\nCERN\n\nConceived late 1940s – two aims:\n- Enable construction of a facility for (then) nuclear and (now) particle physics research beyond the means of individual members\n- Foster cooperation between peoples recently in conflict\n\nSESAME\n\nConceived late 1990s – two aims:\n- Enable construction of a facility for a broad range of scientific research beyond the means of individual members\n- Foster cooperation between peoples\n\nHow to achieve the broad range of scientific research......\n\n- Synchrotron-light sources allow research in many areas, e.g. biology, physics, chemistry, archaeology, medicine, material science, environmental science, arts, …… they are ideal facilities for building scientific capacity.\n\n- International collaboration is the obvious way for countries with relatively small scientific communities and/or limited science budgets to build a synchrotron-light source.\n\n- Synchrotron-light sources are user facilities: scientists will typically go there two or three times a year for a few days to carry out experiments, in collaboration with scientists from other institutions/countries.\n\nSESAME is located in Allan, NW of Amman, the capital of Jordan.\n\nSESAME is a cooperative venture by scientists and governments of the region set up on the model of CERN (European Organization for Nuclear Research) although it has very different scientific aims.\n\nIt was developed under the auspices of UNESCO (United Nations Educational, Scientific and Cultural Organization) following the formal approval given for this by the Organization's Executive Board (164th session, May 2002).\n\nSESAME (Synchrotron-light for Experimental Science and Applications in the Middle East)\n\nAims:\n\n1) promote scientific and technical excellence in the Middle East and beyond (and in particular to enable and achieve the return of scientists and engineers from the region)\n\n2) build scientific and cultural bridges between different societies in the Middle East and beyond\n\nThere are some 60 light sources in the world - SESAME is the first in the Middle East\n\nSESAME is composed of Members and Observers\n\nCyprus\nEgypt\nIran\nIsrael\nJordan\nPalestine\nPakistan\nTurkey\n\nSESAME is composed of Members and Observers\n\nCyprus\nEgypt\nIran\nIsrael\nJordan\nPalestine\nPakistan\nTurkey\n\nSESAME is composed of Members and Observers\n\nBrazil, Canada, CERN, China, the European Union, France, Germany, Greece, Italy, Iran, Japan, Kuwait, Portugal, Russian Federation, Spain, Sweden, Switzerland, the United Kingdom, and the United States of America.\n\nInternational Cooperation as example of Peaceful Cooperation\n\nSESAME received much support from non-members. Examples are...\n\nRossendorf Beamline (D)\n\nMaterial Science Beamline (CH)\n\nThe boat at Hamburg harbor on its way to Aqaba, Jordan with BESSY I on board; June 7, 2002\n\nXAFS/XRF Monochromator (UK)\n\nThe 4 RF Cavities (I)\n\nSESAME layout\n\nStorage Ring\n\nelectrons\n\nMicrotron\n\nBooster\n\nphotons\n\nexperimental Stations (beamlines)\n\nThree Beamlines in Operation\n\nNumber of proposals received for the IR (2018-2021), XAFS-XRF (2018-2021) and MS (2020-2021) beamlines:\n\n| Country | Proposals |\n|------------------|-----------|\n| Belgium | 1 |\n| Colombia | 1 |\n| Cyprus | 18 |\n| Egypt | 75 |\n| France | 1 |\n| Germany | 2 |\n| Iran | 56 |\n| Israel | 8 |\n| Italy | 4 |\n| Jordan | 38 |\n| Kenya | 3 |\n| Malaysia | 1 |\n| Malta | 1 |\n| Mexico | 1 |\n| Pakistan | 47 |\n| Palestine | 12 |\n| Qatar | 3 |\n| South Africa | 1 |\n| Sweden | 1 |\n| Turkey | 45 |\n| United Arab Emirates | 2 |\n| United Kingdom | 1 |\n| TOTAL | 326 |\n\nOversubscribed by factor 2\n\nThree Beamlines under Construction\n\nBEATS – BEAmline for Tomography at SESAME (2022)\n\nHESEB – Helmholtz-SESAME Beamline (2022)\n\nTXPES – Turkish X-ray PhotoEmission Spectroscopy Beamline (2023)\n\nExamples for Potential research topics at the different beamlines\n\n- Identification of disease in food crops\n- Identification and degradation products from paintings and painted objects\n- Aging of microplastics in the environment\n- Change in protein structures associated with diseases\n\n- Characterization of lithium-ion and sodium-ion batteries\n- Studies of metal contaminants in the environment\n- Food security and impacts of various micronutrients on crop development\n- Non-destructive analysis of paints of historical art\n- Examination of archaeological metals\n\n- Non-destructive studies of archaeological materials\n- Agricultural soil management for climate change mitigation\n- CO$_2$ capture and storage\n- Hydrogen embrittlement in pipelines\n\nSESAME is actively promoting research in the region and beyond\n\nSESAME-PGSB Workshop\n\n⇒ Online-Workshop on 16\\textsuperscript{th} November 2021 — 10\\textsuperscript{th} to 13\\textsuperscript{th} (EET) resp. 9\\textsuperscript{th} to 12\\textsuperscript{th} (CET)\n\nProgram\n\n1) Welcome (5’) – H.E. Mahmoud Abu Mois, Minister of Higher Education and Scientific Research, Palestine\n\n2) Goal of the Workshop (5’) – Frank Lehner (DESY)\n\n3) The Palestinian-German Science Bridge PGSB (20’) – Ghaleb Natour / Caitlin Morgan (PGSB/FZJ)\n\n4) Introduction to SESAME (10’) – Andrea Lausi (Scientific Director at SESAME)\n\n5) Highlights from a Science Project at SESAME / case study from Palestine (15’) – Rezq Basheer-Salimia (NUVTE) / Kirsi Lorentz (Cyl) / Messaoud Harfouche (SESAME)\n\n6) The SESAME Beamlines (5x 10’)\n ♦ Opportunities at IR – Gihan Kamel (SESAME)\n ♦ Opportunities at XAFS/XRF – Messaoud Harfouche (SESAME)\n ♦ Opportunities at MS – Mahmoud Abdellatif (SESAME)\n ♦ Opportunities at BEATS – Gianluca Iori (SESAME)\n ♦ Opportunities at HESEB – Mustafa Genisel / Wolfgang Eberhardt (SESAME/DESY)\n\n7) Virtual Coffee Break (5’)\n\n8) Overview of the user community in Palestine and activities (15’) – Rezq Basheer-Salimia (Chairman & General Coordinator Palestine National Committee of SESAME, President of Nablus University for Vocational and Technical Education )\n\n9) Discussions on how to improve access to SESAME and promote cooperation projects for Palestine users (everyone is warmly invited to take part in this discussion)\n\nPlease register following this link.\n\n2019: thanks to EU support, SESAME became the World's FIRST large accelerator complex to be fully powered by renewable energy, and signed the UN’s Climate Neutral Now pledge.\n\nSESAME story is a special situation in history where a single facility received so much support from sister organizations and observer countries over an extended period.\n\nHigh level cooperation ensures scientific output, high visibility and productivity.\n\nSince its inception SESAME receives much support from many different sources\n\nNow SESAME tries to help other projects\n\nAfrican Light Source (AfLS) Foundation\n\nNovember 15, 2020 SESAME was the first light source to sign an MoU with AfLS. The MoU was announced at the AfLS2020 Virtual Event.\n\nSESAME IR beamline principal scientist, Gihan Kamel, is a member of the AfLS Board of Trustees, a member of the AfLS Steering Executive Committee, and the deputy chair of the AfLS Strategy Committee. In addition, she is a co-convener of the Light Sources Group of the African Strategy for Fundamental and Applied Physics (ASFAP).\n\nSESAME Scientific Director, Andrea Lausi, is a member of the Steering Committee of the LAAAMP project, partnering with IUPAP and IUCr to enhance Light Sources and crystallographic sciences in Africa, the Americas, Asia, Middle East and the Pacific.\n\nTogether with The Cyprus Institute and the IAEA, and with AfLS representatives from the University of Johannesburg, LAAAMP and ESRF, SESAME is organising a School on Synchrotron Light Sources and their Applications, to be hosted online by ICTP in December 2021.\n\nAnd another off-spring from CERN and SESAME\n\nSEEIST\nSouth East European International Institute for Sustainable Technologies\n\n10 members from South East Europe\n\nThe South East European International Institute for Sustainable Technologies (SEEIIST) proposed in late 2016 by Prof. Herwig Schopper. It received first official political support by the Government of Montenegro in March 2017.\n\nA real international cooperation in the SEE region, gathering scientists, engineers, medical doctors, young people and technicians within the joint research infrastructure with the mission “Science for Peace”.\n\nThe Institute will be a regional Centre of Excellence based on the state-of-art sustainable technology which will assure high competitiveness to the rest of Europe.\n\nIt will promote the regional collaboration in the fields of science, technology and industry and will represent a knowledge-based economy project, as well as a platform for education and training for young scientists, researchers, technicians, medical doctors, biologists, biomedicine engineers and others.\n\nThe preliminary footprint of the SEEIIST facility consists of five beamlines, the upper ones dedicated to patient treatment, and the lower ones to radiobiology, particle therapy research, isotope production, and materials research.\n\nCombining medical treatment and research\n\nPreparatory phase supported by EU\n\nPreliminary lay-out of SEEIIST\n\nConcept worked out with help from CERN, CNAO, GSI, and other labs\n\nBack to CERN\n\nConnecting 1954 and 2010:\n\nFrançois de Rose\none of CERN’s founding fathers\nPresident of the CERN Council from 1957 to 1960\n\nopinion piece about CERN written by François de Rose in 2008.\n\n“CERN is one of the achievements with which I am the most proud to have been associated. I am still very attached to the Organization, not only because of the many friends I’ve made there but also because it is such a noble cause.”\n\n“CERN was created so that Europeans were not forced to go the United States. Today, Americans are coming to Europe to work on CERN’s machines, something which I don’t think Oppenheimer had anticipated. I find that an extraordinary turnaround.”\n\nFrançois de Rose (1910-2014)\n\nHis passion for CERN's research endured. During a visit to CERN in 2010, he promised that he would return when the Higgs boson was discovered, a promise he kept in 2013.\n\n(some) lessons learned\n\nScience bridges Cultures and Nations\n\nAcceptance of diversity is vital\n\nTrust between people is a mandatory ingredient\n\nScientists can/should/must be ambassadors for peaceful cooperation\n\nCERN, SESAME and others have become key examples for Science Diplomacy……\n\nThe search will invoke mini black holes, antimatter, quark-gluon plasma, and extra dimensions of space. The partnership so far has spun off colossal technological and computing rewards, but that is not the point. The point is that Europe is working together in a thrilling intellectual exploration that can have no conceivable commercial or political payoff but could, in some still intangible way, enlighten all humankind. In these otherwise murderous and mean-spirited times, that is something to salute.\n\nThe role of international science projects:\n\n– innovate, discover, publish, share\n\n... and bring the world together\n</text>\n",
"role": "user"
},
{
"content": "ders\n\nSince 2010 CERN membership is going global\n\nNew members:\nIsrael, Romania, Serbia\n\nAssociate members:\nCyprus, Estonia, Slovenia\nCroatia, India, Latvia, Lithuania, Pakistan, Turkey, Ukraine\n\nThe Mission of CERN\n\n- **Push back** the frontiers of knowledge\n - E.",
"role": "assistant"
}
] |
PRODUCT INFORMATION ®
ISOPTIN INJECTION SOLUTION
NAME OF THE MEDICINE
Verapamil Hydrochloride
Chemical Structure
Chemical name: Benzeneacetonitrile, - [3-[[2-(3,4-dimethoxyphenyl) ethyl]methylamino] propyl]]-3,4-dimethoxy--(1-methylethyl)-,monohydrochloride. M.Wt: 491.07. Molecular formula: C27H38N2O4 • HCl .
CAS Number
152-11-4.
DESCRIPTION
Verapamil hydrochloride is a white or practically white crystalline powder. It is practically odourless and has a bitter taste. It is soluble in water, freely soluble in chloroform, sparingly soluble in alcohol and practically insoluble in ether.
Verapamil hydrochloride injection is a sterile, nonpyrogenic solution containing verapamil hydrochloride 2.5 mg/mL (equivalent to 2.3 mg/mL verapamil) and sodium chloride 8.5 mg/mL in water for injection. The solution contains no bacteriostat or antimicrobial agent and is intended for single-dose intravenous administration. It may contain hydrochloric acid for pH adjustment; pH is 4.9 (4.0 to 6.5). Inactive ingredients in verapamil hydrochloride injection are sodium chloride and water for injections.
PHARMACOLOGY
Isoptin is a calcium ion influx inhibitor (slow channel blocker or calcium ion antagonist) which exerts its pharmacologic effects by modulating the influx of ionic calcium across the cell membrane of the arterial smooth muscle as well as in conductile and contractile myocardial cells.
Pharmacokinetics
Impaired renal function has no effect on verapamil hydrochloride pharmacokinetics in patients with end-stage renal failure and subjects with healthy kidneys.
CLINICAL DATA
Verapamil has a pronounced antiarrhythmic action particularly in supraventricular cardiac arrhythmias. It prolongs impulse conduction in the AV node and thereby depending on the type of arrhythmia restores the sinus rhythm and/or normalises the ventricular rate.
The calcium antagonist verapamil reduces myocardial oxygen consumption directly by intervening in the energy consuming metabolic processes of the myocardial cell and indirectly by diminishing the peripheral resistance (afterload).
The decrease of the vascular smooth muscle tone moreover prevents coronary spasms and lowers raised blood pressure.
INDICATIONS
- Tachycardias, such as paroxysmal supraventricular tachycardia, atrial fibrillation with rapid ventricular response, (except in WPW syndrome, see "PRECAUTIONS"), atrial flutter with rapid conduction, extrasystoles.
- For the prophylaxis and/or therapy of ectopic arrhythmias (predominantly ventricular extrasystoles) in halothane anaesthesia and in the application of adrenaline in halothane anaesthesia, respectively.
- Acute hypertension.
- Acute coronary insufficiency.
CONTRAINDICATIONS
- Cardiogenic shock (except for arrhythmia induced shock), complicated acute myocardial infarction (bradycardia, hypotension, left ventricular failure), second and third degree AV block, sick sinus syndrome (bradycardia-tachycardia syndrome), manifest heart failure.
- In the presence of first degree AV block, sinus bradycardia and hypotension the use of Isoptin should be given critical consideration. In acute coronary insufficiency intravenous administration is only admissible with careful indication and continuous monitoring of the patient. Where heart failure is present, full compensation with cardiac glycosides must be achieved before the administration of Isoptin.
- Patients with atrial flutter or atrial fibrillation and an accessory bypass tract (e.g Wolff-Parkinson-White, Lown-Ganong-Levine syndromes). These patients are at risk to develop ventricular tachyarrhythmia including ventricular fibrillation if verapamil is administered.
- Patients with ventricular tachycardia. Administration of intravenous verapamil to patients with wide-complex ventricular tachycardia (QRS > 0.12 sec) can result in marked haemodynamic deterioration and ventricular fibrillation. Proper diagnosis and differentiation from wide-complex supraventricular tachycardia is imperative in the emergency room setting.
- Severe hypotension
- Isoptin injection should not be administered intravenously to patients on betablockers (except in an intensive care setting).
- In patients with diminished hepatic function (parenchymal loss/reduced blood supply) the effect of Isoptin is intensified and prolonged depending on the severity of the
disease due to impaired drug metabolism. In these cases, dosage should be adjusted with special care.
- Concomitant administration of verapamil and ivabradine is contraindicated (see INTERACTIONS WITH OTHER MEDICINES).
- Known hypersensitivity to verapamil hydrochloride.
PRECAUTIONS
Verapamil should be given as a slow intravenous injection over at least 2 minutes under continuous ECG and blood pressure monitoring (see DOSAGE AND ADMINISTRATION).
Intravenous injection should only be given by the physician.
In atrial fibrillation and simultaneous WPW syndrome there is a risk of inducing ventricular fibrillation.
Hypotension
Severe hypotension has occasionally occurred following intravenous administration of the drug. On rare occasions this has been followed by a loss of consciousness. If severe hypotension develops, verapamil should be promptly discontinued and vasoconstrictor substances used.
In patients using antihypertensive drugs, the additional hypotensive effect should be taken into consideration.
Acute Myocardial Infarction:
Use with caution in patients with acute myocardial infarction complicated by bradycardia, marked hypotension, or left ventricular dysfunction
Ventricular Fibrillation
Intravenous administration may precipitate ventricular fibrillation. Patients with atrial flutter/fibrillation and an accessory AV pathway may develop increased antegrade conduction across the aberrant pathway bypassing the AV node, producing a very rapid ventricular response after receiving intravenous verapamil. Its use in these patients is contraindicated. (see CONTRAINDICATIONS).
Bradycardia/Asystole
Isoptin slows conduction across the AV node and rarely may produce second or third degree AV block, bradycardia and in extreme cases, asystole. This is more likely to occur in patients with a sick sinus syndrome (SA nodal disease). Asystole in patients other than those with sick sinus syndrome is usually of short duration (a few seconds or less), with spontaneous return to AV nodal or normal sinus rhythm. If this does not occur promptly, appropriate treatment should be initiated immediately (See Side Effects and Acute Cardiovascular Side Effects).
Heart Failure
Because of the drug's negative inotropic effect, verapamil should not be used in patients with poorly compensated congestive heart failure, unless the failure is complicated by or caused by an arrhythmia. If verapamil is used in such patients, they must be digitalized prior to treatment. Continuous monitoring is mandatory when intravenous verapamil is used in digitalized patients. It has been reported that digoxin plasma levels may increase with chronic oral administration.
Impaired Hepatic or Renal Function
Verapamil should be used with caution in patients with hepatic impairment. Although impaired renal function has been shown to have no effect on verapamil pharmacokinetics in patients with end-stage renal failure, verapamil should be used cautiously and with close monitoring in patients with impaired renal function. Verapamil cannot be removed by haemodialysis.
These patients should be monitored carefully for abnormal prolongation of the PR interval or other signs of excessive pharmacological effects.
Use in Patients with Impaired Neuromuscular Transmission
Verapamil should be used with caution in the presence of diseases in which neuromuscular transmission is affected (myasthenia gravis, Lambert-Eaton syndrome, advanced Duchenne muscular dystrophy).
Intravenous verapamil can precipitate respiratory muscle failure in patients with progressive muscular dystrophy and should, therefore, be used with caution.
Increased Intracranial Pressure
Intravenous verapamil has been seen to increase intracranial pressure in patients with supratentorial tumors at the time of anaesthesia induction. Caution should be taken and appropriate monitoring performed.
Sick Sinus Syndrome
Precaution should be taken when treating any supraventricular arrhythmia on an emergency basis as it may be caused by an undiagnosed Sick Sinus Syndrome (see CONTRAINDICATIONS).
Heart Block
Development of second or third degree AV block or unifascicular, bifascicular or trifascicular bundle branch block requires reduction in subsequent doses or discontinuation of verapamil and institution of appropriate therapy, if needed. (See Treatment of Acute Cardiovascular Side Effects).
Use in Pregnancy (Category C)
Verapamil carries the potential to produce fetal hypoxia associated with maternal hypotension.
Verapamil should not be administered intravenously during the first six months of pregnancy. There are no data on use in the first and second trimester. Verapamil should not be used in the final trimester unless the benefits clearly outweigh the risks.
Use in Lactation
Verapamil hydrochloride is excreted in human breast milk. There are currently no reports of verapamil injection or infusion use during breastfeeding. Due to the potential for serious adverse reactions in nursing infants, intravenous verapamil is not recommended during lactation.
Paediatric Use
There have been rare cases of severe haemodynamic events – some fatal – after intravenous administration of verapamil to neonates and infants. Intravenous verapamil should not be administered to this group of patients unless it is absolutely necessary and there is no alternative.
INTERACTIONS WITH OTHER MEDICINES
During the simultaneous administration of Isoptin and drugs with cardiodepressive action and/or inhibitory effect on AV conduction watch should be kept for additive effects. Above all Isoptin should not be administered intravenously without compelling reason if the patient is on -adrenergic blockers.
The concomitant administration of intravenous beta blockers and intravenous verapamil has resulted in serious adverse reactions, especially in patients with severe cardiomyopathy, congestive heart failure or recent myocardial infarction (see CONTRAINDICATIONS).
The additional hypotensive effect of Isoptin should be borne in mind particularly in patients on antihypertensive drugs.
Diuretics, Vasodilators
Potentiation of the antihypertensive effect.
Digoxin
Elevation of digoxin plasma levels because of diminished renal excretion. However since both drugs slow AV conduction, patients should be monitored for AV block or excessive bradycardia.
Quinidine
Enhanced blood pressure lowering is possible. Pulmonary oedema may occur in patients with hypertrophic obstructive cardiomyopathy. Elevation of quinidine plasma level.
Flecainide
May result in an additive negative inotropic effect and prolongation of atrioventricular conduction.
Disopyramide
Possible additive effects and impairment of left ventricular function. Pending further accumulation of data, disopyramide should be discontinued 48 hours prior to initiating verapamil therapy and should not be reinstituted until 24 hours after verapamil has been discontinued.
Ivabradine
Concomitant administration of verapamil and ivabradine is contraindicated. Ivabradine use in combination with verapamil is associated with increased plasma concentrations of ivabradine and additional heart rate lowering effects (see CONTRAINDICATIONS).
HMG-CoA Reductase Inhibitors
Treatment with HMG CoA reductase inhibitors (e.g., simvastatin or atorvastatin) in a patient taking verapamil should be started at the lowest possible dose and titrated upwards. If verapamil treatment is to be added to patients already taking an HMG CoA reductase inhibitor (e.g., simvastatin or atorvastatin) consider a reduction in the statin dose and retitrate against serum cholesterol concentrations.
Verapamil hydrochloride may increase the serum levels of HMG CoA reductase inhibitors primarily metabolised by CYP3A enzymes (e.g., atorvastatin and simvastatin). An interaction in healthy subjects demonstrated a 43% increase in verpamil AUC in combination with atorvastatin. Consider using caution when these HMG CoA reductase inhibitors and verapamil are concomitantly administered.
Fluvastatin, pravastatin and rosuvastatin are not metabolized by CYP3A4 and are less likely to interact with verapamil.
Inhalation Anaesthetics
Mutual potentiation of cardiovascular effects (higher-grade AV block, higher-grade lowering of heart rate, induction of heart failure, enhanced blood pressure lowering).
Carbamazepine
Potentiation of carbamazepine effect, enhanced neurotoxicity.
Cimetidine
Cimetidine reduces verapamil clearance following intravenous verapamil administration.
Lithium
Increased sensitivity to the effects of lithium (neurotoxicity) has been reported during concomitant verapamil hydrochloride-lithium therapy with either no change or an increase in serum lithium levels. The addition of verapamil hydrochloride, however, has also resulted in the lowering of the serum lithium levels in patients receiving chronic stable oral lithium. Patients receiving both drugs should be monitored carefully.
Phenytoin, Phenobarbital
Lowering of the plasma level and attenuation of the effects of verapamil.
Erythromycin, clarithromycin and telithromycin
Erythromycin, clarithromycin and telithromycin therapy may increase serum levels of verapamil.
Rifampicin
Blood pressure lowering effect may be reduced.
Sulfinpyrazone
Blood pressure lowering effect may be reduced.
Theophylline
Elevation of theophylline plasma levels.
Prazosin, Terazosin
Additive hypotensive effect.
HIV Antiviral Agents
Due to the metabolic inhibitory potential of some of the HIV antiviral agents, such as ritonavir, plasma concentrations of verapamil may increase. Caution should be used or the dose of verapamil may be decreased.
Cyclosporin
Elevation of cyclosporin plasma levels
Everolimus, sirolimus and tacrolimus.
Verapamil therapy may increase serum levels of everolimus, sirolimus and tacrolimus.
Buspirone
Verapamil therapy may increase plasma levels of buspirone
Midazolam
Elevation of midazolam
Muscle Relaxants
Possible potentiation by verapamil.
Protein Bound Drugs
As verapamil is highly protein bound, it should be administered with caution to patients receiving other highly protein bound drugs.
Dantrolene
Animal studies suggest that concomitant use of IV verapamil and IV dantrolene may result in cardiovascular collapse.
Aspirin
Increased tendency to bleed.
Ethanol (alcohol)
Delayed ethanol breakdown and elevation of ethanol plasma levels, resulting in enhancement of the alcoholic effect through verapamil.
Grapefruit Juice
Increase in verapamil serum level has been reported. Therefore grapefruit and its juice should not be taken with verapamil.
Doxorubicin
Caution should be used when oral verapamil is administered in combination with doxorubicin due to the potential for increased doxorubicin levels.
Colchicine
Colchicine is a substrate for both CYP3A and the efflux transporter, P-glycoprotein (P-gp). Verapamil is known to inhibit CYP3A and P-gp. When verapamil and colchicines are administered together, inhibition of P-gp and/or CYP3A by verapamil may lead to increased exposure to colchicine. Combined use is not recommended.
Imipramine
Verapamil therapy may increase serum levels of imipramine.
Glibenclamide
Verapamil therapy may increase serum levels of glibenclamide.
ADVERSE EFFECTS
As with all drugs which inhibit AV conduction, Isoptin can produce first or second degree AV block; in extreme cases there may be complete block with or without subsequent asystole. Occasionally, heart failure may develop or existing heart failure may be exacerbated.
The risk of inducing ventricular fibrillation is minute, as Isoptin has no effect on the conduction velocity and refractory period in either atria or ventricles. By diminishing the peripheral resistance, the intravenous administration of Isoptin may lead to a slight and transient decrease of blood pressure even in normotensive patients. If the heart is no longer able to increase cardiac output for maintaining normal blood pressure, a critical blood pressure fall may occur. There are rare reports of symptoms such as palpitations and rapid heat beat (tachycardia) in patients receiving verapamil.
Elevation of the pacing and sensing threshold cannot be ruled out in pacemaker wearers on verapamil hydrochloride.
Frequently, nausea (rarely, vomiting), bloating or constipation - in isolated cases to the point of ileus, abdominal discomfort and pain.
Occasionally, there may be headache, nervousness, dizziness or lightheadedness, fatigue, sensory disturbances such as tingling, numbness (paraesthesia, neuropathy), shakiness (tremor), and vertigo.
Flush has been observed occasionally.
Occasionally, allergic reactions such as erythema, pruritus, urticaria, maculopapular exanthema and erythromelalgia may occur. Rarely bronchospasm may occur.
Rarely – tinnitus. Peripheral oedema may occur as a result of local arteriole dilation.
Rarely, reversible elevation of liver enzymes has been observed, probably as a manifestation of allergic hepatitis.
Relevant lowering of glucose tolerance is rare.
There are rare reports of impotence.
Gynaecomastia has been observed very rarely in elderly patients on long term treatment. In the cases reported to date, the condition was reversible upon discontinuation of the drug. Elevated prolactin levels has been described, with isolated cases of milk (galactorrhoea).
Very rarely, there have been cases of purpura in the skin or mucous. There are isolated reports of photodermatitis.
Very rarely, muscular weakness or muscle and joint pain may occur.
There are isolated reports of angioneurotic oedema and Stevens-Johnson syndrome.
There may be isolated cases of gingival hyperplasia which is reversible when the drug is discontinued.
Adverse Effects from Post-marketing Surveillance:
There has been a single post marketing report of paralysis (tetraparesis) associated with the combined use of verapamil and colchicine. This may have been caused by colchicine crossing the blood-brain barrier due to CYP3A and P-gp inhibition by verapamil. Combined use of verapamil and colchicine is not recommended.
Other adverse effects reported from post-marketing surveillance include erythema multiforme, extrapyramidal syndrome, hyperkalaemia, dyspnoea and renal failure.
Treatment Of Acute Cardiovascular Side Effects
Cardiac Arrest
External cardiac massage, artificial respiration, ECG for differentiating between asystole and ventricular fibrillation; then appropriate intensive measures, such as defibrillation or pacemaker therapy, as required.
Second Or Third Degree Av Block
Atropine, isoprenaline, if necessary, pacemaker therapy.
Development Of Myocardial Insufficiency
Dopamine, dobutamine, cardiac glycosides or calcium.
Blood Pressure Fall
Proper positioning, dopamine, dobutamine, noradrenaline (norepinephrine).
DOSAGE AND ADMINISTRATION
Adults
5mg slowly intravenously, in tachycardias and hypertensive crises repeated, if necessary, after 5 to 10 minutes. Drip infusion to maintain the therapeutic effect: 5-10 mg/hour in physiological saline, glucose, laevulose or similar solutions, on average up to a total dose of 100mg/day.
Children
Newborn
0.75-1mg (= 0.3-0.4mL)
Infants
0.75-2mg (= 0.3-0.8mL)
Children (aged 1-5 years)
2-3mg (= 0.8-1.2mL)
(aged 6-14 years)
2.5-5mg (= 1-2mL)
of Isoptin, given intravenously, depending on age and action. The injection should be made slowly under electrocardiographic control and only until onset of the effect. Intravenous infusion in hypertensive crises; initially 0.05-0.1mg/kg/hour; if the effect proves to be insufficient, the dose is increased at 30-60 minute intervals until twice the dose or more is reached. Average total dose up to 1.5mg/kg/day.
OVERDOSAGE
Symptoms
Hypotension, bradycardia up to high degree AV block and sinus arrest, hyperglycemia, stupor and metabolic acidosis. Fatalities have occurred as a result of overdose.
Fatalities have occurred as a result of overdose.
Treatment
Treatment of overdosage should be supportive and individualized. Beta-adrenergic stimulation and/or parenteral administration of calcium injection (calcium chloride) have been effectively used in treatment of deliberate overdosage with oral verapamil hydrochloride. Verapamil hydrochloride cannot be removed by hemodialysis. Clinically significant hypotensive reactions or high-degree AV block should be treated with vasopressor agents or cardiac pacing, respectively. Asystole should be handled by the usual measures including isoproterenol hydrochloride, other vasopressor agents or cardiopulmonary resuscitation.
For advice on the management of overdose please contact the Poisons Information Centre. In Australia please call 13 11 26 and in New Zealand 0800 764 766.
PRESENTATION AND STORAGE CONDITIONS
Ampoules, 5mg/2mL
5 x 2mL ampoules
Store below 25°C
NAME AND ADDRESS OF THE SPONSOR
BGP Products Pty Ltd 299 Lane Cove Road Macquarie Park NSW 2113 AUSTRALIA
POISON SCHEDULE OF THE MEDICINE
Prescription Only Medicine
DATE OF FIRST INCLUSION IN THE ARTG
8 October 1991
DATE OF MOST RECENT AMENDMENT
21 st June 2016
Version 20
|
<urn:uuid:ee51c814-7cb8-49b4-b4d6-3c85dcc205d6>
|
CC-MAIN-2017-34
|
http://www.medicines.org.au/files/gopisoin.pdf
|
2017-08-22T01:26:49Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109803.8/warc/CC-MAIN-20170822011838-20170822031838-00162.warc.gz
| 601,618,194
| 4,910
|
eng_Latn
|
eng_Latn
| 0.917517
|
eng_Latn
| 0.983118
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1585,
4354,
7050,
9442,
11323,
13652,
14875,
17296,
19243,
21260,
21542
] |
PRODUCT INFORMATION ®
ISOPTIN INJECTION SOLUTION
NAME OF THE MEDICINE
Verapamil Hydrochloride
Chemical Structure
Chemical name: Benzeneacetonitrile, - [3-[[2-(3,4-dimethoxyphenyl) ethyl]methylamino] propyl]]-3,4-dimethoxy--(1-methylethyl)-,monohydrochloride. M.Wt: 491.07. Molecular formula: C27H38N2O4 • HCl .
CAS Number
152-11-4.
DESCRIPTION
Verapamil hydrochloride is a white or practically white crystalline powder. It is practically odourless and has a bitter taste. It is soluble in water, freely soluble in chloroform, sparingly soluble in alcohol and practically insoluble in ether.
Verapamil hydrochloride injection is a sterile, nonpyrogenic solution containing verapamil hydrochloride 2.5 mg/mL (equivalent to 2.3 mg/mL verapamil) and sodium chloride 8.5 mg/mL in water for injection. The solution contains no bacteriostat or antimicrobial agent and is intended for single-dose intravenous administration. It may contain hydrochloric acid for pH adjustment; pH is 4.9 (4.0 to 6.5). Inactive ingredients in verapamil hydrochloride injection are sodium chloride and water for injections.
PHARMACOLOGY
Isoptin is a calcium ion influx inhibitor (slow channel blocker or calcium ion antagonist) which exerts its pharmacologic effects by modulating the influx of ionic calcium across the cell membrane of the arterial smooth muscle as well as in conductile and contractile myocardial cells.
Pharmacokinetics
Impaired renal function has no effect on verapamil hydrochloride pharmacokinetics in patients with end-stage renal failure and subjects with healthy kidneys.
CLINICAL DATA
Verapamil has a pronounced antiarrhythmic action particularly in supraventricular cardiac arrhythmias. It prolongs impulse conduction in the AV node and thereby depending on the type of arrhythmia restores the sinus rhythm and/or normalises the ventricular rate.
The calcium antagonist verapamil reduces myocardial oxygen consumption directly by intervening in the energy consuming metabolic processes of the myocardial cell and indirectly by diminishing the peripheral resistance (afterload).
The decrease of the vascular smooth muscle tone moreover prevents coronary spasms and lowers raised blood pressure.
INDICATIONS
- Tachycardias, such as paroxysmal supraventricular tachycardia, atrial fibrillation with rapid ventricular response, (except in WPW syndrome, see "PRECAUTIONS"), atrial flutter with rapid conduction, extrasystoles.
- For the prophylaxis and/or therapy of ectopic arrhythmias (predominantly ventricular extrasystoles) in halothane anaesthesia and in the application of adrenaline in halothane anaesthesia, respectively.
- Acute hypertension.
- Acute coronary insufficiency.
CONTRAINDICATIONS
- Cardiogenic shock (except for arrhythmia induced shock), complicated acute myocardial infarction (bradycardia, hypotension, left ventricular failure), second and third degree AV block, sick sinus syndrome (bradycardia-tachycardia syndrome), manifest heart failure.
- In the presence of first degree AV block, sinus bradycardia and hypotension the use of Isoptin should be given critical consideration. In acute coronary insufficiency intravenous administration is only admissible with careful indication and continuous monitoring of the patient. Where heart failure is present, full compensation with cardiac glycosides must be achieved before the administration of Isoptin.
- Patients with atrial flutter or atrial fibrillation and an accessory bypass tract (e.g Wolff-Parkinson-White, Lown-Ganong-Levine syndromes). These patients are at risk to develop ventricular tachyarrhythmia including ventricular fibrillation if verapamil is administered.
- Patients with ventricular tachycardia. Administration of intravenous verapamil to patients with wide-complex ventricular tachycardia (QRS > 0.12 sec) can result in marked haemodynamic deterioration and ventricular fibrillation. Proper diagnosis and differentiation from wide-complex supraventricular tachycardia is imperative in the emergency room setting.
- Severe hypotension
- Isoptin injection should not be administered intravenously to patients on betablockers (except in an intensive care setting).
- In patients with diminished hepatic function (parenchymal loss/reduced blood supply) the effect of Isoptin is intensified and prolonged depending on the severity of the
disease due to impaired drug metabolism. In these cases, dosage should be adjusted with special care.
- Concomitant administration of verapamil and ivabradine is contraindicated (see INTERACTIONS WITH OTHER MEDICINES).
- Known hypersensitivity to verapamil hydrochloride.
PRECAUTIONS
Verapamil should be given as a slow intravenous injection over at least 2 minutes under continuous ECG and blood pressure monitoring (see DOSAGE AND ADMINISTRATION).
Intravenous injection should only be given by the physician.
In atrial fibrillation and simultaneous WPW syndrome there is a risk of inducing ventricular fibrillation.
Hypotension
Severe hypotension has occasionally occurred following intravenous administration of the drug. On rare occasions this has been followed by a loss of consciousness. If severe hypotension develops, verapamil should be promptly discontinued and vasoconstrictor substances used.
In patients using antihypertensive drugs, the additional hypotensive effect should be taken into consideration.
Acute Myocardial Infarction:
Use with caution in patients with acute myocardial infarction complicated by bradycardia, marked hypotension, or left ventricular dysfunction
Ventricular Fibrillation
Intravenous administration may precipitate ventricular fibrillation. Patients with atrial flutter/fibrillation and an accessory AV pathway may develop increased antegrade conduction across the aberrant pathway bypassing the AV node, producing a very rapid ventricular response after receiving intravenous verapamil. Its use in these patients is contraindicated. (see CONTRAINDICATIONS).
Bradycardia/Asystole
Isoptin slows conduction across the AV node and rarely may produce second or third degree AV block, bradycardia and in extreme cases, asystole. This is more likely to occur in patients with a sick sinus syndrome (SA nodal disease). Asystole in patients other than those with sick sinus syndrome is usually of short duration (a few seconds or less), with spontaneous return to AV nodal or normal sinus rhythm. If this does not occur promptly, appropriate treatment should be initiated immediately (See Side Effects and Acute Cardiovascular Side Effects).
Heart Failure
Because of the drug's negative inotropic effect, verapamil should not be used in patients with poorly compensated congestive heart failure, unless the failure is complicated by or caused by an arrhythmia. If verapamil is used in such patients, they must be digitalized prior to treatment. Continuous monitoring is mandatory when intravenous verapamil is used in digitalized patients. It has been reported that digoxin plasma levels may increase with chronic oral administration.
Impaired Hepatic or Renal Function
Verapamil should be used with caution in patients with hepatic impairment. Although impaired renal function has been shown to have no effect on verapamil pharmacokinetics in patients with end-stage renal failure, verapamil should be used cautiously and with close monitoring in patients with impaired renal function. Verapamil cannot be removed by haemodialysis.
These patients should be monitored carefully for abnormal prolongation of the PR interval or other signs of excessive pharmacological effects.
Use in Patients with Impaired Neuromuscular Transmission
Verapamil should be used with caution in the presence of diseases in which neuromuscular transmission is affected (myasthenia gravis, Lambert-Eaton syndrome, advanced Duchenne muscular dystrophy).
Intravenous verapamil can precipitate respiratory muscle failure in patients with progressive muscular dystrophy and should, therefore, be used with caution.
Increased Intracranial Pressure
Intravenous verapamil has been seen to increase intracranial pressure in patients with supratentorial tumors at the time of anaesthesia induction. Caution should be taken and appropriate monitoring performed.
Sick Sinus Syndrome
Precaution should be taken when treating any supraventricular arrhythmia on an emergency basis as it may be caused by an undiagnosed Sick Sinus Syndrome (see CONTRAINDICATIONS).
Heart Block
Development of second or third degree AV block or unifascicular, bifascicular or trifascicular bundle branch block requires reduction in subsequent doses or discontinuation of verapamil and institution of appropriate therapy, if needed. (See Treatment of Acute Cardiovascular Side Effects).
Use in Pregnancy (Category C)
Verapamil carries the potential to produce fetal hypoxia associated with maternal hypotension.
Verapamil should not be administered intravenously during the first six months of pregnancy. There are no data on use in the first and second trimester. Verapamil should not be used in the final trimester unless the benefits clearly outweigh the risks.
Use in Lactation
Verapamil hydrochloride is excreted in human breast milk. There are currently no reports of verapamil injection or infusion use during breastfeeding. Due to the potential for serious adverse reactions in nursing infants, intravenous verapamil is not recommended during lactation.
Paediatric Use
There have been rare cases of severe haemodynamic events – some fatal – after intravenous administration of verapamil to neonates and infants. Intravenous verapamil should not be administered to this group of patients unless it is absolutely necessary and there is no alternative.
INTERACTIONS WITH OTHER MEDICINES
During the simultaneous administration of Isoptin and drugs with cardiodepressive action and/or inhibitory effect on AV conduction watch should be kept for additive effects. Above all Isoptin should not be administered intravenously without compelling reason if the patient is on -adrenergic blockers.
The concomitant administration of intravenous beta blockers and intravenous verapamil has resulted in serious adverse reactions, especially in patients with severe cardiomyopathy, congestive heart failure or recent myocardial infarction (see CONTRAINDICATIONS).
The additional hypotensive effect of Isoptin should be borne in mind particularly in patients on antihypertensive drugs.
Diuretics, Vasodilators
Potentiation of the antihypertensive effect.
Digoxin
Elevation of digoxin plasma levels because of diminished renal excretion. However since both drugs slow AV conduction, patients should be monitored for AV block or excessive bradycardia.
Quinidine
Enhanced blood pressure lowering is possible. Pulmonary oedema may occur in patients with hypertrophic obstructive cardiomyopathy. Elevation of quinidine plasma level.
Flecainide
May result in an additive negative inotropic effect and prolongation of atrioventricular conduction.
Disopyramide
Possible additive effects and impairment of left ventricular function. Pending further accumulation of data, disopyramide should be discontinued 48 hours prior to initiating verapamil therapy and should not be reinstituted until 24 hours after verapamil has been discontinued.
Ivabradine
Concomitant administration of verapamil and ivabradine is contraindicated. Ivabradine use in combination with verapamil is associated with increased plasma concentrations of ivabradine and additional heart rate lowering effects (see CONTRAINDICATIONS).
HMG-CoA Reductase Inhibitors
Treatment with HMG CoA reductase inhibitors (e.g., simvastatin or atorvastatin) in a patient taking verapamil should be started at the lowest possible dose and titrated upwards. If verapamil treatment is to be added to patients already taking an HMG CoA reductase inhibitor (e.g., simvastatin or atorvastatin) consider a reduction in the statin dose and retitrate against serum cholesterol concentrations.
Verapamil hydrochloride may increase the serum levels of HMG CoA reductase inhibitors primarily metabolised by CYP3A enzymes (e.g., atorvastatin and simvastatin). An interaction in healthy subjects demonstrated a 43% increase in verpamil AUC in combination with atorvastatin. Consider using caution when these HMG CoA reductase inhibitors and verapamil are concomitantly administered.
Fluvastatin, pravastatin and rosuvastatin are not metabolized by CYP3A4 and are less likely to interact with verapamil.
Inhalation Anaesthetics
Mutual potentiation of cardiovascular effects (higher-grade AV block, higher-grade lowering of heart rate, induction of heart failure, enhanced blood pressure lowering).
Carbamazepine
Potentiation of carbamazepine effect, enhanced neurotoxicity.
Cimetidine
Cimetidine reduces verapamil clearance following intravenous verapamil administration.
Lithium
Increased sensitivity to the effects of lithium (neurotoxicity) has been reported during concomitant verapamil hydrochloride-lithium therapy with either no change or an increase in serum lithium levels. The addition of verapamil hydrochloride, however, has also resulted in the lowering of the serum lithium levels in patients receiving chronic stable oral lithium. Patients receiving both drugs should be monitored carefully.
Phenytoin, Phenobarbital
Lowering of the plasma level and attenuation of the effects of verapamil.
Erythromycin, clarithromycin and telithromycin
Erythromycin, clarithromycin and telithromycin therapy may increase serum levels of verapamil.
Rifampicin
Blood pressure lowering effect may be reduced.
Sulfinpyrazone
Blood pressure lowering effect may be reduced.
Theophylline
Elevation of theophylline plasma levels.
Prazosin, Terazosin
Additive hypotensive effect.
HIV Antiviral Agents
Due to the metabolic inhibitory potential of some of the HIV antiviral agents, such as ritonavir, plasma concentrations of verapamil may increase. Caution should be used or the dose of verapamil may be decreased.
Cyclosporin
Elevation of cyclosporin plasma levels
Everolimus, sirolimus and tacrolimus.
Verapamil therapy may increase serum levels of everolimus, sirolimus and tacrolimus.
Buspirone
Verapamil therapy may increase plasma levels of buspirone
Midazolam
Elevation of midazolam
Muscle Relaxants
Possible potentiation by verapamil.
Protein Bound Drugs
As verapamil is highly protein bound, it should be administered with caution to patients receiving other highly protein bound drugs.
Dantrolene
Animal studies suggest that concomitant use of IV verapamil and IV dantrolene may result in cardiovascular collapse.
Aspirin
Increased tendency to bleed.
Ethanol (alcohol)
Delayed ethanol breakdown and elevation of ethanol plasma levels, resulting in enhancement of the alcoholic effect through verapamil.
Grapefruit Juice
Increase in verapamil serum level has been reported. Therefore grapefruit and its juice should not be taken with verapamil.
Doxorubicin
Caution should be used when oral vera
|
pamil is administered in combination with doxorubicin due to the potential for increased doxorubicin levels.
| 15,070
|
inside_word
|
verapamil
|
remove_all
|
<url>
http://www.medicines.org.au/files/gopisoin.pdf
</url>
<text>
PRODUCT INFORMATION ®
ISOPTIN INJECTION SOLUTION
NAME OF THE MEDICINE
Verapamil Hydrochloride
Chemical Structure
Chemical name: Benzeneacetonitrile, - [3-[[2-(3,4-dimethoxyphenyl) ethyl]methylamino] propyl]]-3,4-dimethoxy--(1-methylethyl)-,monohydrochloride. M.Wt: 491.07. Molecular formula: C27H38N2O4 • HCl .
CAS Number
152-11-4.
DESCRIPTION
Verapamil hydrochloride is a white or practically white crystalline powder. It is practically odourless and has a bitter taste. It is soluble in water, freely soluble in chloroform, sparingly soluble in alcohol and practically insoluble in ether.
Verapamil hydrochloride injection is a sterile, nonpyrogenic solution containing verapamil hydrochloride 2.5 mg/mL (equivalent to 2.3 mg/mL verapamil) and sodium chloride 8.5 mg/mL in water for injection. The solution contains no bacteriostat or antimicrobial agent and is intended for single-dose intravenous administration. It may contain hydrochloric acid for pH adjustment; pH is 4.9 (4.0 to 6.5). Inactive ingredients in verapamil hydrochloride injection are sodium chloride and water for injections.
PHARMACOLOGY
Isoptin is a calcium ion influx inhibitor (slow channel blocker or calcium ion antagonist) which exerts its pharmacologic effects by modulating the influx of ionic calcium across the cell membrane of the arterial smooth muscle as well as in conductile and contractile myocardial cells.
Pharmacokinetics
Impaired renal function has no effect on verapamil hydrochloride pharmacokinetics in patients with end-stage renal failure and subjects with healthy kidneys.
CLINICAL DATA
Verapamil has a pronounced antiarrhythmic action particularly in supraventricular cardiac arrhythmias. It prolongs impulse conduction in the AV node and thereby depending on the type of arrhythmia restores the sinus rhythm and/or normalises the ventricular rate.
The calcium antagonist verapamil reduces myocardial oxygen consumption directly by intervening in the energy consuming metabolic processes of the myocardial cell and indirectly by diminishing the peripheral resistance (afterload).
The decrease of the vascular smooth muscle tone moreover prevents coronary spasms and lowers raised blood pressure.
INDICATIONS
- Tachycardias, such as paroxysmal supraventricular tachycardia, atrial fibrillation with rapid ventricular response, (except in WPW syndrome, see "PRECAUTIONS"), atrial flutter with rapid conduction, extrasystoles.
- For the prophylaxis and/or therapy of ectopic arrhythmias (predominantly ventricular extrasystoles) in halothane anaesthesia and in the application of adrenaline in halothane anaesthesia, respectively.
- Acute hypertension.
- Acute coronary insufficiency.
CONTRAINDICATIONS
- Cardiogenic shock (except for arrhythmia induced shock), complicated acute myocardial infarction (bradycardia, hypotension, left ventricular failure), second and third degree AV block, sick sinus syndrome (bradycardia-tachycardia syndrome), manifest heart failure.
- In the presence of first degree AV block, sinus bradycardia and hypotension the use of Isoptin should be given critical consideration. In acute coronary insufficiency intravenous administration is only admissible with careful indication and continuous monitoring of the patient. Where heart failure is present, full compensation with cardiac glycosides must be achieved before the administration of Isoptin.
- Patients with atrial flutter or atrial fibrillation and an accessory bypass tract (e.g Wolff-Parkinson-White, Lown-Ganong-Levine syndromes). These patients are at risk to develop ventricular tachyarrhythmia including ventricular fibrillation if verapamil is administered.
- Patients with ventricular tachycardia. Administration of intravenous verapamil to patients with wide-complex ventricular tachycardia (QRS > 0.12 sec) can result in marked haemodynamic deterioration and ventricular fibrillation. Proper diagnosis and differentiation from wide-complex supraventricular tachycardia is imperative in the emergency room setting.
- Severe hypotension
- Isoptin injection should not be administered intravenously to patients on betablockers (except in an intensive care setting).
- In patients with diminished hepatic function (parenchymal loss/reduced blood supply) the effect of Isoptin is intensified and prolonged depending on the severity of the
disease due to impaired drug metabolism. In these cases, dosage should be adjusted with special care.
- Concomitant administration of verapamil and ivabradine is contraindicated (see INTERACTIONS WITH OTHER MEDICINES).
- Known hypersensitivity to verapamil hydrochloride.
PRECAUTIONS
Verapamil should be given as a slow intravenous injection over at least 2 minutes under continuous ECG and blood pressure monitoring (see DOSAGE AND ADMINISTRATION).
Intravenous injection should only be given by the physician.
In atrial fibrillation and simultaneous WPW syndrome there is a risk of inducing ventricular fibrillation.
Hypotension
Severe hypotension has occasionally occurred following intravenous administration of the drug. On rare occasions this has been followed by a loss of consciousness. If severe hypotension develops, verapamil should be promptly discontinued and vasoconstrictor substances used.
In patients using antihypertensive drugs, the additional hypotensive effect should be taken into consideration.
Acute Myocardial Infarction:
Use with caution in patients with acute myocardial infarction complicated by bradycardia, marked hypotension, or left ventricular dysfunction
Ventricular Fibrillation
Intravenous administration may precipitate ventricular fibrillation. Patients with atrial flutter/fibrillation and an accessory AV pathway may develop increased antegrade conduction across the aberrant pathway bypassing the AV node, producing a very rapid ventricular response after receiving intravenous verapamil. Its use in these patients is contraindicated. (see CONTRAINDICATIONS).
Bradycardia/Asystole
Isoptin slows conduction across the AV node and rarely may produce second or third degree AV block, bradycardia and in extreme cases, asystole. This is more likely to occur in patients with a sick sinus syndrome (SA nodal disease). Asystole in patients other than those with sick sinus syndrome is usually of short duration (a few seconds or less), with spontaneous return to AV nodal or normal sinus rhythm. If this does not occur promptly, appropriate treatment should be initiated immediately (See Side Effects and Acute Cardiovascular Side Effects).
Heart Failure
Because of the drug's negative inotropic effect, verapamil should not be used in patients with poorly compensated congestive heart failure, unless the failure is complicated by or caused by an arrhythmia. If verapamil is used in such patients, they must be digitalized prior to treatment. Continuous monitoring is mandatory when intravenous verapamil is used in digitalized patients. It has been reported that digoxin plasma levels may increase with chronic oral administration.
Impaired Hepatic or Renal Function
Verapamil should be used with caution in patients with hepatic impairment. Although impaired renal function has been shown to have no effect on verapamil pharmacokinetics in patients with end-stage renal failure, verapamil should be used cautiously and with close monitoring in patients with impaired renal function. Verapamil cannot be removed by haemodialysis.
These patients should be monitored carefully for abnormal prolongation of the PR interval or other signs of excessive pharmacological effects.
Use in Patients with Impaired Neuromuscular Transmission
Verapamil should be used with caution in the presence of diseases in which neuromuscular transmission is affected (myasthenia gravis, Lambert-Eaton syndrome, advanced Duchenne muscular dystrophy).
Intravenous verapamil can precipitate respiratory muscle failure in patients with progressive muscular dystrophy and should, therefore, be used with caution.
Increased Intracranial Pressure
Intravenous verapamil has been seen to increase intracranial pressure in patients with supratentorial tumors at the time of anaesthesia induction. Caution should be taken and appropriate monitoring performed.
Sick Sinus Syndrome
Precaution should be taken when treating any supraventricular arrhythmia on an emergency basis as it may be caused by an undiagnosed Sick Sinus Syndrome (see CONTRAINDICATIONS).
Heart Block
Development of second or third degree AV block or unifascicular, bifascicular or trifascicular bundle branch block requires reduction in subsequent doses or discontinuation of verapamil and institution of appropriate therapy, if needed. (See Treatment of Acute Cardiovascular Side Effects).
Use in Pregnancy (Category C)
Verapamil carries the potential to produce fetal hypoxia associated with maternal hypotension.
Verapamil should not be administered intravenously during the first six months of pregnancy. There are no data on use in the first and second trimester. Verapamil should not be used in the final trimester unless the benefits clearly outweigh the risks.
Use in Lactation
Verapamil hydrochloride is excreted in human breast milk. There are currently no reports of verapamil injection or infusion use during breastfeeding. Due to the potential for serious adverse reactions in nursing infants, intravenous verapamil is not recommended during lactation.
Paediatric Use
There have been rare cases of severe haemodynamic events – some fatal – after intravenous administration of verapamil to neonates and infants. Intravenous verapamil should not be administered to this group of patients unless it is absolutely necessary and there is no alternative.
INTERACTIONS WITH OTHER MEDICINES
During the simultaneous administration of Isoptin and drugs with cardiodepressive action and/or inhibitory effect on AV conduction watch should be kept for additive effects. Above all Isoptin should not be administered intravenously without compelling reason if the patient is on -adrenergic blockers.
The concomitant administration of intravenous beta blockers and intravenous verapamil has resulted in serious adverse reactions, especially in patients with severe cardiomyopathy, congestive heart failure or recent myocardial infarction (see CONTRAINDICATIONS).
The additional hypotensive effect of Isoptin should be borne in mind particularly in patients on antihypertensive drugs.
Diuretics, Vasodilators
Potentiation of the antihypertensive effect.
Digoxin
Elevation of digoxin plasma levels because of diminished renal excretion. However since both drugs slow AV conduction, patients should be monitored for AV block or excessive bradycardia.
Quinidine
Enhanced blood pressure lowering is possible. Pulmonary oedema may occur in patients with hypertrophic obstructive cardiomyopathy. Elevation of quinidine plasma level.
Flecainide
May result in an additive negative inotropic effect and prolongation of atrioventricular conduction.
Disopyramide
Possible additive effects and impairment of left ventricular function. Pending further accumulation of data, disopyramide should be discontinued 48 hours prior to initiating verapamil therapy and should not be reinstituted until 24 hours after verapamil has been discontinued.
Ivabradine
Concomitant administration of verapamil and ivabradine is contraindicated. Ivabradine use in combination with verapamil is associated with increased plasma concentrations of ivabradine and additional heart rate lowering effects (see CONTRAINDICATIONS).
HMG-CoA Reductase Inhibitors
Treatment with HMG CoA reductase inhibitors (e.g., simvastatin or atorvastatin) in a patient taking verapamil should be started at the lowest possible dose and titrated upwards. If verapamil treatment is to be added to patients already taking an HMG CoA reductase inhibitor (e.g., simvastatin or atorvastatin) consider a reduction in the statin dose and retitrate against serum cholesterol concentrations.
Verapamil hydrochloride may increase the serum levels of HMG CoA reductase inhibitors primarily metabolised by CYP3A enzymes (e.g., atorvastatin and simvastatin). An interaction in healthy subjects demonstrated a 43% increase in verpamil AUC in combination with atorvastatin. Consider using caution when these HMG CoA reductase inhibitors and verapamil are concomitantly administered.
Fluvastatin, pravastatin and rosuvastatin are not metabolized by CYP3A4 and are less likely to interact with verapamil.
Inhalation Anaesthetics
Mutual potentiation of cardiovascular effects (higher-grade AV block, higher-grade lowering of heart rate, induction of heart failure, enhanced blood pressure lowering).
Carbamazepine
Potentiation of carbamazepine effect, enhanced neurotoxicity.
Cimetidine
Cimetidine reduces verapamil clearance following intravenous verapamil administration.
Lithium
Increased sensitivity to the effects of lithium (neurotoxicity) has been reported during concomitant verapamil hydrochloride-lithium therapy with either no change or an increase in serum lithium levels. The addition of verapamil hydrochloride, however, has also resulted in the lowering of the serum lithium levels in patients receiving chronic stable oral lithium. Patients receiving both drugs should be monitored carefully.
Phenytoin, Phenobarbital
Lowering of the plasma level and attenuation of the effects of verapamil.
Erythromycin, clarithromycin and telithromycin
Erythromycin, clarithromycin and telithromycin therapy may increase serum levels of verapamil.
Rifampicin
Blood pressure lowering effect may be reduced.
Sulfinpyrazone
Blood pressure lowering effect may be reduced.
Theophylline
Elevation of theophylline plasma levels.
Prazosin, Terazosin
Additive hypotensive effect.
HIV Antiviral Agents
Due to the metabolic inhibitory potential of some of the HIV antiviral agents, such as ritonavir, plasma concentrations of verapamil may increase. Caution should be used or the dose of verapamil may be decreased.
Cyclosporin
Elevation of cyclosporin plasma levels
Everolimus, sirolimus and tacrolimus.
Verapamil therapy may increase serum levels of everolimus, sirolimus and tacrolimus.
Buspirone
Verapamil therapy may increase plasma levels of buspirone
Midazolam
Elevation of midazolam
Muscle Relaxants
Possible potentiation by verapamil.
Protein Bound Drugs
As verapamil is highly protein bound, it should be administered with caution to patients receiving other highly protein bound drugs.
Dantrolene
Animal studies suggest that concomitant use of IV verapamil and IV dantrolene may result in cardiovascular collapse.
Aspirin
Increased tendency to bleed.
Ethanol (alcohol)
Delayed ethanol breakdown and elevation of ethanol plasma levels, resulting in enhancement of the alcoholic effect through verapamil.
Grapefruit Juice
Increase in verapamil serum level has been reported. Therefore grapefruit and its juice should not be taken with verapamil.
Doxorubicin
Caution should be used when oral vera<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttp://www.medicines.org.au/files/gopisoin.pdf\n</url>\n<text>\nPRODUCT INFORMATION ®\n\nISOPTIN INJECTION SOLUTION\n\nNAME OF THE MEDICINE\n\nVerapamil Hydrochloride\n\nChemical Structure\n\nChemical name: Benzeneacetonitrile, - [3-[[2-(3,4-dimethoxyphenyl) ethyl]methylamino] propyl]]-3,4-dimethoxy--(1-methylethyl)-,monohydrochloride. M.Wt: 491.07. Molecular formula: C27H38N2O4 • HCl .\n\nCAS Number\n\n152-11-4.\n\nDESCRIPTION\n\nVerapamil hydrochloride is a white or practically white crystalline powder. It is practically odourless and has a bitter taste. It is soluble in water, freely soluble in chloroform, sparingly soluble in alcohol and practically insoluble in ether.\n\nVerapamil hydrochloride injection is a sterile, nonpyrogenic solution containing verapamil hydrochloride 2.5 mg/mL (equivalent to 2.3 mg/mL verapamil) and sodium chloride 8.5 mg/mL in water for injection. The solution contains no bacteriostat or antimicrobial agent and is intended for single-dose intravenous administration. It may contain hydrochloric acid for pH adjustment; pH is 4.9 (4.0 to 6.5). Inactive ingredients in verapamil hydrochloride injection are sodium chloride and water for injections.\n\nPHARMACOLOGY\n\nIsoptin is a calcium ion influx inhibitor (slow channel blocker or calcium ion antagonist) which exerts its pharmacologic effects by modulating the influx of ionic calcium across the cell membrane of the arterial smooth muscle as well as in conductile and contractile myocardial cells.\n\nPharmacokinetics\n\nImpaired renal function has no effect on verapamil hydrochloride pharmacokinetics in patients with end-stage renal failure and subjects with healthy kidneys.\n\nCLINICAL DATA\n\nVerapamil has a pronounced antiarrhythmic action particularly in supraventricular cardiac arrhythmias. It prolongs impulse conduction in the AV node and thereby depending on the type of arrhythmia restores the sinus rhythm and/or normalises the ventricular rate.\n\nThe calcium antagonist verapamil reduces myocardial oxygen consumption directly by intervening in the energy consuming metabolic processes of the myocardial cell and indirectly by diminishing the peripheral resistance (afterload).\n\nThe decrease of the vascular smooth muscle tone moreover prevents coronary spasms and lowers raised blood pressure.\n\nINDICATIONS\n\n- Tachycardias, such as paroxysmal supraventricular tachycardia, atrial fibrillation with rapid ventricular response, (except in WPW syndrome, see \"PRECAUTIONS\"), atrial flutter with rapid conduction, extrasystoles.\n- For the prophylaxis and/or therapy of ectopic arrhythmias (predominantly ventricular extrasystoles) in halothane anaesthesia and in the application of adrenaline in halothane anaesthesia, respectively.\n- Acute hypertension.\n- Acute coronary insufficiency.\n\nCONTRAINDICATIONS\n\n- Cardiogenic shock (except for arrhythmia induced shock), complicated acute myocardial infarction (bradycardia, hypotension, left ventricular failure), second and third degree AV block, sick sinus syndrome (bradycardia-tachycardia syndrome), manifest heart failure.\n- In the presence of first degree AV block, sinus bradycardia and hypotension the use of Isoptin should be given critical consideration. In acute coronary insufficiency intravenous administration is only admissible with careful indication and continuous monitoring of the patient. Where heart failure is present, full compensation with cardiac glycosides must be achieved before the administration of Isoptin.\n- Patients with atrial flutter or atrial fibrillation and an accessory bypass tract (e.g Wolff-Parkinson-White, Lown-Ganong-Levine syndromes). These patients are at risk to develop ventricular tachyarrhythmia including ventricular fibrillation if verapamil is administered.\n- Patients with ventricular tachycardia. Administration of intravenous verapamil to patients with wide-complex ventricular tachycardia (QRS > 0.12 sec) can result in marked haemodynamic deterioration and ventricular fibrillation. Proper diagnosis and differentiation from wide-complex supraventricular tachycardia is imperative in the emergency room setting.\n- Severe hypotension\n- Isoptin injection should not be administered intravenously to patients on betablockers (except in an intensive care setting).\n- In patients with diminished hepatic function (parenchymal loss/reduced blood supply) the effect of Isoptin is intensified and prolonged depending on the severity of the\n\ndisease due to impaired drug metabolism. In these cases, dosage should be adjusted with special care.\n\n- Concomitant administration of verapamil and ivabradine is contraindicated (see INTERACTIONS WITH OTHER MEDICINES).\n- Known hypersensitivity to verapamil hydrochloride.\n\nPRECAUTIONS\n\nVerapamil should be given as a slow intravenous injection over at least 2 minutes under continuous ECG and blood pressure monitoring (see DOSAGE AND ADMINISTRATION).\n\nIntravenous injection should only be given by the physician.\n\nIn atrial fibrillation and simultaneous WPW syndrome there is a risk of inducing ventricular fibrillation.\n\nHypotension\n\nSevere hypotension has occasionally occurred following intravenous administration of the drug. On rare occasions this has been followed by a loss of consciousness. If severe hypotension develops, verapamil should be promptly discontinued and vasoconstrictor substances used.\n\nIn patients using antihypertensive drugs, the additional hypotensive effect should be taken into consideration.\n\nAcute Myocardial Infarction:\n\nUse with caution in patients with acute myocardial infarction complicated by bradycardia, marked hypotension, or left ventricular dysfunction\n\nVentricular Fibrillation\n\nIntravenous administration may precipitate ventricular fibrillation. Patients with atrial flutter/fibrillation and an accessory AV pathway may develop increased antegrade conduction across the aberrant pathway bypassing the AV node, producing a very rapid ventricular response after receiving intravenous verapamil. Its use in these patients is contraindicated. (see CONTRAINDICATIONS).\n\nBradycardia/Asystole\n\nIsoptin slows conduction across the AV node and rarely may produce second or third degree AV block, bradycardia and in extreme cases, asystole. This is more likely to occur in patients with a sick sinus syndrome (SA nodal disease). Asystole in patients other than those with sick sinus syndrome is usually of short duration (a few seconds or less), with spontaneous return to AV nodal or normal sinus rhythm. If this does not occur promptly, appropriate treatment should be initiated immediately (See Side Effects and Acute Cardiovascular Side Effects).\n\nHeart Failure\n\nBecause of the drug's negative inotropic effect, verapamil should not be used in patients with poorly compensated congestive heart failure, unless the failure is complicated by or caused by an arrhythmia. If verapamil is used in such patients, they must be digitalized prior to treatment. Continuous monitoring is mandatory when intravenous verapamil is used in digitalized patients. It has been reported that digoxin plasma levels may increase with chronic oral administration.\n\nImpaired Hepatic or Renal Function\n\nVerapamil should be used with caution in patients with hepatic impairment. Although impaired renal function has been shown to have no effect on verapamil pharmacokinetics in patients with end-stage renal failure, verapamil should be used cautiously and with close monitoring in patients with impaired renal function. Verapamil cannot be removed by haemodialysis.\n\nThese patients should be monitored carefully for abnormal prolongation of the PR interval or other signs of excessive pharmacological effects.\n\nUse in Patients with Impaired Neuromuscular Transmission\n\nVerapamil should be used with caution in the presence of diseases in which neuromuscular transmission is affected (myasthenia gravis, Lambert-Eaton syndrome, advanced Duchenne muscular dystrophy).\n\nIntravenous verapamil can precipitate respiratory muscle failure in patients with progressive muscular dystrophy and should, therefore, be used with caution.\n\nIncreased Intracranial Pressure\n\nIntravenous verapamil has been seen to increase intracranial pressure in patients with supratentorial tumors at the time of anaesthesia induction. Caution should be taken and appropriate monitoring performed.\n\nSick Sinus Syndrome\n\nPrecaution should be taken when treating any supraventricular arrhythmia on an emergency basis as it may be caused by an undiagnosed Sick Sinus Syndrome (see CONTRAINDICATIONS).\n\nHeart Block\n\nDevelopment of second or third degree AV block or unifascicular, bifascicular or trifascicular bundle branch block requires reduction in subsequent doses or discontinuation of verapamil and institution of appropriate therapy, if needed. (See Treatment of Acute Cardiovascular Side Effects).\n\nUse in Pregnancy (Category C)\n\nVerapamil carries the potential to produce fetal hypoxia associated with maternal hypotension.\n\nVerapamil should not be administered intravenously during the first six months of pregnancy. There are no data on use in the first and second trimester. Verapamil should not be used in the final trimester unless the benefits clearly outweigh the risks.\n\nUse in Lactation\n\nVerapamil hydrochloride is excreted in human breast milk. There are currently no reports of verapamil injection or infusion use during breastfeeding. Due to the potential for serious adverse reactions in nursing infants, intravenous verapamil is not recommended during lactation.\n\nPaediatric Use\n\nThere have been rare cases of severe haemodynamic events – some fatal – after intravenous administration of verapamil to neonates and infants. Intravenous verapamil should not be administered to this group of patients unless it is absolutely necessary and there is no alternative.\n\nINTERACTIONS WITH OTHER MEDICINES\n\nDuring the simultaneous administration of Isoptin and drugs with cardiodepressive action and/or inhibitory effect on AV conduction watch should be kept for additive effects. Above all Isoptin should not be administered intravenously without compelling reason if the patient is on -adrenergic blockers.\n\nThe concomitant administration of intravenous beta blockers and intravenous verapamil has resulted in serious adverse reactions, especially in patients with severe cardiomyopathy, congestive heart failure or recent myocardial infarction (see CONTRAINDICATIONS).\n\nThe additional hypotensive effect of Isoptin should be borne in mind particularly in patients on antihypertensive drugs.\n\nDiuretics, Vasodilators\n\nPotentiation of the antihypertensive effect.\n\nDigoxin\n\nElevation of digoxin plasma levels because of diminished renal excretion. However since both drugs slow AV conduction, patients should be monitored for AV block or excessive bradycardia.\n\nQuinidine\n\nEnhanced blood pressure lowering is possible. Pulmonary oedema may occur in patients with hypertrophic obstructive cardiomyopathy. Elevation of quinidine plasma level.\n\nFlecainide\n\nMay result in an additive negative inotropic effect and prolongation of atrioventricular conduction.\n\nDisopyramide\n\nPossible additive effects and impairment of left ventricular function. Pending further accumulation of data, disopyramide should be discontinued 48 hours prior to initiating verapamil therapy and should not be reinstituted until 24 hours after verapamil has been discontinued.\n\nIvabradine\n\nConcomitant administration of verapamil and ivabradine is contraindicated. Ivabradine use in combination with verapamil is associated with increased plasma concentrations of ivabradine and additional heart rate lowering effects (see CONTRAINDICATIONS).\n\nHMG-CoA Reductase Inhibitors\n\nTreatment with HMG CoA reductase inhibitors (e.g., simvastatin or atorvastatin) in a patient taking verapamil should be started at the lowest possible dose and titrated upwards. If verapamil treatment is to be added to patients already taking an HMG CoA reductase inhibitor (e.g., simvastatin or atorvastatin) consider a reduction in the statin dose and retitrate against serum cholesterol concentrations.\n\nVerapamil hydrochloride may increase the serum levels of HMG CoA reductase inhibitors primarily metabolised by CYP3A enzymes (e.g., atorvastatin and simvastatin). An interaction in healthy subjects demonstrated a 43% increase in verpamil AUC in combination with atorvastatin. Consider using caution when these HMG CoA reductase inhibitors and verapamil are concomitantly administered.\n\nFluvastatin, pravastatin and rosuvastatin are not metabolized by CYP3A4 and are less likely to interact with verapamil.\n\nInhalation Anaesthetics\n\nMutual potentiation of cardiovascular effects (higher-grade AV block, higher-grade lowering of heart rate, induction of heart failure, enhanced blood pressure lowering).\n\nCarbamazepine\n\nPotentiation of carbamazepine effect, enhanced neurotoxicity.\n\nCimetidine\n\nCimetidine reduces verapamil clearance following intravenous verapamil administration.\n\nLithium\n\nIncreased sensitivity to the effects of lithium (neurotoxicity) has been reported during concomitant verapamil hydrochloride-lithium therapy with either no change or an increase in serum lithium levels. The addition of verapamil hydrochloride, however, has also resulted in the lowering of the serum lithium levels in patients receiving chronic stable oral lithium. Patients receiving both drugs should be monitored carefully.\n\nPhenytoin, Phenobarbital\n\nLowering of the plasma level and attenuation of the effects of verapamil.\n\nErythromycin, clarithromycin and telithromycin\n\nErythromycin, clarithromycin and telithromycin therapy may increase serum levels of verapamil.\n\nRifampicin\n\nBlood pressure lowering effect may be reduced.\n\nSulfinpyrazone\n\nBlood pressure lowering effect may be reduced.\n\nTheophylline\n\nElevation of theophylline plasma levels.\n\nPrazosin, Terazosin\n\nAdditive hypotensive effect.\n\nHIV Antiviral Agents\n\nDue to the metabolic inhibitory potential of some of the HIV antiviral agents, such as ritonavir, plasma concentrations of verapamil may increase. Caution should be used or the dose of verapamil may be decreased.\n\nCyclosporin\n\nElevation of cyclosporin plasma levels\n\nEverolimus, sirolimus and tacrolimus.\n\nVerapamil therapy may increase serum levels of everolimus, sirolimus and tacrolimus.\n\nBuspirone\n\nVerapamil therapy may increase plasma levels of buspirone\n\nMidazolam\n\nElevation of midazolam\n\nMuscle Relaxants\n\nPossible potentiation by verapamil.\n\nProtein Bound Drugs\n\nAs verapamil is highly protein bound, it should be administered with caution to patients receiving other highly protein bound drugs.\n\nDantrolene\n\nAnimal studies suggest that concomitant use of IV verapamil and IV dantrolene may result in cardiovascular collapse.\n\nAspirin\n\nIncreased tendency to bleed.\n\nEthanol (alcohol)\n\nDelayed ethanol breakdown and elevation of ethanol plasma levels, resulting in enhancement of the alcoholic effect through verapamil.\n\nGrapefruit Juice\n\nIncrease in verapamil serum level has been reported. Therefore grapefruit and its juice should not be taken with verapamil.\n\nDoxorubicin\n\nCaution should be used when oral vera<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "pamil is administered in combination with doxorubicin due to the potential for increased doxorubicin levels.",
"role": "assistant"
}
] |
|
QUARTERLY ECONOMIC REVIEW
SUMMARY AND CONCLUSIONS
(1) Although it tended to lose some momentum during the second quarter of 1962, the current economic upswing would appear to have regained its stride during the third quarter and to have continued into the fourth quarter.
(2) The main expansionist factors during recent months have been increases in private consumption and, to a lesser extent, in private fixed investment. These two important components of total expenditure on locally produced and imported goods and services have taken over the expansionist role played during the earlier stages of the revival by merchandise exports and current Government expenditures. Merchandise exports have declined slightly during recent months, while current Government outlays have been increasing at a considerably slower rate. The gold output, however, has continued its steady upward course.
(3) With merchandise exports no longer increasing and imports moving upwards as a result of increasing private consumption and investment spending, the current surplus on the balance of payments declined considerably during the third quarter of this year from the record level attained during the preceding quarter. But despite a further moderate net outflow of capital, the overall balance of payments still showed a substantial surplus, so that the official gold and foreign exchange reserves continued to increase. Similar tendencies prevailed during October.
(4) The monetary and banking situation continued to be characterised by an abnormally high degree of liquidity and short-term interest rates declined further. The Bank Rate was lowered from 4 to $3\frac{1}{2}$ per cent on the 27th November.
(5) In the capital market most kinds of long-term funds remained readily available and the prices of gilt-edged securities as well as mining, financial, industrial and commercial shares showed a substantial further increase.
(6) Despite the increase in consumption and private capital outlays and the existence of a record supply of money and near-money in the economy, there has thus far been no indication of general demand inflation or aggregate overspending.
NATIONAL ACCOUNTS
Gross National Product
After tending to slow down somewhat during the second quarter of 1962, the gross national product increased at a noticeably faster rate during the third quarter, i.e. after adjustment for seasonal changes.
Expenditure Tendencies
The main reason for the improvement during the third quarter would appear to have been a further increase in private consumption to a level well above the relatively low figure registered during the third quarter of the preceding year. Outlays on durable consumer goods, in particular, showed a marked increase.
A further stimulus was provided by an increase in gross domestic fixed investment to a level somewhat higher than that of the third quarter of last year. This was mainly attributable to an increase in fixed capital outlays by private enterprises; fixed investment by public authorities and public corporations showed little change. As during the second quarter, fixed investment by private manufacturing enterprises was again well above the level reached during the corresponding quarter of 1961.
These increases in private consumption and fixed investment occurred at an opportune time, since merchandise exports, which had been a major expansionist factor during the earlier stages of the revival but which had tended to level off during the first half of 1962, declined somewhat during the third quarter. Similarly, current expenditure by the Government and other public authorities, which had earlier also played an important role in bringing about a revival in economic activity, did not maintain its rate of increase during the third quarter, i.e. after allowance for seasonal movements. The gold production, however, continued to increase steadily and to exercise favourable primary and secondary effects on the economy.
Investment in inventories did not materially affect the level of activity during the third quarter. A decline in industrial stocks would appear to have been more or less offset by an increase in commercial inventories (including agricultural stocks), i.e. after allowance for the usual seasonal changes.
As a result of the increase in total domestic spending during the third quarter, the demand for imports of goods and services began to rise strongly from the relatively low level at which it had remained for more than a year, and this, as will be set out in more detail later on, helped to bring about a marked reduction in the large surplus on the current account of the balance of payments.
Saving
If allowance is made for seasonal changes, gross domestic saving decreased somewhat during the third quarter of 1962. This was largely attributable to a decline in personal saving, which, in turn, represented the counterpart of the upward movement in private consumption referred to above. Nevertheless, total saving is still estimated to have been higher than during the corresponding quarters of the two previous years.
EMPLOYMENT
Employment as a whole would appear to have continued to increase during the third quarter of this year. The number of registered unemployed Whites, Coloureds and Asiatics, for example, declined further to 23,000 at the end of October, compared with the peak of 34,000 at the end of February, 1962. In addition, the available employment indices, after adjustment for seasonal changes, indicate some increase in employment in both private manufacturing and mining; a slight decline appears to have occurred in employment in construction.
PRICES
The index of wholesale prices (1953=100) increased slightly from 110.7 in June to 111.7 in October. The consumer price index likewise continued to edge upwards, although at a slower rate than during the second quarter, and reached 121.4 in October, compared with 121.2 in June.
Although the emergence of certain "bottlenecks" may have contributed to some price increases, this slight further upward movement in the price level would not appear to have been caused by an excessive increase in the total demand for South African goods and services, but rather by such factors as increases in money wages, tariffs and railway rates. In other words, such moderate "inflation" as there has been during recent months, would appear to have been more of the "cost-push" than the "demand-pull" variety.
OTHER ECONOMIC INDICATORS
The movements of most other seasonally adjusted economic indicators point to a continuing improvement in general economic activity during the third quarter of 1962. Bank debits, for example, increased substantially after the middle of the year, although it showed wide fluctuations from month to month. The indices for building plans passed and real estate transactions likewise attained considerably higher levels during the third quarter than during the second quarter.
Although railway earnings and retail sales did not increase further during the third quarter, they remained relatively high.
BALANCE OF PAYMENTS
Current Account
The surplus on the current account of the balance of payments declined substantially during the third quarter of 1962 to a total of approximately R58 million, compared with R75 million and R106 million during the first and second quarters, respectively. The decrease of R48 million between the second and third quarters was mainly the result of an increase of about R13 million in imports and a decrease of about R36 million in merchandise exports. The net gold output decreased by about R5 million,\(^1\) while net invisible payments to the rest of the world likewise registered a small decline.
Nevertheless, after correction for seasonal movements, the surplus on current account during the third quarter was still equivalent to an annual rate of well over R200 million.
Private Capital Movements
It is provisionally estimated that there was a net outflow of private capital of about R26 million during the third quarter. Of this total, R14 million was accounted for by net sales of listed South African securities by foreigners.\(^2\) Part of these sales represented transactions entered into under the two exchange control relaxation schemes introduced during the course of this year, namely the permit scheme, in terms of which brokers may purchase in London, for approved local institutions, scrip which is short
\(^1\) As mentioned earlier, the actual gold production continued to increase during the third quarter. But for balance of payments purposes, use is made of the concept "net gold output", which in practice is roughly equivalent to the value of the gold purchased by the Reserve Bank from the mines during the period concerned, and which may at times differ somewhat from the value of the actual gold production. More details concerning this discrepancy can be found in Table XXXIV.
\(^2\) The following table shows the purchases and sales by South African residents from and to foreigners of securities listed on the Johannesburg Stock Exchange, as reported by stockbrokers (unadjusted for nominee and direct transactions):
| Month | Purchases by S.A. Residents | Sales by S.A. Residents | Net Purchases |
|-------|-----------------------------|-------------------------|---------------|
| 1962 | | | |
| January | — — — | 1.9 | 1.5 | 0.4 |
| February | — — — | 2.6 | 2.4 | 0.2 |
| March | — — — | 3.0 | 2.3 | 0.7 |
| April | — — — | 2.3 | 1.5 | 0.8 |
| May | — — — | 5.5 | 3.8 | 1.7 |
| June | — — — | 5.7 | 4.4 | 1.3 |
| July | — — — | 7.0 | 4.1 | 2.9 |
| August | — — — | 6.3 | 4.2 | 2.1 |
| Sept. (provisional) | — — — | 6.9 | 2.7 | 4.2 |
| Oct. (provisional) | — — — | 6.0 | 2.2 | 3.8 |
BALANCE OF PAYMENTS ON CURRENT ACCOUNT
Seasonally adjusted annual rate.
IMPORTS
EXPORTS (EXCLUDING GOLD)
Seasonally adjusted annual rate.
Three months moving average.
Developments during October
During October imports increased more than seasonally to R97 million, while exports showed little change and amounted to R79 million. This resulted in a trade deficit of about R18 million. But after taking into account the net gold output of R57 million and net invisible foreign payments, the balance of payments on current account still showed a considerable surplus.
On capital account, the limited information available at this stage points to a small net outflow of private as well as official and banking capital during October.
As a result of all these transactions, the gold and foreign exchange holdings of the Reserve Bank, the Government and the commercial banks increased further by about R18 million to a total of R491 million at the end of October.
MONETARY AND BANKING SITUATION
Supply of Money and "Near-Money"
An exceptionally high degree of liquidity continued to prevail in the South African economy throughout the third quarter and October of this year. Indeed, mainly as a result of the continuing surplus on the overall balance of payments, the seasonally adjusted total of money and "near-money" increased further from R1,772 million at the end of June, 1962, to a new record of R1,843 million at the end of October, 1962.
Commercial Banks
In these circumstances, the cash, money at call and investments of the commercial banks increased further from R537 million at the end of June, 1962, to R676 million at the end of October. During this period their discounts and advances declined from R744 million to R710 million. The result was that the ratio of their liquid assets to their liabilities to the public increased further from 47.8 to no less than 53.3 per cent.
If allowance is made for seasonal movements, however, the banks' discounts and advances (excluding those made to the Land Bank) tended to move upwards from the relatively low level reached by the middle of the year.
Building Societies
The building societies continued to be able to meet all reasonable demands made on them for housing loans. Their total share capital increased from R689 million at the end of June, 1962, to R718 million at the end of October, while their deposits rose from R612 million to R632 million. During the same period, their total mortgage advances outstanding increased from R1,079 million to R1,093 million.
Merchant Banks
The total deposits of merchant banks increased from R49 million at the end of June, 1962, to R53 million at the end of August, before declining to R48 million at the end of October, while their acceptances decreased from R48 million to R44 million over this period.
National Finance Corporation and Discount Houses
In view of the continued increase in the liquidity of the economy as a whole and of banking institutions in particular, the National Finance Corporation experienced a further upward movement in its deposits from R183 mil-
---
3) Other liquid assets held by the private sector with the banking sector (in the form of interest-bearing deposits) and with the Government sector (in the form of Treasury bills and Tax Redemption Certificates).
lion at the end of June, 1962, to R239 million at the end of October, while call money held with the discount houses increased steadily from R138 million to R170 million.
**Reserve Bank**
The Reserve Bank's own position continued to reflect the exceptional ease and liquidity of the general monetary and banking situation. Its total discounts, advances and investments, after rising from R37 million at the end of June, 1962, to R86 million at the end of August, mainly owing to a seasonal increase in its discounts of Land Bank bills, declined again to R60.7 million at the end of November. Its holdings of Government and other gilt-edged securities actually decreased further from R24 million at the end of June to R9 million at the end of November, while its legal reserve ratio at the end of November was still as high as 90.2 per cent.
**CREDIT POLICY AND SHORT-TERM INTEREST RATES**
With the official gold and foreign exchange reserves continuing to rise and with no indication in the economy of general demand inflation or aggregate over-spending, the monetary authorities, throughout the period July to November, 1962, continued to adhere to the view that the immediate aim of short-term economic policy was to assist the recovery in economic activity by stimulating investment and consumption outlays. In the prevailing conditions, however, it was not necessary for the Reserve Bank to create a favourable monetary environment by, for example, buying securities in the open market, since such an environment already existed as a result of the large and sustained balance of payments surplus. As indicated earlier, the supply of money and near-money in the economy had increased to record levels and most forms of credit had for some time been readily available.
Indeed, supply and demand conditions in the money market during the period under review were such that short-term interest rates continued to drift downwards. The Treasury bill tender rate, for example, declined from 2.65 per cent on the 29th June to 1.80 per cent on the 7th December.
In these circumstances, the Reserve Bank decided, with effect from the 27th November, to lower the Bank Rate for the third time in less than a year, namely from 4 to 3½ per cent. This step was taken "not only in recognition of the changes which have occurred in the monetary and banking situation during recent months, but also to reduce the cost of short-term financing and to indicate to the business community and the general public that the way appears to be clear for the continuation of the current economic revival and for a further acceleration of the rate of economic growth".
The commercial banks reacted almost immediately by announcing a reduction of ½ per cent in their lending and deposit rates, with the exception of their rate for six months notice deposits, which was reduced by only ¼ per cent, and their savings deposit rate, which remained unaltered at 2½ per cent. This brought their minimum overdraft rate down to 5½ per cent and their 12-months' deposit rate to 3½ per cent.
**CAPITAL MARKET**
With the continuance of a high rate of domestic saving, coupled with the substantial further increase in the liquidity of the economy, the demand for securities in the capital market tended to increase during the months July to
November. On the other hand, despite the relaxations of exchange control referred to earlier, the supply of scrip remained limited. The result was that most security prices showed a substantial further increase.
In the gilt-edged market, for example, the pressure of funds induced the Reserve Bank to reduce its pattern of rates for Government stock by $\frac{3}{8}$ per cent in July, by a further $\frac{1}{4}$ per cent in August (0.275 per cent in the case of stocks with maturities between 3 and 11 years) and by another $\frac{1}{4}$ per cent on the 1st November. This brought the rate for stock with a maturity exceeding 11 years down to $4\frac{3}{8}$ per cent.
The prices of mining shares also continued to rise and by October a level had been reached which was not far below the peak of early 1960. Industrial and commercial share prices, which had earlier in 1962 already passed the 1960 peak, likewise increased further, and by October had attained the highest level in about 14 years.
### Indices — Excluding Seasonal Changes
$(1953=100)$
| | 1961 | | 1962 | |
|----------------------|------|-------|------|-------|
| | 3rd Qtr. | 4th Qtr. | 1st Qtr. | 2nd Qtr. | 3rd Qtr. | October |
| Bank Debits | 201 | 205 | 214 | 217 | 238 | 239 |
| Discounts and Advances of Commercial Banks | 189 | 187 | 187 | 182 | 181 | 180 |
| Stock Exchange Turnover | 175 | 180 | 193 | 299 | 384 | 371 |
| Value of Gold Production | 196 | 200 | 207 | 212 | 219 | 225 |
| Value of Imports | 110 | 112 | 114 | 113 | 128 | 136 |
| Value of Exports | 160 | 168 | 155 | 167 | 156 | 156 |
| Railway Earnings | 159 | 162 | 166 | 172 | 172 | .... |
| Value of Retail Sales| 115 | 114 | 117 | 118 | 118 | .... |
| Value of Property Transactions | 79 | 82 | 84 | 96 | 107 | 120 |
| Value of Building Plans Passed | 83 | 74 | 78 | 86 | 91 | .... |
| Employment: | | | | | | |
| Private Manufacturing| 120 | 120 | 120 | 121 | 123 | .... |
| Private Construction | 102 | 104 | 107 | 110 | 109 | .... |
| Mining | 124 | 126 | 125 | 122 | 124 | 127 |
| Unemployment | 257 | 273 | 280 | 264 | 230 | .... |
|
3d904ae2-bd99-49ac-90ae-41928f467d35
|
CC-MAIN-2025-08
|
https://www.resbank.co.za/content/dam/sarb/publications/quarterly-bulletins/quarterly-bulletin-publications/1962/5295/02Quarterly-economic-review.pdf
|
2025-02-16T05:53:02+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2025-08/subset=warc/part-00095-b184e832-acd1-425a-bab7-895830f2748a.c000.gz.parquet
| 884,650,305
| 4,131
|
eng_Latn
|
eng_Latn
| 0.980658
|
eng_Latn
| 0.998592
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
4285,
6463,
10412,
10585,
13728,
17040,
19468
] |
QUARTERLY ECONOMIC REVIEW
SUMMARY AND CONCLUSIONS
(1) Although it tended to lose some momentum during the second quarter of 1962, the current economic upswing would appear to have regained its stride during the third quarter and to have continued into the fourth quarter.
(2) The main expansionist factors during recent months have been increases in private consumption and, to a lesser extent, in private fixed investment. These two important components of total expenditure on locally produced and imported goods and services have taken over the expansionist role played during the earlier stages of the revival by merchandise exports and current Government expenditures. Merchandise exports have declined slightly during recent months, while current Government outlays have been increasing at a considerably slower rate. The gold output, however, has continued its steady upward course.
(3) With merchandise exports no longer increasing and imports moving upwards as a result of increasing private consumption and investment spending, the current surplus on the balance of payments declined considerably during the third quarter of this year from the record level attained during the preceding quarter. But despite a further moderate net outflow of capital, the overall balance of payments still showed a substantial surplus, so that the official gold and foreign exchange reserves continued to increase. Similar tendencies prevailed during October.
(4) The monetary and banking situation continued to be characterised by an abnormally high degree of liquidity and short-term interest rates declined further. The Bank Rate was lowered from 4 to $3\frac{1}{2}$ per cent on the 27th November.
(5) In the capital market most kinds of long-term funds remained readily available and the prices of gilt-edged securities as well as mining, financial, industrial and commercial shares showed a substantial further increase.
(6) Despite the increase in consumption and private capital outlays and the existence of a record supply of money and near-money in the economy, there has thus far been no indication of general demand inflation or aggregate overspending.
NATIONAL ACCOUNTS
Gross National Product
After tending to slow down somewhat during the second quarter of 1962, the gross national product increased at a noticeably faster rate during the third quarter, i.e. after adjustment for seasonal changes.
Expenditure Tendencies
The main reason for the improvement during the third quarter would appear to have been a further increase in private consumption to a level well above the relatively low figure registered during the third quarter of the preceding year. Outlays on durable consumer goods, in particular, showed a marked increase.
A further stimulus was provided by an increase in gross domestic fixed investment to a level somewhat higher than that of the third quarter of last year. This was mainly attributable to an increase in fixed capital outlays by private enterprises; fixed investment by public authorities and public corporations showed little change. As during the second quarter, fixed investment by private manufacturing enterprises was again well above the level reached during the corresponding quarter of 1961.
These increases in private consumption and fixed investment occurred at an opportune time, since merchandise exports, which had been a major expansionist factor during the earlier stages of the revival but which had tended to level off during the first half of 1962, declined somewhat during the third quarter. Similarly, current expenditure by the Government and other public authorities, which had earlier also played an important role in bringing about a revival in economic activity, did not maintain its rate of increase during the third quarter, i.e. after allowance for seasonal movements. The gold production, however, continued to increase steadily and
|
to exercise favourable primary and secondary effects on the economy.
| 3,912
|
inside_word
|
to
|
remove_all
|
<url>
https://www.resbank.co.za/content/dam/sarb/publications/quarterly-bulletins/quarterly-bulletin-publications/1962/5295/02Quarterly-economic-review.pdf
</url>
<text>
QUARTERLY ECONOMIC REVIEW
SUMMARY AND CONCLUSIONS
(1) Although it tended to lose some momentum during the second quarter of 1962, the current economic upswing would appear to have regained its stride during the third quarter and to have continued into the fourth quarter.
(2) The main expansionist factors during recent months have been increases in private consumption and, to a lesser extent, in private fixed investment. These two important components of total expenditure on locally produced and imported goods and services have taken over the expansionist role played during the earlier stages of the revival by merchandise exports and current Government expenditures. Merchandise exports have declined slightly during recent months, while current Government outlays have been increasing at a considerably slower rate. The gold output, however, has continued its steady upward course.
(3) With merchandise exports no longer increasing and imports moving upwards as a result of increasing private consumption and investment spending, the current surplus on the balance of payments declined considerably during the third quarter of this year from the record level attained during the preceding quarter. But despite a further moderate net outflow of capital, the overall balance of payments still showed a substantial surplus, so that the official gold and foreign exchange reserves continued to increase. Similar tendencies prevailed during October.
(4) The monetary and banking situation continued to be characterised by an abnormally high degree of liquidity and short-term interest rates declined further. The Bank Rate was lowered from 4 to $3\frac{1}{2}$ per cent on the 27th November.
(5) In the capital market most kinds of long-term funds remained readily available and the prices of gilt-edged securities as well as mining, financial, industrial and commercial shares showed a substantial further increase.
(6) Despite the increase in consumption and private capital outlays and the existence of a record supply of money and near-money in the economy, there has thus far been no indication of general demand inflation or aggregate overspending.
NATIONAL ACCOUNTS
Gross National Product
After tending to slow down somewhat during the second quarter of 1962, the gross national product increased at a noticeably faster rate during the third quarter, i.e. after adjustment for seasonal changes.
Expenditure Tendencies
The main reason for the improvement during the third quarter would appear to have been a further increase in private consumption to a level well above the relatively low figure registered during the third quarter of the preceding year. Outlays on durable consumer goods, in particular, showed a marked increase.
A further stimulus was provided by an increase in gross domestic fixed investment to a level somewhat higher than that of the third quarter of last year. This was mainly attributable to an increase in fixed capital outlays by private enterprises; fixed investment by public authorities and public corporations showed little change. As during the second quarter, fixed investment by private manufacturing enterprises was again well above the level reached during the corresponding quarter of 1961.
These increases in private consumption and fixed investment occurred at an opportune time, since merchandise exports, which had been a major expansionist factor during the earlier stages of the revival but which had tended to level off during the first half of 1962, declined somewhat during the third quarter. Similarly, current expenditure by the Government and other public authorities, which had earlier also played an important role in bringing about a revival in economic activity, did not maintain its rate of increase during the third quarter, i.e. after allowance for seasonal movements. The gold production, however, continued to increase steadily and <cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.resbank.co.za/content/dam/sarb/publications/quarterly-bulletins/quarterly-bulletin-publications/1962/5295/02Quarterly-economic-review.pdf\n</url>\n<text>\nQUARTERLY ECONOMIC REVIEW\n\nSUMMARY AND CONCLUSIONS\n\n(1) Although it tended to lose some momentum during the second quarter of 1962, the current economic upswing would appear to have regained its stride during the third quarter and to have continued into the fourth quarter.\n\n(2) The main expansionist factors during recent months have been increases in private consumption and, to a lesser extent, in private fixed investment. These two important components of total expenditure on locally produced and imported goods and services have taken over the expansionist role played during the earlier stages of the revival by merchandise exports and current Government expenditures. Merchandise exports have declined slightly during recent months, while current Government outlays have been increasing at a considerably slower rate. The gold output, however, has continued its steady upward course.\n\n(3) With merchandise exports no longer increasing and imports moving upwards as a result of increasing private consumption and investment spending, the current surplus on the balance of payments declined considerably during the third quarter of this year from the record level attained during the preceding quarter. But despite a further moderate net outflow of capital, the overall balance of payments still showed a substantial surplus, so that the official gold and foreign exchange reserves continued to increase. Similar tendencies prevailed during October.\n\n(4) The monetary and banking situation continued to be characterised by an abnormally high degree of liquidity and short-term interest rates declined further. The Bank Rate was lowered from 4 to $3\\frac{1}{2}$ per cent on the 27th November.\n\n(5) In the capital market most kinds of long-term funds remained readily available and the prices of gilt-edged securities as well as mining, financial, industrial and commercial shares showed a substantial further increase.\n\n(6) Despite the increase in consumption and private capital outlays and the existence of a record supply of money and near-money in the economy, there has thus far been no indication of general demand inflation or aggregate overspending.\n\nNATIONAL ACCOUNTS\n\nGross National Product\n\nAfter tending to slow down somewhat during the second quarter of 1962, the gross national product increased at a noticeably faster rate during the third quarter, i.e. after adjustment for seasonal changes.\n\nExpenditure Tendencies\n\nThe main reason for the improvement during the third quarter would appear to have been a further increase in private consumption to a level well above the relatively low figure registered during the third quarter of the preceding year. Outlays on durable consumer goods, in particular, showed a marked increase.\n\nA further stimulus was provided by an increase in gross domestic fixed investment to a level somewhat higher than that of the third quarter of last year. This was mainly attributable to an increase in fixed capital outlays by private enterprises; fixed investment by public authorities and public corporations showed little change. As during the second quarter, fixed investment by private manufacturing enterprises was again well above the level reached during the corresponding quarter of 1961.\n\nThese increases in private consumption and fixed investment occurred at an opportune time, since merchandise exports, which had been a major expansionist factor during the earlier stages of the revival but which had tended to level off during the first half of 1962, declined somewhat during the third quarter. Similarly, current expenditure by the Government and other public authorities, which had earlier also played an important role in bringing about a revival in economic activity, did not maintain its rate of increase during the third quarter, i.e. after allowance for seasonal movements. The gold production, however, continued to increase steadily and <cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "to exercise favourable primary and secondary effects on the economy.",
"role": "assistant"
}
] |
|
MINUTES OF THE NOVEMBER 19, 2015 MEETING OF THE HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9
A meeting was duly called of the HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9, which was held on November 19, 2015, at the administrative offices of the District, 9630 Telge Drive, Houston, Texas 77095.
The meeting was called to order at 6:11 p.m. by JEREMY M. MARTINSON, President. Those Commissioners present were JEREMY M. MARTINSON, SUZANNE DAVIS, ROBERT JANUSAITIS, BETTY BOREN AVERY, and SCOTT DeBOER. Also present were KYLE WILLIAMS, District Managing Director, AMY RAMON, Fire Chief of the CY-FAIR VOLUNTEER FIRE DEPARTMENT (the "Department"), chief officers and members of the Department, BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper, HOWARD KATZ, of COVELER & KATZ, P.C., the District's Counsel, and members of the public. Also present was Ricardo Martinez, District real estate feasibility consultant and Steve Ferguson of DSF Advisors, District planning consultant.
Ms. Avery delivered an invocation.
The Board received public comment. Colleen Vera addressed the Board and spoke about the refugee issues and to always remember the safety of the firs responders in the terrorism crisis.
Ms AVERY recognized Department members and Auxiliary who received Department service awards: Henrietta Crosser (30 years: Auxiliary); Randall Waller (20 years: Station 11); Carlton Sage (20 years: Station 1); Phil Thomas (Lifetime membership award: Station 2).
The Board addressed the Minutes of the October 22, 2015 regular meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the Minutes of the November 9, 2015 special meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr.
JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then received a Financial Report from BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper. Mr. RUSSELL noted the operating account balance following the prior meeting of $1,100,799.22, the receipt of tax revenue in the amount of $7,680.91, tax penalty and interest in the amount of $4,086.05, sales tax receipts of $2,363,692.55, interest of $5,593.27, and ambulance reimbursement for the Department emergency medical services of $472,078.48. Mr. RUSSELL said that dispatching fees of $2,960.00 and other income of $26,373.58 (Jersey Village radio contract payment) were also received. He also noted the balance sheet showed total District assets at $70,993,309.22 ($48,852,607.81 cash/cash equivalents) short-term liabilities of $ -0-, long term liabilities of $ -0-, and equity of $70,993,309.22. Ms. AVERY said that there was a bookkeeping error in the Commissioner checks for this month and she requested that check no. 58708 for $184.70 payable to herself be voided. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to approve the Financial Report. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the posting of the bookkeeper's report on the District website. Mr. RUSSELL said that the report would need to be redacted as to account numbers. He also said there may be some specific information that the board may not want on the website. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to form a committee to prepare a policy for posting of the bookkeeper's report on the District website. After discussion, the Motion was approved by a vote of 5 to 0.
The compliance certification was delivered for the District investments showing compliance with the District's investment strategy/policy, and that all banks had in place security pledge agreements for the District's excess deposits.
The Board then addressed District investments. Mr. RUSSELL said no action was required at present
The Board then addressed action on District depository pledge agreements. Counsel said no action was required at present.
The Board then addressed administrative bills and commissioner fees as set forth in the Financial Report. After review, Motion was made by Ms. DAVIS, seconded by Mr. DeBOER to approve the payment of District administrative bills and commissioner fees, with the exception of check no. 58708 for $184.70 payable to Ms. Avery. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the payment of Department Operations as set forth in the Financial Report. Chief Amy Ramon noted that Operations funding was due at this meeting in the amount of $1,881,774.00. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the payment of Department Operations. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the payment of Department Capital funding as set forth in the Financial Report. Chief Ramon noted that Capital funding was due at this meeting in the amount of $228,639.93 (previously scheduled budgeted capital funding). After review, Motion was made by Mr. JANUSAITIS, seconded by Ms. DAVIS to approve the payment of Department Capital. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed revisions to the District 2015 budget. Mr. RUSSELL said there were none.
The Board addressed revisions to the Department 2015 budget. Chief Ramon said there were none.
The Board addressed sales tax matters.
The Board then addressed the KPI's for the District-Department service evaluation and received an update from Steve Ferguson of DSF Advisors on the project. Mr. Ferguson presented a monthly report. He addressed the continuing development of a performance management pilot program. He presented a matrix outline for performance review. He and Ms. AVERY discussed standards. Mr. Ferguson discussed possible standards programs: NFPA 1710 and 1720;
Texas State Fire Marshal standards for fire response as well as other similar standards used by other fire department and local governments in Texas and elsewhere; staffing levels. Ms. DAVIS said that development of a baseline was needed for going forward. Mr. Ferguson addressed personnel levels for volunteer and F/T and P/T personnel. He said the report involved a 6-month look back but advised not to focus on only the 6-month numbers. He said that was just an example to start the analysis. Mr. MARTINSON asked how the average cost/call was determined. Chief Ramon said that for now it was a number determined by the budget divided by the number of calls. Mr. Ferguson said that a part of the report program addressed "overload" situations and comparing actual time and the per cent when overloaded calls occurred. Ms. AVERY said this was good to determine when the Department was short on personnel for calls. Mr. DAVIS said she would like to see a trend sheet to show when manpower shortages were occurring. Chief Ramon said that there needed to be a differentiation for instance between situations when an EMS call drops and all ambulances are already on other calls versus when the Department is short on personnel to respond. Mr. Ferguson said the report was for resource management aid and deployment issues.
The Board then addressed a proposed Interlocal Agreement with Harris County to allow Harris County to utilize space on District communications tower(s) under state and county broadband network programs. Counsel presented a draft Agreement taken from the county template with Counsel's revisions.
The Board then received a report from Kyle Williams, the District Managing Director. He said the station 98 concrete job was completed. He said there was a concern that people were driving cars and walking on the concrete earlier than permitted but it should not be a problem and he would put more tape up to keep people and cars off. He said no heavy apparatus drove on the concrete. Mr. Williams said the Station 12 parking lot project was delayed due to weather.
Mr. Williams and Chief Ramon addressed a problem with sick or overhanging trees that caused a health and safety concern. Chief Ramon said the matter was not an emergency and Counsel said he would place the item on the next agenda.
The Board then addressed bids received for the purchase of new generator(s) for Station 11. Mr. Williams said bids were received. There was discussion on the kilowattage needed. Chief Ramon said 124kw was sufficient, but a load test would be performed to be sure. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve awarding a contract to Generators of Houston for the project. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed a proposal to purchase replacement Dispatch computer switches for dispatching functions. Ms. AVERY asked if the system was compatible with the Mitel phone equipment and how much down time was anticipated at Dispatch. Department Communications officer Rusty Caufield said the switches and Mitel equipment were compatible and down time would be minimal. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve proceeding with the project. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the Motorola radio system implementation. Department IT Coordinator Mike Hebert said the system was completed.
The Board addressed the land acquisition for a new station in Bridgeland. Counsel said he would need an executive session on this matter.
The Board then addressed Station 7 construction options, including the purchase of the site. Counsel said he would need an executive session on this matter.
The Board addressed the land acquisition for a new station on Wortham. Counsel said he would need an executive session on this matter.
The Board then received a report from the District architect selection committee. Mr. Martinson and Mr. DeBoer reported on the responses to the RFP. Mr. MARTINSON and Mr. DeBOER said that they conducted interviews with
three selected respondents, BRW Architects, Martinez Architects, and RandallPorterfield Architects. Mr. MARTINSON said all firms were very good and the other Board members should now have a say and if necessary contact the three selected respondents. Counsel said that the Board has full discretion in making the decision on the architect.
The Board then received a report on re-construction of driveways and parking areas of Station 11. Mr. Williams said that plans and engineering were completed and he was waiting on the contractor, Houston Decorative Concrete.
The Board addressed revisions to the Department 2015 budget or quarterly reallocations. Chief Ramon said there were none.
The District then considered Department 30-day requests. Chief Ramon said there were none.
The Board then addressed approvals (Agenda Item 24):
Budgeted Capital Expenditures
a. Boundtree - Ambu Airway Man Torso w/ CPR software (2) $4,424.00
b. Physio - LP-15 for EMS Training room $16,954.00
c. Best Wash - Crossover washer & Dryer Station 6 & Station 8 $8,138.00
d. CDW G - Desktops (6) & Laptops (7) $23,196.00
Ms. AVERY asked if item (c) in the end is for one or two machines. Chief Ramon said one. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Items listed, with one washer/dryer. After discussion, the Motion was approved by a vote of 5 to 0.
Operations within Budget
a. Comerica Bank - Payroll taxes 11/10/15 $110,000.00
b. Comerica Bank - Payroll taxes 11/25/15 $110,000.00
c. Schubot Law Firm - Legal service October 2015 $5,131.00
d. Vorys - Legal services September 2015 $2,576.00
e. Tritech - Inform Me Installation/training/support $7,615.00
f. Collective Data - Unlimited Web licenses for fuel log $4,850.00
g. HCESD1 - Difficult Airway Class 2/24-2/25/2016 $4,550.00
h. EMS-FTEP - EMS-FTEP Course $11,000.00
i. Multiple Ambulance Service Managers Course $6,237.00
j. Wells & Kimich - Nesting chairs EMS Training Room (20) $2,475.00
k. Global Industrial - Flip Top Training Tables EMS Training Room (10) $2,770.00
l. Allied Breathing Air – Qtrly. cascade Maint. $2,771.00
m. ESRI Inc. - ArcGIS Desktop license & Maint. $2,300.00
n. Access Wireless - Wireless Airline GX450-VD-Wifi (15) $10,487.00
o. Metro Fire - Annual Holmatro Tool Maintenance $12,215.00
p. Firehouse Software - Firehouse software annual renewal $5,355.00
q. Mitel Business Systems Annual Software and support renewal $27,890.00
r. CDW G - Fortinet 1 yr Fortigate Network Firewall annual $2,314.00
s. Anixter - Exacqvision enterprise software renewal $3,472.00
After review, Motion was made by Mr. DeBOER, seconded by Mr. JANUSAITIS to approve the Items listed. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed approval of requests to solicit bids and proposals and to approve awards following bids and proposals. Ms. DAVIS asked why this item is listed if the Board cannot take up action under it, such as for the tree trimming matter. Counsel said the item was to serve as a catch-all for items that covered matters that the Board already addressed or approved. Counsel said that the tree trimming matter had never come up to the Board so there was not a prior opportunity for the Board to discuss it. Counsel said the item was to cover previously reviewed matters that were left off Agenda Item 24. But Counsel said he understood the Commissioner's point and would try to address revised language for the Agenda item.
The Board received an update on the Department EMS patient satisfaction program.
The Board received committee reports.
The Board entered executive session at 7:20 p.m. pursuant to Section 551.072 Government Code, to discuss real estate matters with attorney; and pursuant to Section 551.074 Government Code, to discuss District personnel matters.
The Board re-entered open session at 7:52 p.m.
The Board addressed the land acquisition for a new station in Bridgeland. Counsel and Ricardo Martinez, District real estate feasibility consultant discussed the feasibility of the property and proceeding with a closing on the land purchase. Counsel discussed the re-platting obligations of the Seller/developer and the fact
that the process was still on-going but was expected to be completed shortly, but after closing. The Board reviewed the proposed purchase. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the land acquisition for a new station in Bridgeland and approve payment of the purchase price. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the existing Station 7 land acquisition and Cherry Park land acquisition. Counsel said the Board approved both Closings at the November 9 special meeting and the Closings will proceed. The Board reviewed both proposed acquisitions. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the existing Station 7 land acquisition and the Cherry Park land acquisition, and approve payment of the purchase price for both. After discussion, the Motion was approved by a vote of 5 to 0.
There being no further business brought before the Board nor any further public comment, upon Motion made the meeting adjourned at 7:55 p.m.
Secretary of the Board
|
<urn:uuid:3016b820-3e8c-4932-be8b-03b7e39a092e>
|
CC-MAIN-2019-09
|
http://hcesd9.org/index.php/monthly-meetings/meeting-archives/2015/158-november-2015-meeting-minutes/file
|
2019-02-22T10:29:28Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247515149.92/warc/CC-MAIN-20190222094419-20190222120419-00130.warc.gz
| 111,286,706
| 3,529
|
eng_Latn
|
eng_Latn
| 0.995694
|
eng_Latn
| 0.998203
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1845,
3953,
5956,
8042,
10090,
12154,
14292,
15391
] |
MINUTES OF THE NOVEMBER 19, 2015 MEETING OF THE HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9
A meeting was duly called of the HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9, which was held on November 19, 2015, at the administrative offices of the District, 9630 Telge Drive, Houston, Texas 77095.
The meeting was called to order at 6:11 p.m. by JEREMY M. MARTINSON, President. Those Commissioners present were JEREMY M. MARTINSON, SUZANNE DAVIS, ROBERT JANUSAITIS, BETTY BOREN AVERY, and SCOTT DeBOER. Also present were KYLE WILLIAMS, District Managing Director, AMY RAMON, Fire Chief of the CY-FAIR VOLUNTEER FIRE DEPARTMENT (the "Department"), chief officers and members of the Department, BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper, HOWARD KATZ, of COVELER & KATZ, P.C., the District's Counsel, and members of the public. Also present was Ricardo Martinez, District real estate feasibility consultant and Steve Ferguson of DSF Advisors, District planning consultant.
Ms. Avery delivered an invocation.
The Board received public comment. Colleen Vera addressed the Board and spoke about the refugee issues and to always remember the safety of the firs responders in the terrorism crisis.
Ms AVERY recognized Department members and Auxiliary who received Department service awards: Henrietta Crosser (30 years: Auxiliary); Randall Waller (20 years: Station 11); Carlton Sage (20 years: Station 1); Phil Thomas (Lifetime membership award: Station 2).
The Board addressed the Minutes of the October 22, 2015 regular meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the Minutes of the November 9, 2015 special meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr.
JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then received a Financial Report from BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper. Mr. RUSSELL noted the operating account balance following the prior meeting of $1,100,799.22, the receipt of tax revenue in the amount of $7,680.91, tax penalty and interest in the amount of $4,086.05, sales tax receipts of $2,363,692.55, interest of $5,593.27, and ambulance reimbursement for the Department emergency medical services of $472,078.48. Mr. RUSSELL said that dispatching fees of $2,960.00 and other income of $26,373.58 (Jersey Village radio contract payment) were also received. He also noted the balance sheet showed total District assets at $70,993,309.22 ($48,852,607.81 cash/cash equivalents) short-term liabilities of $ -0-, long term liabilities of $ -0-, and equity of $70,993,309.22. Ms. AVERY said that there was a bookkeeping error in the Commissioner checks for this month and she requested that check no. 58708 for $184.70 payable to herself be voided. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to approve the Financial Report. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the posting of the bookkeeper's report on the District website. Mr. RUSSELL said that the report would need to be redacted as to account numbers. He also said there may be some specific information that the board may not want on the website. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to form a committee to prepare a policy for posting of the bookkeeper's report on the District website. After discussion, the Motion was approved by a vote of 5 to 0.
The compliance certification was delivered for the District investments showing compliance with the District's investment strategy/policy, and that all banks had in place security pledge agreements for the District's excess deposits.
The Board then addressed District investments. Mr. RUSSELL said no action was required at present
The Board then addressed action on District depository pledge agreements. Counsel said no action was required at present.
The Board then addressed administrative bills and commissioner fees as set forth in the Financial Report. After review, Motion was made by Ms. DAVIS, seconded by Mr. DeBOER to approve the payment of District administrative bills and commissioner fees, with the exception of check no. 58708 for $184.70 payable to Ms. Avery. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the payment of Department Operations as set forth in the Financial Report. Chief Amy Ramon noted that Operations funding was due at this meeting in the amount of $1,881,774.00. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the payment of Department Operations. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the payment of Department Capital funding as set forth in the Financial Report. Chief Ramon noted that Capital funding was due at this meeting in the amount of $228,639.93 (previously scheduled budgeted capital funding). After review, Motion was made by Mr. JANUSAITIS, seconded by Ms. DAVIS to approve the payment of Department Capital. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed revisions to the District 2015 budget. Mr. RUSSELL said there were none.
The Board addressed revisions to the Department 2015 budget. Chief Ramon said there were none.
The Board addressed sales tax matters.
The Board then addressed the KPI's for the District-Department service evaluation and received an update from Steve Ferguson of DSF Advisors on the project. Mr. Ferguson presented a monthly report. He addressed the continuing development of a performance management pilot program. He presented a matrix outline for performance review. He and Ms. AVERY discussed standards. Mr. Ferguson discussed possible standards programs: NFPA 1710 and 1720;
Texas State Fire Marshal standards for fire response as well as other similar standards used by other fire department and local governments in Texas and elsewhere; staffing levels. Ms. DAVIS said that development of a baseline was needed for going forward. Mr. Ferguson addressed personnel levels for volunteer and F/T and P/T personnel. He said the report involved a 6-month look back but advised not to focus on only the 6-month numbers. He said that was just an example to start the analysis. Mr. MARTINSON asked how the average cost/call was determined. Chief Ramon said that for now it was a number determined by the budget divided by the number of calls. Mr. Ferguson said that a part of the report program addressed "overload" situations and comparing actual time and the per cent when overloaded calls occurred. Ms. AVERY said this was good to determine when the Department was short on personnel for calls. Mr. DAVIS said she would like to see a trend sheet to show when manpower shortages were occurring. Chief Ramon said that there needed to be a differentiation for instance between situations when an EMS call drops and all ambulances are already on other calls versus when the Department is short on personnel to respond. Mr. Ferguson said the report was for resource management aid and deployment issues.
The Board then addressed a proposed Interlocal Agreement with Harris County to allow Harris County to utilize space on District communications tower(s) under state and county broadband network programs. Counsel presented a draft Agreement taken from the county template with Counsel's revisions.
The Board then received a report from Kyle Williams, the District Managing Director. He said the station 98 concrete job was completed. He said there was a concern that people were driving cars and walking on the concrete earlier than permitted but it should not be a problem and he would put more tape up to keep people and cars off. He said no heavy apparatus drove on the concrete. Mr. Williams said the Station 12 parking lot project was delayed due to weather.
Mr. Williams and Chief Ramon addressed a problem with sick or overhanging trees that caused a health and safety concern. Chief Ramon said the matter was not an emergency and Counsel said he would place the item on the next agenda.
The Board then addressed bids received for the purchase of new generator(s) for Station 11. Mr. Williams said bids were received. There was discussion on the kilowattage needed. Chief Ramon said 124kw was sufficient, but a load test would be performed to be sure. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve awarding a contract to Generators of Houston for the project. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed a proposal to purchase replacement Dispatch computer switches for dispatching functions. Ms. AVERY asked if the system was compatible with the Mitel phone equipment and how much down time was anticipated at Dispatch. Department Communications officer Rusty Caufield said the switches and Mitel equipment were compatible and down time would be minimal. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve proceeding with the project. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the Motorola radio system implementation. Department IT Coordinator Mike Hebert said the system was completed.
The Board addressed the land acquisition for a new station in Bridgeland. Counsel said he would need an executive session on this matter.
The Board then addressed Station 7 construction options, including the purchase of the site. Counsel said he would need an executive session on this matter.
The Board addressed the land acquisition for a new station on Wortham. Counsel said he would need an executive session on this matter.
The Board then received a report from the District architect selection committee. Mr. Martinson and Mr. DeBoer reported on the responses to the RFP. Mr. MARTINSON and Mr. DeBOER said that they conducted interviews with
three selected respondents, BRW Architects, Martinez Architects, and RandallPorterfield Architects. Mr. MARTINSON said all firms were very good and the other Board members should now have a say and if necessary contact the three selected respondents. Counsel said that the Board has full discretion in making the decision on the architect.
The Board then received a report on re-construction of driveways and parking areas of Station 11. Mr. Williams said that plans and engineering were completed and he was waiting on the contractor, Houston Decorative Concrete.
The Board addressed revisions to the Department 2015 budget or quarterly reallocations. Chief Ramon said there were none.
The District then considered Department 30-day requests. Chief Ramon said there were none.
The Board then addressed approvals (Agenda Item 24):
Budgeted Capital Expenditures
a. Boundtree - Ambu Airway Man Torso w/ CPR software (2) $4,424.00
b. Physio - LP-15 for EMS Training room $16,954.00
c. Best Wash - Crossover washer & Dryer Station 6 & Station 8 $8,138.00
d. CDW G - Desktops (6) & Laptops (7) $23,196.00
Ms. AVERY asked if item (c) in the end is for one or two machines. Chief Ramon said one. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Items listed, with one washer/dryer. After discussion, the Motion was approved by a vote of 5 to 0.
Operations within Budget
a. Comerica Bank - Payroll taxes 11/10/15 $110,000.00
b. Comerica Bank - Payroll taxes 11/25/15 $110,000.00
c. Schubot Law Firm - Legal service October 2015 $5,131.00
d. Vorys - Legal services September 2015 $2,576.00
e. Tritech - Inform Me Installation/training/support $7,615.00
f. Collective Data - Unlimited Web licenses for fuel log $4,850.00
g. HCESD1 - Difficult Airway Class 2/24-2/25/2016 $4,550.00
h. EMS-FTEP - EMS-FTEP Course $11,000.00
i. Multiple Ambulance Service Managers Course $6,237.00
j. Wells & Kimich - Nesting chairs EMS Training Room (20) $2,475.00
k. Global Industrial - Flip Top Training Tables EMS Training Room (10) $2,770.00
l. Allied Breathing Air – Qtrly. cascade Maint. $2,771.00
m. ESRI Inc. - ArcGIS Desktop license & Maint. $2,300.00
n. Access Wireless - Wireless Airline GX450-VD-Wifi (15) $10,487.00
o. Metro Fire - Annual Holmatro Tool Maintenance $12,215.00
p. Firehouse Software - Firehouse software annual renewal $5,355.00
q. Mitel Business Systems Annual Software and support renewal $27,890.00
r. CDW G - Fortinet 1 yr Fortigate Network Firewall annual $2,314.00
s. Anixter - Exacqvision enterprise software renewal $3,472.00
After review, Motion was made by Mr. DeBOER, seconded by Mr. JANUSAITIS to approve the Items listed. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed approval of requests to solicit bids and proposals and to approve awards following bids and proposals. Ms. DAVIS asked why this item is listed if the Board cannot take up action under it, such
|
as for the tree trimming matter.
|
Counsel said the item was to serve as a catch-all for items that covered matters that the Board already addressed or approved. Counsel said that the tree trimming matter had never come up to the Board so there was not a prior opportunity for the Board to discuss it. Counsel said the item was to cover previously reviewed matters that were left off Agenda Item 24. But Counsel said he understood the Commissioner's point and would try to address revised language for the Agenda item.
The Board received an update on the Department EMS patient satisfaction program.
The Board received committee reports.
The Board entered executive session at 7:20 p.m. pursuant to Section 551.072 Government Code, to discuss real estate matters with attorney; and pursuant to Section 551.074 Government Code, to discuss District personnel matters.
The Board re-entered open session at 7:52 p.m.
The Board addressed the land acquisition for a new station in Bridgeland. Counsel and Ricardo Martinez, District real estate feasibility consultant discussed the feasibility of the property and proceeding with a closing on the land purchase. Counsel discussed the re-platting obligations of the Seller/developer and the fact
that the process was still on-going but was expected to be completed shortly, but after closing. The Board reviewed the proposed purchase. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the land acquisition for a new station in Bridgeland and approve payment of the purchase price. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the existing Station 7 land acquisition and Cherry Park land acquisition. Counsel said the Board approved both Closings at the November 9 special meeting and the Closings will proceed. The Board reviewed both proposed acquisitions. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the existing Station 7 land acquisition and the Cherry Park land acquisition, and approve payment of the purchase price for both. After discussion, the Motion was approved by a vote of 5 to 0.
There being no further business brought before the Board nor any further public comment, upon Motion made the meeting adjourned at 7:55 p.m.
Secretary of the Board
| 13,051
|
inside_word
|
as
|
remove_one_sentence
|
<url>
http://hcesd9.org/index.php/monthly-meetings/meeting-archives/2015/158-november-2015-meeting-minutes/file
</url>
<text>
MINUTES OF THE NOVEMBER 19, 2015 MEETING OF THE HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9
A meeting was duly called of the HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9, which was held on November 19, 2015, at the administrative offices of the District, 9630 Telge Drive, Houston, Texas 77095.
The meeting was called to order at 6:11 p.m. by JEREMY M. MARTINSON, President. Those Commissioners present were JEREMY M. MARTINSON, SUZANNE DAVIS, ROBERT JANUSAITIS, BETTY BOREN AVERY, and SCOTT DeBOER. Also present were KYLE WILLIAMS, District Managing Director, AMY RAMON, Fire Chief of the CY-FAIR VOLUNTEER FIRE DEPARTMENT (the "Department"), chief officers and members of the Department, BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper, HOWARD KATZ, of COVELER & KATZ, P.C., the District's Counsel, and members of the public. Also present was Ricardo Martinez, District real estate feasibility consultant and Steve Ferguson of DSF Advisors, District planning consultant.
Ms. Avery delivered an invocation.
The Board received public comment. Colleen Vera addressed the Board and spoke about the refugee issues and to always remember the safety of the firs responders in the terrorism crisis.
Ms AVERY recognized Department members and Auxiliary who received Department service awards: Henrietta Crosser (30 years: Auxiliary); Randall Waller (20 years: Station 11); Carlton Sage (20 years: Station 1); Phil Thomas (Lifetime membership award: Station 2).
The Board addressed the Minutes of the October 22, 2015 regular meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the Minutes of the November 9, 2015 special meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr.
JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then received a Financial Report from BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper. Mr. RUSSELL noted the operating account balance following the prior meeting of $1,100,799.22, the receipt of tax revenue in the amount of $7,680.91, tax penalty and interest in the amount of $4,086.05, sales tax receipts of $2,363,692.55, interest of $5,593.27, and ambulance reimbursement for the Department emergency medical services of $472,078.48. Mr. RUSSELL said that dispatching fees of $2,960.00 and other income of $26,373.58 (Jersey Village radio contract payment) were also received. He also noted the balance sheet showed total District assets at $70,993,309.22 ($48,852,607.81 cash/cash equivalents) short-term liabilities of $ -0-, long term liabilities of $ -0-, and equity of $70,993,309.22. Ms. AVERY said that there was a bookkeeping error in the Commissioner checks for this month and she requested that check no. 58708 for $184.70 payable to herself be voided. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to approve the Financial Report. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the posting of the bookkeeper's report on the District website. Mr. RUSSELL said that the report would need to be redacted as to account numbers. He also said there may be some specific information that the board may not want on the website. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to form a committee to prepare a policy for posting of the bookkeeper's report on the District website. After discussion, the Motion was approved by a vote of 5 to 0.
The compliance certification was delivered for the District investments showing compliance with the District's investment strategy/policy, and that all banks had in place security pledge agreements for the District's excess deposits.
The Board then addressed District investments. Mr. RUSSELL said no action was required at present
The Board then addressed action on District depository pledge agreements. Counsel said no action was required at present.
The Board then addressed administrative bills and commissioner fees as set forth in the Financial Report. After review, Motion was made by Ms. DAVIS, seconded by Mr. DeBOER to approve the payment of District administrative bills and commissioner fees, with the exception of check no. 58708 for $184.70 payable to Ms. Avery. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the payment of Department Operations as set forth in the Financial Report. Chief Amy Ramon noted that Operations funding was due at this meeting in the amount of $1,881,774.00. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the payment of Department Operations. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the payment of Department Capital funding as set forth in the Financial Report. Chief Ramon noted that Capital funding was due at this meeting in the amount of $228,639.93 (previously scheduled budgeted capital funding). After review, Motion was made by Mr. JANUSAITIS, seconded by Ms. DAVIS to approve the payment of Department Capital. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed revisions to the District 2015 budget. Mr. RUSSELL said there were none.
The Board addressed revisions to the Department 2015 budget. Chief Ramon said there were none.
The Board addressed sales tax matters.
The Board then addressed the KPI's for the District-Department service evaluation and received an update from Steve Ferguson of DSF Advisors on the project. Mr. Ferguson presented a monthly report. He addressed the continuing development of a performance management pilot program. He presented a matrix outline for performance review. He and Ms. AVERY discussed standards. Mr. Ferguson discussed possible standards programs: NFPA 1710 and 1720;
Texas State Fire Marshal standards for fire response as well as other similar standards used by other fire department and local governments in Texas and elsewhere; staffing levels. Ms. DAVIS said that development of a baseline was needed for going forward. Mr. Ferguson addressed personnel levels for volunteer and F/T and P/T personnel. He said the report involved a 6-month look back but advised not to focus on only the 6-month numbers. He said that was just an example to start the analysis. Mr. MARTINSON asked how the average cost/call was determined. Chief Ramon said that for now it was a number determined by the budget divided by the number of calls. Mr. Ferguson said that a part of the report program addressed "overload" situations and comparing actual time and the per cent when overloaded calls occurred. Ms. AVERY said this was good to determine when the Department was short on personnel for calls. Mr. DAVIS said she would like to see a trend sheet to show when manpower shortages were occurring. Chief Ramon said that there needed to be a differentiation for instance between situations when an EMS call drops and all ambulances are already on other calls versus when the Department is short on personnel to respond. Mr. Ferguson said the report was for resource management aid and deployment issues.
The Board then addressed a proposed Interlocal Agreement with Harris County to allow Harris County to utilize space on District communications tower(s) under state and county broadband network programs. Counsel presented a draft Agreement taken from the county template with Counsel's revisions.
The Board then received a report from Kyle Williams, the District Managing Director. He said the station 98 concrete job was completed. He said there was a concern that people were driving cars and walking on the concrete earlier than permitted but it should not be a problem and he would put more tape up to keep people and cars off. He said no heavy apparatus drove on the concrete. Mr. Williams said the Station 12 parking lot project was delayed due to weather.
Mr. Williams and Chief Ramon addressed a problem with sick or overhanging trees that caused a health and safety concern. Chief Ramon said the matter was not an emergency and Counsel said he would place the item on the next agenda.
The Board then addressed bids received for the purchase of new generator(s) for Station 11. Mr. Williams said bids were received. There was discussion on the kilowattage needed. Chief Ramon said 124kw was sufficient, but a load test would be performed to be sure. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve awarding a contract to Generators of Houston for the project. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed a proposal to purchase replacement Dispatch computer switches for dispatching functions. Ms. AVERY asked if the system was compatible with the Mitel phone equipment and how much down time was anticipated at Dispatch. Department Communications officer Rusty Caufield said the switches and Mitel equipment were compatible and down time would be minimal. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve proceeding with the project. After discussion, the Motion was approved by a vote of 5 to 0.
The Board then addressed the Motorola radio system implementation. Department IT Coordinator Mike Hebert said the system was completed.
The Board addressed the land acquisition for a new station in Bridgeland. Counsel said he would need an executive session on this matter.
The Board then addressed Station 7 construction options, including the purchase of the site. Counsel said he would need an executive session on this matter.
The Board addressed the land acquisition for a new station on Wortham. Counsel said he would need an executive session on this matter.
The Board then received a report from the District architect selection committee. Mr. Martinson and Mr. DeBoer reported on the responses to the RFP. Mr. MARTINSON and Mr. DeBOER said that they conducted interviews with
three selected respondents, BRW Architects, Martinez Architects, and RandallPorterfield Architects. Mr. MARTINSON said all firms were very good and the other Board members should now have a say and if necessary contact the three selected respondents. Counsel said that the Board has full discretion in making the decision on the architect.
The Board then received a report on re-construction of driveways and parking areas of Station 11. Mr. Williams said that plans and engineering were completed and he was waiting on the contractor, Houston Decorative Concrete.
The Board addressed revisions to the Department 2015 budget or quarterly reallocations. Chief Ramon said there were none.
The District then considered Department 30-day requests. Chief Ramon said there were none.
The Board then addressed approvals (Agenda Item 24):
Budgeted Capital Expenditures
a. Boundtree - Ambu Airway Man Torso w/ CPR software (2) $4,424.00
b. Physio - LP-15 for EMS Training room $16,954.00
c. Best Wash - Crossover washer & Dryer Station 6 & Station 8 $8,138.00
d. CDW G - Desktops (6) & Laptops (7) $23,196.00
Ms. AVERY asked if item (c) in the end is for one or two machines. Chief Ramon said one. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Items listed, with one washer/dryer. After discussion, the Motion was approved by a vote of 5 to 0.
Operations within Budget
a. Comerica Bank - Payroll taxes 11/10/15 $110,000.00
b. Comerica Bank - Payroll taxes 11/25/15 $110,000.00
c. Schubot Law Firm - Legal service October 2015 $5,131.00
d. Vorys - Legal services September 2015 $2,576.00
e. Tritech - Inform Me Installation/training/support $7,615.00
f. Collective Data - Unlimited Web licenses for fuel log $4,850.00
g. HCESD1 - Difficult Airway Class 2/24-2/25/2016 $4,550.00
h. EMS-FTEP - EMS-FTEP Course $11,000.00
i. Multiple Ambulance Service Managers Course $6,237.00
j. Wells & Kimich - Nesting chairs EMS Training Room (20) $2,475.00
k. Global Industrial - Flip Top Training Tables EMS Training Room (10) $2,770.00
l. Allied Breathing Air – Qtrly. cascade Maint. $2,771.00
m. ESRI Inc. - ArcGIS Desktop license & Maint. $2,300.00
n. Access Wireless - Wireless Airline GX450-VD-Wifi (15) $10,487.00
o. Metro Fire - Annual Holmatro Tool Maintenance $12,215.00
p. Firehouse Software - Firehouse software annual renewal $5,355.00
q. Mitel Business Systems Annual Software and support renewal $27,890.00
r. CDW G - Fortinet 1 yr Fortigate Network Firewall annual $2,314.00
s. Anixter - Exacqvision enterprise software renewal $3,472.00
After review, Motion was made by Mr. DeBOER, seconded by Mr. JANUSAITIS to approve the Items listed. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed approval of requests to solicit bids and proposals and to approve awards following bids and proposals. Ms. DAVIS asked why this item is listed if the Board cannot take up action under it, such <cursor_is_here> Counsel said the item was to serve as a catch-all for items that covered matters that the Board already addressed or approved. Counsel said that the tree trimming matter had never come up to the Board so there was not a prior opportunity for the Board to discuss it. Counsel said the item was to cover previously reviewed matters that were left off Agenda Item 24. But Counsel said he understood the Commissioner's point and would try to address revised language for the Agenda item.
The Board received an update on the Department EMS patient satisfaction program.
The Board received committee reports.
The Board entered executive session at 7:20 p.m. pursuant to Section 551.072 Government Code, to discuss real estate matters with attorney; and pursuant to Section 551.074 Government Code, to discuss District personnel matters.
The Board re-entered open session at 7:52 p.m.
The Board addressed the land acquisition for a new station in Bridgeland. Counsel and Ricardo Martinez, District real estate feasibility consultant discussed the feasibility of the property and proceeding with a closing on the land purchase. Counsel discussed the re-platting obligations of the Seller/developer and the fact
that the process was still on-going but was expected to be completed shortly, but after closing. The Board reviewed the proposed purchase. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the land acquisition for a new station in Bridgeland and approve payment of the purchase price. After discussion, the Motion was approved by a vote of 5 to 0.
The Board addressed the existing Station 7 land acquisition and Cherry Park land acquisition. Counsel said the Board approved both Closings at the November 9 special meeting and the Closings will proceed. The Board reviewed both proposed acquisitions. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the existing Station 7 land acquisition and the Cherry Park land acquisition, and approve payment of the purchase price for both. After discussion, the Motion was approved by a vote of 5 to 0.
There being no further business brought before the Board nor any further public comment, upon Motion made the meeting adjourned at 7:55 p.m.
Secretary of the Board
</text>
|
[
{
"content": "<url>\nhttp://hcesd9.org/index.php/monthly-meetings/meeting-archives/2015/158-november-2015-meeting-minutes/file\n</url>\n<text>\nMINUTES OF THE NOVEMBER 19, 2015 MEETING OF THE HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9\n\nA meeting was duly called of the HARRIS COUNTY EMERGENCY SERVICES DISTRICT NO. 9, which was held on November 19, 2015, at the administrative offices of the District, 9630 Telge Drive, Houston, Texas 77095.\n\nThe meeting was called to order at 6:11 p.m. by JEREMY M. MARTINSON, President. Those Commissioners present were JEREMY M. MARTINSON, SUZANNE DAVIS, ROBERT JANUSAITIS, BETTY BOREN AVERY, and SCOTT DeBOER. Also present were KYLE WILLIAMS, District Managing Director, AMY RAMON, Fire Chief of the CY-FAIR VOLUNTEER FIRE DEPARTMENT (the \"Department\"), chief officers and members of the Department, BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper, HOWARD KATZ, of COVELER & KATZ, P.C., the District's Counsel, and members of the public. Also present was Ricardo Martinez, District real estate feasibility consultant and Steve Ferguson of DSF Advisors, District planning consultant.\n\nMs. Avery delivered an invocation.\n\nThe Board received public comment. Colleen Vera addressed the Board and spoke about the refugee issues and to always remember the safety of the firs responders in the terrorism crisis.\n\nMs AVERY recognized Department members and Auxiliary who received Department service awards: Henrietta Crosser (30 years: Auxiliary); Randall Waller (20 years: Station 11); Carlton Sage (20 years: Station 1); Phil Thomas (Lifetime membership award: Station 2).\n\nThe Board addressed the Minutes of the October 22, 2015 regular meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board addressed the Minutes of the November 9, 2015 special meeting. After review, Motion was made by Ms. DAVIS, seconded by Mr.\n\nJANUSAITIS to approve the Minutes. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board then received a Financial Report from BILL RUSSELL, of MYRTLE CRUZ, INC., the District's bookkeeper. Mr. RUSSELL noted the operating account balance following the prior meeting of $1,100,799.22, the receipt of tax revenue in the amount of $7,680.91, tax penalty and interest in the amount of $4,086.05, sales tax receipts of $2,363,692.55, interest of $5,593.27, and ambulance reimbursement for the Department emergency medical services of $472,078.48. Mr. RUSSELL said that dispatching fees of $2,960.00 and other income of $26,373.58 (Jersey Village radio contract payment) were also received. He also noted the balance sheet showed total District assets at $70,993,309.22 ($48,852,607.81 cash/cash equivalents) short-term liabilities of $ -0-, long term liabilities of $ -0-, and equity of $70,993,309.22. Ms. AVERY said that there was a bookkeeping error in the Commissioner checks for this month and she requested that check no. 58708 for $184.70 payable to herself be voided. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to approve the Financial Report. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board addressed the posting of the bookkeeper's report on the District website. Mr. RUSSELL said that the report would need to be redacted as to account numbers. He also said there may be some specific information that the board may not want on the website. Thereupon, after review, Motion was made by Ms. AVERY, seconded by Ms. DAVIS to form a committee to prepare a policy for posting of the bookkeeper's report on the District website. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe compliance certification was delivered for the District investments showing compliance with the District's investment strategy/policy, and that all banks had in place security pledge agreements for the District's excess deposits.\n\nThe Board then addressed District investments. Mr. RUSSELL said no action was required at present\n\nThe Board then addressed action on District depository pledge agreements. Counsel said no action was required at present.\n\nThe Board then addressed administrative bills and commissioner fees as set forth in the Financial Report. After review, Motion was made by Ms. DAVIS, seconded by Mr. DeBOER to approve the payment of District administrative bills and commissioner fees, with the exception of check no. 58708 for $184.70 payable to Ms. Avery. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board then addressed the payment of Department Operations as set forth in the Financial Report. Chief Amy Ramon noted that Operations funding was due at this meeting in the amount of $1,881,774.00. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the payment of Department Operations. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board then addressed the payment of Department Capital funding as set forth in the Financial Report. Chief Ramon noted that Capital funding was due at this meeting in the amount of $228,639.93 (previously scheduled budgeted capital funding). After review, Motion was made by Mr. JANUSAITIS, seconded by Ms. DAVIS to approve the payment of Department Capital. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board addressed revisions to the District 2015 budget. Mr. RUSSELL said there were none.\n\nThe Board addressed revisions to the Department 2015 budget. Chief Ramon said there were none.\n\nThe Board addressed sales tax matters.\n\nThe Board then addressed the KPI's for the District-Department service evaluation and received an update from Steve Ferguson of DSF Advisors on the project. Mr. Ferguson presented a monthly report. He addressed the continuing development of a performance management pilot program. He presented a matrix outline for performance review. He and Ms. AVERY discussed standards. Mr. Ferguson discussed possible standards programs: NFPA 1710 and 1720;\n\nTexas State Fire Marshal standards for fire response as well as other similar standards used by other fire department and local governments in Texas and elsewhere; staffing levels. Ms. DAVIS said that development of a baseline was needed for going forward. Mr. Ferguson addressed personnel levels for volunteer and F/T and P/T personnel. He said the report involved a 6-month look back but advised not to focus on only the 6-month numbers. He said that was just an example to start the analysis. Mr. MARTINSON asked how the average cost/call was determined. Chief Ramon said that for now it was a number determined by the budget divided by the number of calls. Mr. Ferguson said that a part of the report program addressed \"overload\" situations and comparing actual time and the per cent when overloaded calls occurred. Ms. AVERY said this was good to determine when the Department was short on personnel for calls. Mr. DAVIS said she would like to see a trend sheet to show when manpower shortages were occurring. Chief Ramon said that there needed to be a differentiation for instance between situations when an EMS call drops and all ambulances are already on other calls versus when the Department is short on personnel to respond. Mr. Ferguson said the report was for resource management aid and deployment issues.\n\nThe Board then addressed a proposed Interlocal Agreement with Harris County to allow Harris County to utilize space on District communications tower(s) under state and county broadband network programs. Counsel presented a draft Agreement taken from the county template with Counsel's revisions.\n\nThe Board then received a report from Kyle Williams, the District Managing Director. He said the station 98 concrete job was completed. He said there was a concern that people were driving cars and walking on the concrete earlier than permitted but it should not be a problem and he would put more tape up to keep people and cars off. He said no heavy apparatus drove on the concrete. Mr. Williams said the Station 12 parking lot project was delayed due to weather.\n\nMr. Williams and Chief Ramon addressed a problem with sick or overhanging trees that caused a health and safety concern. Chief Ramon said the matter was not an emergency and Counsel said he would place the item on the next agenda.\n\nThe Board then addressed bids received for the purchase of new generator(s) for Station 11. Mr. Williams said bids were received. There was discussion on the kilowattage needed. Chief Ramon said 124kw was sufficient, but a load test would be performed to be sure. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve awarding a contract to Generators of Houston for the project. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board then addressed a proposal to purchase replacement Dispatch computer switches for dispatching functions. Ms. AVERY asked if the system was compatible with the Mitel phone equipment and how much down time was anticipated at Dispatch. Department Communications officer Rusty Caufield said the switches and Mitel equipment were compatible and down time would be minimal. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve proceeding with the project. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board then addressed the Motorola radio system implementation. Department IT Coordinator Mike Hebert said the system was completed.\n\nThe Board addressed the land acquisition for a new station in Bridgeland. Counsel said he would need an executive session on this matter.\n\nThe Board then addressed Station 7 construction options, including the purchase of the site. Counsel said he would need an executive session on this matter.\n\nThe Board addressed the land acquisition for a new station on Wortham. Counsel said he would need an executive session on this matter.\n\nThe Board then received a report from the District architect selection committee. Mr. Martinson and Mr. DeBoer reported on the responses to the RFP. Mr. MARTINSON and Mr. DeBOER said that they conducted interviews with\n\nthree selected respondents, BRW Architects, Martinez Architects, and RandallPorterfield Architects. Mr. MARTINSON said all firms were very good and the other Board members should now have a say and if necessary contact the three selected respondents. Counsel said that the Board has full discretion in making the decision on the architect.\n\nThe Board then received a report on re-construction of driveways and parking areas of Station 11. Mr. Williams said that plans and engineering were completed and he was waiting on the contractor, Houston Decorative Concrete.\n\nThe Board addressed revisions to the Department 2015 budget or quarterly reallocations. Chief Ramon said there were none.\n\nThe District then considered Department 30-day requests. Chief Ramon said there were none.\n\nThe Board then addressed approvals (Agenda Item 24):\n\nBudgeted Capital Expenditures\n\na. Boundtree - Ambu Airway Man Torso w/ CPR software (2) $4,424.00\nb. Physio - LP-15 for EMS Training room $16,954.00\nc. Best Wash - Crossover washer & Dryer Station 6 & Station 8 $8,138.00\nd. CDW G - Desktops (6) & Laptops (7) $23,196.00\n\nMs. AVERY asked if item (c) in the end is for one or two machines. Chief Ramon said one. After review, Motion was made by Ms. DAVIS, seconded by Mr. JANUSAITIS to approve the Items listed, with one washer/dryer. After discussion, the Motion was approved by a vote of 5 to 0.\n\nOperations within Budget\n\na. Comerica Bank - Payroll taxes 11/10/15 $110,000.00\nb. Comerica Bank - Payroll taxes 11/25/15 $110,000.00\nc. Schubot Law Firm - Legal service October 2015 $5,131.00\nd. Vorys - Legal services September 2015 $2,576.00\ne. Tritech - Inform Me Installation/training/support $7,615.00\nf. Collective Data - Unlimited Web licenses for fuel log $4,850.00\ng. HCESD1 - Difficult Airway Class 2/24-2/25/2016 $4,550.00\nh. EMS-FTEP - EMS-FTEP Course $11,000.00\ni. Multiple Ambulance Service Managers Course $6,237.00\nj. Wells & Kimich - Nesting chairs EMS Training Room (20) $2,475.00\nk. Global Industrial - Flip Top Training Tables EMS Training Room (10) $2,770.00\n\nl. Allied Breathing Air – Qtrly. cascade Maint. $2,771.00\nm. ESRI Inc. - ArcGIS Desktop license & Maint. $2,300.00\nn. Access Wireless - Wireless Airline GX450-VD-Wifi (15) $10,487.00\no. Metro Fire - Annual Holmatro Tool Maintenance $12,215.00\np. Firehouse Software - Firehouse software annual renewal $5,355.00\nq. Mitel Business Systems Annual Software and support renewal $27,890.00\nr. CDW G - Fortinet 1 yr Fortigate Network Firewall annual $2,314.00\ns. Anixter - Exacqvision enterprise software renewal $3,472.00\n\nAfter review, Motion was made by Mr. DeBOER, seconded by Mr. JANUSAITIS to approve the Items listed. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board addressed approval of requests to solicit bids and proposals and to approve awards following bids and proposals. Ms. DAVIS asked why this item is listed if the Board cannot take up action under it, such <cursor_is_here> Counsel said the item was to serve as a catch-all for items that covered matters that the Board already addressed or approved. Counsel said that the tree trimming matter had never come up to the Board so there was not a prior opportunity for the Board to discuss it. Counsel said the item was to cover previously reviewed matters that were left off Agenda Item 24. But Counsel said he understood the Commissioner's point and would try to address revised language for the Agenda item.\n\nThe Board received an update on the Department EMS patient satisfaction program.\n\nThe Board received committee reports.\n\nThe Board entered executive session at 7:20 p.m. pursuant to Section 551.072 Government Code, to discuss real estate matters with attorney; and pursuant to Section 551.074 Government Code, to discuss District personnel matters.\n\nThe Board re-entered open session at 7:52 p.m.\n\nThe Board addressed the land acquisition for a new station in Bridgeland. Counsel and Ricardo Martinez, District real estate feasibility consultant discussed the feasibility of the property and proceeding with a closing on the land purchase. Counsel discussed the re-platting obligations of the Seller/developer and the fact\n\nthat the process was still on-going but was expected to be completed shortly, but after closing. The Board reviewed the proposed purchase. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the land acquisition for a new station in Bridgeland and approve payment of the purchase price. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThe Board addressed the existing Station 7 land acquisition and Cherry Park land acquisition. Counsel said the Board approved both Closings at the November 9 special meeting and the Closings will proceed. The Board reviewed both proposed acquisitions. After review, Motion was made by Mr. JANUSAITIS, seconded by Mr. DeBOER to approve closing on the existing Station 7 land acquisition and the Cherry Park land acquisition, and approve payment of the purchase price for both. After discussion, the Motion was approved by a vote of 5 to 0.\n\nThere being no further business brought before the Board nor any further public comment, upon Motion made the meeting adjourned at 7:55 p.m.\n\nSecretary of the Board\n</text>\n",
"role": "user"
},
{
"content": "as for the tree trimming matter.",
"role": "assistant"
}
] |
Essay
India and the Biden Administration
Kanwal Sibal
India-US relations have not been easy in the past and are unlikely to be so in the future. In assessing India-US ties under the Biden administration some underlying drivers of the bilateral relationship as it has evolved over time have to be kept in mind. Big countries like the US and India, not being closed societies and their policies being open to public debate and scrutiny, have foreign policies based on identifiable criteria that gives them a certain steadiness in orientation. Major changes in policies can occur if the international scenario changes substantively and a re-assessment of national interest becomes necessary. This means that neither India nor the US are likely to re-think their basic approach to each other in the current international situation, reflected in the growing content of their bilateral ties.
However, there have always been positive and negative elements in India's ties with the US. What has changed in recent years is that earlier there were more negatives than positives and now the reverse is true. The reasons for this are changes in the global situation, the dilution of US global supremacy, the challenge posed by the rise of China, the shift of global economic and security stakes towards Asia and, of course, the steady rise of India. The Biden administration will have to operate within these realities.
The phase when India and the US were at loggerheads on non-proliferation issues, and India was subjected to technology sanctions, fortunately was closed with the IndiaUS nuclear deal. Although this deal has not yet produced contracts for the supply of US nuclear reactors, it has opened doors in other sensitive areas such as defence where the strides made in the last few years have been impressive. India has purchased USD 20 billion worth of defence equipment from the US, and four key "foundational agreements'' to
National Security Vol.IV Issue II | ISSN 2581-9658 (O)
allow interoperability, sharing of geo-spatial information and sale of high end defence technology to India have been signed. More military-to-military ties are being forged at the ground level. India is now a Major Defence Partner of the US, which makes it eligible for acquisition of equipment and technology on a par with America's NATO allies. India's defence needs will grow to meet the two-front challenge it faces in the north and west, made more real with the recent Chinese aggression against India in Ladakh. Military supplies are a key element in US foreign policy as they create dependencies and are a source of political influence, aside from the profits US defence companies make from export. This part of the relationship will, therefore,
...the China factor has assumed a strategic importance in the development of India-US ties remain unaffected. Key issues for the future would be the extent of transfer of technology and the willingness of the US government and industry to support India's plans to expand domestic defence manufacturing. While statements by the new US Defence Secretary and the Under Secretary for Defence are positive about boosting India as a Major Defence Partner, the outlook on the US seriously contributing to India's project of self-reliance in defence manufacturing is unclear. The visit of the US Defence Secretary to India in March 2021 should give us an insight into the defence agenda of the new US administration related to India.
The China Factor
With the sharp deterioration of US-China ties, the China factor has assumed a strategic importance in the development of India-US ties that did not exist before. The concepts of Quad and the Indo-Pacific have emerged as a result. The US has boosted these two concepts as part of its strategy to counter China's rising maritime challenge. China has succeeded in grabbing strategic space in the South China Sea by reclaiming and militarising islands and reefs without resistance by either the ASEAN or the US. China has unveiled its naval ambitions. It is positioning itself in key countries in the Indian Ocean. Trump was challenging China on trade issues as well as maritime issues, and during his presidency the Indo-Pacific and Quad concepts progressed, though with some tentativeness on the part of its three partners, including India. There were some initial doubts about the commitment of the Biden administration to these two concepts as they are closely tied to Trump's policy towards China. Biden was expected to take a middle path with China. Papers produced by influential US think tanks and journals were seen to be promoting a more accommodative approach. The thrust was in favour of focusing on allies, especially Japan and South Korea, with India mentioned only in passing or as an adjunct to US security policies focused on the western Pacific. Some of the people nominated in key national
security positions have in the past advocated the necessity of engaging China, even as the US counters its expansionism.
The balance between confrontation, competition and co-existence that would be struck by the US in the coming months with China would be difficult to anticipate. It appears that despite the internal pressures from US business in favour of accommodation, the overall political and public mood is to effectively counter the Chinese threat. Statements from President Biden, Secretary of State Blinken and others suggest an aggressive push back. The Interim National Security Strategic Guidance (INSSG) announced by Biden in March, speaks of holding China to account, with emphasis on reaffirming ties with allies like Australia, Japan, and South Korea, and recognising that America's "vital national interests compel the deepest connection to the Indo-Pacific" and deterring "Chinese aggression". It accuses China's leaders of seeking "unfair advantages", behaving "aggressively and
India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy...
coercively", and undermining "the rules and values at the heart of an open and stable international system". It speaks of confronting China's "unfair and illegal trade practices, cyber theft, and coercive economic practices" that seek to erode America's "strategic advantage and national competitiveness", and that the US "will ensure that our supply chains for critical national security technologies and medical supplies are secure." The US, it says, will "support China's neighbors and commercial partners in defending their rights to make independent political choices free of coercion or undue foreign influence" and "promote locally-led development to combat the manipulation of local priorities" (strictures against the BRI). Support for Taiwan and standing up for democracy, human rights, and human dignity, including in Hong Kong, Xinjiang, and Tibet, are mentioned. The document also speaks of welcoming "the Chinese government's cooperation on issues such as climate change, global health security, arms control, and nonproliferation where our national fates are intertwined". In this, the US will rally its allies and partners to join it, with a view to "pooling our negotiating leverage". The agenda of confrontation with China is clear in this document, what is not clear is the importance attached to India in pursuing it. "We will deepen our partnership with India" the document says, but besides this there is no other reference to India in the 23-page document. India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy and not be manoeuvred into a situation where the gains to the two sides are not reasonably balanced in pursuing this strategy.
The Quad has already met at Foreign Ministers' level and is slated to meet virtually at the summit level. This will commit India to the US vision of Quad as a security project,
a vision that India has been trying to distance itself from, as this has implications for its relations with China as the two countries work for disengagement in Ladakh. It could also affect India's relations with Russia which is openly opposed to both the Quad and the IndoPacific concept as Cold War strategies, this time aimed at China. Moreover, it is too early to say definitively what will be the trajectory of US-China ties as they are economically still very dense. Decoupling will not be easy as US companies, as well as European, will not turn their backs on the huge Chinese market. China's emergence as the world's second largest economy gives it a role that cannot be ignored. However, New Delhi could benefit if some American companies move their investments from China to India. How India can benefit from shared concerns about resilient supply chains would be a challenge. The task will be to successfully marry this idea with the government's plans for an 'atmanirbhar' Indian economy and promoting national champions that would be able to compete internationally. The US has concerns about these plans and perceives them as moves towards protectionism.
US concerns about China's connectivity projects, as reflected in the INSSG document, could open-up possibilities of Indo-US cooperation in developing "resilient infrastructure", including in Africa, an area listed in the INSSG document for higher US attention. Developing 5G networks to counter China's advance over others in this vitally important area can be carried forward with US partners. Areas such as AI and Quantum computing offer scope for higher India-US cooperation in innovative technologies. Given the threats to cyberspace, made more pressing by China's attempt to hack into India's power sector, underlines the importance of India and the US working together to frame new global norms in cyberspace, a US goal listed in the INSSG. Along with these potential areas of expanding technological cooperation, New Delhi also needs to carefully watch if tighter US rules on access to American technology-- a move directed against China -would create problems for other countries like India.
Trade Issues
On the economic side, India and the US have seen impressive growth in bilateral trade in goods and services, which have reached almost $146 billion. But the two sides were unable to resolve some pending trade issues despite intensive discussions when Trump was in power. India has always had difficult ties with United States Trade Representatives (USTRs), with constant pressure on India on issues of tariff, local content, market opening, lifting caps on foreign investment in sectors of interest to the US and regulation. Biden has already announced his version of America First by emphasising 'buy American'. He has also said that the US will be in no hurry to look at any new Free Trade Agreement
(FTA) until an assessment has been made of the impact of FTAs on the US economy. The INSSG document reiterates this, emphasising that the US will press for elevated labour and environmental standards in any new trade deal. Biden has ruled out the US joining the Trans-Pacific Partnership (TPP) in its present avatar. This means that China will not be challenged economically in Asia and the Regional Comprehensive Economic Partnership (RCEP) will not be countered. India and the US were unable to resolve some outstanding market access issues despite several rounds of negotiations. Whether the two sides will pick up the same agenda or have a more ambitious one is not clear at this stage. Apparently, negotiations are continuing. Some of the issues will be difficult to negotiate such as differences over data protection and privacy laws, digital tax on e-commerce, and regulating the operation of US social media giants. These are over and above the issues of market access covering tariffs, IT, agricultural and medical products, restoration of the Generalised System of Preferences (GSP) benefits, etc. On India's concerns about H1B visas the Biden administration is more accommodating.
Ties with Russia
With the collapse of the Soviet Union and the decline of Russian power, India's long-standing ties with Russia are no longer seen by the US through an ideological prism. This historical deep irritant in India-US ties no longer has the same salience. Nevertheless,
Russia has become a factor in the management of IndoUS relations. Earlier, during the Trump presidency, the US Congress, the intelligence agencies, the think-tanks and the media were fuelling anti-Russian sentiments which Trump tried to contain, although not too successfully as a slew of sanctions were imposed
...the US will press for elevated labour and environmental standards in any new trade deal.
on Russia and the Countering America's Adversaries Through Sanctions Act (CAATSA) legislation was framed to disrupt third country ties with Russia, particularly in the areas of defence. Biden himself and his key appointees, including the Secretary of State and the National Security Adviser, are deeply anti-Russian. This will test India's ability to isolate its Russia ties from those with the US. India's ties with Russia, already under some strain, are far too important to be sacrificed for what seems an irrational US policy towards Moscow. Once India begins to get deliveries of the S-400 system, the waiver for India under CAATSA will be tested, a waiver denied to Turkey. India is not a US ally, it is not member of NATO, its armed forces are not integrated with NATO and its systems, and therefore, logically, India cannot be bracketed with Turkey. India's case is political and not military. If the US wants to strengthen ties, increase its share of India's defence programmes and not seriously erode the trust that has been built in recent years, as well as not raise questions in India's mind
about the Quad and the Indo-Pacific as strategies that India should fully embrace, it would be politically self-defeating on the part of the US to impose any CAATSA related sanctions. India cannot afford to be a collateral damage in US failure to manage its ties with Russia. CAATSA had also damaged India's relations with Iran. With Biden looking for re-entering the Joint Comprehensive Plan of Action (JCPOA) on the Iran nuclear programme, subject to some difficult conditions, the prospect of restoring energy ties with Iran can be envisaged.
The so-called bi-partisan support for India in the US Congress and positive sentiments towards India in the US system as a whole has been a result of many factors: the opening up of the Indian economy, the "Chindia" narrative that held the promise of a huge Indian market for US corporations, the increasing role of the India-American community in American political life, universities, the Silicon Valley, and, of course, the rising threat of China to US power. But the asymmetries in power between the two countries in all domains continue to generate creases in ties. The US as a global power is prone to balance its interests in various regions, including Southern Asia. Its policy toward Pakistan is based on its interests, not India's. If it is responsive to India's terrorism concerns it is because it has its own independent concerns about Pakistan. The expression of joint concerns with India on the activities of jihadi groups in Pakistan serves as a point of pressure on the latter, while giving New Delhi some political satisfaction. However, America's unwillingness to apply sanctions on Pakistan, even a diluted version of the kind applied on Iran and Russia, as well as its willingness to negotiate equal to equal with a terrorist organisation like the Taliban and open doors for it to come to power in Afghanistan is divorced from India's regional interests.
The Biden administration has given early signs of a softer posture towards Pakistan, with the new US Defence Secretary expressing views in favour of restoring military training under International Military Education and Training (IMET). Its Afghan policy has not yet
India cannot afford to be a collateral damage in US failure to manage its ties with Russia.
taken shape, but the re-appointment of Zalmay Khalilzad may not be a good sign. It has announced its intention to review the Taliban deal, but if it wants to withdraw from Afghanistan it has no other choice than to pursue the agreement with the Taliban, for which it will continue to rely on Pakistani facilitation. The US has welcomed the recent ceasefire agreement between India and Pakistan and hinted it had a role. Indirectly, the US has been interfering in Jammu and Kashmir to Pakistan's advantage by commenting on the internal situation there, on the lockdown, the detention of Kashmiri leaders, the restrictions on access to the internet, which are issues of no direct concern to the US. Islamism oriented members of the US Congress and some Indian origin legislators
with pronounced leftist bias have been commenting adversely in this vein on developments in J&K. The US has always failed to satisfy India on its position on Pakistan and this will continue under the Biden Presidency which has many Indian-origin appointees in the White House whose attitude towards India is suspect, to say the least.
Human Rights and Other Issues
The progressive wing of the Democratic Party has some powerful but uninformed India-baiters like Bernie Sanders. The Trump administration de-emphasised human rights as an instrument of US policy, but the Biden administration seems determined to restore human rights as a core element of US foreign policy. The INSSG document says that the US "will ensure that U.S. companies do not sacrifice American values in doing business in China. And we will stand up for democracy, human rights, and human dignity, including in Hong Kong, Xinjiang, and Tibet". While China coming under pressure on human rights may give us some satisfaction, this is also a weapon that could be ironically directed at India. Jake Sullivan, the NSA, is on record before he took office that the US will raise human rights issues with India frankly in private and more discreetly in public. India experts in the US have been warning that India should be prepared for the Biden administration to raise the issue of human rights, as if India is answerable to the US.
The human rights instrument is in fact a matter of differential of power. The narrative of opposition groups in India, including civil society activists, that are lurid at times in evoking Nazism, fascism, genocide, minorities in danger, intolerance, lynching, institutional decay, compliant judges, muzzled media, suppression of dissent, curbs on NGOs, backsliding of democracy, has been assimilated by traditional anti-Indian lobbies in the US, especially in the mainstream media. Even the leaders of the India Caucus have expressed concerns. The latest salvo is from Freedom House, which is almost totally financed by the US government. India will have to decide if it will take such exaggerated and at times fabricated criticism head-on and engage in polemics in return, or push-back without allowing these issues to gain undue prominence in bilateral ties. The US needs to understand that it will be doing great dis-service to ties by making human rights an unnecessary irritant, especially when democracy and race relations in the US are under a serious cloud.
The INSSG speaks of the US intention to "convene a global Summit for Democracy to ensure broad cooperation among allies and partners on the interests and values we hold most dear". India will of course participate as a democracy, though the diplomatic thrust of this initiative would be against the authoritarian regimes of China and Russia.
Finally, unlike the Trump administration which had walked out of the Paris Agreement on Climate Change, the US has rejoined the agreement immediately on Biden assuming office. Biden is obsessed with climate change issues. During his visit to India in 2013 as Vice-President his public address focused largely on climate change. He has appointed former Secretary of State John Kerry as US Climate Change envoy. Kerry has already signalled that his focus will be on big carbon gas emitters like China and India, without considering the significantly smaller total Indian emissions compared to the US and Chinese, and India's extremely low per capita emissions. India has positioned itself well by announcing at the COP 26 in Glasgow in November 2020 its success in meeting the Nationally Determined Contribution (NDC) commitments on time, its large renewable energy and energy saving programmes, expansion of forest cover as carbon sinks, the leadership of the International Solar Alliance, etc. But India will be pressed by the US and others to fix a year for becoming a carbon neutral economy, emulating China (2060) and the EU (2050). The US is expected to fix 2050 as its target year too. India is likely to resist, calling for developed countries to meet their financial commitments and for climate justice. Difficult negotiations between India and the US lie ahead.
|
<urn:uuid:6bf4b584-4a6f-4e38-8d4f-b86396a5f4e1>
|
CC-MAIN-2021-43
|
https://www.vifindia.org/sites/default/files/national-security-vol-4-issue-2-essay-KSibal.pdf
|
2021-10-17T14:44:44+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00236-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 1,295,773,448
| 4,059
|
eng_Latn
|
eng_Latn
| 0.999246
|
eng_Latn
| 0.999328
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1991,
4898,
7922,
10812,
13801,
16863,
19677,
21048
] |
Essay
India and the Biden Administration
Kanwal Sibal
India-US relations have not been easy in the past and are unlikely to be so in the future. In assessing India-US ties under the Biden administration some underlying drivers of the bilateral relationship as it has evolved over time have to be kept in mind. Big countries like the US and India, not being closed societies and their policies being open to public debate and scrutiny, have foreign policies based on identifiable criteria that gives them a certain steadiness in orientation. Major changes in policies can occur if the international scenario changes substantively and a re-assessment of national interest becomes necessary. This means that neither India nor the US are likely to re-think their basic approach to each other in the current international situation, reflected in the growing content of their bilateral ties.
However, there have always been positive and negative elements in India's ties with the US. What has changed in recent years is that earlier there were more negatives than positives and now the reverse is true. The reasons for this are changes in the global situation, the dilution of US global supremacy, the challenge posed by the rise of China, the shift of global economic and security stakes towards Asia and, of course, the steady rise of India. The Biden administration will have to operate within these realities.
The phase when India and the US were at loggerheads on non-proliferation issues, and India was subjected to technology sanctions, fortunately was closed with the IndiaUS nuclear deal. Although this deal has not yet produced contracts for the supply of US nuclear reactors, it has opened doors in other sensitive areas such as defence where the strides made in the last few years have been impressive. India has purchased USD 20 billion worth of defence equipment from the US, and four key "foundational agreements'' to
National Security Vol.IV Issue II | ISSN 2581-9658 (O)
allow interoperability, sharing of geo-spatial information and sale of high end defence technology to India have been signed. More military-to-military ties are being forged at the ground level. India is now a Major Defence Partner of the US, which makes it eligible for acquisition of equipment and technology on a par with America's NATO allies. India's defence needs will grow to meet the two-front challenge it faces in the north and west, made more real with the recent Chinese aggression against India in Ladakh. Military supplies are a key element in US foreign policy as they create dependencies and are a source of political influence, aside from the profits US defence companies make from export. This part of the relationship will, therefore,
...the China factor has assumed a strategic importance in the development of India-US ties remain unaffected. Key issues for the future would be the extent of transfer of technology and the willingness of the US government and industry to support India's plans to expand domestic defence manufacturing. While statements by the new US Defence Secretary and the Under Secretary for Defence are positive about boosting India as a Major Defence Partner, the outlook on the US seriously contributing to India's project of self-reliance in defence manufacturing is unclear. The visit of the US Defence Secretary to India in March 2021 should give us an insight into the defence agenda of the new US administration related to India.
The China Factor
With the sharp deterioration of US-China ties, the China factor has assumed a strategic importance in the development of India-US ties that did not exist before. The concepts of Quad and the Indo-Pacific have emerged as a result. The US has boosted these two concepts as part of its strategy to counter China's rising maritime challenge. China has succeeded in grabbing strategic space in the South China Sea by reclaiming and militarising islands and reefs without resistance by either the ASEAN or the US. China has unveiled its naval ambitions. It is positioning itself in key countries in the Indian Ocean. Trump was challenging China on trade issues as well as maritime issues, and during his presidency the Indo-Pacific and Quad concepts progressed, though with some tentativeness on the part of its three partners, including India. There were some initial doubts about the commitment of the Biden administration to these two concepts as they are closely tied to Trump's policy towards China. Biden was expected to take a middle path with China. Papers produced by influential US think tanks and journals were seen to be promoting a more accommodative approach. The thrust was in favour of focusing on allies, especially Japan and South Korea, with India mentioned only in passing or as an adjunct to US security policies focused on the western Pacific. Some of the people nominated in key national
security positions have in the past advocated the necessity of engaging China, even as the US counters its expansionism.
The balance between confrontation, competition and co-existence that would be struck by the US in the coming months with China would be difficult to anticipate. It appears that despite the internal pressures from US business in favour of accommodation, the overall political and public mood is to effectively counter the Chinese threat. Statements from President Biden, Secretary of State Blinken and others suggest an aggressive push back. The Interim National Security Strategic Guidance (INSSG) announced by Biden in March, speaks of holding China to account, with emphasis on reaffirming ties with allies like Australia, Japan, and South Korea, and recognising that America's "vital national interests compel the deepest connection to the Indo-Pacific" and deterring "Chinese aggression". It accuses China's leaders of seeking "unfair advantages", behaving "aggressively and
India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy...
coercively", and undermining "the rules and values at the heart of an open and stable international system". It speaks of confronting China's "unfair and illegal trade practices, cyber theft, and coercive economic practices" that seek to erode America's "strategic advantage and national competitiveness", and that the US "will ensure that our supply chains for critical national security technologies and medical supplies are secure." The US, it says, will "support China's neighbors and commercial partners in defending their rights to make independent political choices free of coercion or undue foreign influence" and "promote locally-led development to combat the manipulation of local priorities" (strictures against the BRI). Support for Taiwan and standing up for democracy, human rights, and human dignity, including in Hong Kong, Xinjiang, and Tibet, are mentioned. The document also speaks of welcoming "the Chinese government's cooperation on issues such as climate change, global health security, arms control, and nonproliferation where our national fates are intertwined". In this, the US will rally its allies and partners to join it, with a view to "pooling our negotiating leverage". The agenda of confrontation with China is clear in this document, what is not clear is the importance attached to India in pursuing it. "We will deepen our partnership with India" the document says, but besides this there is no other reference to India in the 23-page document. India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy and not be manoeuvred into a situation where the gains to the two sides are not reasonably balanced in pursuing this strategy.
The Quad has already met at Foreign Ministers' level and is slated to meet virtually at the summit level. This will commit India to the US vision of Quad as a security project,
a vision that India has been trying to distance itself from, as this has implications for its relations with China as the two countries work for disengagement in Ladakh. It could also affect India's relations with Russia which is openly opposed to both the Quad and the IndoPacific concept as Cold War strategies, this time aimed at China. Moreover, it is too early to say definitively what will be the trajectory of US-China ties as they are economically still very dense. Decoupling will not be easy as US companies, as well as European, will not turn their backs on the huge Chinese market. China's emergence as the world's second largest economy gives it a role that cannot be ignored. However, New Delhi could benefit if some American companies move their investments from China to India. How India can benefit from shared concerns about resilient supply chains would be a challenge. The task will be to successfully marry this idea with the government's plans for an 'atmanirbhar' Indian economy and promoting national champions that would be able to compete internationally. The US has concerns about these plans and perceives them as moves towards protectionism.
US concerns about China's connectivity projects, as reflected in the INSSG document, could open-up possibilities of Indo-US cooperation in developing "resilient infrastructure", including in Africa, an area listed in the INSSG document for higher US attention. Developing 5G networks to counter China's advance over others in this vitally important area can be carried forward with US partners. Areas such as AI and Quantum computing offer scope for higher India-US cooperation in innovative technologies. Given the threats to cyberspace, made more pressing by China's attempt to hack into India's power sector, underlines the importance of India and the US working together to frame new global norms in cyberspace, a US goal listed in the INSSG. Along with these potential areas of expanding technological cooperation, New Delhi also needs to carefully watch if tighter US rules on access to American technology-- a move directed against China -would create problems for other countries like India.
Trade Issues
On the economic side, India and the US have seen impressive growth in bilateral trade in goods and services, which have reached almost $146 billion. But the two sides were unable to resolve some pending trade issues despite intensive discussions when Trump was in power. India has always had difficult ties with United States Trade Representatives (USTRs), with constant pressure on India on issues of tariff, local content, market opening, lifting caps on foreign investment in sectors of interest to the US and regulation. Biden has already announced his version of America First by emphasising 'buy American'. He has also said that the US will be in no hurry to look at any new Free Trade Agreement
(FTA) until an assessment has been made of the impact of FTAs on the US economy. The INSSG document reiterates this, emphasising that the US will press for elevated labour and environmental standards in any new trade deal. Biden has ruled out the US joining the Trans-Pacific Partnership (TPP) in its present avatar. This means that China will not be challenged economically in Asia and the Regional Comprehensive Economic Partnership (RCEP) will not be countered. India and the US were unable to resolve some outstanding market access issues despite several rounds of negotiations. Whether the two sides will pick up the same agenda or have a more ambitious one is not clear at this stage. Apparently, negotiations are continuing. Some of the issues will be difficult to negotiate such as differences over data protection and privacy laws, digital tax on e-commerce, and regulating the operation of US social media giants. These are over and above the issues of market access covering tariffs, IT, agricultural and medical products, restoration of the Generalised System of Preferences (GSP) benefits, etc. On India's concerns about H1B visas the Biden administration is more accommodating.
Ties with Russia
With the collapse of the Soviet Union and the decline of Russian power, India's long-standing ties with Russia are no longer seen by the US through an ideological prism. This historical deep irritant in India-US ties no longer has the same salience. Nevertheless,
Russia has become a factor in the management of IndoUS relations. Earlier, during the Trump presidency, the US Congress, the intelligence agencies, the think-tanks and the media were fuelling anti-Russian sentiments which Trump tried to contain, although not too successfully as a slew of sanctions were imposed
...the US will press for elevated labour and environmental standards in any new trade deal.
on Russia and the Countering America's Adversaries Through Sanctions Act (CAATSA) legislation was framed to disrupt third country ties with Russia, particularly in the areas of defence. Biden himself and his key appointees, including the Secretary of State and the National Security Adviser, are deeply anti-Russian. This will test India's ability to isolate its Russia ties from those with the US. India's ties with Russia, already under some strain, are far too important to be sacrificed for what seems an irrational US policy towards Moscow. Once India begins to get deliveries of the S-400 system, the waiver for India under CAATSA will be tested, a waiver denied to Turkey. India is not a US ally, it is not member of NATO, its armed forces are not integrated with NATO and its systems, and therefore, logically, India cannot be bracketed with Turkey. India's case is political and not military. If the US wants to strengthen ties, increase its share of India's defence programmes and not seriously erode the trust that has been built in recent years, as well as not raise questions in India's mind
about the Quad and the Indo-Pacific as strategies that India should fully embrace, it would be politically self-defeating on the part of the US to impose any CAATSA related sanctions. India cannot afford to be a collateral damage in US failure to manage its ties with Russia. CAATSA had also damaged India's relations with Iran. With Biden looking for re-entering the Joint Comprehensive Plan of Action (JCPOA) on the Iran nuclear programme, subject to some difficult conditions, the prospect of restoring energy ties with Iran can be envisaged.
The so-called bi-partisan support for India in the US Congress and positive sentiments towards India in the US system as a whole has been a result of many factors: the opening up of the Indian economy, the "Chindia" narrative that held the promise of a huge Indian market for US corporations, the increasing role of the India-American community in American political life, universities, the Silicon Valley, and, of course, the rising threat of China to US power. But the asymmetries in power between the two countries in all domains continue to generate creases in ties. The US as a global power is prone to balance its interests in various regions, including Southern Asia. Its policy toward Pakistan is based on its interests, not India's. If it is responsive to India's terrorism concerns it is because it has its own independent concerns about Pakistan. The expression of joint concerns with India on the activities of jihadi groups in Pakistan serves as a point of pressure on the latter, while giving New Delhi some political satisfaction. However, America's unwillingness to apply sanctions on Pakistan, even a diluted version of the kind applied on Iran and Russia, as well as its willingn
|
ess to negotiate equal to equal with a terrorist organisation like the Taliban and open doors for it to come to power in Afghanistan is divorced from India's regional interests.
| 15,547
|
inside_word
|
willingness
|
remove_all
|
<url>
https://www.vifindia.org/sites/default/files/national-security-vol-4-issue-2-essay-KSibal.pdf
</url>
<text>
Essay
India and the Biden Administration
Kanwal Sibal
India-US relations have not been easy in the past and are unlikely to be so in the future. In assessing India-US ties under the Biden administration some underlying drivers of the bilateral relationship as it has evolved over time have to be kept in mind. Big countries like the US and India, not being closed societies and their policies being open to public debate and scrutiny, have foreign policies based on identifiable criteria that gives them a certain steadiness in orientation. Major changes in policies can occur if the international scenario changes substantively and a re-assessment of national interest becomes necessary. This means that neither India nor the US are likely to re-think their basic approach to each other in the current international situation, reflected in the growing content of their bilateral ties.
However, there have always been positive and negative elements in India's ties with the US. What has changed in recent years is that earlier there were more negatives than positives and now the reverse is true. The reasons for this are changes in the global situation, the dilution of US global supremacy, the challenge posed by the rise of China, the shift of global economic and security stakes towards Asia and, of course, the steady rise of India. The Biden administration will have to operate within these realities.
The phase when India and the US were at loggerheads on non-proliferation issues, and India was subjected to technology sanctions, fortunately was closed with the IndiaUS nuclear deal. Although this deal has not yet produced contracts for the supply of US nuclear reactors, it has opened doors in other sensitive areas such as defence where the strides made in the last few years have been impressive. India has purchased USD 20 billion worth of defence equipment from the US, and four key "foundational agreements'' to
National Security Vol.IV Issue II | ISSN 2581-9658 (O)
allow interoperability, sharing of geo-spatial information and sale of high end defence technology to India have been signed. More military-to-military ties are being forged at the ground level. India is now a Major Defence Partner of the US, which makes it eligible for acquisition of equipment and technology on a par with America's NATO allies. India's defence needs will grow to meet the two-front challenge it faces in the north and west, made more real with the recent Chinese aggression against India in Ladakh. Military supplies are a key element in US foreign policy as they create dependencies and are a source of political influence, aside from the profits US defence companies make from export. This part of the relationship will, therefore,
...the China factor has assumed a strategic importance in the development of India-US ties remain unaffected. Key issues for the future would be the extent of transfer of technology and the willingness of the US government and industry to support India's plans to expand domestic defence manufacturing. While statements by the new US Defence Secretary and the Under Secretary for Defence are positive about boosting India as a Major Defence Partner, the outlook on the US seriously contributing to India's project of self-reliance in defence manufacturing is unclear. The visit of the US Defence Secretary to India in March 2021 should give us an insight into the defence agenda of the new US administration related to India.
The China Factor
With the sharp deterioration of US-China ties, the China factor has assumed a strategic importance in the development of India-US ties that did not exist before. The concepts of Quad and the Indo-Pacific have emerged as a result. The US has boosted these two concepts as part of its strategy to counter China's rising maritime challenge. China has succeeded in grabbing strategic space in the South China Sea by reclaiming and militarising islands and reefs without resistance by either the ASEAN or the US. China has unveiled its naval ambitions. It is positioning itself in key countries in the Indian Ocean. Trump was challenging China on trade issues as well as maritime issues, and during his presidency the Indo-Pacific and Quad concepts progressed, though with some tentativeness on the part of its three partners, including India. There were some initial doubts about the commitment of the Biden administration to these two concepts as they are closely tied to Trump's policy towards China. Biden was expected to take a middle path with China. Papers produced by influential US think tanks and journals were seen to be promoting a more accommodative approach. The thrust was in favour of focusing on allies, especially Japan and South Korea, with India mentioned only in passing or as an adjunct to US security policies focused on the western Pacific. Some of the people nominated in key national
security positions have in the past advocated the necessity of engaging China, even as the US counters its expansionism.
The balance between confrontation, competition and co-existence that would be struck by the US in the coming months with China would be difficult to anticipate. It appears that despite the internal pressures from US business in favour of accommodation, the overall political and public mood is to effectively counter the Chinese threat. Statements from President Biden, Secretary of State Blinken and others suggest an aggressive push back. The Interim National Security Strategic Guidance (INSSG) announced by Biden in March, speaks of holding China to account, with emphasis on reaffirming ties with allies like Australia, Japan, and South Korea, and recognising that America's "vital national interests compel the deepest connection to the Indo-Pacific" and deterring "Chinese aggression". It accuses China's leaders of seeking "unfair advantages", behaving "aggressively and
India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy...
coercively", and undermining "the rules and values at the heart of an open and stable international system". It speaks of confronting China's "unfair and illegal trade practices, cyber theft, and coercive economic practices" that seek to erode America's "strategic advantage and national competitiveness", and that the US "will ensure that our supply chains for critical national security technologies and medical supplies are secure." The US, it says, will "support China's neighbors and commercial partners in defending their rights to make independent political choices free of coercion or undue foreign influence" and "promote locally-led development to combat the manipulation of local priorities" (strictures against the BRI). Support for Taiwan and standing up for democracy, human rights, and human dignity, including in Hong Kong, Xinjiang, and Tibet, are mentioned. The document also speaks of welcoming "the Chinese government's cooperation on issues such as climate change, global health security, arms control, and nonproliferation where our national fates are intertwined". In this, the US will rally its allies and partners to join it, with a view to "pooling our negotiating leverage". The agenda of confrontation with China is clear in this document, what is not clear is the importance attached to India in pursuing it. "We will deepen our partnership with India" the document says, but besides this there is no other reference to India in the 23-page document. India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy and not be manoeuvred into a situation where the gains to the two sides are not reasonably balanced in pursuing this strategy.
The Quad has already met at Foreign Ministers' level and is slated to meet virtually at the summit level. This will commit India to the US vision of Quad as a security project,
a vision that India has been trying to distance itself from, as this has implications for its relations with China as the two countries work for disengagement in Ladakh. It could also affect India's relations with Russia which is openly opposed to both the Quad and the IndoPacific concept as Cold War strategies, this time aimed at China. Moreover, it is too early to say definitively what will be the trajectory of US-China ties as they are economically still very dense. Decoupling will not be easy as US companies, as well as European, will not turn their backs on the huge Chinese market. China's emergence as the world's second largest economy gives it a role that cannot be ignored. However, New Delhi could benefit if some American companies move their investments from China to India. How India can benefit from shared concerns about resilient supply chains would be a challenge. The task will be to successfully marry this idea with the government's plans for an 'atmanirbhar' Indian economy and promoting national champions that would be able to compete internationally. The US has concerns about these plans and perceives them as moves towards protectionism.
US concerns about China's connectivity projects, as reflected in the INSSG document, could open-up possibilities of Indo-US cooperation in developing "resilient infrastructure", including in Africa, an area listed in the INSSG document for higher US attention. Developing 5G networks to counter China's advance over others in this vitally important area can be carried forward with US partners. Areas such as AI and Quantum computing offer scope for higher India-US cooperation in innovative technologies. Given the threats to cyberspace, made more pressing by China's attempt to hack into India's power sector, underlines the importance of India and the US working together to frame new global norms in cyberspace, a US goal listed in the INSSG. Along with these potential areas of expanding technological cooperation, New Delhi also needs to carefully watch if tighter US rules on access to American technology-- a move directed against China -would create problems for other countries like India.
Trade Issues
On the economic side, India and the US have seen impressive growth in bilateral trade in goods and services, which have reached almost $146 billion. But the two sides were unable to resolve some pending trade issues despite intensive discussions when Trump was in power. India has always had difficult ties with United States Trade Representatives (USTRs), with constant pressure on India on issues of tariff, local content, market opening, lifting caps on foreign investment in sectors of interest to the US and regulation. Biden has already announced his version of America First by emphasising 'buy American'. He has also said that the US will be in no hurry to look at any new Free Trade Agreement
(FTA) until an assessment has been made of the impact of FTAs on the US economy. The INSSG document reiterates this, emphasising that the US will press for elevated labour and environmental standards in any new trade deal. Biden has ruled out the US joining the Trans-Pacific Partnership (TPP) in its present avatar. This means that China will not be challenged economically in Asia and the Regional Comprehensive Economic Partnership (RCEP) will not be countered. India and the US were unable to resolve some outstanding market access issues despite several rounds of negotiations. Whether the two sides will pick up the same agenda or have a more ambitious one is not clear at this stage. Apparently, negotiations are continuing. Some of the issues will be difficult to negotiate such as differences over data protection and privacy laws, digital tax on e-commerce, and regulating the operation of US social media giants. These are over and above the issues of market access covering tariffs, IT, agricultural and medical products, restoration of the Generalised System of Preferences (GSP) benefits, etc. On India's concerns about H1B visas the Biden administration is more accommodating.
Ties with Russia
With the collapse of the Soviet Union and the decline of Russian power, India's long-standing ties with Russia are no longer seen by the US through an ideological prism. This historical deep irritant in India-US ties no longer has the same salience. Nevertheless,
Russia has become a factor in the management of IndoUS relations. Earlier, during the Trump presidency, the US Congress, the intelligence agencies, the think-tanks and the media were fuelling anti-Russian sentiments which Trump tried to contain, although not too successfully as a slew of sanctions were imposed
...the US will press for elevated labour and environmental standards in any new trade deal.
on Russia and the Countering America's Adversaries Through Sanctions Act (CAATSA) legislation was framed to disrupt third country ties with Russia, particularly in the areas of defence. Biden himself and his key appointees, including the Secretary of State and the National Security Adviser, are deeply anti-Russian. This will test India's ability to isolate its Russia ties from those with the US. India's ties with Russia, already under some strain, are far too important to be sacrificed for what seems an irrational US policy towards Moscow. Once India begins to get deliveries of the S-400 system, the waiver for India under CAATSA will be tested, a waiver denied to Turkey. India is not a US ally, it is not member of NATO, its armed forces are not integrated with NATO and its systems, and therefore, logically, India cannot be bracketed with Turkey. India's case is political and not military. If the US wants to strengthen ties, increase its share of India's defence programmes and not seriously erode the trust that has been built in recent years, as well as not raise questions in India's mind
about the Quad and the Indo-Pacific as strategies that India should fully embrace, it would be politically self-defeating on the part of the US to impose any CAATSA related sanctions. India cannot afford to be a collateral damage in US failure to manage its ties with Russia. CAATSA had also damaged India's relations with Iran. With Biden looking for re-entering the Joint Comprehensive Plan of Action (JCPOA) on the Iran nuclear programme, subject to some difficult conditions, the prospect of restoring energy ties with Iran can be envisaged.
The so-called bi-partisan support for India in the US Congress and positive sentiments towards India in the US system as a whole has been a result of many factors: the opening up of the Indian economy, the "Chindia" narrative that held the promise of a huge Indian market for US corporations, the increasing role of the India-American community in American political life, universities, the Silicon Valley, and, of course, the rising threat of China to US power. But the asymmetries in power between the two countries in all domains continue to generate creases in ties. The US as a global power is prone to balance its interests in various regions, including Southern Asia. Its policy toward Pakistan is based on its interests, not India's. If it is responsive to India's terrorism concerns it is because it has its own independent concerns about Pakistan. The expression of joint concerns with India on the activities of jihadi groups in Pakistan serves as a point of pressure on the latter, while giving New Delhi some political satisfaction. However, America's unwillingness to apply sanctions on Pakistan, even a diluted version of the kind applied on Iran and Russia, as well as its willingn<cursor_is_here>
</text>
|
[
{
"content": "<url>\nhttps://www.vifindia.org/sites/default/files/national-security-vol-4-issue-2-essay-KSibal.pdf\n</url>\n<text>\nEssay\n\nIndia and the Biden Administration\n\nKanwal Sibal\n\nIndia-US relations have not been easy in the past and are unlikely to be so in the future. In assessing India-US ties under the Biden administration some underlying drivers of the bilateral relationship as it has evolved over time have to be kept in mind. Big countries like the US and India, not being closed societies and their policies being open to public debate and scrutiny, have foreign policies based on identifiable criteria that gives them a certain steadiness in orientation. Major changes in policies can occur if the international scenario changes substantively and a re-assessment of national interest becomes necessary. This means that neither India nor the US are likely to re-think their basic approach to each other in the current international situation, reflected in the growing content of their bilateral ties.\n\nHowever, there have always been positive and negative elements in India's ties with the US. What has changed in recent years is that earlier there were more negatives than positives and now the reverse is true. The reasons for this are changes in the global situation, the dilution of US global supremacy, the challenge posed by the rise of China, the shift of global economic and security stakes towards Asia and, of course, the steady rise of India. The Biden administration will have to operate within these realities.\n\nThe phase when India and the US were at loggerheads on non-proliferation issues, and India was subjected to technology sanctions, fortunately was closed with the IndiaUS nuclear deal. Although this deal has not yet produced contracts for the supply of US nuclear reactors, it has opened doors in other sensitive areas such as defence where the strides made in the last few years have been impressive. India has purchased USD 20 billion worth of defence equipment from the US, and four key \"foundational agreements'' to\n\nNational Security Vol.IV Issue II | ISSN 2581-9658 (O)\n\nallow interoperability, sharing of geo-spatial information and sale of high end defence technology to India have been signed. More military-to-military ties are being forged at the ground level. India is now a Major Defence Partner of the US, which makes it eligible for acquisition of equipment and technology on a par with America's NATO allies. India's defence needs will grow to meet the two-front challenge it faces in the north and west, made more real with the recent Chinese aggression against India in Ladakh. Military supplies are a key element in US foreign policy as they create dependencies and are a source of political influence, aside from the profits US defence companies make from export. This part of the relationship will, therefore,\n\n...the China factor has assumed a strategic importance in the development of India-US ties remain unaffected. Key issues for the future would be the extent of transfer of technology and the willingness of the US government and industry to support India's plans to expand domestic defence manufacturing. While statements by the new US Defence Secretary and the Under Secretary for Defence are positive about boosting India as a Major Defence Partner, the outlook on the US seriously contributing to India's project of self-reliance in defence manufacturing is unclear. The visit of the US Defence Secretary to India in March 2021 should give us an insight into the defence agenda of the new US administration related to India.\n\nThe China Factor\n\nWith the sharp deterioration of US-China ties, the China factor has assumed a strategic importance in the development of India-US ties that did not exist before. The concepts of Quad and the Indo-Pacific have emerged as a result. The US has boosted these two concepts as part of its strategy to counter China's rising maritime challenge. China has succeeded in grabbing strategic space in the South China Sea by reclaiming and militarising islands and reefs without resistance by either the ASEAN or the US. China has unveiled its naval ambitions. It is positioning itself in key countries in the Indian Ocean. Trump was challenging China on trade issues as well as maritime issues, and during his presidency the Indo-Pacific and Quad concepts progressed, though with some tentativeness on the part of its three partners, including India. There were some initial doubts about the commitment of the Biden administration to these two concepts as they are closely tied to Trump's policy towards China. Biden was expected to take a middle path with China. Papers produced by influential US think tanks and journals were seen to be promoting a more accommodative approach. The thrust was in favour of focusing on allies, especially Japan and South Korea, with India mentioned only in passing or as an adjunct to US security policies focused on the western Pacific. Some of the people nominated in key national\n\nsecurity positions have in the past advocated the necessity of engaging China, even as the US counters its expansionism.\n\nThe balance between confrontation, competition and co-existence that would be struck by the US in the coming months with China would be difficult to anticipate. It appears that despite the internal pressures from US business in favour of accommodation, the overall political and public mood is to effectively counter the Chinese threat. Statements from President Biden, Secretary of State Blinken and others suggest an aggressive push back. The Interim National Security Strategic Guidance (INSSG) announced by Biden in March, speaks of holding China to account, with emphasis on reaffirming ties with allies like Australia, Japan, and South Korea, and recognising that America's \"vital national interests compel the deepest connection to the Indo-Pacific\" and deterring \"Chinese aggression\". It accuses China's leaders of seeking \"unfair advantages\", behaving \"aggressively and\n\nIndia should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy...\n\ncoercively\", and undermining \"the rules and values at the heart of an open and stable international system\". It speaks of confronting China's \"unfair and illegal trade practices, cyber theft, and coercive economic practices\" that seek to erode America's \"strategic advantage and national competitiveness\", and that the US \"will ensure that our supply chains for critical national security technologies and medical supplies are secure.\" The US, it says, will \"support China's neighbors and commercial partners in defending their rights to make independent political choices free of coercion or undue foreign influence\" and \"promote locally-led development to combat the manipulation of local priorities\" (strictures against the BRI). Support for Taiwan and standing up for democracy, human rights, and human dignity, including in Hong Kong, Xinjiang, and Tibet, are mentioned. The document also speaks of welcoming \"the Chinese government's cooperation on issues such as climate change, global health security, arms control, and nonproliferation where our national fates are intertwined\". In this, the US will rally its allies and partners to join it, with a view to \"pooling our negotiating leverage\". The agenda of confrontation with China is clear in this document, what is not clear is the importance attached to India in pursuing it. \"We will deepen our partnership with India\" the document says, but besides this there is no other reference to India in the 23-page document. India should therefore be careful in assessing the extent of its core importance in America's Indo-Pacific strategy and not be manoeuvred into a situation where the gains to the two sides are not reasonably balanced in pursuing this strategy.\n\nThe Quad has already met at Foreign Ministers' level and is slated to meet virtually at the summit level. This will commit India to the US vision of Quad as a security project,\n\na vision that India has been trying to distance itself from, as this has implications for its relations with China as the two countries work for disengagement in Ladakh. It could also affect India's relations with Russia which is openly opposed to both the Quad and the IndoPacific concept as Cold War strategies, this time aimed at China. Moreover, it is too early to say definitively what will be the trajectory of US-China ties as they are economically still very dense. Decoupling will not be easy as US companies, as well as European, will not turn their backs on the huge Chinese market. China's emergence as the world's second largest economy gives it a role that cannot be ignored. However, New Delhi could benefit if some American companies move their investments from China to India. How India can benefit from shared concerns about resilient supply chains would be a challenge. The task will be to successfully marry this idea with the government's plans for an 'atmanirbhar' Indian economy and promoting national champions that would be able to compete internationally. The US has concerns about these plans and perceives them as moves towards protectionism.\n\nUS concerns about China's connectivity projects, as reflected in the INSSG document, could open-up possibilities of Indo-US cooperation in developing \"resilient infrastructure\", including in Africa, an area listed in the INSSG document for higher US attention. Developing 5G networks to counter China's advance over others in this vitally important area can be carried forward with US partners. Areas such as AI and Quantum computing offer scope for higher India-US cooperation in innovative technologies. Given the threats to cyberspace, made more pressing by China's attempt to hack into India's power sector, underlines the importance of India and the US working together to frame new global norms in cyberspace, a US goal listed in the INSSG. Along with these potential areas of expanding technological cooperation, New Delhi also needs to carefully watch if tighter US rules on access to American technology-- a move directed against China -would create problems for other countries like India.\n\nTrade Issues\n\nOn the economic side, India and the US have seen impressive growth in bilateral trade in goods and services, which have reached almost $146 billion. But the two sides were unable to resolve some pending trade issues despite intensive discussions when Trump was in power. India has always had difficult ties with United States Trade Representatives (USTRs), with constant pressure on India on issues of tariff, local content, market opening, lifting caps on foreign investment in sectors of interest to the US and regulation. Biden has already announced his version of America First by emphasising 'buy American'. He has also said that the US will be in no hurry to look at any new Free Trade Agreement\n\n(FTA) until an assessment has been made of the impact of FTAs on the US economy. The INSSG document reiterates this, emphasising that the US will press for elevated labour and environmental standards in any new trade deal. Biden has ruled out the US joining the Trans-Pacific Partnership (TPP) in its present avatar. This means that China will not be challenged economically in Asia and the Regional Comprehensive Economic Partnership (RCEP) will not be countered. India and the US were unable to resolve some outstanding market access issues despite several rounds of negotiations. Whether the two sides will pick up the same agenda or have a more ambitious one is not clear at this stage. Apparently, negotiations are continuing. Some of the issues will be difficult to negotiate such as differences over data protection and privacy laws, digital tax on e-commerce, and regulating the operation of US social media giants. These are over and above the issues of market access covering tariffs, IT, agricultural and medical products, restoration of the Generalised System of Preferences (GSP) benefits, etc. On India's concerns about H1B visas the Biden administration is more accommodating.\n\nTies with Russia\n\nWith the collapse of the Soviet Union and the decline of Russian power, India's long-standing ties with Russia are no longer seen by the US through an ideological prism. This historical deep irritant in India-US ties no longer has the same salience. Nevertheless,\n\nRussia has become a factor in the management of IndoUS relations. Earlier, during the Trump presidency, the US Congress, the intelligence agencies, the think-tanks and the media were fuelling anti-Russian sentiments which Trump tried to contain, although not too successfully as a slew of sanctions were imposed\n\n...the US will press for elevated labour and environmental standards in any new trade deal.\n\non Russia and the Countering America's Adversaries Through Sanctions Act (CAATSA) legislation was framed to disrupt third country ties with Russia, particularly in the areas of defence. Biden himself and his key appointees, including the Secretary of State and the National Security Adviser, are deeply anti-Russian. This will test India's ability to isolate its Russia ties from those with the US. India's ties with Russia, already under some strain, are far too important to be sacrificed for what seems an irrational US policy towards Moscow. Once India begins to get deliveries of the S-400 system, the waiver for India under CAATSA will be tested, a waiver denied to Turkey. India is not a US ally, it is not member of NATO, its armed forces are not integrated with NATO and its systems, and therefore, logically, India cannot be bracketed with Turkey. India's case is political and not military. If the US wants to strengthen ties, increase its share of India's defence programmes and not seriously erode the trust that has been built in recent years, as well as not raise questions in India's mind\n\nabout the Quad and the Indo-Pacific as strategies that India should fully embrace, it would be politically self-defeating on the part of the US to impose any CAATSA related sanctions. India cannot afford to be a collateral damage in US failure to manage its ties with Russia. CAATSA had also damaged India's relations with Iran. With Biden looking for re-entering the Joint Comprehensive Plan of Action (JCPOA) on the Iran nuclear programme, subject to some difficult conditions, the prospect of restoring energy ties with Iran can be envisaged.\n\nThe so-called bi-partisan support for India in the US Congress and positive sentiments towards India in the US system as a whole has been a result of many factors: the opening up of the Indian economy, the \"Chindia\" narrative that held the promise of a huge Indian market for US corporations, the increasing role of the India-American community in American political life, universities, the Silicon Valley, and, of course, the rising threat of China to US power. But the asymmetries in power between the two countries in all domains continue to generate creases in ties. The US as a global power is prone to balance its interests in various regions, including Southern Asia. Its policy toward Pakistan is based on its interests, not India's. If it is responsive to India's terrorism concerns it is because it has its own independent concerns about Pakistan. The expression of joint concerns with India on the activities of jihadi groups in Pakistan serves as a point of pressure on the latter, while giving New Delhi some political satisfaction. However, America's unwillingness to apply sanctions on Pakistan, even a diluted version of the kind applied on Iran and Russia, as well as its willingn<cursor_is_here>\n</text>\n",
"role": "user"
},
{
"content": "ess to negotiate equal to equal with a terrorist organisation like the Taliban and open doors for it to come to power in Afghanistan is divorced from India's regional interests.",
"role": "assistant"
}
] |
|
Hypnosis Revealed:
Create Positive Change in Your Life
Hypnosis Revealed:
Create Positive Change in Your Life
Table of Contents:
5 Hypnosis Myths Exploded
OVER the years, hypnosis has picked up all sorts of weird associations from stage hypnotists, the media and superstition. This is a great shame, because in reality, hypnosis is your single most effective tool for change. Hypnosis is your birthright, and you should know how to use it so it doesn't use you. Here we dispel the biggest hypnosis myths.
Hypnosis Myth 1) All hypnosis is the same
As with anything, hypnosis can be good, bad or indifferent. The most common is old-style authoritarian hypnosis of the type "You are getting sleepy, you are feeling confident".
Unsurprisingly, this sort of hypnosis doesn't work well with many people. Good hypnosis uses subtle psychological principles and advanced communication patterns.
It's like the difference between a football coach who thinks you'll perform best if he yells at you, compared with the more elegant style of a great leader who knows that to get the best from his people, he needs to understand motivation, to cajole, encourage and reward.
Hypnosis Downloads.com offers hundreds of sessions using the best type of hypnosis.
Hypnosis Myth 2) Subliminals work
Subliminals are words that you can't hear. Common sense says they shouldn't work, and there's no research proving that they do.
Hypnosis Myth 3) Some people can't be hypnotized
The only reason you can't be hypnotized is if you are incapable of paying attention due to extremely low IQ or brain damage. That's not to say that every hypnotist can hypnotize you however. The more flexible the hypnotist, the more effective she will be with the largest number of people.
Hypnosis Myth 4) Hypnosis is something weird that other people do to you
If you couldn't go into hypnosis, you wouldn't be able to sleep, to learn, or get nervous through 'negative self hypnosis'. (You know when you imagine things going wrong and it makes you feel anxious? Well that's self hypnosis!)
Hypnosis is simply a deliberate utilization of the REM (Rapid Eye Movement) or dream state. We're not giving people medication here – if it wasn't a natural ability, hypnosis wouldn't work!
Hypnosis Myth 5) You lose control in hypnosis
Crazy news stories, stage hypnotists and gossip have created the illusion that you lose control in hypnosis. In fact, when hypnotized, you are relaxed and focused – and able to choose to get up and walk away at any time. You choose to give your attention to the hypnotist, and you can withdraw it at any time.
If you have been scared of hypnosis in the past, this article has hopefully convinced you to at least give it a try. But remember, ensure what you're getting is the real thing. Visit www.hypnosisdownloads.com
[Notes for use: you are licensed only to use this material unaltered to promote the www.hypnosisdownloads.com affiliate program.]
Article by Mark Tyrrell of Hypnosis Downloads.com.
4
Reassuring Reasons why Hypnosis is your Friend
Believe the hype or think for yourself
For too long hypnosis has had a bad or 'difficult' press. If a person doesn't understand something they have 3 options open to them.
1) They might be skeptical and therefore save the trouble of looking further and possibly benefiting.
2) They may conclude it is dangerous and to be avoided at all costs.
3) They may spend time discovering the truth behind the hype.
If you don't know much about a topic it's easy to be suspicious. Some people assume hypnosis is akin to a carnival side show, others consider it mystic mumbo jumbo or 'mind control.' For those who look beyond the hype the truth is far more illuminating.
The most powerful tool you possess
There are potentially huge benefits for those who use hypnosis as part of everyday life. When you understand hypnosis you start to see its potential to improve human performance in the physical, emotional and intellectual realms. For me, rumor, gossip and suspicion weren't good enough.
I determined to learn all I could about hypnosis - I learned every fact and practiced every technique under the sun. I took several training courses - some good, some terrible. I invested thousands of hours of devoted study to hypnosis and discovered just what is possible. I hypnotized friends, neighbors and work colleagues. Hypnosis greatly changed things for me on a personal level
How hypnosis helped me
I used to be shy. Thanks to hypnosis I can now talk to thousands at a time and can approach anybody calmly and confidently.
I used to have poor concentration and procrastinate; thanks to hypnosis I can instantly motivate myself.
I used to find physical work outs and exercise exhausting but because of hypnosis I am now in the best shape of my life.
Incidentally I also stopped myself blushing with hypnosis. Now if ever I have a difficult call or conversation coming up, something I may naturally feel reluctant to do (you know the kind of thing) I spontaneously self hypnotize and rehearse the upcoming situation feeling good, with myself remaining calm. In this way I habitually set my own emotional 'blue prints' for up coming situations. Having said that it's naturally that some people have concerns or half digested 'hand me down' ideas regarding hypnosis. A common one is the one about 'mind control.' However what does this really mean?
Why you are more in control of yourself in hypnosis
If someone expresses concerns about being 'controlled' in hypnosis what they mean is they don't want to be like a robot, an automaton that is forced to obey the every whim of the hypnotist. We can't help but influence others but we don't control them. To understand why you need to understand hypnosis better.
So what is hypnosis like?
Hypnosis isn't like a coma. It's not unconsciousness - more a subtle shifting of consciousness. In hypnosis, you can still think logically but you also have access to the 'software' of your mind so that you can update instinctive emotional and physical responses. In fact the hypnotized subject (not the hypnotist) calls the shots. When I hypnotize someone I need to go at their speed and respond to their needs and expectations. Hypnosis will give you more control in your own life because of what it enables you to do.
How can I be so sure?
Because over the decades I've seen all kinds of people, all ages and from all backgrounds turn their lives around thanks to hypnosis. When you use hypnosis for yourself it improves confidence in all kinds of ways. When you use it to change other's lives it just blows you away. This is what I mean.
When I first hypnotized someone to feel no sensation in a painful arthritic arm it was an incredible feeling. When I first cured life long phobias quickly and comfortably I was astounded. When I stopped hardened alcoholics from drinking and even got a heroin addict off the stuff and back into mainstream life again I started to feel angry that people could just associate hypnosis with entertainment.
With the aid of hypnosis I (and many people I have trained and worked with) have helped severely depressed people feel strong and positive again. The rewards and satisfactions are hard to describe. I'm going to take a stand against ignorance and short sightedness around hypnosis and here's why.
Why you need to reclaim hypnosis for yourself
Hypnosis is your birthright. It's nature's optimum learning tool. In fact to learn and perform anything well you need to experience a natural focusing of attention, a natural kind of hypnosis. To be successful hypnosis needs to be your companion and friend.
Successful people use it naturally all the time because hypnosis is natural. It's the way we learn new responses. Unlike medications its side effects are purely positive - one expectant mother I worked with to feel relaxed during child birth later reported that she was also more relaxed when flying!
Hypnosis is easy to learn and every body can benefit. Hypnosis is a safe environment to 'try out' new behaviors and emotional patterns before you experience them for real. So the young man can ask a woman out for a date many times in calm relaxed hypnosis so that by the time he does it for real it feels real and natural and relaxed. Sports people who use hypnosis learn new quicker and more accurately. So hypnosis gives you more control of yourself and your life, it's natural and gives you instant benefits and it's a way of 'trying on' and establishing new patterns of emotional response and behavior, Hypnosis enables you to develop yourself as a human being.
HypnosisDownloads.com offer a free course called 'Learn Hypnosis in 5 Days'.
Article by Mark Tyrrell of Hypnosis Downloads.com.
7
7 Public Speaking Survival Tips
I used to be terrified of public speaking - now it's natural and fun.
Dry mouth, fast heart, sweaty palms, blank mind - yeah I've been there! It's easy to fear public speaking. But I was never just content with overcoming fear. I wanted to be a great speaker. What I needed was a way of calming down and applying simple techniques and strategies to talk like a pro.
When I'd learned to relax (more of that later) I learned and applied the following four steps.
1. Reassure your audience - they need to know you know your stuff and you are human!
2. Hook them by being interesting and relevant. Tell them why what you are saying is relevant to them.
3. Inspire them by giving them information and ways of seeing that are new and applicable.
4. Leave them on a high by telling a story them encapsulates your central message.
How do you become confident enough to apply the four steps?
Here's some tips some of which are practical some of which are to do with the way you think about your public presentations and also how you can start to change the way you feel about them.
Tip One
Breath your way to calm. When you breath out you relax that's why people sigh when they're stressed.
Breathing in without breathing out causes hyperventilation and worsens anxiety. Just before your speech take five minutes breathing in to the count of seven and out to the count of eleven (quick count-not seconds!). On the out breath hold it a second before breathing in again. This will produce quick and lasting calm. Remember extending the out breath calms you down.
Tip Two
You have a responsibility as the presenter but relax you don't carry all the responsibility. Presenting is a team effort. Audiences are responsible for politeness, extending their attention and attempting to learn. It's not all you-it's a meeting of two halves. Never mind how they judge you. How do you judge them?
Tip Three
Use metaphor and stories. We all experience life metaphorically. The most technical logical person spends at least two hours a night dreaming! Talk detail if necessary but present patterns with metaphors. Folk from 4 to 104 love stories. Use em.
Tip four
Captivate attention by using words that evoke all the senses. Describe how things look, sound, feel, smell and taste. Paint pictures and sensations in their minds with your words.
Tip Five
Vary your voice tonality and speed of delivery. Keep them alert and engaged. Convey energy when need be and slow down when you need to 'draw them in close.' You are the conductor to their orchestra. And pepper your talk with humor. Your willingness to be funny shows personal confidence and confidence is contagious.
Tip Six
Tell them what they are going to get. What they are currently getting and then what they have got from you. Sell your sizzle!
Tip Seven
Watch and learn from other great speakers until compelling, relaxed speaking is a part of you.
Rehearse positively. You need to rehearse how your going to feel as well as what you are going to present. Don't think about your forthcoming presentation whilst feeling nervous as this creates an instinctive association between fear and presenting. This natural negative self-hypnosis is very common with nervous speakers.
2010
©
Hypnotically rehearse your speech whilst feeling relaxed. This produces the right 'blueprint' in your mind. In fact when you do this enough times it actually becomes hard to be nervous!
All great speakers know how to use great self-hypnotic rehearsal. Hypnosis changes attitudes and can bring emotion under control. I used hypnosis, to change my instincts around public speaking. Now I just can't get nervous whether it's 50 or 500 people. The world needs great communicators. Go for it!
Cure your fear of public speaking at HypnosisDownloads.com
Article by Mark Tyrrell ofHypnosis Downloads.com.
7 Ways to Soothe your Shyness
Shy people instinctively know that they are missing out. Shyness equals lost opportunities, less pleasure and fewer social connections. Shyness can be crippling but there are tried and tested ways to make it a thing of the past.
When I was fifteen I was shy. I recall an attractive girl attempting to engage me in conversation. My shyness made me focus on me instead of her. I heard my own voice but not hers and I thought about what I was trying to say instead of what she was trying to say.
The formula for shyness is "too much focus on the self" plus anxiety. To make it even more unpleasant, sometimes when you are feeling shy you experience physical sensations which 'hijack' your calm logical self.
My pulse raced, my mouth dried up and I felt like the village idiot! I couldn't think what to say so I said nothing apart from making barely audible grunting noises! Cary Grant eat your heart out! When I detected pity in her eyes (or was it contempt, or boredom) I mumbled my excuse and got out of there. I hated being shy and was determined to change it.
How shyness is developed and maintained
Shyness really is a combination of social anxiety and social conditioning. To overcome shyness you need to learn to relax socially. This enables you to direct your attention away from yourself and gives you the space to practice certain conversational skills. In most cases, the heightened emotions of socializing when young simply condition the sufferer to respond to social events with fear, instead of excitement and pleasure.
Relaxed socializing is so pleasurable, not to say productive, but it is an advantage denied to many until they learn to relax. To start reducing your own shyness, I want you to absorb the following tips and ideas and start to put them into practice:
1) Think about the way you feel and behave around familiar people you are comfortable and spontaneous around. It's that feeling transferred to new people and situations that equates to your emerging social confidence.
2) Focus your attention away from yourself. Sure, you can think a little bit about how you are coming across, but if all your focus is on your own words and feelings then you might as well be by yourself. Notice what other people are wearing and make a mental note, listen to their
conversation, imagine where they might live, make a point of remembering names. Not only does this give you more to talk about, it also 'dilutes' social anxiety leaving you feeling calmer.
3) Ask people open questions. Many people like to talk about themselves and will find you interesting if you find them interesting. Ask questions that require more than a 'yes'/'no' response such as 'What do you like about this place?' rather than: 'Do you like this place?' Once they've answered use 'add-on' questions connected to the first such as: 'What other places do you like in this city.?' Next you can express your views. This is a great way to get the conversation going. If the conversation doesn't 'take' then no matter, you've done your bit.
4) Stop trusting your imagination so much! Have you ever had an imaginary picture in your mind of a holiday destination only to arrive and find the reality is different from the way you had imagined? That's how reliable imagination is. Stop imagining what others think. I do lots of public speaking and I've long since stopped trying to second guess what others think of me - it's just too painful. Besides, what a person thinks about you has a lot more to do with who they are than who you are.
5) Stop using 'all or nothing' thinking. The 'completely this/completely that' style of thought occurs when you are emotional. People who are depressed, angry or anxious see reality in terms of differing extremes, simplistic all or nothing terms. An angry person is 'right' and you are 'wrong'; the depressed person feels like a 'failure' while others are a 'success'. In reality, life is composed of infinite gray areas. So stop fearing that you might say the 'wrong' thing! Or that people will 'hate' you. Once you start to relax more socially you'll notice much less black or white thinking because anxiety actually causes you to think in all or nothing terms.
6) Take your time. You don't have to blurt things out. Ask questions and if questions are asked of you can take time to consider your response (within reason). Don't just blurt out what you think might be the 'right' answer. A slow answer is a relaxed answer.
7) Finally, use hypnotic rehearsal. Hypnosis is the quickest way to change your instinctive/emotional response to any situation. Only think about meeting others when your mind and body is relaxed. This conditions you to associate relaxation with being around new people. In fact you'll find that when you relax deeply enough often enough whilst hypnotically rehearsing being comfortable around others you'll reach the point where you just can't be shy any more! This is what I call a 'happy inability!'
I now love meeting new people and suspect that my current social confidence would be unrecognizable to my fifteen year old self.
Overcome shyness now at HypnosisDownloads.com
Article by Mark Tyrrell of Hypnosis Downloads.com.
Improve your self confidence in 15 minutes
I used to be frighteningly under confident in social situations. And although people who know me now would never believe I used to doubt myself so much I literally had to learn confidence until it became a natural part of me. I can tell you relaxed optimistic confidence is just, well so much more fun.
Here I'll tell you about the things that made the most difference to my confidence levels...
Some people have naturally high levels of confidence but everybody can learn to be more confident
Firstly, it's important to get a clear idea of what self confidence really means, otherwise you won't know when you've got it! So, self confidence means:
1) Being calm. For every situation in life you need to run on the appropriate level of emotion. Too much emotional 'leakage' into a experience can spoil the experience. You make great strides towards confidence when you begin to relax in a greater range of situations.
2) Being cool. The second part of self confidence is about being able to relax with uncertainty. To be 'cool' in a situation really means relaxing with not knowing how things will pan out. If you truly tolerate uncertainty, you can do pretty much anything.
3) Not being too concerned with what others think of you. You know when you imagine what some place is going to be like before you go there but when you get there it is totally different to your imagination? That's how reliable your imagination is! Stop trusting your imagination so much. I've long since stopped bothering to imagine what others think of me because so often I've turned out to be wrong.
4) Being specific - where do you want confidence? 'Confidence' is meaningless until you tie it to something specific. You are already confident that you can read these words or can switch a light on and off. So you don't need more confidence everywhere. To get what you want in life you have to establish exactly what you do want. Where do you want confidence in your life? Think about the specific situations now and write them down. You're beginning to steer your brain towards confidence.
5) Understanding that what you expect is what you get. Your brain is an organ that needs clear goals to work towards. When a task has been set in your brain it will do everything it can do
to bring about the completion of that task. If you've tried to recall someone's name but can't, hours later you'll often find their name pops into your head.
The 'trying to recall' experience set the task or blueprint for your brain's future subconscious behavior which eventually produced the name for you - when you weren't thinking about it consciously. You can use this natural mechanism to start feeling more confident. But, to ensure you set the right task for your subconscious mind, the next point is vital.
6) Don't task your mind with negatives. Instead of: 'I don't want to screw up' (which sets the task of 'screwing up' for your brain), set the blueprint for what you do want! Your brain doesn't work towards what to do by being told what not to do. And nature has given you a wonderful natural tool to set the right task blueprints with.
7) Use nature's goal-setter: Now you understand how vital it is to set the right task for you brain, you need to know how to do this reliably. Good hypnosis will strongly 'program' the right blueprint in your mind through the use of your imagination. If you powerfully imagine feeling confident and relaxed while in a relaxed hypnotic state it will be hard for your unconscious mind to do anything else. The blueprint for relaxation has been set firmly into your subconscious mind.
3 simple strategies to get you feeling confident quickly:
1) Think specifically of the time/place/situation you want to feel confident in. Remember 'confidence' doesn't mean anything until you attach it to something specific.
2) Focus on words in your mind right now that describe how you do want to be in that time and place. Maybe words such as 'calm', 'relaxed' or 'focused'. Remember your brain works on clear positive instructions.
3) Close your eyes for as long as you like and think about how those words feel. Then, imagine the situation itself and rehearse it in your mind feeling confident and relaxed. This way you set the right blueprint or 'task' for your unconscious mind.
You can repeat this often to make it more effective and use it with as many areas of your life as you need to. If you listen to a hypnotic cd or download that can make the benefits even more powerful (see my profile below). So if you feel like you'd be blessed with less confidence than some other people you can start redressing the balance by using your mind in the right way right now.
It took me years to learn how to be more confident - now you can do it in a fraction of the time. Good luck!
Boost your confidence now at HypnosisDownloads.com
Article by Mark Tyrrell of Hypnosis Downloads.com.
|
<urn:uuid:cde8e73f-6bae-46ee-a5a4-6d266505412e>
|
CC-MAIN-2017-47
|
http://www.hypnosisandthemind.com/wp-content/uploads/2011/01/Hypnosis-Revealed.pdf
|
2017-11-19T15:38:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805687.20/warc/CC-MAIN-20171119153219-20171119173219-00487.warc.gz
| 420,467,142
| 4,826
|
eng_Latn
|
eng_Latn
| 0.978059
|
eng_Latn
| 0.998967
|
[
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
55,
132,
2061,
3006,
4805,
7041,
8746,
10340,
12020,
12621,
14941,
17611,
17840,
20148,
22564,
22778
] |
Hypnosis Revealed:
Create Positive Change in Your Life
Hypnosis Revealed:
Create Positive Change in Your Life
Table of Contents:
5 Hypnosis Myths Exploded
OVER the years, hypnosis has picked up all sorts of weird associations from stage hypnotists, the media and superstition. This is a great shame, because in reality, hypnosis is your single most effective tool for change. Hypnosis is your birthright, and you should know how to use it so it doesn't use you. Here we dispel the biggest hypnosis myths.
Hypnosis Myth 1) All hypnosis is the same
As with anything, hypnosis can be good, bad or indifferent. The most common is old-style authoritarian hypnosis of the type "You are getting sleepy, you are feeling confident".
Unsurprisingly, this sort of hypnosis doesn't work well with many people. Good hypnosis uses subtle psychological principles and advanced communication patterns.
It's like the difference between a football coach who thinks you'll perform best if he yells at you, compared with the more elegant style of a great leader who knows that to get the best from his people, he needs to understand motivation, to cajole, encourage and reward.
Hypnosis Downloads.com offers hundreds of sessions using the best type of hypnosis.
Hypnosis Myth 2) Subliminals work
Subliminals are words that you can't hear. Common sense says they shouldn't work, and there's no research proving that they do.
Hypnosis Myth 3) Some people can't be hypnotized
The only reason you can't be hypnotized is if you are incapable of paying attention due to extremely low IQ or brain damage. That's not to say that every hypnotist can hypnotize you however. The more flexible the hypnotist, the more effective she will be with the largest number of p
|
eople.
|
Hypnosis Myth 4) Hypnosis is something weird that other people do to you
If you couldn't go into hypnosis, you wouldn't be able to sleep, to learn, or get nervous through 'negative self hypnosis'. (You know when you imagine things going wrong and it makes you feel anxious? Well that's self hypnosis!)
Hypnosis is simply a deliberate utilization of the REM (Rapid Eye Movement) or dream state. We're not giving people medication here – if it wasn't a natural ability, hypnosis wouldn't work!
Hypnosis Myth 5) You lose control in hypnosis
Crazy news stories, stage hypnotists and gossip have created the illusion that you lose control in hypnosis. In fact, when hypnotized, you are relaxed and focused – and able to choose to get up and walk away at any time. You choose to give your attention to the hypnotist, and you can withdraw it at any time.
If you have been scared of hypnosis in the past, this article has hopefully convinced you to at least give it a try. But remember, ensure what you're getting is the real thing. Visit www.hypnosisdownloads.com
[Notes for use: you are licensed only to use this material unaltered to promote the www.hypnosisdownloads.com affiliate program.]
Article by Mark Tyrrell of Hypnosis Downloads.com.
4
Reassuring Reasons why Hypnosis is your Friend
Believe the hype or think for yourself
For too long hypnosis has had a bad or 'difficult' press. If a person doesn't understand something they have 3 options open to them.
1) They might be skeptical and therefore save the trouble of looking further and possibly benefiting.
2) They may conclude it is dangerous and to be avoided at all costs.
3) They may spend time discovering the truth behind the hype.
If you don't know much about a topic it's easy to be suspicious. Some people assume hypnosis is akin to a carnival side show, others consider it mystic mumbo jumbo or 'mind control.' For those who look beyond the hype the truth is far more illuminating.
The most powerful tool you possess
There are potentially huge benefits for those who use hypnosis as part of everyday life. When you understand hypnosis you start to see its potential to improve human performance in the physical, emotional and intellectual realms. For me, rumor, gossip and suspicion weren't good enough.
I determined to learn all I could about hypnosis - I learned every fact and practiced every technique under the sun. I took several training courses - some good, some terrible. I invested thousands of hours of devoted study to hypnosis and discovered just what is possible. I hypnotized friends, neighbors and work colleagues. Hypnosis greatly changed things for me on a personal level
How hypnosis helped me
I used to be shy. Thanks to hypnosis I can now talk to thousands at a time and can approach anybody calmly and confidently.
I used to have poor concentration and procrastinate; thanks to hypnosis I can instantly motivate myself.
I used to find physical work outs and exercise exhausting but because of hypnosis I am now in the best shape of my life.
Incidentally I also stopped myself blushing with hypnosis. Now if ever I have a difficult call or conversation coming up, something I may naturally feel reluctant to do (you know the kind of thing) I spontaneously self hypnotize and rehearse the upcoming situation feeling good, with myself remaining calm. In this way I habitually set my own emotional 'blue prints' for up coming situations. Having said that it's naturally that some people have concerns or half digested 'hand me down' ideas regarding hypnosis. A common one is the one about 'mind control.' However what does this really mean?
Why you are more in control of yourself in hypnosis
If someone expresses concerns about being 'controlled' in hypnosis what they mean is they don't want to be like a robot, an automaton that is forced to obey the every whim of the hypnotist. We can't help but influence others but we don't control them. To understand why you need to understand hypnosis better.
So what is hypnosis like?
Hypnosis isn't like a coma. It's not unconsciousness - more a subtle shifting of consciousness. In hypnosis, you can still think logically but you also have access to the 'software' of your mind so that you can update instinctive emotional and physical responses. In fact the hypnotized subject (not the hypnotist) calls the shots. When I hypnotize someone I need to go at their speed and respond to their needs and expectations. Hypnosis will give you more control in your own life because of what it enables you to do.
How can I be so sure?
Because over the decades I've seen all kinds of people, all ages and from all backgrounds turn their lives around thanks to hypnosis. When you use hypnosis for yourself it improves confidence in all kinds of ways. When you use it to change other's lives it just blows you away. This is what I mean.
When I first hypnotized someone to feel no sensation in a painful arthritic arm it was an incredible feeling. When I first cured life long phobias quickly and comfortably I was astounded. When I stopped hardened alcoholics from drinking and even got a heroin addict off the stuff and back into mainstream life again I started to feel angry that people could just associate hypnosis with entertainment.
With the aid of hypnosis I (and many people I have trained and worked with) have helped severely depressed people feel strong and positive again. The rewards and satisfactions are hard to describe. I'm going to take a stand against ignorance and short sightedness around hypnosis and here's why.
Why you need to reclaim hypnosis for yourself
Hypnosis is your birthright. It's nature's optimum learning tool. In fact to learn and perform anything well you need to experience a natural focusing of attention, a natural kind of hypnosis. To be successful hypnosis needs to be your companion and friend.
Successful people use it naturally all the time because hypnosis is natural. It's the way we learn new responses. Unlike medications its side effects are purely positive - one expectant mother I worked with to feel relaxed during child birth later reported that she was also more relaxed when flying!
Hypnosis is easy to learn and every body can benefit. Hypnosis is a safe environment to 'try out' new behaviors and emotional patterns before you experience them for real. So the young man can ask a woman out for a date many times in calm relaxed hypnosis so that by the time he does it for real it feels real and natural and relaxed. Sports people who use hypnosis learn new quicker and more accurately. So hypnosis gives you more control of yourself and your life, it's natural and gives you instant benefits and it's a way of 'trying on' and establishing new patterns of emotional response and behavior, Hypnosis enables you to develop yourself as a human being.
HypnosisDownloads.com offer a free course called 'Learn Hypnosis in 5 Days'.
Article by Mark Tyrrell of Hypnosis Downloads.com.
7
7 Public Speaking Survival Tips
I used to be terrified of public speaking - now it's natural and fun.
Dry mouth, fast heart, sweaty palms, blank mind - yeah I've been there! It's easy to fear public speaking. But I was never just content with overcoming fear. I wanted to be a great speaker. What I needed was a way of calming down and applying simple techniques and strategies to talk like a pro.
When I'd learned to relax (more of that later) I learned and applied the following four steps.
1. Reassure your audience - they need to know you know your stuff and you are human!
2. Hook them by being interesting and relevant. Tell them why what you are saying is relevant to them.
3. Inspire them by giving them information and ways of seeing that are new and applicable.
4. Leave them on a high by telling a story them encapsulates your central message.
How do you become confident enough to apply the four steps?
Here's some tips some of which are practical some of which are to do with the way you think about your public presentations and also how you can start to change the way you feel about them.
Tip One
Breath your way to calm. When you breath out you relax that's why people sigh when they're stressed.
Breathing in without breathing out causes hyperventilation and worsens anxiety. Just before your speech take five minutes breathing in to the count of seven and out to the count of eleven (quick count-not seconds!). On the out breath hold it a second before breathing in again. This will produce quick and lasting calm. Remember extending the out breath calms you down.
Tip Two
You have a responsibility as the presenter but relax you don't carry all the responsibility. Presenting is a team effort. Audiences are responsible for politeness, extending their attention and attempting to learn. It's not all you-it's a meeting of two halves. Never mind how they judge you. How do you judge them?
Tip Three
Use metaphor and stories. We all experience life metaphorically. The most technical logical person spends at least two hours a night dreaming! Talk detail if necessary but present patterns with metaphors. Folk from 4 to 104 love stories. Use em.
Tip four
Captivate attention by using words that evoke all the senses. Describe how things look, sound, feel, smell and taste. Paint pictures and sensations in their minds with your words.
Tip Five
Vary your voice tonality and speed of delivery. Keep them alert and engaged. Convey energy when need be and slow down when you need to 'draw them in close.' You are the conductor to their orchestra. And pepper your talk with humor. Your willingness to be funny shows personal confidence and confidence is contagious.
Tip Six
Tell them what they are going to get. What they are currently getting and then what they have got from you. Sell your sizzle!
Tip Seven
Watch and learn from other great speakers until compelling, relaxed speaking is a part of you.
Rehearse positively. You need to rehearse how your going to feel as well as what you are going to present. Don't think about your forthcoming presentation whilst feeling nervous as this creates an instinctive association between fear and presenting. This natural negative self-hypnosis is very common with nervous speakers.
2010
©
Hypnotically rehearse your speech whilst feeling relaxed. This produces the right 'blueprint' in your mind. In fact when you do this enough times it actually becomes hard to be nervous!
All great speakers know how to use great self-hypnotic rehearsal. Hypnosis changes attitudes and can bring emotion under control. I used hypnosis, to change my instincts around public speaking. Now I just can't get nervous whether it's 50 or 500 people. The world needs great communicators. Go for it!
Cure your fear of public speaking at HypnosisDownloads.com
Article by Mark Tyrrell ofHypnosis Downloads.com.
7 Ways to Soothe your Shyness
Shy people instinctively know that they are missing out. Shyness equals lost opportunities, less pleasure and fewer social connections. Shyness can be crippling but there are tried and tested ways to make it a thing of the past.
When I was fifteen I was shy. I recall an attractive girl attempting to engage me in conversation. My shyness made me focus on me instead of her. I heard my own voice but not hers and I thought about what I was trying to say instead of what she was trying to say.
The formula for shyness is "too much focus on the self" plus anxiety. To make it even more unpleasant, sometimes when you are feeling shy you experience physical sensations which 'hijack' your calm logical self.
My pulse raced, my mouth dried up and I felt like the village idiot! I couldn't think what to say so I said nothing apart from making barely audible grunting noises! Cary Grant eat your heart out! When I detected pity in her eyes (or was it contempt, or boredom) I mumbled my excuse and got out of there. I hated being shy and was determined to change it.
How shyness is developed and maintained
Shyness really is a combination of social anxiety and social conditioning. To overcome shyness you need to learn to relax socially. This enables you to direct your attention away from yourself and gives you the space to practice certain conversational skills. In most cases, the heightened emotions of socializing when young simply condition the sufferer to respond to social events with fear, instead of excitement and pleasure.
Relaxed socializing is so pleasurable, not to say productive, but it is an advantage denied to many until they learn to relax. To start reducing your own shyness, I want you to absorb the following tips and ideas and start to put them into practice:
1) Think about the way you feel and behave around familiar people you are comfortable and spontaneous around. It's that feeling transferred to new people and situations that equates to your emerging social confidence.
2) Focus your attention away from yourself. Sure, you can think a little bit about how you are coming across, but if all your focus is on your own words and feelings then you might as well be by yourself. Notice what other people are wearing and make a mental note, listen to their
conversation, imagine where they might live, make a point of remembering names. Not only does this give you more to talk about, it also 'dilutes' social anxiety leaving you feeling calmer.
3) Ask people open questions. Many people like to talk about themselves and will find you interesting if you find them interesting. Ask questions that require more than a 'yes'/'no' response such as 'What do you like about this place?' rather than: 'Do you like this place?' Once they've answered use 'add-on' questions connected to the first such as: 'What other places do you like in this city.?' Next you can express your views. This is a great way to get the conversation going. If the conversation doesn't 'take' then no matter, you've done your bit.
4) Stop trusting your imagination so much! Have you ever had an imaginary picture in your mind of a holiday destination only to arrive and find the reality is different from the way you had imagined? That's how reliable imagination is. Stop imagining what others think. I do lots of public speaking and I've long since stopped trying to second guess what others think of me - it's just too painful. Besides, what a person thinks about you has a lot more to do with who they are than who you are.
5) Stop using 'all or nothing' thinking. The 'completely this/completely that' style of thought occurs when you are emotional. People who are depressed, angry or anxious see reality in terms of differing extremes, simplistic all or nothing terms. An angry person is 'right' and you are 'wrong'; the depressed person feels like a 'failure' while others are a 'success'. In reality, life is composed of infinite gray areas. So stop fearing that you might say the 'wrong' thing! Or that people will 'hate' you. Once you start to relax more socially you'll notice much less black or white thinking because anxiety actually causes you to think in all or nothing terms.
6) Take your time. You don't have to blurt things out. Ask questions and if questions are asked of you can take time to consider your response (within reason). Don't just blurt out what you think might be the 'right' answer. A slow answer is a relaxed answer.
7) Finally, use hypnotic rehearsal. Hypnosis is the quickest way to change your instinctive/emotional response to any situation. Only think about meeting others when your mind and body is relaxed. This conditions you to associate relaxation with being around new people. In fact you'll find that when you relax deeply enough often enough whilst hypnotically rehearsing being comfortable around others you'll reach the point where you just can't be shy any more! This is what I call a 'happy inability!'
I now love meeting new people and suspect that my current social confidence would be unrecognizable to my fifteen year old self.
Overcome shyness now at HypnosisDownloads.com
Article by Mark Tyrrell of Hypnosis Downloads.com.
Improve your self confidence in 15 minutes
I used to be frighteningly under confident in social situations. And although people who know me now would never believe I used to doubt myself so much I literally had to learn confidence until it became a natural part of me. I can tell you relaxed optimistic confidence is just, well so much more fun.
Here I'll tell you about the things that made the most difference to my confidence levels...
Some people have naturally high levels of confidence but everybody can learn to be more confident
Firstly, it's important to get a clear idea of what self confidence really means, otherwise you won't know when you've got it! So, self confidence means:
1) Being calm. For every situation in life you need to run on the appropriate level of emotion. Too much emotional 'leakage' into a experience can spoil the experience. You make great strides towards confidence when you begin to relax in a greater range of situations.
2) Being cool. The second part of self confidence is about being able to relax with uncertainty. To be 'cool' in a situation really means relaxing with not knowing how things will pan out. If you truly tolerate uncertainty, you can do pretty much anything.
3) Not being too concerned with what others think of you. You know when you imagine what some place is going to be like before you go there but when you get there it is totally different to your imagination? That's how reliable your imagination is! Stop trusting your imagination so much. I've long since stopped bothering to imagine what others think of me because so often I've turned out to be wrong.
4) Being specific - where do you want confidence? 'Confidence' is meaningless until you tie it to something specific. You are already confident that you can read these words or can switch a light on and off. So you don't need more confidence everywhere. To get what you want in life you have to establish exactly what you do want. Where do you want confidence in your life? Think about the specific situations now and write them down. You're beginning to steer your brain towards confidence.
5) Understanding that what you expect is what you get. Your brain is an organ that needs clear goals to work towards. When a task has been set in your brain it will do everything it can do
to bring about the completion of that task. If you've tried to recall someone's name but can't, hours later you'll often find their name pops into your head.
The 'trying to recall' experience set the task or blueprint for your brain's future subconscious behavior which eventually produced the name for you - when you weren't thinking about it consciously. You can use this natural mechanism to start feeling more confident. But, to ensure you set the right task for your subconscious mind, the next point is vital.
6) Don't task your mind with negatives. Instead of: 'I don't want to screw up' (which sets the task of 'screwing up' for your brain), set the blueprint for what you do want! Your brain doesn't work towards what to do by being told what not to do. And nature has given you a wonderful natural tool to set the right task blueprints with.
7) Use nature's goal-setter: Now you understand how vital it is to set the right task for you brain, you need to know how to do this reliably. Good hypnosis will strongly 'program' the right blueprint in your mind through the use of your imagination. If you powerfully imagine feeling confident and relaxed while in a relaxed hypnotic state it will be hard for your unconscious mind to do anything else. The blueprint for relaxation has been set firmly into your subconscious mind.
3 simple strategies to get you feeling confident quickly:
1) Think specifically of the time/place/situation you want to feel confident in. Remember 'confidence' doesn't mean anything until you attach it to something specific.
2) Focus on words in your mind right now that describe how you do want to be in that time and place. Maybe words such as 'calm', 'relaxed' or 'focused'. Remember your brain works on clear positive instructions.
3) Close your eyes for as long as you like and think about how those words feel. Then, imagine the situation itself and rehearse it in your mind feeling confident and relaxed. This way you set the right blueprint or 'task' for your unconscious mind.
You can repeat this often to make it more effective and use it with as many areas of your life as you need to. If you listen to a hypnotic cd or download that can make the benefits even more powerful (see my profile below). So if you feel like you'd be blessed with less confidence than some other people you can start redressing the balance by using your mind in the right way right now.
It took me years to learn how to be more confident - now you can do it in a fraction of the time. Good luck!
Boost your confidence now at HypnosisDownloads.com
Article by Mark Tyrrell of Hypnosis Downloads.com.
| 1,751
|
inside_word
|
people.
|
remove_one_sentence
|
<url>
http://www.hypnosisandthemind.com/wp-content/uploads/2011/01/Hypnosis-Revealed.pdf
</url>
<text>
Hypnosis Revealed:
Create Positive Change in Your Life
Hypnosis Revealed:
Create Positive Change in Your Life
Table of Contents:
5 Hypnosis Myths Exploded
OVER the years, hypnosis has picked up all sorts of weird associations from stage hypnotists, the media and superstition. This is a great shame, because in reality, hypnosis is your single most effective tool for change. Hypnosis is your birthright, and you should know how to use it so it doesn't use you. Here we dispel the biggest hypnosis myths.
Hypnosis Myth 1) All hypnosis is the same
As with anything, hypnosis can be good, bad or indifferent. The most common is old-style authoritarian hypnosis of the type "You are getting sleepy, you are feeling confident".
Unsurprisingly, this sort of hypnosis doesn't work well with many people. Good hypnosis uses subtle psychological principles and advanced communication patterns.
It's like the difference between a football coach who thinks you'll perform best if he yells at you, compared with the more elegant style of a great leader who knows that to get the best from his people, he needs to understand motivation, to cajole, encourage and reward.
Hypnosis Downloads.com offers hundreds of sessions using the best type of hypnosis.
Hypnosis Myth 2) Subliminals work
Subliminals are words that you can't hear. Common sense says they shouldn't work, and there's no research proving that they do.
Hypnosis Myth 3) Some people can't be hypnotized
The only reason you can't be hypnotized is if you are incapable of paying attention due to extremely low IQ or brain damage. That's not to say that every hypnotist can hypnotize you however. The more flexible the hypnotist, the more effective she will be with the largest number of p<cursor_is_here>
Hypnosis Myth 4) Hypnosis is something weird that other people do to you
If you couldn't go into hypnosis, you wouldn't be able to sleep, to learn, or get nervous through 'negative self hypnosis'. (You know when you imagine things going wrong and it makes you feel anxious? Well that's self hypnosis!)
Hypnosis is simply a deliberate utilization of the REM (Rapid Eye Movement) or dream state. We're not giving people medication here – if it wasn't a natural ability, hypnosis wouldn't work!
Hypnosis Myth 5) You lose control in hypnosis
Crazy news stories, stage hypnotists and gossip have created the illusion that you lose control in hypnosis. In fact, when hypnotized, you are relaxed and focused – and able to choose to get up and walk away at any time. You choose to give your attention to the hypnotist, and you can withdraw it at any time.
If you have been scared of hypnosis in the past, this article has hopefully convinced you to at least give it a try. But remember, ensure what you're getting is the real thing. Visit www.hypnosisdownloads.com
[Notes for use: you are licensed only to use this material unaltered to promote the www.hypnosisdownloads.com affiliate program.]
Article by Mark Tyrrell of Hypnosis Downloads.com.
4
Reassuring Reasons why Hypnosis is your Friend
Believe the hype or think for yourself
For too long hypnosis has had a bad or 'difficult' press. If a person doesn't understand something they have 3 options open to them.
1) They might be skeptical and therefore save the trouble of looking further and possibly benefiting.
2) They may conclude it is dangerous and to be avoided at all costs.
3) They may spend time discovering the truth behind the hype.
If you don't know much about a topic it's easy to be suspicious. Some people assume hypnosis is akin to a carnival side show, others consider it mystic mumbo jumbo or 'mind control.' For those who look beyond the hype the truth is far more illuminating.
The most powerful tool you possess
There are potentially huge benefits for those who use hypnosis as part of everyday life. When you understand hypnosis you start to see its potential to improve human performance in the physical, emotional and intellectual realms. For me, rumor, gossip and suspicion weren't good enough.
I determined to learn all I could about hypnosis - I learned every fact and practiced every technique under the sun. I took several training courses - some good, some terrible. I invested thousands of hours of devoted study to hypnosis and discovered just what is possible. I hypnotized friends, neighbors and work colleagues. Hypnosis greatly changed things for me on a personal level
How hypnosis helped me
I used to be shy. Thanks to hypnosis I can now talk to thousands at a time and can approach anybody calmly and confidently.
I used to have poor concentration and procrastinate; thanks to hypnosis I can instantly motivate myself.
I used to find physical work outs and exercise exhausting but because of hypnosis I am now in the best shape of my life.
Incidentally I also stopped myself blushing with hypnosis. Now if ever I have a difficult call or conversation coming up, something I may naturally feel reluctant to do (you know the kind of thing) I spontaneously self hypnotize and rehearse the upcoming situation feeling good, with myself remaining calm. In this way I habitually set my own emotional 'blue prints' for up coming situations. Having said that it's naturally that some people have concerns or half digested 'hand me down' ideas regarding hypnosis. A common one is the one about 'mind control.' However what does this really mean?
Why you are more in control of yourself in hypnosis
If someone expresses concerns about being 'controlled' in hypnosis what they mean is they don't want to be like a robot, an automaton that is forced to obey the every whim of the hypnotist. We can't help but influence others but we don't control them. To understand why you need to understand hypnosis better.
So what is hypnosis like?
Hypnosis isn't like a coma. It's not unconsciousness - more a subtle shifting of consciousness. In hypnosis, you can still think logically but you also have access to the 'software' of your mind so that you can update instinctive emotional and physical responses. In fact the hypnotized subject (not the hypnotist) calls the shots. When I hypnotize someone I need to go at their speed and respond to their needs and expectations. Hypnosis will give you more control in your own life because of what it enables you to do.
How can I be so sure?
Because over the decades I've seen all kinds of people, all ages and from all backgrounds turn their lives around thanks to hypnosis. When you use hypnosis for yourself it improves confidence in all kinds of ways. When you use it to change other's lives it just blows you away. This is what I mean.
When I first hypnotized someone to feel no sensation in a painful arthritic arm it was an incredible feeling. When I first cured life long phobias quickly and comfortably I was astounded. When I stopped hardened alcoholics from drinking and even got a heroin addict off the stuff and back into mainstream life again I started to feel angry that people could just associate hypnosis with entertainment.
With the aid of hypnosis I (and many people I have trained and worked with) have helped severely depressed people feel strong and positive again. The rewards and satisfactions are hard to describe. I'm going to take a stand against ignorance and short sightedness around hypnosis and here's why.
Why you need to reclaim hypnosis for yourself
Hypnosis is your birthright. It's nature's optimum learning tool. In fact to learn and perform anything well you need to experience a natural focusing of attention, a natural kind of hypnosis. To be successful hypnosis needs to be your companion and friend.
Successful people use it naturally all the time because hypnosis is natural. It's the way we learn new responses. Unlike medications its side effects are purely positive - one expectant mother I worked with to feel relaxed during child birth later reported that she was also more relaxed when flying!
Hypnosis is easy to learn and every body can benefit. Hypnosis is a safe environment to 'try out' new behaviors and emotional patterns before you experience them for real. So the young man can ask a woman out for a date many times in calm relaxed hypnosis so that by the time he does it for real it feels real and natural and relaxed. Sports people who use hypnosis learn new quicker and more accurately. So hypnosis gives you more control of yourself and your life, it's natural and gives you instant benefits and it's a way of 'trying on' and establishing new patterns of emotional response and behavior, Hypnosis enables you to develop yourself as a human being.
HypnosisDownloads.com offer a free course called 'Learn Hypnosis in 5 Days'.
Article by Mark Tyrrell of Hypnosis Downloads.com.
7
7 Public Speaking Survival Tips
I used to be terrified of public speaking - now it's natural and fun.
Dry mouth, fast heart, sweaty palms, blank mind - yeah I've been there! It's easy to fear public speaking. But I was never just content with overcoming fear. I wanted to be a great speaker. What I needed was a way of calming down and applying simple techniques and strategies to talk like a pro.
When I'd learned to relax (more of that later) I learned and applied the following four steps.
1. Reassure your audience - they need to know you know your stuff and you are human!
2. Hook them by being interesting and relevant. Tell them why what you are saying is relevant to them.
3. Inspire them by giving them information and ways of seeing that are new and applicable.
4. Leave them on a high by telling a story them encapsulates your central message.
How do you become confident enough to apply the four steps?
Here's some tips some of which are practical some of which are to do with the way you think about your public presentations and also how you can start to change the way you feel about them.
Tip One
Breath your way to calm. When you breath out you relax that's why people sigh when they're stressed.
Breathing in without breathing out causes hyperventilation and worsens anxiety. Just before your speech take five minutes breathing in to the count of seven and out to the count of eleven (quick count-not seconds!). On the out breath hold it a second before breathing in again. This will produce quick and lasting calm. Remember extending the out breath calms you down.
Tip Two
You have a responsibility as the presenter but relax you don't carry all the responsibility. Presenting is a team effort. Audiences are responsible for politeness, extending their attention and attempting to learn. It's not all you-it's a meeting of two halves. Never mind how they judge you. How do you judge them?
Tip Three
Use metaphor and stories. We all experience life metaphorically. The most technical logical person spends at least two hours a night dreaming! Talk detail if necessary but present patterns with metaphors. Folk from 4 to 104 love stories. Use em.
Tip four
Captivate attention by using words that evoke all the senses. Describe how things look, sound, feel, smell and taste. Paint pictures and sensations in their minds with your words.
Tip Five
Vary your voice tonality and speed of delivery. Keep them alert and engaged. Convey energy when need be and slow down when you need to 'draw them in close.' You are the conductor to their orchestra. And pepper your talk with humor. Your willingness to be funny shows personal confidence and confidence is contagious.
Tip Six
Tell them what they are going to get. What they are currently getting and then what they have got from you. Sell your sizzle!
Tip Seven
Watch and learn from other great speakers until compelling, relaxed speaking is a part of you.
Rehearse positively. You need to rehearse how your going to feel as well as what you are going to present. Don't think about your forthcoming presentation whilst feeling nervous as this creates an instinctive association between fear and presenting. This natural negative self-hypnosis is very common with nervous speakers.
2010
©
Hypnotically rehearse your speech whilst feeling relaxed. This produces the right 'blueprint' in your mind. In fact when you do this enough times it actually becomes hard to be nervous!
All great speakers know how to use great self-hypnotic rehearsal. Hypnosis changes attitudes and can bring emotion under control. I used hypnosis, to change my instincts around public speaking. Now I just can't get nervous whether it's 50 or 500 people. The world needs great communicators. Go for it!
Cure your fear of public speaking at HypnosisDownloads.com
Article by Mark Tyrrell ofHypnosis Downloads.com.
7 Ways to Soothe your Shyness
Shy people instinctively know that they are missing out. Shyness equals lost opportunities, less pleasure and fewer social connections. Shyness can be crippling but there are tried and tested ways to make it a thing of the past.
When I was fifteen I was shy. I recall an attractive girl attempting to engage me in conversation. My shyness made me focus on me instead of her. I heard my own voice but not hers and I thought about what I was trying to say instead of what she was trying to say.
The formula for shyness is "too much focus on the self" plus anxiety. To make it even more unpleasant, sometimes when you are feeling shy you experience physical sensations which 'hijack' your calm logical self.
My pulse raced, my mouth dried up and I felt like the village idiot! I couldn't think what to say so I said nothing apart from making barely audible grunting noises! Cary Grant eat your heart out! When I detected pity in her eyes (or was it contempt, or boredom) I mumbled my excuse and got out of there. I hated being shy and was determined to change it.
How shyness is developed and maintained
Shyness really is a combination of social anxiety and social conditioning. To overcome shyness you need to learn to relax socially. This enables you to direct your attention away from yourself and gives you the space to practice certain conversational skills. In most cases, the heightened emotions of socializing when young simply condition the sufferer to respond to social events with fear, instead of excitement and pleasure.
Relaxed socializing is so pleasurable, not to say productive, but it is an advantage denied to many until they learn to relax. To start reducing your own shyness, I want you to absorb the following tips and ideas and start to put them into practice:
1) Think about the way you feel and behave around familiar people you are comfortable and spontaneous around. It's that feeling transferred to new people and situations that equates to your emerging social confidence.
2) Focus your attention away from yourself. Sure, you can think a little bit about how you are coming across, but if all your focus is on your own words and feelings then you might as well be by yourself. Notice what other people are wearing and make a mental note, listen to their
conversation, imagine where they might live, make a point of remembering names. Not only does this give you more to talk about, it also 'dilutes' social anxiety leaving you feeling calmer.
3) Ask people open questions. Many people like to talk about themselves and will find you interesting if you find them interesting. Ask questions that require more than a 'yes'/'no' response such as 'What do you like about this place?' rather than: 'Do you like this place?' Once they've answered use 'add-on' questions connected to the first such as: 'What other places do you like in this city.?' Next you can express your views. This is a great way to get the conversation going. If the conversation doesn't 'take' then no matter, you've done your bit.
4) Stop trusting your imagination so much! Have you ever had an imaginary picture in your mind of a holiday destination only to arrive and find the reality is different from the way you had imagined? That's how reliable imagination is. Stop imagining what others think. I do lots of public speaking and I've long since stopped trying to second guess what others think of me - it's just too painful. Besides, what a person thinks about you has a lot more to do with who they are than who you are.
5) Stop using 'all or nothing' thinking. The 'completely this/completely that' style of thought occurs when you are emotional. People who are depressed, angry or anxious see reality in terms of differing extremes, simplistic all or nothing terms. An angry person is 'right' and you are 'wrong'; the depressed person feels like a 'failure' while others are a 'success'. In reality, life is composed of infinite gray areas. So stop fearing that you might say the 'wrong' thing! Or that people will 'hate' you. Once you start to relax more socially you'll notice much less black or white thinking because anxiety actually causes you to think in all or nothing terms.
6) Take your time. You don't have to blurt things out. Ask questions and if questions are asked of you can take time to consider your response (within reason). Don't just blurt out what you think might be the 'right' answer. A slow answer is a relaxed answer.
7) Finally, use hypnotic rehearsal. Hypnosis is the quickest way to change your instinctive/emotional response to any situation. Only think about meeting others when your mind and body is relaxed. This conditions you to associate relaxation with being around new people. In fact you'll find that when you relax deeply enough often enough whilst hypnotically rehearsing being comfortable around others you'll reach the point where you just can't be shy any more! This is what I call a 'happy inability!'
I now love meeting new people and suspect that my current social confidence would be unrecognizable to my fifteen year old self.
Overcome shyness now at HypnosisDownloads.com
Article by Mark Tyrrell of Hypnosis Downloads.com.
Improve your self confidence in 15 minutes
I used to be frighteningly under confident in social situations. And although people who know me now would never believe I used to doubt myself so much I literally had to learn confidence until it became a natural part of me. I can tell you relaxed optimistic confidence is just, well so much more fun.
Here I'll tell you about the things that made the most difference to my confidence levels...
Some people have naturally high levels of confidence but everybody can learn to be more confident
Firstly, it's important to get a clear idea of what self confidence really means, otherwise you won't know when you've got it! So, self confidence means:
1) Being calm. For every situation in life you need to run on the appropriate level of emotion. Too much emotional 'leakage' into a experience can spoil the experience. You make great strides towards confidence when you begin to relax in a greater range of situations.
2) Being cool. The second part of self confidence is about being able to relax with uncertainty. To be 'cool' in a situation really means relaxing with not knowing how things will pan out. If you truly tolerate uncertainty, you can do pretty much anything.
3) Not being too concerned with what others think of you. You know when you imagine what some place is going to be like before you go there but when you get there it is totally different to your imagination? That's how reliable your imagination is! Stop trusting your imagination so much. I've long since stopped bothering to imagine what others think of me because so often I've turned out to be wrong.
4) Being specific - where do you want confidence? 'Confidence' is meaningless until you tie it to something specific. You are already confident that you can read these words or can switch a light on and off. So you don't need more confidence everywhere. To get what you want in life you have to establish exactly what you do want. Where do you want confidence in your life? Think about the specific situations now and write them down. You're beginning to steer your brain towards confidence.
5) Understanding that what you expect is what you get. Your brain is an organ that needs clear goals to work towards. When a task has been set in your brain it will do everything it can do
to bring about the completion of that task. If you've tried to recall someone's name but can't, hours later you'll often find their name pops into your head.
The 'trying to recall' experience set the task or blueprint for your brain's future subconscious behavior which eventually produced the name for you - when you weren't thinking about it consciously. You can use this natural mechanism to start feeling more confident. But, to ensure you set the right task for your subconscious mind, the next point is vital.
6) Don't task your mind with negatives. Instead of: 'I don't want to screw up' (which sets the task of 'screwing up' for your brain), set the blueprint for what you do want! Your brain doesn't work towards what to do by being told what not to do. And nature has given you a wonderful natural tool to set the right task blueprints with.
7) Use nature's goal-setter: Now you understand how vital it is to set the right task for you brain, you need to know how to do this reliably. Good hypnosis will strongly 'program' the right blueprint in your mind through the use of your imagination. If you powerfully imagine feeling confident and relaxed while in a relaxed hypnotic state it will be hard for your unconscious mind to do anything else. The blueprint for relaxation has been set firmly into your subconscious mind.
3 simple strategies to get you feeling confident quickly:
1) Think specifically of the time/place/situation you want to feel confident in. Remember 'confidence' doesn't mean anything until you attach it to something specific.
2) Focus on words in your mind right now that describe how you do want to be in that time and place. Maybe words such as 'calm', 'relaxed' or 'focused'. Remember your brain works on clear positive instructions.
3) Close your eyes for as long as you like and think about how those words feel. Then, imagine the situation itself and rehearse it in your mind feeling confident and relaxed. This way you set the right blueprint or 'task' for your unconscious mind.
You can repeat this often to make it more effective and use it with as many areas of your life as you need to. If you listen to a hypnotic cd or download that can make the benefits even more powerful (see my profile below). So if you feel like you'd be blessed with less confidence than some other people you can start redressing the balance by using your mind in the right way right now.
It took me years to learn how to be more confident - now you can do it in a fraction of the time. Good luck!
Boost your confidence now at HypnosisDownloads.com
Article by Mark Tyrrell of Hypnosis Downloads.com.
</text>
|
[
{
"content": "<url>\nhttp://www.hypnosisandthemind.com/wp-content/uploads/2011/01/Hypnosis-Revealed.pdf\n</url>\n<text>\nHypnosis Revealed:\n\nCreate Positive Change in Your Life\n\nHypnosis Revealed:\n\nCreate Positive Change in Your Life\n\nTable of Contents:\n\n5 Hypnosis Myths Exploded\n\nOVER the years, hypnosis has picked up all sorts of weird associations from stage hypnotists, the media and superstition. This is a great shame, because in reality, hypnosis is your single most effective tool for change. Hypnosis is your birthright, and you should know how to use it so it doesn't use you. Here we dispel the biggest hypnosis myths.\n\nHypnosis Myth 1) All hypnosis is the same\n\nAs with anything, hypnosis can be good, bad or indifferent. The most common is old-style authoritarian hypnosis of the type \"You are getting sleepy, you are feeling confident\".\n\nUnsurprisingly, this sort of hypnosis doesn't work well with many people. Good hypnosis uses subtle psychological principles and advanced communication patterns.\n\nIt's like the difference between a football coach who thinks you'll perform best if he yells at you, compared with the more elegant style of a great leader who knows that to get the best from his people, he needs to understand motivation, to cajole, encourage and reward.\n\nHypnosis Downloads.com offers hundreds of sessions using the best type of hypnosis.\n\nHypnosis Myth 2) Subliminals work\n\nSubliminals are words that you can't hear. Common sense says they shouldn't work, and there's no research proving that they do.\n\nHypnosis Myth 3) Some people can't be hypnotized\n\nThe only reason you can't be hypnotized is if you are incapable of paying attention due to extremely low IQ or brain damage. That's not to say that every hypnotist can hypnotize you however. The more flexible the hypnotist, the more effective she will be with the largest number of p<cursor_is_here>\n\nHypnosis Myth 4) Hypnosis is something weird that other people do to you\n\nIf you couldn't go into hypnosis, you wouldn't be able to sleep, to learn, or get nervous through 'negative self hypnosis'. (You know when you imagine things going wrong and it makes you feel anxious? Well that's self hypnosis!)\n\nHypnosis is simply a deliberate utilization of the REM (Rapid Eye Movement) or dream state. We're not giving people medication here – if it wasn't a natural ability, hypnosis wouldn't work!\n\nHypnosis Myth 5) You lose control in hypnosis\n\nCrazy news stories, stage hypnotists and gossip have created the illusion that you lose control in hypnosis. In fact, when hypnotized, you are relaxed and focused – and able to choose to get up and walk away at any time. You choose to give your attention to the hypnotist, and you can withdraw it at any time.\n\nIf you have been scared of hypnosis in the past, this article has hopefully convinced you to at least give it a try. But remember, ensure what you're getting is the real thing. Visit www.hypnosisdownloads.com\n\n[Notes for use: you are licensed only to use this material unaltered to promote the www.hypnosisdownloads.com affiliate program.]\n\nArticle by Mark Tyrrell of Hypnosis Downloads.com.\n\n4\n\nReassuring Reasons why Hypnosis is your Friend\n\nBelieve the hype or think for yourself\n\nFor too long hypnosis has had a bad or 'difficult' press. If a person doesn't understand something they have 3 options open to them.\n\n1) They might be skeptical and therefore save the trouble of looking further and possibly benefiting.\n2) They may conclude it is dangerous and to be avoided at all costs.\n3) They may spend time discovering the truth behind the hype.\n\nIf you don't know much about a topic it's easy to be suspicious. Some people assume hypnosis is akin to a carnival side show, others consider it mystic mumbo jumbo or 'mind control.' For those who look beyond the hype the truth is far more illuminating.\n\nThe most powerful tool you possess\n\nThere are potentially huge benefits for those who use hypnosis as part of everyday life. When you understand hypnosis you start to see its potential to improve human performance in the physical, emotional and intellectual realms. For me, rumor, gossip and suspicion weren't good enough.\n\nI determined to learn all I could about hypnosis - I learned every fact and practiced every technique under the sun. I took several training courses - some good, some terrible. I invested thousands of hours of devoted study to hypnosis and discovered just what is possible. I hypnotized friends, neighbors and work colleagues. Hypnosis greatly changed things for me on a personal level\n\nHow hypnosis helped me\n\nI used to be shy. Thanks to hypnosis I can now talk to thousands at a time and can approach anybody calmly and confidently.\n\nI used to have poor concentration and procrastinate; thanks to hypnosis I can instantly motivate myself.\n\nI used to find physical work outs and exercise exhausting but because of hypnosis I am now in the best shape of my life.\n\nIncidentally I also stopped myself blushing with hypnosis. Now if ever I have a difficult call or conversation coming up, something I may naturally feel reluctant to do (you know the kind of thing) I spontaneously self hypnotize and rehearse the upcoming situation feeling good, with myself remaining calm. In this way I habitually set my own emotional 'blue prints' for up coming situations. Having said that it's naturally that some people have concerns or half digested 'hand me down' ideas regarding hypnosis. A common one is the one about 'mind control.' However what does this really mean?\n\nWhy you are more in control of yourself in hypnosis\n\nIf someone expresses concerns about being 'controlled' in hypnosis what they mean is they don't want to be like a robot, an automaton that is forced to obey the every whim of the hypnotist. We can't help but influence others but we don't control them. To understand why you need to understand hypnosis better.\n\nSo what is hypnosis like?\n\nHypnosis isn't like a coma. It's not unconsciousness - more a subtle shifting of consciousness. In hypnosis, you can still think logically but you also have access to the 'software' of your mind so that you can update instinctive emotional and physical responses. In fact the hypnotized subject (not the hypnotist) calls the shots. When I hypnotize someone I need to go at their speed and respond to their needs and expectations. Hypnosis will give you more control in your own life because of what it enables you to do.\n\nHow can I be so sure?\n\nBecause over the decades I've seen all kinds of people, all ages and from all backgrounds turn their lives around thanks to hypnosis. When you use hypnosis for yourself it improves confidence in all kinds of ways. When you use it to change other's lives it just blows you away. This is what I mean.\n\nWhen I first hypnotized someone to feel no sensation in a painful arthritic arm it was an incredible feeling. When I first cured life long phobias quickly and comfortably I was astounded. When I stopped hardened alcoholics from drinking and even got a heroin addict off the stuff and back into mainstream life again I started to feel angry that people could just associate hypnosis with entertainment.\n\nWith the aid of hypnosis I (and many people I have trained and worked with) have helped severely depressed people feel strong and positive again. The rewards and satisfactions are hard to describe. I'm going to take a stand against ignorance and short sightedness around hypnosis and here's why.\n\nWhy you need to reclaim hypnosis for yourself\n\nHypnosis is your birthright. It's nature's optimum learning tool. In fact to learn and perform anything well you need to experience a natural focusing of attention, a natural kind of hypnosis. To be successful hypnosis needs to be your companion and friend.\n\nSuccessful people use it naturally all the time because hypnosis is natural. It's the way we learn new responses. Unlike medications its side effects are purely positive - one expectant mother I worked with to feel relaxed during child birth later reported that she was also more relaxed when flying!\n\nHypnosis is easy to learn and every body can benefit. Hypnosis is a safe environment to 'try out' new behaviors and emotional patterns before you experience them for real. So the young man can ask a woman out for a date many times in calm relaxed hypnosis so that by the time he does it for real it feels real and natural and relaxed. Sports people who use hypnosis learn new quicker and more accurately. So hypnosis gives you more control of yourself and your life, it's natural and gives you instant benefits and it's a way of 'trying on' and establishing new patterns of emotional response and behavior, Hypnosis enables you to develop yourself as a human being.\n\nHypnosisDownloads.com offer a free course called 'Learn Hypnosis in 5 Days'.\n\nArticle by Mark Tyrrell of Hypnosis Downloads.com.\n\n7\n\n7 Public Speaking Survival Tips\n\nI used to be terrified of public speaking - now it's natural and fun.\n\nDry mouth, fast heart, sweaty palms, blank mind - yeah I've been there! It's easy to fear public speaking. But I was never just content with overcoming fear. I wanted to be a great speaker. What I needed was a way of calming down and applying simple techniques and strategies to talk like a pro.\n\nWhen I'd learned to relax (more of that later) I learned and applied the following four steps.\n\n1. Reassure your audience - they need to know you know your stuff and you are human!\n2. Hook them by being interesting and relevant. Tell them why what you are saying is relevant to them.\n3. Inspire them by giving them information and ways of seeing that are new and applicable.\n4. Leave them on a high by telling a story them encapsulates your central message.\n\nHow do you become confident enough to apply the four steps?\n\nHere's some tips some of which are practical some of which are to do with the way you think about your public presentations and also how you can start to change the way you feel about them.\n\nTip One\n\nBreath your way to calm. When you breath out you relax that's why people sigh when they're stressed.\n\nBreathing in without breathing out causes hyperventilation and worsens anxiety. Just before your speech take five minutes breathing in to the count of seven and out to the count of eleven (quick count-not seconds!). On the out breath hold it a second before breathing in again. This will produce quick and lasting calm. Remember extending the out breath calms you down.\n\nTip Two\n\nYou have a responsibility as the presenter but relax you don't carry all the responsibility. Presenting is a team effort. Audiences are responsible for politeness, extending their attention and attempting to learn. It's not all you-it's a meeting of two halves. Never mind how they judge you. How do you judge them?\n\nTip Three\n\nUse metaphor and stories. We all experience life metaphorically. The most technical logical person spends at least two hours a night dreaming! Talk detail if necessary but present patterns with metaphors. Folk from 4 to 104 love stories. Use em.\n\nTip four\n\nCaptivate attention by using words that evoke all the senses. Describe how things look, sound, feel, smell and taste. Paint pictures and sensations in their minds with your words.\n\nTip Five\n\nVary your voice tonality and speed of delivery. Keep them alert and engaged. Convey energy when need be and slow down when you need to 'draw them in close.' You are the conductor to their orchestra. And pepper your talk with humor. Your willingness to be funny shows personal confidence and confidence is contagious.\n\nTip Six\n\nTell them what they are going to get. What they are currently getting and then what they have got from you. Sell your sizzle!\n\nTip Seven\n\nWatch and learn from other great speakers until compelling, relaxed speaking is a part of you.\n\nRehearse positively. You need to rehearse how your going to feel as well as what you are going to present. Don't think about your forthcoming presentation whilst feeling nervous as this creates an instinctive association between fear and presenting. This natural negative self-hypnosis is very common with nervous speakers.\n\n2010\n\n©\n\nHypnotically rehearse your speech whilst feeling relaxed. This produces the right 'blueprint' in your mind. In fact when you do this enough times it actually becomes hard to be nervous!\n\nAll great speakers know how to use great self-hypnotic rehearsal. Hypnosis changes attitudes and can bring emotion under control. I used hypnosis, to change my instincts around public speaking. Now I just can't get nervous whether it's 50 or 500 people. The world needs great communicators. Go for it!\n\nCure your fear of public speaking at HypnosisDownloads.com\n\nArticle by Mark Tyrrell ofHypnosis Downloads.com.\n\n7 Ways to Soothe your Shyness\n\nShy people instinctively know that they are missing out. Shyness equals lost opportunities, less pleasure and fewer social connections. Shyness can be crippling but there are tried and tested ways to make it a thing of the past.\n\nWhen I was fifteen I was shy. I recall an attractive girl attempting to engage me in conversation. My shyness made me focus on me instead of her. I heard my own voice but not hers and I thought about what I was trying to say instead of what she was trying to say.\n\nThe formula for shyness is \"too much focus on the self\" plus anxiety. To make it even more unpleasant, sometimes when you are feeling shy you experience physical sensations which 'hijack' your calm logical self.\n\nMy pulse raced, my mouth dried up and I felt like the village idiot! I couldn't think what to say so I said nothing apart from making barely audible grunting noises! Cary Grant eat your heart out! When I detected pity in her eyes (or was it contempt, or boredom) I mumbled my excuse and got out of there. I hated being shy and was determined to change it.\n\nHow shyness is developed and maintained\n\nShyness really is a combination of social anxiety and social conditioning. To overcome shyness you need to learn to relax socially. This enables you to direct your attention away from yourself and gives you the space to practice certain conversational skills. In most cases, the heightened emotions of socializing when young simply condition the sufferer to respond to social events with fear, instead of excitement and pleasure.\n\nRelaxed socializing is so pleasurable, not to say productive, but it is an advantage denied to many until they learn to relax. To start reducing your own shyness, I want you to absorb the following tips and ideas and start to put them into practice:\n\n1) Think about the way you feel and behave around familiar people you are comfortable and spontaneous around. It's that feeling transferred to new people and situations that equates to your emerging social confidence.\n2) Focus your attention away from yourself. Sure, you can think a little bit about how you are coming across, but if all your focus is on your own words and feelings then you might as well be by yourself. Notice what other people are wearing and make a mental note, listen to their\n\nconversation, imagine where they might live, make a point of remembering names. Not only does this give you more to talk about, it also 'dilutes' social anxiety leaving you feeling calmer.\n\n3) Ask people open questions. Many people like to talk about themselves and will find you interesting if you find them interesting. Ask questions that require more than a 'yes'/'no' response such as 'What do you like about this place?' rather than: 'Do you like this place?' Once they've answered use 'add-on' questions connected to the first such as: 'What other places do you like in this city.?' Next you can express your views. This is a great way to get the conversation going. If the conversation doesn't 'take' then no matter, you've done your bit.\n4) Stop trusting your imagination so much! Have you ever had an imaginary picture in your mind of a holiday destination only to arrive and find the reality is different from the way you had imagined? That's how reliable imagination is. Stop imagining what others think. I do lots of public speaking and I've long since stopped trying to second guess what others think of me - it's just too painful. Besides, what a person thinks about you has a lot more to do with who they are than who you are.\n5) Stop using 'all or nothing' thinking. The 'completely this/completely that' style of thought occurs when you are emotional. People who are depressed, angry or anxious see reality in terms of differing extremes, simplistic all or nothing terms. An angry person is 'right' and you are 'wrong'; the depressed person feels like a 'failure' while others are a 'success'. In reality, life is composed of infinite gray areas. So stop fearing that you might say the 'wrong' thing! Or that people will 'hate' you. Once you start to relax more socially you'll notice much less black or white thinking because anxiety actually causes you to think in all or nothing terms.\n6) Take your time. You don't have to blurt things out. Ask questions and if questions are asked of you can take time to consider your response (within reason). Don't just blurt out what you think might be the 'right' answer. A slow answer is a relaxed answer.\n7) Finally, use hypnotic rehearsal. Hypnosis is the quickest way to change your instinctive/emotional response to any situation. Only think about meeting others when your mind and body is relaxed. This conditions you to associate relaxation with being around new people. In fact you'll find that when you relax deeply enough often enough whilst hypnotically rehearsing being comfortable around others you'll reach the point where you just can't be shy any more! This is what I call a 'happy inability!'\n\nI now love meeting new people and suspect that my current social confidence would be unrecognizable to my fifteen year old self.\n\nOvercome shyness now at HypnosisDownloads.com\n\nArticle by Mark Tyrrell of Hypnosis Downloads.com.\n\nImprove your self confidence in 15 minutes\n\nI used to be frighteningly under confident in social situations. And although people who know me now would never believe I used to doubt myself so much I literally had to learn confidence until it became a natural part of me. I can tell you relaxed optimistic confidence is just, well so much more fun.\n\nHere I'll tell you about the things that made the most difference to my confidence levels...\n\nSome people have naturally high levels of confidence but everybody can learn to be more confident\n\nFirstly, it's important to get a clear idea of what self confidence really means, otherwise you won't know when you've got it! So, self confidence means:\n\n1) Being calm. For every situation in life you need to run on the appropriate level of emotion. Too much emotional 'leakage' into a experience can spoil the experience. You make great strides towards confidence when you begin to relax in a greater range of situations.\n2) Being cool. The second part of self confidence is about being able to relax with uncertainty. To be 'cool' in a situation really means relaxing with not knowing how things will pan out. If you truly tolerate uncertainty, you can do pretty much anything.\n3) Not being too concerned with what others think of you. You know when you imagine what some place is going to be like before you go there but when you get there it is totally different to your imagination? That's how reliable your imagination is! Stop trusting your imagination so much. I've long since stopped bothering to imagine what others think of me because so often I've turned out to be wrong.\n4) Being specific - where do you want confidence? 'Confidence' is meaningless until you tie it to something specific. You are already confident that you can read these words or can switch a light on and off. So you don't need more confidence everywhere. To get what you want in life you have to establish exactly what you do want. Where do you want confidence in your life? Think about the specific situations now and write them down. You're beginning to steer your brain towards confidence.\n5) Understanding that what you expect is what you get. Your brain is an organ that needs clear goals to work towards. When a task has been set in your brain it will do everything it can do\n\nto bring about the completion of that task. If you've tried to recall someone's name but can't, hours later you'll often find their name pops into your head.\n\nThe 'trying to recall' experience set the task or blueprint for your brain's future subconscious behavior which eventually produced the name for you - when you weren't thinking about it consciously. You can use this natural mechanism to start feeling more confident. But, to ensure you set the right task for your subconscious mind, the next point is vital.\n\n6) Don't task your mind with negatives. Instead of: 'I don't want to screw up' (which sets the task of 'screwing up' for your brain), set the blueprint for what you do want! Your brain doesn't work towards what to do by being told what not to do. And nature has given you a wonderful natural tool to set the right task blueprints with.\n7) Use nature's goal-setter: Now you understand how vital it is to set the right task for you brain, you need to know how to do this reliably. Good hypnosis will strongly 'program' the right blueprint in your mind through the use of your imagination. If you powerfully imagine feeling confident and relaxed while in a relaxed hypnotic state it will be hard for your unconscious mind to do anything else. The blueprint for relaxation has been set firmly into your subconscious mind.\n\n3 simple strategies to get you feeling confident quickly:\n\n1) Think specifically of the time/place/situation you want to feel confident in. Remember 'confidence' doesn't mean anything until you attach it to something specific.\n2) Focus on words in your mind right now that describe how you do want to be in that time and place. Maybe words such as 'calm', 'relaxed' or 'focused'. Remember your brain works on clear positive instructions.\n3) Close your eyes for as long as you like and think about how those words feel. Then, imagine the situation itself and rehearse it in your mind feeling confident and relaxed. This way you set the right blueprint or 'task' for your unconscious mind.\n\nYou can repeat this often to make it more effective and use it with as many areas of your life as you need to. If you listen to a hypnotic cd or download that can make the benefits even more powerful (see my profile below). So if you feel like you'd be blessed with less confidence than some other people you can start redressing the balance by using your mind in the right way right now.\n\nIt took me years to learn how to be more confident - now you can do it in a fraction of the time. Good luck!\n\nBoost your confidence now at HypnosisDownloads.com\n\nArticle by Mark Tyrrell of Hypnosis Downloads.com.\n</text>\n",
"role": "user"
},
{
"content": "eople.",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.